mirror of
https://github.com/nushell/nushell.git
synced 2024-11-22 00:13:21 +01:00
Use safe nix
API instead of libc
(#12315)
# Description Where possible, this PR replaces usages of raw `libc` bindings to instead use safe interfaces from the `nix` crate. Where not possible, the `libc` version reexported through `nix` was used instead of having a separate `libc` dependency.
This commit is contained in:
parent
714a0ccd24
commit
251599c507
1
Cargo.lock
generated
1
Cargo.lock
generated
@ -2867,7 +2867,6 @@ dependencies = [
|
|||||||
"indexmap",
|
"indexmap",
|
||||||
"indicatif",
|
"indicatif",
|
||||||
"itertools 0.12.0",
|
"itertools 0.12.0",
|
||||||
"libc",
|
|
||||||
"log",
|
"log",
|
||||||
"lscolors",
|
"lscolors",
|
||||||
"md-5",
|
"md-5",
|
||||||
|
@ -106,9 +106,8 @@ winreg = { workspace = true }
|
|||||||
uucore = { workspace = true, features = ["mode"] }
|
uucore = { workspace = true, features = ["mode"] }
|
||||||
|
|
||||||
[target.'cfg(unix)'.dependencies]
|
[target.'cfg(unix)'.dependencies]
|
||||||
libc = { workspace = true }
|
|
||||||
umask = { workspace = true }
|
umask = { workspace = true }
|
||||||
nix = { workspace = true, default-features = false, features = ["user", "resource"] }
|
nix = { workspace = true, default-features = false, features = ["user", "resource", "pthread"] }
|
||||||
|
|
||||||
[target.'cfg(any(target_os = "linux", target_os = "android"))'.dependencies]
|
[target.'cfg(any(target_os = "linux", target_os = "android"))'.dependencies]
|
||||||
procfs = { workspace = true }
|
procfs = { workspace = true }
|
||||||
|
@ -71,7 +71,7 @@ impl LazySystemInfoRecord {
|
|||||||
) -> Result<Value, ShellError> {
|
) -> Result<Value, ShellError> {
|
||||||
let pid = Pid::from(std::process::id() as usize);
|
let pid = Pid::from(std::process::id() as usize);
|
||||||
match column {
|
match column {
|
||||||
"thread_id" => Ok(Value::int(get_thread_id(), self.span)),
|
"thread_id" => Ok(Value::int(get_thread_id() as i64, self.span)),
|
||||||
"pid" => Ok(Value::int(pid.as_u32() as i64, self.span)),
|
"pid" => Ok(Value::int(pid.as_u32() as i64, self.span)),
|
||||||
"ppid" => {
|
"ppid" => {
|
||||||
// only get information requested
|
// only get information requested
|
||||||
@ -261,13 +261,13 @@ impl<'a, F: Fn() -> RefreshKind> From<(Option<&'a System>, F)> for SystemOpt<'a>
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn get_thread_id() -> i64 {
|
fn get_thread_id() -> u64 {
|
||||||
#[cfg(target_family = "windows")]
|
#[cfg(windows)]
|
||||||
{
|
{
|
||||||
unsafe { windows::Win32::System::Threading::GetCurrentThreadId() as i64 }
|
unsafe { windows::Win32::System::Threading::GetCurrentThreadId().into() }
|
||||||
}
|
}
|
||||||
#[cfg(not(target_family = "windows"))]
|
#[cfg(unix)]
|
||||||
{
|
{
|
||||||
unsafe { libc::pthread_self() as i64 }
|
nix::sys::pthread::pthread_self() as u64
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,16 +1,14 @@
|
|||||||
#[cfg(unix)]
|
|
||||||
use libc::gid_t;
|
|
||||||
use nu_engine::{command_prelude::*, current_dir};
|
use nu_engine::{command_prelude::*, current_dir};
|
||||||
use std::path::Path;
|
use std::path::Path;
|
||||||
|
|
||||||
