2024-01-01 14:58:21 -05:00
|
|
|
// Copyright 2018-2024 the Deno authors. All rights reserved. MIT license.
|
2020-09-05 20:34:02 -04:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
use super::check_unstable;
|
2023-07-18 19:24:30 -04:00
|
|
|
use deno_core::anyhow::Context;
|
2023-05-11 08:53:45 -04:00
|
|
|
use deno_core::error::type_error;
|
2020-09-14 12:48:57 -04:00
|
|
|
use deno_core::error::AnyError;
|
2023-09-11 18:10:43 -04:00
|
|
|
use deno_core::op2;
|
2022-04-26 09:26:05 -04:00
|
|
|
use deno_core::serde_json;
|
2020-12-16 11:14:12 -05:00
|
|
|
use deno_core::AsyncMutFuture;
|
|
|
|
use deno_core::AsyncRefCell;
|
2020-09-10 09:57:45 -04:00
|
|
|
use deno_core::OpState;
|
2020-12-16 11:14:12 -05:00
|
|
|
use deno_core::RcRef;
|
|
|
|
use deno_core::Resource;
|
2021-03-19 13:25:37 -04:00
|
|
|
use deno_core::ResourceId;
|
2023-06-22 17:37:56 -04:00
|
|
|
use deno_core::ToJsBuffer;
|
2023-05-04 14:28:42 -04:00
|
|
|
use deno_io::fs::FileResource;
|
2023-03-05 07:19:34 -05:00
|
|
|
use deno_io::ChildStderrResource;
|
|
|
|
use deno_io::ChildStdinResource;
|
|
|
|
use deno_io::ChildStdoutResource;
|
2024-06-06 23:37:53 -04:00
|
|
|
use deno_permissions::PermissionsContainer;
|
2020-09-16 12:43:08 -04:00
|
|
|
use serde::Deserialize;
|
2021-04-05 12:40:24 -04:00
|
|
|
use serde::Serialize;
|
2020-12-16 11:14:12 -05:00
|
|
|
use std::borrow::Cow;
|
2020-09-10 09:57:45 -04:00
|
|
|
use std::cell::RefCell;
|
2023-03-05 07:19:34 -05:00
|
|
|
use std::process::ExitStatus;
|
2020-08-18 12:30:13 -04:00
|
|
|
use std::rc::Rc;
|
2019-12-30 08:57:17 -05:00
|
|
|
use tokio::process::Command;
|
2019-08-14 11:03:02 -04:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
#[cfg(windows)]
|
|
|
|
use std::os::windows::process::CommandExt;
|
2019-08-14 11:03:02 -04:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
#[cfg(unix)]
|
|
|
|
use std::os::unix::prelude::ExitStatusExt;
|
|
|
|
#[cfg(unix)]
|
|
|
|
use std::os::unix::process::CommandExt;
|
2019-10-11 14:41:54 -04:00
|
|
|
|
2023-10-12 11:55:50 -04:00
|
|
|
pub const UNSTABLE_FEATURE_NAME: &str = "process";
|
|
|
|
|
2022-09-19 04:25:03 -04:00
|
|
|
#[derive(Copy, Clone, Eq, PartialEq, Deserialize)]
|
2024-06-07 13:21:32 -04:00
|
|
|
#[serde(rename_all = "snake_case")]
|
2022-04-26 09:26:05 -04:00
|
|
|
pub enum Stdio {
|
|
|
|
Inherit,
|
|
|
|
Piped,
|
|
|
|
Null,
|
2024-06-07 13:21:32 -04:00
|
|
|
IpcForInternalUse,
|
2022-04-26 09:26:05 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
impl Stdio {
|
|
|
|
pub fn as_stdio(&self) -> std::process::Stdio {
|
|
|
|
match &self {
|
|
|
|
Stdio::Inherit => std::process::Stdio::inherit(),
|
|
|
|
Stdio::Piped => std::process::Stdio::piped(),
|
|
|
|
Stdio::Null => std::process::Stdio::null(),
|
2024-06-07 13:21:32 -04:00
|
|
|
_ => unreachable!(),
|
2022-04-26 09:26:05 -04:00
|
|
|
}
|
|
|
|
}
|
2019-11-14 12:10:25 -05:00
|
|
|
}
|
|
|
|
|
2022-09-19 04:25:03 -04:00
|
|
|
#[derive(Copy, Clone, Eq, PartialEq)]
|
2022-04-26 09:26:05 -04:00
|
|
|
pub enum StdioOrRid {
|
|
|
|
Stdio(Stdio),
|
|
|
|
Rid(ResourceId),
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'de> Deserialize<'de> for StdioOrRid {
|
|
|
|
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
|
|
|
|
where
|
|
|
|
D: serde::Deserializer<'de>,
|
|
|
|
{
|
|
|
|
use serde_json::Value;
|
|
|
|
let value = Value::deserialize(deserializer)?;
|
|
|
|
match value {
|
|
|
|
Value::String(val) => match val.as_str() {
|
|
|
|
"inherit" => Ok(StdioOrRid::Stdio(Stdio::Inherit)),
|
|
|
|
"piped" => Ok(StdioOrRid::Stdio(Stdio::Piped)),
|
|
|
|
"null" => Ok(StdioOrRid::Stdio(Stdio::Null)),
|
2024-06-07 13:21:32 -04:00
|
|
|
"ipc_for_internal_use" => {
|
|
|
|
Ok(StdioOrRid::Stdio(Stdio::IpcForInternalUse))
|
|
|
|
}
|
2022-04-26 09:26:05 -04:00
|
|
|
val => Err(serde::de::Error::unknown_variant(
|
|
|
|
val,
|
|
|
|
&["inherit", "piped", "null"],
|
|
|
|
)),
|
|
|
|
},
|
|
|
|
Value::Number(val) => match val.as_u64() {
|
|
|
|
Some(val) if val <= ResourceId::MAX as u64 => {
|
|
|
|
Ok(StdioOrRid::Rid(val as ResourceId))
|
|
|
|
}
|
|
|
|
_ => Err(serde::de::Error::custom("Expected a positive integer")),
|
|
|
|
},
|
|
|
|
_ => Err(serde::de::Error::custom(
|
|
|
|
r#"Expected a resource id, "inherit", "piped", or "null""#,
|
|
|
|
)),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl StdioOrRid {
|
|
|
|
pub fn as_stdio(
|
|
|
|
&self,
|
|
|
|
state: &mut OpState,
|
|
|
|
) -> Result<std::process::Stdio, AnyError> {
|
|
|
|
match &self {
|
|
|
|
StdioOrRid::Stdio(val) => Ok(val.as_stdio()),
|
2023-05-04 14:28:42 -04:00
|
|
|
StdioOrRid::Rid(rid) => {
|
|
|
|
FileResource::with_file(state, *rid, |file| Ok(file.as_stdio()?))
