mirror of
				https://gitlab.freedesktop.org/pipewire/pipewire.git
				synced 2025-11-03 09:01:54 -05:00 
			
		
		
		
	We use the remote name as a suffix for the default server address and so it should not contain any slashes. Take everything after the last slash if there is one.
		
			
				
	
	
		
			228 lines
		
	
	
	
		
			5.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			228 lines
		
	
	
	
		
			5.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* PipeWire */
 | 
						|
/* SPDX-FileCopyrightText: Copyright © 2020 Wim Taymans */
 | 
						|
/* SPDX-License-Identifier: MIT */
 | 
						|
 | 
						|
#include "config.h"
 | 
						|
 | 
						|
#include <errno.h>
 | 
						|
#include <stdlib.h>
 | 
						|
#include <stdio.h>
 | 
						|
#include <string.h>
 | 
						|
#include <limits.h>
 | 
						|
 | 
						|
#include <fcntl.h>
 | 
						|
#include <unistd.h>
 | 
						|
#include <sys/socket.h>
 | 
						|
#include <sys/stat.h>
 | 
						|
#include <sys/types.h>
 | 
						|
#ifdef HAVE_SYS_VFS_H
 | 
						|
#include <sys/vfs.h>
 | 
						|
#endif
 | 
						|
#ifdef HAVE_PWD_H
 | 
						|
#include <pwd.h>
 | 
						|
#endif
 | 
						|
 | 
						|
#include <spa/utils/result.h>
 | 
						|
#include <pipewire/context.h>
 | 
						|
#include <pipewire/log.h>
 | 
						|
#include <pipewire/keys.h>
 | 
						|
 | 
						|
#include "log.h"
 | 
						|
#include "utils.h"
 | 
						|
 | 
						|
int get_runtime_dir(char *buf, size_t buflen)
 | 
						|
{
 | 
						|
	const char *runtime_dir, *dir = NULL;
 | 
						|
	struct stat stat_buf;
 | 
						|
	int res, size;
 | 
						|
 | 
						|
	runtime_dir = getenv("PULSE_RUNTIME_PATH");
 | 
						|
	if (runtime_dir == NULL) {
 | 
						|
		runtime_dir = getenv("XDG_RUNTIME_DIR");
 | 
						|
		dir = "pulse";
 | 
						|
	}
 | 
						|
	if (runtime_dir == NULL) {
 | 
						|
		pw_log_error("could not find a suitable runtime directory in"
 | 
						|
				"$PULSE_RUNTIME_PATH and $XDG_RUNTIME_DIR");
 | 
						|
		return -ENOENT;
 | 
						|
	}
 | 
						|
 | 
						|
	size = snprintf(buf, buflen, "%s%s%s", runtime_dir,
 | 
						|
			dir ? "/" : "", dir ? dir : "");
 | 
						|
	if (size < 0)
 | 
						|
		return -errno;
 | 
						|
	if ((size_t) size >= buflen) {
 | 
						|
		pw_log_error("path %s%s%s too long", runtime_dir,
 | 
						|
				dir ? "/" : "", dir ? dir : "");
 | 
						|
		return -ENAMETOOLONG;
 | 
						|
	}
 | 
						|
 | 
						|
	if (stat(buf, &stat_buf) < 0) {
 | 
						|
		res = -errno;
 | 
						|
		if (res != -ENOENT) {
 | 
						|
			pw_log_error("stat() %s failed: %m", buf);
 | 
						|
			return res;
 | 
						|
		}
 | 
						|
		if (mkdir(buf, 0700) < 0) {
 | 
						|
			res = -errno;
 | 
						|
			pw_log_error("mkdir() %s failed: %m", buf);
 | 
						|
			return res;
 | 
						|
		}
 | 
						|
		pw_log_info("created %s", buf);
 | 
						|
	} else if (!S_ISDIR(stat_buf.st_mode)) {
 | 
