Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in / Register
Toggle navigation
C
capnproto
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Packages
Packages
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
submodule
capnproto
Commits
84c7ba81
Commit
84c7ba81
authored
Apr 18, 2019
by
Kenton Varda
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Extend rpc.capnp to define how to attach file descriptors to capabilities.
This is just the protocol change, not implementation.
parent
65b4f247
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
127 additions
and
25 deletions
+127
-25
rpc.capnp
c++/src/capnp/rpc.capnp
+67
-0
rpc.capnp.c++
c++/src/capnp/rpc.capnp.c++
+41
-25
rpc.capnp.h
c++/src/capnp/rpc.capnp.h
+19
-0
No files found.
c++/src/capnp/rpc.capnp
View file @
84c7ba81
...
...
@@ -988,6 +988,63 @@ struct CapDescriptor {
# Level 1 and 2 implementations that receive a `thirdPartyHosted` may simply send calls to its
# `vine` instead.
}
attachedFd @6 :UInt8 = 0xff;
# If the RPC message in which this CapDescriptor was delivered also had file descirptors
# attached, and `fd` is a valid index into the list of attached file descriptors, then
# that file descriptor should be attached to this capability. If `attachedFd` is out-of-bounds
# for said list, then no FD is attached.
#
# For example, if the RPC message arrived over a Unix socket, then file descriptors may be
# attached by sending an SCM_RIGHTS ancillary message attached to the data bytes making up the
# raw message. Receivers who wish to opt into FD passing should arrange to receive SCM_RIGHTS
# whenever receiving an RPC message. Senders who wish to send FDs need not verify whether the
# receiver knows how to receive them, because the operating system will automatically discard
# ancillary messages like SCM_RIGHTS if the receiver doesn't ask to receive them, including
# automatically closing any FDs.
#
# It is up to the application protocol to define what capabilities are expected to have file
# descriptors attached, and what those FDs mean. But, for example, an application could use this
# to open a file on disk and then transmit the open file descriptor to a sandboxed process that
# does not otherwise have permission to access the filesystem directly. This is usually an
# optimization: the sending process could instead provide an RPC interface supporting all the
# operations needed (such as reading and writing a file), but by passing the file descriptor
# directly, the recipient can often perform operations much more efficiently. Application
# designers are encouraged to provide such RPC interfaces and automatically fall back to them
# when FD passing is not available, so that the application can still work when the parties are
# remote over a network.
#
# An attached FD is most often associated with a `senderHosted` descriptor. It could also make
# sense in the case of `thirdPartyHosted`: in this case, the sender is forwarding the FD that
# they received from the third party, so that the receiver can start using it without first
# interacting with the third party. This is an optional optimization -- the middleman may choose
# not to forward capabilities, in which case the receiver will need to complete the handshake
# with the third party directly before receiving the FD. If an implementation receives a second
# attached FD after having already received one previously (e.g. both in a `thirdPartyHosted`
# CapDescriptor and then later again when receiving the final capability directly from the
# third party), the implementation should discard the later FD and stick with the original. At
# present, there is no known reason why other capability types (e.g. `receiverHosted`) would want
# to carry an attached FD, but we reserve the right to define a meaning for this in the future.
#
# Each file descriptor attached to the message must be used in no more than one CapDescriptor,
# so that the receiver does not need to use dup() or refcounting to handle the possibility of
# multiple capabilities using the same descriptor. If multiple CapDescriptors do point to the
# same FD index, then the receiver can arbitrarily choose which capability ends up having the
# FD attached.
#
# To mitigate DoS attacks, RPC implementations should limit the number of FDs they are willing to
# receive in a single message to a small value. If a message happens to contain more than that,
# the list is truncated. Moreover, in some cases, FD passing needs to be blocked entirely for
# security or implementation reasons, in which case the list may be truncated to zero. Hence,
# `attachedFd` might point past the end of the list, which the implementation should treat as if
# no FD was attached at all.
#
# The type of this field was chosen to be UInt8 because Linux supports sending only a maximum
# of 253 file descriptors in an SCM_RIGHTS message anyway, and CapDescriptor had two bytes of
# padding left -- so after adding this, there is still one byte for a future feature.
# Conveniently, this also means we're able to use 0xff as the default value, which will always
# be out-of-range (of course, the implementation should explicitly enforce that 255 descriptors
# cannot be sent at once, rather than relying on Linux to do so).
}
struct PromisedAnswer {
...
...
@@ -1256,6 +1313,11 @@ using RecipientId = AnyPointer;
#
# In a network where each vat has a public/private key pair, this could simply be the public key
# fingerprint of the recipient along with a nonce matching the one in the `ProvisionId`.
#
# As another example, when communicating between processes on the same machine over Unix sockets,
# RecipientId could simply refer to a file descriptor attached to the message via SCM_RIGHTS.
# This file descriptor would be one end of a newly-created socketpair, with the other end having
# been sent to the capability's recipient in ThirdPartyCapId.
using ThirdPartyCapId = AnyPointer;
# **(level 3)**
...
