Skip to content

Commit caa5ffa

Browse files
authored
feat(agent): initial DVC server implementation (#1053)
1 parent 5fa998e commit caa5ffa

File tree

32 files changed

+2410
-288
lines changed

32 files changed

+2410
-288
lines changed

Cargo.lock

+236-32
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

crates/devolutions-pedm-shared/devolutions-pedm-client-http/src/apis/default_api.rs

+1-2
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,7 @@ use std::rc::Rc;
1717
use futures::Future;
1818
use hyper;
1919

20-
use super::request as __internal_request;
21-
use super::{configuration, Error};
20+
use super::{configuration, request as __internal_request, Error};
2221
use crate::models;
2322

2423
pub struct DefaultApiClient<C: hyper::client::connect::Connect>

crates/devolutions-pedm-shared/devolutions-pedm-client-http/src/apis/mod.rs

+1-3
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
1-
use http;
2-
use hyper;
3-
use serde_json;
1+
use {http, hyper, serde_json};
42

53
#[derive(Debug)]
64
pub enum Error {

crates/devolutions-pedm-shared/devolutions-pedm-client-http/src/apis/request.rs

+1-4
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,10 @@
11
use std::collections::HashMap;
22
use std::pin::Pin;
33

4-
use futures;
54
use futures::future::*;
65
use futures::Future;
7-
use hyper;
86
use hyper::header::{HeaderValue, AUTHORIZATION, CONTENT_LENGTH, CONTENT_TYPE, USER_AGENT};
9-
use serde;
10-
use serde_json;
7+
use {futures, hyper, serde, serde_json};
118

129
use super::{configuration, Error};
1310

crates/win-api-wrappers/Cargo.toml

+1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ base16ct = { version = "0.2", features = ["alloc"] }
1212
anyhow = "1.0"
1313
thiserror = "1.0"
1414
tracing = "0.1"
15+
uuid = { version = "1.10", features = ["v4"] }
1516

1617
[dependencies.windows]
1718
version = "0.58.0"

crates/win-api-wrappers/src/event.rs

+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
use std::sync::Arc;
2+
3+
use windows::Win32::Foundation::HANDLE;
4+
use windows::Win32::System::Threading::{CreateEventW, SetEvent};
5+
6+
use crate::handle::Handle;
7+
8+
/// RAII wrapper for WinAPI event handle.
9+
#[derive(Debug, Clone)]
10+
pub struct Event {
11+
handle: Arc<Handle>,
12+
}
13+
14+
impl Event {
15+
pub fn new_unnamed() -> anyhow::Result<Self> {
16+
// SAFETY: No preconditions.
17+
let raw_handle = unsafe { CreateEventW(None, false, false, None) }?;
18+
19+
// SAFETY: `CreateEventW` always returns a valid handle on success.
20+
let handle = unsafe { Handle::new_owned(raw_handle) }?;
21+
22+
Ok(Self {
23+
handle: Arc::new(handle),
24+
})
25+
}
26+
27+
pub fn raw(&self) -> HANDLE {
28+
self.handle.raw()
29+
}
30+
31+
pub fn set(&self) -> anyhow::Result<()> {
32+
// SAFETY: No preconditions.
33+
unsafe {
34+
SetEvent(self.handle.raw())?;
35+
}
36+
Ok(())
37+
}
38+
}

crates/win-api-wrappers/src/lib.rs

+2
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ mod lib_win {
77
mod error;
88
pub use error::Error;
99

10+
pub mod event;
1011
pub mod handle;
1112
pub mod identity;
1213
pub mod process;
@@ -15,6 +16,7 @@ mod lib_win {
1516
pub mod thread;
1617
pub mod token;
1718
pub mod utils;
19+
pub mod wts;
1820