						|
		pw_log_error("%s is not a directory", buf);
 | 
						|
		return -ENOTDIR;
 | 
						|
	}
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
int check_flatpak(struct client *client, pid_t pid)
 | 
						|
{
 | 
						|
	char root_path[2048];
 | 
						|
	int root_fd, info_fd, res;
 | 
						|
	struct stat stat_buf;
 | 
						|
 | 
						|
	sprintf(root_path, "/proc/%ld/root", (long) pid);
 | 
						|
	root_fd = openat(AT_FDCWD, root_path, O_RDONLY | O_NONBLOCK | O_DIRECTORY | O_CLOEXEC | O_NOCTTY);
 | 
						|
	if (root_fd == -1) {
 | 
						|
		res = -errno;
 | 
						|
		if (res == -EACCES) {
 | 
						|
			struct statfs buf;
 | 
						|
			/* Access to the root dir isn't allowed. This can happen if the root is on a fuse
 | 
						|
			 * filesystem, such as in a toolbox container. We will never have a fuse rootfs
 | 
						|
			 * in the flatpak case, so in that case its safe to ignore this and
 | 
						|
			 * continue to detect other types of apps. */
 | 
						|
			if (statfs(root_path, &buf) == 0 &&
 | 
						|
			    buf.f_type == 0x65735546) /* FUSE_SUPER_MAGIC */
 | 
						|
				return 0;
 | 
						|
		}
 | 
						|
		/* Not able to open the root dir shouldn't happen. Probably the app died and
 | 
						|
		 * we're failing due to /proc/$pid not existing. In that case fail instead
 | 
						|
		 * of treating this as privileged. */
 | 
						|
		pw_log_info("failed to open \"%s\"%s", root_path, spa_strerror(res));
 | 
						|
		return res;
 | 
						|
	}
 | 
						|
	info_fd = openat(root_fd, ".flatpak-info", O_RDONLY | O_CLOEXEC | O_NOCTTY);
 | 
						|
	close(root_fd);
 | 
						|
	if (info_fd == -1) {
 | 
						|
		if (errno == ENOENT) {
 | 
						|
			pw_log_debug("no .flatpak-info, client on the host");
 | 
						|
			/* No file => on the host */
 | 
						|
			return 0;
 | 
						|
		}
 | 
						|
		res = -errno;
 | 
						|
		pw_log_error("error opening .flatpak-info: %m");
 | 
						|
		return res;
 | 
						|
	}
 | 
						|
	if (fstat(info_fd, &stat_buf) != 0 || !S_ISREG(stat_buf.st_mode)) {
 | 
						|
		/* Some weird fd => failure, assume sandboxed */
 | 
						|
		pw_log_error("error fstat .flatpak-info: %m");
 | 
						|
	}
 | 
						|
	close(info_fd);
 | 
						|
	return 1;
 | 
						|
}
 | 
						|
 | 
						|
pid_t get_client_pid(struct client *client, int client_fd)
 | 
						|
{
 | 
						|
	socklen_t len;
 | 
						|
#if defined(__linux__)
 | 
						|
	struct ucred ucred;
 | 
						|
	len = sizeof(ucred);
 | 
						|
	if (getsockopt(client_fd, SOL_SOCKET, SO_PEERCRED, &ucred, &len) < 0) {
 | 
						|
		pw_log_warn("client %p: no peercred: %m", client);
 | 
						|
	} else
 | 
						|
		return ucred.pid;
 | 
						|
#elif defined(__FreeBSD__) || defined(__MidnightBSD__)
 | 
						|
	struct xucred xucred;
 | 
						|
	len = sizeof(xucred);
 | 
						|
	if (getsockopt(client_fd, 0, LOCAL_PEERCRED, &xucred, &len) < 0) {
 | 
