use async_broadcast::{broadcast, InactiveReceiver, Receiver, Sender as Broadcaster};
use enumflags2::BitFlags;
use event_listener::{Event, EventListener};
use once_cell::sync::OnceCell;
use ordered_stream::{OrderedFuture, OrderedStream, PollResult};
use static_assertions::assert_impl_all;
use std::{
collections::HashMap,
convert::TryInto,
io::{self, ErrorKind},
ops::Deref,
pin::Pin,
sync::{
self,
atomic::{AtomicU32, Ordering::SeqCst},
Arc, Weak,
},
task::{Context, Poll},
};
use tracing::{debug, info_span, instrument, trace, trace_span, warn, Instrument};
use zbus_names::{BusName, ErrorName, InterfaceName, MemberName, OwnedUniqueName, WellKnownName};
use zvariant::ObjectPath;
use futures_core::{ready, Future};
use futures_sink::Sink;
use futures_util::{sink::SinkExt, StreamExt};
use crate::{
async_lock::Mutex,
blocking,
fdo::{self, ConnectionCredentials, RequestNameFlags, RequestNameReply},
raw::{Connection as RawConnection, Socket},
socket_reader::SocketReader,
Authenticated, CacheProperties, ConnectionBuilder, DBusError, Error, Executor, Guid, MatchRule,
Message, MessageBuilder, MessageFlags, MessageStream, MessageType, ObjectServer,
OwnedMatchRule, Result, Task,
};
const DEFAULT_MAX_QUEUED: usize = 64;
const DEFAULT_MAX_METHOD_RETURN_QUEUED: usize = 8;
#[derive(Debug)]
pub(crate) struct ConnectionInner {
server_guid: Guid,
#[cfg(unix)]
cap_unix_fd: bool,
bus_conn: bool,
unique_name: OnceCell<OwnedUniqueName>,
registered_names: Mutex<HashMap<WellKnownName<'static>, NameStatus>>,
raw_conn: Arc<sync::Mutex<RawConnection<Box<dyn Socket>>>>,
serial: AtomicU32,
executor: Executor<'static>,
#[allow(unused)]
socket_reader_task: OnceCell<Task<()>>,
pub(crate) msg_receiver: InactiveReceiver<Result<Arc<Message>>>,
pub(crate) method_return_receiver: InactiveReceiver<Result<Arc<Message>>>,
msg_senders: Arc<Mutex<HashMap<Option<OwnedMatchRule>, MsgBroadcaster>>>,
subscriptions: Mutex<Subscriptions>,
object_server: OnceCell<blocking::ObjectServer>,
object_server_dispatch_task: OnceCell<Task<()>>,
}
type Subscriptions = HashMap<OwnedMatchRule, (u64, InactiveReceiver<Result<Arc<Message>>>)>;
pub(crate) type MsgBroadcaster = Broadcaster<Result<Arc<Message>>>;
#[derive(Clone, Debug)]
#[must_use = "Dropping a `Connection` will close the underlying socket."]
pub struct Connection {
pub(crate) inner: Arc<ConnectionInner>,
}
assert_impl_all!(Connection: Send, Sync, Unpin);
#[derive(Debug)]
pub(crate) struct PendingMethodCall {
stream: Option<MessageStream>,
serial: u32,
}
impl Future for PendingMethodCall {
type Output = Result<Arc<Message>>;
fn poll(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> {
self.poll_before(cx, None).map(|ret| {
ret.map(|(_, r)| r).unwrap_or_else(|| {
Err(crate::Error::InputOutput(
io::Error::new(ErrorKind::BrokenPipe, "socket closed").into(),
))
})
})
}
}
impl OrderedFuture for PendingMethodCall {
type Output = Result<Arc<Message>>;
type Ordering = zbus::MessageSequence;
fn poll_before(
self: Pin<&mut Self>,
cx: &mut Context<'_>,
before: Option<&Self::Ordering>,
) -> Poll<Option<(Self::Ordering, Self::Output)>> {
let this = self.get_mut();
if let Some(stream) = &mut this.stream {
loop {
match Pin::new(&mut *stream).poll_next_before(cx, before) {
Poll::Ready(PollResult::Item {
data: Ok(msg),
ordering,
}) => {
if msg.reply_serial() != Some(this.serial) {
continue;
}
let res = match msg.message_type() {
MessageType::Error => Err(msg.into()),
MessageType::MethodReturn => Ok(msg),
_ => continue,
};
this.stream = None;
return Poll::Ready(Some((ordering, res)));
}
Poll::Ready(PollResult::Item {
data: Err(e),
ordering,
}) => {
return Poll::Ready(Some((ordering, Err(e))));
}
Poll::Ready(PollResult::NoneBefore) => {
return Poll::Ready(None);
}
Poll::Ready(PollResult::Terminated) => {
return Poll::Ready(None);
}
Poll::Pending => return Poll::Pending,
}
}
}
Poll::Ready(None)
}
}
impl Connection {
pub async fn send_message(&self, mut msg: Message) -> Result<u32> {
let serial = self.assign_serial_num(&mut msg)?;
trace!("Sending message: {:?}", msg);
(&mut &*self).send(msg).await?;
trace!("Sent message with serial: {}", serial);
Ok(serial)
}
pub async fn call_method<'d, 'p, 'i, 'm, D, P, I, M, B>(
&self,
destination: Option<D>,
path: P,
interface: Option<I>,
method_name: M,
body: &B,
) -> Result<Arc<Message>>
where
D: TryInto<BusName<'d>>,
P: TryInto<ObjectPath<'p>>,
I: TryInto<InterfaceName<'i>>,
M: TryInto<MemberName<'m>>,
D::Error: Into<Error>,
P::Error: Into<Error>,
I::Error: Into<Error>,
M::Error: Into<Error>,
B: serde::ser::Serialize + zvariant::DynamicType,
{
self.call_method_raw(
destination,
path,
interface,
method_name,
BitFlags::empty(),
body,
)
.await?