// For checking whether we have permission to cd to a directory
|
|
||||||
#[cfg(unix)]
|
#[cfg(unix)]
|
||||||
mod file_permissions {
|
use {
|
||||||
pub type Mode = u32;
|
crate::filesystem::util::users,
|
||||||
pub const USER_EXECUTE: Mode = libc::S_IXUSR as Mode;
|
nix::{
|
||||||
pub const GROUP_EXECUTE: Mode = libc::S_IXGRP as Mode;
|
sys::stat::{mode_t, Mode},
|
||||||
pub const OTHER_EXECUTE: Mode = libc::S_IXOTH as Mode;
|
unistd::{Gid, Uid},
|
||||||
}
|
},
|
||||||
|
std::os::unix::fs::MetadataExt,
|
||||||
|
};
|
||||||
|
|
||||||
// The result of checking whether we have permission to cd to a directory
|
// The result of checking whether we have permission to cd to a directory
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
@ -170,26 +168,22 @@ fn have_permission(dir: impl AsRef<Path>) -> PermissionResult<'static> {
|
|||||||
|
|
||||||
#[cfg(unix)]
|
#[cfg(unix)]
|
||||||
fn have_permission(dir: impl AsRef<Path>) -> PermissionResult<'static> {
|
fn have_permission(dir: impl AsRef<Path>) -> PermissionResult<'static> {
|
||||||
use crate::filesystem::util::users;
|
|
||||||
|
|
||||||
match dir.as_ref().metadata() {
|
match dir.as_ref().metadata() {
|
||||||
Ok(metadata) => {
|
Ok(metadata) => {
|
||||||
use std::os::unix::fs::MetadataExt;
|
let mode = Mode::from_bits_truncate(metadata.mode() as mode_t);
|
||||||
let bits = metadata.mode();
|
|
||||||
let has_bit = |bit| bits & bit == bit;
|
|
||||||
let current_user_uid = users::get_current_uid();
|
let current_user_uid = users::get_current_uid();
|
||||||
if current_user_uid == 0 {
|
if current_user_uid.is_root() {
|
||||||
return PermissionResult::PermissionOk;
|
return PermissionResult::PermissionOk;
|
||||||
}
|
}
|
||||||
let current_user_gid = users::get_current_gid();
|
let current_user_gid = users::get_current_gid();
|
||||||
let owner_user = metadata.uid();
|
let owner_user = Uid::from_raw(metadata.uid());
|
||||||
let owner_group = metadata.gid();
|
let owner_group = Gid::from_raw(metadata.gid());
|
||||||
match (
|
match (
|
||||||
current_user_uid == owner_user,
|
current_user_uid == owner_user,
|
||||||
current_user_gid == owner_group,
|
current_user_gid == owner_group,
|
||||||
) {
|
) {
|
||||||
(true, _) => {
|
(true, _) => {
|
||||||
if has_bit(file_permissions::USER_EXECUTE) {
|
if mode.contains(Mode::S_IXUSR) {
|
||||||
PermissionResult::PermissionOk
|
PermissionResult::PermissionOk
|
||||||
} else {
|
} else {
|
||||||
PermissionResult::PermissionDenied(
|
PermissionResult::PermissionDenied(
|
||||||
@ -198,7 +192,7 @@ fn have_permission(dir: impl AsRef<Path>) -> PermissionResult<'static> {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
(false, true) => {
|
(false, true) => {
|
||||||
if has_bit(file_permissions::GROUP_EXECUTE) {
|
if mode.contains(Mode::S_IXGRP) {
|
||||||
PermissionResult::PermissionOk
|
PermissionResult::PermissionOk
|
||||||
} else {
|
} else {
|
||||||
PermissionResult::PermissionDenied(
|
PermissionResult::PermissionDenied(
|
||||||
@ -207,8 +201,8 @@ fn have_permission(dir: impl AsRef<Path>) -> PermissionResult<'static> {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
(false, false) => {
|
(false, false) => {
|
||||||
if has_bit(file_permissions::OTHER_EXECUTE)
|
if mode.contains(Mode::S_IXOTH)
|
||||||
|| (has_bit(file_permissions::GROUP_EXECUTE)
|
|| (mode.contains(Mode::S_IXGRP)
|
||||||
&& any_group(current_user_gid, owner_group))
|
&& any_group(current_user_gid, owner_group))
|
||||||
{
|
{
|
||||||
PermissionResult::PermissionOk
|
PermissionResult::PermissionOk
|
||||||
@ -225,24 +219,19 @@ fn have_permission(dir: impl AsRef<Path>) -> PermissionResult<'static> {
|
|||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(any(target_os = "linux", target_os = "freebsd", target_os = "android"))]
|
#[cfg(any(target_os = "linux", target_os = "freebsd", target_os = "android"))]
|
||||||
fn any_group(_current_user_gid: gid_t, owner_group: u32) -> bool {
|
fn any_group(_current_user_gid: Gid, owner_group: Gid) -> bool {
|
||||||
use crate::filesystem::util::users;
|
users::current_user_groups()
|
||||||
let Some(user_groups) = users::current_user_groups() else {
|
.unwrap_or_default()
|
||||||
return false;
|
.contains(&owner_group)
|
||||||
};
|
|
||||||
user_groups.iter().any(|gid| gid.as_raw() == owner_group)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(all(
|
#[cfg(all(
|
||||||
unix,
|
unix,
|
||||||
not(any(target_os = "linux", target_os = "freebsd", target_os = "android"))
|
not(any(target_os = "linux", target_os = "freebsd", target_os = "android"))
|
||||||
))]
|
))]
|
||||||
fn any_group(current_user_gid: gid_t, owner_group: u32) -> bool {
|
fn any_group(current_user_gid: Gid, owner_group: Gid) -> bool {
|
||||||
use crate::filesystem::util::users;
|
|
||||||
|
|
||||||
users::get_current_username()
|
users::get_current_username()
|
||||||
.and_then(|name| users::get_user_groups(&name, current_user_gid))
|
.and_then(|name| users::get_user_groups(&name, current_user_gid))
|
||||||
.unwrap_or_default()
|
.unwrap_or_default()
|
||||||
.into_iter()
|
.contains(&owner_group)
|
||||||
.any(|gid| gid.as_raw() == owner_group)
|
|
||||||
}
|
}
|
||||||
|
@ -511,6 +511,7 @@ pub(crate) fn dir_entry_dict(
|
|||||||
{
|
{
|
||||||
use crate::filesystem::util::users;
|
use crate::filesystem::util::users;
|
||||||
use std::os::unix::fs::MetadataExt;
|
use std::os::unix::fs::MetadataExt;
|
||||||
|
|
||||||
let mode = md.permissions().mode();
|
let mode = md.permissions().mode();
|
||||||
record.push(
|
record.push(
|
||||||
"mode",
|
"mode",
|
||||||
@ -525,19 +526,19 @@ pub(crate) fn dir_entry_dict(
|
|||||||
|
|
||||||
record.push(
|
record.push(
|
||||||
"user",
|
"user",
|
||||||
if let Some(user) = users::get_user_by_uid(md.uid()) {
|
if let Some(user) = users::get_user_by_uid(md.uid().into()) {
|
||||||
Value::string(user.name, span)
|
Value::string(user.name, span)
|
||||||
} else {
|
} else {
|
||||||
Value::int(md.uid() as i64, span)
|
Value::int(md.uid().into(), span)
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
|
|
||||||
record.push(
|
record.push(
|
||||||
"group",
|
"group",
|
||||||
if let Some(group) = users::get_group_by_gid(md.gid()) {
|
if let Some(group) = users::get_group_by_gid(md.gid().into()) {
|
||||||
Value::string(group.name, span)
|
Value::string(group.name, span)
|
||||||
} else {
|
} else {
|
||||||
Value::int(md.gid() as i64, span)
