Compare commits
161 Commits
Author | SHA1 | Date | |
---|---|---|---|
195b717e01 | |||
df6fc298f6 | |||
eae3034260 | |||
5ea7333431 | |||
f796622c35 | |||
5d25bee786 | |||
b48ece3bb0 | |||
9f95f60400 | |||
90dd57f75d | |||
141f2e3685 | |||
73aa285e8f | |||
6e87fc02dd | |||
52f21a19f3 | |||
7be53a2438 | |||
7f29b37a32 | |||
f69e8e753e | |||
ef8fd37e9d | |||
2f676c9d6e | |||
bbace8f84b | |||
2efedf56c0 | |||
b752ec4468 | |||
5d00805a7c | |||
7b6052a473 | |||
38653c6ab5 | |||
b5cbbeab90 | |||
c3ba0c3cce | |||
b453f70ca2 | |||
c2b178e626 | |||
aeda40fc92 | |||
65dc39956f | |||
35505c8a26 | |||
3f993021f8 | |||
4d3bd5338f | |||
138666d753 | |||
f4628e181b | |||
c8a90666c5 | |||
ee41b37606 | |||
e3f1d7ba60 | |||
39e3ac3ccd | |||
33c95b80ca | |||
40cc8a68d1 | |||
f773c92411 | |||
16ab734fcd | |||
cc816a1aaa | |||
b3ef53b193 | |||
8d0573405a | |||
38e92edb8e | |||
2d606b1f4b | |||
1b5b089c78 | |||
6b8ddca7b4 | |||
95668ac998 | |||
b291f0b710 | |||
3a20b149ce | |||
30b8bce90a | |||
de0d78daae | |||
6bf33ce507 | |||
9faf3b3596 | |||
d99c8b1fb4 | |||
6e4870775f | |||
0a546885e3 | |||
653d69da0a | |||
f8256137ae | |||
54b47b0315 | |||
ae2628e57a | |||
c026a4b5dc | |||
748a0ae2c8 | |||
8f3f0c7bbf | |||
05b7dbf066 | |||
866270ff05 | |||
c1fad649e8 | |||
b5f01ef20b | |||
2e23cef7bb | |||
6a6d30af1f | |||
df33123bd7 | |||
1a09b55bd4 | |||
9a13b311ac | |||
45fead18c3 | |||
431aa32291 | |||
3962705126 | |||
ad80be721b | |||
f831948bca | |||
2e31b3d3a1 | |||
4d90e73366 | |||
3dfc1fcd56 | |||
89bafd0c22 | |||
861bb1274f | |||
714818c8aa | |||
69cc64ef56 | |||
fc25ac2523 | |||
d909b1190a | |||
cfd05b10f1 | |||
aa067436a7 | |||
d7df24c999 | |||
88abcbe0b2 | |||
af15b1c048 | |||
7962681f4a | |||
bfcce3ff75 | |||
8cd3651bb6 | |||
422d8e00d5 | |||
584732f80a | |||
4b7b899bb3 | |||
563c39c2d9 | |||
aa1f96eeeb | |||
431dc095e5 | |||
60e91b9b0f | |||
d9cb2a9f2b | |||
09feda3783 | |||
51e84ba8a5 | |||
7df9d8d01d | |||
6d8bcb63f2 | |||
c7b77d6e5e | |||
2f34627d37 | |||
1d6ea81205 | |||
ae1a102882 | |||
093e99d062 | |||
ad7e389eee | |||
5b249e4a66 | |||
2a348c7f91 | |||
eb767e7642 | |||
3bfe8dbf5d | |||
8fa791a2f8 | |||
b932ac8260 | |||
050ffceb27 | |||
31350d74e5 | |||
3b82cc55de | |||
6bc5be7e5a | |||
e35c5fe3ed | |||
20195ece47 | |||
cafed5f234 | |||
42e0b168e3 | |||
380d1f4585 | |||
133f23e0de | |||
65af1684e3 | |||
cdda33555c | |||
ad0034b09a | |||
1da845d78b | |||
55bb348d5f | |||
ecce832d93 | |||
65bd7d18db | |||
4ebb98649e | |||
919e5b5cd5 | |||
40161c5938 | |||
679e719f9e | |||
064db9f020 | |||
73a698c7cb | |||
57c1b3eda6 | |||
5401882ed0 | |||
dd78728fb3 | |||
354c23dd28 | |||
c21168a741 | |||
084cd84f36 | |||
430f1a5b4e | |||
0fd63e85e7 | |||
33cf0bed54 | |||
689f5bed57 | |||
184a5f29fa | |||
3015266e5a | |||
aa5dd2313c | |||
2faf510146 | |||
a0db19b9ad | |||
aaed5080f4 |
46
.gitea/workflows/nix.yml
Normal file
46
.gitea/workflows/nix.yml
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
name: Nix
|
||||||
|
|
||||||
|
on:
|
||||||
|
- push
|
||||||
|
- pull_request
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
tests:
|
||||||
|
name: NixOS tests
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
|
- name: Install Nix
|
||||||
|
uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30
|
||||||
|
with:
|
||||||
|
# explicitly enable sandbox
|
||||||
|
install_options: --daemon
|
||||||
|
extra_nix_config: |
|
||||||
|
sandbox = true
|
||||||
|
system-features = nixos-test benchmark big-parallel kvm
|
||||||
|
enable_kvm: true
|
||||||
|
|
||||||
|
- name: Ensure environment
|
||||||
|
run: >-
|
||||||
|
apt-get update && apt-get install -y sqlite3
|
||||||
|
if: ${{ runner.os == 'Linux' }}
|
||||||
|
|
||||||
|
- name: Restore Nix store
|
||||||
|
uses: nix-community/cache-nix-action@v5
|
||||||
|
with:
|
||||||
|
primary-key: nix-${{ runner.os }}-${{ hashFiles('**/*.nix') }}
|
||||||
|
restore-prefixes-first-match: nix-${{ runner.os }}-
|
||||||
|
|
||||||
|
- name: Run tests
|
||||||
|
run: |
|
||||||
|
nix --print-build-logs --experimental-features 'nix-command flakes' flake check --all-systems
|
||||||
|
nix build --out-link "result" --print-out-paths --print-build-logs .#checks.x86_64-linux.nixos-tests
|
||||||
|
|
||||||
|
- name: Upload test output
|
||||||
|
uses: actions/upload-artifact@v3
|
||||||
|
with:
|
||||||
|
name: "result"
|
||||||
|
path: result/*
|
||||||
|
retention-days: 1
|
@ -1,4 +1,4 @@
|
|||||||
name: release
|
name: Create distribution
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
@ -7,32 +7,47 @@ on:
|
|||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
release:
|
release:
|
||||||
|
name: Release
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
container:
|
||||||
|
image: node:16-bookworm-slim
|
||||||
steps:
|
steps:
|
||||||
|
- name: Get dependencies
|
||||||
|
run: >-
|
||||||
|
echo 'deb http://deb.debian.org/debian bookworm-backports main' >> /etc/apt/sources.list.d/backports.list &&
|
||||||
|
apt-get update &&
|
||||||
|
apt-get install -y
|
||||||
|
acl
|
||||||
|
git
|
||||||
|
gcc
|
||||||
|
pkg-config
|
||||||
|
libwayland-dev
|
||||||
|
wayland-protocols/bookworm-backports
|
||||||
|
libxcb1-dev
|
||||||
|
libacl1-dev
|
||||||
|
if: ${{ runner.os == 'Linux' }}
|
||||||
|
|
||||||
- name: Checkout
|
- name: Checkout
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
- name: Set up go
|
|
||||||
|
- name: Setup go
|
||||||
uses: https://github.com/actions/setup-go@v5
|
uses: https://github.com/actions/setup-go@v5
|
||||||
with:
|
with:
|
||||||
go-version: '>=1.20.1'
|
go-version: '>=1.23.0'
|
||||||
- name: Get dependencies
|
|
||||||
|
- name: Go generate
|
||||||
run: >-
|
run: >-
|
||||||
sudo apt-get update &&
|
go generate ./...
|
||||||
sudo apt-get install -y
|
|
||||||
gcc
|
- name: Build for release
|
||||||
pkg-config
|
run: FORTIFY_VERSION='${{ github.ref_name }}' ./dist/release.sh
|
||||||
libacl1-dev
|
|
||||||
if: ${{ runner.os == 'Linux' }}
|
|
||||||
- name: Build for Linux
|
|
||||||
run: >-
|
|
||||||
sh -c "go build -v -ldflags '-s -w -X main.Version=${{ github.ref_name }}' -o bin/fortify &&
|
|
||||||
sha256sum --tag -b bin/fortify > bin/fortify.sha256"
|
|
||||||
- name: Release
|
- name: Release
|
||||||
id: use-go-action
|
id: use-go-action
|
||||||
uses: https://gitea.com/actions/release-action@main
|
uses: https://gitea.com/actions/release-action@main
|
||||||
with:
|
with:
|
||||||
files: |-
|
files: |-
|
||||||
bin/**
|
dist/fortify-**
|
||||||
api_key: '${{secrets.RELEASE_TOKEN}}'
|
api_key: '${{secrets.RELEASE_TOKEN}}'
|
||||||
|
62
.gitea/workflows/test.yml
Normal file
62
.gitea/workflows/test.yml
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
name: Tests
|
||||||
|
|
||||||
|
on:
|
||||||
|
- push
|
||||||
|
- pull_request
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
test:
|
||||||
|
name: Go tests
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
container:
|
||||||
|
image: node:16-bookworm-slim
|
||||||
|
steps:
|
||||||
|
- name: Enable backports
|
||||||
|
run: >-
|
||||||
|
echo 'deb http://deb.debian.org/debian bookworm-backports main' >> /etc/apt/sources.list.d/backports.list
|
||||||
|
if: ${{ runner.os == 'Linux' }}
|
||||||
|
|
||||||
|
- name: Ensure environment
|
||||||
|
run: >-
|
||||||
|
apt-get update && apt-get install -y curl wget sudo libxml2
|
||||||
|
if: ${{ runner.os == 'Linux' }}
|
||||||
|
|
||||||
|
- name: Get dependencies
|
||||||
|
uses: awalsh128/cache-apt-pkgs-action@latest
|
||||||
|
with:
|
||||||
|
packages: acl git gcc pkg-config libwayland-dev wayland-protocols/bookworm-backports libxcb1-dev libacl1-dev
|
||||||
|
version: 1.0
|
||||||
|
#execute_install_scripts: true
|
||||||
|
if: ${{ runner.os == 'Linux' }}
|
||||||
|
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
fetch-depth: 0
|
||||||
|
|
||||||
|
- name: Setup go
|
||||||
|
uses: https://github.com/actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: '>=1.23.0'
|
||||||
|
|
||||||
|
- name: Go generate
|
||||||
|
run: >-
|
||||||
|
go generate ./...
|
||||||
|
|
||||||
|
- name: Run tests
|
||||||
|
run: >-
|
||||||
|
go test ./...
|
||||||
|
|
||||||
|
- name: Build for test
|
||||||
|
id: build-test
|
||||||
|
run: >-
|
||||||
|
FORTIFY_VERSION="$(git rev-parse --short HEAD)"
|
||||||
|
bash -c './dist/release.sh &&
|
||||||
|
echo "rev=$FORTIFY_VERSION" >> $GITHUB_OUTPUT'
|
||||||
|
|
||||||
|
- name: Upload test build
|
||||||
|
uses: actions/upload-artifact@v3
|
||||||
|
with:
|
||||||
|
name: "fortify-${{ steps.build-test.outputs.rev }}"
|
||||||
|
path: dist/fortify-*
|
||||||
|
retention-days: 1
|
6
.gitignore
vendored
6
.gitignore
vendored
@ -23,3 +23,9 @@ go.work.sum
|
|||||||
.env
|
.env
|
||||||
.idea
|
.idea
|
||||||
.vscode
|
.vscode
|
||||||
|
|
||||||
|
# go generate
|
||||||
|
security-context-v1-protocol.*
|
||||||
|
|
||||||
|
# release
|
||||||
|
/dist/fortify-*
|
183
README.md
183
README.md
@ -1,9 +1,10 @@
|
|||||||
Fortify
|
Fortify
|
||||||
=======
|
=======
|
||||||
|
|
||||||
[![Go Reference](https://pkg.go.dev/badge/git.ophivana.moe/cat/fortify.svg)](https://pkg.go.dev/git.ophivana.moe/cat/fortify)
|
[![Go Reference](https://pkg.go.dev/badge/git.gensokyo.uk/security/fortify.svg)](https://pkg.go.dev/git.gensokyo.uk/security/fortify)
|
||||||
|
[![Go Report Card](https://goreportcard.com/badge/git.gensokyo.uk/security/fortify)](https://goreportcard.com/report/git.gensokyo.uk/security/fortify)
|
||||||
|
|
||||||
Lets you run graphical applications as another user ~~in an Android-like sandbox environment~~ (WIP) with a nice NixOS
|
Lets you run graphical applications as another user in a confined environment with a nice NixOS
|
||||||
module to configure target users and provide launchers and desktop files for your privileged user.
|
module to configure target users and provide launchers and desktop files for your privileged user.
|
||||||
|
|
||||||
Why would you want this?
|
Why would you want this?
|
||||||
@ -12,26 +13,19 @@ Why would you want this?
|
|||||||
|
|
||||||
- It protects applications from each other.
|
- It protects applications from each other.
|
||||||
|
|
||||||
- It provides UID isolation on top of ~~the standard application sandbox~~ (WIP).
|
- It provides UID isolation on top of the standard application sandbox.
|
||||||
|
|
||||||
There are a few different things to set up for this to work:
|
|
||||||
|
|
||||||
- A set of users, each for a group of applications that should be allowed access to each other
|
|
||||||
|
|
||||||
- A tool to switch users, currently sudo and machinectl are supported.
|
|
||||||
|
|
||||||
- If you are running NixOS, the module in this repository can take care of launchers and desktop files in the privileged
|
|
||||||
user's environment, as well as packages and extra home-manager configuration for target users.
|
|
||||||
|
|
||||||
If you have a flakes-enabled nix environment, you can try out the tool by running:
|
If you have a flakes-enabled nix environment, you can try out the tool by running:
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
nix run git+https://git.ophivana.moe/cat/fortify -- -h
|
nix run git+https://git.gensokyo.uk/security/fortify -- help
|
||||||
```
|
```
|
||||||
|
|
||||||
## Module usage
|
## Module usage
|
||||||
|
|
||||||
The NixOS module currently requires home-manager and impermanence to function correctly.
|
The NixOS module currently requires home-manager to function correctly.
|
||||||
|
|
||||||
|
Full module documentation can be found [here](options.md).
|
||||||
|
|
||||||
To use the module, import it into your configuration with
|
To use the module, import it into your configuration with
|
||||||
|
|
||||||
@ -41,7 +35,7 @@ To use the module, import it into your configuration with
|
|||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
|
||||||
|
|
||||||
fortify = {
|
fortify = {
|
||||||
url = "git+https://git.ophivana.moe/cat/fortify";
|
url = "git+https://git.gensokyo.uk/security/fortify";
|
||||||
|
|
||||||
# Optional but recommended to limit the size of your system closure.
|
# Optional but recommended to limit the size of your system closure.
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
@ -68,32 +62,32 @@ This adds the `environment.fortify` option:
|
|||||||
{
|
{
|
||||||
environment.fortify = {
|
environment.fortify = {
|
||||||
enable = true;
|
enable = true;
|
||||||
user = "nixos";
|
stateDir = "/var/lib/persist/module/fortify";
|
||||||
stateDir = "/var/lib/persist/module";
|
users = {
|
||||||
target = {
|
alice = 0;
|
||||||
chronos = {
|
nixos = 10;
|
||||||
launchers = {
|
};
|
||||||
weechat.method = "sudo";
|
|
||||||
claws-mail.capability.pulse = false;
|
|
||||||
|
|
||||||
discord = {
|
apps = [
|
||||||
command = "vesktop --ozone-platform-hint=wayland";
|
{
|
||||||
share = pkgs.vesktop;
|
name = "chromium";
|
||||||
|
id = "org.chromium.Chromium";
|
||||||
|
packages = [ pkgs.chromium ];
|
||||||
|
userns = true;
|
||||||
|
mapRealUid = true;
|
||||||
|
dbus = {
|
||||||
|
system = {
|
||||||
|
filter = true;
|
||||||
|
talk = [
|
||||||
|
"org.bluez"
|
||||||
|
"org.freedesktop.Avahi"
|
||||||
|
"org.freedesktop.UPower"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
|
session =
|
||||||
chromium.dbus = {
|
f:
|
||||||
configSystem = {
|
f {
|
||||||
filter = true;
|
|
||||||
talk = [
|
talk = [
|
||||||
"org.bluez"
|
|
||||||
"org.freedesktop.Avahi"
|
|
||||||
"org.freedesktop.UPower"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
config = {
|
|
||||||
filter = true;
|
|
||||||
talk = [
|
|
||||||
"org.freedesktop.DBus"
|
|
||||||
"org.freedesktop.FileManager1"
|
"org.freedesktop.FileManager1"
|
||||||
"org.freedesktop.Notifications"
|
"org.freedesktop.Notifications"
|
||||||
"org.freedesktop.ScreenSaver"
|
"org.freedesktop.ScreenSaver"
|
||||||
@ -106,74 +100,63 @@ This adds the `environment.fortify` option:
|
|||||||
"org.mpris.MediaPlayer2.org.chromium.Chromium.*"
|
"org.mpris.MediaPlayer2.org.chromium.Chromium.*"
|
||||||
"org.mpris.MediaPlayer2.chromium.*"
|
"org.mpris.MediaPlayer2.chromium.*"
|
||||||
];
|
];
|
||||||
call = {
|
call = { };
|
||||||
"org.freedesktop.portal.*" = "*";
|
broadcast = { };
|
||||||
};
|
|
||||||
broadcast = {
|
|
||||||
"org.freedesktop.portal.*" = "@/org/freedesktop/portal/*";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
|
||||||
};
|
};
|
||||||
packages = with pkgs; [
|
}
|
||||||
weechat
|
{
|
||||||
claws-mail
|
name = "claws-mail";
|
||||||
vesktop
|
id = "org.claws_mail.Claws-Mail";
|
||||||
chromium
|
packages = [ pkgs.claws-mail ];
|
||||||
];
|
gpu = false;
|
||||||
persistence.directories = [
|
capability.pulse = false;
|
||||||
".config/weechat"
|
}
|
||||||
".claws-mail"
|
{
|
||||||
".config/vesktop"
|
name = "weechat";
|
||||||
|
packages = [ pkgs.weechat ];
|
||||||
|
capability = {
|
||||||
|
wayland = false;
|
||||||
|
x11 = false;
|
||||||
|
dbus = true;
|
||||||
|
pulse = false;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name = "discord";
|
||||||
|
id = "dev.vencord.Vesktop";
|
||||||
|
packages = [ pkgs.vesktop ];
|
||||||
|
share = pkgs.vesktop;
|
||||||
|
command = "vesktop --ozone-platform-hint=wayland";
|
||||||
|
userns = true;
|
||||||
|
mapRealUid = true;
|
||||||
|
capability.x11 = true;
|
||||||
|
dbus = {
|
||||||
|
session =
|
||||||
|
f:
|
||||||
|
f {
|
||||||
|
talk = [ "org.kde.StatusNotifierWatcher" ];
|
||||||
|
own = [ ];
|
||||||
|
call = { };
|
||||||
|
broadcast = { };
|
||||||
|
};
|
||||||
|
system.filter = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name = "looking-glass-client";
|
||||||
|
groups = [ "plugdev" ];
|
||||||
|
extraPaths = [
|
||||||
|
{
|
||||||
|
src = "/dev/shm/looking-glass";
|
||||||
|
write = true;
|
||||||
|
}
|
||||||
];
|
];
|
||||||
extraConfig = {
|
extraConfig = {
|
||||||
programs.looking-glass-client.enable = true;
|
programs.looking-glass-client.enable = true;
|
||||||
};
|
};
|
||||||
};
|
}
|
||||||
};
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
* `enable` determines whether the module should be enabled or not. Useful when sharing configurations between graphical
|
|
||||||
and headless systems. Defaults to `false`.
|
|
||||||
|
|
||||||
* `user` specifies the privileged user with access to fortified applications.
|
|
||||||
|
|
||||||
* `stateDir` is the path to your persistent storage location. It is directly passed through to the impermanence module.
|
|
||||||
|
|
||||||
* `target` is an attribute set of submodules, where the attribute name is the username of the unprivileged target user.
|
|
||||||
|
|
||||||
The available options are:
|
|
||||||
|
|
||||||
* `packages`, the list of packages to make available in the target user's environment.
|
|
||||||
|
|
||||||
* `persistence`, user persistence attribute set passed to impermanence.
|
|
||||||
|
|
||||||
* `extraConfig`, extra home-manager configuration for the target user.
|
|
||||||
|
|
||||||
* `launchers`, attribute set where the attribute name is the name of the launcher.
|
|
||||||
|
|
||||||
The available options are:
|
|
||||||
|
|
||||||
* `command`, the command to run as the target user. Defaults to launcher name.
|
|
||||||
|
|
||||||
* `dbus.config`, D-Bus proxy custom configuration.
|
|
||||||
|
|
||||||
* `dbus.configSystem`, D-Bus system bus custom configuration, null to disable.
|
|
||||||
|
|
||||||
* `dbus.id`, D-Bus application id, has no effect if `dbus.config` is set.
|
|
||||||
|
|
||||||
* `dbus.mpris`, whether to enable MPRIS defaults, has no effect if `dbus.config` is set.
|
|
||||||
|
|
||||||
* `capability.wayland`, whether to share the Wayland socket.
|
|
||||||
|
|
||||||
* `capability.x11`, whether to share the X11 socket and allow connection.
|
|
||||||
|
|
||||||
* `capability.dbus`, whether to proxy D-Bus.
|
|
||||||
|
|
||||||
* `capability.pulse`, whether to share the PulseAudio socket and cookie.
|
|
||||||
|
|
||||||
* `share`, package containing desktop/icon files. Defaults to launcher name.
|
|
||||||
|
|
||||||
* `method`, the launch method for the sandboxed program, can be `"fortify"`, `"fortify-sudo"`, `"sudo"`.
|
|
||||||
|
19
acl/acl.go
Normal file
19
acl/acl.go
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
// Package acl implements simple ACL manipulation via libacl.
|
||||||
|
package acl
|
||||||
|
|
||||||
|
type Perms []Perm
|
||||||
|
|
||||||
|
func (ps Perms) String() string {
|
||||||
|
var s = []byte("---")
|
||||||
|
for _, p := range ps {
|
||||||
|
switch p {
|
||||||
|
case Read:
|
||||||
|
s[0] = 'r'
|
||||||
|
case Write:
|
||||||
|
s[1] = 'w'
|
||||||
|
case Execute:
|
||||||
|
s[2] = 'x'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return string(s)
|
||||||
|
}
|
156
acl/acl_getfacl_test.go
Normal file
156
acl/acl_getfacl_test.go
Normal file
@ -0,0 +1,156 @@
|
|||||||
|
package acl_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"bytes"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os/exec"
|
||||||
|
"strconv"
|
||||||
|
)
|
||||||
|
|
||||||
|
type (
|
||||||
|
getFAclInvocation struct {
|
||||||
|
cmd *exec.Cmd
|
||||||
|
val []*getFAclResp
|
||||||
|
pe []error
|
||||||
|
}
|
||||||
|
|
||||||
|
getFAclResp struct {
|
||||||
|
typ fAclType
|
||||||
|
cred int32
|
||||||
|
val fAclPerm
|
||||||
|
|
||||||
|
raw []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
fAclPerm uintptr
|
||||||
|
fAclType uint8
|
||||||
|
)
|
||||||
|
|
||||||
|
const fAclBufSize = 16
|
||||||
|
|
||||||
|
const (
|
||||||
|
fAclPermRead fAclPerm = 1 << iota
|
||||||
|
fAclPermWrite
|
||||||
|
fAclPermExecute
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
fAclTypeUser fAclType = iota
|
||||||
|
fAclTypeGroup
|
||||||
|
fAclTypeMask
|
||||||
|
fAclTypeOther
|
||||||
|
)
|
||||||
|
|
||||||
|
func (c *getFAclInvocation) run(name string) error {
|
||||||
|
if c.cmd != nil {
|
||||||
|
panic("attempted to run twice")
|
||||||
|
}
|
||||||
|
|
||||||
|
c.cmd = exec.Command("getfacl", "--omit-header", "--absolute-names", "--numeric", name)
|
||||||
|
|
||||||
|
scanErr := make(chan error, 1)
|
||||||
|
if p, err := c.cmd.StdoutPipe(); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
go c.parse(p, scanErr)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := c.cmd.Start(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return errors.Join(<-scanErr, c.cmd.Wait())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *getFAclInvocation) parse(pipe io.Reader, scanErr chan error) {
|
||||||
|
c.val = make([]*getFAclResp, 0, 4+fAclBufSize)
|
||||||
|
|
||||||
|
s := bufio.NewScanner(pipe)
|
||||||
|
for s.Scan() {
|
||||||
|
fields := bytes.SplitN(s.Bytes(), []byte{':'}, 3)
|
||||||
|
if len(fields) != 3 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
resp := getFAclResp{}
|
||||||
|
|
||||||
|
switch string(fields[0]) {
|
||||||
|
case "user":
|
||||||
|
resp.typ = fAclTypeUser
|
||||||
|
case "group":
|
||||||
|
resp.typ = fAclTypeGroup
|
||||||
|
case "mask":
|
||||||
|
resp.typ = fAclTypeMask
|
||||||
|
case "other":
|
||||||
|
resp.typ = fAclTypeOther
|
||||||
|
default:
|
||||||
|
c.pe = append(c.pe, fmt.Errorf("unknown type %s", string(fields[0])))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(fields[1]) == 0 {
|
||||||
|
resp.cred = -1
|
||||||
|
} else {
|
||||||
|
if cred, err := strconv.Atoi(string(fields[1])); err != nil {
|
||||||
|
c.pe = append(c.pe, err)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
resp.cred = int32(cred)
|
||||||
|
if resp.cred < 0 {
|
||||||
|
c.pe = append(c.pe, fmt.Errorf("credential %d out of range", resp.cred))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(fields[2]) != 3 {
|
||||||
|
c.pe = append(c.pe, fmt.Errorf("invalid perm length %d", len(fields[2])))
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
switch fields[2][0] {
|
||||||
|
case 'r':
|
||||||
|
resp.val |= fAclPermRead
|
||||||
|
case '-':
|
||||||
|
default:
|
||||||
|
c.pe = append(c.pe, fmt.Errorf("invalid perm %v", fields[2][0]))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
switch fields[2][1] {
|
||||||
|
case 'w':
|
||||||
|
resp.val |= fAclPermWrite
|
||||||
|
case '-':
|
||||||
|
default:
|
||||||
|
c.pe = append(c.pe, fmt.Errorf("invalid perm %v", fields[2][1]))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
switch fields[2][2] {
|
||||||
|
case 'x':
|
||||||
|
resp.val |= fAclPermExecute
|
||||||
|
case '-':
|
||||||
|
default:
|
||||||
|
c.pe = append(c.pe, fmt.Errorf("invalid perm %v", fields[2][2]))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resp.raw = make([]byte, len(s.Bytes()))
|
||||||
|
copy(resp.raw, s.Bytes())
|
||||||
|
c.val = append(c.val, &resp)
|
||||||
|
}
|
||||||
|
scanErr <- s.Err()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *getFAclResp) String() string {
|
||||||
|
if r.raw != nil && len(r.raw) > 0 {
|
||||||
|
return string(r.raw)
|
||||||
|
}
|
||||||
|
|
||||||
|
return "(user-initialised resp value)"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *getFAclResp) equals(typ fAclType, cred int32, val fAclPerm) bool {
|
||||||
|
return r.typ == typ && r.cred == cred && r.val == val
|
||||||
|
}
|
125
acl/acl_test.go
Normal file
125
acl/acl_test.go
Normal file
@ -0,0 +1,125 @@
|
|||||||
|
package acl_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/acl"
|
||||||
|
)
|
||||||
|
|
||||||
|
const testFileName = "acl.test"
|
||||||
|
|
||||||
|
var (
|
||||||
|
uid = os.Geteuid()
|
||||||
|
cred = int32(os.Geteuid())
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestUpdatePerm(t *testing.T) {
|
||||||
|
if os.Getenv("GO_TEST_SKIP_ACL") == "1" {
|
||||||
|
t.Log("acl test skipped")
|
||||||
|
t.SkipNow()
|
||||||
|
}
|
||||||
|
|
||||||
|
testFilePath := path.Join(t.TempDir(), testFileName)
|
||||||
|
|
||||||
|
if f, err := os.Create(testFilePath); err != nil {
|
||||||
|
t.Fatalf("Create: error = %v", err)
|
||||||
|
} else {
|
||||||
|
if err = f.Close(); err != nil {
|
||||||
|
t.Fatalf("Close: error = %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := os.Remove(testFilePath); err != nil {
|
||||||
|
t.Fatalf("Remove: error = %v", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
cur := getfacl(t, testFilePath)
|
||||||
|
|
||||||
|
t.Run("default entry count", func(t *testing.T) {
|
||||||
|
if len(cur) != 3 {
|
||||||
|
t.Fatalf("unexpected test file acl length %d", len(cur))
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("default clear mask", func(t *testing.T) {
|
||||||
|
if err := acl.UpdatePerm(testFilePath, uid); err != nil {
|
||||||
|
t.Fatalf("UpdatePerm: error = %v", err)
|
||||||
|
}
|
||||||
|
if cur = getfacl(t, testFilePath); len(cur) != 4 {
|
||||||
|
t.Fatalf("UpdatePerm: %v", cur)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("default clear consistency", func(t *testing.T) {
|
||||||
|
if err := acl.UpdatePerm(testFilePath, uid); err != nil {
|
||||||
|
t.Fatalf("UpdatePerm: error = %v", err)
|
||||||
|
}
|
||||||
|
if val := getfacl(t, testFilePath); !reflect.DeepEqual(val, cur) {
|
||||||
|
t.Fatalf("UpdatePerm: %v, want %v", val, cur)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
testUpdate(t, testFilePath, "r--", cur, fAclPermRead, acl.Read)
|
||||||
|
testUpdate(t, testFilePath, "-w-", cur, fAclPermWrite, acl.Write)
|
||||||
|
testUpdate(t, testFilePath, "--x", cur, fAclPermExecute, acl.Execute)
|
||||||
|
testUpdate(t, testFilePath, "-wx", cur, fAclPermWrite|fAclPermExecute, acl.Write, acl.Execute)
|
||||||
|
testUpdate(t, testFilePath, "r-x", cur, fAclPermRead|fAclPermExecute, acl.Read, acl.Execute)
|
||||||
|
testUpdate(t, testFilePath, "rw-", cur, fAclPermRead|fAclPermWrite, acl.Read, acl.Write)
|
||||||
|
testUpdate(t, testFilePath, "rwx", cur, fAclPermRead|fAclPermWrite|fAclPermExecute, acl.Read, acl.Write, acl.Execute)
|
||||||
|
}
|
||||||
|
|
||||||
|
func testUpdate(t *testing.T, testFilePath, name string, cur []*getFAclResp, val fAclPerm, perms ...acl.Perm) {
|
||||||
|
t.Run(name, func(t *testing.T) {
|
||||||
|
t.Cleanup(func() {
|
||||||
|
if err := acl.UpdatePerm(testFilePath, uid); err != nil {
|
||||||
|
t.Fatalf("UpdatePerm: error = %v", err)
|
||||||
|
}
|
||||||
|
if v := getfacl(t, testFilePath); !reflect.DeepEqual(v, cur) {
|
||||||
|
t.Fatalf("UpdatePerm: %v, want %v", v, cur)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
if err := acl.UpdatePerm(testFilePath, uid, perms...); err != nil {
|
||||||
|
t.Fatalf("UpdatePerm: error = %v", err)
|
||||||
|
}
|
||||||
|
r := respByCred(getfacl(t, testFilePath), fAclTypeUser, cred)
|
||||||
|
if r == nil {
|
||||||
|
t.Fatalf("UpdatePerm did not add an ACL entry")
|
||||||
|
}
|
||||||
|
if !r.equals(fAclTypeUser, cred, val) {
|
||||||
|
t.Fatalf("UpdatePerm(%s) = %s", name, r)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func getfacl(t *testing.T, name string) []*getFAclResp {
|
||||||
|
c := new(getFAclInvocation)
|
||||||
|
if err := c.run(name); err != nil {
|
||||||
|
t.Fatalf("getfacl: error = %v", err)
|
||||||
|
}
|
||||||
|
if len(c.pe) != 0 {
|
||||||
|
t.Errorf("errors encountered parsing getfacl output\n%s", errors.Join(c.pe...).Error())
|
||||||
|
}
|
||||||
|
return c.val
|
||||||
|
}
|
||||||
|
|
||||||
|
func respByCred(v []*getFAclResp, typ fAclType, cred int32) *getFAclResp {
|
||||||
|
j := -1
|
||||||
|
for i, r := range v {
|
||||||
|
if r.typ == typ && r.cred == cred {
|
||||||
|
if j != -1 {
|
||||||
|
panic("invalid acl")
|
||||||
|
}
|
||||||
|
j = i
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if j == -1 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return v[j]
|
||||||
|
}
|
159
acl/c.go
159
acl/c.go
@ -1,50 +1,95 @@
|
|||||||
package acl
|
package acl
|
||||||
|
|
||||||
|
import "C"
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"runtime"
|
||||||
"syscall"
|
"syscall"
|
||||||
"unsafe"
|
"unsafe"
|
||||||
)
|
)
|
||||||
|
|
||||||
//#include <stdlib.h>
|
/*
|
||||||
//#include <sys/acl.h>
|
#cgo linux pkg-config: libacl
|
||||||
//#include <acl/libacl.h>
|
|
||||||
//#cgo linux LDFLAGS: -lacl
|
|
||||||
import "C"
|
|
||||||
|
|
||||||
type acl struct {
|
#include <stdlib.h>
|
||||||
val C.acl_t
|
#include <sys/acl.h>
|
||||||
freed bool
|
#include <acl/libacl.h>
|
||||||
|
|
||||||
|
static acl_t _go_acl_get_file(const char *path_p, acl_type_t type) {
|
||||||
|
acl_t acl = acl_get_file(path_p, type);
|
||||||
|
free((void *)path_p);
|
||||||
|
return acl;
|
||||||
}
|
}
|
||||||
|
|
||||||
func aclGetFile(path string, t C.acl_type_t) (*acl, error) {
|
static int _go_acl_set_file(const char *path_p, acl_type_t type, acl_t acl) {
|
||||||
p := C.CString(path)
|
if (acl_valid(acl) != 0) {
|
||||||
a, err := C.acl_get_file(p, t)
|
return -1;
|
||||||
C.free(unsafe.Pointer(p))
|
}
|
||||||
|
|
||||||
|
int ret = acl_set_file(path_p, type, acl);
|
||||||
|
free((void *)path_p);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
*/
|
||||||
|
import "C"
|
||||||
|
|
||||||
|
func getFile(name string, t C.acl_type_t) (*ACL, error) {
|
||||||
|
a, err := C._go_acl_get_file(C.CString(name), t)
|
||||||
if errors.Is(err, syscall.ENODATA) {
|
if errors.Is(err, syscall.ENODATA) {
|
||||||
err = nil
|
err = nil
|
||||||
}
|
}
|
||||||
return &acl{val: a, freed: false}, err
|
|
||||||
|
return newACL(a), err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *acl) setFile(path string, t C.acl_type_t) error {
|
func (acl *ACL) setFile(name string, t C.acl_type_t) error {
|
||||||
if C.acl_valid(a.val) != 0 {
|
_, err := C._go_acl_set_file(C.CString(name), t, acl.acl)
|
||||||
return fmt.Errorf("invalid acl")
|
|
||||||
}
|
|
||||||
|
|
||||||
p := C.CString(path)
|
|
||||||
_, err := C.acl_set_file(p, t, a.val)
|
|
||||||
C.free(unsafe.Pointer(p))
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *acl) removeEntry(tt C.acl_tag_t, tq int) error {
|
func newACL(a C.acl_t) *ACL {
|
||||||
|
acl := &ACL{a}
|
||||||
|
runtime.SetFinalizer(acl, (*ACL).free)
|
||||||
|
return acl
|
||||||
|
}
|
||||||
|
|
||||||
|
type ACL struct {
|
||||||
|
acl C.acl_t
|
||||||
|
}
|
||||||
|
|
||||||
|
func (acl *ACL) free() {
|
||||||
|
C.acl_free(unsafe.Pointer(acl.acl))
|
||||||
|
|
||||||
|
// no need for a finalizer anymore
|
||||||
|
runtime.SetFinalizer(acl, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
Read = C.ACL_READ
|
||||||
|
Write = C.ACL_WRITE
|
||||||
|
Execute = C.ACL_EXECUTE
|
||||||
|
|
||||||
|
TypeDefault = C.ACL_TYPE_DEFAULT
|
||||||
|
TypeAccess = C.ACL_TYPE_ACCESS
|
||||||
|
|
||||||
|
UndefinedTag = C.ACL_UNDEFINED_TAG
|
||||||
|
UserObj = C.ACL_USER_OBJ
|
||||||
|
User = C.ACL_USER
|
||||||
|
GroupObj = C.ACL_GROUP_OBJ
|
||||||
|
Group = C.ACL_GROUP
|
||||||
|
Mask = C.ACL_MASK
|
||||||
|
Other = C.ACL_OTHER
|
||||||
|
)
|
||||||
|
|
||||||
|
type (
|
||||||
|
Perm C.acl_perm_t
|
||||||
|
)
|
||||||
|
|
||||||
|
func (acl *ACL) removeEntry(tt C.acl_tag_t, tq int) error {
|
||||||
var e C.acl_entry_t
|
var e C.acl_entry_t
|
||||||
|
|
||||||
// get first entry
|
// get first entry
|
||||||
if r, err := C.acl_get_entry(a.val, C.ACL_FIRST_ENTRY, &e); err != nil {
|
if r, err := C.acl_get_entry(acl.acl, C.ACL_FIRST_ENTRY, &e); err != nil {
|
||||||
return err
|
return err
|
||||||
} else if r == 0 {
|
} else if r == 0 {
|
||||||
// return on acl with no entries
|
// return on acl with no entries
|
||||||
@ -52,7 +97,7 @@ func (a *acl) removeEntry(tt C.acl_tag_t, tq int) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for {
|
for {
|
||||||
if r, err := C.acl_get_entry(a.val, C.ACL_NEXT_ENTRY, &e); err != nil {
|
if r, err := C.acl_get_entry(acl.acl, C.ACL_NEXT_ENTRY, &e); err != nil {
|
||||||
return err
|
return err
|
||||||
} else if r == 0 {
|
} else if r == 0 {
|
||||||
// return on drained acl
|
// return on drained acl
|
||||||
@ -84,16 +129,68 @@ func (a *acl) removeEntry(tt C.acl_tag_t, tq int) error {
|
|||||||
|
|
||||||
// delete on match
|
// delete on match
|
||||||
if t == tt && q == tq {
|
if t == tt && q == tq {
|
||||||
_, err := C.acl_delete_entry(a.val, e)
|
_, err := C.acl_delete_entry(acl.acl, e)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *acl) free() {
|
func UpdatePerm(name string, uid int, perms ...Perm) error {
|
||||||
if a.freed {
|
// read acl from file
|
||||||
panic("acl already freed")
|
a, err := getFile(name, TypeAccess)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
}
|
}
|
||||||
C.acl_free(unsafe.Pointer(a.val))
|
// free acl on return if get is successful
|
||||||
a.freed = true
|
defer a.free()
|
||||||
|
|
||||||
|
// remove existing entry
|
||||||
|
if err = a.removeEntry(User, uid); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// create new entry if perms are passed
|
||||||
|
if len(perms) > 0 {
|
||||||
|
// create new acl entry
|
||||||
|
var e C.acl_entry_t
|
||||||
|
if _, err = C.acl_create_entry(&a.acl, &e); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// get perm set of new entry
|
||||||
|
var p C.acl_permset_t
|
||||||
|
if _, err = C.acl_get_permset(e, &p); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// add target perms
|
||||||
|
for _, perm := range perms {
|
||||||
|
if _, err = C.acl_add_perm(p, C.acl_perm_t(perm)); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// set perm set to new entry
|
||||||
|
if _, err = C.acl_set_permset(e, p); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// set user tag to new entry
|
||||||
|
if _, err = C.acl_set_tag_type(e, User); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// set qualifier (uid) to new entry
|
||||||
|
if _, err = C.acl_set_qualifier(e, unsafe.Pointer(&uid)); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// calculate mask after update
|
||||||
|
if _, err = C.acl_calc_mask(&a.acl); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// write acl to file
|
||||||
|
return a.setFile(name, TypeAccess)
|
||||||
}
|
}
|
||||||
|
@ -1,88 +0,0 @@
|
|||||||
package acl
|
|
||||||
|
|
||||||
import "unsafe"
|
|
||||||
|
|
||||||
//#include <stdlib.h>
|
|
||||||
//#include <sys/acl.h>
|
|
||||||
//#include <acl/libacl.h>
|
|
||||||
//#cgo linux LDFLAGS: -lacl
|
|
||||||
import "C"
|
|
||||||
|
|
||||||
const (
|
|
||||||
Read = C.ACL_READ
|
|
||||||
Write = C.ACL_WRITE
|
|
||||||
Execute = C.ACL_EXECUTE
|
|
||||||
|
|
||||||
TypeDefault = C.ACL_TYPE_DEFAULT
|
|
||||||
TypeAccess = C.ACL_TYPE_ACCESS
|
|
||||||
|
|
||||||
UndefinedTag = C.ACL_UNDEFINED_TAG
|
|
||||||
UserObj = C.ACL_USER_OBJ
|
|
||||||
User = C.ACL_USER
|
|
||||||
GroupObj = C.ACL_GROUP_OBJ
|
|
||||||
Group = C.ACL_GROUP
|
|
||||||
Mask = C.ACL_MASK
|
|
||||||
Other = C.ACL_OTHER
|
|
||||||
)
|
|
||||||
|
|
||||||
type Perm C.acl_perm_t
|
|
||||||
|
|
||||||
func UpdatePerm(path string, uid int, perms ...Perm) error {
|
|
||||||
// read acl from file
|
|
||||||
a, err := aclGetFile(path, TypeAccess)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
// free acl on return if get is successful
|
|
||||||
defer a.free()
|
|
||||||
|
|
||||||
// remove existing entry
|
|
||||||
if err = a.removeEntry(User, uid); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// create new entry if perms are passed
|
|
||||||
if len(perms) > 0 {
|
|
||||||
// create new acl entry
|
|
||||||
var e C.acl_entry_t
|
|
||||||
if _, err = C.acl_create_entry(&a.val, &e); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// get perm set of new entry
|
|
||||||
var p C.acl_permset_t
|
|
||||||
if _, err = C.acl_get_permset(e, &p); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// add target perms
|
|
||||||
for _, perm := range perms {
|
|
||||||
if _, err = C.acl_add_perm(p, C.acl_perm_t(perm)); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// set perm set to new entry
|
|
||||||
if _, err = C.acl_set_permset(e, p); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// set user tag to new entry
|
|
||||||
if _, err = C.acl_set_tag_type(e, User); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// set qualifier (uid) to new entry
|
|
||||||
if _, err = C.acl_set_qualifier(e, unsafe.Pointer(&uid)); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// calculate mask after update
|
|
||||||
if _, err = C.acl_calc_mask(&a.val); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// write acl to file
|
|
||||||
return a.setFile(path, TypeAccess)
|
|
||||||
}
|
|
@ -1,14 +1,12 @@
|
|||||||
package init0
|
package init0
|
||||||
|
|
||||||
const EnvInit = "FORTIFY_INIT"
|
const Env = "FORTIFY_INIT"
|
||||||
|
|
||||||
type Payload struct {
|
type Payload struct {
|
||||||
// target full exec path
|
// target full exec path
|
||||||
Argv0 string
|
Argv0 string
|
||||||
// child full argv
|
// child full argv
|
||||||
Argv []string
|
Argv []string
|
||||||
// wayland fd, -1 to disable
|
|
||||||
WL int
|
|
||||||
|
|
||||||
// verbosity pass through
|
// verbosity pass through
|
||||||
Verbose bool
|
Verbose bool
|
174
cmd/finit/main.go
Normal file
174
cmd/finit/main.go
Normal file
@ -0,0 +1,174 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"os/signal"
|
||||||
|
"path"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
init0 "git.gensokyo.uk/security/fortify/cmd/finit/ipc"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/proc"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
// time to wait for linger processes after death of initial process
|
||||||
|
residualProcessTimeout = 5 * time.Second
|
||||||
|
)
|
||||||
|
|
||||||
|
// everything beyond this point runs within pid namespace
|
||||||
|
// proceed with caution!
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
// sharing stdout with shim
|
||||||
|
// USE WITH CAUTION
|
||||||
|
fmsg.SetPrefix("init")
|
||||||
|
|
||||||
|
// setting this prevents ptrace
|
||||||
|
if err := internal.PR_SET_DUMPABLE__SUID_DUMP_DISABLE(); err != nil {
|
||||||
|
fmsg.Fatalf("cannot set SUID_DUMP_DISABLE: %s", err)
|
||||||
|
panic("unreachable")
|
||||||
|
}
|
||||||
|
|
||||||
|
if os.Getpid() != 1 {
|
||||||
|
fmsg.Fatal("this process must run as pid 1")
|
||||||
|
panic("unreachable")
|
||||||
|
}
|
||||||
|
|
||||||
|
// re-exec
|
||||||
|
if len(os.Args) > 0 && (os.Args[0] != "finit" || len(os.Args) != 1) && path.IsAbs(os.Args[0]) {
|
||||||
|
if err := syscall.Exec(os.Args[0], []string{"finit"}, os.Environ()); err != nil {
|
||||||
|
fmsg.Println("cannot re-exec self:", err)
|
||||||
|
// continue anyway
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// receive setup payload
|
||||||
|
var (
|
||||||
|
payload init0.Payload
|
||||||
|
closeSetup func() error
|
||||||
|
)
|
||||||
|
if f, err := proc.Receive(init0.Env, &payload); err != nil {
|
||||||
|
if errors.Is(err, proc.ErrInvalid) {
|
||||||
|
fmsg.Fatal("invalid config descriptor")
|
||||||
|
}
|
||||||
|
if errors.Is(err, proc.ErrNotSet) {
|
||||||
|
fmsg.Fatal("FORTIFY_INIT not set")
|
||||||
|
}
|
||||||
|
|
||||||
|
fmsg.Fatalf("cannot decode init setup payload: %v", err)
|
||||||
|
panic("unreachable")
|
||||||
|
} else {
|
||||||
|
fmsg.SetVerbose(payload.Verbose)
|
||||||
|
closeSetup = f
|
||||||
|
|
||||||
|
// child does not need to see this
|
||||||
|
if err = os.Unsetenv(init0.Env); err != nil {
|
||||||
|
fmsg.Printf("cannot unset %s: %v", init0.Env, err)
|
||||||
|
// not fatal
|
||||||
|
} else {
|
||||||
|
fmsg.VPrintln("received configuration")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// die with parent
|
||||||
|
if err := internal.PR_SET_PDEATHSIG__SIGKILL(); err != nil {
|
||||||
|
fmsg.Fatalf("prctl(PR_SET_PDEATHSIG, SIGKILL): %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd := exec.Command(payload.Argv0)
|
||||||
|
cmd.Stdin, cmd.Stdout, cmd.Stderr = os.Stdin, os.Stdout, os.Stderr
|
||||||
|
cmd.Args = payload.Argv
|
||||||
|
cmd.Env = os.Environ()
|
||||||
|
|
||||||
|
if err := cmd.Start(); err != nil {
|
||||||
|
fmsg.Fatalf("cannot start %q: %v", payload.Argv0, err)
|
||||||
|
}
|
||||||
|
fmsg.Suspend()
|
||||||
|
|
||||||
|
// close setup pipe as setup is now complete
|
||||||
|
if err := closeSetup(); err != nil {
|
||||||
|
fmsg.Println("cannot close setup pipe:", err)
|
||||||
|
// not fatal
|
||||||
|
}
|
||||||
|
|
||||||
|
sig := make(chan os.Signal, 2)
|
||||||
|
signal.Notify(sig, syscall.SIGINT, syscall.SIGTERM)
|
||||||
|
|
||||||
|
type winfo struct {
|
||||||
|
wpid int
|
||||||
|
wstatus syscall.WaitStatus
|
||||||
|
}
|
||||||
|
info := make(chan winfo, 1)
|
||||||
|
done := make(chan struct{})
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
var (
|
||||||
|
err error
|
||||||
|
wpid = -2
|
||||||
|
wstatus syscall.WaitStatus
|
||||||
|
)
|
||||||
|
|
||||||
|
// keep going until no child process is left
|
||||||
|
for wpid != -1 {
|
||||||
|
if err != nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
if wpid != -2 {
|
||||||
|
info <- winfo{wpid, wstatus}
|
||||||
|
}
|
||||||
|
|
||||||
|
err = syscall.EINTR
|
||||||
|
for errors.Is(err, syscall.EINTR) {
|
||||||
|
wpid, err = syscall.Wait4(-1, &wstatus, 0, nil)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !errors.Is(err, syscall.ECHILD) {
|
||||||
|
fmsg.Println("unexpected wait4 response:", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
close(done)
|
||||||
|
}()
|
||||||
|
|
||||||
|
// closed after residualProcessTimeout has elapsed after initial process death
|
||||||
|
timeout := make(chan struct{})
|
||||||
|
|
||||||
|
r := 2
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case s := <-sig:
|
||||||
|
fmsg.VPrintln("received", s.String())
|
||||||
|
fmsg.Resume() // output could still be withheld at this point, so resume is called
|
||||||
|
fmsg.Exit(0)
|
||||||
|
case w := <-info:
|
||||||
|
if w.wpid == cmd.Process.Pid {
|
||||||
|
// initial process exited, output is most likely available again
|
||||||
|
fmsg.Resume()
|
||||||
|
|
||||||
|
switch {
|
||||||
|
case w.wstatus.Exited():
|
||||||
|
r = w.wstatus.ExitStatus()
|
||||||
|
case w.wstatus.Signaled():
|
||||||
|
r = 128 + int(w.wstatus.Signal())
|
||||||
|
default:
|
||||||
|
r = 255
|
||||||
|
}
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
time.Sleep(residualProcessTimeout)
|
||||||
|
close(timeout)
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
case <-done:
|
||||||
|
fmsg.Exit(r)
|
||||||
|
case <-timeout:
|
||||||
|
fmsg.Println("timeout exceeded waiting for lingering processes")
|
||||||
|
fmsg.Exit(r)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
21
cmd/fshim/ipc/payload.go
Normal file
21
cmd/fshim/ipc/payload.go
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
package shim0
|
||||||
|
|
||||||
|
import (
|
||||||
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
|
)
|
||||||
|
|
||||||
|
const Env = "FORTIFY_SHIM"
|
||||||
|
|
||||||
|
type Payload struct {
|
||||||
|
// child full argv
|
||||||
|
Argv []string
|
||||||
|
// bwrap, target full exec path
|
||||||
|
Exec [2]string
|
||||||
|
// bwrap config
|
||||||
|
Bwrap *bwrap.Config
|
||||||
|
// sync fd
|
||||||
|
Sync *uintptr
|
||||||
|
|
||||||
|
// verbosity pass through
|
||||||
|
Verbose bool
|
||||||
|
}
|
137
cmd/fshim/ipc/shim/shim.go
Normal file
137
cmd/fshim/ipc/shim/shim.go
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
package shim
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/gob"
|
||||||
|
"errors"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"os/signal"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
shim0 "git.gensokyo.uk/security/fortify/cmd/fshim/ipc"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/proc"
|
||||||
|
)
|
||||||
|
|
||||||
|
const shimSetupTimeout = 5 * time.Second
|
||||||
|
|
||||||
|
// used by the parent process
|
||||||
|
|
||||||
|
type Shim struct {
|
||||||
|
// user switcher process
|
||||||
|
cmd *exec.Cmd
|
||||||
|
// uid of shim target user
|
||||||
|
uid uint32
|
||||||
|
// string representation of application id
|
||||||
|
aid string
|
||||||
|
// string representation of supplementary group ids
|
||||||
|
supp []string
|
||||||
|
// fallback exit notifier with error returned killing the process
|
||||||
|
killFallback chan error
|
||||||
|
// shim setup payload
|
||||||
|
payload *shim0.Payload
|
||||||
|
}
|
||||||
|
|
||||||
|
func New(uid uint32, aid string, supp []string, payload *shim0.Payload) *Shim {
|
||||||
|
return &Shim{uid: uid, aid: aid, supp: supp, payload: payload}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Shim) String() string {
|
||||||
|
if s.cmd == nil {
|
||||||
|
return "(unused shim manager)"
|
||||||
|
}
|
||||||
|
return s.cmd.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Shim) Unwrap() *exec.Cmd {
|
||||||
|
return s.cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Shim) WaitFallback() chan error {
|
||||||
|
return s.killFallback
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Shim) Start() (*time.Time, error) {
|
||||||
|
// start user switcher process and save time
|
||||||
|
var fsu string
|
||||||
|
if p, ok := internal.Check(internal.Fsu); !ok {
|
||||||
|
fmsg.Fatal("invalid fsu path, this copy of fshim is not compiled correctly")
|
||||||
|
panic("unreachable")
|
||||||
|
} else {
|
||||||
|
fsu = p
|
||||||
|
}
|
||||||
|
s.cmd = exec.Command(fsu)
|
||||||
|
|
||||||
|
var encoder *gob.Encoder
|
||||||
|
if fd, e, err := proc.Setup(&s.cmd.ExtraFiles); err != nil {
|
||||||
|
return nil, fmsg.WrapErrorSuffix(err,
|
||||||
|
"cannot create shim setup pipe:")
|
||||||
|
} else {
|
||||||
|
encoder = e
|
||||||
|
s.cmd.Env = []string{
|
||||||
|
shim0.Env + "=" + strconv.Itoa(fd),
|
||||||
|
"FORTIFY_APP_ID=" + s.aid,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(s.supp) > 0 {
|
||||||
|
fmsg.VPrintf("attaching supplementary group ids %s", s.supp)
|
||||||
|
s.cmd.Env = append(s.cmd.Env, "FORTIFY_GROUPS="+strings.Join(s.supp, " "))
|
||||||
|
}
|
||||||
|
s.cmd.Stdin, s.cmd.Stdout, s.cmd.Stderr = os.Stdin, os.Stdout, os.Stderr
|
||||||
|
s.cmd.Dir = "/"
|
||||||
|
|
||||||
|
// pass sync fd if set
|
||||||
|
if s.payload.Bwrap.Sync() != nil {
|
||||||
|
fd := proc.ExtraFile(s.cmd, s.payload.Bwrap.Sync())
|
||||||
|
s.payload.Sync = &fd
|
||||||
|
}
|
||||||
|
|
||||||
|
fmsg.VPrintln("starting shim via fsu:", s.cmd)
|
||||||
|
fmsg.Suspend() // withhold messages to stderr
|
||||||
|
if err := s.cmd.Start(); err != nil {
|
||||||
|
return nil, fmsg.WrapErrorSuffix(err,
|
||||||
|
"cannot start fsu:")
|
||||||
|
}
|
||||||
|
startTime := time.Now().UTC()
|
||||||
|
|
||||||
|
// kill shim if something goes wrong and an error is returned
|
||||||
|
s.killFallback = make(chan error, 1)
|
||||||
|
killShim := func() {
|
||||||
|
if err := s.cmd.Process.Signal(os.Interrupt); err != nil {
|
||||||
|
s.killFallback <- err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
defer func() { killShim() }()
|
||||||
|
|
||||||
|
// take alternative exit path on signal
|
||||||
|
sig := make(chan os.Signal, 2)
|
||||||
|
signal.Notify(sig, syscall.SIGINT, syscall.SIGTERM)
|
||||||
|
go func() {
|
||||||
|
v := <-sig
|
||||||
|
fmsg.Printf("got %s after program start", v)
|
||||||
|
s.killFallback <- nil
|
||||||
|
signal.Ignore(syscall.SIGINT, syscall.SIGTERM)
|
||||||
|
}()
|
||||||
|
|
||||||
|
shimErr := make(chan error)
|
||||||
|
go func() { shimErr <- encoder.Encode(s.payload) }()
|
||||||
|
|
||||||
|
select {
|
||||||
|
case err := <-shimErr:
|
||||||
|
if err != nil {
|
||||||
|
return &startTime, fmsg.WrapErrorSuffix(err,
|
||||||
|
"cannot transmit shim config:")
|
||||||
|
}
|
||||||
|
killShim = func() {}
|
||||||
|
case <-time.After(shimSetupTimeout):
|
||||||
|
return &startTime, fmsg.WrapError(errors.New("timed out waiting for shim"),
|
||||||
|
"timed out waiting for shim")
|
||||||
|
}
|
||||||
|
|
||||||
|
return &startTime, nil
|
||||||
|
}
|
145
cmd/fshim/main.go
Normal file
145
cmd/fshim/main.go
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"strconv"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
init0 "git.gensokyo.uk/security/fortify/cmd/finit/ipc"
|
||||||
|
shim "git.gensokyo.uk/security/fortify/cmd/fshim/ipc"
|
||||||
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/proc"
|
||||||
|
)
|
||||||
|
|
||||||
|
// everything beyond this point runs as unconstrained target user
|
||||||
|
// proceed with caution!
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
// sharing stdout with fortify
|
||||||
|
// USE WITH CAUTION
|
||||||
|
fmsg.SetPrefix("shim")
|
||||||
|
|
||||||
|
// setting this prevents ptrace
|
||||||
|
if err := internal.PR_SET_DUMPABLE__SUID_DUMP_DISABLE(); err != nil {
|
||||||
|
fmsg.Fatalf("cannot set SUID_DUMP_DISABLE: %s", err)
|
||||||
|
panic("unreachable")
|
||||||
|
}
|
||||||
|
|
||||||
|
// re-exec
|
||||||
|
if len(os.Args) > 0 && (os.Args[0] != "fshim" || len(os.Args) != 1) && path.IsAbs(os.Args[0]) {
|
||||||
|
if err := syscall.Exec(os.Args[0], []string{"fshim"}, os.Environ()); err != nil {
|
||||||
|
fmsg.Println("cannot re-exec self:", err)
|
||||||
|
// continue anyway
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// check path to finit
|
||||||
|
var finitPath string
|
||||||
|
if p, ok := internal.Path(internal.Finit); !ok {
|
||||||
|
fmsg.Fatal("invalid finit path, this copy of fshim is not compiled correctly")
|
||||||
|
} else {
|
||||||
|
finitPath = p
|
||||||
|
}
|
||||||
|
|
||||||
|
// receive setup payload
|
||||||
|
var (
|
||||||
|
payload shim.Payload
|
||||||
|
closeSetup func() error
|
||||||
|
)
|
||||||
|
if f, err := proc.Receive(shim.Env, &payload); err != nil {
|
||||||
|
if errors.Is(err, proc.ErrInvalid) {
|
||||||
|
fmsg.Fatal("invalid config descriptor")
|
||||||
|
}
|
||||||
|
if errors.Is(err, proc.ErrNotSet) {
|
||||||
|
fmsg.Fatal("FORTIFY_SHIM not set")
|
||||||
|
}
|
||||||
|
|
||||||
|
fmsg.Fatalf("cannot decode shim setup payload: %v", err)
|
||||||
|
panic("unreachable")
|
||||||
|
} else {
|
||||||
|
fmsg.SetVerbose(payload.Verbose)
|
||||||
|
closeSetup = f
|
||||||
|
}
|
||||||
|
|
||||||
|
if payload.Bwrap == nil {
|
||||||
|
fmsg.Fatal("bwrap config not supplied")
|
||||||
|
}
|
||||||
|
|
||||||
|
// restore bwrap sync fd
|
||||||
|
if payload.Sync != nil {
|
||||||
|
payload.Bwrap.SetSync(os.NewFile(*payload.Sync, "sync"))
|
||||||
|
}
|
||||||
|
|
||||||
|
// close setup socket
|
||||||
|
if err := closeSetup(); err != nil {
|
||||||
|
fmsg.Println("cannot close setup pipe:", err)
|
||||||
|
// not fatal
|
||||||
|
}
|
||||||
|
|
||||||
|
var ic init0.Payload
|
||||||
|
|
||||||
|
// resolve argv0
|
||||||
|
ic.Argv = payload.Argv
|
||||||
|
if len(ic.Argv) > 0 {
|
||||||
|
// looked up from $PATH by parent
|
||||||
|
ic.Argv0 = payload.Exec[1]
|
||||||
|
} else {
|
||||||
|
// no argv, look up shell instead
|
||||||
|
var ok bool
|
||||||
|
if payload.Bwrap.SetEnv == nil {
|
||||||
|
fmsg.Fatal("no command was specified and environment is unset")
|
||||||
|
}
|
||||||
|
if ic.Argv0, ok = payload.Bwrap.SetEnv["SHELL"]; !ok {
|
||||||
|
fmsg.Fatal("no command was specified and $SHELL was unset")
|
||||||
|
}
|
||||||
|
|
||||||
|
ic.Argv = []string{ic.Argv0}
|
||||||
|
}
|
||||||
|
|
||||||
|
conf := payload.Bwrap
|
||||||
|
|
||||||
|
var extraFiles []*os.File
|
||||||
|
|
||||||
|
// serve setup payload
|
||||||
|
if fd, encoder, err := proc.Setup(&extraFiles); err != nil {
|
||||||
|
fmsg.Fatalf("cannot pipe: %v", err)
|
||||||
|
} else {
|
||||||
|
conf.SetEnv[init0.Env] = strconv.Itoa(fd)
|
||||||
|
go func() {
|
||||||
|
fmsg.VPrintln("transmitting config to init")
|
||||||
|
if err = encoder.Encode(&ic); err != nil {
|
||||||
|
fmsg.Fatalf("cannot transmit init config: %v", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
helper.BubblewrapName = payload.Exec[0] // resolved bwrap path by parent
|
||||||
|
if b, err := helper.NewBwrap(conf, nil, finitPath,
|
||||||
|
func(int, int) []string { return make([]string, 0) }); err != nil {
|
||||||
|
fmsg.Fatalf("malformed sandbox config: %v", err)
|
||||||
|
} else {
|
||||||
|
cmd := b.Unwrap()
|
||||||
|
cmd.Stdin, cmd.Stdout, cmd.Stderr = os.Stdin, os.Stdout, os.Stderr
|
||||||
|
cmd.ExtraFiles = extraFiles
|
||||||
|
|
||||||
|
if fmsg.Verbose() {
|
||||||
|
fmsg.VPrintln("bwrap args:", conf.Args())
|
||||||
|
}
|
||||||
|
|
||||||
|
// run and pass through exit code
|
||||||
|
if err = b.Start(); err != nil {
|
||||||
|
fmsg.Fatalf("cannot start target process: %v", err)
|
||||||
|
} else if err = b.Wait(); err != nil {
|
||||||
|
fmsg.VPrintln("wait:", err)
|
||||||
|
}
|
||||||
|
if b.Unwrap().ProcessState != nil {
|
||||||
|
fmsg.Exit(b.Unwrap().ProcessState.ExitCode())
|
||||||
|
} else {
|
||||||
|
fmsg.Exit(127)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
154
cmd/fsu/main.go
Normal file
154
cmd/fsu/main.go
Normal file
@ -0,0 +1,154 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"slices"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"syscall"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
compPoison = "INVALIDINVALIDINVALIDINVALIDINVALID"
|
||||||
|
fsuConfFile = "/etc/fsurc"
|
||||||
|
envShim = "FORTIFY_SHIM"
|
||||||
|
envAID = "FORTIFY_APP_ID"
|
||||||
|
envGroups = "FORTIFY_GROUPS"
|
||||||
|
|
||||||
|
PR_SET_NO_NEW_PRIVS = 0x26
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
Fmain = compPoison
|
||||||
|
Fshim = compPoison
|
||||||
|
)
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
log.SetFlags(0)
|
||||||
|
log.SetPrefix("fsu: ")
|
||||||
|
log.SetOutput(os.Stderr)
|
||||||
|
|
||||||
|
if os.Geteuid() != 0 {
|
||||||
|
log.Fatal("this program must be owned by uid 0 and have the setuid bit set")
|
||||||
|
}
|
||||||
|
|
||||||
|
puid := os.Getuid()
|
||||||
|
if puid == 0 {
|
||||||
|
log.Fatal("this program must not be started by root")
|
||||||
|
}
|
||||||
|
|
||||||
|
var fmain, fshim string
|
||||||
|
if p, ok := checkPath(Fmain); !ok {
|
||||||
|
log.Fatal("invalid fortify path, this copy of fsu is not compiled correctly")
|
||||||
|
} else {
|
||||||
|
fmain = p
|
||||||
|
}
|
||||||
|
if p, ok := checkPath(Fshim); !ok {
|
||||||
|
log.Fatal("invalid fshim path, this copy of fsu is not compiled correctly")
|
||||||
|
} else {
|
||||||
|
fshim = p
|
||||||
|
}
|
||||||
|
|
||||||
|
pexe := path.Join("/proc", strconv.Itoa(os.Getppid()), "exe")
|
||||||
|
if p, err := os.Readlink(pexe); err != nil {
|
||||||
|
log.Fatalf("cannot read parent executable path: %v", err)
|
||||||
|
} else if strings.HasSuffix(p, " (deleted)") {
|
||||||
|
log.Fatal("fortify executable has been deleted")
|
||||||
|
} else if p != fmain {
|
||||||
|
log.Fatal("this program must be started by fortify")
|
||||||
|
}
|
||||||
|
|
||||||
|
// uid = 1000000 +
|
||||||
|
// fid * 10000 +
|
||||||
|
// aid
|
||||||
|
uid := 1000000
|
||||||
|
|
||||||
|
// authenticate before accepting user input
|
||||||
|
if fid, ok := parseConfig(fsuConfFile, puid); !ok {
|
||||||
|
log.Fatalf("uid %d is not in the fsurc file", puid)
|
||||||
|
} else {
|
||||||
|
uid += fid * 10000
|
||||||
|
}
|
||||||
|
|
||||||
|
// allowed aid range 0 to 9999
|
||||||
|
if as, ok := os.LookupEnv(envAID); !ok {
|
||||||
|
log.Fatal("FORTIFY_APP_ID not set")
|
||||||
|
} else if aid, err := parseUint32Fast(as); err != nil || aid < 0 || aid > 9999 {
|
||||||
|
log.Fatal("invalid aid")
|
||||||
|
} else {
|
||||||
|
uid += aid
|
||||||
|
}
|
||||||
|
|
||||||
|
// pass through setup fd to shim
|
||||||
|
var shimSetupFd string
|
||||||
|
if s, ok := os.LookupEnv(envShim); !ok {
|
||||||
|
// fortify requests target uid
|
||||||
|
// print resolved uid and exit
|
||||||
|
fmt.Print(uid)
|
||||||
|
os.Exit(0)
|
||||||
|
} else if len(s) != 1 || s[0] > '9' || s[0] < '3' {
|
||||||
|
log.Fatal("FORTIFY_SHIM holds an invalid value")
|
||||||
|
} else {
|
||||||
|
shimSetupFd = s
|
||||||
|
}
|
||||||
|
|
||||||
|
// supplementary groups
|
||||||
|
var suppGroups, suppCurrent []int
|
||||||
|
|
||||||
|
if gs, ok := os.LookupEnv(envGroups); ok {
|
||||||
|
if cur, err := os.Getgroups(); err != nil {
|
||||||
|
log.Fatalf("cannot get groups: %v", err)
|
||||||
|
} else {
|
||||||
|
suppCurrent = cur
|
||||||
|
}
|
||||||
|
|
||||||
|
// parse space-separated list of group ids
|
||||||
|
gss := bytes.Split([]byte(gs), []byte{' '})