1921
// Allowed since the goal is to replicate the Windows API crate so that it's familiar, which itself uses the raw names from the API.
2022
#[allow(

crates/win-api-wrappers/src/process.rs

+23-19
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
use std::collections::HashMap;
22
use std::ffi::{c_void, OsString};
33
use std::fmt::Debug;
4-
use std::mem::{self};
54
use std::os::windows::ffi::OsStringExt;
65
use std::path::{Path, PathBuf};
76
use std::{ptr, slice};
@@ -30,8 +29,8 @@ use windows::Win32::System::LibraryLoader::{
3029
GetModuleFileNameW, GetModuleHandleExW, GetProcAddress, GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS,
3130
};
3231
use windows::Win32::System::Threading::{
33-
CreateProcessAsUserW, CreateRemoteThread, GetCurrentProcess, GetExitCodeProcess, OpenProcess, OpenProcessToken,
34-
QueryFullProcessImageNameW, TerminateProcess, WaitForSingleObject, CREATE_UNICODE_ENVIRONMENT,
32+
CreateProcessAsUserW, CreateRemoteThread, GetCurrentProcess, GetExitCodeProcess, GetProcessId, OpenProcess,
33+
OpenProcessToken, QueryFullProcessImageNameW, TerminateProcess, WaitForSingleObject, CREATE_UNICODE_ENVIRONMENT,
3534
EXTENDED_STARTUPINFO_PRESENT, INFINITE, LPPROC_THREAD_ATTRIBUTE_LIST, LPTHREAD_START_ROUTINE, PEB,
3635
PROCESS_ACCESS_RIGHTS, PROCESS_BASIC_INFORMATION, PROCESS_CREATION_FLAGS, PROCESS_INFORMATION, PROCESS_NAME_WIN32,
3736
PROCESS_TERMINATE, STARTUPINFOEXW, STARTUPINFOW, STARTUPINFOW_FLAGS,
@@ -122,7 +121,7 @@ impl Process {
122121
let thread = self.create_thread(
123122
// SAFETY: `LoadLibraryW` fits the type. It takes one argument that is the name of the library.
124123
Some(unsafe {
125-
mem::transmute::<*const c_void, unsafe extern "system" fn(*mut c_void) -> u32>(load_library)
124+
core::mem::transmute::<*const c_void, unsafe extern "system" fn(*mut c_void) -> u32>(load_library)
126125
}),
127126
Some(allocation.address),
128127
)?;
@@ -152,7 +151,7 @@ impl Process {
152151
)?
153152
};
154153

155-
// SAFETY: The handle is owned by us, we opened the ressource above.
154+
// SAFETY: The handle is owned by us, we opened the resource above.
156155
let handle = unsafe { Handle::new_owned(handle) }?;
157156

158157
Ok(Thread::from(handle))
@@ -242,6 +241,11 @@ impl Process {
242241
})
243242
}
244243

244+
pub fn pid(&self) -> u32 {
245+
// SAFETY: Safe to call with a valid process handle.
246+
unsafe { GetProcessId(self.handle.raw()) }
247+
}
248+
245249
/// Reads process memory at a specified address into a buffer.
246250
/// The buffer is not read.
247251
/// Returns the number of bytes read.
@@ -266,13 +270,13 @@ impl Process {
266270
Ok(bytes_read)
267271
}
268272

269-
/// Reads a stucture from process memory at a specified address.
273+
/// Reads a structure from process memory at a specified address.
270274
///
271275
/// # Safety
272276
///
273277
/// - `address` must point to a valid and correctly sized instance of the structure.
274278
pub unsafe fn read_struct<T: Sized>(&self, address: *const c_void) -> Result<T> {
275-
let mut buf = vec![0; mem::size_of::<T>()];
279+
let mut buf = vec![0; size_of::<T>()];
276280

277281
// SAFETY: Based on the security requirements of the function, the `address` should
278282
// point to a valid and correctly sized instance of `T`.
@@ -286,7 +290,7 @@ impl Process {
286290
}
287291
}
288292

289-
/// Reads a continous array of a structure from process memory at a specified address.
293+
/// Reads a continuous array of a structure from process memory at a specified address.
290294
///
291295
/// # Safety
292296
///
@@ -301,10 +305,10 @@ impl Process {
301305
// However, we assume that the data will be alined as `Vec` wants.
302306
let data = unsafe { data.align_to_mut::<u8>().1 };
303307

