fipc: export config struct
Also store full config as part of state. Signed-off-by: Ophestra Umiker <cat@ophivana.moe>
This commit is contained in:
parent
5d00805a7c
commit
b752ec4468
@ -1,4 +1,4 @@
|
|||||||
package app
|
package fipc
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
@ -2,8 +2,10 @@ package app
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"sync"
|
"sync"
|
||||||
|
"sync/atomic"
|
||||||
|
|
||||||
"git.ophivana.moe/security/fortify/cmd/fshim/ipc/shim"
|
"git.ophivana.moe/security/fortify/cmd/fshim/ipc/shim"
|
||||||
|
"git.ophivana.moe/security/fortify/fipc"
|
||||||
"git.ophivana.moe/security/fortify/internal/linux"
|
"git.ophivana.moe/security/fortify/internal/linux"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -17,11 +19,14 @@ type App interface {
|
|||||||
// WaitErr returns error returned by the underlying wait syscall.
|
// WaitErr returns error returned by the underlying wait syscall.
|
||||||
WaitErr() error
|
WaitErr() error
|
||||||
|
|
||||||
Seal(config *Config) error
|
Seal(config *fipc.Config) error
|
||||||
String() string
|
String() string
|
||||||
}
|
}
|
||||||
|
|
||||||
type app struct {
|
type app struct {
|
||||||
|
// single-use config reference
|
||||||
|
ct *appCt
|
||||||
|
|
||||||
// application unique identifier
|
// application unique identifier
|
||||||
id *ID
|
id *ID
|
||||||
// operating system interface
|
// operating system interface
|
||||||
@ -69,3 +74,24 @@ func New(os linux.System) (App, error) {
|
|||||||
a.os = os
|
a.os = os
|
||||||
return a, newAppID(a.id)
|
return a, newAppID(a.id)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// appCt ensures its wrapped val is only accessed once
|
||||||
|
type appCt struct {
|
||||||
|
val *fipc.Config
|
||||||
|
done *atomic.Bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *appCt) Unwrap() *fipc.Config {
|
||||||
|
if !a.done.Load() {
|
||||||
|
defer a.done.Store(true)
|
||||||
|
return a.val
|
||||||
|
}
|
||||||
|
panic("attempted to access config reference twice")
|
||||||
|
}
|
||||||
|
|
||||||
|
func newAppCt(config *fipc.Config) (ct *appCt) {
|
||||||
|
ct = new(appCt)
|
||||||
|
ct.done = new(atomic.Bool)
|
||||||
|
ct.val = config
|
||||||
|
return ct
|
||||||
|
}
|
||||||
|
@ -3,6 +3,7 @@ package app_test
|
|||||||
import (
|
import (
|
||||||
"git.ophivana.moe/security/fortify/acl"
|
"git.ophivana.moe/security/fortify/acl"
|
||||||
"git.ophivana.moe/security/fortify/dbus"
|
"git.ophivana.moe/security/fortify/dbus"
|
||||||
|
"git.ophivana.moe/security/fortify/fipc"
|
||||||
"git.ophivana.moe/security/fortify/helper/bwrap"
|
"git.ophivana.moe/security/fortify/helper/bwrap"
|
||||||
"git.ophivana.moe/security/fortify/internal/app"
|
"git.ophivana.moe/security/fortify/internal/app"
|
||||||
"git.ophivana.moe/security/fortify/internal/system"
|
"git.ophivana.moe/security/fortify/internal/system"
|
||||||
@ -11,15 +12,15 @@ import (
|
|||||||
var testCasesNixos = []sealTestCase{
|
var testCasesNixos = []sealTestCase{
|
||||||
{
|
{
|
||||||
"nixos chromium direct wayland", new(stubNixOS),
|
"nixos chromium direct wayland", new(stubNixOS),
|
||||||
&app.Config{
|
&fipc.Config{
|
||||||
ID: "org.chromium.Chromium",