|
||||||
|
suppGroups = make([]int, len(gss)+1)
|
||||||
|
for i, s := range gss {
|
||||||
|
if gid, err := strconv.Atoi(string(s)); err != nil {
|
||||||
|
log.Fatalf("cannot parse %q: %v", string(s), err)
|
||||||
|
} else if gid > 0 && gid != uid && gid != os.Getgid() && slices.Contains(suppCurrent, gid) {
|
||||||
|
suppGroups[i] = gid
|
||||||
|
} else {
|
||||||
|
log.Fatalf("invalid gid %d", gid)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
suppGroups[len(suppGroups)-1] = uid
|
||||||
|
} else {
|
||||||
|
suppGroups = []int{uid}
|
||||||
|
}
|
||||||
|
|
||||||
|
// final bounds check to catch any bugs
|
||||||
|
if uid < 1000000 || uid >= 2000000 {
|
||||||
|
panic("uid out of bounds")
|
||||||
|
}
|
||||||
|
|
||||||
|
// careful! users in the allowlist is effectively allowed to drop groups via fsu
|
||||||
|
|
||||||
|
if err := syscall.Setresgid(uid, uid, uid); err != nil {
|
||||||
|
log.Fatalf("cannot set gid: %v", err)
|
||||||
|
}
|
||||||
|
if err := syscall.Setgroups(suppGroups); err != nil {
|
||||||
|
log.Fatalf("cannot set supplementary groups: %v", err)
|
||||||
|
}
|
||||||
|
if err := syscall.Setresuid(uid, uid, uid); err != nil {
|
||||||
|
log.Fatalf("cannot set uid: %v", err)
|
||||||
|
}
|
||||||
|
if _, _, errno := syscall.AllThreadsSyscall(syscall.SYS_PRCTL, PR_SET_NO_NEW_PRIVS, 1, 0); errno != 0 {
|
||||||
|
log.Fatalf("cannot set no_new_privs flag: %s", errno.Error())
|
||||||
|
}
|
||||||
|
if err := syscall.Exec(fshim, []string{"fshim"}, []string{envShim + "=" + shimSetupFd}); err != nil {
|
||||||
|
log.Fatalf("cannot start shim: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
panic("unreachable")
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkPath(p string) (string, bool) {
|
||||||
|
return p, p != compPoison && p != "" && path.IsAbs(p)
|
||||||
|
}
|
77
cmd/fsu/parse.go
Normal file
77
cmd/fsu/parse.go
Normal file
@ -0,0 +1,77 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
"syscall"
|
||||||
|
)
|
||||||
|
|
||||||
|
func parseUint32Fast(s string) (int, error) {
|
||||||
|
sLen := len(s)
|
||||||
|
if sLen < 1 {
|
||||||
|
return -1, errors.New("zero length string")
|
||||||
|
}
|
||||||
|
if sLen > 10 {
|
||||||
|
return -1, errors.New("string too long")
|
||||||
|
}
|
||||||
|
|
||||||
|
n := 0
|
||||||
|
for i, ch := range []byte(s) {
|
||||||
|
ch -= '0'
|
||||||
|
if ch > 9 {
|
||||||
|
return -1, fmt.Errorf("invalid character '%s' at index %d", string([]byte{ch}), i)
|
||||||
|
}
|
||||||
|
n = n*10 + int(ch)
|
||||||
|
}
|
||||||
|
return n, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseConfig(p string, puid int) (fid int, ok bool) {
|
||||||
|
// refuse to run if fsurc is not protected correctly
|
||||||
|
if s, err := os.Stat(p); err != nil {
|
||||||
|
log.Fatal(err)
|
||||||
|
} else if s.Mode().Perm() != 0400 {
|
||||||
|
log.Fatal("bad fsurc perm")
|
||||||
|
} else if st := s.Sys().(*syscall.Stat_t); st.Uid != 0 || st.Gid != 0 {
|
||||||
|
log.Fatal("fsurc must be owned by uid 0")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r, err := os.Open(p); err != nil {
|
||||||
|
log.Fatal(err)
|
||||||
|
return -1, false
|
||||||
|
} else {
|
||||||
|
s := bufio.NewScanner(r)
|
||||||
|
var line int
|
||||||
|
for s.Scan() {
|
||||||
|
line++
|
||||||
|
|
||||||
|
// <puid> <fid>
|
||||||
|
lf := strings.SplitN(s.Text(), " ", 2)
|
||||||
|
if len(lf) != 2 {
|
||||||
|
log.Fatalf("invalid entry on line %d", line)
|
||||||
|
}
|
||||||
|
|
||||||
|
var puid0 int
|
||||||
|
if puid0, err = parseUint32Fast(lf[0]); err != nil || puid0 < 1 {
|
||||||
|
log.Fatalf("invalid parent uid on line %d", line)
|
||||||
|
}
|
||||||
|
|
||||||
|
ok = puid0 == puid
|
||||||
|
if ok {
|
||||||
|
// allowed fid range 0 to 99
|
||||||
|
if fid, err = parseUint32Fast(lf[1]); err != nil || fid < 0 || fid > 99 {
|
||||||
|
log.Fatalf("invalid fortify uid on line %d", line)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err = s.Err(); err != nil {
|
||||||
|
log.Fatalf("cannot read fsurc: %v", err)
|
||||||
|
}
|
||||||
|
return -1, false
|
||||||
|
}
|
||||||
|
}
|
69
cmd/fuserdb/main.go
Normal file
69
cmd/fuserdb/main.go
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"errors"
|
||||||
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
)
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
fmsg.SetPrefix("fuserdb")
|
||||||
|
|
||||||
|
const varEmpty = "/var/empty"
|
||||||
|
|
||||||
|
out := flag.String("o", "userdb", "output directory")
|
||||||
|
homeDir := flag.String("d", varEmpty, "parent of home directories")
|
||||||
|
shell := flag.String("s", "/sbin/nologin", "absolute path to subordinate user shell")
|
||||||
|
flag.Parse()
|
||||||
|
|
||||||
|
type user struct {
|
||||||
|
name string
|
||||||
|
fid int
|
||||||
|
}
|
||||||
|
|
||||||
|
users := make([]user, len(flag.Args()))
|
||||||
|
for i, s := range flag.Args() {
|
||||||
|
f := bytes.SplitN([]byte(s), []byte{':'}, 2)
|
||||||
|
if len(f) != 2 {
|
||||||
|
fmsg.Fatalf("invalid entry at index %d", i)
|
||||||
|
}
|
||||||
|
users[i].name = string(f[0])
|
||||||
|
if fid, err := strconv.Atoi(string(f[1])); err != nil {
|
||||||
|
fmsg.Fatal(err.Error())
|
||||||
|
} else {
|
||||||
|
users[i].fid = fid
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := os.MkdirAll(*out, 0755); err != nil && !errors.Is(err, os.ErrExist) {
|
||||||
|
fmsg.Fatalf("cannot create output: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, u := range users {
|
||||||
|
fidString := strconv.Itoa(u.fid)
|
||||||
|
for aid := 0; aid < 10000; aid++ {
|
||||||
|
userName := fmt.Sprintf("u%d_a%d", u.fid, aid)
|
||||||
|
uid := 1000000 + u.fid*10000 + aid
|
||||||
|
us := strconv.Itoa(uid)
|
||||||
|
realName := fmt.Sprintf("Fortify subordinate user %d (%s)", aid, u.name)
|
||||||
|
var homeDirectory string
|
||||||
|
if *homeDir != varEmpty {
|
||||||
|
homeDirectory = path.Join(*homeDir, "u"+fidString, "a"+strconv.Itoa(aid))
|
||||||
|
} else {
|
||||||
|
homeDirectory = varEmpty
|
||||||
|
}
|
||||||
|
|
||||||
|
writeUser(userName, uid, us, realName, homeDirectory, *shell, *out)
|
||||||
|
writeGroup(userName, uid, us, nil, *out)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fmsg.Printf("created %d entries", len(users)*2*10000)
|
||||||
|
fmsg.Exit(0)
|
||||||
|
}
|
64
cmd/fuserdb/payload.go
Normal file
64
cmd/fuserdb/payload.go
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
)
|
||||||
|
|
||||||
|
type payloadU struct {
|
||||||
|
UserName string `json:"userName"`
|
||||||
|
Uid int `json:"uid"`
|
||||||
|
Gid int `json:"gid"`
|
||||||
|
MemberOf []string `json:"memberOf,omitempty"`
|
||||||
|
RealName string `json:"realName"`
|
||||||
|
HomeDirectory string `json:"homeDirectory"`
|
||||||
|
Shell string `json:"shell"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeUser(userName string, uid int, us string, realName, homeDirectory, shell string, out string) {
|
||||||
|
userFileName := userName + ".user"
|
||||||
|
if f, err := os.OpenFile(path.Join(out, userFileName), os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0644); err != nil {
|
||||||
|
fmsg.Fatalf("cannot create %s: %v", userName, err)
|
||||||
|
} else if err = json.NewEncoder(f).Encode(&payloadU{
|
||||||
|
UserName: userName,
|
||||||
|
Uid: uid,
|
||||||
|
Gid: uid,
|
||||||
|
RealName: realName,
|
||||||
|
HomeDirectory: homeDirectory,
|
||||||
|
Shell: shell,
|
||||||
|
}); err != nil {
|
||||||
|
fmsg.Fatalf("cannot serialise %s: %v", userName, err)
|
||||||
|
} else if err = f.Close(); err != nil {
|
||||||
|
fmsg.Printf("cannot close %s: %v", userName, err)
|
||||||
|
}
|
||||||
|
if err := os.Symlink(userFileName, path.Join(out, us+".user")); err != nil {
|
||||||
|
fmsg.Fatalf("cannot link %s: %v", userName, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type payloadG struct {
|
||||||
|
GroupName string `json:"groupName"`
|
||||||
|
Gid int `json:"gid"`
|
||||||
|
Members []string `json:"members,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeGroup(groupName string, gid int, gs string, members []string, out string) {
|
||||||
|
groupFileName := groupName + ".group"
|
||||||
|
if f, err := os.OpenFile(path.Join(out, groupFileName), os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0644); err != nil {
|
||||||
|
fmsg.Fatalf("cannot create %s: %v", groupName, err)
|
||||||
|
} else if err = json.NewEncoder(f).Encode(&payloadG{
|
||||||
|
GroupName: groupName,
|
||||||
|
Gid: gid,
|
||||||
|
Members: members,
|
||||||
|
}); err != nil {
|
||||||
|
fmsg.Fatalf("cannot serialise %s: %v", groupName, err)
|
||||||
|
} else if err = f.Close(); err != nil {
|
||||||
|
fmsg.Printf("cannot close %s: %v", groupName, err)
|
||||||
|
}
|
||||||
|
if err := os.Symlink(groupFileName, path.Join(out, gs+".group")); err != nil {
|
||||||
|
fmsg.Fatalf("cannot link %s: %v", groupName, err)
|
||||||
|
}
|
||||||
|
}
|
51
comp/_fortify
Normal file
51
comp/_fortify
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
#compdef fortify
|
||||||
|
|
||||||
|
_fortify_app() {
|
||||||
|
_path_files -g "*.(json|ftfy)"
|
||||||
|
}
|
||||||
|
|
||||||
|
_fortify_run() {
|
||||||
|
_arguments \
|
||||||
|
'--id[App ID, leave empty to disable security context app_id]:id' \
|
||||||
|
'-a[Fortify application ID]: :_numbers' \
|
||||||
|
'-g[Groups inherited by the app process]: :_groups' \
|
||||||
|
'-d[Application home directory]: :_files -/' \
|
||||||
|
'-u[Passwd name within sandbox]: :_users' \
|
||||||
|
'--wayland[Share Wayland socket]' \
|
||||||
|
'-X[Share X11 socket and allow connection]' \
|
||||||
|
'--dbus[Proxy D-Bus connection]' \
|
||||||
|
'--pulse[Share PulseAudio socket and cookie]' \
|
||||||
|
'--dbus-config[Path to D-Bus proxy config file]: :_files -g "*.json"' \
|
||||||
|
'--dbus-system[Path to system D-Bus proxy config file]: :_files -g "*.json"' \
|
||||||
|
'--mpris[Allow owning MPRIS D-Bus path]' \
|
||||||
|
'--dbus-log[Force logging in the D-Bus proxy]'
|
||||||
|
}
|
||||||
|
|
||||||
|
(( $+functions[_fortify_commands] )) || _fortify_commands()
|
||||||
|
{
|
||||||
|
local -a _fortify_cmds
|
||||||
|
_fortify_cmds=(
|
||||||
|
"app:Launch app defined by the specified config file"
|
||||||
|
"run:Configure and start a permissive default sandbox"
|
||||||
|
"ps:List active apps and their state"
|
||||||
|
"version:Show fortify version"
|
||||||
|
"license:Show full license text"
|
||||||
|
"template:Produce a config template"
|
||||||
|
"help:Show help message"
|
||||||
|
)
|
||||||
|
if (( CURRENT == 1 )); then
|
||||||
|
_describe -t commands 'fortify command' _fortify_cmds || compadd "$@"
|
||||||
|
else
|
||||||
|
local curcontext="$curcontext"
|
||||||
|
cmd="${${_fortify_cmds[(r)$words[1]:*]%%:*}}"
|
||||||
|
if (( $+functions[_fortify_$cmd] )); then
|
||||||
|
_fortify_$cmd
|
||||||
|
else
|
||||||
|
_message "no more options"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
_arguments -C \
|
||||||
|
'-v[Verbose output]' \
|
||||||
|
'*::fortify command:_fortify_commands'
|
136
config.go
136
config.go
@ -1,136 +0,0 @@
|
|||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"flag"
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/dbus"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/app"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
|
||||||
)
|
|
||||||
|
|
||||||
var (
|
|
||||||
printTemplate bool
|
|
||||||
|
|
||||||
confPath string
|
|
||||||
|
|
||||||
dbusConfigSession string
|
|
||||||
dbusConfigSystem string
|
|
||||||
dbusID string
|
|
||||||
mpris bool
|
|
||||||
dbusVerbose bool
|
|
||||||
|
|
||||||
userName string
|
|
||||||
enablements [state.EnableLength]bool
|
|
||||||
|
|
||||||
launchMethodText string
|
|
||||||
)
|
|
||||||
|
|
||||||
func init() {
|
|
||||||
flag.BoolVar(&printTemplate, "template", false, "Print a full config template and exit")
|
|
||||||
|
|
||||||
// config file, disables every other flag here
|
|
||||||
flag.StringVar(&confPath, "c", "nil", "Path to full app configuration, or \"nil\" to configure from flags")
|
|
||||||
|
|
||||||
flag.StringVar(&dbusConfigSession, "dbus-config", "builtin", "Path to D-Bus proxy config file, or \"builtin\" for defaults")
|
|
||||||
flag.StringVar(&dbusConfigSystem, "dbus-system", "nil", "Path to system D-Bus proxy config file, or \"nil\" to disable")
|
|
||||||
flag.StringVar(&dbusID, "dbus-id", "", "D-Bus ID of application, leave empty to disable own paths, has no effect if custom config is available")
|
|
||||||
flag.BoolVar(&mpris, "mpris", false, "Allow owning MPRIS D-Bus path, has no effect if custom config is available")
|
|
||||||
flag.BoolVar(&dbusVerbose, "dbus-log", false, "Force logging in the D-Bus proxy")
|
|
||||||
|
|
||||||
flag.StringVar(&userName, "u", "chronos", "Passwd name of user to run as")
|
|
||||||
flag.BoolVar(&enablements[state.EnableWayland], "wayland", false, "Share Wayland socket")
|
|
||||||
flag.BoolVar(&enablements[state.EnableX], "X", false, "Share X11 socket and allow connection")
|
|
||||||
flag.BoolVar(&enablements[state.EnableDBus], "dbus", false, "Proxy D-Bus connection")
|
|
||||||
flag.BoolVar(&enablements[state.EnablePulse], "pulse", false, "Share PulseAudio socket and cookie")
|
|
||||||
}
|
|
||||||
|
|
||||||
func init() {
|
|
||||||
methodHelpString := "Method of launching the child process, can be one of \"sudo\""
|
|
||||||
if internal.SdBootedV {
|
|
||||||
methodHelpString += ", \"systemd\""
|
|
||||||
}
|
|
||||||
|
|
||||||
flag.StringVar(&launchMethodText, "method", "sudo", methodHelpString)
|
|
||||||
}
|
|
||||||
|
|
||||||
func tryTemplate() {
|
|
||||||
if printTemplate {
|
|
||||||
if s, err := json.MarshalIndent(app.Template(), "", " "); err != nil {
|
|
||||||
fatalf("cannot generate template: %v", err)
|
|
||||||
panic("unreachable")
|
|
||||||
} else {
|
|
||||||
fmt.Println(string(s))
|
|
||||||
}
|
|
||||||
os.Exit(0)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func loadConfig() *app.Config {
|
|
||||||
if confPath == "nil" {
|
|
||||||
// config from flags
|
|
||||||
return configFromFlags()
|
|
||||||
} else {
|
|
||||||
// config from file
|
|
||||||
c := new(app.Config)
|
|
||||||
if f, err := os.Open(confPath); err != nil {
|
|
||||||
fatalf("cannot access config file '%s': %s\n", confPath, err)
|
|
||||||
panic("unreachable")
|
|
||||||
} else if err = json.NewDecoder(f).Decode(&c); err != nil {
|
|
||||||
fatalf("cannot parse config file '%s': %s\n", confPath, err)
|
|
||||||
panic("unreachable")
|
|
||||||
} else {
|
|
||||||
return c
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func configFromFlags() (config *app.Config) {
|
|
||||||
// initialise config from flags
|
|
||||||
config = &app.Config{
|
|
||||||
ID: dbusID,
|
|
||||||
User: userName,
|
|
||||||
Command: flag.Args(),
|
|
||||||
Method: launchMethodText,
|
|
||||||
}
|
|
||||||
|
|
||||||
// enablements from flags
|
|
||||||
for i := state.Enablement(0); i < state.EnableLength; i++ {
|
|
||||||
if enablements[i] {
|
|
||||||
config.Confinement.Enablements.Set(i)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// parse D-Bus config file from flags if applicable
|
|
||||||
if enablements[state.EnableDBus] {
|
|
||||||
if dbusConfigSession == "builtin" {
|
|
||||||
config.Confinement.SessionBus = dbus.NewConfig(dbusID, true, mpris)
|
|
||||||
} else {
|
|
||||||
if c, err := dbus.NewConfigFromFile(dbusConfigSession); err != nil {
|
|
||||||
fatalf("cannot load session bus proxy config from %q: %s\n", dbusConfigSession, err)
|
|
||||||
} else {
|
|
||||||
config.Confinement.SessionBus = c
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// system bus proxy is optional
|
|
||||||
if dbusConfigSystem != "nil" {
|
|
||||||
if c, err := dbus.NewConfigFromFile(dbusConfigSystem); err != nil {
|
|
||||||
fatalf("cannot load system bus proxy config from %q: %s\n", dbusConfigSystem, err)
|
|
||||||
} else {
|
|
||||||
config.Confinement.SystemBus = c
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// override log from configuration
|
|
||||||
if dbusVerbose {
|
|
||||||
config.Confinement.SessionBus.Log = true
|
|
||||||
config.Confinement.SystemBus.Log = true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
@ -9,7 +9,7 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/dbus"
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestConfig_Args(t *testing.T) {
|
func TestConfig_Args(t *testing.T) {
|
||||||
|
@ -1,3 +1,4 @@
|
|||||||
|
// Package dbus wraps xdg-dbus-proxy and implements configuration and sandboxing of the underlying helper process.
|
||||||
package dbus
|
package dbus
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
@ -5,8 +5,8 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/dbus"
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestNew(t *testing.T) {
|
func TestNew(t *testing.T) {
|
||||||
|
@ -6,8 +6,8 @@ import (
|
|||||||
"io"
|
"io"
|
||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
)
|
)
|
||||||
|
|
||||||
// ProxyName is the file name or path to the proxy program.
|
// ProxyName is the file name or path to the proxy program.
|
||||||
@ -28,6 +28,21 @@ type Proxy struct {
|
|||||||
lock sync.RWMutex
|
lock sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (p *Proxy) Session() [2]string {
|
||||||
|
return p.session
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *Proxy) System() [2]string {
|
||||||
|
return p.system
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *Proxy) Sealed() bool {
|
||||||
|
p.lock.RLock()
|
||||||
|
defer p.lock.RUnlock()
|
||||||
|
|
||||||
|
return p.seal != nil
|
||||||
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
ErrConfig = errors.New("no configuration to seal")
|
ErrConfig = errors.New("no configuration to seal")
|
||||||
)
|
)
|
||||||
|
14
dbus/run.go
14
dbus/run.go
@ -9,9 +9,9 @@ import (
|
|||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
"git.ophivana.moe/cat/fortify/ldd"
|
"git.gensokyo.uk/security/fortify/ldd"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Start launches the D-Bus proxy and sets up the Wait method.
|
// Start launches the D-Bus proxy and sets up the Wait method.
|
||||||
@ -79,11 +79,9 @@ func (p *Proxy) Start(ready chan error, output io.Writer, sandbox bool) error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
bindTargetDedup := make([][2]string, 0, len(bindTarget))
|
|
||||||
for k := range bindTarget {
|
for k := range bindTarget {
|
||||||
bindTargetDedup = append(bindTargetDedup, [2]string{k, k})
|
bc.Bind(k, k, false, true)
|
||||||
}
|
}
|
||||||
bc.Bind = append(bc.Bind, bindTargetDedup...)