304-
// SAFETY: `read_memory` does not read `data`, so we can safely pass an unitialized buffer.
308+
// SAFETY: `read_memory` does not read `data`, so we can safely pass an uninitialized buffer.
305309
let read_bytes = unsafe { self.read_memory(address.cast(), data) }?;
306310

307-
if count * mem::size_of::<T>() == read_bytes {
311+
if count * size_of::<T>() == read_bytes {
308312
// SAFETY: Buffer can hold `count` items and was filled up to that point.
309313
unsafe { buf.set_len(count) };
310314

@@ -380,31 +384,31 @@ impl Peb<'_> {
380384
let image_path_name = unsafe {
381385
self.process.read_array(
382386
raw_params.ImagePathName.Buffer.as_ptr(),
383-
raw_params.ImagePathName.Length as usize / mem::size_of::<u16>(),
387+
raw_params.ImagePathName.Length as usize / size_of::<u16>(),
384388
)?
385389
};
386390

387391
// SAFETY: We assume `raw_params.CommandLine` is truthful and valid.
388392
let command_line = unsafe {
389393
self.process.read_array(
390394
raw_params.CommandLine.Buffer.as_ptr(),
391-
raw_params.CommandLine.Length as usize / mem::size_of::<u16>(),
395+
raw_params.CommandLine.Length as usize / size_of::<u16>(),
392396
)?
393397
};
394398

395399
// SAFETY: We assume `raw_params.DesktopInfo` is truthful and valid.
396400
let desktop = unsafe {
397401
self.process.read_array(
398402
raw_params.DesktopInfo.Buffer.as_ptr(),
399-
raw_params.DesktopInfo.Length as usize / mem::size_of::<u16>(),
403+
raw_params.DesktopInfo.Length as usize / size_of::<u16>(),
400404
)?
401405
};
402406

403407
// SAFETY: We assume `raw_params.CurrentDirectory` is truthful and valid.
404408
let working_directory = unsafe {
405409
self.process.read_array(
406410
raw_params.CurrentDirectory.DosPath.Buffer.as_ptr(),
407-
raw_params.CurrentDirectory.DosPath.Length as usize / mem::size_of::<u16>(),
411+
raw_params.CurrentDirectory.DosPath.Length as usize / size_of::<u16>(),
408412
)?
409413
};
410414

@@ -579,8 +583,8 @@ impl ProcessEntry32Iterator {
579583
};
580584

581585
// SAFETY: It is safe to zero out the structure as it is a simple POD type.
582-
let mut process_entry: PROCESSENTRY32W = unsafe { mem::zeroed() };
583-
process_entry.dwSize = mem::size_of::<PROCESSENTRY32W>()
586+
let mut process_entry: PROCESSENTRY32W = unsafe { core::mem::zeroed() };
587+
process_entry.dwSize = size_of::<PROCESSENTRY32W>()
584588
.try_into()
585589
.expect("BUG: PROCESSENTRY32W size always fits in u32");
586590

@@ -700,7 +704,7 @@ pub fn create_process_as_user(
700704
// SAFETY: As per `CreateEnvironmentBlock` documentation: We must specify
701705
// `CREATE_UNICODE_ENVIRONMENT` and call `DestroyEnvironmentBlock` after
702706
// `CreateProcessAsUser` call.
703-
// - `CREATE_UNICODE_ENVIRONMENT` is always set unconditionaly.
707+
// - `CREATE_UNICODE_ENVIRONMENT` is always set unconditionally.
704708
// - `DestroyEnvironmentBlock` is called in the `ProcessEnvironment` destructor.
705709
//
706710
// Therefore, all preconditions are met to safely call `CreateEnvironmentBlock`.
@@ -742,10 +746,10 @@ pub fn create_process_as_user(
742746
)
743747
}?;
744748

745-
// SAFETY: The handle is owned by us, we opened the ressource above.
749+
// SAFETY: The handle is owned by us, we opened the resource above.
746750
let process = unsafe { Handle::new_owned(raw_process_information.hProcess).map(Process::from)? };
747751

748-
// SAFETY: The handle is owned by us, we opened the ressource above.
752+
// SAFETY: The handle is owned by us, we opened the resource above.
749753
let thread = unsafe { Handle::new_owned(raw_process_information.hThread).map(Thread::from)? };
750754