|
|
|
|
}
|
2022-04-26 09:26:05 -04:00
|
|
|
}
|
2019-08-14 11:03:02 -04:00
|
|
|
}
|
2024-06-07 13:21:32 -04:00
|
|
|
|
|
|
|
pub fn is_ipc(&self) -> bool {
|
|
|
|
matches!(self, StdioOrRid::Stdio(Stdio::IpcForInternalUse))
|
|
|
|
}
|
2019-08-14 11:03:02 -04:00
|
|
|
}
|
|
|
|
|
2023-03-17 14:22:15 -04:00
|
|
|
deno_core::extension!(
|
|
|
|
deno_process,
|
|
|
|
ops = [
|
|
|
|
op_spawn_child,
|
|
|
|
op_spawn_wait,
|
|
|
|
op_spawn_sync,
|
2023-05-11 08:53:45 -04:00
|
|
|
op_spawn_kill,
|
2023-03-17 14:22:15 -04:00
|
|
|
deprecated::op_run,
|
|
|
|
deprecated::op_run_status,
|
|
|
|
deprecated::op_kill,
|
2023-03-18 18:30:04 -04:00
|
|
|
],
|
2023-03-17 14:22:15 -04:00
|
|
|
);
|
2023-03-05 07:19:34 -05:00
|
|
|
|
2023-05-11 08:53:45 -04:00
|
|
|
/// Second member stores the pid separately from the RefCell. It's needed for
|
|
|
|
/// `op_spawn_kill`, where the RefCell is borrowed mutably by `op_spawn_wait`.
|
|
|
|
struct ChildResource(RefCell<tokio::process::Child>, u32);
|
2023-03-05 07:19:34 -05:00
|
|
|
|
|
|
|
impl Resource for ChildResource {
|
|
|
|
fn name(&self) -> Cow<str> {
|
|
|
|
"child".into()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-26 08:50:21 -04:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
2023-03-05 07:19:34 -05:00
|
|
|
pub struct SpawnArgs {
|
|
|
|
cmd: String,
|
|
|
|
args: Vec<String>,
|
2019-08-26 08:50:21 -04:00
|
|
|
cwd: Option<String>,
|
2021-08-04 15:47:43 -04:00
|
|
|
clear_env: bool,
|
2019-08-26 08:50:21 -04:00
|
|
|
env: Vec<(String, String)>,
|
2021-09-14 15:38:35 -04:00
|
|
|
#[cfg(unix)]
|
2021-09-13 13:26:23 -04:00
|
|
|
gid: Option<u32>,
|
2021-09-14 15:38:35 -04:00
|
|
|
#[cfg(unix)]
|
2021-09-13 13:26:23 -04:00
|
|
|
uid: Option<u32>,
|
2023-03-05 07:19:34 -05:00
|
|
|
#[cfg(windows)]
|
|
|
|
windows_raw_arguments: bool,
|
2023-12-13 05:14:16 -05:00
|
|
|
ipc: Option<i32>,
|
2023-03-05 07:19:34 -05:00
|
|
|
|
|
|
|
#[serde(flatten)]
|
|
|
|
stdio: ChildStdio,
|
2024-08-15 12:38:46 -04:00
|
|
|
|
|
|
|
extra_stdio: Vec<Stdio>,
|
2019-08-26 08:50:21 -04:00
|
|
|
}
|
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
|
|
|
pub struct ChildStdio {
|
2024-06-07 13:21:32 -04:00
|
|
|
stdin: StdioOrRid,
|
|
|
|
stdout: StdioOrRid,
|
|
|
|
stderr: StdioOrRid,
|
2020-12-16 11:14:12 -05:00
|
|
|
}
|
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
#[derive(Serialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
|
|
|
pub struct ChildStatus {
|
|
|
|
success: bool,
|
|
|
|
code: i32,
|
|
|
|
signal: Option<String>,
|
2020-12-16 11:14:12 -05:00
|
|
|
}
|
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
impl TryFrom<ExitStatus> for ChildStatus {
|
|
|
|
type Error = AnyError;
|
|
|
|
|
|
|
|
fn try_from(status: ExitStatus) -> Result<Self, Self::Error> {
|
|
|
|
let code = status.code();
|
|
|
|
#[cfg(unix)]
|
|
|
|
let signal = status.signal();
|
|
|
|
#[cfg(not(unix))]
|
|
|
|
let signal: Option<i32> = None;
|
|
|
|
|
|
|
|
let status = if let Some(signal) = signal {
|
|
|
|
ChildStatus {
|
|
|
|
success: false,
|
|
|
|
code: 128 + signal,
|
|
|
|
#[cfg(unix)]
|
|
|
|
signal: Some(
|
|
|
|
crate::ops::signal::signal_int_to_str(signal)?.to_string(),
|
|
|
|
),
|
|
|
|
#[cfg(not(unix))]
|
|
|
|
signal: None,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
let code = code.expect("Should have either an exit code or a signal.");
|
|
|
|
|
|
|
|
ChildStatus {
|
|
|
|
success: code == 0,
|
|
|
|
code,
|
|
|
|
signal: None,
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
Ok(status)
|
2020-12-16 11:14:12 -05:00
|
|
|
}
|
2019-11-07 18:52:21 -05:00
|
|
|
}
|
|
|
|
|
2021-04-05 12:40:24 -04:00
|
|
|
#[derive(Serialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
2023-03-05 07:19:34 -05:00
|
|
|
pub struct SpawnOutput {
|
|
|
|
status: ChildStatus,
|
2023-06-22 17:37:56 -04:00
|
|
|
stdout: Option<ToJsBuffer>,
|
|
|
|
stderr: Option<ToJsBuffer>,
|
2021-04-05 12:40:24 -04:00
|
|
|
}
|
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