...
@@ -1266,6 +1328,11 @@ using ThirdPartyCapId = AnyPointer;
# third party's public key fingerprint, hints on how to connect to the third party (e.g. an IP
# address), and the nonce used in the corresponding `Provide` message's `RecipientId` as sent
# to that third party (used to identify which capability to pick up).
#
# As another example, when communicating between processes on the same machine over Unix sockets,
# ThirdPartyCapId could simply refer to a file descriptor attached to the message via SCM_RIGHTS.
# This file descriptor would be one end of a newly-created socketpair, with the other end having
# been sent to the process hosting the capability in RecipientId.
using JoinKeyPart = AnyPointer;
# **(level 4)**
...
...
c++/src/capnp/rpc.capnp.c++
View file @
84c7ba81
...
...
@@ -1413,7 +1413,7 @@ const ::capnp::_::RawSchema s_9a0e61223d96743b = {
1
,
2
,
i_9a0e61223d96743b
,
nullptr
,
nullptr
,
{
&
s_9a0e61223d96743b
,
nullptr
,
nullptr
,
0
,
0
,
nullptr
}
};
#endif // !CAPNP_LITE
static
const
::
capnp
::
_
::
AlignedData
<
1
14
>
b_8523ddc40b86b8b0
=
{
static
const
::
capnp
::
_
::
AlignedData
<
1
30
>
b_8523ddc40b86b8b0
=
{
{
0
,
0
,
0
,
0
,
5
,
0
,
6
,
0
,
176
,
184
,
134
,
11
,
196
,
221
,
35
,
133
,
16
,
0
,
0
,
0
,
1
,
0
,
1
,
0
,
...
...
@@ -1423,7 +1423,7 @@ static const ::capnp::_::AlignedData<114> b_8523ddc40b86b8b0 = {
21
,
0
,
0
,
0
,
242
,
0
,
0
,
0
,
33
,
0
,
0
,
0
,
7
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
29
,
0
,
0
,
0
,
87
,
1
,
0
,
0
,
29
,
0
,
0
,
0
,
143
,
1
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
99
,
97
,
112
,
110
,
112
,
47
,
114
,
112
,
...
...
@@ -1431,49 +1431,56 @@ static const ::capnp::_::AlignedData<114> b_8523ddc40b86b8b0 = {
67
,
97
,
112
,
68
,
101
,
115
,
99
,
114
,
105
,
112
,
116
,
111
,
114
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
1
,
0
,
1
,
0
,
2
4
,
0
,
0
,
0
,
3
,
0
,
4
,
0
,
2
8
,
0
,
0
,
0
,
3
,
0
,
4
,
0
,
0
,
0
,
255
,
255
,
0
,
0
,
0
,
0
,
0
,
0
,
1
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
1
53
,
0
,
0
,
0
,
42
,
0
,
0
,
0
,
1
81
,
0
,
0
,
0
,
42
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
1
48
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
1
60
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
1
76
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
1
88
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
1
,
0
,
254
,
255
,
1
,
0
,
0
,
0
,
0
,
0
,
1
,
0
,
1
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
1
57
,
0
,
0
,
0
,
106
,
0
,
0
,
0
,
1
85
,
0
,
0
,
0
,
106
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
1
56
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
1
68
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
1
84
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
1
96
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
2
,
0
,
253
,
255
,
1
,
0
,
0
,
0
,
0
,
0
,
1
,
0
,
2
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
1
65
,
0
,
0
,
0
,
114
,
0
,
0
,
0
,
1
93
,
0
,
0
,
0
,
114
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
1
64
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
176
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
1
92
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
204
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
3
,
0
,
252
,
255
,
1
,
0
,
0
,
0
,
0
,
0
,
1
,
0
,
3
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
173
,
0
,
0
,
0
,
122
,
0
,
0
,
0
,
201
,
0
,
0
,
0
,
122
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
172
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
184
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
200
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
212
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
4
,
0
,
251
,
255
,
0
,
0
,
0
,
0
,
0
,
0
,
1
,
0
,
4
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
181
,
0
,
0
,
0
,
122
,
0
,
0
,
0
,
209
,
0
,
0
,
0
,
122
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
180
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
192
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
208
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
220
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
5
,
0
,
250
,
255
,
0
,
0
,
0
,
0
,
0
,
0
,
1
,
0
,
5
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
189
,
0
,
0
,
0
,
138
,
0
,
0
,
0
,
217
,
0
,
0
,
0
,
138
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
192
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
204
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
220
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
232
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
6
,
0
,
0
,
0
,
2
,
0
,
0
,
0
,
0
,
0
,
1
,
0
,
6
,
0
,
0
,
0
,
1
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
229
,
0
,
0
,
0
,
90
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
228
,
0
,
0
,
0
,
3
,
0
,
1
,
0
,
240
,
0
,
0
,
0
,
2
,
0
,
1
,
0
,
110
,
111
,
110
,
101
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
...