|
ID: "org.chromium.Chromium",
|
||||||
Command: []string{"/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start"},
|
Command: []string{"/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start"},
|
||||||
Confinement: app.ConfinementConfig{
|
Confinement: fipc.ConfinementConfig{
|
||||||
AppID: 1, Groups: []string{}, Username: "u0_a1",
|
AppID: 1, Groups: []string{}, Username: "u0_a1",
|
||||||
Outer: "/var/lib/persist/module/fortify/0/1",
|
Outer: "/var/lib/persist/module/fortify/0/1",
|
||||||
Sandbox: &app.SandboxConfig{
|
Sandbox: &fipc.SandboxConfig{
|
||||||
UserNS: true, Net: true, MapRealUID: true, DirectWayland: true, Env: nil,
|
UserNS: true, Net: true, MapRealUID: true, DirectWayland: true, Env: nil,
|
||||||
Filesystem: []*app.FilesystemConfig{
|
Filesystem: []*fipc.FilesystemConfig{
|
||||||
{Src: "/bin", Must: true}, {Src: "/usr/bin", Must: true},
|
{Src: "/bin", Must: true}, {Src: "/usr/bin", Must: true},
|
||||||
{Src: "/nix/store", Must: true}, {Src: "/run/current-system", Must: true},
|
{Src: "/nix/store", Must: true}, {Src: "/run/current-system", Must: true},
|
||||||
{Src: "/sys/block"}, {Src: "/sys/bus"}, {Src: "/sys/class"}, {Src: "/sys/dev"}, {Src: "/sys/devices"},
|
{Src: "/sys/block"}, {Src: "/sys/bus"}, {Src: "/sys/class"}, {Src: "/sys/dev"}, {Src: "/sys/devices"},
|
||||||
|
@ -3,6 +3,7 @@ package app_test
|
|||||||
import (
|
import (
|
||||||
"git.ophivana.moe/security/fortify/acl"
|
"git.ophivana.moe/security/fortify/acl"
|
||||||
"git.ophivana.moe/security/fortify/dbus"
|
"git.ophivana.moe/security/fortify/dbus"
|
||||||
|
"git.ophivana.moe/security/fortify/fipc"
|
||||||
"git.ophivana.moe/security/fortify/helper/bwrap"
|
"git.ophivana.moe/security/fortify/helper/bwrap"
|
||||||
"git.ophivana.moe/security/fortify/internal/app"
|
"git.ophivana.moe/security/fortify/internal/app"
|
||||||
"git.ophivana.moe/security/fortify/internal/system"
|
"git.ophivana.moe/security/fortify/internal/system"
|
||||||
@ -11,9 +12,9 @@ import (
|
|||||||
var testCasesPd = []sealTestCase{
|
var testCasesPd = []sealTestCase{
|
||||||
{
|
{
|
||||||
"nixos permissive defaults no enablements", new(stubNixOS),
|
"nixos permissive defaults no enablements", new(stubNixOS),
|
||||||
&app.Config{
|
&fipc.Config{
|
||||||
Command: make([]string, 0),
|
Command: make([]string, 0),
|
||||||
Confinement: app.ConfinementConfig{
|
Confinement: fipc.ConfinementConfig{
|
||||||
AppID: 0,
|
AppID: 0,
|
||||||
Username: "chronos",
|
Username: "chronos",
|
||||||
Outer: "/home/chronos",
|
Outer: "/home/chronos",
|
||||||
@ -190,10 +191,10 @@ var testCasesPd = []sealTestCase{
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"nixos permissive defaults chromium", new(stubNixOS),
|
"nixos permissive defaults chromium", new(stubNixOS),
|
||||||
&app.Config{
|
&fipc.Config{
|
||||||
ID: "org.chromium.Chromium",
|
ID: "org.chromium.Chromium",
|
||||||
Command: []string{"/run/current-system/sw/bin/zsh", "-c", "exec chromium "},
|
Command: []string{"/run/current-system/sw/bin/zsh", "-c", "exec chromium "},
|
||||||
Confinement: app.ConfinementConfig{
|
Confinement: fipc.ConfinementConfig{
|
||||||
AppID: 9,
|
AppID: 9,
|
||||||
Groups: []string{"video"},