type CreateCommand = (
|
|
|
|
std::process::Command,
|
|
|
|
Option<ResourceId>,
|
|
|
|
Vec<Option<ResourceId>>,
|
|
|
|
Vec<deno_io::RawBiPipeHandle>,
|
|
|
|
);
|
2023-12-13 05:14:16 -05:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
fn create_command(
|
|
|
|
state: &mut OpState,
|
2024-06-07 13:21:32 -04:00
|
|
|
mut args: SpawnArgs,
|
2023-03-05 07:19:34 -05:00
|
|
|
api_name: &str,
|
2023-12-13 05:14:16 -05:00
|
|
|
) -> Result<CreateCommand, AnyError> {
|
2022-09-27 16:36:33 -04:00
|
|
|
state
|
2023-01-07 11:25:34 -05:00
|
|
|
.borrow_mut::<PermissionsContainer>()
|
2023-03-05 07:19:34 -05:00
|
|
|
.check_run(&args.cmd, api_name)?;
|
|
|
|
|
|
|
|
let mut command = std::process::Command::new(args.cmd);
|
|
|
|
|
|
|
|
#[cfg(windows)]
|
|
|
|
if args.windows_raw_arguments {
|
|
|
|
for arg in args.args.iter() {
|
|
|
|
command.raw_arg(arg);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
command.args(args.args);
|
|
|
|
}
|
2021-08-04 15:47:43 -04:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
#[cfg(not(windows))]
|
|
|
|
command.args(args.args);
|
|
|
|
|
|
|
|
if let Some(cwd) = args.cwd {
|
|
|
|
command.current_dir(cwd);
|
2021-08-04 15:47:43 -04:00
|
|
|
}
|
2023-03-05 07:19:34 -05:00
|
|
|
|
|
|
|
if args.clear_env {
|
|
|
|
command.env_clear();
|
2019-08-26 08:50:21 -04:00
|
|
|
}
|
2023-03-05 07:19:34 -05:00
|
|
|
command.envs(args.env);
|
2019-08-14 11:03:02 -04:00
|
|
|
|
2021-09-13 13:26:23 -04:00
|
|
|
#[cfg(unix)]
|
2023-03-05 07:19:34 -05:00
|
|
|
if let Some(gid) = args.gid {
|
|
|
|
command.gid(gid);
|
2021-09-13 13:26:23 -04:00
|
|
|
}
|
|
|
|
#[cfg(unix)]
|
2023-03-05 07:19:34 -05:00
|
|
|
if let Some(uid) = args.uid {
|
|
|
|
command.uid(uid);
|
2021-09-13 13:26:23 -04:00
|
|
|
}
|
|
|
|
|
2024-06-07 13:21:32 -04:00
|
|
|
if args.stdio.stdin.is_ipc() {
|
|
|
|
args.ipc = Some(0);
|
|
|
|
} else {
|
|
|
|
command.stdin(args.stdio.stdin.as_stdio(state)?);
|
|
|
|
}
|
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
command.stdout(match args.stdio.stdout {
|
2024-06-07 13:21:32 -04:00
|
|
|
StdioOrRid::Stdio(Stdio::Inherit) => StdioOrRid::Rid(1).as_stdio(state)?,
|
|
|
|
value => value.as_stdio(state)?,
|
2023-03-05 07:19:34 -05:00
|
|
|
});
|
|
|
|
command.stderr(match args.stdio.stderr {
|
2024-06-07 13:21:32 -04:00
|
|
|
StdioOrRid::Stdio(Stdio::Inherit) => StdioOrRid::Rid(2).as_stdio(state)?,
|
|
|
|
value => value.as_stdio(state)?,
|
2023-03-05 07:19:34 -05:00
|
|
|
});
|
|
|
|
|
2023-12-13 05:14:16 -05:00
|
|
|
#[cfg(unix)]
|
|
|
|
// TODO(bartlomieju):
|
|
|
|
#[allow(clippy::undocumented_unsafe_blocks)]
|
|
|
|
unsafe {
|
2024-08-15 12:38:46 -04:00
|
|
|
let mut extra_pipe_rids = Vec::new();
|
|
|
|
let mut fds_to_dup = Vec::new();
|
|
|
|
let mut fds_to_close = Vec::new();
|
|
|
|
let mut ipc_rid = None;
|
2023-12-13 05:14:16 -05:00
|
|
|
if let Some(ipc) = args.ipc {
|
2024-08-15 12:38:46 -04:00
|
|
|
if ipc >= 0 {
|
|
|
|
let (ipc_fd1, ipc_fd2) = deno_io::bi_pipe_pair_raw()?;
|
|
|
|
fds_to_dup.push((ipc_fd2, ipc));
|
|
|
|
fds_to_close.push(ipc_fd2);
|
|
|
|
/* One end returned to parent process (this) */
|
|
|
|
let pipe_rid =
|
|
|
|
state
|
|
|
|
.resource_table
|
|
|
|
.add(deno_node::IpcJsonStreamResource::new(
|
|
|
|
ipc_fd1 as _,
|
|
|
|
deno_node::IpcRefTracker::new(state.external_ops_tracker.clone()),
|
|
|
|
)?);
|
|
|
|
/* The other end passed to child process via NODE_CHANNEL_FD */
|
|
|
|
command.env("NODE_CHANNEL_FD", format!("{}", ipc));
|
|
|
|
ipc_rid = Some(pipe_rid);
|
2023-12-13 05:14:16 -05:00
|
|
|
}
|
2024-08-15 12:38:46 -04:00
|
|
|
}
|
2023-12-13 05:14:16 -05:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
for (i, stdio) in args.extra_stdio.into_iter().enumerate() {
|
|
|
|
// index 0 in `extra_stdio` actually refers to fd 3
|
|
|
|
// because we handle stdin,stdout,stderr specially
|
|
|
|
let fd = (i + 3) as i32;
|
|
|
|
// TODO(nathanwhit): handle inherited, but this relies on the parent process having