						|
		pw_log_warn("client %p: no peercred: %m", client);
 | 
						|
	} else {
 | 
						|
#if __FreeBSD__ >= 13
 | 
						|
		return xucred.cr_pid;
 | 
						|
#endif
 | 
						|
	}
 | 
						|
#endif
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
const char *get_server_name(struct pw_context *context)
 | 
						|
{
 | 
						|
	const char *name = NULL, *sep;
 | 
						|
	const struct pw_properties *props = pw_context_get_properties(context);
 | 
						|
 | 
						|
	name = getenv("PIPEWIRE_REMOTE");
 | 
						|
	if ((name == NULL || name[0] == '\0') && props != NULL)
 | 
						|
		name = pw_properties_get(props, PW_KEY_REMOTE_NAME);
 | 
						|
	if (name != NULL && (sep = strrchr(name, '/')) != NULL)
 | 
						|
		name = sep+1;
 | 
						|
	if (name == NULL || name[0] == '\0')
 | 
						|
		name = PW_DEFAULT_REMOTE;
 | 
						|
	return name;
 | 
						|
}
 | 
						|
 | 
						|
int create_pid_file(void)
 | 
						|
{
 | 
						|
	char pid_file[PATH_MAX];
 | 
						|
	FILE *f;
 | 
						|
	int res;
 | 
						|
 | 
						|
	if ((res = get_runtime_dir(pid_file, sizeof(pid_file))) < 0)
 | 
						|
		return res;
 | 
						|
 | 
						|
	if (strlen(pid_file) > PATH_MAX - sizeof("/pid")) {
 | 
						|
		pw_log_error("path too long: %s/pid", pid_file);
 | 
						|
		return -ENAMETOOLONG;
 | 
						|
	}
 | 
						|
 | 
						|
	strcat(pid_file, "/pid");
 | 
						|
 | 
						|
	if ((f = fopen(pid_file, "we")) == NULL) {
 | 
						|
		res = -errno;
 | 
						|
		pw_log_error("failed to open pid file: %m");
 | 
						|
		return res;
 | 
						|
	}
 | 
						|
 | 
						|
	fprintf(f, "%lu\n", (unsigned long) getpid());
 | 
						|
	fclose(f);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
int notify_startup(void)
 | 
						|
{
 | 
						|
	long v;
 | 
						|
	int fd, res = 0;
 | 
						|
	char *endptr;
 | 
						|
	const char *env = getenv("PIPEWIRE_PULSE_NOTIFICATION_FD");
 | 
						|
 | 
						|
	if (env == NULL || env[0] == '\0')
 | 
						|
		return 0;
 | 
						|
 | 
						|
	errno = 0;
 | 
						|
	v = strtol(env, &endptr, 10);
 | 
						|
	if (endptr[0] != '\0')
 | 
						|
		errno = EINVAL;
 | 
						|
	if (errno != 0) {
 | 
						|
		res = -errno;
 | 
						|
		pw_log_error("can't parse PIPEWIRE_PULSE_NOTIFICATION_FD env: %m");
 | 
						|
		goto error;
 | 
						|
	}
 | 
						|
	fd = (int)v;
 | 
						|
	if (v != fd) {
 | 
						|
		res = -ERANGE;
 | 
						|
		pw_log_error("invalid PIPEWIRE_PULSE_NOTIFICATION_FD %ld: %s", v, spa_strerror(res));
 | 
						|
		goto error;
 | 
						|
	}
 | 
						|
	if (dprintf(fd, "\n") < 0) {
 | 
						|
		res = -errno;
 | 
						|
		pw_log_error("can't signal PIPEWIRE_PULSE_NOTIFICATION_FD: %m");
 | 
						|
		goto error;
 | 
						|
	}
 | 
						|
	close(fd);
 | 
						|
	unsetenv("PIPEWIRE_PULSE_NOTIFICATION_FD");
 | 
						|
	return 0;
 | 
						|
 | 
						|
error:
 | 
						|
	return res;
 | 
						|
}
 |