1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121
//! Unix-specific extensions. use std::ffi::OsStr; use std::io; use std::os::unix::process::CommandExt as _; use crate::Command; /// Unix-specific extensions to the [`Command`] builder. pub trait CommandExt { /// Sets the child process's user ID. This translates to a /// `setuid` call in the child process. Failure in the `setuid` /// call will cause the spawn to fail. fn uid(&mut self, id: u32) -> &mut Command; /// Similar to `uid`, but sets the group ID of the child process. This has /// the same semantics as the `uid` field. fn gid(&mut self, id: u32) -> &mut Command; /// Schedules a closure to be run just before the `exec` function is /// invoked. /// /// The closure is allowed to return an I/O error whose OS error code will /// be communicated back to the parent and returned as an error from when /// the spawn was requested. /// /// Multiple closures can be registered and they will be called in order of /// their registration. If a closure returns `Err` then no further closures /// will be called and the spawn operation will immediately return with a /// failure. /// /// # Notes and Safety /// /// This closure will be run in the context of the child process after a /// `fork`. This primarily means that any modifications made to memory on /// behalf of this closure will **not** be visible to the parent process. /// This is often a very constrained environment where normal operations /// like `malloc` or acquiring a mutex are not guaranteed to work (due to /// other threads perhaps still running when the `fork` was run). /// /// This also means that all resources such as file descriptors and /// memory-mapped regions got duplicated. It is your responsibility to make /// sure that the closure does not violate library invariants by making /// invalid use of these duplicates. /// /// When this closure is run, aspects such as the stdio file descriptors and /// working directory have successfully been changed, so output to these /// locations may not appear where intended. unsafe fn pre_exec<F>(&mut self, f: F) -> &mut Command where F: FnMut() -> io::Result<()> + Send + Sync + 'static; /// Performs all the required setup by this `Command`, followed by calling /// the `execvp` syscall. /// /// On success this function will not return, and otherwise it will return /// an error indicating why the exec (or another part of the setup of the /// `Command`) failed. /// /// `exec` not returning has the same implications as calling /// [`std::process::exit`] – no destructors on the current stack or any other /// thread’s stack will be run. Therefore, it is recommended to only call /// `exec` at a point where it is fine to not run any destructors. Note, /// that the `execvp` syscall independently guarantees that all memory is /// freed and all file descriptors with the `CLOEXEC` option (set by default /// on all file descriptors opened by the standard library) are closed. /// /// This function, unlike `spawn`, will **not** `fork` the process to create /// a new child. Like spawn, however, the default behavior for the stdio /// descriptors will be to inherited from the current process. /// /// # Notes /// /// The process may be in a "broken state" if this function returns in /// error. For example the working directory, environment variables, signal /// handling settings, various user/group information, or aspects of stdio /// file descriptors may have changed. If a "transactional spawn" is /// required to gracefully handle errors it is recommended to use the /// cross-platform `spawn` instead. fn exec(&mut self) -> io::Error; /// Set executable argument /// /// Set the first process argument, `argv[0]`, to something other than the /// default executable path. fn arg0<S>(&mut self, arg: S) -> &mut Command where S: AsRef<OsStr>; } impl CommandExt for Command { fn uid(&mut self, id: u32) -> &mut Command { self.inner.uid(id); self } fn gid(&mut self, id: u32) -> &mut Command { self.inner.gid(id); self } unsafe fn pre_exec<F>(&mut self, f: F) -> &mut Command where F: FnMut() -> io::Result<()> + Send + Sync + 'static, { self.inner.pre_exec(f); self } fn exec(&mut self) -> io::Error { self.inner.exec() } fn arg0<S>(&mut self, arg: S) -> &mut Command where S: AsRef<OsStr>, { self.inner.arg0(arg); self } }