|
|
|
|
// fds open already. since we don't generally support dealing with raw fds,
|
|
|
|
// we can't properly support this
|
|
|
|
if matches!(stdio, Stdio::Piped) {
|
|
|
|
let (fd1, fd2) = deno_io::bi_pipe_pair_raw()?;
|
|
|
|
fds_to_dup.push((fd2, fd));
|
|
|
|
fds_to_close.push(fd2);
|
|
|
|
let rid = state.resource_table.add(
|
|
|
|
match deno_io::BiPipeResource::from_raw_handle(fd1) {
|
|
|
|
Ok(v) => v,
|
|
|
|
Err(e) => {
|
|
|
|
log::warn!("Failed to open bidirectional pipe for fd {fd}: {e}");
|
|
|
|
extra_pipe_rids.push(None);
|
|
|
|
continue;
|
2023-12-13 05:14:16 -05:00
|
|
|
}
|
2024-08-15 12:38:46 -04:00
|
|
|
},
|
|
|
|
);
|
|
|
|
extra_pipe_rids.push(Some(rid));
|
|
|
|
} else {
|
|
|
|
extra_pipe_rids.push(None);
|
2023-12-13 05:14:16 -05:00
|
|
|
}
|
2024-08-15 12:38:46 -04:00
|
|
|
}
|
2023-12-13 05:14:16 -05:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
command.pre_exec(move || {
|
|
|
|
for &(src, dst) in &fds_to_dup {
|
|
|
|
if src >= 0 && dst >= 0 {
|
|
|
|
let _fd = libc::dup2(src, dst);
|
|
|
|
libc::close(src);
|
2023-12-13 05:14:16 -05:00
|
|
|
}
|
2024-08-15 12:38:46 -04:00
|
|
|
}
|
|
|
|
libc::setgroups(0, std::ptr::null());
|
|
|
|
Ok(())
|
|
|
|
});
|
2023-12-13 05:14:16 -05:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
Ok((command, ipc_rid, extra_pipe_rids, fds_to_close))
|
2023-12-13 05:14:16 -05:00
|
|
|
}
|
|
|
|
|
2023-12-19 07:37:22 -05:00
|
|
|
#[cfg(windows)]
|
2024-08-15 12:38:46 -04:00
|
|
|
{
|
|
|
|
let mut ipc_rid = None;
|
|
|
|
let mut handles_to_close = Vec::with_capacity(1);
|
2023-12-19 07:37:22 -05:00
|
|
|
if let Some(ipc) = args.ipc {
|
2024-08-15 12:38:46 -04:00
|
|
|
if ipc >= 0 {
|
|
|
|
let (hd1, hd2) = deno_io::bi_pipe_pair_raw()?;
|
2023-12-19 07:37:22 -05:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
/* One end returned to parent process (this) */
|
|
|
|
let pipe_rid = Some(state.resource_table.add(
|
|
|
|
deno_node::IpcJsonStreamResource::new(
|
|
|
|
hd1 as i64,
|
|
|
|
deno_node::IpcRefTracker::new(state.external_ops_tracker.clone()),
|
|
|
|
)?,
|
|
|
|
));
|
2023-12-19 07:37:22 -05:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
/* The other end passed to child process via NODE_CHANNEL_FD */
|
|
|
|
command.env("NODE_CHANNEL_FD", format!("{}", hd2 as i64));
|
2023-12-19 07:37:22 -05:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
handles_to_close.push(hd2);
|
2023-12-19 07:37:22 -05:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
ipc_rid = pipe_rid;
|
2023-12-19 07:37:22 -05:00
|
|
|
}
|
2024-08-15 12:38:46 -04:00
|
|
|
}
|
2023-12-19 07:37:22 -05:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
if args.extra_stdio.iter().any(|s| matches!(s, Stdio::Piped)) {
|
|
|
|
log::warn!(
|
|
|
|
"Additional stdio pipes beyond stdin/stdout/stderr are not currently supported on windows"
|
|
|
|
);
|
2023-12-19 07:37:22 -05:00
|
|
|
}
|
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
Ok((command, ipc_rid, vec![], handles_to_close))
|
|
|
|
}
|
2023-03-05 07:19:34 -05:00
|
|
|
}
|
2019-08-14 11:03:02 -04:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
#[derive(Serialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
|
|
|
struct Child {
|
|
|
|
rid: ResourceId,
|
|
|
|
pid: u32,
|
|
|
|
stdin_rid: Option<ResourceId>,
|
|
|
|
stdout_rid: Option<ResourceId>,
|
|
|
|
stderr_rid: Option<ResourceId>,
|
2024-08-15 12:38:46 -04:00
|
|
|
ipc_pipe_rid: Option<ResourceId>,
|
|
|
|
extra_pipe_rids: Vec<Option<ResourceId>>,
|
2023-03-05 07:19:34 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn spawn_child(
|
|
|
|
state: &mut OpState,
|
|
|
|
command: std::process::Command,
|
2024-08-15 12:38:46 -04:00
|
|
|
ipc_pipe_rid: Option<ResourceId>,
|
|
|
|
extra_pipe_rids: Vec<Option<ResourceId>>,
|
2023-03-05 07:19:34 -05:00
|
|
|
) -> Result<Child, AnyError> {
|
|
|
|
let mut command = tokio::process::Command::from(command);
|
|
|
|
// TODO(@crowlkats): allow detaching processes.