.expect("no reply")
.await
}
pub(crate) async fn call_method_raw<'d, 'p, 'i, 'm, D, P, I, M, B>(
&self,
destination: Option<D>,
path: P,
interface: Option<I>,
method_name: M,
flags: BitFlags<MessageFlags>,
body: &B,
) -> Result<Option<PendingMethodCall>>
where
D: TryInto<BusName<'d>>,
P: TryInto<ObjectPath<'p>>,
I: TryInto<InterfaceName<'i>>,
M: TryInto<MemberName<'m>>,
D::Error: Into<Error>,
P::Error: Into<Error>,
I::Error: Into<Error>,
M::Error: Into<Error>,
B: serde::ser::Serialize + zvariant::DynamicType,
{
let mut builder = MessageBuilder::method_call(path, method_name)?;
if let Some(sender) = self.unique_name() {
builder = builder.sender(sender)?
}
if let Some(destination) = destination {
builder = builder.destination(destination)?
}
if let Some(interface) = interface {
builder = builder.interface(interface)?
}
for flag in flags {
builder = builder.with_flags(flag)?;
}
let msg = builder.build(body)?;
let msg_receiver = self.inner.method_return_receiver.activate_cloned();
let stream = Some(MessageStream::for_subscription_channel(
msg_receiver,
None,
self,
));
let serial = self.send_message(msg).await?;
if flags.contains(MessageFlags::NoReplyExpected) {
Ok(None)
} else {
Ok(Some(PendingMethodCall { stream, serial }))
}
}
pub async fn emit_signal<'d, 'p, 'i, 'm, D, P, I, M, B>(
&self,
destination: Option<D>,
path: P,
interface: I,
signal_name: M,
body: &B,
) -> Result<()>
where
D: TryInto<BusName<'d>>,
P: TryInto<ObjectPath<'p>>,
I: TryInto<InterfaceName<'i>>,
M: TryInto<MemberName<'m>>,
D::Error: Into<Error>,
P::Error: Into<Error>,
I::Error: Into<Error>,
M::Error: Into<Error>,
B: serde::ser::Serialize + zvariant::DynamicType,
{
let m = Message::signal(
self.unique_name(),
destination,
path,
interface,
signal_name,
body,
)?;
self.send_message(m).await.map(|_| ())
}
pub async fn reply<B>(&self, call: &Message, body: &B) -> Result<u32>
where
B: serde::ser::Serialize + zvariant::DynamicType,
{
let m = Message::method_reply(self.unique_name(), call, body)?;
self.send_message(m).await
}
pub async fn reply_error<'e, E, B>(
&self,
call: &Message,
error_name: E,
body: &B,
) -> Result<u32>
where
B: serde::ser::Serialize + zvariant::DynamicType,
E: TryInto<ErrorName<'e>>,
E::Error: Into<Error>,
{
let m = Message::method_error(self.unique_name(), call, error_name, body)?;
self.send_message(m).await
}
pub async fn reply_dbus_error(
&self,
call: &zbus::MessageHeader<'_>,
err: impl DBusError,
) -> Result<u32> {
let m = err.create_reply(call);
self.send_message(m?).await
}
pub async fn request_name<'w, W>(&self, well_known_name: W) -> Result<()>
where
W: TryInto<WellKnownName<'w>>,
W::Error: Into<Error>,
{
self.request_name_with_flags(
well_known_name,
RequestNameFlags::ReplaceExisting | RequestNameFlags::DoNotQueue,
)
.await
.map(|_| ())
}
pub async fn request_name_with_flags<'w, W>(
&self,
well_known_name: W,
flags: BitFlags<RequestNameFlags>,
) -> Result<RequestNameReply>
where
W: TryInto<WellKnownName<'w>>,
W::Error: Into<Error>,
{
let well_known_name = well_known_name.try_into().map_err(Into::into)?;
let mut names = self.inner.registered_names.lock().await;
match names.get(&well_known_name) {
Some(NameStatus::Owner(_)) => return Ok(RequestNameReply::AlreadyOwner),