|
Groups: []string{"video"},
|
||||||
Username: "chronos",
|
Username: "chronos",
|
||||||
|
@ -6,6 +6,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"git.ophivana.moe/security/fortify/fipc"
|
||||||
"git.ophivana.moe/security/fortify/helper/bwrap"
|
"git.ophivana.moe/security/fortify/helper/bwrap"
|
||||||
"git.ophivana.moe/security/fortify/internal/app"
|
"git.ophivana.moe/security/fortify/internal/app"
|
||||||
"git.ophivana.moe/security/fortify/internal/linux"
|
"git.ophivana.moe/security/fortify/internal/linux"
|
||||||
@ -15,7 +16,7 @@ import (
|
|||||||
type sealTestCase struct {
|
type sealTestCase struct {
|
||||||
name string
|
name string
|
||||||
os linux.System
|
os linux.System
|
||||||
config *app.Config
|
config *fipc.Config
|
||||||
id app.ID
|
id app.ID
|
||||||
wantSys *system.I
|
wantSys *system.I
|
||||||
wantBwrap *bwrap.Config
|
wantBwrap *bwrap.Config
|
||||||
|
@ -9,6 +9,7 @@ import (
|
|||||||
"strconv"
|
"strconv"
|
||||||
|
|
||||||
"git.ophivana.moe/security/fortify/dbus"
|
"git.ophivana.moe/security/fortify/dbus"
|
||||||
|
"git.ophivana.moe/security/fortify/fipc"
|
||||||
"git.ophivana.moe/security/fortify/internal/fmsg"
|
"git.ophivana.moe/security/fortify/internal/fmsg"
|
||||||
"git.ophivana.moe/security/fortify/internal/linux"
|
"git.ophivana.moe/security/fortify/internal/linux"
|
||||||
"git.ophivana.moe/security/fortify/internal/state"
|
"git.ophivana.moe/security/fortify/internal/state"
|
||||||
@ -59,7 +60,7 @@ type appSeal struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Seal seals the app launch context
|
// Seal seals the app launch context
|
||||||
func (a *app) Seal(config *Config) error {
|
func (a *app) Seal(config *fipc.Config) error {
|
||||||
a.lock.Lock()
|
a.lock.Lock()
|
||||||
defer a.lock.Unlock()
|
defer a.lock.Unlock()
|
||||||
|
|
||||||
@ -147,7 +148,7 @@ func (a *app) Seal(config *Config) error {
|
|||||||
fmsg.VPrintln("sandbox configuration not supplied, PROCEED WITH CAUTION")
|
fmsg.VPrintln("sandbox configuration not supplied, PROCEED WITH CAUTION")
|
||||||
|
|
||||||
// permissive defaults
|
// permissive defaults
|
||||||
conf := &SandboxConfig{
|
conf := &fipc.SandboxConfig{
|
||||||
UserNS: true,
|
UserNS: true,
|
||||||
Net: true,
|
Net: true,
|
||||||
NoNewSession: true,
|
NoNewSession: true,
|
||||||
@ -157,7 +158,7 @@ func (a *app) Seal(config *Config) error {
|
|||||||
if d, err := a.os.ReadDir("/"); err != nil {
|
if d, err := a.os.ReadDir("/"); err != nil {
|
||||||
return err
|
return err
|
||||||
} else {
|
} else {
|
||||||
b := make([]*FilesystemConfig, 0, len(d))
|
b := make([]*fipc.FilesystemConfig, 0, len(d))
|
||||||
for _, ent := range d {
|
for _, ent := range d {
|
||||||
p := "/" + ent.Name()
|
p := "/" + ent.Name()
|
||||||
switch p {
|
switch p {
|
||||||
@ -169,7 +170,7 @@ func (a *app) Seal(config *Config) error {
|
|||||||
case "/etc":
|
case "/etc":
|
||||||
|
|
||||||
default:
|
default:
|
||||||
b = append(b, &FilesystemConfig{Src: p, Write: true, Must: true})
|
b = append(b, &fipc.FilesystemConfig{Src: p, Write: true, Must: true})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
conf.Filesystem = append(conf.Filesystem, b...)