751755
Ok(ProcessInformation {

crates/win-api-wrappers/src/rpc.rs

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
use std::ffi::c_void;
22
use std::ptr::{self, NonNull};
3-
use std::{mem, slice};
3+
use std::slice;
44

55
use windows::core::GUID;
66
use windows::Win32::Foundation::{ERROR_MORE_DATA, E_INVALIDARG};
@@ -51,9 +51,9 @@ impl RpcBindingHandle {
5151
server_principal_name.resize((attribs.ServerPrincipalNameBufferLength / 2) as usize, 0);
5252

5353
attribs.ClientPrincipalName = client_principal_name.as_mut_ptr();
54-
attribs.ClientPrincipalNameBufferLength = (client_principal_name.len() * mem::size_of::<u16>()).try_into()?;
54+
attribs.ClientPrincipalNameBufferLength = (client_principal_name.len() * size_of::<u16>()).try_into()?;
5555
attribs.ServerPrincipalName = server_principal_name.as_mut_ptr();
56-
attribs.ServerPrincipalNameBufferLength = (server_principal_name.len() * mem::size_of::<u16>()).try_into()?;
56+
attribs.ServerPrincipalNameBufferLength = (server_principal_name.len() * size_of::<u16>()).try_into()?;
5757

5858
// SAFETY: No preconditions.
5959
let status = unsafe { RpcServerInqCallAttributesW(Some(self.0), &mut attribs as *mut _ as *mut c_void) };
@@ -161,14 +161,14 @@ impl RpcServerInterfacePointer {
161161
let addr = unsafe { raw_dispatch_table.add(i) }.cast_mut();
162162

163163
// SAFETY: Assume the address points to a valid handler which is not currently in use.
164-
let old_prot = unsafe { set_memory_protection(addr.cast(), mem::size_of::<*const ()>(), PAGE_READWRITE) }?;
164+
let old_prot = unsafe { set_memory_protection(addr.cast(), size_of::<*const ()>(), PAGE_READWRITE) }?;
165165

166166
// TODO: See if it could be possible to freeze other threads during switch or to do an atomic switch.
167167
// SAFETY: Because of previous assumption and memory protection, this should succeed.
168168
unsafe { *addr = *new_handler };
169169

170170
// SAFETY: Address is already assumed to be valid.
171-
let _ = unsafe { set_memory_protection(addr.cast(), mem::size_of::<*const ()>(), old_prot) }?;
171+
let _ = unsafe { set_memory_protection(addr.cast(), size_of::<*const ()>(), old_prot) }?;
172172
}
173173

174174
Ok(())

crates/win-api-wrappers/src/security/acl.rs

+8-9
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
use std::alloc::Layout;
2-
use std::mem::{self};
32
use std::{ptr, slice};
43

54
use anyhow::{bail, Result};
@@ -83,7 +82,7 @@ impl Ace {
8382
};
8483

8584
// SAFETY: We are adding to the pointer in byte aligned mode to access next field.
86-
ptr = unsafe { ptr.byte_add(mem::size_of::<ACE_HEADER>()) };
85+
ptr = unsafe { ptr.byte_add(size_of::<ACE_HEADER>()) };
8786

8887
#[allow(clippy::cast_ptr_alignment)] // FIXME(DGW-221): Raw* hack is flawed.
8988
// SAFETY: Buffer is at least `size_of::<ACE_HEADER> + size_of::<u32>` big.
@@ -92,7 +91,7 @@ impl Ace {
9291
};
9392

9493
// SAFETY: We are adding to the pointer in byte aligned mode to access next field.
95-
ptr = unsafe { ptr.byte_add(mem::size_of::<u32>()) };
94+
ptr = unsafe { ptr.byte_add(size_of::<u32>()) };
9695

9796
// SAFETY: Buffer is at least `size_of::<ACE_HEADER> + size_of::<u32> + body.len()` big.
9897
unsafe { ptr.copy_from(body.as_ptr(), body.len()) };
@@ -109,21 +108,21 @@ impl Ace {
109108
// SAFETY: Assume that the pointer points to a valid ACE_HEADER if not null.
110109
let header = unsafe { ptr.as_ref() }.ok_or_else(|| Error::NullPointer("ACE header"))?;
111110

