add SAFETY
block on usage of unsafe getuid
Signed-off-by: onur-ozkan <work@onurozkan.dev>
This commit is contained in:
parent
1e3c8f196b
commit
86e9b0f0d4
@ -368,6 +368,10 @@ impl Build {
|
|||||||
// https://github.com/rust-lang/rust/blob/a8a33cf27166d3eabaffc58ed3799e054af3b0c6/src/bootstrap/bootstrap.py#L796-L797
|
// https://github.com/rust-lang/rust/blob/a8a33cf27166d3eabaffc58ed3799e054af3b0c6/src/bootstrap/bootstrap.py#L796-L797
|
||||||
let is_sudo = match env::var_os("SUDO_USER") {
|
let is_sudo = match env::var_os("SUDO_USER") {
|
||||||
Some(_sudo_user) => {
|
Some(_sudo_user) => {
|
||||||
|
// SAFETY: getuid() system call is always successful and no return value is reserved
|
||||||
|
// to indicate an error.
|
||||||
|
//
|
||||||
|
// For more context, see https://man7.org/linux/man-pages/man2/geteuid.2.html
|
||||||
let uid = unsafe { libc::getuid() };
|
let uid = unsafe { libc::getuid() };
|
||||||
uid == 0
|
uid == 0
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user