|
conf.Filesystem = append(conf.Filesystem, b...)
|
||||||
@ -178,7 +179,7 @@ func (a *app) Seal(config *Config) error {
|
|||||||
if d, err := a.os.ReadDir("/run"); err != nil {
|
if d, err := a.os.ReadDir("/run"); err != nil {
|
||||||
return err
|
return err
|
||||||
} else {
|
} else {
|
||||||
b := make([]*FilesystemConfig, 0, len(d))
|
b := make([]*fipc.FilesystemConfig, 0, len(d))
|
||||||
for _, ent := range d {
|
for _, ent := range d {
|
||||||
name := ent.Name()
|
name := ent.Name()
|
||||||
switch name {
|
switch name {
|
||||||
@ -186,7 +187,7 @@ func (a *app) Seal(config *Config) error {
|
|||||||
case "dbus":
|
case "dbus":
|
||||||
default:
|
default:
|
||||||
p := "/run/" + name
|
p := "/run/" + name
|
||||||
b = append(b, &FilesystemConfig{Src: p, Write: true, Must: true})
|
b = append(b, &fipc.FilesystemConfig{Src: p, Write: true, Must: true})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
conf.Filesystem = append(conf.Filesystem, b...)
|
conf.Filesystem = append(conf.Filesystem, b...)
|
||||||
@ -198,7 +199,7 @@ func (a *app) Seal(config *Config) error {
|
|||||||
}
|
}
|
||||||
// bind GPU stuff
|
// bind GPU stuff
|
||||||
if config.Confinement.Enablements.Has(system.EX11) || config.Confinement.Enablements.Has(system.EWayland) {
|
if config.Confinement.Enablements.Has(system.EX11) || config.Confinement.Enablements.Has(system.EWayland) {
|
||||||
conf.Filesystem = append(conf.Filesystem, &FilesystemConfig{Src: "/dev/dri", Device: true})
|
conf.Filesystem = append(conf.Filesystem, &fipc.FilesystemConfig{Src: "/dev/dri", Device: true})
|
||||||
}
|
}
|
||||||
|
|
||||||
config.Confinement.Sandbox = conf
|
config.Confinement.Sandbox = conf
|
||||||
@ -236,5 +237,6 @@ func (a *app) Seal(config *Config) error {
|
|||||||
|
|
||||||
// seal app and release lock
|
// seal app and release lock
|
||||||
a.seal = seal
|
a.seal = seal
|
||||||
|
a.ct = newAppCt(config)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -70,10 +70,9 @@ func (a *app) Start() error {
|
|||||||
} else {
|
} else {
|
||||||
// shim start and setup success, create process state
|
// shim start and setup success, create process state
|
||||||
sd := state.State{
|
sd := state.State{
|
||||||
|
ID: *a.id,
|
||||||
PID: a.shim.Unwrap().Process.Pid,
|
PID: a.shim.Unwrap().Process.Pid,
|
||||||
Command: a.seal.command,
|
Config: a.ct.Unwrap(),
|
||||||
Capability: a.seal.et,
|
|
||||||
Argv: a.shim.Unwrap().Args,
|
|
||||||
Time: *startTime,
|
Time: *startTime,
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -227,8 +226,12 @@ func (a *app) Wait() (int, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// accumulate capabilities of other launchers
|
// accumulate capabilities of other launchers
|
||||||
for _, s := range states {
|
for i, s := range states {
|
||||||
*rt |= s.Capability
|
if s.Config != nil {
|
||||||
|
*rt |= s.Config.Confinement.Enablements
|
||||||
|
} else {
|
||||||
|
fmsg.Printf("state entry %d does not contain config", i)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// invert accumulated enablements for cleanup
|
// invert accumulated enablements for cleanup
|
||||||
|