|
Value::int(md.gid().into(), span)
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
@ -92,57 +92,40 @@ pub fn is_older(src: &Path, dst: &Path) -> Option<bool> {
|
|||||||
|
|
||||||
#[cfg(unix)]
|
#[cfg(unix)]
|
||||||
pub mod users {
|
pub mod users {
|
||||||
use libc::{gid_t, uid_t};
|
|
||||||
use nix::unistd::{Gid, Group, Uid, User};
|
use nix::unistd::{Gid, Group, Uid, User};
|
||||||
|
|
||||||
pub fn get_user_by_uid(uid: uid_t) -> Option<User> {
|
pub fn get_user_by_uid(uid: Uid) -> Option<User> {
|
||||||
User::from_uid(Uid::from_raw(uid)).ok().flatten()
|
User::from_uid(uid).ok().flatten()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn get_group_by_gid(gid: gid_t) -> Option<Group> {
|
pub fn get_group_by_gid(gid: Gid) -> Option<Group> {
|
||||||
Group::from_gid(Gid::from_raw(gid)).ok().flatten()
|
Group::from_gid(gid).ok().flatten()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn get_current_uid() -> uid_t {
|
pub fn get_current_uid() -> Uid {
|
||||||
Uid::current().as_raw()
|
Uid::current()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn get_current_gid() -> gid_t {
|
pub fn get_current_gid() -> Gid {
|
||||||
Gid::current().as_raw()
|
Gid::current()
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(not(any(target_os = "linux", target_os = "freebsd", target_os = "android")))]
|
#[cfg(not(any(target_os = "linux", target_os = "freebsd", target_os = "android")))]
|
||||||
pub fn get_current_username() -> Option<String> {
|
pub fn get_current_username() -> Option<String> {
|
||||||
User::from_uid(Uid::current())
|
get_user_by_uid(get_current_uid()).map(|user| user.name)
|
||||||
.ok()
|
|
||||||
.flatten()
|
|
||||||
.map(|user| user.name)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(any(target_os = "linux", target_os = "freebsd", target_os = "android"))]
|
#[cfg(any(target_os = "linux", target_os = "freebsd", target_os = "android"))]
|
||||||
pub fn current_user_groups() -> Option<Vec<Gid>> {
|
pub fn current_user_groups() -> Option<Vec<Gid>> {
|
||||||
// SAFETY:
|
if let Ok(mut groups) = nix::unistd::getgroups() {
|
||||||
// if first arg is 0 then it ignores second argument and returns number of groups present for given user.
|
groups.sort_unstable_by_key(|id| id.as_raw());
|
||||||
let ngroups = unsafe { libc::getgroups(0, core::ptr::null::<gid_t> as *mut _) };
|
groups.dedup();
|
||||||
let mut buff: Vec<gid_t> = vec![0; ngroups as usize];
|
Some(groups)
|
||||||
|
|
||||||
// SAFETY:
|
|
||||||
// buff is the size of ngroups and getgroups reads max ngroups elements into buff
|
|
||||||
let found = unsafe { libc::getgroups(ngroups, buff.as_mut_ptr()) };
|
|
||||||
|
|
||||||
if found < 0 {
|
|
||||||
None
|
|
||||||
} else {
|
} else {
|
||||||
buff.truncate(found as usize);
|
None
|
||||||
buff.sort_unstable();
|
|
||||||
buff.dedup();
|
|
||||||
buff.into_iter()
|
|
||||||
.filter_map(|i| get_group_by_gid(i as gid_t))
|
|
||||||
.map(|group| group.gid)
|
|
||||||
.collect::<Vec<_>>()
|
|
||||||
.into()
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns groups for a provided user name and primary group id.
|
/// Returns groups for a provided user name and primary group id.