|
|
||||||
|
|
||||||
roBindTarget := make(map[string]struct{}, 2+1+len(proxyDeps))
|
roBindTarget := make(map[string]struct{}, 2+1+len(proxyDeps))
|
||||||
|
|
||||||
@ -103,11 +101,9 @@ func (p *Proxy) Start(ready chan error, output io.Writer, sandbox bool) error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
roBindTargetDedup := make([][2]string, 0, len(roBindTarget))
|
|
||||||
for k := range roBindTarget {
|
for k := range roBindTarget {
|
||||||
roBindTargetDedup = append(roBindTargetDedup, [2]string{k, k})
|
bc.Bind(k, k)
|
||||||
}
|
}
|
||||||
bc.ROBind = append(bc.ROBind, roBindTargetDedup...)
|
|
||||||
|
|
||||||
h = helper.MustNewBwrap(bc, p.seal, toolPath, argF)
|
h = helper.MustNewBwrap(bc, p.seal, toolPath, argF)
|
||||||
cmd = h.Unwrap()
|
cmd = h.Unwrap()
|
||||||
|
@ -3,7 +3,7 @@ package dbus_test
|
|||||||
import (
|
import (
|
||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/dbus"
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
)
|
)
|
||||||
|
|
||||||
var samples = []dbusTestCase{
|
var samples = []dbusTestCase{
|
||||||
|
@ -3,7 +3,7 @@ package dbus_test
|
|||||||
import (
|
import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestHelperChildStub(t *testing.T) {
|
func TestHelperChildStub(t *testing.T) {
|
||||||
|
1
dist/fsurc.default
vendored
Normal file
1
dist/fsurc.default
vendored
Normal file
@ -0,0 +1 @@
|
|||||||
|
1000 0
|
10
dist/install.sh
vendored
Executable file
10
dist/install.sh
vendored
Executable file
@ -0,0 +1,10 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
cd "$(dirname -- "$0")" || exit 1
|
||||||
|
|
||||||
|
install -vDm0755 "bin/fortify" "${FORTIFY_INSTALL_PREFIX}/usr/bin/fortify"
|
||||||
|
install -vDm0755 "bin/fshim" "${FORTIFY_INSTALL_PREFIX}/usr/libexec/fortify/fshim"
|
||||||
|
install -vDm0755 "bin/finit" "${FORTIFY_INSTALL_PREFIX}/usr/libexec/fortify/finit"
|
||||||
|
install -vDm0755 "bin/fuserdb" "${FORTIFY_INSTALL_PREFIX}/usr/libexec/fortify/fuserdb"
|
||||||
|
|
||||||
|
install -vDm6511 "bin/fsu" "${FORTIFY_INSTALL_PREFIX}/usr/bin/fsu"
|
||||||
|
install -vDm0400 "fsurc.default" "${FORTIFY_INSTALL_PREFIX}/etc/fsurc"
|
19
dist/release.sh
vendored
Executable file
19
dist/release.sh
vendored
Executable file
@ -0,0 +1,19 @@
|
|||||||
|
#!/bin/sh -e
|
||||||
|
cd "$(dirname -- "$0")/.."
|
||||||
|
VERSION="${FORTIFY_VERSION:-untagged}"
|
||||||
|
pname="fortify-${VERSION}"
|
||||||
|
out="dist/${pname}"
|
||||||
|
|
||||||
|
mkdir -p "${out}"
|
||||||
|
cp "README.md" "dist/fsurc.default" "dist/install.sh" "${out}"
|
||||||
|
|
||||||
|
go build -v -o "${out}/bin/" -ldflags "-s -w
|
||||||
|
-X git.gensokyo.uk/security/fortify/internal.Version=${VERSION}
|
||||||
|
-X git.gensokyo.uk/security/fortify/internal.Fsu=/usr/bin/fsu
|
||||||
|
-X git.gensokyo.uk/security/fortify/internal.Finit=/usr/libexec/fortify/finit
|
||||||
|
-X main.Fmain=/usr/bin/fortify
|
||||||
|
-X main.Fshim=/usr/libexec/fortify/fshim" ./...
|
||||||
|
|
||||||
|
rm -f "./${out}.tar.gz" && tar -C dist -czf "${out}.tar.gz" "${pname}"
|
||||||
|
rm -rf "./${out}"
|
||||||
|
sha512sum "${out}.tar.gz" > "${out}.tar.gz.sha512"
|
34
error.go
34
error.go
@ -2,22 +2,21 @@ package main
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/app"
|
"git.gensokyo.uk/security/fortify/internal/app"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
)
|
)
|
||||||
|
|
||||||
func logWaitError(err error) {
|
func logWaitError(err error) {
|
||||||
var e *app.BaseError
|
var e *fmsg.BaseError
|
||||||
if !app.AsBaseError(err, &e) {
|
if !fmsg.AsBaseError(err, &e) {
|
||||||
fmt.Println("fortify: wait failed:", err)
|
fmsg.Println("wait failed:", err)
|
||||||
} else {
|
} else {
|
||||||
// Wait only returns either *app.ProcessError or *app.StateStoreError wrapped in a *app.BaseError
|
// Wait only returns either *app.ProcessError or *app.StateStoreError wrapped in a *app.BaseError
|
||||||
var se *app.StateStoreError
|
var se *app.StateStoreError
|
||||||
if !errors.As(err, &se) {
|
if !errors.As(err, &se) {
|
||||||
// does not need special handling
|
// does not need special handling
|
||||||
fmt.Print("fortify: " + e.Message())
|
fmsg.Print(e.Message())
|
||||||
} else {
|
} else {
|
||||||
// inner error are either unwrapped store errors
|
// inner error are either unwrapped store errors
|
||||||
// or joined errors returned by *appSealTx revert
|
// or joined errors returned by *appSealTx revert
|
||||||
@ -25,19 +24,19 @@ func logWaitError(err error) {
|
|||||||
var ej app.RevertCompoundError
|
var ej app.RevertCompoundError
|
||||||
if !errors.As(se.InnerErr, &ej) {
|
if !errors.As(se.InnerErr, &ej) {
|
||||||
// does not require special handling
|
// does not require special handling
|
||||||
fmt.Print("fortify: " + e.Message())
|
fmsg.Print(e.Message())
|
||||||
} else {
|
} else {
|
||||||
errs := ej.Unwrap()
|
errs := ej.Unwrap()
|
||||||
|
|
||||||
// every error here is wrapped in *app.BaseError
|
// every error here is wrapped in *app.BaseError
|
||||||
for _, ei := range errs {
|
for _, ei := range errs {
|
||||||
var eb *app.BaseError
|
var eb *fmsg.BaseError
|
||||||
if !errors.As(ei, &eb) {
|
if !errors.As(ei, &eb) {
|
||||||
// unreachable
|
// unreachable
|
||||||
fmt.Println("fortify: invalid error type returned by revert:", ei)
|
fmsg.Println("invalid error type returned by revert:", ei)
|
||||||
} else {
|
} else {
|
||||||
// print inner *app.BaseError message
|
// print inner *app.BaseError message
|
||||||
fmt.Print("fortify: " + eb.Message())
|
fmsg.Print(eb.Message())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -46,16 +45,11 @@ func logWaitError(err error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func logBaseError(err error, message string) {
|
func logBaseError(err error, message string) {
|
||||||
var e *app.BaseError
|
var e *fmsg.BaseError
|
||||||
|
|
||||||
if app.AsBaseError(err, &e) {
|
if fmsg.AsBaseError(err, &e) {
|
||||||
fmt.Print("fortify: " + e.Message())
|
fmsg.Print(e.Message())
|
||||||
} else {
|
} else {
|
||||||
fmt.Println(message, err)
|
fmsg.Println(message, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func fatalf(format string, a ...any) {
|
|
||||||
fmt.Printf("fortify: "+format, a...)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
30
flake.lock
generated
30
flake.lock
generated
@ -1,23 +1,45 @@
|
|||||||
{
|
{
|
||||||
"nodes": {
|
"nodes": {
|
||||||
|
"home-manager": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1733951536,
|
||||||
|
"narHash": "sha256-Zb5ZCa7Xj+0gy5XVXINTSr71fCfAv+IKtmIXNrykT54=",
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "home-manager",
|
||||||
|
"rev": "1318c3f3b068cdcea922fa7c1a0a1f0c96c22f5f",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-community",
|
||||||
|
"ref": "release-24.11",
|
||||||
|
"repo": "home-manager",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1725361206,
|
"lastModified": 1734298236,
|
||||||
"narHash": "sha256-/HTUg+kMaqBPGrcQBYboAMsQHIWIkuKRDldss/035Hc=",
|
"narHash": "sha256-aWhhqY44xBjMoO9r5fyPp5u8tqUNWRZ/m/P+abMSs5c=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "2830c7c930311397d94c0b86a359c865c081c875",
|
"rev": "eb919d9300b6a18f8583f58aef16db458fbd7bec",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"ref": "nixos-unstable-small",
|
"ref": "nixos-24.11-small",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
|
"home-manager": "home-manager",
|
||||||
"nixpkgs": "nixpkgs"
|
"nixpkgs": "nixpkgs"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
113
flake.nix
113
flake.nix
@ -2,11 +2,20 @@
|
|||||||
description = "fortify sandbox tool and nixos module";
|
description = "fortify sandbox tool and nixos module";
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable-small";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.11-small";
|
||||||
|
|
||||||
|
home-manager = {
|
||||||
|
url = "github:nix-community/home-manager/release-24.11";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs =
|
outputs =
|
||||||
{ self, nixpkgs }:
|
{
|
||||||
|
self,
|
||||||
|
nixpkgs,
|
||||||
|
home-manager,
|
||||||
|
}:
|
||||||
let
|
let
|
||||||
supportedSystems = [
|
supportedSystems = [
|
||||||
"aarch64-linux"
|
"aarch64-linux"
|
||||||
@ -20,6 +29,55 @@
|
|||||||
{
|
{
|
||||||
nixosModules.fortify = import ./nixos.nix;
|
nixosModules.fortify = import ./nixos.nix;
|
||||||
|
|
||||||
|
checks = forAllSystems (
|
||||||
|
system:
|
||||||
|
let
|
||||||
|
pkgs = nixpkgsFor.${system};
|
||||||
|
|
||||||
|
inherit (pkgs)
|
||||||
|
runCommandLocal
|
||||||
|
callPackage
|
||||||
|
nixfmt-rfc-style
|
||||||
|
deadnix
|
||||||
|
statix
|
||||||
|
;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
check-formatting =
|
||||||
|
runCommandLocal "check-formatting" { nativeBuildInputs = [ nixfmt-rfc-style ]; }
|
||||||
|
''
|
||||||
|
cd ${./.}
|
||||||
|
|
||||||
|
echo "running nixfmt..."
|
||||||
|
nixfmt --check .
|
||||||
|
|
||||||
|
touch $out
|
||||||
|
'';
|
||||||
|
|
||||||
|
check-lint =
|
||||||
|
runCommandLocal "check-lint"
|
||||||
|
{
|
||||||
|
nativeBuildInputs = [
|
||||||
|
deadnix
|
||||||
|
statix
|
||||||
|
];
|
||||||
|
}
|
||||||
|
''
|
||||||
|
cd ${./.}
|
||||||
|
|
||||||
|
echo "running deadnix..."
|
||||||
|
deadnix --fail
|
||||||
|
|
||||||
|
echo "running statix..."
|
||||||
|
statix check .
|
||||||
|
|
||||||
|
touch $out
|
||||||
|
'';
|
||||||
|
|
||||||
|
nixos-tests = callPackage ./test.nix { inherit system self home-manager; };
|
||||||
|
}
|
||||||
|
);
|
||||||
|
|
||||||
packages = forAllSystems (
|
packages = forAllSystems (
|
||||||
system:
|
system:
|
||||||
let
|
let
|
||||||
@ -34,10 +92,61 @@
|
|||||||
|
|
||||||
devShells = forAllSystems (system: {
|
devShells = forAllSystems (system: {
|
||||||
default = nixpkgsFor.${system}.mkShell {
|
default = nixpkgsFor.${system}.mkShell {
|
||||||
|
buildInputs = with nixpkgsFor.${system}; self.packages.${system}.fortify.buildInputs;
|
||||||
|
};
|
||||||
|
|
||||||
|
fhs = nixpkgsFor.${system}.buildFHSEnv {
|
||||||
|
pname = "fortify-fhs";
|
||||||
|
inherit (self.packages.${system}.fortify) version;
|
||||||
|
targetPkgs =
|
||||||
|
pkgs: with pkgs; [
|
||||||
|
go
|
||||||
|
gcc
|
||||||
|
pkg-config
|
||||||
|
acl
|
||||||
|
wayland
|
||||||
|
wayland-scanner
|
||||||
|
wayland-protocols
|
||||||
|
xorg.libxcb
|
||||||
|
];
|
||||||
|
extraOutputsToInstall = [ "dev" ];
|
||||||
|
profile = ''
|
||||||
|
export PKG_CONFIG_PATH="/usr/share/pkgconfig:$PKG_CONFIG_PATH"
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
withPackage = nixpkgsFor.${system}.mkShell {
|
||||||
buildInputs =
|
buildInputs =
|
||||||
with nixpkgsFor.${system};
|
with nixpkgsFor.${system};
|
||||||
self.packages.${system}.fortify.buildInputs ++ [ self.packages.${system}.fortify ];
|
self.packages.${system}.fortify.buildInputs ++ [ self.packages.${system}.fortify ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
generateDoc =
|
||||||
|
let
|
||||||
|
pkgs = nixpkgsFor.${system};
|
||||||
|
inherit (pkgs) lib;
|
||||||
|
|
||||||
|
doc =
|
||||||
|
let
|
||||||
|
eval = lib.evalModules {
|
||||||
|
specialArgs = {
|
||||||
|
inherit pkgs;
|
||||||
|
};
|
||||||
|
modules = [ ./options.nix ];
|
||||||
|
};
|
||||||
|
cleanEval = lib.filterAttrsRecursive (n: _: n != "_module") eval;
|
||||||
|
in
|
||||||
|
pkgs.nixosOptionsDoc { inherit (cleanEval) options; };
|
||||||
|
docText = pkgs.runCommand "fortify-module-docs.md" { } ''
|
||||||
|
cat ${doc.optionsCommonMark} > $out
|
||||||
|
sed -i '/*Declared by:*/,+1 d' $out
|
||||||
|
'';
|
||||||
|
in
|
||||||
|
nixpkgsFor.${system}.mkShell {
|
||||||
|
shellHook = ''
|
||||||
|
exec cat ${docText} > options.md
|
||||||
|
'';
|
||||||
|
};
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -1,21 +1,22 @@
|
|||||||
package app
|
package fst
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"git.ophivana.moe/cat/fortify/dbus"
|
"errors"
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
const fTmp = "/fortify"
|
||||||
|
|
||||||
// Config is used to seal an *App
|
// Config is used to seal an *App
|
||||||
type Config struct {
|
type Config struct {
|
||||||
// D-Bus application ID
|
// D-Bus application ID
|
||||||
ID string `json:"id"`
|
ID string `json:"id"`
|
||||||
// username of the target user to switch to
|
|
||||||
User string `json:"user"`
|
|
||||||
// value passed through to the child process as its argv
|
// value passed through to the child process as its argv
|
||||||
Command []string `json:"command"`
|
Command []string `json:"command"`
|
||||||
// string representation of the child's launch method
|
|
||||||
Method string `json:"method"`
|
|
||||||
|
|
||||||
// child confinement configuration
|
// child confinement configuration
|
||||||
Confinement ConfinementConfig `json:"confinement"`
|
Confinement ConfinementConfig `json:"confinement"`
|
||||||
@ -23,6 +24,16 @@ type Config struct {
|
|||||||
|
|
||||||
// ConfinementConfig defines fortified child's confinement
|
// ConfinementConfig defines fortified child's confinement
|
||||||
type ConfinementConfig struct {
|
type ConfinementConfig struct {
|
||||||
|
// numerical application id, determines uid in the init namespace
|
||||||
|
AppID int `json:"app_id"`
|
||||||
|
// list of supplementary groups to inherit
|
||||||
|
Groups []string `json:"groups"`
|
||||||
|
// passwd username in the sandbox, defaults to chronos
|
||||||
|
Username string `json:"username,omitempty"`
|
||||||
|
// home directory in sandbox, empty for outer
|
||||||
|
Inner string `json:"home_inner"`
|
||||||
|
// home directory in init namespace
|
||||||
|
Outer string `json:"home"`
|
||||||
// bwrap sandbox confinement configuration
|
// bwrap sandbox confinement configuration
|
||||||
Sandbox *SandboxConfig `json:"sandbox"`
|
Sandbox *SandboxConfig `json:"sandbox"`
|
||||||
|
|
||||||
@ -34,7 +45,7 @@ type ConfinementConfig struct {
|
|||||||
SessionBus *dbus.Config `json:"session_bus,omitempty"`
|
SessionBus *dbus.Config `json:"session_bus,omitempty"`
|
||||||
|
|
||||||
// child capability enablements
|
// child capability enablements
|
||||||
Enablements state.Enablements `json:"enablements"`
|
Enablements system.Enablements `json:"enablements"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// SandboxConfig describes resources made available to the sandbox.
|
// SandboxConfig describes resources made available to the sandbox.
|
||||||
@ -45,17 +56,25 @@ type SandboxConfig struct {
|
|||||||
UserNS bool `json:"userns,omitempty"`
|
UserNS bool `json:"userns,omitempty"`
|
||||||
// share net namespace
|
// share net namespace
|
||||||
Net bool `json:"net,omitempty"`
|
Net bool `json:"net,omitempty"`
|
||||||
|
// share all devices
|
||||||
|
Dev bool `json:"dev,omitempty"`
|
||||||
// do not run in new session
|
// do not run in new session
|
||||||
NoNewSession bool `json:"no_new_session,omitempty"`
|
NoNewSession bool `json:"no_new_session,omitempty"`
|
||||||
// mediated access to wayland socket
|
// map target user uid to privileged user uid in the user namespace
|
||||||
Wayland bool `json:"wayland,omitempty"`
|
MapRealUID bool `json:"map_real_uid"`
|
||||||
|
// direct access to wayland socket
|
||||||
|
DirectWayland bool `json:"direct_wayland,omitempty"`
|
||||||
|
|
||||||
// final environment variables
|
// final environment variables
|
||||||
Env map[string]string `json:"env"`
|
Env map[string]string `json:"env"`
|
||||||
// sandbox host filesystem access
|
// sandbox host filesystem access
|
||||||
Filesystem []*FilesystemConfig `json:"filesystem"`
|
Filesystem []*FilesystemConfig `json:"filesystem"`
|
||||||
// tmpfs mount points to mount last
|
// symlinks created inside the sandbox
|
||||||
Tmpfs []bwrap.TmpfsConfig `json:"tmpfs"`
|
Link [][2]string `json:"symlink"`
|
||||||
|
// automatically set up /etc symlinks
|
||||||
|
AutoEtc bool `json:"auto_etc"`
|
||||||
|
// paths to override by mounting tmpfs over them
|
||||||
|
Override []string `json:"override"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type FilesystemConfig struct {
|
type FilesystemConfig struct {
|
||||||
@ -71,71 +90,92 @@ type FilesystemConfig struct {
|
|||||||
Must bool `json:"require,omitempty"`
|
Must bool `json:"require,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *SandboxConfig) Bwrap() *bwrap.Config {
|
// Bwrap returns the address of the corresponding bwrap.Config to s.
|
||||||
|
// Note that remaining tmpfs entries must be queued by the caller prior to launch.
|
||||||
|
func (s *SandboxConfig) Bwrap(os linux.System) (*bwrap.Config, error) {
|
||||||
if s == nil {
|
if s == nil {
|
||||||
return nil
|
return nil, errors.New("nil sandbox config")
|
||||||
}
|
}
|
||||||
|
|
||||||
nobody := 65534
|
var uid int
|
||||||
conf := &bwrap.Config{
|
if !s.MapRealUID {
|
||||||
|
uid = 65534
|
||||||
|
} else {
|
||||||
|
uid = os.Geteuid()
|
||||||
|
}
|
||||||
|
|
||||||
|
conf := (&bwrap.Config{
|
||||||
Net: s.Net,
|
Net: s.Net,
|
||||||
UserNS: s.UserNS,
|
UserNS: s.UserNS,
|
||||||
UID: &nobody,
|
|
||||||
GID: &nobody,
|
|
||||||
Hostname: s.Hostname,
|
Hostname: s.Hostname,
|
||||||
Clearenv: true,
|
Clearenv: true,
|
||||||
SetEnv: s.Env,
|
SetEnv: s.Env,
|
||||||
Procfs: []string{"/proc"},
|
|
||||||
DevTmpfs: []string{"/dev"},
|
|
||||||
Mqueue: []string{"/dev/mqueue"},
|
|
||||||
NewSession: !s.NoNewSession,
|
NewSession: !s.NoNewSession,
|
||||||
DieWithParent: true,
|
DieWithParent: true,
|
||||||
AsInit: true,
|
AsInit: true,
|
||||||
|
|
||||||
|
// initialise map
|
||||||
|
Chmod: make(bwrap.ChmodConfig),
|
||||||
|
}).
|
||||||
|
SetUID(uid).SetGID(uid).
|
||||||
|
Procfs("/proc").
|
||||||
|
Tmpfs(fTmp, 4*1024)
|
||||||
|
|
||||||
|
if !s.Dev {
|
||||||
|
conf.DevTmpfs("/dev").Mqueue("/dev/mqueue")
|
||||||
|
} else {
|
||||||
|
conf.Bind("/dev", "/dev", false, true, true)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !s.AutoEtc {
|
||||||
|
conf.Dir("/etc")
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, c := range s.Filesystem {
|
for _, c := range s.Filesystem {
|
||||||
if c == nil {
|
if c == nil {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
p := [2]string{c.Src, c.Dst}
|
src := c.Src
|
||||||
|
dest := c.Dst
|
||||||
if c.Dst == "" {
|
if c.Dst == "" {
|
||||||
p[1] = c.Src
|
dest = c.Src
|
||||||
}
|
}
|
||||||
|
conf.Bind(src, dest, !c.Must, c.Write, c.Device)
|
||||||
|
}
|
||||||
|
|
||||||
switch {
|
for _, l := range s.Link {
|
||||||
case c.Device:
|
conf.Symlink(l[0], l[1])
|
||||||
if c.Must {
|
}
|
||||||
conf.DevBind = append(conf.DevBind, p)
|
|
||||||
} else {
|
if s.AutoEtc {
|
||||||
conf.DevBindTry = append(conf.DevBindTry, p)
|
conf.Bind("/etc", fTmp+"/etc")
|
||||||
}
|
|
||||||
case c.Write:
|
// link host /etc contents to prevent passwd/group from being overwritten
|
||||||
if c.Must {
|
if d, err := os.ReadDir("/etc"); err != nil {
|
||||||
conf.Bind = append(conf.Bind, p)
|
return nil, err
|
||||||
} else {
|
} else {
|
||||||
conf.BindTry = append(conf.BindTry, p)
|
for _, ent := range d {
|
||||||
}
|
name := ent.Name()
|
||||||
default:
|
switch name {
|
||||||
if c.Must {
|
case "passwd":
|
||||||
conf.ROBind = append(conf.ROBind, p)
|
case "group":
|
||||||
} else {
|
|
||||||
conf.ROBindTry = append(conf.ROBindTry, p)
|
case "mtab":
|
||||||
|
conf.Symlink("/proc/mounts", "/etc/"+name)
|
||||||
|
default:
|
||||||
|
conf.Symlink(fTmp+"/etc/"+name, "/etc/"+name)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tmpfs := range s.Tmpfs {
|
return conf, nil
|
||||||
conf.Tmpfs = append(conf.Tmpfs, bwrap.PermConfig[bwrap.TmpfsConfig]{Path: tmpfs, Last: true})
|
|
||||||
}
|
|
||||||
|
|
||||||
return conf
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Template returns a fully populated instance of Config.