Some(NameStatus::Queued(_)) => return Ok(RequestNameReply::InQueue),
None => (),
}
if !self.is_bus() {
names.insert(well_known_name.to_owned(), NameStatus::Owner(None));
return Ok(RequestNameReply::PrimaryOwner);
}
let dbus_proxy = fdo::DBusProxy::builder(self)
.cache_properties(CacheProperties::No)
.build()
.await?;
let mut acquired_stream = dbus_proxy.receive_name_acquired().await?;
let mut lost_stream = dbus_proxy.receive_name_lost().await?;
let reply = dbus_proxy
.request_name(well_known_name.clone(), flags)
.await?;
let lost_task_name = format!("monitor name {well_known_name} lost");
let name_lost_fut = if flags.contains(RequestNameFlags::AllowReplacement) {
let weak_conn = WeakConnection::from(self);
let well_known_name = well_known_name.to_owned();
Some(
async move {
loop {
let signal = lost_stream.next().await;
let inner = match weak_conn.upgrade() {
Some(conn) => conn.inner.clone(),
None => break,
};
match signal {
Some(signal) => match signal.args() {
Ok(args) if args.name == well_known_name => {
tracing::info!(
"Connection `{}` lost name `{}`",
inner.unique_name.get().unwrap(),
well_known_name
);
inner.registered_names.lock().await.remove(&well_known_name);
break;
}
Ok(_) => (),
Err(e) => warn!("Failed to parse `NameLost` signal: {}", e),
},
None => {
trace!("`NameLost` signal stream closed");
break;
}
}
}
}
.instrument(info_span!("{}", lost_task_name)),
)
} else {
None
};
let status = match reply {
RequestNameReply::InQueue => {
let weak_conn = WeakConnection::from(self);
let well_known_name = well_known_name.to_owned();
let task_name = format!("monitor name {well_known_name} acquired");
let task = self.executor().spawn(
async move {
loop {
let signal = acquired_stream.next().await;
let inner = match weak_conn.upgrade() {
Some(conn) => conn.inner.clone(),
None => break,
};
match signal {
Some(signal) => match signal.args() {
Ok(args) if args.name == well_known_name => {
let mut names = inner.registered_names.lock().await;
if let Some(status) = names.get_mut(&well_known_name) {
let task = name_lost_fut.map(|fut| {
inner.executor.spawn(fut, &lost_task_name)
});
*status = NameStatus::Owner(task);
break;
}
}
Ok(_) => (),
Err(e) => warn!("Failed to parse `NameAcquired` signal: {}", e),
},
None => {
trace!("`NameAcquired` signal stream closed");
break;
}
}
}
}
.instrument(info_span!("{}", task_name)),
&task_name,
);
NameStatus::Queued(task)
}
RequestNameReply::PrimaryOwner | RequestNameReply::AlreadyOwner => {
let task = name_lost_fut.map(|fut| self.executor().spawn(fut, &lost_task_name));
NameStatus::Owner(task)
}
RequestNameReply::Exists => return Err(Error::NameTaken),
};
names.insert(well_known_name.to_owned(), status);
Ok(reply)
}
pub async fn release_name<'w, W>(&self, well_known_name: W) -> Result<bool>
where
W: TryInto<WellKnownName<'w>>,
W::Error: Into<Error>,
{
let well_known_name: WellKnownName<'w> = well_known_name.try_into().map_err(Into::into)?;
let mut names = self.inner.registered_names.lock().await;
if names.remove(&well_known_name.to_owned()).is_none() {
return Ok(false);
};
if !self.is_bus() {
return Ok(true);
}
fdo::DBusProxy::builder(self)
.cache_properties(CacheProperties::No)
.build()
.await?