...
@@ -1526,6 +1533,15 @@ static const ::capnp::_::AlignedData<114> b_8523ddc40b86b8b0 = {
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
16
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
97
,
116
,
116
,
97
,
99
,
104
,
101
,
100
,
70
,
100
,
0
,
0
,
0
,
0
,
0
,
0
,
6
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
6
,
0
,
255
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
}
};
...
...
@@ -1535,11 +1551,11 @@ static const ::capnp::_::RawSchema* const d_8523ddc40b86b8b0[] = {
&
s_d37007fde1f0027d
,
&
s_d800b1d6cd6f1ca0
,
};
static
const
uint16_t
m_8523ddc40b86b8b0
[]
=
{
0
,
4
,
3
,
1
,
2
,
5
};
static
const
uint16_t
i_8523ddc40b86b8b0
[]
=
{
0
,
1
,
2
,
3
,
4
,
5
};
static
const
uint16_t
m_8523ddc40b86b8b0
[]
=
{
6
,
0
,
4
,
3
,
1
,
2
,
5
};
static
const
uint16_t
i_8523ddc40b86b8b0
[]
=
{
0
,
1
,
2
,
3
,
4
,
5
,
6
};
const
::
capnp
::
_
::
RawSchema
s_8523ddc40b86b8b0
=
{
0x8523ddc40b86b8b0
,
b_8523ddc40b86b8b0
.
words
,
1
14
,
d_8523ddc40b86b8b0
,
m_8523ddc40b86b8b0
,
2
,
6
,
i_8523ddc40b86b8b0
,
nullptr
,
nullptr
,
{
&
s_8523ddc40b86b8b0
,
nullptr
,
nullptr
,
0
,
0
,
nullptr
}
0x8523ddc40b86b8b0
,
b_8523ddc40b86b8b0
.
words
,
1
30
,
d_8523ddc40b86b8b0
,
m_8523ddc40b86b8b0
,
2
,
7
,
i_8523ddc40b86b8b0
,
nullptr
,
nullptr
,
{
&
s_8523ddc40b86b8b0
,
nullptr
,
nullptr
,
0
,
0
,
nullptr
}
};
#endif // !CAPNP_LITE
static
const
::
capnp
::
_
::
AlignedData
<
57
>
b_d800b1d6cd6f1ca0
=
{
...
...
c++/src/capnp/rpc.capnp.h
View file @
84c7ba81
...
...
@@ -2028,6 +2028,8 @@ public:
inline
bool
hasThirdPartyHosted
()
const
;
inline
::
capnp
::
rpc
::
ThirdPartyCapDescriptor
::
Reader
getThirdPartyHosted
()
const
;
inline
::
uint8_t
getAttachedFd
()
const
;
private
:
::
capnp
::
_
::
StructReader
_reader
;
template
<
typename
,
::
capnp
::
Kind
>
...
...
@@ -2089,6 +2091,9 @@ public:
inline
void
adoptThirdPartyHosted
(
::
capnp
::
Orphan
<
::
capnp
::
rpc
::
ThirdPartyCapDescriptor
>&&
value
);
inline
::
capnp
::
Orphan
<
::
capnp
::
rpc
::
ThirdPartyCapDescriptor
>
disownThirdPartyHosted
();
inline
::
uint8_t
getAttachedFd
();
inline
void
setAttachedFd
(
::
uint8_t
value
);
private
:
::
capnp
::
_
::
StructBuilder
_builder
;
template
<
typename
,
::
capnp
::
Kind
>
...
...
@@ -4670,6 +4675,20 @@ inline ::capnp::Orphan< ::capnp::rpc::ThirdPartyCapDescriptor> CapDescriptor::Bu
::
capnp
::
bounded
<
0
>
()
*
::
capnp
::
POINTERS
));
}
inline
::
uint8_t
CapDescriptor
::
Reader
::
getAttachedFd
()
const
{
return
_reader
.
getDataField
<
::
uint8_t
>
(
::
capnp
::
bounded
<
2
>
()
*
::
capnp
::
ELEMENTS
,
255u
);
}
inline
::
uint8_t
CapDescriptor
::
Builder
::
getAttachedFd
()
{
return
_builder
.
getDataField
<
::
uint8_t
>
(
::
capnp
::
bounded
<
2
>
()
*
::
capnp
::
ELEMENTS
,
255u
);
}
inline
void
CapDescriptor
::
Builder
::
setAttachedFd
(
::
uint8_t
value
)
{
_builder
.
setDataField
<
::
uint8_t
>
(
::
capnp
::
bounded
<
2
>
()
*
::
capnp
::
ELEMENTS
,
value
,
255u
);
}
inline
::
uint32_t
PromisedAnswer
::
Reader
::
getQuestionId
()
const
{
return
_reader
.
getDataField
<
::
uint32_t
>
(
::
capnp
::
bounded
<
0
>
()
*
::
capnp
::
ELEMENTS
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment