sifs 0.3.3

SIFS Is Fast Search: instant local code search for agents
Documentation
use anyhow::{Context, Result};
#[cfg(unix)]
use std::os::unix::fs::PermissionsExt;
use std::path::PathBuf;

const SOCKET_ENV: &str = "SIFS_DAEMON_SOCKET";
const RUNTIME_DIR_ENV: &str = "SIFS_DAEMON_RUNTIME_DIR";

#[derive(Clone, Debug, PartialEq, Eq)]
pub struct DaemonPaths {
    pub runtime_dir: PathBuf,
    pub socket: PathBuf,
    pub pid_file: PathBuf,
    pub log_file: PathBuf,
}

impl DaemonPaths {
    pub fn ensure_runtime_dir(&self) -> Result<()> {
        std::fs::create_dir_all(&self.runtime_dir)
            .with_context(|| format!("create daemon runtime dir {}", self.runtime_dir.display()))?;
        restrict_runtime_dir(&self.runtime_dir)
    }
}

pub fn default_daemon_paths() -> Result<DaemonPaths> {
    let runtime_dir = if let Ok(path) = std::env::var(RUNTIME_DIR_ENV) {
        PathBuf::from(path)
    } else if let Ok(socket) = std::env::var(SOCKET_ENV) {
        PathBuf::from(socket)
            .parent()
            .map(PathBuf::from)
            .unwrap_or_else(default_runtime_dir)
    } else {
        default_runtime_dir()
    };
    let socket = std::env::var(SOCKET_ENV)
        .map(PathBuf::from)
        .unwrap_or_else(|_| runtime_dir.join("sifs.sock"));
    Ok(DaemonPaths {
        pid_file: runtime_dir.join("sifs.pid"),
        log_file: runtime_dir.join("sifs.log"),
        runtime_dir,
        socket,
    })
}

fn default_runtime_dir() -> PathBuf {
    let uid = current_uid();
    std::env::temp_dir().join(format!("sifs-{uid}"))
}

#[cfg(unix)]
fn current_uid() -> u32 {
    unsafe { libc::geteuid() }
}

#[cfg(not(unix))]
fn current_uid() -> u32 {
    0
}

#[cfg(unix)]
fn restrict_runtime_dir(path: &PathBuf) -> Result<()> {
    let mut permissions = std::fs::metadata(path)
        .with_context(|| format!("inspect daemon runtime dir {}", path.display()))?
        .permissions();
    permissions.set_mode(0o700);
    std::fs::set_permissions(path, permissions)
        .with_context(|| format!("set daemon runtime dir permissions {}", path.display()))
}

#[cfg(not(unix))]
fn restrict_runtime_dir(_path: &PathBuf) -> Result<()> {
    Ok(())
}

#[cfg(test)]
mod tests {
    use super::DaemonPaths;

    #[cfg(unix)]
    #[test]
    fn ensure_runtime_dir_sets_owner_only_permissions() {
        use std::os::unix::fs::PermissionsExt;

        let temp = tempfile::tempdir().unwrap();
        let runtime_dir = temp.path().join("runtime");
        std::fs::create_dir(&runtime_dir).unwrap();
        std::fs::set_permissions(&runtime_dir, std::fs::Permissions::from_mode(0o755)).unwrap();
        let paths = DaemonPaths {
            socket: runtime_dir.join("sifs.sock"),
            pid_file: runtime_dir.join("sifs.pid"),
            log_file: runtime_dir.join("sifs.log"),
            runtime_dir: runtime_dir.clone(),
        };

        paths.ensure_runtime_dir().unwrap();

        let mode = std::fs::metadata(runtime_dir).unwrap().permissions().mode() & 0o777;
        assert_eq!(mode, 0o700);
    }
}