.release_name(well_known_name)
.await
.map(|_| true)
.map_err(Into::into)
}
pub fn is_bus(&self) -> bool {
self.inner.bus_conn
}
pub fn assign_serial_num(&self, msg: &mut Message) -> Result<u32> {
let mut serial = 0;
msg.modify_primary_header(|primary| {
serial = *primary.serial_num_or_init(|| self.next_serial());
Ok(())
})?;
Ok(serial)
}
pub fn unique_name(&self) -> Option<&OwnedUniqueName> {
self.inner.unique_name.get()
}
pub fn set_unique_name<U>(&self, unique_name: U) -> Result<()>
where
U: TryInto<OwnedUniqueName>,
U::Error: Into<Error>,
{
let name = unique_name.try_into().map_err(Into::into)?;
self.inner
.unique_name
.set(name)
.expect("unique name already set");
Ok(())
}
pub fn max_queued(&self) -> usize {
self.inner.msg_receiver.capacity()
}
pub fn set_max_queued(&mut self, max: usize) {
self.inner.msg_receiver.clone().set_capacity(max);
}
pub fn server_guid(&self) -> &str {
self.inner.server_guid.as_str()
}
pub fn executor(&self) -> &Executor<'static> {
&self.inner.executor
}
pub fn object_server(&self) -> impl Deref<Target = ObjectServer> + '_ {
struct Wrapper<'a>(&'a blocking::ObjectServer);
impl<'a> Deref for Wrapper<'a> {
type Target = ObjectServer;
fn deref(&self) -> &Self::Target {
self.0.inner()
}
}
Wrapper(self.sync_object_server(true, None))
}
pub(crate) fn sync_object_server(
&self,
start: bool,
started_event: Option<Event>,
) -> &blocking::ObjectServer {
self.inner
.object_server
.get_or_init(move || self.setup_object_server(start, started_event))
}
fn setup_object_server(
&self,
start: bool,
started_event: Option<Event>,
) -> blocking::ObjectServer {
if start {
self.start_object_server(started_event);
}
blocking::ObjectServer::new(self)
}
#[instrument(skip(self))]
pub(crate) fn start_object_server(&self, started_event: Option<Event>) {
self.inner.object_server_dispatch_task.get_or_init(|| {
trace!("starting ObjectServer task");
let weak_conn = WeakConnection::from(self);
let obj_server_task_name = "ObjectServer task";
self.inner.executor.spawn(
async move {
let mut stream = match weak_conn.upgrade() {
Some(conn) => {
let mut builder = MatchRule::builder().msg_type(MessageType::MethodCall);
if let Some(unique_name) = conn.unique_name() {
builder = builder.destination(&**unique_name).expect("unique name");
}
let rule = builder.build();
match conn.add_match(rule.into(), None).await {
Ok(stream) => stream,
Err(e) => {
debug!("Failed to create message stream: {}", e);
return;
}
}
}
None => {
trace!("Connection is gone, stopping associated object server task");
return;
}
};
if let Some(started_event) = started_event {
started_event.notify(1);
}
trace!("waiting for incoming method call messages..");
while let Some(msg) = stream.next().await.and_then(|m| {
if let Err(e) = &m {
debug!("Error while reading from object server stream: {:?}", e);
}
m.ok()
}) {
if let Some(conn) = weak_conn.upgrade() {
let hdr = match msg.header() {
Ok(hdr) => hdr,
Err(e) => {
warn!("Failed to parse header: {}", e);
continue;
}
};
match hdr.destination() {
Ok(Some(BusName::Unique(_))) | Ok(None) => (),
Ok(Some(BusName::WellKnown(dest))) => {
let names = conn.inner.registered_names.lock().await;
if !names.is_empty() && !names.contains_key(dest) {
trace!("Got a method call for a different destination: {}", dest);
continue;
}
}
Err(e) => {
warn!("Failed to parse destination: {}", e);
continue;
}
}
let member = match msg.member() {
Some(member) => member,
None => {
warn!("Got a method call with no `MEMBER` field: {}", msg);
continue;
}
};
trace!("Got `{}`. Will spawn a task for dispatch..", msg);
let executor = conn.inner.executor.clone();
let task_name = format!("`{member}` method dispatcher");
executor
.spawn(
async move {
trace!("spawned a task to dispatch `{}`.", msg);
let server = conn.object_server();
if let Err(e) = server.dispatch_message(&msg).await {
debug!(
"Error dispatching message. Message: {:?}, error: {:?}",
msg, e
);
}
}
.instrument(trace_span!("{}", task_name)),
&task_name,
)
.detach();
} else {
trace!("Connection is gone, stopping associated object server task");
break;
}
}
}
.instrument(info_span!("{}", obj_server_task_name)),
obj_server_task_name,
)
});
}
pub(crate) async fn add_match(
&self,
rule: OwnedMatchRule,
max_queued: Option<usize>,
) -> Result<Receiver<Result<Arc<Message>>>> {
use std::collections::hash_map::Entry;
if self.inner.msg_senders.lock().await.is_empty() {
return Err(Error::InputOutput(Arc::new(io::Error::new(
io::ErrorKind::BrokenPipe,
"Socket reader task has errored out",
))));
}
let mut subscriptions = self.inner.subscriptions.lock().await;
let msg_type = rule.msg_type().unwrap_or(MessageType::Signal);
match subscriptions.entry(rule.clone()) {
Entry::Vacant(e) => {
let max_queued = max_queued.unwrap_or(DEFAULT_MAX_QUEUED);
let (sender, mut receiver) = broadcast(max_queued);
receiver.set_await_active(false);
if self.is_bus() && msg_type == MessageType::Signal {
fdo::DBusProxy::builder(self)
.cache_properties(CacheProperties::No)
.build()
.await?