|
||||||
///
|
///
|
||||||
/// # libc functions used
|
/// # libc functions used
|
||||||
@ -159,19 +142,19 @@ pub mod users {
|
|||||||
/// }
|
/// }
|
||||||
/// ```
|
/// ```
|
||||||
#[cfg(not(any(target_os = "linux", target_os = "freebsd", target_os = "android")))]
|
#[cfg(not(any(target_os = "linux", target_os = "freebsd", target_os = "android")))]
|
||||||
pub fn get_user_groups(username: &str, gid: gid_t) -> Option<Vec<Gid>> {
|
pub fn get_user_groups(username: &str, gid: Gid) -> Option<Vec<Gid>> {
|
||||||
|
use nix::libc::{c_int, gid_t};
|
||||||
use std::ffi::CString;
|
use std::ffi::CString;
|
||||||
|
|
||||||
// MacOS uses i32 instead of gid_t in getgrouplist for unknown reasons
|
// MacOS uses i32 instead of gid_t in getgrouplist for unknown reasons
|
||||||
#[cfg(target_os = "macos")]
|
#[cfg(target_os = "macos")]
|
||||||
let mut buff: Vec<i32> = vec![0; 1024];
|
let mut buff: Vec<i32> = vec![0; 1024];
|
||||||
#[cfg(not(target_os = "macos"))]
|
#[cfg(not(target_os = "macos"))]
|
||||||
let mut buff: Vec<gid_t> = vec![0; 1024];
|
let mut buff: Vec<gid_t> = vec![0; 1024];
|
||||||
|
|
||||||
let Ok(name) = CString::new(username.as_bytes()) else {
|
let name = CString::new(username).ok()?;
|
||||||
return None;
|
|
||||||
};
|
|
||||||
|
|
||||||
let mut count = buff.len() as libc::c_int;
|
let mut count = buff.len() as c_int;
|
||||||
|
|
||||||
// MacOS uses i32 instead of gid_t in getgrouplist for unknown reasons
|
// MacOS uses i32 instead of gid_t in getgrouplist for unknown reasons
|
||||||
// SAFETY:
|
// SAFETY:
|
||||||
@ -182,11 +165,19 @@ pub mod users {
|
|||||||
// The capacity for `*groups` is passed in as `*ngroups` which is the buffer max length/capacity (as we initialize with 0)
|
// The capacity for `*groups` is passed in as `*ngroups` which is the buffer max length/capacity (as we initialize with 0)
|
||||||
// Following reads from `*groups`/`buff` will only happen after `buff.truncate(*ngroups)`
|
// Following reads from `*groups`/`buff` will only happen after `buff.truncate(*ngroups)`
|
||||||
#[cfg(target_os = "macos")]
|
#[cfg(target_os = "macos")]
|
||||||
let res =
|
let res = unsafe {
|
||||||
unsafe { libc::getgrouplist(name.as_ptr(), gid as i32, buff.as_mut_ptr(), &mut count) };
|
nix::libc::getgrouplist(
|
||||||
|
name.as_ptr(),
|
||||||
|
gid.as_raw() as i32,
|
||||||
|
buff.as_mut_ptr(),
|
||||||
|
&mut count,
|
||||||
|
)
|
||||||
|
};
|
||||||
|
|
||||||
#[cfg(not(target_os = "macos"))]
|
#[cfg(not(target_os = "macos"))]
|
||||||
let res = unsafe { libc::getgrouplist(name.as_ptr(), gid, buff.as_mut_ptr(), &mut count) };
|
let res = unsafe {
|
||||||
|
nix::libc::getgrouplist(name.as_ptr(), gid.as_raw(), buff.as_mut_ptr(), &mut count)
|
||||||
|
};
|
||||||
|
|
||||||
if res < 0 {
|
if res < 0 {
|
||||||
None
|
None
|
||||||
@ -196,11 +187,13 @@ pub mod users {
|
|||||||
buff.dedup();
|
buff.dedup();
|
||||||
// allow trivial cast: on macos i is i32, on linux it's already gid_t
|
// allow trivial cast: on macos i is i32, on linux it's already gid_t
|
||||||
#[allow(trivial_numeric_casts)]
|
#[allow(trivial_numeric_casts)]
|
||||||
buff.into_iter()
|
Some(
|
||||||
.filter_map(|i| get_group_by_gid(i as gid_t))
|
buff.into_iter()
|
||||||
.map(|group| group.gid)
|
.map(|id| Gid::from_raw(id as gid_t))
|
||||||
.collect::<Vec<_>>()
|
.filter_map(get_group_by_gid)
|
||||||
.into()
|
.map(|group| group.gid)
|
||||||
|
.collect(),
|
||||||
|
)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -533,44 +533,38 @@ impl ExternalCommand {
|
|||||||
// Create a thread to wait for an exit code.
|
// Create a thread to wait for an exit code.
