1 | //! Connection API. |
2 | use async_broadcast::{broadcast, InactiveReceiver, Receiver, Sender as Broadcaster}; |
3 | use enumflags2::BitFlags; |
4 | use event_listener::{Event, EventListener}; |
5 | use ordered_stream::{OrderedFuture, OrderedStream, PollResult}; |
6 | use static_assertions::assert_impl_all; |
7 | use std::{ |
8 | collections::HashMap, |
9 | io::{self, ErrorKind}, |
10 | num::NonZeroU32, |
11 | ops::Deref, |
12 | pin::Pin, |
13 | sync::{Arc, OnceLock, Weak}, |
14 | task::{Context, Poll}, |
15 | }; |
16 | use tracing::{debug, info_span, instrument, trace, trace_span, warn, Instrument}; |
17 | use zbus_names::{BusName, ErrorName, InterfaceName, MemberName, OwnedUniqueName, WellKnownName}; |
18 | use zvariant::ObjectPath; |
19 | |
20 | use futures_core::Future; |
21 | use futures_util::StreamExt; |
22 | |
23 | use crate::{ |
24 | async_lock::{Mutex, Semaphore, SemaphorePermit}, |
25 | blocking, |
26 | fdo::{self, ConnectionCredentials, RequestNameFlags, RequestNameReply}, |
27 | is_flatpak, |
28 | message::{Flags, Message, Type}, |
29 | proxy::CacheProperties, |
30 | DBusError, Error, Executor, MatchRule, MessageStream, ObjectServer, OwnedGuid, OwnedMatchRule, |
31 | Result, Task, |
32 | }; |
33 | |
34 | mod builder; |
35 | pub use builder::Builder; |
36 | |
37 | pub mod socket; |
38 | pub use socket::Socket; |
39 | |
40 | mod socket_reader; |
41 | use socket_reader::SocketReader; |
42 | |
43 | pub(crate) mod handshake; |
44 | use handshake::Authenticated; |
45 | |
46 | const DEFAULT_MAX_QUEUED: usize = 64; |
47 | const DEFAULT_MAX_METHOD_RETURN_QUEUED: usize = 8; |
48 | |
49 | /// Inner state shared by Connection and WeakConnection |
50 | #[derive (Debug)] |
51 | pub(crate) struct ConnectionInner { |
52 | server_guid: OwnedGuid, |
53 | #[cfg (unix)] |
54 | cap_unix_fd: bool, |
55 | #[cfg (feature = "p2p" )] |
56 | bus_conn: bool, |
57 | unique_name: OnceLock<OwnedUniqueName>, |
58 | registered_names: Mutex<HashMap<WellKnownName<'static>, NameStatus>>, |
59 | |
60 | activity_event: Arc<Event>, |
61 | socket_write: Mutex<Box<dyn socket::WriteHalf>>, |
62 | |
63 | // Our executor |
64 | executor: Executor<'static>, |
65 | |
66 | // Socket reader task |
67 | #[allow (unused)] |
68 | socket_reader_task: OnceLock<Task<()>>, |
69 | |
70 | pub(crate) msg_receiver: InactiveReceiver<Result<Message>>, |
71 | pub(crate) method_return_receiver: InactiveReceiver<Result<Message>>, |
72 | msg_senders: Arc<Mutex<HashMap<Option<OwnedMatchRule>, MsgBroadcaster>>>, |
73 | |
74 | subscriptions: Mutex<Subscriptions>, |
75 | |
76 | object_server: OnceLock<blocking::ObjectServer>, |
77 | object_server_dispatch_task: OnceLock<Task<()>>, |
78 | } |
79 | |
80 | type Subscriptions = HashMap<OwnedMatchRule, (u64, InactiveReceiver<Result<Message>>)>; |
81 | |
82 | pub(crate) type MsgBroadcaster = Broadcaster<Result<Message>>; |
83 | |
84 | /// A D-Bus connection. |
85 | /// |
86 | /// A connection to a D-Bus bus, or a direct peer. |
87 | /// |
88 | /// Once created, the connection is authenticated and negotiated and messages can be sent or |
89 | /// received, such as [method calls] or [signals]. |
90 | /// |
91 | /// For higher-level message handling (typed functions, introspection, documentation reasons etc), |
92 | /// it is recommended to wrap the low-level D-Bus messages into Rust functions with the |
93 | /// [`proxy`] and [`interface`] macros instead of doing it directly on a `Connection`. |
94 | /// |
95 | /// Typically, a connection is made to the session bus with [`Connection::session`], or to the |
96 | /// system bus with [`Connection::system`]. Then the connection is used with [`crate::Proxy`] |
97 | /// instances or the on-demand [`ObjectServer`] instance that can be accessed through |
98 | /// [`Connection::object_server`]. |
99 | /// |
100 | /// `Connection` implements [`Clone`] and cloning it is a very cheap operation, as the underlying |
101 | /// data is not cloned. This makes it very convenient to share the connection between different |
102 | /// parts of your code. `Connection` also implements [`std::marker::Sync`] and [`std::marker::Send`] |
103 | /// so you can send and share a connection instance across threads as well. |
104 | /// |
105 | /// `Connection` keeps internal queues of incoming message. The default capacity of each of these is |
106 | /// 64. The capacity of the main (unfiltered) queue is configurable through the [`set_max_queued`] |
107 | /// method. When the queue is full, no more messages can be received until room is created for more. |
108 | /// This is why it's important to ensure that all [`crate::MessageStream`] and |
109 | /// [`crate::blocking::MessageIterator`] instances are continuously polled and iterated on, |
110 | /// respectively. |
111 | /// |
112 | /// For sending messages you can either use [`Connection::send`] method. |
113 | /// |
114 | /// [method calls]: struct.Connection.html#method.call_method |
115 | /// [signals]: struct.Connection.html#method.emit_signal |
116 | /// [`proxy`]: attr.proxy.html |
117 | /// [`interface`]: attr.interface.html |
118 | /// [`Clone`]: https://doc.rust-lang.org/std/clone/trait.Clone.html |
119 | /// [`set_max_queued`]: struct.Connection.html#method.set_max_queued |
120 | /// |
121 | /// ### Examples |
122 | /// |
123 | /// #### Get the session bus ID |
124 | /// |
125 | /// ``` |
126 | /// # zbus::block_on(async { |
127 | /// use zbus::Connection; |
128 | /// |
129 | /// let connection = Connection::session().await?; |
130 | /// |
131 | /// let reply_body = connection |
132 | /// .call_method( |
133 | /// Some("org.freedesktop.DBus" ), |
134 | /// "/org/freedesktop/DBus" , |
135 | /// Some("org.freedesktop.DBus" ), |
136 | /// "GetId" , |
137 | /// &(), |
138 | /// ) |
139 | /// .await? |
140 | /// .body(); |
141 | /// |
142 | /// let id: &str = reply_body.deserialize()?; |
143 | /// println!("Unique ID of the bus: {}" , id); |
144 | /// # Ok::<(), zbus::Error>(()) |
145 | /// # }).unwrap(); |
146 | /// ``` |
147 | /// |
148 | /// #### Monitoring all messages |
149 | /// |
150 | /// Let's eavesdrop on the session bus 😈 using the [Monitor] interface: |
151 | /// |
152 | /// ```rust,no_run |
153 | /// # zbus::block_on(async { |
154 | /// use futures_util::stream::TryStreamExt; |
155 | /// use zbus::{Connection, MessageStream}; |
156 | /// |
157 | /// let connection = Connection::session().await?; |
158 | /// |
159 | /// connection |
160 | /// .call_method( |
161 | /// Some("org.freedesktop.DBus" ), |
162 | /// "/org/freedesktop/DBus" , |
163 | /// Some("org.freedesktop.DBus.Monitoring" ), |
164 | /// "BecomeMonitor" , |
165 | /// &(&[] as &[&str], 0u32), |
166 | /// ) |
167 | /// .await?; |
168 | /// |
169 | /// let mut stream = MessageStream::from(connection); |
170 | /// while let Some(msg) = stream.try_next().await? { |
171 | /// println!("Got message: {}" , msg); |
172 | /// } |
173 | /// |
174 | /// # Ok::<(), zbus::Error>(()) |
175 | /// # }).unwrap(); |
176 | /// ``` |
177 | /// |
178 | /// This should print something like: |
179 | /// |
180 | /// ```console |
181 | /// Got message: Signal NameAcquired from org.freedesktop.DBus |
182 | /// Got message: Signal NameLost from org.freedesktop.DBus |
183 | /// Got message: Method call GetConnectionUnixProcessID from :1.1324 |
184 | /// Got message: Error org.freedesktop.DBus.Error.NameHasNoOwner: |
185 | /// Could not get PID of name ':1.1332': no such name from org.freedesktop.DBus |
186 | /// Got message: Method call AddMatch from :1.918 |
187 | /// Got message: Method return from org.freedesktop.DBus |
188 | /// ``` |
189 | /// |
190 | /// [Monitor]: https://dbus.freedesktop.org/doc/dbus-specification.html#bus-messages-become-monitor |
191 | #[derive (Clone, Debug)] |
192 | #[must_use = "Dropping a `Connection` will close the underlying socket." ] |
193 | pub struct Connection { |
194 | pub(crate) inner: Arc<ConnectionInner>, |
