2024-09-22 00:29:36 +09:00
|
|
|
package app
|
|
|
|
|
|
|
|
import (
|
2025-02-19 00:25:00 +09:00
|
|
|
"fmt"
|
2025-02-21 16:00:31 +09:00
|
|
|
"log"
|
2024-09-22 00:29:36 +09:00
|
|
|
"sync"
|
2024-10-23 21:46:21 +09:00
|
|
|
|
2024-12-20 00:20:02 +09:00
|
|
|
"git.gensokyo.uk/security/fortify/fst"
|
2025-02-19 12:33:51 +09:00
|
|
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
2025-02-18 18:47:48 +09:00
|
|
|
"git.gensokyo.uk/security/fortify/internal/sys"
|
2024-09-22 00:29:36 +09:00
|
|
|
)
|
|
|
|
|
2025-02-18 23:05:37 +09:00
|
|
|
func New(os sys.State) (fst.App, error) {
|
|
|
|
a := new(app)
|
2025-02-19 01:10:37 +09:00
|
|
|
a.sys = os
|
2025-02-19 00:25:00 +09:00
|
|
|
|
|
|
|
id := new(fst.ID)
|
|
|
|
err := fst.NewAppID(id)
|
|
|
|
a.id = newID(id)
|
|
|
|
|
|
|
|
return a, err
|
2025-01-15 23:39:51 +09:00
|
|
|
}
|
|
|
|
|
2025-02-21 16:00:31 +09:00
|
|
|
func MustNew(os sys.State) fst.App {
|
|
|
|
a, err := New(os)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("cannot create app: %v", err)
|
|
|
|
}
|
|
|
|
return a
|
|
|
|
}
|
|
|
|
|
2024-09-22 00:29:36 +09:00
|
|
|
type app struct {
|
2025-02-19 21:05:48 +09:00
|
|
|
id *stringPair[fst.ID]
|
2025-02-19 01:10:37 +09:00
|
|
|
sys sys.State
|
2024-09-22 00:29:36 +09:00
|
|
|
|
2025-02-21 16:00:31 +09:00
|
|
|
*outcome
|
2025-02-19 21:05:48 +09:00
|
|
|
mu sync.RWMutex
|
2024-09-22 00:29:36 +09:00
|
|
|
}
|
|
|
|
|
2025-02-21 16:00:31 +09:00
|
|
|
func (a *app) ID() fst.ID { a.mu.RLock(); defer a.mu.RUnlock(); return a.id.unwrap() }
|
2024-10-20 00:07:48 +09:00
|
|
|
|
2024-09-22 00:29:36 +09:00
|
|
|
func (a *app) String() string {
|
|
|
|
if a == nil {
|
2025-02-19 00:25:00 +09:00
|
|
|
return "(invalid app)"
|
2024-09-22 00:29:36 +09:00
|
|
|
}
|
|
|
|
|
2025-02-19 01:10:37 +09:00
|
|
|
a.mu.RLock()
|
|
|
|
defer a.mu.RUnlock()
|
2024-09-22 00:29:36 +09:00
|
|
|
|
2025-02-21 16:00:31 +09:00
|
|
|
if a.outcome != nil {
|
|
|
|
if a.outcome.user.uid == nil {
|
2025-02-19 00:25:00 +09:00
|
|
|
return fmt.Sprintf("(sealed app %s with invalid uid)", a.id)
|
|
|
|
}
|
2025-02-21 16:00:31 +09:00
|
|
|
return fmt.Sprintf("(sealed app %s as uid %s)", a.id, a.outcome.user.uid)
|
2024-09-22 00:29:36 +09:00
|
|
|
}
|
|
|
|
|
2025-02-19 00:25:00 +09:00
|
|
|
return fmt.Sprintf("(unsealed app %s)", a.id)
|
2024-09-22 00:29:36 +09:00
|
|
|
}
|
2025-02-19 12:33:51 +09:00
|
|
|
|
2025-02-21 16:00:31 +09:00
|
|
|
func (a *app) Seal(config *fst.Config) (fst.SealedApp, error) {
|
2025-02-19 12:33:51 +09:00
|
|
|
a.mu.Lock()
|
|
|
|
defer a.mu.Unlock()
|
|
|
|
|
2025-02-21 16:00:31 +09:00
|
|
|
if a.outcome != nil {
|
2025-02-19 12:33:51 +09:00
|
|
|
panic("app sealed twice")
|
|
|
|
}
|
|
|
|
if config == nil {
|
2025-02-21 16:00:31 +09:00
|
|
|
return nil, fmsg.WrapError(ErrConfig,
|
2025-02-19 12:33:51 +09:00
|
|
|
"attempted to seal app with nil config")
|
|
|
|
}
|
|
|
|
|
2025-02-21 16:00:31 +09:00
|
|
|
seal := new(outcome)
|
|
|
|
seal.id = a.id
|
|
|
|
err := seal.finalise(a.sys, config)
|
2025-02-19 12:33:51 +09:00
|
|
|
if err == nil {
|
2025-02-21 16:00:31 +09:00
|
|
|
a.outcome = seal
|
2025-02-19 12:33:51 +09:00
|
|
|
}
|
2025-02-21 16:00:31 +09:00
|
|
|
return seal, err
|
2025-02-19 12:33:51 +09:00
|
|
|
}
|