tools: add pw-container tool

This makes a new custom security context with the given properties
and runs the program in this context.
This commit is contained in:
Wim Taymans 2024-02-08 18:07:21 +01:00
parent 477c6e8e90
commit 81181e255f
3 changed files with 275 additions and 1 deletions

View file

@ -147,7 +147,7 @@ static void test_create(void)
roundtrip(core, loop);
pw_main_loop_run(loop);
unlink(temp);
pw_proxy_destroy((struct pw_proxy*)info.sec);
pw_proxy_destroy((struct pw_proxy*)info.registry);

View file

@ -1,6 +1,7 @@
tools_sources = [
[ 'pw-mon', [ 'pw-mon.c' ] ],
[ 'pw-config', [ 'pw-config.c' ] ],
[ 'pw-container', [ 'pw-container.c' ] ],
[ 'pw-dot', [ 'pw-dot.c' ] ],
[ 'pw-dump', [ 'pw-dump.c' ] ],
[ 'pw-profiler', [ 'pw-profiler.c' ] ],

273
src/tools/pw-container.c Normal file
View file

@ -0,0 +1,273 @@
/* PipeWire */
/* SPDX-FileCopyrightText: Copyright © 2024 Wim Taymans */
/* SPDX-License-Identifier: MIT */
#include <stdio.h>
#include <signal.h>
#include <getopt.h>
#include <unistd.h>
#include <unistd.h>
#include <limits.h>
#include <locale.h>
#include <fcntl.h>
#include <sys/socket.h>
#include <spa/utils/result.h>
#include <spa/utils/string.h>
#include <spa/utils/ansi.h>
#include <spa/debug/pod.h>
#include <spa/debug/format.h>
#include <spa/debug/types.h>
#include <pipewire/pipewire.h>
#include <pipewire/extensions/security-context.h>
struct data {
struct pw_main_loop *loop;
struct pw_context *context;
struct pw_core *core;
struct spa_hook core_listener;
struct pw_registry *registry;
struct spa_hook registry_listener;
struct pw_security_context *sec;
int pending;
int done;
};
static void registry_event_global(void *data, uint32_t id,
uint32_t permissions, const char *type, uint32_t version,
const struct spa_dict *props)
{
struct data *d = data;
if (spa_streq(type, PW_TYPE_INTERFACE_SecurityContext))
d->sec = pw_registry_bind(d->registry, id, type, version, 0);
}
static void registry_event_global_remove(void *data, uint32_t id)
{
}
static const struct pw_registry_events registry_events = {
PW_VERSION_REGISTRY_EVENTS,
.global = registry_event_global,
.global_remove = registry_event_global_remove,
};
static void on_core_error(void *_data, uint32_t id, int seq, int res, const char *message)
{
struct data *data = _data;
pw_log_error("error id:%u seq:%d res:%d (%s): %s",
id, seq, res, spa_strerror(res), message);
if (id == PW_ID_CORE && res == -EPIPE) {
data->done = true;
pw_main_loop_quit(data->loop);
}
}
static const struct pw_core_events core_events = {
PW_VERSION_CORE_EVENTS,
.error = on_core_error,
};
static void core_event_done(void *object, uint32_t id, int seq)
{
struct data *data = object;
if (id == PW_ID_CORE && seq == data->pending) {
data->done = true;
pw_main_loop_quit(data->loop);
}
}
static int roundtrip(struct data *data)
{
struct spa_hook core_listener;
const struct pw_core_events core_events = {
PW_VERSION_CORE_EVENTS,
.done = core_event_done,
};
spa_zero(core_listener);
pw_core_add_listener(data->core, &core_listener,
&core_events, data);
data->done = false;
data->pending = pw_core_sync(data->core, PW_ID_CORE, 0);
while (!data->done)
pw_main_loop_run(data->loop);
spa_hook_remove(&core_listener);
return 0;
}
static void do_quit(void *data, int signal_number)
{
struct data *d = data;
pw_main_loop_quit(d->loop);
}
static void show_help(const char *name, bool error)
{
fprintf(error ? stderr : stdout, "%s [options] [application]\n"
" -h, --help Show this help\n"
" --version Show version\n"