@ -82,27 +82,41 @@ func (s *simpleStore) mustPrintLauncherState(w **tabwriter.Writer, now time.Time
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
// build enablements string
|
// build enablements and command string
|
||||||
ets := strings.Builder{}
|
var (
|
||||||
|
ets *strings.Builder
|
||||||
|
cs = "(No command information)"
|
||||||
|
)
|
||||||
|
|
||||||
|
// check if enablements are provided
|
||||||
|
if state.Config != nil {
|
||||||
|
ets = new(strings.Builder)
|
||||||
// append enablement strings in order
|
// append enablement strings in order
|
||||||
for i := system.Enablement(0); i < system.Enablement(system.ELen); i++ {
|
for i := system.Enablement(0); i < system.Enablement(system.ELen); i++ {
|
||||||
if state.Capability.Has(i) {
|
if state.Config.Confinement.Enablements.Has(i) {
|
||||||
ets.WriteString(", " + i.String())
|
ets.WriteString(", " + i.String())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// prevent an empty string when
|
|
||||||
|
cs = fmt.Sprintf("%q", state.Config.Command)
|
||||||
|
}
|
||||||
|
if ets != nil {
|
||||||
|
// prevent an empty string
|
||||||
if ets.Len() == 0 {
|
if ets.Len() == 0 {
|
||||||
ets.WriteString("(No enablements)")
|
ets.WriteString("(No enablements)")
|
||||||
}
|
}
|
||||||
|
} else {
|
||||||
|
ets = new(strings.Builder)
|
||||||
|
ets.WriteString("(No confinement information)")
|
||||||
|
}
|
||||||
|
|
||||||
if !fmsg.Verbose() {
|
if !fmsg.Verbose() {
|
||||||
_, _ = fmt.Fprintf(*w, "\t%d\t%s\t%s\t%s\t%s\n",
|
_, _ = fmt.Fprintf(*w, "\t%d\t%s\t%s\t%s\t%s\n",
|
||||||
state.PID, s.path[len(s.path)-1], now.Sub(state.Time).Round(time.Second).String(), strings.TrimPrefix(ets.String(), ", "),
|
state.PID, s.path[len(s.path)-1], now.Sub(state.Time).Round(time.Second).String(), strings.TrimPrefix(ets.String(), ", "), cs)
|
||||||
state.Command)
|
|
||||||
} else {
|
} else {
|
||||||
// emit argv instead when verbose
|
// emit argv instead when verbose
|
||||||
_, _ = fmt.Fprintf(*w, "\t%d\t%s\t%s\n",
|
_, _ = fmt.Fprintf(*w, "\t%d\t%s\t%s\n",
|
||||||
state.PID, s.path[len(s.path)-1], state.Argv)
|
state.PID, s.path[len(s.path)-1], state.ID)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -176,6 +176,10 @@ func (b *simpleBackend) Save(state *State) error {
|
|||||||
b.lock.Lock()
|
b.lock.Lock()
|
||||||
defer b.lock.Unlock()
|
defer b.lock.Unlock()
|
||||||
|
|
||||||
|
if state.Config == nil {
|
||||||
|
return errors.New("state does not contain config")
|
||||||
|
}
|
||||||
|
|
||||||
statePath := b.filename(state.PID)
|
statePath := b.filename(state.PID)
|
||||||
|
|
||||||
// create and open state data file
|
// create and open state data file
|
||||||
|
@ -3,7 +3,7 @@ package state
|
|||||||
import (
|
import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"git.ophivana.moe/security/fortify/internal/system"
|
"git.ophivana.moe/security/fortify/fipc"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Store interface {
|
type Store interface {
|
||||||
@ -26,15 +26,13 @@ type Backend interface {
|
|||||||
|
|
||||||
// State is the on-disk format for a fortified process's state information
|