|
// Template returns a fully populated instance of Config.
|
||||||
func Template() *Config {
|
func Template() *Config {
|
||||||
return &Config{
|
return &Config{
|
||||||
ID: "org.chromium.Chromium",
|
ID: "org.chromium.Chromium",
|
||||||
User: "chronos",
|
|
||||||
Command: []string{
|
Command: []string{
|
||||||
"chromium",
|
"chromium",
|
||||||
"--ignore-gpu-blocklist",
|
"--ignore-gpu-blocklist",
|
||||||
@ -143,14 +183,20 @@ func Template() *Config {
|
|||||||
"--enable-features=UseOzonePlatform",
|
"--enable-features=UseOzonePlatform",
|
||||||
"--ozone-platform=wayland",
|
"--ozone-platform=wayland",
|
||||||
},
|
},
|
||||||
Method: "sudo",
|
|
||||||
Confinement: ConfinementConfig{
|
Confinement: ConfinementConfig{
|
||||||
|
AppID: 9,
|
||||||
|
Groups: []string{"video"},
|
||||||
|
Username: "chronos",
|
||||||
|
Outer: "/var/lib/persist/home/org.chromium.Chromium",
|
||||||
|
Inner: "/var/lib/fortify",
|
||||||
Sandbox: &SandboxConfig{
|
Sandbox: &SandboxConfig{
|
||||||
Hostname: "localhost",
|
Hostname: "localhost",
|
||||||
UserNS: true,
|
UserNS: true,
|
||||||
Net: true,
|
Net: true,
|
||||||
NoNewSession: true,
|
NoNewSession: true,
|
||||||
Wayland: false,
|
MapRealUID: true,
|
||||||
|
Dev: true,
|
||||||
|
DirectWayland: false,
|
||||||
// example API credentials pulled from Google Chrome
|
// example API credentials pulled from Google Chrome
|
||||||
// DO NOT USE THESE IN A REAL BROWSER
|
// DO NOT USE THESE IN A REAL BROWSER
|
||||||
Env: map[string]string{
|
Env: map[string]string{
|
||||||
@ -159,14 +205,16 @@ func Template() *Config {
|
|||||||
"GOOGLE_DEFAULT_CLIENT_SECRET": "OTJgUOQcT7lO7GsGZq2G4IlT",
|
"GOOGLE_DEFAULT_CLIENT_SECRET": "OTJgUOQcT7lO7GsGZq2G4IlT",
|
||||||
},
|
},
|
||||||
Filesystem: []*FilesystemConfig{
|
Filesystem: []*FilesystemConfig{
|
||||||
{Src: "/nix"},
|
{Src: "/nix/store"},
|
||||||
{Src: "/storage/emulated/0", Write: true, Must: true},
|
{Src: "/run/current-system"},
|
||||||
{Src: "/data/user/0", Dst: "/data/data", Write: true, Must: true},
|
{Src: "/run/opengl-driver"},
|
||||||
{Src: "/var/tmp", Write: true},
|
{Src: "/var/db/nix-channels"},
|
||||||
},
|
{Src: "/home/chronos", Write: true, Must: true},
|
||||||
Tmpfs: []bwrap.TmpfsConfig{
|
{Src: "/dev/dri", Device: true},
|
||||||
{Size: 8 * 1024, Dir: "/var/run/nscd"},
|
|
||||||
},
|
},
|
||||||
|
Link: [][2]string{{"/run/user/65534", "/run/user/150"}},
|
||||||
|
AutoEtc: true,
|
||||||
|
Override: []string{"/var/run/nscd"},
|
||||||
},
|
},
|
||||||
SystemBus: &dbus.Config{
|
SystemBus: &dbus.Config{
|
||||||
See: nil,
|
See: nil,
|
||||||
@ -188,7 +236,7 @@ func Template() *Config {
|
|||||||
Log: false,
|
Log: false,
|
||||||
Filter: true,
|
Filter: true,
|
||||||
},
|
},
|
||||||
Enablements: state.EnableWayland.Mask() | state.EnableDBus.Mask() | state.EnablePulse.Mask(),
|
Enablements: system.EWayland.Mask() | system.EDBus.Mask() | system.EPulse.Mask(),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
48
fst/id.go
Normal file
48
fst/id.go
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
package fst
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/rand"
|
||||||
|
"encoding/hex"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ID [16]byte
|
||||||
|
|
||||||
|
var (
|
||||||
|
ErrInvalidLength = errors.New("string representation must have a length of 32")
|
||||||
|
)
|
||||||
|
|
||||||
|
func (a *ID) String() string {
|
||||||
|
return hex.EncodeToString(a[:])
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAppID(id *ID) error {
|
||||||
|
_, err := rand.Read(id[:])
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func ParseAppID(id *ID, s string) error {
|
||||||
|
if len(s) != 32 {
|
||||||
|
return ErrInvalidLength
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, b := range s {
|
||||||
|
if b < '0' || b > 'f' {
|
||||||
|
return fmt.Errorf("invalid char %q at byte %d", b, i)
|
||||||
|
}
|
||||||
|
|
||||||
|
v := uint8(b)
|
||||||
|
if v > '9' {
|
||||||
|
v = 10 + v - 'a'
|
||||||
|
} else {
|
||||||
|
v -= '0'
|
||||||
|
}
|
||||||
|
if i%2 == 0 {
|
||||||
|
v <<= 4
|
||||||
|
}
|
||||||
|
id[i/2] += v
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
63
fst/id_test.go
Normal file
63
fst/id_test.go
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
package fst_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/fst"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestParseAppID(t *testing.T) {
|
||||||
|
t.Run("bad length", func(t *testing.T) {
|
||||||
|
if err := fst.ParseAppID(new(fst.ID), "meow"); !errors.Is(err, fst.ErrInvalidLength) {
|
||||||
|
t.Errorf("ParseAppID: error = %v, wantErr = %v", err, fst.ErrInvalidLength)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("bad byte", func(t *testing.T) {
|
||||||
|
wantErr := "invalid char '\\n' at byte 15"
|
||||||
|
if err := fst.ParseAppID(new(fst.ID), "02bc7f8936b2af6\n\ne2535cd71ef0bb7"); err == nil || err.Error() != wantErr {
|
||||||
|
t.Errorf("ParseAppID: error = %v, wantErr = %v", err, wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("fuzz 16 iterations", func(t *testing.T) {
|
||||||
|
for i := 0; i < 16; i++ {
|
||||||
|
testParseAppIDWithRandom(t)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func FuzzParseAppID(f *testing.F) {
|
||||||
|
for i := 0; i < 16; i++ {
|
||||||
|
id := new(fst.ID)
|
||||||
|
if err := fst.NewAppID(id); err != nil {
|
||||||
|
panic(err.Error())
|
||||||
|
}
|
||||||
|
f.Add(id[0], id[1], id[2], id[3], id[4], id[5], id[6], id[7], id[8], id[9], id[10], id[11], id[12], id[13], id[14], id[15])
|
||||||
|
}
|
||||||
|
|
||||||
|
f.Fuzz(func(t *testing.T, b0, b1, b2, b3, b4, b5, b6, b7, b8, b9, b10, b11, b12, b13, b14, b15 byte) {
|
||||||
|
testParseAppID(t, &fst.ID{b0, b1, b2, b3, b4, b5, b6, b7, b8, b9, b10, b11, b12, b13, b14, b15})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func testParseAppIDWithRandom(t *testing.T) {
|
||||||
|
id := new(fst.ID)
|
||||||
|
if err := fst.NewAppID(id); err != nil {
|
||||||
|
t.Fatalf("cannot generate app ID: %v", err)
|
||||||
|
}
|
||||||
|
testParseAppID(t, id)
|
||||||
|
}
|
||||||
|
|
||||||
|
func testParseAppID(t *testing.T, id *fst.ID) {
|
||||||
|
s := id.String()
|
||||||
|
got := new(fst.ID)
|
||||||
|
if err := fst.ParseAppID(got, s); err != nil {
|
||||||
|
t.Fatalf("cannot parse app ID: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if *got != *id {
|
||||||
|
t.Fatalf("ParseAppID(%#v) = \n%#v, want \n%#v", s, got, id)
|
||||||
|
}
|
||||||
|
}
|
2
fst/shared.go
Normal file
2
fst/shared.go
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
// Package fst exports shared fortify types.
|
||||||
|
package fst
|
2
go.mod
2
go.mod
@ -1,3 +1,3 @@
|
|||||||
module git.ophivana.moe/cat/fortify
|
module git.gensokyo.uk/security/fortify
|
||||||
|
|
||||||
go 1.22
|
go 1.22
|
||||||
|
@ -6,7 +6,7 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
)
|
)
|
||||||
|
|
||||||
func Test_argsFD_String(t *testing.T) {
|
func Test_argsFD_String(t *testing.T) {
|
||||||
|
@ -3,11 +3,13 @@ package helper
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"io"
|
"io"
|
||||||
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"strconv"
|
"strconv"
|
||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/proc"
|
||||||
)
|
)
|
||||||
|
|
||||||
// BubblewrapName is the file name or path to bubblewrap.
|
// BubblewrapName is the file name or path to bubblewrap.
|
||||||
@ -19,6 +21,8 @@ type bubblewrap struct {
|
|||||||
|
|
||||||
// bwrap pipes
|
// bwrap pipes
|
||||||
p *pipes
|
p *pipes
|
||||||
|
// sync pipe
|
||||||
|
sync *os.File
|
||||||
// returns an array of arguments passed directly
|
// returns an array of arguments passed directly
|
||||||
// to the child process spawned by bwrap
|
// to the child process spawned by bwrap
|
||||||
argF func(argsFD, statFD int) []string
|
argF func(argsFD, statFD int) []string
|
||||||
@ -72,6 +76,10 @@ func (b *bubblewrap) StartNotify(ready chan error) error {
|
|||||||
b.Cmd.Env = append(b.Cmd.Env, FortifyHelper+"=1", FortifyStatus+"=-1")
|
b.Cmd.Env = append(b.Cmd.Env, FortifyHelper+"=1", FortifyStatus+"=-1")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if b.sync != nil {
|
||||||
|
b.Cmd.Args = append(b.Cmd.Args, "--sync-fd", strconv.Itoa(int(proc.ExtraFile(b.Cmd, b.sync))))
|
||||||
|
}
|
||||||
|
|
||||||
if err := b.Cmd.Start(); err != nil {
|
if err := b.Cmd.Start(); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@ -131,6 +139,7 @@ func NewBwrap(conf *bwrap.Config, wt io.WriterTo, name string, argF func(argsFD,
|
|||||||
b.p = &pipes{args: args}
|
b.p = &pipes{args: args}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
b.sync = conf.Sync()
|
||||||
b.argF = argF
|
b.argF = argF
|
||||||
b.name = name
|
b.name = name
|
||||||
if wt != nil {
|
if wt != nil {
|
||||||
|
77
helper/bwrap/arg.go
Normal file
77
helper/bwrap/arg.go
Normal file
@ -0,0 +1,77 @@
|
|||||||
|
package bwrap
|
||||||
|
|
||||||
|
import "encoding/gob"
|
||||||
|
|
||||||
|
type Builder interface {
|
||||||
|
Len() int
|
||||||
|
Append(args *[]string)
|
||||||
|
}
|
||||||
|
|
||||||
|
type FSBuilder interface {
|
||||||
|
Path() string
|
||||||
|
Builder
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
gob.Register(new(pairF))
|
||||||
|
gob.Register(new(stringF))
|
||||||
|
}
|
||||||
|
|
||||||
|
type pairF [3]string
|
||||||
|
|
||||||
|
func (p *pairF) Path() string {
|
||||||
|
return p[2]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *pairF) Len() int {
|
||||||
|
return len(p) // compiler replaces this with 3
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *pairF) Append(args *[]string) {
|
||||||
|
*args = append(*args, p[0], p[1], p[2])
|
||||||
|
}
|
||||||
|
|
||||||
|
type stringF [2]string
|
||||||
|
|
||||||
|
func (s stringF) Path() string {
|
||||||
|
return s[1]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stringF) Len() int {
|
||||||
|
return len(s) // compiler replaces this with 2
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stringF) Append(args *[]string) {
|
||||||
|
*args = append(*args, s[0], s[1])
|
||||||
|
}
|
||||||
|
|
||||||
|
// Args returns a slice of bwrap args corresponding to c.
|
||||||
|
func (c *Config) Args() (args []string) {
|
||||||
|
builders := []Builder{
|
||||||
|
c.boolArgs(),
|
||||||
|
c.intArgs(),
|
||||||
|
c.stringArgs(),
|
||||||
|
c.pairArgs(),
|
||||||
|
}
|
||||||
|
|
||||||
|
// copy FSBuilder slice to builder slice
|
||||||
|
fb := make([]Builder, len(c.Filesystem)+1)
|
||||||
|
for i, f := range c.Filesystem {
|
||||||
|
fb[i] = f
|
||||||
|
}
|
||||||
|
fb[len(fb)-1] = c.Chmod
|
||||||
|
builders = append(builders, fb...)
|
||||||
|
|
||||||
|
// accumulate arg count
|
||||||
|
argc := 0
|
||||||
|
for _, b := range builders {
|
||||||
|
argc += b.Len()
|
||||||
|
}
|
||||||
|
|
||||||
|
args = make([]string, 0, argc)
|
||||||
|
for _, b := range builders {
|
||||||
|
b.Append(&args)
|
||||||
|
}
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
13
helper/bwrap/arg.static.awkward.go
Normal file
13
helper/bwrap/arg.static.awkward.go
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
package bwrap
|
||||||
|
|
||||||
|
const (
|
||||||
|
Tmpfs = iota
|
||||||
|
Dir
|
||||||
|
Symlink
|
||||||
|
)
|
||||||
|
|
||||||
|
var awkwardArgs = [...]string{
|
||||||
|
Tmpfs: "--tmpfs",
|
||||||
|
Dir: "--dir",
|
||||||
|
Symlink: "--symlink",
|
||||||
|
}
|
81
helper/bwrap/arg.static.bool.go
Normal file
81
helper/bwrap/arg.static.bool.go
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
package bwrap
|
||||||
|
|
||||||
|
const (
|
||||||
|
UnshareAll = iota
|
||||||
|
UnshareUser
|
||||||
|
UnshareIPC
|
||||||
|
UnsharePID
|
||||||
|
UnshareNet
|
||||||
|
UnshareUTS
|
||||||
|
UnshareCGroup
|
||||||
|
ShareNet
|
||||||
|
|
||||||
|
UserNS
|
||||||
|
Clearenv
|
||||||
|
|
||||||
|
NewSession
|
||||||
|
DieWithParent
|
||||||
|
AsInit
|
||||||
|
)
|
||||||
|
|
||||||
|
var boolArgs = [...][]string{
|
||||||
|
UnshareAll: {"--unshare-all", "--unshare-user"},
|
||||||
|
UnshareUser: {"--unshare-user"},
|
||||||
|
UnshareIPC: {"--unshare-ipc"},
|
||||||
|
UnsharePID: {"--unshare-pid"},
|
||||||
|
UnshareNet: {"--unshare-net"},
|
||||||
|
UnshareUTS: {"--unshare-uts"},
|
||||||
|
UnshareCGroup: {"--unshare-cgroup"},
|
||||||
|
ShareNet: {"--share-net"},
|
||||||
|
|
||||||
|
UserNS: {"--disable-userns", "--assert-userns-disabled"},
|
||||||
|
Clearenv: {"--clearenv"},
|
||||||
|
|
||||||
|
NewSession: {"--new-session"},
|
||||||
|
DieWithParent: {"--die-with-parent"},
|
||||||
|
AsInit: {"--as-pid-1"},
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Config) boolArgs() Builder {
|
||||||
|
b := boolArg{
|
||||||
|
UserNS: !c.UserNS,
|
||||||
|
Clearenv: c.Clearenv,
|
||||||
|
|
||||||
|
NewSession: c.NewSession,
|
||||||
|
DieWithParent: c.DieWithParent,
|
||||||
|
AsInit: c.AsInit,
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.Unshare == nil {
|
||||||
|
b[UnshareAll] = true
|
||||||
|
b[ShareNet] = c.Net
|
||||||
|
} else {
|
||||||
|
b[UnshareUser] = c.Unshare.User
|
||||||
|
b[UnshareIPC] = c.Unshare.IPC
|
||||||
|
b[UnsharePID] = c.Unshare.PID
|
||||||
|
b[UnshareNet] = c.Unshare.Net
|
||||||
|
b[UnshareUTS] = c.Unshare.UTS
|
||||||
|
b[UnshareCGroup] = c.Unshare.CGroup
|
||||||
|
}
|
||||||
|
|
||||||
|
return &b
|
||||||
|
}
|
||||||
|
|
||||||
|
type boolArg [len(boolArgs)]bool
|
||||||
|
|
||||||
|
func (b *boolArg) Len() (l int) {
|
||||||
|
for i, v := range b {
|
||||||
|
if v {
|
||||||
|
l += len(boolArgs[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *boolArg) Append(args *[]string) {
|
||||||
|
for i, v := range b {
|
||||||
|
if v {
|
||||||
|
*args = append(*args, boolArgs[i]...)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
47
helper/bwrap/arg.static.int.go
Normal file
47
helper/bwrap/arg.static.int.go
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
package bwrap
|
||||||
|
|
||||||
|
import "strconv"
|
||||||
|
|
||||||
|
const (
|
||||||
|
UID = iota
|
||||||
|
GID
|
||||||
|
Perms
|
||||||
|
Size
|
||||||
|
)
|
||||||
|
|
||||||
|
var intArgs = [...]string{
|
||||||
|
UID: "--uid",
|
||||||
|
GID: "--gid",
|
||||||
|
Perms: "--perms",
|
||||||
|
Size: "--size",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Config) intArgs() Builder {
|
||||||
|
// Arg types:
|
||||||
|
// Perms
|
||||||
|
// are handled by the sequential builder
|
||||||
|
|
||||||
|
return &intArg{
|
||||||
|
UID: c.UID,
|
||||||
|
GID: c.GID,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type intArg [len(intArgs)]*int
|
||||||
|
|
||||||
|
func (n *intArg) Len() (l int) {
|
||||||
|
for _, v := range n {
|
||||||
|
if v != nil {
|
||||||
|
l += 2
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (n *intArg) Append(args *[]string) {
|
||||||
|
for i, v := range n {
|
||||||
|
if v != nil {
|
||||||
|
*args = append(*args, intArgs[i], strconv.Itoa(*v))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
73
helper/bwrap/arg.static.pair.go
Normal file
73
helper/bwrap/arg.static.pair.go
Normal file
@ -0,0 +1,73 @@
|
|||||||
|
package bwrap
|
||||||
|
|
||||||
|
import (
|
||||||
|
"slices"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
SetEnv = iota
|
||||||
|
|
||||||
|
Bind
|
||||||
|
BindTry
|
||||||
|
DevBind
|
||||||
|
DevBindTry
|
||||||
|
ROBind
|
||||||
|
ROBindTry
|
||||||
|
|
||||||
|
Chmod
|
||||||
|
)
|
||||||
|
|
||||||
|
var pairArgs = [...]string{
|
||||||
|
SetEnv: "--setenv",
|
||||||
|
|
||||||
|
Bind: "--bind",
|
||||||
|
BindTry: "--bind-try",
|
||||||
|
DevBind: "--dev-bind",
|
||||||
|
DevBindTry: "--dev-bind-try",
|
||||||
|
ROBind: "--ro-bind",
|
||||||
|
ROBindTry: "--ro-bind-try",
|
||||||
|
|
||||||
|
Chmod: "--chmod",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Config) pairArgs() Builder {
|
||||||
|
var n pairArg
|
||||||
|
n[SetEnv] = make([][2]string, len(c.SetEnv))
|
||||||
|
keys := make([]string, 0, len(c.SetEnv))
|
||||||
|
for k := range c.SetEnv {
|
||||||
|
keys = append(keys, k)
|
||||||
|
}
|
||||||
|
slices.Sort(keys)
|
||||||
|
for i, k := range keys {
|
||||||
|
n[SetEnv][i] = [2]string{k, c.SetEnv[k]}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Arg types:
|
||||||
|
// Bind
|
||||||
|
// BindTry
|
||||||
|
// DevBind
|
||||||
|
// DevBindTry
|
||||||
|
// ROBind
|
||||||
|
// ROBindTry
|
||||||
|
// Chmod
|
||||||
|
// are handled by the sequential builder
|
||||||
|
|
||||||
|
return &n
|
||||||
|
}
|
||||||
|
|
||||||
|
type pairArg [len(pairArgs)][][2]string
|
||||||
|
|
||||||
|
func (p *pairArg) Len() (l int) {
|
||||||
|
for _, v := range p {
|
||||||
|
l += len(v) * 3
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *pairArg) Append(args *[]string) {
|
||||||
|
for i, arg := range p {
|
||||||
|
for _, v := range arg {
|
||||||
|
*args = append(*args, pairArgs[i], v[0], v[1])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
65
helper/bwrap/arg.static.string.go
Normal file
65
helper/bwrap/arg.static.string.go
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
package bwrap
|
||||||
|
|
||||||
|
const (
|
||||||
|
Hostname = iota
|
||||||
|
Chdir
|
||||||
|
UnsetEnv
|
||||||
|
LockFile
|
||||||
|
|
||||||
|
RemountRO
|
||||||
|
Procfs
|
||||||
|
DevTmpfs
|
||||||
|
Mqueue
|
||||||
|
)
|
||||||
|
|
||||||
|
var stringArgs = [...]string{
|
||||||
|
Hostname: "--hostname",
|
||||||
|
Chdir: "--chdir",
|
||||||
|
UnsetEnv: "--unsetenv",
|
||||||
|
LockFile: "--lock-file",
|
||||||
|
|
||||||
|
RemountRO: "--remount-ro",
|
||||||
|
Procfs: "--proc",
|
||||||
|
DevTmpfs: "--dev",
|
||||||
|
Mqueue: "--mqueue",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Config) stringArgs() Builder {
|
||||||
|
n := stringArg{
|
||||||
|
UnsetEnv: c.UnsetEnv,
|
||||||
|
LockFile: c.LockFile,