195 | } |
196 | |
197 | assert_impl_all!(Connection: Send, Sync, Unpin); |
198 | |
199 | /// A method call whose completion can be awaited or joined with other streams. |
200 | /// |
201 | /// This is useful for cache population method calls, where joining the [`JoinableStream`] with |
202 | /// an update signal stream can be used to ensure that cache updates are not overwritten by a cache |
203 | /// population whose task is scheduled later. |
204 | #[derive (Debug)] |
205 | pub(crate) struct PendingMethodCall { |
206 | stream: Option<MessageStream>, |
207 | serial: NonZeroU32, |
208 | } |
209 | |
210 | impl Future for PendingMethodCall { |
211 | type Output = Result<Message>; |
212 | |
213 | fn poll(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> { |
214 | self.poll_before(cx, before:None).map(|ret: Option<(Sequence, Result<…, …>)>| { |
215 | ret.map(|(_, r: Result)| r).unwrap_or_else(|| { |
216 | Err(crate::Error::InputOutput( |
217 | io::Error::new(kind:ErrorKind::BrokenPipe, error:"socket closed" ).into(), |
218 | )) |
219 | }) |
220 | }) |
221 | } |
222 | } |
223 | |
224 | impl OrderedFuture for PendingMethodCall { |
225 | type Output = Result<Message>; |
226 | type Ordering = zbus::message::Sequence; |
227 | |
228 | fn poll_before( |
229 | self: Pin<&mut Self>, |
230 | cx: &mut Context<'_>, |
231 | before: Option<&Self::Ordering>, |
232 | ) -> Poll<Option<(Self::Ordering, Self::Output)>> { |
233 | let this = self.get_mut(); |
234 | if let Some(stream) = &mut this.stream { |
235 | loop { |
236 | match Pin::new(&mut *stream).poll_next_before(cx, before) { |
237 | Poll::Ready(PollResult::Item { |
238 | data: Ok(msg), |
239 | ordering, |
240 | }) => { |
241 | if msg.header().reply_serial() != Some(this.serial) { |
242 | continue; |
243 | } |
244 | let res = match msg.message_type() { |
245 | Type::Error => Err(msg.into()), |
246 | Type::MethodReturn => Ok(msg), |
247 | _ => continue, |
248 | }; |
249 | this.stream = None; |
250 | return Poll::Ready(Some((ordering, res))); |
251 | } |
252 | Poll::Ready(PollResult::Item { |
253 | data: Err(e), |
254 | ordering, |
255 | }) => { |
256 | return Poll::Ready(Some((ordering, Err(e)))); |
257 | } |
258 | |
259 | Poll::Ready(PollResult::NoneBefore) => { |
260 | return Poll::Ready(None); |
261 | } |
262 | Poll::Ready(PollResult::Terminated) => { |
263 | return Poll::Ready(None); |
264 | } |
265 | Poll::Pending => return Poll::Pending, |
266 | } |
267 | } |
268 | } |
269 | Poll::Ready(None) |
270 | } |
271 | } |
272 | |
273 | impl Connection { |
274 | /// Send `msg` to the peer. |
275 | pub async fn send(&self, msg: &Message) -> Result<()> { |
276 | #[cfg (unix)] |
277 | if !msg.data().fds().is_empty() && !self.inner.cap_unix_fd { |
278 | return Err(Error::Unsupported); |
279 | } |
280 | |
281 | self.inner.activity_event.notify(usize::MAX); |
282 | let mut write = self.inner.socket_write.lock().await; |
283 | |
284 | write.send_message(msg).await |
285 | } |
286 | |
287 | /// Send a method call. |
288 | /// |
289 | /// Create a method-call message, send it over the connection, then wait for the reply. |
290 | /// |
291 | /// On successful reply, an `Ok(Message)` is returned. On error, an `Err` is returned. D-Bus |
292 | /// error replies are returned as [`Error::MethodError`]. |
293 | pub async fn call_method<'d, 'p, 'i, 'm, D, P, I, M, B>( |
294 | &self, |
295 | destination: Option<D>, |
296 | path: P, |
297 | interface: Option<I>, |
298 | method_name: M, |
299 | body: &B, |
300 | ) -> Result<Message> |
301 | where |
302 | D: TryInto<BusName<'d>>, |
303 | P: TryInto<ObjectPath<'p>>, |
304 | I: TryInto<InterfaceName<'i>>, |
305 | M: TryInto<MemberName<'m>>, |
306 | D::Error: Into<Error>, |
307 | P::Error: Into<Error>, |
308 | I::Error: Into<Error>, |
309 | M::Error: Into<Error>, |
310 | B: serde::ser::Serialize + zvariant::DynamicType, |
311 | { |
312 | self.call_method_raw( |
313 | destination, |
314 | path, |
315 | interface, |
316 | method_name, |
317 | BitFlags::empty(), |
318 | body, |
319 | ) |
320 | .await? |
321 | .expect("no reply" ) |
322 | .await |
323 | } |
324 | |
325 | /// Send a method call. |
326 | /// |
327 | /// Send the given message, which must be a method call, over the connection and return an |
328 | /// object that allows the reply to be retrieved. Typically you'd want to use |
329 | /// [`Connection::call_method`] instead. |
330 | /// |
331 | /// If the `flags` do not contain `MethodFlags::NoReplyExpected`, the return value is |
332 | /// guaranteed to be `Ok(Some(_))`, if there was no error encountered. |
333 | /// |
334 | /// INTERNAL NOTE: If this method is ever made pub, flags should become `BitFlags<MethodFlags>`. |
335 | pub(crate) async fn call_method_raw<'d, 'p, 'i, 'm, D, P, I, M, B>( |
336 | &self, |
337 | destination: Option<D>, |
338 | path: P, |
339 | interface: Option<I>, |
340 | method_name: M, |
341 | flags: BitFlags<Flags>, |
342 | body: &B, |
343 | ) -> Result<Option<PendingMethodCall>> |
344 | where |
345 | D: TryInto<BusName<'d>>, |
346 | P: TryInto<ObjectPath<'p>>, |
347 | I: TryInto<InterfaceName<'i>>, |
348 | M: TryInto<MemberName<'m>>, |
349 | D::Error: Into<Error>, |
350 | P::Error: Into<Error>, |
351 | I::Error: Into<Error>, |
352 | M::Error: Into<Error>, |
353 | B: serde::ser::Serialize + zvariant::DynamicType, |
354 | { |
355 | let _permit = acquire_serial_num_semaphore().await; |
356 | |
357 | let mut builder = Message::method(path, method_name)?; |
358 | if let Some(sender) = self.unique_name() { |
359 | builder = builder.sender(sender)? |
360 | } |
361 | if let Some(destination) = destination { |
362 | builder = builder.destination(destination)? |
363 | } |
364 | if let Some(interface) = interface { |
365 | builder = builder.interface(interface)? |
366 | } |
367 | for flag in flags { |
368 | builder = builder.with_flags(flag)?; |
369 | } |
370 | let msg = builder.build(body)?; |
371 | |
372 | let msg_receiver = self.inner.method_return_receiver.activate_cloned(); |
373 | let stream = Some(MessageStream::for_subscription_channel( |
374 | msg_receiver, |
375 | // This is a lie but we only use the stream internally so it's fine. |
376 | None, |
377 | self, |
378 | )); |
379 | let serial = msg.primary_header().serial_num(); |
380 | self.send(&msg).await?; |
381 | if flags.contains(Flags::NoReplyExpected) { |
382 | Ok(None) |
383 | } else { |
384 | Ok(Some(PendingMethodCall { stream, serial })) |
385 | } |
386 | } |
387 | |
388 | /// Emit a signal. |
389 | /// |
390 | /// Create a signal message, and send it over the connection. |
391 | pub async fn emit_signal<'d, 'p, 'i, 'm, D, P, I, M, B>( |
392 | &self, |
393 | destination: Option<D>, |
394 | path: P, |
395 | interface: I, |
396 | signal_name: M, |
397 | body: &B, |
398 | ) -> Result<()> |
399 | where |
400 | D: TryInto<BusName<'d>>, |
401 | P: TryInto<ObjectPath<'p>>, |
402 | I: TryInto<InterfaceName<'i>>, |
403 | M: TryInto<MemberName<'m>>, |
404 | D::Error: Into<Error>, |
405 | P::Error: Into<Error>, |
406 | I::Error: Into<Error>, |
407 | M::Error: Into<Error>, |
408 | B: serde::ser::Serialize + zvariant::DynamicType, |
409 | { |
410 | let _permit = acquire_serial_num_semaphore().await; |
411 | |
412 | let mut b = Message::signal(path, interface, signal_name)?; |
413 | if let Some(sender) = self.unique_name() { |
414 | b = b.sender(sender)?; |
415 | } |
416 | if let Some(destination) = destination { |
417 | b = b.destination(destination)?; |
418 | } |
419 | let m = b.build(body)?; |
420 | |
421 | self.send(&m).await |
422 | } |
423 | |
424 | /// Reply to a message. |
425 | /// |
426 | /// Given an existing message (likely a method call), send a reply back to the caller with the |
427 | /// given `body`. |
428 | pub async fn reply<B>(&self, call: &Message, body: &B) -> Result<()> |
429 | where |
430 | B: serde::ser::Serialize + zvariant::DynamicType, |
431 | { |
432 | let _permit = acquire_serial_num_semaphore().await; |
433 | |
434 | let mut b = Message::method_reply(call)?; |
435 | if let Some(sender) = self.unique_name() { |
436 | b = b.sender(sender)?; |
437 | } |
438 | let m = b.build(body)?; |
439 | self.send(&m).await |
440 | } |
441 | |
442 | /// Reply an error to a message. |
443 | /// |
444 | /// Given an existing message (likely a method call), send an error reply back to the caller |
445 | /// with the given `error_name` and `body`. |
446 | pub async fn reply_error<'e, E, B>(&self, call: &Message, error_name: E, body: &B) -> Result<()> |
447 | where |
448 | B: serde::ser::Serialize + zvariant::DynamicType, |
449 | E: TryInto<ErrorName<'e>>, |
450 | E::Error: Into<Error>, |
451 | { |
452 | let _permit = acquire_serial_num_semaphore().await; |
453 | |
454 | let mut b = Message::method_error(call, error_name)?; |
455 | if let Some(sender) = self.unique_name() { |
456 | b = b.sender(sender)?; |
457 | } |
458 | let m = b.build(body)?; |
459 | self.send(&m).await |
460 | } |
461 | |
462 | /// Reply an error to a message. |
463 | /// |
464 | /// Given an existing message (likely a method call), send an error reply back to the caller |
465 | /// using one of the standard interface reply types. |
466 | pub async fn reply_dbus_error( |
467 | &self, |
468 | call: &zbus::message::Header<'_>, |
469 | err: impl DBusError, |
470 | ) -> Result<()> { |
471 | let _permit = acquire_serial_num_semaphore().await; |
472 | |
473 | let m = err.create_reply(call)?; |
474 | self.send(&m).await |
475 | } |
476 | |
477 | /// Register a well-known name for this connection. |
478 | /// |
479 | /// When connecting to a bus, the name is requested from the bus. In case of p2p connection, the |
480 | /// name (if requested) is used of self-identification. |
481 | /// |
482 | /// You can request multiple names for the same connection. Use [`Connection::release_name`] for |
483 | /// deregistering names registered through this method. |
484 | /// |
485 | /// Note that exclusive ownership without queueing is requested (using |
486 | /// [`RequestNameFlags::ReplaceExisting`] and [`RequestNameFlags::DoNotQueue`] flags) since that |
487 | /// is the most typical case. If that is not what you want, you should use |
488 | /// [`Connection::request_name_with_flags`] instead (but make sure then that name is requested |
489 | /// **after** you've setup your service implementation with the `ObjectServer`). |
490 | /// |
491 | /// # Caveats |
492 | /// |
493 | /// The associated `ObjectServer` will only handle method calls destined for the unique name of |
494 | /// this connection or any of the registered well-known names. If no well-known name is |
495 | /// registered, the method calls destined to all well-known names will be handled. |
496 | /// |
497 | /// Since names registered through any other means than `Connection` or [`Builder`] |
498 | /// API are not known to the connection, method calls destined to those names will only be |
499 | /// handled by the associated `ObjectServer` if none of the names are registered through |
500 | /// `Connection*` API. Simply put, either register all the names through `Connection*` API or |
501 | /// none of them. |
502 | /// |
503 | /// # Errors |
504 | /// |
505 | /// Fails with `zbus::Error::NameTaken` if the name is already owned by another peer. |
506 | pub async fn request_name<'w, W>(&self, well_known_name: W) -> Result<()> |
507 | where |
508 | W: TryInto<WellKnownName<'w>>, |
509 | W::Error: Into<Error>, |
510 | { |
511 | self.request_name_with_flags( |
512 | well_known_name, |
513 | RequestNameFlags::ReplaceExisting | RequestNameFlags::DoNotQueue, |
514 | ) |
515 | .await |
516 | .map(|_| ()) |
517 | } |
518 | |
519 | /// Register a well-known name for this connection. |
520 | /// |
521 | /// This is the same as [`Connection::request_name`] but allows to specify the flags to use when |
522 | /// requesting the name. |
523 | /// |
524 | /// If the [`RequestNameFlags::DoNotQueue`] flag is not specified and request ends up in the |
525 | /// queue, you can use [`fdo::NameAcquiredStream`] to be notified when the name is acquired. A |
526 | /// queued name request can be cancelled using [`Connection::release_name`]. |
527 | /// |
528 | /// If the [`RequestNameFlags::AllowReplacement`] flag is specified, the requested name can be |
529 | /// lost if another peer requests the same name. You can use [`fdo::NameLostStream`] to be |
530 | /// notified when the name is lost |
531 | /// |
532 | /// # Example |
533 | /// |
534 | /// ``` |
535 | /// # |
536 | /// # zbus::block_on(async { |
537 | /// use zbus::{Connection, fdo::{DBusProxy, RequestNameFlags, RequestNameReply}}; |
538 | /// use enumflags2::BitFlags; |
539 | /// use futures_util::stream::StreamExt; |
540 | /// |
541 | /// let name = "org.freedesktop.zbus.QueuedNameTest" ; |
542 | /// let conn1 = Connection::session().await?; |
543 | /// // This should just work right away. |
544 | /// conn1.request_name(name).await?; |
545 | /// |
546 | /// let conn2 = Connection::session().await?; |
547 | /// // A second request from the another connection will fail with `DoNotQueue` flag, which is |
548 | /// // implicit with `request_name` method. |
549 | /// assert!(conn2.request_name(name).await.is_err()); |
550 | /// |
551 | /// // Now let's try w/o `DoNotQueue` and we should be queued. |
552 | /// let reply = conn2 |
553 | /// .request_name_with_flags(name, RequestNameFlags::AllowReplacement.into()) |
554 | /// .await?; |
555 | /// assert_eq!(reply, RequestNameReply::InQueue); |
556 | /// // Another request should just give us the same response. |
557 | /// let reply = conn2 |
558 | /// // The flags on subsequent requests will however be ignored. |
559 | /// .request_name_with_flags(name, BitFlags::empty()) |
560 | /// .await?; |
561 | /// assert_eq!(reply, RequestNameReply::InQueue); |
562 | /// let mut acquired_stream = DBusProxy::new(&conn2) |
563 | /// .await? |
564 | /// .receive_name_acquired() |
565 | /// .await?; |
566 | /// assert!(conn1.release_name(name).await?); |
567 | /// // This would have waited forever if `conn1` hadn't just release the name. |
568 | /// let acquired = acquired_stream.next().await.unwrap(); |
569 | /// assert_eq!(acquired.args().unwrap().name, name); |
570 | /// |
571 | /// // conn2 made the mistake of being too nice and allowed name replacemnt, so conn1 should be |
572 | /// // able to take it back. |
573 | /// let mut lost_stream = DBusProxy::new(&conn2) |
574 | /// .await? |
575 | /// .receive_name_lost() |
576 | /// .await?; |
577 | /// conn1.request_name(name).await?; |
578 | /// let lost = lost_stream.next().await.unwrap(); |
579 | /// assert_eq!(lost.args().unwrap().name, name); |
580 | /// |
581 | /// # Ok::<(), zbus::Error>(()) |
582 | /// # }).unwrap(); |
583 | /// ``` |
584 | /// |
585 | /// # Caveats |
586 | /// |
587 | /// * Same as that of [`Connection::request_name`]. |
588 | /// * If you wish to track changes to name ownership after this call, make sure that the |
589 | /// [`fdo::NameAcquired`] and/or [`fdo::NameLostStream`] instance(s) are created **before** |
590 | /// calling this method. Otherwise, you may loose the signal if it's emitted after this call but |
591 | /// just before the stream instance get created. |
592 | pub async fn request_name_with_flags<'w, W>( |
593 | &self, |
594 | well_known_name: W, |
595 | flags: BitFlags<RequestNameFlags>, |
596 | ) -> Result<RequestNameReply> |
597 | where |
598 | W: TryInto<WellKnownName<'w>>, |
599 | W::Error: Into<Error>, |
600 | { |
601 | let well_known_name = well_known_name.try_into().map_err(Into::into)?; |
602 | // We keep the lock until the end of this function so that the (possibly) spawned task |
603 | // doesn't end up accessing the name entry before it's inserted. |
604 | let mut names = self.inner.registered_names.lock().await; |
605 | |