|
|
|
|
// currently deno will orphan a process when exiting with an error or Deno.exit()
|
2019-12-30 08:57:17 -05:00
|
|
|
// We want to kill child when it's closed
|
2023-03-05 07:19:34 -05:00
|
|
|
command.kill_on_drop(true);
|
|
|
|
|
2023-09-18 13:48:54 -04:00
|
|
|
let mut child = match command.spawn() {
|
|
|
|
Ok(child) => child,
|
|
|
|
Err(err) => {
|
|
|
|
let command = command.as_std();
|
|
|
|
let command_name = command.get_program().to_string_lossy();
|
|
|
|
|
|
|
|
if let Some(cwd) = command.get_current_dir() {
|
|
|
|
// launching a sub process always depends on the real
|
|
|
|
// file system so using these methods directly is ok
|
|
|
|
#[allow(clippy::disallowed_methods)]
|
|
|
|
if !cwd.exists() {
|
|
|
|
return Err(
|
|
|
|
std::io::Error::new(
|
|
|
|
std::io::ErrorKind::NotFound,
|
|
|
|
format!(
|
|
|
|
"Failed to spawn '{}': No such cwd '{}'",
|
|
|
|
command_name,
|
|
|
|
cwd.to_string_lossy()
|
|
|
|
),
|
|
|
|
)
|
|
|
|
.into(),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[allow(clippy::disallowed_methods)]
|
|
|
|
if !cwd.is_dir() {
|
|
|
|
return Err(
|
|
|
|
std::io::Error::new(
|
|
|
|
std::io::ErrorKind::NotFound,
|
|
|
|
format!(
|
|
|
|
"Failed to spawn '{}': cwd is not a directory '{}'",
|
|
|
|
command_name,
|
|
|
|
cwd.to_string_lossy()
|
|
|
|
),
|
|
|
|
)
|
|
|
|
.into(),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return Err(AnyError::from(err).context(format!(
|
|
|
|
"Failed to spawn '{}'",
|
|
|
|
command.get_program().to_string_lossy()
|
|
|
|
)));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
let pid = child.id().expect("Process ID should be set.");
|
|
|
|
|
|
|
|
let stdin_rid = child
|
|
|
|
.stdin
|
|
|
|
.take()
|
|
|
|
.map(|stdin| state.resource_table.add(ChildStdinResource::from(stdin)));
|
2019-11-07 18:52:21 -05:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
let stdout_rid = child
|
|
|
|
.stdout
|
|
|
|
.take()
|
|
|
|
.map(|stdout| state.resource_table.add(ChildStdoutResource::from(stdout)));
|
2019-08-14 11:03:02 -04:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
let stderr_rid = child
|
|
|
|
.stderr
|
|
|
|
.take()
|
|
|
|
.map(|stderr| state.resource_table.add(ChildStderrResource::from(stderr)));
|
|
|
|
|
2023-05-11 08:53:45 -04:00
|
|
|
let child_rid = state
|
|
|
|
.resource_table
|
|
|
|
.add(ChildResource(RefCell::new(child), pid));
|
2023-03-05 07:19:34 -05:00
|
|
|
|
|
|
|
Ok(Child {
|
2021-04-05 12:40:24 -04:00
|
|
|
rid: child_rid,
|
|
|
|
pid,
|
|
|
|
stdin_rid,
|
|
|
|
stdout_rid,
|
|
|
|
stderr_rid,
|
2024-08-15 12:38:46 -04:00
|
|
|
ipc_pipe_rid,
|
|
|
|
extra_pipe_rids,
|
2021-04-05 12:40:24 -04:00
|
|
|
})
|
2019-08-26 08:50:21 -04:00
|
|
|
}
|
2019-08-24 16:20:48 -04:00
|
|
|
|
2024-08-15 12:38:46 -04:00
|
|
|
fn close_raw_handle(handle: deno_io::RawBiPipeHandle) {
|
|
|
|
#[cfg(unix)]
|
|
|
|
{
|
|
|
|
// SAFETY: libc call
|
|
|
|
unsafe {
|
|
|
|
libc::close(handle);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
|
|
{
|
|
|
|
// SAFETY: win32 call
|
|
|
|
unsafe {
|
|
|
|
windows_sys::Win32::Foundation::CloseHandle(handle as _);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-11 18:10:43 -04:00
|
|
|
#[op2]
|
|
|
|
#[serde]
|
2023-03-05 07:19:34 -05:00
|
|
|
fn op_spawn_child(
|
|
|
|
state: &mut OpState,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[serde] args: SpawnArgs,
