sudo-rs
nomicon
sudo-rs | nomicon | |
---|---|---|
13 | 87 | |
2,830 | 1,702 | |
1.0% | 2.8% | |
9.6 | 5.6 | |
about 1 month ago | about 1 month ago | |
Rust | CSS | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
sudo-rs
-
Run0 โ systemd based alternative to sudo announced
There is also a write of sudo in Rust, which works more akin to the traditional sudo but memory-safe and with fewer bugs: https://www.memorysafety.org/blog/sudo-first-stable-release/
Source code: https://github.com/memorysafety/sudo-rs
And if you are running Debian 13 (trixie) or later, or Ubuntu 24.04 (Noble Numbat) or later, you can already install it using `apt install sudo-rs`.
-
The First Stable Release of a Rust-Rewrite Sudo Implementation
It seems like those changes are noted here: https://github.com/memorysafety/sudo-rs#differences-from-ori...
- Testing the memory safe Rust implementation of Sudo/Su
-
How to spawn a process as root (like sudo). without sudo?
It uses the setuid flag, just like sudo. The readme says
- Way to improve security of sudo: make a daemon instead of setuid bina
- Two core Unix-like utilities, sudo and su, are getting rewrites in Rust
-
Sudo and Su Being Rewritten in Rust for Memory Safety
https://github.com/memorysafety/sudo-rs/blob/main/proofs/sud...
sidenote: why there is no python like syntax language TLA+ and ability to generate a partial implementation you could hook into (complete) from that model.
- Sudo-rs: A memory safe implementation of sudo and su
- memorysafety/sudo-rs: A memory safe implementation of sudo and su. Sudo-rs is currently under active development and is not suited for any production environment
-
Bringing Memory Safety to sudo and su
If you read the README https://github.com/memorysafety/sudo-rs
> Our current target is to build a drop-in replacement for most basic use cases of sudo. ...
nomicon
-
[Media] I'm comparing writing a double-linked list in C++ vs with Rust. The Rust implementation looks substantially more complex. Is this a bad example? (URL in the caption)
itโs even written by the same person that wrote the Nomicon (the guide to the dark arts of unsafe)
-
Rust books to read
If you want to dive deeper you can always have other options but now there are concrete cases, if you want to do low level thing https://doc.rust-lang.org/nomicon/ while if you want multi thread/concurrency stuff https://marabos.nl/atomics/ . There are many many books so you will have to point yourself to what you want
-
Thread-shared boolean flag
Nonononono. SeqCst is the most error prone memory order: https://github.com/rust-lang/nomicon/issues/166
-
[Media] Hashmap behaviour inside a loop due to lifetime issue
Hope this helps. For more details, see the Rustonomicon. I referenced the subtyping chapter here extensively.
-
Unsafe Rust
Nice video! Glad I could help out. This stuff is hard, and I'm still learning a lot about it myself even years later. The Rustonomicon is a great read if you haven't already.
-
Stepping up the YAML engineer game
Have you got a moment to read through the good book , after reading through this perhaps try the Rustonomicon.
- Questions about ownership rule
-
CppCon 2022 Best Practices Every C++ Programmer Needs to Follow โ Oz Syed
That is not what UB means. Undefined Behaviour is behaviour that the compiler is allowed to assume will never happen, and which can consequently cause miscompilations due to optimisation passes gone wrong if it does in fact occur in the source code.
It's true that Rust does not have a written specification that clearly delineates what is and isn't UB in a single place. But:
1. UB is impossible in safe code (modulo bugs in unsafe code)
2. There are resources such as the Rustinomicon (https://doc.rust-lang.org/nomicon/) that provide a detailed guide on what is and isn't allowed in unsafe code.
In practice, it's much easier to avoid UB in Rust than it is in C++.
-
How to write deserializer for custom binary protocol?
However, this is a wide topic out of scope for a Reddit comment, so maybe just read the Rustonomicon. It explains everything about data handling in Rust.
-
Performance critical ML: How viable is Rust as an alternative to C++
The ownership model & borrow checker makes rust a bit of an awkward language in which to write complex data structures like trees and graphs. It can be done - since you can always use raw pointers & unsafe code when you absolutely need to to treat rust like C. But the language fights you, and the community can get a bit moralistic about this sort of thing. The rust nomicon is a fantastic resource for learning the limits of the borrow checker, and where and how to use unsafe code correctly. You will need unsafe less than you think you will, but sometimes you will have no choice.
What are some alternatives?
sudo - Utility to execute a command as another user
book - The Rust Programming Language
doas - A port of OpenBSD's doas which runs on FreeBSD, Linux, NetBSD, and illumos
mdBook - Create book from markdown files. Like Gitbook but implemented in Rust
tempfile - Temporary file library for rust
rust-ffmpeg - Safe FFmpeg wrapper.
OpenDoas - A portable fork of the OpenBSD `doas` command
Theseus - Theseus is a modern OS written from scratch in Rust that explores ๐ข๐ง๐ญ๐ซ๐๐ฅ๐ข๐ง๐ ๐ฎ๐๐ฅ ๐๐๐ฌ๐ข๐ ๐ง: closing the semantic gap between compiler and hardware by maximally leveraging the power of language safety and affine types. Theseus aims to shift OS responsibilities like resource management into the compiler.
sudo - Utility to execute a command as another user
Exercism - website - The codebase for Exercism's website.
rustsec - RustSec API & Tooling
miri - An interpreter for Rust's mid-level intermediate representation