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.Hostname != "" {
|
||||||
|
n[Hostname] = []string{c.Hostname}
|
||||||
|
}
|
||||||
|
if c.Chdir != "" {
|
||||||
|
n[Chdir] = []string{c.Chdir}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Arg types:
|
||||||
|
// RemountRO
|
||||||
|
// Procfs
|
||||||
|
// DevTmpfs
|
||||||
|
// Mqueue
|
||||||
|
// are handled by the sequential builder
|
||||||
|
|
||||||
|
return &n
|
||||||
|
}
|
||||||
|
|
||||||
|
type stringArg [len(stringArgs)][]string
|
||||||
|
|
||||||
|
func (s *stringArg) Len() (l int) {
|
||||||
|
for _, arg := range s {
|
||||||
|
l += len(arg) * 2
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stringArg) Append(args *[]string) {
|
||||||
|
for i, arg := range s {
|
||||||
|
for _, v := range arg {
|
||||||
|
*args = append(*args, stringArgs[i], v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -1,64 +0,0 @@
|
|||||||
package bwrap
|
|
||||||
|
|
||||||
const (
|
|
||||||
UnshareAll = iota
|
|
||||||
UnshareUser
|
|
||||||
UnshareIPC
|
|
||||||
UnsharePID
|
|
||||||
UnshareNet
|
|
||||||
UnshareUTS
|
|
||||||
UnshareCGroup
|
|
||||||
ShareNet
|
|
||||||
|
|
||||||
UserNS
|
|
||||||
Clearenv
|
|
||||||
|
|
||||||
NewSession
|
|
||||||
DieWithParent
|
|
||||||
AsInit
|
|
||||||
|
|
||||||
boolC
|
|
||||||
)
|
|
||||||
|
|
||||||
var boolArgs = func() (b [boolC][]string) {
|
|
||||||
b[UnshareAll] = []string{"--unshare-all", "--unshare-user"}
|
|
||||||
b[UnshareUser] = []string{"--unshare-user"}
|
|
||||||
b[UnshareIPC] = []string{"--unshare-ipc"}
|
|
||||||
b[UnsharePID] = []string{"--unshare-pid"}
|
|
||||||
b[UnshareNet] = []string{"--unshare-net"}
|
|
||||||
b[UnshareUTS] = []string{"--unshare-uts"}
|
|
||||||
b[UnshareCGroup] = []string{"--unshare-cgroup"}
|
|
||||||
b[ShareNet] = []string{"--share-net"}
|
|
||||||
|
|
||||||
b[UserNS] = []string{"--disable-userns", "--assert-userns-disabled"}
|
|
||||||
b[Clearenv] = []string{"--clearenv"}
|
|
||||||
|
|
||||||
b[NewSession] = []string{"--new-session"}
|
|
||||||
b[DieWithParent] = []string{"--die-with-parent"}
|
|
||||||
b[AsInit] = []string{"--as-pid-1"}
|
|
||||||
|
|
||||||
return
|
|
||||||
}()
|
|
||||||
|
|
||||||
func (c *Config) boolArgs() (b [boolC]bool) {
|
|
||||||
if c.Unshare == nil {
|
|
||||||
b[UnshareAll] = true
|
|
||||||
b[ShareNet] = c.Net
|
|
||||||
} else {
|
|
||||||
b[UnshareUser] = c.Unshare.User
|
|
||||||
b[UnshareIPC] = c.Unshare.IPC
|
|
||||||
b[UnsharePID] = c.Unshare.PID
|
|
||||||
b[UnshareNet] = c.Unshare.Net
|
|
||||||
b[UnshareUTS] = c.Unshare.UTS
|
|
||||||
b[UnshareCGroup] = c.Unshare.CGroup
|
|
||||||
}
|
|
||||||
|
|
||||||
b[UserNS] = !c.UserNS
|
|
||||||
b[Clearenv] = c.Clearenv
|
|
||||||
|
|
||||||
b[NewSession] = c.NewSession
|
|
||||||
b[DieWithParent] = c.DieWithParent
|
|
||||||
b[AsInit] = c.AsInit
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
@ -1,77 +1,14 @@
|
|||||||
package bwrap
|
package bwrap
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"encoding/gob"
|
||||||
"os"
|
"os"
|
||||||
"strconv"
|
"strconv"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (c *Config) Args() (args []string) {
|
func init() {
|
||||||
b := c.boolArgs()
|
gob.Register(new(PermConfig[SymlinkConfig]))
|
||||||
n := c.intArgs()
|
gob.Register(new(PermConfig[*TmpfsConfig]))
|
||||||
g := c.interfaceArgs()
|
|
||||||
s := c.stringArgs()
|
|
||||||
p := c.pairArgs()
|
|
||||||
|
|
||||||
argc := 0
|
|
||||||
for i, arg := range b {
|
|
||||||
if arg {
|
|
||||||
argc += len(boolArgs[i])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for _, arg := range n {
|
|
||||||
if arg != nil {
|
|
||||||
argc += 2
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for _, arg := range g {
|
|
||||||
argc += len(arg) * 3
|
|
||||||
}
|
|
||||||
for _, arg := range s {
|
|
||||||
argc += len(arg) * 2
|
|
||||||
}
|
|
||||||
for _, arg := range p {
|
|
||||||
argc += len(arg) * 3
|
|
||||||
}
|
|
||||||
|
|
||||||
args = make([]string, 0, argc)
|
|
||||||
for i, arg := range b {
|
|
||||||
if arg {
|
|
||||||
args = append(args, boolArgs[i]...)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for i, arg := range n {
|
|
||||||
if arg != nil {
|
|
||||||
args = append(args, intArgs[i], strconv.Itoa(*arg))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for i, arg := range g {
|
|
||||||
for _, v := range arg {
|
|
||||||
if v.Later() {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
args = append(args, v.Value(interfaceArgs[i])...)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for i, arg := range s {
|
|
||||||
for _, v := range arg {
|
|
||||||
args = append(args, stringArgs[i], v)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for i, arg := range p {
|
|
||||||
for _, v := range arg {
|
|
||||||
args = append(args, pairArgs[i], v[0], v[1])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for i, arg := range g {
|
|
||||||
for _, v := range arg {
|
|
||||||
if !v.Later() {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
args = append(args, v.Value(interfaceArgs[i])...)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type Config struct {
|
type Config struct {
|
||||||
@ -114,53 +51,12 @@ type Config struct {
|
|||||||
// (--lock-file DEST)
|
// (--lock-file DEST)
|
||||||
LockFile []string `json:"lock_file,omitempty"`
|
LockFile []string `json:"lock_file,omitempty"`
|
||||||
|
|
||||||
// bind mount host path on sandbox
|
// ordered filesystem args
|
||||||
// (--bind SRC DEST)
|
Filesystem []FSBuilder
|
||||||
Bind [][2]string `json:"bind,omitempty"`
|
|
||||||
// equal to Bind but ignores non-existent host path
|
|
||||||
// (--bind-try SRC DEST)
|
|
||||||
BindTry [][2]string `json:"bind_try,omitempty"`
|
|
||||||
|
|
||||||
// bind mount host path on sandbox, allowing device access
|
|
||||||
// (--dev-bind SRC DEST)
|
|
||||||
DevBind [][2]string `json:"dev_bind,omitempty"`
|
|
||||||
// equal to DevBind but ignores non-existent host path
|
|
||||||
// (--dev-bind-try SRC DEST)
|
|
||||||
DevBindTry [][2]string `json:"dev_bind_try,omitempty"`
|
|
||||||
|
|
||||||
// bind mount host path readonly on sandbox
|
|
||||||
// (--ro-bind SRC DEST)
|
|
||||||
ROBind [][2]string `json:"ro_bind,omitempty"`
|
|
||||||
// equal to ROBind but ignores non-existent host path
|
|
||||||
// (--ro-bind-try SRC DEST)
|
|
||||||
ROBindTry [][2]string `json:"ro_bind_try,omitempty"`
|
|
||||||
|
|
||||||
// remount path as readonly; does not recursively remount
|
|
||||||
// (--remount-ro DEST)
|
|
||||||
RemountRO []string `json:"remount_ro,omitempty"`
|
|
||||||
|
|
||||||
// mount new procfs in sandbox
|
|
||||||
// (--proc DEST)
|
|
||||||
Procfs []string `json:"proc,omitempty"`
|
|
||||||
// mount new dev in sandbox
|
|
||||||
// (--dev DEST)
|
|
||||||
DevTmpfs []string `json:"dev,omitempty"`
|
|
||||||
// mount new tmpfs in sandbox
|
|
||||||
// (--tmpfs DEST)
|
|
||||||
Tmpfs []PermConfig[TmpfsConfig] `json:"tmpfs,omitempty"`
|
|
||||||
// mount new mqueue in sandbox
|
|
||||||
// (--mqueue DEST)
|
|
||||||
Mqueue []string `json:"mqueue,omitempty"`
|
|
||||||
// create dir in sandbox
|
|
||||||
// (--dir DEST)
|
|
||||||
Dir []PermConfig[string] `json:"dir,omitempty"`
|
|
||||||
// create symlink within sandbox
|
|
||||||
// (--symlink SRC DEST)
|
|
||||||
Symlink []PermConfig[[2]string] `json:"symlink,omitempty"`
|
|
||||||
|
|
||||||
// change permissions (must already exist)
|
// change permissions (must already exist)
|
||||||
// (--chmod OCTAL PATH)
|
// (--chmod OCTAL PATH)
|
||||||
Chmod map[string]os.FileMode `json:"chmod,omitempty"`
|
Chmod ChmodConfig `json:"chmod,omitempty"`
|
||||||
|
|
||||||
// create a new terminal session
|
// create a new terminal session
|
||||||
// (--new-session)
|
// (--new-session)
|
||||||
@ -172,13 +68,16 @@ type Config struct {
|
|||||||
// (--as-pid-1)
|
// (--as-pid-1)
|
||||||
AsInit bool `json:"as_init"`
|
AsInit bool `json:"as_init"`
|
||||||
|
|
||||||
|
// keep this fd open while sandbox is running
|
||||||
|
// (--sync-fd FD)
|
||||||
|
sync *os.File
|
||||||
|
|
||||||
/* unmapped options include:
|
/* unmapped options include:
|
||||||
--unshare-user-try Create new user namespace if possible else continue by skipping it
|
--unshare-user-try Create new user namespace if possible else continue by skipping it
|
||||||
--unshare-cgroup-try Create new cgroup namespace if possible else continue by skipping it
|
--unshare-cgroup-try Create new cgroup namespace if possible else continue by skipping it
|
||||||
--userns FD Use this user namespace (cannot combine with --unshare-user)
|
--userns FD Use this user namespace (cannot combine with --unshare-user)
|
||||||
--userns2 FD After setup switch to this user namespace, only useful with --userns
|
--userns2 FD After setup switch to this user namespace, only useful with --userns
|
||||||
--pidns FD Use this pid namespace (as parent namespace if using --unshare-pid)
|
--pidns FD Use this pid namespace (as parent namespace if using --unshare-pid)
|
||||||
--sync-fd FD Keep this fd open while sandbox is running
|
|
||||||
--exec-label LABEL Exec label for the sandbox
|
--exec-label LABEL Exec label for the sandbox
|
||||||
--file-label LABEL File label for temporary sandbox content
|
--file-label LABEL File label for temporary sandbox content
|
||||||
--file FD DEST Copy from FD to destination DEST
|
--file FD DEST Copy from FD to destination DEST
|
||||||
@ -196,6 +95,12 @@ type Config struct {
|
|||||||
among which --args is used internally for passing arguments */
|
among which --args is used internally for passing arguments */
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Sync keep this fd open while sandbox is running
|
||||||
|
// (--sync-fd FD)
|
||||||
|
func (c *Config) Sync() *os.File {
|
||||||
|
return c.sync
|
||||||
|
}
|
||||||
|
|
||||||
type UnshareConfig struct {
|
type UnshareConfig struct {
|
||||||
// (--unshare-user)
|
// (--unshare-user)
|
||||||
// create new user namespace
|
// create new user namespace
|
||||||
@ -217,6 +122,34 @@ type UnshareConfig struct {
|
|||||||
CGroup bool `json:"cgroup"`
|
CGroup bool `json:"cgroup"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type PermConfig[T FSBuilder] struct {
|
||||||
|
// set permissions of next argument
|
||||||
|
// (--perms OCTAL)
|
||||||
|
Mode *os.FileMode `json:"mode,omitempty"`
|
||||||
|
// path to get the new permission
|
||||||
|
// (--bind-data, --file, etc.)
|
||||||
|
Inner T `json:"path"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *PermConfig[T]) Path() string {
|
||||||
|
return p.Inner.Path()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *PermConfig[T]) Len() int {
|
||||||
|
if p.Mode != nil {
|
||||||
|
return p.Inner.Len() + 2
|
||||||
|
} else {
|
||||||
|
return p.Inner.Len()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *PermConfig[T]) Append(args *[]string) {
|
||||||
|
if p.Mode != nil {
|
||||||
|
*args = append(*args, intArgs[Perms], strconv.FormatInt(int64(*p.Mode), 8))
|
||||||
|
}
|
||||||
|
p.Inner.Append(args)
|
||||||
|
}
|
||||||
|
|
||||||
type TmpfsConfig struct {
|
type TmpfsConfig struct {
|
||||||
// set size of tmpfs
|
// set size of tmpfs
|
||||||
// (--size BYTES)
|
// (--size BYTES)
|
||||||
@ -226,62 +159,47 @@ type TmpfsConfig struct {
|
|||||||
Dir string `json:"dir"`
|
Dir string `json:"dir"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type argOf interface {
|
func (t *TmpfsConfig) Path() string {
|
||||||
Value(arg string) (args []string)
|
return t.Dir
|
||||||
Later() bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func copyToArgOfSlice[T [2]string | string | TmpfsConfig](src []PermConfig[T]) (dst []argOf) {
|
func (t *TmpfsConfig) Len() int {
|
||||||
dst = make([]argOf, len(src))
|
if t.Size > 0 {
|
||||||
for i, arg := range src {
|
return 4
|
||||||
dst[i] = arg
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
type PermConfig[T [2]string | string | TmpfsConfig] struct {
|
|
||||||
// append this at the end of the argument stream
|
|
||||||
Last bool
|
|
||||||
|
|
||||||
// set permissions of next argument
|
|
||||||
// (--perms OCTAL)
|
|
||||||
Mode *os.FileMode `json:"mode,omitempty"`
|
|
||||||
// path to get the new permission
|
|
||||||
// (--bind-data, --file, etc.)
|
|
||||||
Path T
|
|
||||||
}
|
|
||||||
|
|
||||||
func (p PermConfig[T]) Later() bool {
|
|
||||||
return p.Last
|
|
||||||
}
|
|
||||||
|
|
||||||
func (p PermConfig[T]) Value(arg string) (args []string) {
|
|
||||||
// max possible size
|
|
||||||
if p.Mode != nil {
|
|
||||||
args = make([]string, 0, 6)
|
|
||||||
args = append(args, "--perms", strconv.Itoa(int(*p.Mode)))
|
|
||||||
} else {
|
} else {
|
||||||
args = make([]string, 0, 4)
|
return 2
|
||||||
}
|
}
|
||||||
|
}
|
||||||
switch v := any(p.Path).(type) {
|
|
||||||
case string:
|
func (t *TmpfsConfig) Append(args *[]string) {
|
||||||
args = append(args, arg, v)
|
if t.Size > 0 {
|
||||||
return
|
*args = append(*args, intArgs[Size], strconv.Itoa(t.Size))
|
||||||
case [2]string:
|
}
|
||||||
args = append(args, arg, v[0], v[1])
|
*args = append(*args, awkwardArgs[Tmpfs], t.Dir)
|
||||||
return
|
}
|
||||||
case TmpfsConfig:
|
|
||||||
if arg != "--tmpfs" {
|
type SymlinkConfig [2]string
|
||||||
panic("unreachable")
|
|
||||||
}
|
func (s SymlinkConfig) Path() string {
|
||||||
|
return s[1]
|
||||||
if v.Size > 0 {
|
}
|
||||||
args = append(args, "--size", strconv.Itoa(v.Size))
|
|
||||||
}
|
func (s SymlinkConfig) Len() int {
|
||||||
args = append(args, arg, v.Dir)
|
return 3
|
||||||
return
|
}
|
||||||
default:
|
|
||||||
panic("unreachable")
|
func (s SymlinkConfig) Append(args *[]string) {
|
||||||
|
*args = append(*args, awkwardArgs[Symlink], s[0], s[1])
|
||||||
|
}
|
||||||
|
|
||||||
|
type ChmodConfig map[string]os.FileMode
|
||||||
|
|
||||||
|
func (c ChmodConfig) Len() int {
|
||||||
|
return len(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c ChmodConfig) Append(args *[]string) {
|
||||||
|
for path, mode := range c {
|
||||||
|
*args = append(*args, pairArgs[Chmod], strconv.FormatInt(int64(mode), 8), path)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,22 +0,0 @@
|
|||||||
package bwrap
|
|
||||||
|
|
||||||
const (
|
|
||||||
UID = iota
|
|
||||||
GID
|
|
||||||
|
|
||||||
intC
|
|
||||||
)
|
|
||||||
|
|
||||||
var intArgs = func() (n [intC]string) {
|
|
||||||
n[UID] = "--uid"
|
|
||||||
n[GID] = "--gid"
|
|
||||||
|
|
||||||
return
|
|
||||||
}()
|
|
||||||
|
|
||||||
func (c *Config) intArgs() (n [intC]*int) {
|
|
||||||
n[UID] = c.UID
|
|
||||||
n[GID] = c.GID
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
@ -1,25 +0,0 @@
|
|||||||
package bwrap
|
|
||||||
|
|
||||||
const (
|
|
||||||
Tmpfs = iota
|
|
||||||
Dir
|
|
||||||
Symlink
|
|
||||||
|
|
||||||
interfaceC
|
|
||||||
)
|
|
||||||
|
|
||||||
var interfaceArgs = func() (g [interfaceC]string) {
|
|
||||||
g[Tmpfs] = "--tmpfs"
|
|
||||||
g[Dir] = "--dir"
|
|
||||||
g[Symlink] = "--symlink"
|
|
||||||
|
|
||||||
return
|
|
||||||
}()
|
|
||||||
|
|
||||||
func (c *Config) interfaceArgs() (g [interfaceC][]argOf) {
|
|
||||||
g[Tmpfs] = copyToArgOfSlice(c.Tmpfs)
|
|
||||||
g[Dir] = copyToArgOfSlice(c.Dir)
|
|
||||||
g[Symlink] = copyToArgOfSlice(c.Symlink)
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
@ -1,54 +0,0 @@
|
|||||||
package bwrap
|
|
||||||
|
|
||||||
import "strconv"
|
|
||||||
|
|
||||||
const (
|
|
||||||
SetEnv = iota
|
|
||||||
|
|
||||||
Bind
|
|
||||||
BindTry
|
|
||||||
DevBind
|
|
||||||
DevBindTry
|
|
||||||
ROBind
|
|
||||||
ROBindTry
|
|
||||||
|
|
||||||
Chmod
|
|
||||||
|
|
||||||
pairC
|
|
||||||
)
|
|
||||||
|
|
||||||
var pairArgs = func() (n [pairC]string) {
|
|
||||||
n[SetEnv] = "--setenv"
|
|
||||||
|
|
||||||
n[Bind] = "--bind"
|
|
||||||
n[BindTry] = "--bind-try"
|
|
||||||
n[DevBind] = "--dev-bind"
|
|
||||||
n[DevBindTry] = "--dev-bind-try"
|
|
||||||
n[ROBind] = "--ro-bind"
|
|
||||||
n[ROBindTry] = "--ro-bind-try"
|
|
||||||
|
|
||||||
n[Chmod] = "--chmod"
|
|
||||||
|
|
||||||
return
|
|
||||||
}()
|
|
||||||
|
|
||||||
func (c *Config) pairArgs() (n [pairC][][2]string) {
|
|
||||||
n[SetEnv] = make([][2]string, 0, len(c.SetEnv))
|
|
||||||
for k, v := range c.SetEnv {
|
|
||||||
n[SetEnv] = append(n[SetEnv], [2]string{k, v})
|
|
||||||
}
|
|
||||||
|
|
||||||
n[Bind] = c.Bind
|
|
||||||
n[BindTry] = c.BindTry
|
|
||||||
n[DevBind] = c.DevBind
|
|
||||||
n[DevBindTry] = c.DevBindTry
|
|
||||||
n[ROBind] = c.ROBind
|
|
||||||
n[ROBindTry] = c.ROBindTry
|
|
||||||
|
|
||||||
n[Chmod] = make([][2]string, 0, len(c.Chmod))
|
|
||||||
for path, octal := range c.Chmod {
|
|
||||||
n[Chmod] = append(n[Chmod], [2]string{strconv.Itoa(int(octal)), path})
|
|
||||||
}
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
145
helper/bwrap/config.set.go
Normal file
145
helper/bwrap/config.set.go
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
package bwrap
|
||||||
|
|
||||||
|
import "os"
|
||||||
|
|
||||||
|
/*
|
||||||
|
Bind binds mount src on host to dest in sandbox.
|
||||||
|
|
||||||
|
Bind(src, dest) bind mount host path readonly on sandbox
|
||||||
|
(--ro-bind SRC DEST).
|
||||||
|
Bind(src, dest, true) equal to ROBind but ignores non-existent host path
|
||||||
|
(--ro-bind-try SRC DEST).
|
||||||
|
|
||||||
|
Bind(src, dest, false, true) bind mount host path on sandbox.
|
||||||
|
(--bind SRC DEST).
|
||||||
|
Bind(src, dest, true, true) equal to Bind but ignores non-existent host path
|
||||||
|
(--bind-try SRC DEST).
|
||||||
|
|
||||||
|
Bind(src, dest, false, true, true) bind mount host path on sandbox, allowing device access
|
||||||
|
(--dev-bind SRC DEST).
|
||||||
|
Bind(src, dest, true, true, true) equal to DevBind but ignores non-existent host path
|
||||||
|
(--dev-bind-try SRC DEST).