|
|
|
|
#[string] api_name: String,
|
2023-03-05 07:19:34 -05:00
|
|
|
) -> Result<Child, AnyError> {
|
2024-08-15 12:38:46 -04:00
|
|
|
let (command, pipe_rid, extra_pipe_rids, handles_to_close) =
|
|
|
|
create_command(state, args, &api_name)?;
|
|
|
|
let child = spawn_child(state, command, pipe_rid, extra_pipe_rids);
|
|
|
|
for handle in handles_to_close {
|
|
|
|
close_raw_handle(handle);
|
|
|
|
}
|
|
|
|
child
|
2019-08-14 11:03:02 -04:00
|
|
|
}
|
|
|
|
|
2023-09-13 18:01:31 -04:00
|
|
|
#[op2(async)]
|
2023-09-11 19:12:33 -04:00
|
|
|
#[allow(clippy::await_holding_refcell_ref)]
|
2023-09-13 18:01:31 -04:00
|
|
|
#[serde]
|
2023-03-05 07:19:34 -05:00
|
|
|
async fn op_spawn_wait(
|
2020-09-10 09:57:45 -04:00
|
|
|
state: Rc<RefCell<OpState>>,
|
2023-09-13 18:01:31 -04:00
|
|
|
#[smi] rid: ResourceId,
|
2023-03-05 07:19:34 -05:00
|
|
|
) -> Result<ChildStatus, AnyError> {
|
2020-12-16 11:14:12 -05:00
|
|
|
let resource = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
2023-05-11 08:53:45 -04:00
|
|
|
.get::<ChildResource>(rid)?;
|
|
|
|
let result = resource.0.try_borrow_mut()?.wait().await?.try_into();
|
2023-09-13 18:01:31 -04:00
|
|
|
if let Ok(resource) = state.borrow_mut().resource_table.take_any(rid) {
|
|
|
|
resource.close();
|
|
|
|
}
|
2023-05-11 08:53:45 -04:00
|
|
|
result
|
2023-03-05 07:19:34 -05:00
|
|
|
}
|
2020-08-28 11:08:24 -04:00
|
|
|
|
2023-09-11 18:10:43 -04:00
|
|
|
#[op2]
|
|
|
|
#[serde]
|
2023-03-05 07:19:34 -05:00
|
|
|
fn op_spawn_sync(
|
|
|
|
state: &mut OpState,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[serde] args: SpawnArgs,
|
2023-03-05 07:19:34 -05:00
|
|
|
) -> Result<SpawnOutput, AnyError> {
|
2024-06-07 13:21:32 -04:00
|
|
|
let stdout = matches!(args.stdio.stdout, StdioOrRid::Stdio(Stdio::Piped));
|
|
|
|
let stderr = matches!(args.stdio.stderr, StdioOrRid::Stdio(Stdio::Piped));
|
2024-08-15 12:38:46 -04:00
|
|
|
let (mut command, _, _, _) =
|
2023-12-13 05:14:16 -05:00
|
|
|
create_command(state, args, "Deno.Command().outputSync()")?;
|
2023-07-18 19:24:30 -04:00
|
|
|
let output = command.output().with_context(|| {
|
|
|
|
format!(
|
2023-09-18 13:48:54 -04:00
|
|
|
"Failed to spawn '{}'",
|
2023-07-18 19:24:30 -04:00
|
|
|
command.get_program().to_string_lossy()
|
|
|
|
)
|
|
|
|
})?;
|
2023-03-05 07:19:34 -05:00
|
|
|
|
|
|
|
Ok(SpawnOutput {
|
|
|
|
status: output.status.try_into()?,
|
|
|
|
stdout: if stdout {
|
|
|
|
Some(output.stdout.into())
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
},
|
|
|
|
stderr: if stderr {
|
|
|
|
Some(output.stderr.into())
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
},
|
2021-04-05 12:40:24 -04:00
|
|
|
})
|
2019-08-26 08:50:21 -04:00
|
|
|
}
|
|
|
|
|
2023-09-11 18:10:43 -04:00
|
|
|
#[op2(fast)]
|
2023-05-11 08:53:45 -04:00
|
|
|
fn op_spawn_kill(
|
|
|
|
state: &mut OpState,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[smi] rid: ResourceId,
|
|
|
|
#[string] signal: String,
|
2023-05-11 08:53:45 -04:00
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
if let Ok(child_resource) = state.resource_table.get::<ChildResource>(rid) {
|
|
|
|
deprecated::kill(child_resource.1 as i32, &signal)?;
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
Err(type_error("Child process has already terminated."))
