summaryrefslogtreecommitdiff
path: root/vendor/rustix/src/fs/special.rs
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2025-07-15 16:37:08 -0600
committermo khan <mo@mokhan.ca>2025-07-17 16:30:22 -0600
commit45df4d0d9b577fecee798d672695fe24ff57fb1b (patch)
tree1b99bf645035b58e0d6db08c7a83521f41f7a75b /vendor/rustix/src/fs/special.rs
parentf94f79608393d4ab127db63cc41668445ef6b243 (diff)
feat: migrate from Cedar to SpiceDB authorization system
This is a major architectural change that replaces the Cedar policy-based authorization system with SpiceDB's relation-based authorization. Key changes: - Migrate from Rust to Go implementation - Replace Cedar policies with SpiceDB schema and relationships - Switch from envoy `ext_authz` with Cedar to SpiceDB permission checks - Update build system and dependencies for Go ecosystem - Maintain Envoy integration for external authorization This change enables more flexible permission modeling through SpiceDB's Google Zanzibar inspired relation-based system, supporting complex hierarchical permissions that were difficult to express in Cedar. Breaking change: Existing Cedar policies and Rust-based configuration will no longer work and need to be migrated to SpiceDB schema.
Diffstat (limited to 'vendor/rustix/src/fs/special.rs')
-rw-r--r--vendor/rustix/src/fs/special.rs80
1 files changed, 0 insertions, 80 deletions
diff --git a/vendor/rustix/src/fs/special.rs b/vendor/rustix/src/fs/special.rs
deleted file mode 100644
index 276a775f..00000000
--- a/vendor/rustix/src/fs/special.rs
+++ /dev/null
@@ -1,80 +0,0 @@
-//! The `CWD` and `ABS` constants, representing the current working directory
-//! and absolute-only paths, respectively.
-//!
-//! # Safety
-//!
-//! This file uses `AT_FDCWD`, which is a raw file descriptor, but which is
-//! always valid, and `-EBADF`, which is an undocumented by commonly used
-//! convention of passing a value which will always fail if the accompanying
-//! path isn't absolute.
-
-#![allow(unsafe_code)]
-
-use crate::backend;
-use backend::c;
-use backend::fd::{BorrowedFd, RawFd};
-
-/// `AT_FDCWD`—A handle representing the current working directory.
-///
-/// This is a file descriptor which refers to the process current directory
-/// which can be used as the directory argument in `*at` functions such as
-/// [`openat`].
-///
-/// # References
-/// - [POSIX]
-///
-/// [`openat`]: crate::fs::openat
-/// [POSIX]: https://pubs.opengroup.org/onlinepubs/9799919799/basedefs/fcntl.h.html
-// SAFETY: `AT_FDCWD` is a reserved value that is never dynamically
-// allocated, so it'll remain valid for the duration of `'static`.
-#[cfg(not(target_os = "horizon"))]
-#[doc(alias = "AT_FDCWD")]
-pub const CWD: BorrowedFd<'static> =
- unsafe { BorrowedFd::<'static>::borrow_raw(c::AT_FDCWD as RawFd) };
-
-/// `-EBADF`—A handle that requires paths to be absolute.
-///
-/// This is a file descriptor which refers to no directory, which can be used
-/// as the directory argument in `*at` functions such as [`openat`], which
-/// causes them to fail with [`BADF`] if the accompanying path is not absolute.
-///
-/// This corresponds to the undocumented by commonly used convention of
-/// passing `-EBADF` as the `dirfd` argument, which is ignored if the path is
-/// absolute, and evokes an `EBADF` error otherwise.
-///
-/// [`openat`]: crate::fs::openat
-/// [`BADF`]: crate::io::Errno::BADF
-// SAFETY: This `-EBADF` convention is commonly used, such as in lxc, so OS's
-// aren't going to break it.
-pub const ABS: BorrowedFd<'static> =
- unsafe { BorrowedFd::<'static>::borrow_raw(c::EBADF.wrapping_neg() as RawFd) };
-
-#[cfg(test)]
-mod tests {
- use super::*;
- use crate::fd::AsRawFd as _;
-
- #[test]
- fn test_cwd() {
- assert!(CWD.as_raw_fd() != -1);
- assert!(CWD.as_raw_fd() != c::STDIN_FILENO);
- assert!(CWD.as_raw_fd() != c::STDOUT_FILENO);
- assert!(CWD.as_raw_fd() != c::STDERR_FILENO);
- #[cfg(linux_kernel)]
- #[cfg(feature = "io_uring")]
- assert!(CWD.as_raw_fd() != crate::io_uring::IORING_REGISTER_FILES_SKIP.as_raw_fd());
- }
-
- #[test]
- fn test_abs() {
- assert!(ABS.as_raw_fd() < 0);
- assert!(ABS.as_raw_fd() != -1);
- assert!(ABS.as_raw_fd() != c::AT_FDCWD);
- assert!(ABS.as_raw_fd() != c::STDIN_FILENO);
- assert!(ABS.as_raw_fd() != c::STDOUT_FILENO);
- assert!(ABS.as_raw_fd() != c::STDERR_FILENO);
- #[cfg(linux_kernel)]
- #[cfg(feature = "io_uring")]
- assert!(ABS.as_raw_fd() != crate::io_uring::IORING_REGISTER_FILES_SKIP.as_raw_fd());
- }
-}