// State is the on-disk format for a fortified process's state information
|
||||||
type State struct {
|
type State struct {
|
||||||
|
// fortify instance id
|
||||||
|
ID [16]byte `json:"instance"`
|
||||||
// child process PID value
|
// child process PID value
|
||||||
PID int
|
PID int `json:"pid"`
|
||||||
// command used to seal the app
|
// sealed app configuration
|
||||||
Command []string
|
Config *fipc.Config `json:"config"`
|
||||||
// capability enablements applied to child
|
|
||||||
Capability system.Enablements
|
|
||||||
|
|
||||||
// full argv whe launching
|
|
||||||
Argv []string
|
|
||||||
// process start time
|
// process start time
|
||||||
Time time.Time
|
Time time.Time
|
||||||
}
|
}
|
||||||
|
9
main.go
9
main.go
@ -12,6 +12,7 @@ import (
|
|||||||
"text/tabwriter"
|
"text/tabwriter"
|
||||||
|
|
||||||
"git.ophivana.moe/security/fortify/dbus"
|
"git.ophivana.moe/security/fortify/dbus"
|
||||||
|
"git.ophivana.moe/security/fortify/fipc"
|
||||||
"git.ophivana.moe/security/fortify/internal"
|
"git.ophivana.moe/security/fortify/internal"
|
||||||
"git.ophivana.moe/security/fortify/internal/app"
|
"git.ophivana.moe/security/fortify/internal/app"
|
||||||
"git.ophivana.moe/security/fortify/internal/fmsg"
|
"git.ophivana.moe/security/fortify/internal/fmsg"
|
||||||
@ -102,7 +103,7 @@ func main() {
|
|||||||
fmt.Println(license)
|
fmt.Println(license)
|
||||||
fmsg.Exit(0)
|
fmsg.Exit(0)
|
||||||
case "template": // print full template configuration
|
case "template": // print full template configuration
|
||||||
if s, err := json.MarshalIndent(app.Template(), "", " "); err != nil {
|
if s, err := json.MarshalIndent(fipc.Template(), "", " "); err != nil {
|
||||||
fmsg.Fatalf("cannot generate template: %v", err)
|
fmsg.Fatalf("cannot generate template: %v", err)
|
||||||
panic("unreachable")
|
panic("unreachable")
|
||||||
} else {
|
} else {
|
||||||
@ -129,7 +130,7 @@ func main() {
|
|||||||
fmsg.Fatal("app requires at least 1 argument")
|
fmsg.Fatal("app requires at least 1 argument")
|
||||||
}
|
}
|
||||||
|
|
||||||
config := new(app.Config)
|
config := new(fipc.Config)
|
||||||
if f, err := os.Open(args[1]); err != nil {
|
if f, err := os.Open(args[1]); err != nil {
|
||||||
fmsg.Fatalf("cannot access config file %q: %s", args[1], err)
|
fmsg.Fatalf("cannot access config file %q: %s", args[1], err)
|
||||||
panic("unreachable")
|
panic("unreachable")
|
||||||
@ -179,7 +180,7 @@ func main() {
|
|||||||
_ = set.Parse(args[1:])
|
_ = set.Parse(args[1:])
|
||||||
|
|
||||||
// initialise config from flags
|
// initialise config from flags
|
||||||
config := &app.Config{
|
config := &fipc.Config{
|
||||||
ID: fid,
|
ID: fid,
|
||||||
Command: set.Args(),
|
Command: set.Args(),
|
||||||
}
|
}
|
||||||
@ -275,7 +276,7 @@ func main() {
|
|||||||
panic("unreachable")
|
panic("unreachable")
|
||||||
}
|
}
|
||||||
|
|
||||||
func runApp(config *app.Config) {
|
func runApp(config *fipc.Config) {
|
||||||
if os.SdBooted() {
|
if os.SdBooted() {
|
||||||
fmsg.VPrintln("system booted with systemd as init system")
|
fmsg.VPrintln("system booted with systemd as init system")
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user