|
|
|
|
}
|
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
mod deprecated {
|
|
|
|
use super::*;
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
|
|
|
pub struct RunArgs {
|
|
|
|
cmd: Vec<String>,
|
|
|
|
cwd: Option<String>,
|
|
|
|
clear_env: bool,
|
|
|
|
env: Vec<(String, String)>,
|
|
|
|
#[cfg(unix)]
|
|
|
|
gid: Option<u32>,
|
|
|
|
#[cfg(unix)]
|
|
|
|
uid: Option<u32>,
|
|
|
|
stdin: StdioOrRid,
|
|
|
|
stdout: StdioOrRid,
|
|
|
|
stderr: StdioOrRid,
|
|
|
|
}
|
2020-12-13 13:45:53 -05:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
struct ChildResource {
|
|
|
|
child: AsyncRefCell<tokio::process::Child>,
|
|
|
|
}
|
2022-06-13 16:39:46 -04:00
|
|
|
|
2023-03-05 07:19:34 -05:00
|
|
|
impl Resource for ChildResource {
|
|
|
|
fn name(&self) -> Cow<str> {
|
|
|
|
"child".into()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ChildResource {
|
|
|
|
fn borrow_mut(self: Rc<Self>) -> AsyncMutFuture<tokio::process::Child> {
|
|
|
|
RcRef::map(self, |r| &r.child).borrow_mut()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Serialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
|
|
|
// TODO(@AaronO): maybe find a more descriptive name or a convention for return structs
|
2023-09-11 18:10:43 -04:00
|
|
|
pub struct RunInfo {
|
2023-03-05 07:19:34 -05:00
|
|
|
rid: ResourceId,
|
|
|
|
pid: Option<u32>,
|
|
|
|
stdin_rid: Option<ResourceId>,
|
|
|
|
stdout_rid: Option<ResourceId>,
|
|
|
|
stderr_rid: Option<ResourceId>,
|
|
|
|
}
|
|
|
|
|
2023-09-11 18:10:43 -04:00
|
|
|
#[op2]
|
|
|
|
#[serde]
|
|
|
|
pub fn op_run(
|
2023-03-05 07:19:34 -05:00
|
|
|
state: &mut OpState,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[serde] run_args: RunArgs,
|
2023-03-05 07:19:34 -05:00
|
|
|
) -> Result<RunInfo, AnyError> {
|
|
|
|
let args = run_args.cmd;
|
|
|
|
state
|
|
|
|
.borrow_mut::<PermissionsContainer>()
|
|
|
|
.check_run(&args[0], "Deno.run()")?;
|
|
|
|
let env = run_args.env;
|
|
|
|
let cwd = run_args.cwd;
|
|
|
|
|
2024-01-01 17:22:48 -05:00
|
|
|
let mut c = Command::new(args.first().unwrap());
|
2023-03-05 07:19:34 -05:00
|
|
|
(1..args.len()).for_each(|i| {
|
|
|
|
let arg = args.get(i).unwrap();
|
|
|
|
c.arg(arg);
|
|
|
|
});
|
|
|
|
cwd.map(|d| c.current_dir(d));
|
|
|
|
|
|
|
|
if run_args.clear_env {
|
2023-10-12 11:55:50 -04:00
|
|
|
super::check_unstable(state, UNSTABLE_FEATURE_NAME, "Deno.run.clearEnv");
|
2023-03-05 07:19:34 -05:00
|
|
|
c.env_clear();
|
|
|
|
}
|
|
|
|
for (key, value) in &env {
|
|
|
|
c.env(key, value);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(unix)]
|
|
|
|
if let Some(gid) = run_args.gid {
|
2023-10-12 11:55:50 -04:00
|
|
|
super::check_unstable(state, UNSTABLE_FEATURE_NAME, "Deno.run.gid");
|
2023-03-05 07:19:34 -05:00
|
|
|
c.gid(gid);
|
|
|
|
}
|
|
|
|
#[cfg(unix)]
|
|
|
|
if let Some(uid) = run_args.uid {
|
2023-10-12 11:55:50 -04:00
|
|
|
super::check_unstable(state, UNSTABLE_FEATURE_NAME, "Deno.run.uid");
|
2023-03-05 07:19:34 -05:00
|
|
|
c.uid(uid);
|
|
|
|
}
|
|
|
|
#[cfg(unix)]
|
|
|
|
// TODO(bartlomieju):
|
|
|
|
#[allow(clippy::undocumented_unsafe_blocks)]
|
|
|
|
unsafe {
|
|
|
|
c.pre_exec(|| {
|
|
|
|
libc::setgroups(0, std::ptr::null());
|
|
|
|
Ok(())
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: make this work with other resources, eg. sockets
|
|
|
|
c.stdin(run_args.stdin.as_stdio(state)?);
|
|
|
|
c.stdout(
|
|
|
|
match run_args.stdout {
|
|
|
|
StdioOrRid::Stdio(Stdio::Inherit) => StdioOrRid::Rid(1),
|
|
|
|
value => value,
|
|
|
|
}
|
|
|
|
.as_stdio(state)?,
|
|
|
|
);
|
|
|
|
c.stderr(
|
|
|
|
match run_args.stderr {
|
|
|
|
StdioOrRid::Stdio(Stdio::Inherit) => StdioOrRid::Rid(2),
|
|
|
|
value => value,
|
|
|
|
}
|
|
|
|
.as_stdio(state)?,
|
|
|
|
);
|
|
|
|
|
|
|
|
// We want to kill child when it's closed
|
|
|
|
c.kill_on_drop(true);
|
|
|
|
|
|
|
|
// Spawn the command.
|
|
|
|
let mut child = c.spawn()?;
|
|
|
|
let pid = child.id();
|
|
|
|
|
|
|
|
let stdin_rid = match child.stdin.take() {
|
|
|
|
Some(child_stdin) => {
|
|
|
|
let rid = state
|
|
|
|
.resource_table
|
|
|
|
.add(ChildStdinResource::from(child_stdin));
|
|
|
|
Some(rid)
|
|
|
|
}
|
|
|
|
None => None,
|
|
|
|
};
|
|
|
|
|
|
|
|
let stdout_rid = match child.stdout.take() {
|
|
|
|
Some(child_stdout) => {
|
|
|
|
let rid = state
|
|
|
|
.resource_table
|
|
|
|
.add(ChildStdoutResource::from(child_stdout));
|
|
|
|
Some(rid)
|
|
|
|
}
|
|
|
|
None => None,
|
|
|
|
};
|
|
|
|
|
|
|
|
let stderr_rid = match child.stderr.take() {
|
|
|
|
Some(child_stderr) => {
|
|
|
|
let rid = state
|
|
|
|
.resource_table
|
|
|
|
.add(ChildStderrResource::from(child_stderr));
|
|
|
|
Some(rid)
|
|
|
|
}
|
|
|
|
None => None,
|
|
|
|
};
|
|
|
|
|
|
|
|
let child_resource = ChildResource {
|
|
|
|
child: AsyncRefCell::new(child),
|
|
|
|
};
|
|
|
|
let child_rid = state.resource_table.add(child_resource);
|
|
|
|
|
|
|
|
Ok(RunInfo {
|
|
|
|
rid: child_rid,
|
|
|
|
pid,
|
|
|
|
stdin_rid,
|
|
|
|
stdout_rid,
|
|
|
|
stderr_rid,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Serialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
2023-09-11 18:10:43 -04:00
|
|
|
pub struct ProcessStatus {
|
2023-03-05 07:19:34 -05:00
|
|
|
got_signal: bool,
|
|
|
|
exit_code: i32,
|
|
|
|
exit_signal: i32,
|
|
|
|
}
|
|
|
|
|
2023-09-11 18:10:43 -04:00
|
|
|
#[op2(async)]
|
|
|
|
#[serde]
|
|
|
|
pub async fn op_run_status(
|
2023-03-05 07:19:34 -05:00
|
|
|
state: Rc<RefCell<OpState>>,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[smi] rid: ResourceId,
|
2023-03-05 07:19:34 -05:00
|
|
|
) -> Result<ProcessStatus, AnyError> {
|
|
|
|
let resource = state
|
|
|
|
.borrow_mut()
|
|
|
|
.resource_table
|
|
|
|
.get::<ChildResource>(rid)?;
|
|
|
|
let mut child = resource.borrow_mut().await;
|
|
|
|
let run_status = child.wait().await?;
|
|
|
|
let code = run_status.code();
|
|
|
|
|
|
|
|
#[cfg(unix)]
|
|
|
|
let signal = run_status.signal();
|
|
|
|
#[cfg(not(unix))]
|
2023-08-27 00:04:12 -04:00
|
|
|
let signal = Default::default();
|
2023-03-05 07:19:34 -05:00
|
|
|
|
|
|
|
code
|
|
|
|
.or(signal)
|
|
|
|
.expect("Should have either an exit code or a signal.");
|
|
|
|
let got_signal = signal.is_some();
|
|
|
|
|
|
|
|
Ok(ProcessStatus {
|
|
|
|
got_signal,
|
|
|
|
exit_code: code.unwrap_or(-1),
|
|
|
|
exit_signal: signal.unwrap_or(-1),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(unix)]
|
|
|
|
pub fn kill(pid: i32, signal: &str) -> Result<(), AnyError> {
|
2023-03-06 09:16:50 -05:00
|
|
|
let signo = super::super::signal::signal_str_to_int(signal)?;
|
2023-03-05 07:19:34 -05:00
|
|
|
use nix::sys::signal::kill as unix_kill;
|
|
|
|
use nix::sys::signal::Signal;
|
|
|
|
use nix::unistd::Pid;
|
|
|
|
let sig = Signal::try_from(signo)?;
|
|
|
|
unix_kill(Pid::from_raw(pid), Option::Some(sig)).map_err(AnyError::from)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(not(unix))]
|
|
|
|
pub fn kill(pid: i32, signal: &str) -> Result<(), AnyError> {
|
|
|
|
use std::io::Error;
|
|
|
|
use std::io::ErrorKind::NotFound;
|
|
|
|
use winapi::shared::minwindef::DWORD;
|
|
|
|
use winapi::shared::minwindef::FALSE;
|
|
|
|
use winapi::shared::minwindef::TRUE;
|
|
|
|
use winapi::shared::winerror::ERROR_INVALID_PARAMETER;
|
|
|
|
use winapi::um::errhandlingapi::GetLastError;
|
|
|
|
use winapi::um::handleapi::CloseHandle;
|
|
|
|
use winapi::um::processthreadsapi::OpenProcess;
|
|
|
|
use winapi::um::processthreadsapi::TerminateProcess;
|
|
|
|
use winapi::um::winnt::PROCESS_TERMINATE;
|
|
|
|
|
|
|
|
if !matches!(signal, "SIGKILL" | "SIGTERM") {
|
|
|
|
Err(type_error(format!("Invalid signal: {signal}")))
|
|
|
|
} else if pid <= 0 {
|
|
|
|
Err(type_error("Invalid pid"))
|
2021-01-13 23:52:12 -05:00
|
|
|
} else {
|
2023-03-05 07:19:34 -05:00
|
|
|
let handle =
|
2023-03-06 09:16:50 -05:00
|
|
|
// SAFETY: winapi call
|
2023-03-05 07:19:34 -05:00
|
|
|
unsafe { OpenProcess(PROCESS_TERMINATE, FALSE, pid as DWORD) };
|
|
|
|
|
|
|
|
if handle.is_null() {
|
|
|
|
// SAFETY: winapi call
|
|
|
|
let err = match unsafe { GetLastError() } {
|
|
|
|
ERROR_INVALID_PARAMETER => Error::from(NotFound), // Invalid `pid`.
|
|
|
|
errno => Error::from_raw_os_error(errno as i32),
|
|
|
|
};
|
|
|
|
Err(err.into())
|
|
|
|
} else {
|
|
|
|
// SAFETY: winapi calls
|
|
|
|
unsafe {
|
|
|
|
let is_terminated = TerminateProcess(handle, 1);
|
|
|
|
CloseHandle(handle);
|
|
|
|
match is_terminated {
|
|
|
|
FALSE => Err(Error::last_os_error().into()),
|
|
|
|
TRUE => Ok(()),
|
|
|
|
_ => unreachable!(),
|
|
|
|
}
|
2022-07-15 12:30:25 -04:00
|
|
|
}
|
2020-12-13 13:45:53 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-11 18:10:43 -04:00
|
|
|
#[op2(fast)]
|
|
|
|
pub fn op_kill(
|
2023-03-05 07:19:34 -05:00
|
|
|
state: &mut OpState,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[smi] pid: i32,
|
|
|
|
#[string] signal: String,
|
|
|
|
#[string] api_name: String,
|
2023-03-05 07:19:34 -05:00
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
state
|
|
|
|
.borrow_mut::<PermissionsContainer>()
|
|
|
|
.check_run_all(&api_name)?;
|
|
|
|
kill(pid, &signal)?;
|
|
|
|
Ok(())
|
|
|
|
}
|
2019-08-14 11:03:02 -04:00
|
|
|
}
|