606 | match names.get(&well_known_name) { |
607 | Some(NameStatus::Owner(_)) => return Ok(RequestNameReply::AlreadyOwner), |
608 | Some(NameStatus::Queued(_)) => return Ok(RequestNameReply::InQueue), |
609 | None => (), |
610 | } |
611 | |
612 | if !self.is_bus() { |
613 | names.insert(well_known_name.to_owned(), NameStatus::Owner(None)); |
614 | |
615 | return Ok(RequestNameReply::PrimaryOwner); |
616 | } |
617 | |
618 | let dbus_proxy = fdo::DBusProxy::builder(self) |
619 | .cache_properties(CacheProperties::No) |
620 | .build() |
621 | .await?; |
622 | let mut acquired_stream = dbus_proxy.receive_name_acquired().await?; |
623 | let mut lost_stream = dbus_proxy.receive_name_lost().await?; |
624 | let reply = dbus_proxy |
625 | .request_name(well_known_name.clone(), flags) |
626 | .await?; |
627 | let lost_task_name = format!("monitor name {well_known_name} lost" ); |
628 | let name_lost_fut = if flags.contains(RequestNameFlags::AllowReplacement) { |
629 | let weak_conn = WeakConnection::from(self); |
630 | let well_known_name = well_known_name.to_owned(); |
631 | Some( |
632 | async move { |
633 | loop { |
634 | let signal = lost_stream.next().await; |
635 | let inner = match weak_conn.upgrade() { |
636 | Some(conn) => conn.inner.clone(), |
637 | None => break, |
638 | }; |
639 | |
640 | match signal { |
641 | Some(signal) => match signal.args() { |
642 | Ok(args) if args.name == well_known_name => { |
643 | tracing::info!( |
644 | "Connection ` {}` lost name ` {}`" , |
645 | // SAFETY: This is bus connection so unique name can't be |
646 | // None. |
647 | inner.unique_name.get().unwrap(), |
648 | well_known_name |
649 | ); |
650 | inner.registered_names.lock().await.remove(&well_known_name); |
651 | |
652 | break; |
653 | } |
654 | Ok(_) => (), |
655 | Err(e) => warn!("Failed to parse `NameLost` signal: {}" , e), |
656 | }, |
657 | None => { |
658 | trace!("`NameLost` signal stream closed" ); |
659 | // This is a very strange state we end up in. Now the name is |
660 | // question remains in the queue |
661 | // forever. Maybe we can do better here but I |
662 | // think it's a very unlikely scenario anyway. |
663 | // |
664 | // Can happen if the connection is lost/dropped but then the whole |
665 | // `Connection` instance will go away soon anyway and hence this |
666 | // strange state along with it. |
667 | break; |
668 | } |
669 | } |
670 | } |
671 | } |
672 | .instrument(info_span!("{}" , lost_task_name)), |
673 | ) |
674 | } else { |
675 | None |
676 | }; |
677 | let status = match reply { |
678 | RequestNameReply::InQueue => { |
679 | let weak_conn = WeakConnection::from(self); |
680 | let well_known_name = well_known_name.to_owned(); |
681 | let task_name = format!("monitor name {well_known_name} acquired" ); |
682 | let task = self.executor().spawn( |
683 | async move { |
684 | loop { |
685 | let signal = acquired_stream.next().await; |
686 | let inner = match weak_conn.upgrade() { |
687 | Some(conn) => conn.inner.clone(), |
688 | None => break, |
689 | }; |
690 | match signal { |
691 | Some(signal) => match signal.args() { |
692 | Ok(args) if args.name == well_known_name => { |
693 | let mut names = inner.registered_names.lock().await; |
694 | if let Some(status) = names.get_mut(&well_known_name) { |
695 | let task = name_lost_fut.map(|fut| { |
696 | inner.executor.spawn(fut, &lost_task_name) |
697 | }); |
698 | *status = NameStatus::Owner(task); |
699 | |
700 | break; |
701 | } |
702 | // else the name was released in the meantime. :shrug: |
703 | } |
704 | Ok(_) => (), |
705 | Err(e) => warn!("Failed to parse `NameAcquired` signal: {}" , e), |
706 | }, |
707 | None => { |
708 | trace!("`NameAcquired` signal stream closed" ); |
709 | // See comment above for similar state in case of `NameLost` |
710 | // stream. |
711 | break; |
712 | } |
713 | } |
714 | } |
715 | } |
716 | .instrument(info_span!("{}" , task_name)), |
717 | &task_name, |
718 | ); |
719 | |
720 | NameStatus::Queued(task) |
721 | } |
722 | RequestNameReply::PrimaryOwner | RequestNameReply::AlreadyOwner => { |
723 | let task = name_lost_fut.map(|fut| self.executor().spawn(fut, &lost_task_name)); |
724 | |
725 | NameStatus::Owner(task) |
726 | } |
727 | RequestNameReply::Exists => return Err(Error::NameTaken), |
728 | }; |
729 | |
730 | names.insert(well_known_name.to_owned(), status); |
731 | |
732 | Ok(reply) |
733 | } |
734 | |
735 | /// Deregister a previously registered well-known name for this service on the bus. |
736 | /// |
737 | /// Use this method to deregister a well-known name, registered through |
738 | /// [`Connection::request_name`]. |
739 | /// |
740 | /// Unless an error is encountered, returns `Ok(true)` if name was previously registered with |
741 | /// the bus through `self` and it has now been successfully deregistered, `Ok(false)` if name |
742 | /// was not previously registered or already deregistered. |
743 | pub async fn release_name<'w, W>(&self, well_known_name: W) -> Result<bool> |
744 | where |
745 | W: TryInto<WellKnownName<'w>>, |
746 | W::Error: Into<Error>, |
747 | { |
748 | let well_known_name: WellKnownName<'w> = well_known_name.try_into().map_err(Into::into)?; |
749 | let mut names = self.inner.registered_names.lock().await; |
750 | // FIXME: Should be possible to avoid cloning/allocation here |
751 | if names.remove(&well_known_name.to_owned()).is_none() { |
752 | return Ok(false); |
753 | }; |
754 | |
755 | if !self.is_bus() { |
756 | return Ok(true); |
757 | } |
758 | |
759 | fdo::DBusProxy::builder(self) |
760 | .cache_properties(CacheProperties::No) |
761 | .build() |
762 | .await? |
763 | .release_name(well_known_name) |
764 | .await |
765 | .map(|_| true) |
766 | .map_err(Into::into) |
767 | } |
768 | |
769 | /// Checks if `self` is a connection to a message bus. |
770 | /// |
771 | /// This will return `false` for p2p connections. When the `p2p` feature is enabled, this will |
772 | /// always return `true`. |
773 | pub fn is_bus(&self) -> bool { |
774 | #[cfg (feature = "p2p" )] |
775 | { |
776 | self.inner.bus_conn |
777 | } |
778 | #[cfg (not(feature = "p2p" ))] |
779 | { |
780 | true |
781 | } |
782 | } |
783 | |
784 | /// The unique name of the connection, if set/applicable. |
785 | /// |
786 | /// The unique name is assigned by the message bus or set manually using |
787 | /// [`Connection::set_unique_name`]. |
788 | pub fn unique_name(&self) -> Option<&OwnedUniqueName> { |
789 | self.inner.unique_name.get() |
790 | } |
791 | |
792 | /// Sets the unique name of the connection (if not already set). |
793 | /// |
794 | /// This is mainly provided for bus implementations. All other users should not need to use this |
795 | /// method. Hence why this method is only available when the `bus-impl` feature is enabled. |
796 | /// |
797 | /// # Panics |
798 | /// |
799 | /// This method panics if the unique name is already set. It will always panic if the connection |
800 | /// is to a message bus as it's the bus that assigns peers their unique names. |
801 | #[cfg (feature = "bus-impl" )] |
802 | pub fn set_unique_name<U>(&self, unique_name: U) -> Result<()> |
803 | where |
804 | U: TryInto<OwnedUniqueName>, |
805 | U::Error: Into<Error>, |
806 | { |
807 | let name = unique_name.try_into().map_err(Into::into)?; |
808 | self.set_unique_name_(name); |
809 | |
810 | Ok(()) |
811 | } |
812 | |
813 | /// The capacity of the main (unfiltered) queue. |
814 | pub fn max_queued(&self) -> usize { |
815 | self.inner.msg_receiver.capacity() |
816 | } |
817 | |
818 | /// Set the capacity of the main (unfiltered) queue. |
819 | pub fn set_max_queued(&mut self, max: usize) { |
820 | self.inner.msg_receiver.clone().set_capacity(max); |
821 | } |
822 | |
823 | /// The server's GUID. |
824 | pub fn server_guid(&self) -> &OwnedGuid { |
825 | &self.inner.server_guid |
826 | } |
827 | |
828 | /// The underlying executor. |
829 | /// |
830 | /// When a connection is built with internal_executor set to false, zbus will not spawn a |
831 | /// thread to run the executor. You're responsible to continuously [tick the executor][tte]. |
832 | /// Failure to do so will result in hangs. |
833 | /// |
834 | /// # Examples |
835 | /// |
836 | /// Here is how one would typically run the zbus executor through tokio's scheduler: |
837 | /// |
838 | /// ``` |
839 | /// # // Disable on windows because somehow it triggers a stack overflow there: |
840 | /// # // https://gitlab.freedesktop.org/zeenix/zbus/-/jobs/34023494 |
841 | /// # #[cfg (not(target_os = "unix" ))] |
842 | /// # { |
843 | /// use zbus::connection::Builder; |
844 | /// use tokio::task::spawn; |
845 | /// |
846 | /// # struct SomeIface; |
847 | /// # |
848 | /// # #[zbus::interface] |
849 | /// # impl SomeIface { |
850 | /// # } |
851 | /// # |
852 | /// #[tokio::main] |
853 | /// async fn main() { |
854 | /// let conn = Builder::session() |
855 | /// .unwrap() |
856 | /// .internal_executor(false) |
857 | /// # // This is only for testing a deadlock that used to happen with this combo. |
858 | /// # .serve_at("/some/iface" , SomeIface) |
859 | /// # .unwrap() |
860 | /// .build() |
861 | /// .await |
862 | /// .unwrap(); |
863 | /// { |
864 | /// let conn = conn.clone(); |
865 | /// spawn(async move { |
866 | /// loop { |
867 | /// conn.executor().tick().await; |
868 | /// } |
869 | /// }); |
870 | /// } |
871 | /// |
872 | /// // All your other async code goes here. |
873 | /// } |
874 | /// # } |
875 | /// ``` |
876 | /// |
877 | /// **Note**: zbus 2.1 added support for tight integration with tokio. This means, if you use |
878 | /// zbus with tokio, you do not need to worry about this at all. All you need to do is enable |
879 | /// `tokio` feature. You should also disable the (default) `async-io` feature in your |
880 | /// `Cargo.toml` to avoid unused dependencies. Also note that **prior** to zbus 3.0, disabling |
881 | /// `async-io` was required to enable tight `tokio` integration. |
882 | /// |
883 | /// [tte]: https://docs.rs/async-executor/1.4.1/async_executor/struct.Executor.html#method.tick |
884 | pub fn executor(&self) -> &Executor<'static> { |
885 | &self.inner.executor |
886 | } |
887 | |
888 | /// Get a reference to the associated [`ObjectServer`]. |
889 | /// |
890 | /// The `ObjectServer` is created on-demand. |
891 | /// |
892 | /// **Note**: Once the `ObjectServer` is created, it will be replying to all method calls |
893 | /// received on `self`. If you want to manually reply to method calls, do not use this |
894 | /// method (or any of the `ObjectServer` related API). |
895 | pub fn object_server(&self) -> impl Deref<Target = ObjectServer> + '_ { |
896 | // FIXME: Maybe it makes sense after all to implement Deref<Target= ObjectServer> for |
897 | // crate::ObjectServer instead of this wrapper? |
898 | struct Wrapper<'a>(&'a blocking::ObjectServer); |
899 | impl<'a> Deref for Wrapper<'a> { |
900 | type Target = ObjectServer; |
901 | |
902 | fn deref(&self) -> &Self::Target { |
903 | self.0.inner() |
904 | } |
905 | } |
906 | |
907 | Wrapper(self.sync_object_server(true, None)) |
908 | } |
909 | |
910 | pub(crate) fn sync_object_server( |
911 | &self, |
912 | start: bool, |
913 | started_event: Option<Event>, |
914 | ) -> &blocking::ObjectServer { |
915 | self.inner |
916 | .object_server |
917 | .get_or_init(move || self.setup_object_server(start, started_event)) |
918 | } |
919 | |
920 | fn setup_object_server( |
921 | &self, |
922 | start: bool, |
923 | started_event: Option<Event>, |
924 | ) -> blocking::ObjectServer { |
925 | if start { |
926 | self.start_object_server(started_event); |
927 | } |
928 | |
929 | blocking::ObjectServer::new(self) |
930 | } |
931 | |
932 | #[instrument (skip(self))] |
933 | pub(crate) fn start_object_server(&self, started_event: Option<Event>) { |
934 | self.inner.object_server_dispatch_task.get_or_init(|| { |
935 | trace!("starting ObjectServer task" ); |
936 | let weak_conn = WeakConnection::from(self); |
937 | |
938 | let obj_server_task_name = "ObjectServer task" ; |
939 | self.inner.executor.spawn( |
940 | async move { |
941 | let mut stream = match weak_conn.upgrade() { |
942 | Some(conn) => { |
943 | let mut builder = MatchRule::builder().msg_type(Type::MethodCall); |
944 | if let Some(unique_name) = conn.unique_name() { |
945 | builder = builder.destination(&**unique_name).expect("unique name" ); |
946 | } |
947 | let rule = builder.build(); |
948 | match conn.add_match(rule.into(), None).await { |
949 | Ok(stream) => stream, |
950 | Err(e) => { |
951 | // Very unlikely but can happen I guess if connection is closed. |
952 | debug!("Failed to create message stream: {}" , e); |
953 | |
954 | return; |
955 | } |
956 | } |
957 | } |
958 | None => { |
959 | trace!("Connection is gone, stopping associated object server task" ); |
960 | |
961 | return; |
962 | } |
963 | }; |
964 | if let Some(started_event) = started_event { |
965 | started_event.notify(1); |
966 | } |
967 | |
968 | trace!("waiting for incoming method call messages.." ); |
969 | while let Some(msg) = stream.next().await.and_then(|m| { |
970 | if let Err(e) = &m { |
971 | debug!("Error while reading from object server stream: {:?}" , e); |
972 | } |
973 | m.ok() |
974 | }) { |
975 | if let Some(conn) = weak_conn.upgrade() { |
976 | let hdr = msg.header(); |
977 | // If we're connected to a bus, skip the destination check as the |
978 | // server will only send us method calls destined to us. |
979 | if !conn.is_bus() { |
980 | match hdr.destination() { |
981 | // Unique name is already checked by the match rule. |
982 | Some(BusName::Unique(_)) | None => (), |
983 | Some(BusName::WellKnown(dest)) => { |
984 | let names = conn.inner.registered_names.lock().await; |
985 | // destination doesn't matter if no name has been registered |
986 | // (probably means the name is registered through external |
987 | // means). |
988 | if !names.is_empty() && !names.contains_key(dest) { |
989 | trace!( |
990 | "Got a method call for a different destination: {}" , |
991 | dest |
992 | ); |
993 | |
994 | continue; |
995 | } |
996 | } |
997 | } |
998 | } |
999 | let server = conn.object_server(); |
1000 | if let Err(e) = server.dispatch_call(&msg, &hdr).await { |
1001 | debug!( |
1002 | "Error dispatching message. Message: {:?}, error: {:?}" , |
1003 | msg, e |
1004 | ); |
1005 | } |
1006 | } else { |
1007 | // If connection is completely gone, no reason to keep running the task |
1008 | // anymore. |
1009 | trace!("Connection is gone, stopping associated object server task" ); |
1010 | break; |
1011 | } |
1012 | } |
1013 | } |
1014 | .instrument(info_span!("{}" , obj_server_task_name)), |
1015 | obj_server_task_name, |
1016 | ) |
1017 | }); |
1018 | } |
1019 | |
1020 | pub(crate) async fn add_match( |
1021 | &self, |
1022 | rule: OwnedMatchRule, |
1023 | max_queued: Option<usize>, |
1024 | ) -> Result<Receiver<Result<Message>>> { |
1025 | use std::collections::hash_map::Entry; |
1026 | |
1027 | if self.inner.msg_senders.lock().await.is_empty() { |
1028 | // This only happens if socket reader task has errored out. |
1029 | return Err(Error::InputOutput(Arc::new(io::Error::new( |
1030 | io::ErrorKind::BrokenPipe, |
1031 | "Socket reader task has errored out" , |
1032 | )))); |
1033 | } |
1034 | |
1035 | let mut subscriptions = self.inner.subscriptions.lock().await; |
1036 | let msg_type = rule.msg_type().unwrap_or(Type::Signal); |
1037 | match subscriptions.entry(rule.clone()) { |
1038 | Entry::Vacant(e) => { |
1039 | let max_queued = max_queued.unwrap_or(DEFAULT_MAX_QUEUED); |
1040 | let (sender, mut receiver) = broadcast(max_queued); |
1041 | receiver.set_await_active(false); |
1042 | if self.is_bus() && msg_type == Type::Signal { |
1043 | fdo::DBusProxy::builder(self) |
1044 | .cache_properties(CacheProperties::No) |
1045 | .build() |
1046 | .await? |
1047 | .add_match_rule(e.key().inner().clone()) |
1048 | .await?; |
1049 | } |
1050 | e.insert((1, receiver.clone().deactivate())); |
1051 | self.inner |
1052 | .msg_senders |
1053 | .lock() |
1054 | .await |
1055 | .insert(Some(rule), sender); |
1056 | |
1057 | Ok(receiver) |
1058 | } |
1059 | Entry::Occupied(mut e) => { |
1060 | let (num_subscriptions, receiver) = e.get_mut(); |
1061 | *num_subscriptions += 1; |
1062 | if let Some(max_queued) = max_queued { |
1063 | if max_queued > receiver.capacity() { |
1064 | receiver.set_capacity(max_queued); |
1065 | } |
1066 | } |
1067 | |
1068 | Ok(receiver.activate_cloned()) |
1069 | } |
1070 | } |
1071 | } |
1072 | |
1073 | pub(crate) async fn remove_match(&self, rule: OwnedMatchRule) -> Result<bool> { |
1074 | use std::collections::hash_map::Entry; |
1075 | let mut subscriptions = self.inner.subscriptions.lock().await; |
1076 | // TODO when it becomes stable, use HashMap::raw_entry and only require expr: &str |
1077 | // (both here and in add_match) |
1078 | let msg_type = rule.msg_type().unwrap_or(Type::Signal); |
1079 | match subscriptions.entry(rule) { |
1080 | Entry::Vacant(_) => Ok(false), |
1081 | Entry::Occupied(mut e) => { |
1082 | let rule = e.key().inner().clone(); |
1083 | e.get_mut().0 -= 1; |
1084 | if e.get().0 == 0 { |
1085 | if self.is_bus() && msg_type == Type::Signal { |
1086 | fdo::DBusProxy::builder(self) |
1087 | .cache_properties(CacheProperties::No) |
1088 | .build() |
1089 | .await? |
1090 | .remove_match_rule(rule.clone()) |
1091 | .await?; |
1092 | } |
1093 | e.remove(); |
1094 | self.inner |
1095 | .msg_senders |
1096 | .lock() |
1097 | .await |
1098 | .remove(&Some(rule.into())); |
1099 | } |
1100 | Ok(true) |
1101 | } |
1102 | } |
1103 | } |
1104 | |
1105 | pub(crate) fn queue_remove_match(&self, rule: OwnedMatchRule) { |
1106 | let conn = self.clone(); |
1107 | let task_name = format!("Remove match ` {}`" , *rule); |
1108 | let remove_match = |
1109 | async move { conn.remove_match(rule).await }.instrument(trace_span!("{}" , task_name)); |
1110 | self.inner.executor.spawn(remove_match, &task_name).detach() |
1111 | } |
1112 | |
1113 | pub(crate) async fn new( |
1114 | auth: Authenticated, |
1115 | #[allow (unused)] bus_connection: bool, |
1116 | executor: Executor<'static>, |
1117 | ) -> Result<Self> { |
1118 | #[cfg (unix)] |
1119 | let cap_unix_fd = auth.cap_unix_fd; |
1120 | |
1121 | macro_rules! create_msg_broadcast_channel { |
1122 | ($size:expr) => {{ |
1123 | let (msg_sender, msg_receiver) = broadcast($size); |
1124 | let mut msg_receiver = msg_receiver.deactivate(); |
1125 | msg_receiver.set_await_active(false); |
1126 | |
1127 | (msg_sender, msg_receiver) |
1128 | }}; |
1129 | } |
1130 | // The unfiltered message channel. |
1131 | let (msg_sender, msg_receiver) = create_msg_broadcast_channel!(DEFAULT_MAX_QUEUED); |
1132 | let mut msg_senders = HashMap::new(); |
1133 | msg_senders.insert(None, msg_sender); |
1134 | |
1135 | // The special method return & error channel. |
1136 | let (method_return_sender, method_return_receiver) = |
1137 | create_msg_broadcast_channel!(DEFAULT_MAX_METHOD_RETURN_QUEUED); |
1138 | let rule = MatchRule::builder() |
1139 | .msg_type(Type::MethodReturn) |
1140 | .build() |
1141 | .into(); |
1142 | msg_senders.insert(Some(rule), method_return_sender.clone()); |
1143 | let rule = MatchRule::builder().msg_type(Type::Error).build().into(); |
1144 | msg_senders.insert(Some(rule), method_return_sender); |
1145 | let msg_senders = Arc::new(Mutex::new(msg_senders)); |
1146 | let subscriptions = Mutex::new(HashMap::new()); |
1147 | |
1148 | let connection = Self { |
1149 | inner: Arc::new(ConnectionInner { |
1150 | activity_event: Arc::new(Event::new()), |
1151 | socket_write: Mutex::new(auth.socket_write), |
1152 | server_guid: auth.server_guid, |
1153 | #[cfg (unix)] |
1154 | cap_unix_fd, |
1155 | #[cfg (feature = "p2p" )] |
1156 | bus_conn: bus_connection, |
1157 | unique_name: OnceLock::new(), |
1158 | subscriptions, |
1159 | object_server: OnceLock::new(), |
1160 | object_server_dispatch_task: OnceLock::new(), |
1161 | executor, |
1162 | socket_reader_task: OnceLock::new(), |
1163 | msg_senders, |
1164 | msg_receiver, |
1165 | method_return_receiver, |
1166 | registered_names: Mutex::new(HashMap::new()), |
1167 | }), |
1168 | }; |
1169 | |
1170 | if let Some(unique_name) = auth.unique_name { |
1171 | connection.set_unique_name_(unique_name); |
1172 | } |
1173 | |
1174 | Ok(connection) |
1175 | } |
1176 | |
1177 | /// Create a `Connection` to the session/user message bus. |
1178 | pub async fn session() -> Result<Self> { |
1179 | Builder::session()?.build().await |
1180 | } |
1181 | |
1182 | /// Create a `Connection` to the system-wide message bus. |
1183 | pub async fn system() -> Result<Self> { |
1184 | Builder::system()?.build().await |
1185 | } |
1186 | |
1187 | /// Returns a listener, notified on various connection activity. |
1188 | /// |
1189 | /// This function is meant for the caller to implement idle or timeout on inactivity. |
1190 | pub fn monitor_activity(&self) -> EventListener { |
1191 | self.inner.activity_event.listen() |
1192 | } |
1193 | |
1194 | /// Returns the peer credentials. |
1195 | /// |
1196 | /// The fields are populated on the best effort basis. Some or all fields may not even make |
1197 | /// sense for certain sockets or on certain platforms and hence will be set to `None`. |
1198 | /// |
1199 | /// # Caveats |
1200 | /// |
1201 | /// Currently `unix_group_ids` and `linux_security_label` fields are not populated. |
1202 | pub async fn peer_credentials(&self) -> io::Result<ConnectionCredentials> { |
1203 | self.inner |
1204 | .socket_write |
1205 | .lock() |
1206 | .await |
1207 | .peer_credentials() |
1208 | .await |
1209 | } |
1210 | |
1211 | /// Close the connection. |
1212 | /// |
1213 | /// After this call, all reading and writing operations will fail. |
1214 | pub async fn close(self) -> Result<()> { |
1215 | self.inner.activity_event.notify(usize::MAX); |
1216 | self.inner |
1217 | .socket_write |
1218 | .lock() |
1219 | .await |
1220 | .close() |
1221 | .await |
1222 | .map_err(Into::into) |
1223 | } |
1224 | |
1225 | pub(crate) fn init_socket_reader( |
1226 | &self, |
1227 | socket_read: Box<dyn socket::ReadHalf>, |
1228 | already_read: Vec<u8>, |
1229 | #[cfg (unix)] already_received_fds: Vec<std::os::fd::OwnedFd>, |
1230 | ) { |
1231 | let inner = &self.inner; |
1232 | inner |
1233 | .socket_reader_task |
1234 | .set( |
1235 | SocketReader::new( |
1236 | socket_read, |
1237 | inner.msg_senders.clone(), |
1238 | already_read, |
1239 | #[cfg (unix)] |
1240 | already_received_fds, |
1241 | inner.activity_event.clone(), |
1242 | ) |
1243 | .spawn(&inner.executor), |
1244 | ) |
1245 | .expect("Attempted to set `socket_reader_task` twice" ); |
1246 | } |
1247 | |
1248 | fn set_unique_name_(&self, name: OwnedUniqueName) { |
1249 | self.inner |
1250 | .unique_name |
1251 | .set(name) |
1252 | // programmer (probably our) error if this fails. |
1253 | .expect("unique name already set" ); |
1254 | } |
1255 | } |
1256 | |
1257 | impl From<crate::blocking::Connection> for Connection { |
1258 | fn from(conn: crate::blocking::Connection) -> Self { |
1259 | conn.into_inner() |
1260 | } |
1261 | } |
1262 | |
1263 | // Internal API that allows keeping a weak connection ref around. |
1264 | #[derive (Debug)] |
1265 | pub(crate) struct WeakConnection { |
1266 | inner: Weak<ConnectionInner>, |
1267 | } |
1268 | |
1269 | impl WeakConnection { |
1270 | /// Upgrade to a Connection. |
1271 | pub fn upgrade(&self) -> Option<Connection> { |
1272 | self.inner.upgrade().map(|inner: Arc| Connection { inner }) |
1273 | } |
1274 | } |
1275 | |
1276 | impl From<&Connection> for WeakConnection { |
1277 | fn from(conn: &Connection) -> Self { |
1278 | Self { |
1279 | inner: Arc::downgrade(&conn.inner), |
1280 | } |
1281 | } |
1282 | } |
1283 | |
1284 | #[derive (Debug)] |
1285 | enum NameStatus { |
1286 | // The task waits for name lost signal if owner allows replacement. |
1287 | Owner(#[allow (unused)] Option<Task<()>>), |
1288 | // The task waits for name acquisition signal. |
1289 | Queued(#[allow (unused)] Task<()>), |
1290 | } |
1291 | |
1292 | static SERIAL_NUM_SEMAPHORE: Semaphore = Semaphore::new(permits:1); |
1293 | |
1294 | // Make message creation and sending an atomic operation, using an async |
1295 | // semaphore if flatpak portal is detected to workaround an xdg-dbus-proxy issue: |
1296 | // |
1297 | // https://github.com/flatpak/xdg-dbus-proxy/issues/46 |
1298 | async fn acquire_serial_num_semaphore() -> Option<SemaphorePermit<'static>> { |
1299 | if is_flatpak() { |
1300 | Some(SERIAL_NUM_SEMAPHORE.acquire().await) |
1301 | } else { |
1302 | None |
1303 | } |
1304 | } |
1305 | |
1306 | #[cfg (test)] |
1307 | mod tests { |
1308 | use super::*; |
1309 | use crate::fdo::DBusProxy; |
1310 | use ntest::timeout; |
1311 | use test_log::test; |
1312 | |
1313 | #[cfg (windows)] |
1314 | #[test ] |
1315 | fn connect_autolaunch_session_bus() { |
1316 | let addr = |
1317 | crate::win32::autolaunch_bus_address().expect("Unable to get session bus address" ); |
1318 | |
1319 | crate::block_on(async { addr.connect().await }).expect("Unable to connect to session bus" ); |
1320 | } |
1321 | |
1322 | #[cfg (target_os = "macos" )] |
1323 | #[test ] |
1324 | fn connect_launchd_session_bus() { |
1325 | use crate::address::{transport::Launchd, Address, Transport}; |
1326 | crate::block_on(async { |
1327 | let addr = Address::from(Transport::Launchd(Launchd::new( |
1328 | "DBUS_LAUNCHD_SESSION_BUS_SOCKET" , |
1329 | ))); |
1330 | addr.connect().await |
1331 | }) |
1332 | .expect("Unable to connect to session bus" ); |
1333 | } |
1334 | |
1335 | #[test ] |
1336 | #[timeout(15000)] |
1337 | fn disconnect_on_drop() { |
1338 | // Reproducer for https://github.com/dbus2/zbus/issues/308 where setting up the |
1339 | // objectserver would cause the connection to not disconnect on drop. |
1340 | crate::utils::block_on(test_disconnect_on_drop()); |
1341 | } |
1342 | |
1343 | async fn test_disconnect_on_drop() { |
1344 | #[derive (Default)] |
1345 | struct MyInterface {} |
1346 | |
1347 | #[crate::interface (name = "dev.peelz.FooBar.Baz" )] |
1348 | impl MyInterface { |
1349 | fn do_thing(&self) {} |
1350 | } |
1351 | let name = "dev.peelz.foobar" ; |
1352 | let connection = Builder::session() |
1353 | .unwrap() |
1354 | .name(name) |
1355 | .unwrap() |
1356 | .serve_at("/dev/peelz/FooBar" , MyInterface::default()) |
1357 | .unwrap() |
1358 | .build() |
1359 | .await |
1360 | .unwrap(); |
1361 | |
1362 | let connection2 = Connection::session().await.unwrap(); |
1363 | let dbus = DBusProxy::new(&connection2).await.unwrap(); |
1364 | let mut stream = dbus |
1365 | .receive_name_owner_changed_with_args(&[(0, name), (2, "" )]) |
1366 | .await |
1367 | .unwrap(); |
1368 | |
1369 | drop(connection); |
1370 | |
1371 | // If the connection is not dropped, this will hang forever. |
1372 | stream.next().await.unwrap(); |
1373 | |
1374 | // Let's still make sure the name is gone. |
1375 | let name_has_owner = dbus.name_has_owner(name.try_into().unwrap()).await.unwrap(); |
1376 | assert!(!name_has_owner); |
1377 | } |
1378 | } |
1379 | |
1380 | #[cfg (feature = "p2p" )] |
1381 | #[cfg (test)] |
1382 | mod p2p_tests { |
1383 | use futures_util::stream::TryStreamExt; |
1384 | use ntest::timeout; |
1385 | use test_log::test; |
1386 | use zvariant::{Endian, NATIVE_ENDIAN}; |
1387 | |
1388 | use crate::{AuthMechanism, Guid}; |
1389 | |
1390 | use super::*; |
1391 | |
1392 | // Same numbered client and server are already paired up. |
1393 | async fn test_p2p( |
1394 | server1: Connection, |
1395 | client1: Connection, |
1396 | server2: Connection, |
1397 | client2: Connection, |
1398 | ) -> Result<()> { |
1399 | let forward1 = { |
1400 | let stream = MessageStream::from(server1.clone()); |
1401 | let sink = client2.clone(); |
1402 | |
1403 | stream.try_for_each(move |msg| { |
1404 | let sink = sink.clone(); |
1405 | async move { sink.send(&msg).await } |
1406 | }) |
1407 | }; |
1408 | let forward2 = { |
1409 | let stream = MessageStream::from(client2.clone()); |
1410 | let sink = server1.clone(); |
1411 | |
1412 | stream.try_for_each(move |msg| { |
1413 | let sink = sink.clone(); |
1414 | async move { sink.send(&msg).await } |
1415 | }) |
1416 | }; |
1417 | let _forward_task = client1.executor().spawn( |
1418 | async move { futures_util::try_join!(forward1, forward2) }, |
1419 | "forward_task" , |
1420 | ); |
1421 | |
1422 | let server_ready = Event::new(); |
1423 | let server_ready_listener = server_ready.listen(); |
1424 | let client_done = Event::new(); |
1425 | let client_done_listener = client_done.listen(); |
1426 | |
1427 | let server_future = async move { |
1428 | let mut stream = MessageStream::from(&server2); |
1429 | server_ready.notify(1); |
1430 | let method = loop { |
1431 | let m = stream.try_next().await?.unwrap(); |
1432 | if m.to_string() == "Method call Test" { |
1433 | assert_eq!(m.body().deserialize::<u64>().unwrap(), 64); |
1434 | break m; |
1435 | } |
1436 | }; |
1437 | |
1438 | // Send another message first to check the queueing function on client side. |
1439 | server2 |
1440 | .emit_signal(None::<()>, "/" , "org.zbus.p2p" , "ASignalForYou" , &()) |
1441 | .await?; |
1442 | server2.reply(&method, &("yay" )).await?; |
1443 | client_done_listener.await; |
1444 | |
1445 | Ok(()) |
1446 | }; |
1447 | |
1448 | let client_future = async move { |
1449 | let mut stream = MessageStream::from(&client1); |
1450 | server_ready_listener.await; |
1451 | // We want to set non-native endian to ensure that: |
1452 | // 1. the message is actually encoded with the specified endian. |
1453 | // 2. the server side is able to decode it and replies in the same encoding. |
1454 | let endian = match NATIVE_ENDIAN { |
1455 | Endian::Little => Endian::Big, |
1456 | Endian::Big => Endian::Little, |
1457 | }; |
1458 | let method = Message::method("/" , "Test" )? |
1459 | .interface("org.zbus.p2p" )? |
1460 | .endian(endian) |
1461 | .build(&64u64)?; |
1462 | client1.send(&method).await?; |
1463 | // Check we didn't miss the signal that was sent during the call. |
1464 | let m = stream.try_next().await?.unwrap(); |
1465 | client_done.notify(1); |
1466 | assert_eq!(m.to_string(), "Signal ASignalForYou" ); |
1467 | let reply = stream.try_next().await?.unwrap(); |
1468 | assert_eq!(reply.to_string(), "Method return" ); |
1469 | // Check if the reply was in the non-native endian. |
1470 | assert_eq!(Endian::from(reply.primary_header().endian_sig()), endian); |
1471 | reply.body().deserialize::<String>() |
1472 | }; |
1473 | |
1474 | let (val, _) = futures_util::try_join!(client_future, server_future,)?; |
1475 | assert_eq!(val, "yay" ); |
1476 | |
1477 | Ok(()) |
1478 | } |
1479 | |
1480 | #[test ] |
1481 | #[timeout(15000)] |
1482 | fn tcp_p2p() { |
1483 | crate::utils::block_on(test_tcp_p2p()).unwrap(); |
1484 | } |
1485 | |
1486 | async fn test_tcp_p2p() -> Result<()> { |
1487 | let (server1, client1) = tcp_p2p_pipe().await?; |
1488 | let (server2, client2) = tcp_p2p_pipe().await?; |
1489 | |
1490 | test_p2p(server1, client1, server2, client2).await |
1491 | } |
1492 | |
1493 | async fn tcp_p2p_pipe() -> Result<(Connection, Connection)> { |
1494 | let guid = Guid::generate(); |
1495 | |
1496 | #[cfg (not(feature = "tokio" ))] |
1497 | let (server_conn_builder, client_conn_builder) = { |
1498 | let listener = std::net::TcpListener::bind("127.0.0.1:0" ).unwrap(); |
1499 | let addr = listener.local_addr().unwrap(); |
1500 | let p1 = std::net::TcpStream::connect(addr).unwrap(); |
1501 | let p0 = listener.incoming().next().unwrap().unwrap(); |
1502 | |
1503 | ( |
1504 | Builder::tcp_stream(p0) |
1505 | .server(guid) |
1506 | .unwrap() |
1507 | .p2p() |
1508 | .auth_mechanism(AuthMechanism::Anonymous), |
1509 | Builder::tcp_stream(p1).p2p(), |
1510 | ) |
1511 | }; |
1512 | |
1513 | #[cfg (feature = "tokio" )] |
1514 | let (server_conn_builder, client_conn_builder) = { |
1515 | let listener = tokio::net::TcpListener::bind("127.0.0.1:0" ).await.unwrap(); |
1516 | let addr = listener.local_addr().unwrap(); |
1517 | let p1 = tokio::net::TcpStream::connect(addr).await.unwrap(); |
1518 | let p0 = listener.accept().await.unwrap().0; |
1519 | |
1520 | ( |
1521 | Builder::tcp_stream(p0) |
1522 | .server(guid) |
1523 | .unwrap() |
1524 | .p2p() |
1525 | .auth_mechanism(AuthMechanism::Anonymous), |
1526 | Builder::tcp_stream(p1).p2p(), |
1527 | ) |
1528 | }; |
1529 | |
1530 | futures_util::try_join!(server_conn_builder.build(), client_conn_builder.build()) |
1531 | } |
1532 | |
1533 | #[cfg (unix)] |
1534 | #[test ] |
1535 | #[timeout(15000)] |
1536 | fn unix_p2p() { |
1537 | crate::utils::block_on(test_unix_p2p()).unwrap(); |
1538 | } |
1539 | |
1540 | #[cfg (unix)] |
1541 | async fn test_unix_p2p() -> Result<()> { |
1542 | let (server1, client1) = unix_p2p_pipe().await?; |
1543 | let (server2, client2) = unix_p2p_pipe().await?; |
1544 | |
1545 | test_p2p(server1, client1, server2, client2).await |
1546 | } |
1547 | |
1548 | #[cfg (unix)] |
1549 | async fn unix_p2p_pipe() -> Result<(Connection, Connection)> { |
1550 | #[cfg (not(feature = "tokio" ))] |
1551 | use std::os::unix::net::UnixStream; |
1552 | #[cfg (feature = "tokio" )] |
1553 | use tokio::net::UnixStream; |
1554 | #[cfg (all(windows, not(feature = "tokio" )))] |
1555 | use uds_windows::UnixStream; |
1556 | |
1557 | let guid = Guid::generate(); |
1558 | |
1559 | let (p0, p1) = UnixStream::pair().unwrap(); |
1560 | |
1561 | futures_util::try_join!( |
1562 | Builder::unix_stream(p1).p2p().build(), |
1563 | Builder::unix_stream(p0).server(guid).unwrap().p2p().build(), |
1564 | ) |
1565 | } |
1566 | |
1567 | // Compile-test only since we don't have a VM setup to run this with/in. |
1568 | #[cfg (any( |
1569 | all(feature = "vsock" , not(feature = "tokio" )), |
1570 | feature = "tokio-vsock" |
1571 | ))] |
1572 | #[test ] |
1573 | #[timeout(15000)] |
1574 | #[ignore ] |
1575 | fn vsock_p2p() { |
1576 | crate::utils::block_on(test_vsock_p2p()).unwrap(); |
1577 | } |
1578 | |
1579 | #[cfg (any( |
1580 | all(feature = "vsock" , not(feature = "tokio" )), |
1581 | feature = "tokio-vsock" |
1582 | ))] |
1583 | async fn test_vsock_p2p() -> Result<()> { |
1584 | let (server1, client1) = vsock_p2p_pipe().await?; |
1585 | let (server2, client2) = vsock_p2p_pipe().await?; |
1586 | |
1587 | test_p2p(server1, client1, server2, client2).await |
1588 | } |
1589 | |
1590 | #[cfg (all(feature = "vsock" , not(feature = "tokio" )))] |
1591 | async fn vsock_p2p_pipe() -> Result<(Connection, Connection)> { |
1592 | let guid = Guid::generate(); |
1593 | |
1594 | let listener = vsock::VsockListener::bind_with_cid_port(vsock::VMADDR_CID_ANY, 42).unwrap(); |
1595 | let addr = listener.local_addr().unwrap(); |
1596 | let client = vsock::VsockStream::connect(&addr).unwrap(); |
1597 | let server = listener.incoming().next().unwrap().unwrap(); |
1598 | |
1599 | futures_util::try_join!( |
1600 | Builder::vsock_stream(server) |
1601 | .server(guid) |
1602 | .unwrap() |
1603 | .p2p() |
1604 | .auth_mechanism(AuthMechanism::Anonymous) |
1605 | .build(), |
1606 | Builder::vsock_stream(client).p2p().build(), |
1607 | ) |
1608 | } |
1609 | |
1610 | #[cfg (feature = "tokio-vsock" )] |
1611 | async fn vsock_p2p_pipe() -> Result<(Connection, Connection)> { |
1612 | let guid = Guid::generate(); |
1613 | |
1614 | let listener = tokio_vsock::VsockListener::bind(2, 42).unwrap(); |
1615 | let client = tokio_vsock::VsockStream::connect(3, 42).await.unwrap(); |
1616 | let server = listener.incoming().next().await.unwrap().unwrap(); |
1617 | |
1618 | futures_util::try_join!( |
1619 | Builder::vsock_stream(server) |
1620 | .server(guid) |
1621 | .unwrap() |
1622 | .p2p() |
1623 | .auth_mechanism(AuthMechanism::Anonymous) |
1624 | .build(), |
1625 | Builder::vsock_stream(client).p2p().build(), |
1626 | ) |
1627 | } |
1628 | #[cfg (any(unix, not(feature = "tokio" )))] |
1629 | #[test ] |
1630 | #[timeout(15000)] |
1631 | fn unix_p2p_cookie_auth() { |
1632 | use crate::utils::block_on; |
1633 | use std::{ |
1634 | fs::{create_dir_all, remove_file, write}, |
1635 | time::{SystemTime as Time, UNIX_EPOCH}, |
1636 | }; |
1637 | #[cfg (unix)] |
1638 | use std::{ |
1639 | fs::{set_permissions, Permissions}, |
1640 | os::unix::fs::PermissionsExt, |
1641 | }; |
1642 | use xdg_home::home_dir; |
1643 | |
1644 | let cookie_context = "zbus-test-cookie-context" ; |
1645 | let cookie_id = 123456789; |
1646 | let cookie = hex::encode(b"our cookie" ); |
1647 | |
1648 | // Ensure cookie directory exists. |
1649 | let cookie_dir = home_dir().unwrap().join(".dbus-keyrings" ); |
1650 | create_dir_all(&cookie_dir).unwrap(); |
1651 | #[cfg (unix)] |
1652 | set_permissions(&cookie_dir, Permissions::from_mode(0o700)).unwrap(); |
1653 | |
1654 | // Create a cookie file. |
1655 | let cookie_file = cookie_dir.join(cookie_context); |
1656 | let ts = Time::now().duration_since(UNIX_EPOCH).unwrap().as_secs(); |
1657 | let cookie_entry = format!("{cookie_id} {ts} {cookie}" ); |
1658 | write(&cookie_file, cookie_entry).unwrap(); |
1659 | |
1660 | // Explicit cookie ID. |
1661 | let res1 = block_on(test_unix_p2p_cookie_auth(cookie_context, Some(cookie_id))); |
1662 | // Implicit cookie ID (first one should be picked). |
1663 | let res2 = block_on(test_unix_p2p_cookie_auth(cookie_context, None)); |
1664 | |
1665 | // Remove the cookie file. |
1666 | remove_file(&cookie_file).unwrap(); |
1667 | |
1668 | res1.unwrap(); |
1669 | res2.unwrap(); |
1670 | } |
1671 | |
1672 | #[cfg (any(unix, not(feature = "tokio" )))] |
1673 | async fn test_unix_p2p_cookie_auth( |
1674 | cookie_context: &'static str, |
1675 | cookie_id: Option<usize>, |
1676 | ) -> Result<()> { |
1677 | #[cfg (all(unix, not(feature = "tokio" )))] |
1678 | use std::os::unix::net::UnixStream; |
1679 | #[cfg (all(unix, feature = "tokio" ))] |
1680 | use tokio::net::UnixStream; |
1681 | #[cfg (all(windows, not(feature = "tokio" )))] |
1682 | use uds_windows::UnixStream; |
1683 | |
1684 | let guid = Guid::generate(); |
1685 | |
1686 | let (p0, p1) = UnixStream::pair().unwrap(); |
1687 | let mut server_builder = Builder::unix_stream(p0) |
1688 | .server(guid) |
1689 | .unwrap() |
1690 | .p2p() |
1691 | .auth_mechanism(AuthMechanism::Cookie) |
1692 | .cookie_context(cookie_context) |
1693 | .unwrap(); |
1694 | if let Some(cookie_id) = cookie_id { |
1695 | server_builder = server_builder.cookie_id(cookie_id); |
1696 | } |
1697 | |
1698 | futures_util::try_join!( |
1699 | Builder::unix_stream(p1).p2p().build(), |
1700 | server_builder.build(), |
1701 | ) |
1702 | .map(|_| ()) |
1703 | } |
1704 | |
1705 | #[test ] |
1706 | #[timeout(15000)] |
1707 | fn channel_pair() { |
1708 | crate::utils::block_on(test_channel_pair()).unwrap(); |
1709 | } |
1710 | |
1711 | async fn test_channel_pair() -> Result<()> { |
1712 | let (server1, client1) = create_channel_pair().await; |
1713 | let (server2, client2) = create_channel_pair().await; |
1714 | |
1715 | test_p2p(server1, client1, server2, client2).await |
1716 | } |
1717 | |
1718 | async fn create_channel_pair() -> (Connection, Connection) { |
1719 | let (a, b) = socket::Channel::pair(); |
1720 | |
1721 | let guid = crate::Guid::generate(); |
1722 | let conn1 = Builder::authenticated_socket(a, guid.clone()) |
1723 | .unwrap() |
1724 | .p2p() |
1725 | .build() |
1726 | .await |
1727 | .unwrap(); |
1728 | let conn2 = Builder::authenticated_socket(b, guid) |
1729 | .unwrap() |
1730 | .p2p() |
1731 | .build() |
1732 | .await |
1733 | .unwrap(); |
1734 | |
1735 | (conn1, conn2) |
1736 | } |
1737 | } |
1738 | |