.add_match_rule(e.key().inner().clone())
.await?;
}
e.insert((1, receiver.clone().deactivate()));
self.inner
.msg_senders
.lock()
.await
.insert(Some(rule), sender);
Ok(receiver)
}
Entry::Occupied(mut e) => {
let (num_subscriptions, receiver) = e.get_mut();
*num_subscriptions += 1;
if let Some(max_queued) = max_queued {
if max_queued > receiver.capacity() {
receiver.set_capacity(max_queued);
}
}
Ok(receiver.activate_cloned())
}
}
}
pub(crate) async fn remove_match(&self, rule: OwnedMatchRule) -> Result<bool> {
use std::collections::hash_map::Entry;
let mut subscriptions = self.inner.subscriptions.lock().await;
let msg_type = rule.msg_type().unwrap_or(MessageType::Signal);
match subscriptions.entry(rule) {
Entry::Vacant(_) => Ok(false),
Entry::Occupied(mut e) => {
let rule = e.key().inner().clone();
e.get_mut().0 -= 1;
if e.get().0 == 0 {
if self.is_bus() && msg_type == MessageType::Signal {
fdo::DBusProxy::builder(self)
.cache_properties(CacheProperties::No)
.build()
.await?
.remove_match_rule(rule.clone())
.await?;
}
e.remove();
self.inner
.msg_senders
.lock()
.await
.remove(&Some(rule.into()));
}
Ok(true)
}
}
}
pub(crate) fn queue_remove_match(&self, rule: OwnedMatchRule) {
let conn = self.clone();
let task_name = format!("Remove match `{}`", *rule);
let remove_match =
async move { conn.remove_match(rule).await }.instrument(trace_span!("{}", task_name));
self.inner.executor.spawn(remove_match, &task_name).detach()
}
pub(crate) async fn hello_bus(&self) -> Result<()> {
let dbus_proxy = fdo::DBusProxy::builder(self)
.cache_properties(CacheProperties::No)
.build()
.await?;
let name = dbus_proxy.hello().await?;
self.inner
.unique_name
.set(name)
.expect("Attempted to set unique_name twice");
Ok(())
}
pub(crate) async fn new(
auth: Authenticated<Box<dyn Socket>>,
bus_connection: bool,
executor: Executor<'static>,
) -> Result<Self> {
#[cfg(unix)]
let cap_unix_fd = auth.cap_unix_fd;
macro_rules! create_msg_broadcast_channel {
($size:expr) => {{
let (msg_sender, msg_receiver) = broadcast($size);
let mut msg_receiver = msg_receiver.deactivate();
msg_receiver.set_await_active(false);
(msg_sender, msg_receiver)
}};
}
let (msg_sender, msg_receiver) = create_msg_broadcast_channel!(DEFAULT_MAX_QUEUED);
let mut msg_senders = HashMap::new();
msg_senders.insert(None, msg_sender);
let (method_return_sender, method_return_receiver) =
create_msg_broadcast_channel!(DEFAULT_MAX_METHOD_RETURN_QUEUED);
let rule = MatchRule::builder()
.msg_type(MessageType::MethodReturn)
.build()
.into();
msg_senders.insert(Some(rule), method_return_sender.clone());
let rule = MatchRule::builder()
.msg_type(MessageType::Error)
.build()
.into();
msg_senders.insert(Some(rule), method_return_sender);
let msg_senders = Arc::new(Mutex::new(msg_senders));
let subscriptions = Mutex::new(HashMap::new());
let raw_conn = Arc::new(sync::Mutex::new(auth.conn));
let connection = Self {
inner: Arc::new(ConnectionInner {
raw_conn,
server_guid: auth.server_guid,
#[cfg(unix)]
cap_unix_fd,
bus_conn: bus_connection,
serial: AtomicU32::new(1),
unique_name: OnceCell::new(),
subscriptions,
object_server: OnceCell::new(),
object_server_dispatch_task: OnceCell::new(),
executor,
socket_reader_task: OnceCell::new(),
msg_senders,
msg_receiver,
method_return_receiver,
registered_names: Mutex::new(HashMap::new()),
}),
};
Ok(connection)
}
fn next_serial(&self) -> u32 {
self.inner.serial.fetch_add(1, SeqCst)
}
pub async fn session() -> Result<Self> {
ConnectionBuilder::session()?.build().await
}
pub async fn system() -> Result<Self> {
ConnectionBuilder::system()?.build().await
}
pub fn monitor_activity(&self) -> EventListener {
self.inner
.raw_conn
.lock()
.expect("poisoned lock")
.monitor_activity()
}
#[deprecated(
since = "3.13.0",
note = "Use `peer_credentials` instead, which returns `ConnectionCredentials` which includes
the peer PID."
)]
pub fn peer_pid(&self) -> io::Result<Option<u32>> {
self.inner
.raw_conn
.lock()
.expect("poisoned lock")
.socket()
.peer_pid()
}
#[allow(deprecated)]
pub async fn peer_credentials(&self) -> io::Result<ConnectionCredentials> {
let raw_conn = self.inner.raw_conn.lock().expect("poisoned lock");
let socket = raw_conn.socket();
Ok(ConnectionCredentials {
process_id: socket.peer_pid()?,
#[cfg(unix)]
unix_user_id: socket.uid()?,
#[cfg(not(unix))]
unix_user_id: None,
unix_group_ids: None,
#[cfg(windows)]
windows_sid: socket.peer_sid(),
#[cfg(not(windows))]
windows_sid: None,
linux_security_label: None,
})
}
pub(crate) fn init_socket_reader(&self) {
let inner = &self.inner;
inner
.socket_reader_task
.set(
SocketReader::new(inner.raw_conn.clone(), inner.msg_senders.clone())
.spawn(&inner.executor),
)
.expect("Attempted to set `socket_reader_task` twice");
}
}
impl<T> Sink<T> for Connection
where
T: Into<Arc<Message>>,
{
type Error = Error;
fn poll_ready(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Result<()>> {
<&Connection as Sink<Arc<Message>>>::poll_ready(Pin::new(&mut &*self), cx)
}
fn start_send(self: Pin<&mut Self>, msg: T) -> Result<()> {
Pin::new(&mut &*self).start_send(msg)
}
fn poll_flush(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Result<()>> {
<&Connection as Sink<Arc<Message>>>::poll_flush(Pin::new(&mut &*self), cx)
}
fn poll_close(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Result<()>> {
<&Connection as Sink<Arc<Message>>>::poll_close(Pin::new(&mut &*self), cx)
}
}
impl<'a, T> Sink<T> for &'a Connection
where
T: Into<Arc<Message>>,
{
type Error = Error;
fn poll_ready(self: Pin<&mut Self>, _cx: &mut Context<'_>) -> Poll<Result<()>> {
Poll::Ready(Ok(()))
}
fn start_send(self: Pin<&mut Self>, msg: T) -> Result<()> {
let msg = msg.into();
#[cfg(unix)]
if !msg.fds().is_empty() && !self.inner.cap_unix_fd {
return Err(Error::Unsupported);
}
self.inner
.raw_conn
.lock()
.expect("poisoned lock")
.enqueue_message(msg);
Ok(())
}
fn poll_flush(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Result<()>> {
self.inner.raw_conn.lock().expect("poisoned lock").flush(cx)
}
fn poll_close(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Result<()>> {
let mut raw_conn = self.inner.raw_conn.lock().expect("poisoned lock");
let res = raw_conn.flush(cx);
match ready!(res) {
Ok(_) => (),
Err(e) => return Poll::Ready(Err(e)),
}
Poll::Ready(raw_conn.close())
}
}
impl From<crate::blocking::Connection> for Connection {
fn from(conn: crate::blocking::Connection) -> Self {
conn.into_inner()
}
}
#[derive(Debug)]
pub(crate) struct WeakConnection {
inner: Weak<ConnectionInner>,
}
impl WeakConnection {
pub fn upgrade(&self) -> Option<Connection> {
self.inner.upgrade().map(|inner| Connection { inner })
}
}
impl From<&Connection> for WeakConnection {
fn from(conn: &Connection) -> Self {
Self {
inner: Arc::downgrade(&conn.inner),
}
}
}
#[derive(Debug)]
enum NameStatus {
Owner(Option<Task<()>>),
Queued(Task<()>),
}
#[cfg(test)]
mod tests {
use futures_util::stream::TryStreamExt;
use ntest::timeout;
use test_log::test;
use crate::{fdo::DBusProxy, AuthMechanism};
use super::*;
async fn test_p2p(
server1: Connection,
client1: Connection,
server2: Connection,
client2: Connection,
) -> Result<()> {
let forward1 = MessageStream::from(server1.clone()).forward(client2.clone());
let forward2 = MessageStream::from(&client2).forward(server1);
let _forward_task = client1.executor().spawn(
async move { futures_util::try_join!(forward1, forward2) },
"forward_task",
);
let server_ready = Event::new();
let server_ready_listener = server_ready.listen();
let client_done = Event::new();
let client_done_listener = client_done.listen();
let server_future = async move {
let mut stream = MessageStream::from(&server2);
server_ready.notify(1);
let method = loop {
let m = stream.try_next().await?.unwrap();
if m.to_string() == "Method call Test" {
break m;
}
};
server2
.emit_signal(None::<()>, "/", "org.zbus.p2p", "ASignalForYou", &())
.await?;
server2.reply(&method, &("yay")).await?;
client_done_listener.await;
Ok(())
};
let client_future = async move {
let mut stream = MessageStream::from(&client1);
server_ready_listener.await;
let reply = client1
.call_method(None::<()>, "/", Some("org.zbus.p2p"), "Test", &())
.await?;
assert_eq!(reply.to_string(), "Method return");
let m = stream.try_next().await?.unwrap();
client_done.notify(1);
assert_eq!(m.to_string(), "Signal ASignalForYou");
reply.body::<String>()
};
let (val, _) = futures_util::try_join!(client_future, server_future,)?;
assert_eq!(val, "yay");
Ok(())
}
#[test]
#[timeout(15000)]
fn tcp_p2p() {
crate::utils::block_on(test_tcp_p2p()).unwrap();
}
async fn test_tcp_p2p() -> Result<()> {
let (server1, client1) = tcp_p2p_pipe().await?;
let (server2, client2) = tcp_p2p_pipe().await?;
test_p2p(server1, client1, server2, client2).await
}
async fn tcp_p2p_pipe() -> Result<(Connection, Connection)> {
let guid = Guid::generate();
#[cfg(not(feature = "tokio"))]
let (server_conn_builder, client_conn_builder) = {
let listener = std::net::TcpListener::bind("127.0.0.1:0").unwrap();
let addr = listener.local_addr().unwrap();
let p1 = std::net::TcpStream::connect(addr).unwrap();
let p0 = listener.incoming().next().unwrap().unwrap();
(
ConnectionBuilder::tcp_stream(p0)
.server(&guid)
.p2p()
.auth_mechanisms(&[AuthMechanism::Anonymous]),
ConnectionBuilder::tcp_stream(p1).p2p(),
)
};
#[cfg(feature = "tokio")]
let (server_conn_builder, client_conn_builder) = {
let listener = tokio::net::TcpListener::bind("127.0.0.1:0").await.unwrap();
let addr = listener.local_addr().unwrap();
let p1 = tokio::net::TcpStream::connect(addr).await.unwrap();
let p0 = listener.accept().await.unwrap().0;
(
ConnectionBuilder::tcp_stream(p0)
.server(&guid)
.p2p()
.auth_mechanisms(&[AuthMechanism::Anonymous]),
ConnectionBuilder::tcp_stream(p1).p2p(),
)
};
futures_util::try_join!(server_conn_builder.build(), client_conn_builder.build())
}
#[cfg(unix)]
#[test]
#[timeout(15000)]
fn unix_p2p() {
crate::utils::block_on(test_unix_p2p()).unwrap();
}
#[cfg(unix)]
async fn test_unix_p2p() -> Result<()> {
let (server1, client1) = unix_p2p_pipe().await?;
let (server2, client2) = unix_p2p_pipe().await?;
test_p2p(server1, client1, server2, client2).await
}
#[cfg(unix)]
async fn unix_p2p_pipe() -> Result<(Connection, Connection)> {
#[cfg(not(feature = "tokio"))]
use std::os::unix::net::UnixStream;
#[cfg(feature = "tokio")]
use tokio::net::UnixStream;
#[cfg(all(windows, not(feature = "tokio")))]
use uds_windows::UnixStream;
let guid = Guid::generate();
let (p0, p1) = UnixStream::pair().unwrap();
futures_util::try_join!(
ConnectionBuilder::unix_stream(p1).p2p().build(),
ConnectionBuilder::unix_stream(p0)
.server(&guid)
.p2p()
.build(),
)
}
#[cfg(any(
all(feature = "vsock", not(feature = "tokio")),
feature = "tokio-vsock"
))]
#[test]
#[timeout(15000)]
#[ignore]
fn vsock_p2p() {
crate::utils::block_on(test_vsock_p2p()).unwrap();
}
#[cfg(any(
all(feature = "vsock", not(feature = "tokio")),
feature = "tokio-vsock"
))]
async fn test_vsock_p2p() -> Result<()> {
let (server1, client1) = vsock_p2p_pipe().await?;
let (server2, client2) = vsock_p2p_pipe().await?;
test_p2p(server1, client1, server2, client2).await
}
#[cfg(all(feature = "vsock", not(feature = "tokio")))]
async fn vsock_p2p_pipe() -> Result<(Connection, Connection)> {
let guid = Guid::generate();
let listener = vsock::VsockListener::bind_with_cid_port(vsock::VMADDR_CID_ANY, 42).unwrap();
let addr = listener.local_addr().unwrap();
let client = vsock::VsockStream::connect(&addr).unwrap();
let server = listener.incoming().next().unwrap().unwrap();
futures_util::try_join!(
ConnectionBuilder::vsock_stream(server)
.server(&guid)
.p2p()
.auth_mechanisms(&[AuthMechanism::Anonymous])
.build(),
ConnectionBuilder::vsock_stream(client).p2p().build(),
)
}
#[cfg(feature = "tokio-vsock")]
async fn vsock_p2p_pipe() -> Result<(Connection, Connection)> {
let guid = Guid::generate();
let listener = tokio_vsock::VsockListener::bind(2, 42).unwrap();