112-
if (header.AceSize as usize) < mem::size_of::<ACE_HEADER>() + mem::size_of::<u32>() {
111+
if (header.AceSize as usize) < size_of::<ACE_HEADER>() + size_of::<u32>() {
113112
bail!(Error::from_win32(ERROR_INVALID_DATA));
114113
}
115114

116115
// SAFETY: Assume that the header is followed by a 4 byte access mask.
117-
ptr = unsafe { ptr.byte_add(mem::size_of::<ACE_HEADER>()) };
116+
ptr = unsafe { ptr.byte_add(size_of::<ACE_HEADER>()) };
118117

119118
// SAFETY: Assume that the header is followed by a 4 byte access mask.
120119
#[allow(clippy::cast_ptr_alignment)] // FIXME(DGW-221): Raw* hack is flawed.
121120
let access_mask = unsafe { ptr.cast::<u32>().read() };
122121

123122
// SAFETY: Assume buffer is big enough to fit Ace data.
124-
ptr = unsafe { ptr.byte_add(mem::size_of::<u32>()) };
123+
ptr = unsafe { ptr.byte_add(size_of::<u32>()) };
125124

126-
let body_size = header.AceSize as usize - mem::size_of::<ACE_HEADER>() - mem::size_of::<u32>();
125+
let body_size = header.AceSize as usize - size_of::<ACE_HEADER>() - size_of::<u32>();
127126

128127
// SAFETY: `body_size` must be >= 0 because of previous check. Pointer is valid.
129128
let body = unsafe { slice::from_raw_parts(ptr.cast::<u8>(), body_size) };
@@ -158,10 +157,10 @@ impl Acl {
158157

159158
pub fn to_raw(&self) -> Result<Vec<u8>> {
160159
let raw_aces = self.aces.iter().map(Ace::to_raw).collect::<Result<Vec<_>>>()?;
161-
let size = mem::size_of::<ACL>() + raw_aces.iter().map(Vec::len).sum::<usize>();
160+
let size = size_of::<ACL>() + raw_aces.iter().map(Vec::len).sum::<usize>();
162161

163162
// Align on u32 boundary
164-
let size = (size + mem::size_of::<u32>() - 1) & !3;
163+
let size = (size + size_of::<u32>() - 1) & !3;
165164

166165
let mut buf = vec![0; size];
167166

crates/win-api-wrappers/src/thread.rs

+4-5
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
use std::ffi::c_void;
22
use std::fmt::Debug;
3-
use std::mem::{self};
43

54
use anyhow::{bail, Result};
65

@@ -32,7 +31,7 @@ impl Thread {
3231
pub fn get_by_id(id: u32, desired_access: THREAD_ACCESS_RIGHTS) -> Result<Self> {
3332
// SAFETY: No preconditions.
3433
let handle = unsafe { OpenThread(desired_access, false, id)? };
35-
// SAFETY: The handle is owned by us, we opened the ressource above.
34+
// SAFETY: The handle is owned by us, we opened the resource above.
3635
let handle = unsafe { Handle::new_owned(handle)? };
3736

3837
Ok(Self::from(handle))
@@ -172,9 +171,9 @@ impl ThreadAttributeType<'_> {
172171

173172
pub fn size(&self) -> usize {
174173
match self {
175-
ThreadAttributeType::ParentProcess(_) => mem::size_of::<HANDLE>(),
176-
ThreadAttributeType::ExtendedFlags(_) => mem::size_of::<u32>(),
177-
ThreadAttributeType::HandleList(h) => mem::size_of::<HANDLE>() * h.len(),
174+
ThreadAttributeType::ParentProcess(_) => size_of::<HANDLE>(),
175+
ThreadAttributeType::ExtendedFlags(_) => size_of::<u32>(),
176+
ThreadAttributeType::HandleList(h) => size_of::<HANDLE>() * h.len(),
178177
}
179178
}
180179
}

0 commit comments

Comments
 (0)