" -r, --remote Remote daemon name\n"
" -P, --properties Context properties\n",
name);
}
int main(int argc, char *argv[])
{
struct data data = { 0 };
struct pw_loop *l;
const char *opt_remote = NULL;
static const struct option long_options[] = {
{ "help", no_argument, NULL, 'h' },
{ "version", no_argument, NULL, 'V' },
{ "remote", required_argument, NULL, 'r' },
{ "properties", required_argument, NULL, 'P' },
{ NULL, 0, NULL, 0}
};
int c, res, listen_fd, close_fd[2];
char temp[PATH_MAX] = "/tmp/pipewire-XXXXXX";
struct sockaddr_un sockaddr = {0};
struct pw_properties *props;
props = pw_properties_new(
PW_KEY_SEC_ENGINE, "org.flatpak",
PW_KEY_ACCESS, "restricted",
NULL);
setlocale(LC_ALL, "");
pw_init(&argc, &argv);
while ((c = getopt_long(argc, argv, "hVr:P:", long_options, NULL)) != -1) {
switch (c) {
case 'h':
show_help(argv[0], false);
return 0;
case 'V':
printf("%s\n"
"Compiled with libpipewire %s\n"
"Linked with libpipewire %s\n",
argv[0],
pw_get_headers_version(),
pw_get_library_version());
return 0;
case 'r':
opt_remote = optarg;
break;
case 'P':
pw_properties_update_string(props, optarg, strlen(optarg));
break;
default:
show_help(argv[0], true);
return -1;
}
}
data.loop = pw_main_loop_new(NULL);
if (data.loop == NULL) {
fprintf(stderr, "can't create main loop: %m\n");
return -1;
}
l = pw_main_loop_get_loop(data.loop);
pw_loop_add_signal(l, SIGINT, do_quit, &data);
pw_loop_add_signal(l, SIGTERM, do_quit, &data);
data.context = pw_context_new(l, NULL, 0);
if (data.context == NULL) {
fprintf(stderr, "can't create context: %m\n");
return -1;
}
data.core = pw_context_connect(data.context,
pw_properties_new(
PW_KEY_REMOTE_NAME, opt_remote ? opt_remote :
("[" PW_DEFAULT_REMOTE "-manager," PW_DEFAULT_REMOTE "]"),
NULL),
0);
if (data.core == NULL) {
fprintf(stderr, "can't connect: %m\n");
return -1;
}
pw_core_add_listener(data.core,
&data.core_listener,
&core_events, &data);
data.registry = pw_core_get_registry(data.core,
PW_VERSION_REGISTRY, 0);
pw_registry_add_listener(data.registry,
&data.registry_listener,
&registry_events, &data);
roundtrip(&data);
if (data.sec == NULL) {
fprintf(stderr, "no security context object found");
return -1;
}
res = mkstemp(temp);
if (res < 0) {
fprintf(stderr, "can't make temp file with template %s: %m", temp);
return -1;
}
close(res);
unlink(temp);
listen_fd = socket(AF_UNIX, SOCK_STREAM, 0);
if (listen_fd < 0) {
fprintf(stderr, "can't make unix socket: %m");
return -1;
}
sockaddr.sun_family = AF_UNIX;
snprintf(sockaddr.sun_path, sizeof(sockaddr.sun_path), "%s", temp);
if (bind(listen_fd, (struct sockaddr *) &sockaddr, sizeof (sockaddr)) != 0) {
fprintf(stderr, "can't bind unix socket to %s: %m", temp);
return -1;
}
if (listen(listen_fd, 0) != 0) {
fprintf(stderr, "can't listen unix socket: %m");
return -1;
}
res = pipe2(close_fd, O_CLOEXEC);
if (res < 0) {
fprintf(stderr, "can't create pipe: %m");
return -1;
}
setenv("PIPEWIRE_REMOTE", temp, 1);
pw_security_context_create(data.sec, listen_fd, close_fd[1], &props->dict);
roundtrip(&data);
if (optind < argc) {
system(argv[optind++]);
} else {
fprintf(stdout, "new socket: %s\n", temp);
pw_main_loop_run(data.loop);
}
unlink(temp);
spa_hook_remove(&data.registry_listener);
pw_proxy_destroy((struct pw_proxy*)data.sec);
pw_proxy_destroy((struct pw_proxy*)data.registry);
spa_hook_remove(&data.core_listener);
pw_context_destroy(data.context);
pw_main_loop_destroy(data.loop);
pw_properties_free(props);
pw_deinit();
return 0;
}