|
||||||
thread::Builder::new()
|
thread::Builder::new()
|
||||||
.name("exit code waiter".into())
|
.name("exit code waiter".into())
|
||||||
.spawn(move || {
|
.spawn(move || match child.as_mut().wait() {
|
||||||
match child.as_mut().wait() {
|
Err(err) => Err(ShellError::ExternalCommand {
|
||||||
Err(err) => Err(ShellError::ExternalCommand {
|
label: "External command exited with error".into(),
|
||||||
label: "External command exited with error".into(),
|
help: err.to_string(),
|
||||||
help: err.to_string(),
|
span,
|
||||||
span
|
}),
|
||||||
}),
|
Ok(x) => {
|
||||||
Ok(x) => {
|
#[cfg(unix)]
|
||||||
#[cfg(unix)]
|
{
|
||||||
{
|
use nix::sys::signal::Signal;
|
||||||
use nu_ansi_term::{Color, Style};
|
use nu_ansi_term::{Color, Style};
|
||||||
use std::ffi::CStr;
|
use std::os::unix::process::ExitStatusExt;
|
||||||
use std::os::unix::process::ExitStatusExt;
|
|
||||||
|
|
||||||
if x.core_dumped() {
|
if x.core_dumped() {
|
||||||
let cause = x.signal().and_then(|sig| unsafe {
|
let cause = x
|
||||||
// SAFETY: We should be the first to call `char * strsignal(int sig)`
|
.signal()
|
||||||
let sigstr_ptr = libc::strsignal(sig);
|
.and_then(|sig| {
|
||||||
if sigstr_ptr.is_null() {
|
Signal::try_from(sig).ok().map(Signal::as_str)
|
||||||
return None;
|
})
|
||||||
}
|
.unwrap_or("Something went wrong");
|
||||||
|
|
||||||
// SAFETY: The pointer points to a valid non-null string
|
|
||||||
let sigstr = CStr::from_ptr(sigstr_ptr);
|
|
||||||
sigstr.to_str().map(String::from).ok()
|
|
||||||
});
|
|
||||||
|
|
||||||
let cause = cause.as_deref().unwrap_or("Something went wrong");
|
|
||||||
|
|
||||||
let style = Style::new().bold().on(Color::Red);
|
let style = Style::new().bold().on(Color::Red);
|
||||||
eprintln!(
|
let message = format!(
|
||||||
"{}",
|
"{cause}: child process '{commandname}' core dumped"
|
||||||
style.paint(format!(
|
|
||||||
"{cause}: oops, process '{commandname}' core dumped"
|
|
||||||
))
|
|
||||||
);
|
);
|
||||||
let _ = exit_code_tx.send(Value::error (
|
eprintln!("{}", style.paint(&message));
|
||||||
ShellError::ExternalCommand { label: "core dumped".to_string(), help: format!("{cause}: child process '{commandname}' core dumped"), span: head },
|
let _ = exit_code_tx.send(Value::error(
|
||||||
|
ShellError::ExternalCommand {
|
||||||
|
label: "core dumped".into(),
|
||||||
|
help: message,
|
||||||
|
span: head,
|
||||||
|
},
|
||||||
head,
|
head,
|
||||||
));
|
));
|
||||||
return Ok(());
|
return Ok(());
|
||||||
@ -585,8 +579,8 @@ impl ExternalCommand {
|
|||||||
}
|
}
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
}
|
})
|
||||||
}).map_err(|e| e.into_spanned(head))?;
|
.map_err(|e| e.into_spanned(head))?;
|
||||||
|
|
||||||
let exit_code_receiver = ValueReceiver::new(exit_code_rx);
|
let exit_code_receiver = ValueReceiver::new(exit_code_rx);
|
||||||
|
|
||||||
|
@ -120,7 +120,7 @@ mod foreground_pgroup {
|
|||||||
/// Currently only intended to access `tcsetpgrp` and `tcgetpgrp` with the I/O safe `nix`
|
/// Currently only intended to access `tcsetpgrp` and `tcgetpgrp` with the I/O safe `nix`
|
||||||
/// interface.
|
/// interface.
|
||||||
pub unsafe fn stdin_fd() -> impl AsFd {
|
pub unsafe fn stdin_fd() -> impl AsFd {
|
||||||
unsafe { BorrowedFd::borrow_raw(libc::STDIN_FILENO) }
|
unsafe { BorrowedFd::borrow_raw(nix::libc::STDIN_FILENO) }
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn prepare_command(external_command: &mut Command, existing_pgrp: u32) {
|
pub fn prepare_command(external_command: &mut Command, existing_pgrp: u32) {
|
||||||
|
Loading…
Reference in New Issue
Block a user