let client = tokio_vsock::VsockStream::connect(3, 42).await.unwrap();
let server = listener.incoming().next().await.unwrap().unwrap();
futures_util::try_join!(
ConnectionBuilder::vsock_stream(server)
.server(&guid)
.p2p()
.auth_mechanisms(&[AuthMechanism::Anonymous])
.build(),
ConnectionBuilder::vsock_stream(client).p2p().build(),
)
}
#[test]
#[timeout(15000)]
fn serial_monotonically_increases() {
crate::utils::block_on(test_serial_monotonically_increases());
}
async fn test_serial_monotonically_increases() {
let c = Connection::session().await.unwrap();
let serial = c.next_serial() + 1;
for next in serial..serial + 10 {
assert_eq!(next, c.next_serial());
}
}
#[cfg(all(windows, feature = "windows-gdbus"))]
#[test]
fn connect_gdbus_session_bus() {
let addr = crate::win32::windows_autolaunch_bus_address()
.expect("Unable to get GDBus session bus address");
crate::block_on(async { addr.connect().await }).expect("Unable to connect to session bus");
}
#[cfg(target_os = "macos")]
#[test]
fn connect_launchd_session_bus() {
crate::block_on(async {
let addr = crate::address::macos_launchd_bus_address("DBUS_LAUNCHD_SESSION_BUS_SOCKET")
.await
.expect("Unable to get Launchd session bus address");
addr.connect().await
})
.expect("Unable to connect to session bus");
}
#[test]
#[timeout(15000)]
fn disconnect_on_drop() {
crate::utils::block_on(test_disconnect_on_drop());
}
async fn test_disconnect_on_drop() {
#[derive(Default)]
struct MyInterface {}
#[crate::dbus_interface(name = "dev.peelz.FooBar.Baz")]
impl MyInterface {
fn do_thing(&self) {}
}
let name = "dev.peelz.foobar";
let connection = ConnectionBuilder::session()
.unwrap()
.name(name)
.unwrap()
.serve_at("/dev/peelz/FooBar", MyInterface::default())
.unwrap()
.build()
.await
.unwrap();
let connection2 = Connection::session().await.unwrap();
let dbus = DBusProxy::new(&connection2).await.unwrap();
let mut stream = dbus
.receive_name_owner_changed_with_args(&[(0, name), (2, "")])
.await
.unwrap();
drop(connection);
stream.next().await.unwrap();
let name_has_owner = dbus.name_has_owner(name.try_into().unwrap()).await.unwrap();
assert!(!name_has_owner);
}
#[cfg(any(unix, not(feature = "tokio")))]
#[test]
#[timeout(15000)]
fn unix_p2p_cookie_auth() {
use crate::utils::block_on;
use std::{
fs::{create_dir_all, remove_file, write},
time::{SystemTime as Time, UNIX_EPOCH},
};
#[cfg(unix)]
use std::{
fs::{set_permissions, Permissions},
os::unix::fs::PermissionsExt,
};
use xdg_home::home_dir;
let cookie_context = "zbus-test-cookie-context";
let cookie_id = 123456789;
let cookie = hex::encode(b"our cookie");
let cookie_dir = home_dir().unwrap().join(".dbus-keyrings");
create_dir_all(&cookie_dir).unwrap();
#[cfg(unix)]
set_permissions(&cookie_dir, Permissions::from_mode(0o700)).unwrap();
let cookie_file = cookie_dir.join(cookie_context);
let ts = Time::now().duration_since(UNIX_EPOCH).unwrap().as_secs();
let cookie_entry = format!("{cookie_id} {ts} {cookie}");
write(&cookie_file, cookie_entry).unwrap();
let res1 = block_on(test_unix_p2p_cookie_auth(cookie_context, Some(cookie_id)));
let res2 = block_on(test_unix_p2p_cookie_auth(cookie_context, None));
remove_file(&cookie_file).unwrap();
res1.unwrap();
res2.unwrap();
}
#[cfg(any(unix, not(feature = "tokio")))]
async fn test_unix_p2p_cookie_auth(
cookie_context: &'static str,
cookie_id: Option<usize>,
) -> Result<()> {
#[cfg(all(unix, not(feature = "tokio")))]
use std::os::unix::net::UnixStream;
#[cfg(all(unix, feature = "tokio"))]
use tokio::net::UnixStream;
#[cfg(all(windows, not(feature = "tokio")))]
use uds_windows::UnixStream;
let guid = Guid::generate();
let (p0, p1) = UnixStream::pair().unwrap();
let mut server_builder = ConnectionBuilder::unix_stream(p0)
.server(&guid)
.p2p()
.auth_mechanisms(&[AuthMechanism::Cookie])
.cookie_context(cookie_context)
.unwrap();
if let Some(cookie_id) = cookie_id {
server_builder = server_builder.cookie_id(cookie_id);
}
futures_util::try_join!(
ConnectionBuilder::unix_stream(p1).p2p().build(),
server_builder.build(),
)
.map(|_| ())
}
}