|
||||||
|
*/
|
||||||
|
func (c *Config) Bind(src, dest string, opts ...bool) *Config {
|
||||||
|
var (
|
||||||
|
try bool
|
||||||
|
write bool
|
||||||
|
dev bool
|
||||||
|
)
|
||||||
|
|
||||||
|
if len(opts) > 0 {
|
||||||
|
try = opts[0]
|
||||||
|
}
|
||||||
|
if len(opts) > 1 {
|
||||||
|
write = opts[1]
|
||||||
|
}
|
||||||
|
if len(opts) > 2 {
|
||||||
|
dev = opts[2]
|
||||||
|
}
|
||||||
|
|
||||||
|
if dev {
|
||||||
|
if try {
|
||||||
|
c.Filesystem = append(c.Filesystem, &pairF{pairArgs[DevBindTry], src, dest})
|
||||||
|
} else {
|
||||||
|
c.Filesystem = append(c.Filesystem, &pairF{pairArgs[DevBind], src, dest})
|
||||||
|
}
|
||||||
|
return c
|
||||||
|
} else if write {
|
||||||
|
if try {
|
||||||
|
c.Filesystem = append(c.Filesystem, &pairF{pairArgs[BindTry], src, dest})
|
||||||
|
} else {
|
||||||
|
c.Filesystem = append(c.Filesystem, &pairF{pairArgs[Bind], src, dest})
|
||||||
|
}
|
||||||
|
return c
|
||||||
|
} else {
|
||||||
|
if try {
|
||||||
|
c.Filesystem = append(c.Filesystem, &pairF{pairArgs[ROBindTry], src, dest})
|
||||||
|
} else {
|
||||||
|
c.Filesystem = append(c.Filesystem, &pairF{pairArgs[ROBind], src, dest})
|
||||||
|
}
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RemountRO remount path as readonly; does not recursively remount
|
||||||
|
// (--remount-ro DEST)
|
||||||
|
func (c *Config) RemountRO(dest string) *Config {
|
||||||
|
c.Filesystem = append(c.Filesystem, &stringF{stringArgs[RemountRO], dest})
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// Procfs mount new procfs in sandbox
|
||||||
|
// (--proc DEST)
|
||||||
|
func (c *Config) Procfs(dest string) *Config {
|
||||||
|
c.Filesystem = append(c.Filesystem, &stringF{stringArgs[Procfs], dest})
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// DevTmpfs mount new dev in sandbox
|
||||||
|
// (--dev DEST)
|
||||||
|
func (c *Config) DevTmpfs(dest string) *Config {
|
||||||
|
c.Filesystem = append(c.Filesystem, &stringF{stringArgs[DevTmpfs], dest})
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// Tmpfs mount new tmpfs in sandbox
|
||||||
|
// (--tmpfs DEST)
|
||||||
|
func (c *Config) Tmpfs(dest string, size int, perm ...os.FileMode) *Config {
|
||||||
|
tmpfs := &PermConfig[*TmpfsConfig]{Inner: &TmpfsConfig{Dir: dest}}
|
||||||
|
if size >= 0 {
|
||||||
|
tmpfs.Inner.Size = size
|
||||||
|
}
|
||||||
|
if len(perm) == 1 {
|
||||||
|
tmpfs.Mode = &perm[0]
|
||||||
|
}
|
||||||
|
c.Filesystem = append(c.Filesystem, tmpfs)
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// Mqueue mount new mqueue in sandbox
|
||||||
|
// (--mqueue DEST)
|
||||||
|
func (c *Config) Mqueue(dest string) *Config {
|
||||||
|
c.Filesystem = append(c.Filesystem, &stringF{stringArgs[Mqueue], dest})
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// Dir create dir in sandbox
|
||||||
|
// (--dir DEST)
|
||||||
|
func (c *Config) Dir(dest string) *Config {
|
||||||
|
c.Filesystem = append(c.Filesystem, &stringF{stringArgs[Dir], dest})
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// Symlink create symlink within sandbox
|
||||||
|
// (--symlink SRC DEST)
|
||||||
|
func (c *Config) Symlink(src, dest string, perm ...os.FileMode) *Config {
|
||||||
|
symlink := &PermConfig[SymlinkConfig]{Inner: SymlinkConfig{src, dest}}
|
||||||
|
if len(perm) == 1 {
|
||||||
|
symlink.Mode = &perm[0]
|
||||||
|
}
|
||||||
|
c.Filesystem = append(c.Filesystem, symlink)
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetUID sets custom uid in the sandbox, requires new user namespace (--uid UID).
|
||||||
|
func (c *Config) SetUID(uid int) *Config {
|
||||||
|
if uid >= 0 {
|
||||||
|
c.UID = &uid
|
||||||
|
}
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetGID sets custom gid in the sandbox, requires new user namespace (--gid GID).
|
||||||
|
func (c *Config) SetGID(gid int) *Config {
|
||||||
|
if gid >= 0 {
|
||||||
|
c.GID = &gid
|
||||||
|
}
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetSync sets the sync pipe kept open while sandbox is running
|
||||||
|
// (--sync-fd FD)
|
||||||
|
func (c *Config) SetSync(s *os.File) *Config {
|
||||||
|
c.sync = s
|
||||||
|
return c
|
||||||
|
}
|
@ -1,44 +0,0 @@
|
|||||||
package bwrap
|
|
||||||
|
|
||||||
const (
|
|
||||||
Hostname = iota
|
|
||||||
Chdir
|
|
||||||
UnsetEnv
|
|
||||||
LockFile
|
|
||||||
RemountRO
|
|
||||||
Procfs
|
|
||||||
DevTmpfs
|
|
||||||
Mqueue
|
|
||||||
|
|
||||||
stringC
|
|
||||||
)
|
|
||||||
|
|
||||||
var stringArgs = func() (n [stringC]string) {
|
|
||||||
n[Hostname] = "--hostname"
|
|
||||||
n[Chdir] = "--chdir"
|
|
||||||
n[UnsetEnv] = "--unsetenv"
|
|
||||||
n[LockFile] = "--lock-file"
|
|
||||||
n[RemountRO] = "--remount-ro"
|
|
||||||
n[Procfs] = "--proc"
|
|
||||||
n[DevTmpfs] = "--dev"
|
|
||||||
n[Mqueue] = "--mqueue"
|
|
||||||
|
|
||||||
return
|
|
||||||
}()
|
|
||||||
|
|
||||||
func (c *Config) stringArgs() (n [stringC][]string) {
|
|
||||||
if c.Hostname != "" {
|
|
||||||
n[Hostname] = []string{c.Hostname}
|
|
||||||
}
|
|
||||||
if c.Chdir != "" {
|
|
||||||
n[Chdir] = []string{c.Chdir}
|
|
||||||
}
|
|
||||||
n[UnsetEnv] = c.UnsetEnv
|
|
||||||
n[LockFile] = c.LockFile
|
|
||||||
n[RemountRO] = c.RemountRO
|
|
||||||
n[Procfs] = c.Procfs
|
|
||||||
n[DevTmpfs] = c.DevTmpfs
|
|
||||||
n[Mqueue] = c.Mqueue
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
@ -13,47 +13,38 @@ func TestConfig_Args(t *testing.T) {
|
|||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "xdg-dbus-proxy constraint sample",
|
name: "xdg-dbus-proxy constraint sample",
|
||||||
conf: &Config{
|
conf: (&Config{
|
||||||
Unshare: nil,
|
Unshare: nil,
|
||||||
UserNS: false,
|
UserNS: false,
|
||||||
Clearenv: true,
|
Clearenv: true,
|
||||||
Symlink: []PermConfig[[2]string]{
|
|
||||||
{Path: [2]string{"usr/bin", "/bin"}},
|
|
||||||
{Path: [2]string{"var/home", "/home"}},
|
|
||||||
{Path: [2]string{"usr/lib", "/lib"}},
|
|
||||||
{Path: [2]string{"usr/lib64", "/lib64"}},
|
|
||||||
{Path: [2]string{"run/media", "/media"}},
|
|
||||||
{Path: [2]string{"var/mnt", "/mnt"}},
|
|
||||||
{Path: [2]string{"var/opt", "/opt"}},
|
|
||||||
{Path: [2]string{"sysroot/ostree", "/ostree"}},
|
|
||||||
{Path: [2]string{"var/roothome", "/root"}},
|
|
||||||
{Path: [2]string{"usr/sbin", "/sbin"}},
|
|
||||||
{Path: [2]string{"var/srv", "/srv"}},
|
|
||||||
},
|
|
||||||
Bind: [][2]string{
|
|
||||||
{"/run", "/run"},
|
|
||||||
{"/tmp", "/tmp"},
|
|
||||||
{"/var", "/var"},
|
|
||||||
{"/run/user/1971/.dbus-proxy/", "/run/user/1971/.dbus-proxy/"},
|
|
||||||
},
|
|
||||||
ROBind: [][2]string{
|
|
||||||
{"/boot", "/boot"},
|
|
||||||
{"/dev", "/dev"},
|
|
||||||
{"/proc", "/proc"},
|
|
||||||
{"/sys", "/sys"},
|
|
||||||
{"/sysroot", "/sysroot"},
|
|
||||||
{"/usr", "/usr"},
|
|
||||||
{"/etc", "/etc"},
|
|
||||||
},
|
|
||||||
DieWithParent: true,
|
DieWithParent: true,
|
||||||
},
|
}).
|
||||||
|
Symlink("usr/bin", "/bin").
|
||||||
|
Symlink("var/home", "/home").
|
||||||
|
Symlink("usr/lib", "/lib").
|
||||||
|
Symlink("usr/lib64", "/lib64").
|
||||||
|
Symlink("run/media", "/media").
|
||||||
|
Symlink("var/mnt", "/mnt").
|
||||||
|
Symlink("var/opt", "/opt").
|
||||||
|
Symlink("sysroot/ostree", "/ostree").
|
||||||
|
Symlink("var/roothome", "/root").
|
||||||
|
Symlink("usr/sbin", "/sbin").
|
||||||
|
Symlink("var/srv", "/srv").
|
||||||
|
Bind("/run", "/run", false, true).
|
||||||
|
Bind("/tmp", "/tmp", false, true).
|
||||||
|
Bind("/var", "/var", false, true).
|
||||||
|
Bind("/run/user/1971/.dbus-proxy/", "/run/user/1971/.dbus-proxy/", false, true).
|
||||||
|
Bind("/boot", "/boot").
|
||||||
|
Bind("/dev", "/dev").
|
||||||
|
Bind("/proc", "/proc").
|
||||||
|
Bind("/sys", "/sys").
|
||||||
|
Bind("/sysroot", "/sysroot").
|
||||||
|
Bind("/usr", "/usr").
|
||||||
|
Bind("/etc", "/etc"),
|
||||||
want: []string{
|
want: []string{
|
||||||
"--unshare-all",
|
"--unshare-all", "--unshare-user",
|
||||||
"--unshare-user",
|
"--disable-userns", "--assert-userns-disabled",
|
||||||
"--disable-userns",
|
"--clearenv", "--die-with-parent",
|
||||||
"--assert-userns-disabled",
|
|
||||||
"--clearenv",
|
|
||||||
"--die-with-parent",
|
|
||||||
"--symlink", "usr/bin", "/bin",
|
"--symlink", "usr/bin", "/bin",
|
||||||
"--symlink", "var/home", "/home",
|
"--symlink", "var/home", "/home",
|
||||||
"--symlink", "usr/lib", "/lib",
|
"--symlink", "usr/lib", "/lib",
|
||||||
@ -78,6 +69,148 @@ func TestConfig_Args(t *testing.T) {
|
|||||||
"--ro-bind", "/etc", "/etc",
|
"--ro-bind", "/etc", "/etc",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "fortify permissive default nixos",
|
||||||
|
conf: (&Config{
|
||||||
|
Unshare: nil,
|
||||||
|
Net: true,
|
||||||
|
UserNS: true,
|
||||||
|
Clearenv: true,
|
||||||
|
SetEnv: map[string]string{
|
||||||
|
"HOME": "/home/chronos",
|
||||||
|
"TERM": "xterm-256color",
|
||||||
|
"FORTIFY_INIT": "3",
|
||||||
|
"XDG_RUNTIME_DIR": "/run/user/150",
|
||||||
|
"XDG_SESSION_CLASS": "user",
|
||||||
|
"XDG_SESSION_TYPE": "tty",
|
||||||
|
"SHELL": "/run/current-system/sw/bin/zsh",
|
||||||
|
"USER": "chronos",
|
||||||
|
},
|
||||||
|
DieWithParent: true,
|
||||||
|
AsInit: true,
|
||||||
|
}).SetUID(65534).SetGID(65534).
|
||||||
|
Procfs("/proc").DevTmpfs("/dev").Mqueue("/dev/mqueue").
|
||||||
|
Bind("/bin", "/bin", false, true).
|
||||||
|
Bind("/boot", "/boot", false, true).
|
||||||
|
Bind("/etc", "/etc", false, true).
|
||||||
|
Bind("/home", "/home", false, true).
|
||||||
|
Bind("/lib", "/lib", false, true).
|
||||||
|
Bind("/lib64", "/lib64", false, true).
|
||||||
|
Bind("/nix", "/nix", false, true).
|
||||||
|
Bind("/root", "/root", false, true).
|
||||||
|
Bind("/srv", "/srv", false, true).
|
||||||
|
Bind("/sys", "/sys", false, true).
|
||||||
|
Bind("/usr", "/usr", false, true).
|
||||||
|
Bind("/var", "/var", false, true).
|
||||||
|
Bind("/run/NetworkManager", "/run/NetworkManager", false, true).
|
||||||
|
Bind("/run/agetty.reload", "/run/agetty.reload", false, true).
|
||||||
|
Bind("/run/binfmt", "/run/binfmt", false, true).
|
||||||
|
Bind("/run/booted-system", "/run/booted-system", false, true).
|
||||||
|
Bind("/run/credentials", "/run/credentials", false, true).
|
||||||
|
Bind("/run/cryptsetup", "/run/cryptsetup", false, true).
|
||||||
|
Bind("/run/current-system", "/run/current-system", false, true).
|
||||||
|
Bind("/run/host", "/run/host", false, true).
|
||||||
|
Bind("/run/keys", "/run/keys", false, true).
|
||||||
|
Bind("/run/libvirt", "/run/libvirt", false, true).
|
||||||
|
Bind("/run/libvirtd.pid", "/run/libvirtd.pid", false, true).
|
||||||
|
Bind("/run/lock", "/run/lock", false, true).
|
||||||
|
Bind("/run/log", "/run/log", false, true).
|
||||||
|
Bind("/run/lvm", "/run/lvm", false, true).
|
||||||
|
Bind("/run/mount", "/run/mount", false, true).
|
||||||
|
Bind("/run/nginx", "/run/nginx", false, true).
|
||||||
|
Bind("/run/nscd", "/run/nscd", false, true).
|
||||||
|
Bind("/run/opengl-driver", "/run/opengl-driver", false, true).
|
||||||
|
Bind("/run/pppd", "/run/pppd", false, true).
|
||||||
|
Bind("/run/resolvconf", "/run/resolvconf", false, true).
|
||||||
|
Bind("/run/sddm", "/run/sddm", false, true).
|
||||||
|
Bind("/run/syncoid", "/run/syncoid", false, true).
|
||||||
|
Bind("/run/systemd", "/run/systemd", false, true).
|
||||||
|
Bind("/run/tmpfiles.d", "/run/tmpfiles.d", false, true).
|
||||||
|
Bind("/run/udev", "/run/udev", false, true).
|
||||||
|
Bind("/run/udisks2", "/run/udisks2", false, true).
|
||||||
|
Bind("/run/utmp", "/run/utmp", false, true).
|
||||||
|
Bind("/run/virtlogd.pid", "/run/virtlogd.pid", false, true).
|
||||||
|
Bind("/run/wrappers", "/run/wrappers", false, true).
|
||||||
|
Bind("/run/zed.pid", "/run/zed.pid", false, true).
|
||||||
|
Bind("/run/zed.state", "/run/zed.state", false, true).
|
||||||
|
Bind("/tmp/fortify.1971/tmpdir/150", "/tmp", false, true).
|
||||||
|
Tmpfs("/tmp/fortify.1971", 1048576).
|
||||||
|
Tmpfs("/run/user", 1048576).
|
||||||
|
Tmpfs("/run/user/150", 8388608).
|
||||||
|
Bind("/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/passwd", "/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/passwd").
|
||||||
|
Bind("/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/group", "/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/group").
|
||||||
|
Bind("/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/passwd", "/etc/passwd").
|
||||||
|
Bind("/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/group", "/etc/group").
|
||||||
|
Tmpfs("/var/run/nscd", 8192),
|
||||||
|
want: []string{
|
||||||
|
"--unshare-all", "--unshare-user", "--share-net",
|
||||||
|
"--clearenv", "--die-with-parent", "--as-pid-1",
|
||||||
|
"--uid", "65534",
|
||||||
|
"--gid", "65534",
|
||||||
|
"--setenv", "FORTIFY_INIT", "3",
|
||||||
|
"--setenv", "HOME", "/home/chronos",
|
||||||
|
"--setenv", "SHELL", "/run/current-system/sw/bin/zsh",
|
||||||
|
"--setenv", "TERM", "xterm-256color",
|
||||||
|
"--setenv", "USER", "chronos",
|
||||||
|
"--setenv", "XDG_RUNTIME_DIR", "/run/user/150",
|
||||||
|
"--setenv", "XDG_SESSION_CLASS", "user",
|
||||||
|
"--setenv", "XDG_SESSION_TYPE", "tty",
|
||||||
|
"--proc", "/proc", "--dev", "/dev",
|
||||||
|
"--mqueue", "/dev/mqueue",
|
||||||
|
"--bind", "/bin", "/bin",
|
||||||
|
"--bind", "/boot", "/boot",
|
||||||
|
"--bind", "/etc", "/etc",
|
||||||
|
"--bind", "/home", "/home",
|
||||||
|
"--bind", "/lib", "/lib",
|
||||||
|
"--bind", "/lib64", "/lib64",
|
||||||
|
"--bind", "/nix", "/nix",
|
||||||
|
"--bind", "/root", "/root",
|
||||||
|
"--bind", "/srv", "/srv",
|
||||||
|
"--bind", "/sys", "/sys",
|
||||||
|
"--bind", "/usr", "/usr",
|
||||||
|
"--bind", "/var", "/var",
|
||||||
|
"--bind", "/run/NetworkManager", "/run/NetworkManager",
|
||||||
|
"--bind", "/run/agetty.reload", "/run/agetty.reload",
|
||||||
|
"--bind", "/run/binfmt", "/run/binfmt",
|
||||||
|
"--bind", "/run/booted-system", "/run/booted-system",
|
||||||
|
"--bind", "/run/credentials", "/run/credentials",
|
||||||
|
"--bind", "/run/cryptsetup", "/run/cryptsetup",
|
||||||
|
"--bind", "/run/current-system", "/run/current-system",
|
||||||
|
"--bind", "/run/host", "/run/host",
|
||||||
|
"--bind", "/run/keys", "/run/keys",
|
||||||
|
"--bind", "/run/libvirt", "/run/libvirt",
|
||||||
|
"--bind", "/run/libvirtd.pid", "/run/libvirtd.pid",
|
||||||
|
"--bind", "/run/lock", "/run/lock",
|
||||||
|
"--bind", "/run/log", "/run/log",
|
||||||
|
"--bind", "/run/lvm", "/run/lvm",
|
||||||
|
"--bind", "/run/mount", "/run/mount",
|
||||||
|
"--bind", "/run/nginx", "/run/nginx",
|
||||||
|
"--bind", "/run/nscd", "/run/nscd",
|
||||||
|
"--bind", "/run/opengl-driver", "/run/opengl-driver",
|
||||||
|
"--bind", "/run/pppd", "/run/pppd",
|
||||||
|
"--bind", "/run/resolvconf", "/run/resolvconf",
|
||||||
|
"--bind", "/run/sddm", "/run/sddm",
|
||||||
|
"--bind", "/run/syncoid", "/run/syncoid",
|
||||||
|
"--bind", "/run/systemd", "/run/systemd",
|
||||||
|
"--bind", "/run/tmpfiles.d", "/run/tmpfiles.d",
|
||||||
|
"--bind", "/run/udev", "/run/udev",
|
||||||
|
"--bind", "/run/udisks2", "/run/udisks2",
|
||||||
|
"--bind", "/run/utmp", "/run/utmp",
|
||||||
|
"--bind", "/run/virtlogd.pid", "/run/virtlogd.pid",
|
||||||
|
"--bind", "/run/wrappers", "/run/wrappers",
|
||||||
|
"--bind", "/run/zed.pid", "/run/zed.pid",
|
||||||
|
"--bind", "/run/zed.state", "/run/zed.state",
|
||||||
|
"--bind", "/tmp/fortify.1971/tmpdir/150", "/tmp",
|
||||||
|
"--size", "1048576", "--tmpfs", "/tmp/fortify.1971",
|
||||||
|
"--size", "1048576", "--tmpfs", "/run/user",
|
||||||
|
"--size", "8388608", "--tmpfs", "/run/user/150",
|
||||||
|
"--ro-bind", "/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/passwd", "/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/passwd",
|
||||||
|
"--ro-bind", "/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/group", "/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/group",
|
||||||
|
"--ro-bind", "/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/passwd", "/etc/passwd",
|
||||||
|
"--ro-bind", "/tmp/fortify.1971/67a97cc824a64ef789f16b20ca6ce311/group", "/etc/group",
|
||||||
|
"--size", "8192", "--tmpfs", "/var/run/nscd",
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
|
@ -7,8 +7,8 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestBwrap(t *testing.T) {
|
func TestBwrap(t *testing.T) {
|
||||||
|
@ -5,7 +5,7 @@ import (
|
|||||||
"os"
|
"os"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestDirect(t *testing.T) {
|
func TestDirect(t *testing.T) {
|
||||||
|
@ -1,6 +1,4 @@
|
|||||||
/*
|
// Package helper runs external helpers with optional sandboxing and manages their status/args pipes.
|
||||||
Package helper runs external helpers and manages their status and args FDs.
|
|
||||||
*/
|
|
||||||
package helper
|
package helper
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
@ -6,7 +6,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -5,6 +5,8 @@ import (
|
|||||||
"io"
|
"io"
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/proc"
|
||||||
)
|
)
|
||||||
|
|
||||||
type pipes struct {
|
type pipes struct {
|
||||||
@ -47,24 +49,21 @@ func (p *pipes) pipe() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// calls pipe to create pipes and sets them up as ExtraFiles, returning their fd
|
// calls pipe to create pipes and sets them up as ExtraFiles, returning their fd
|
||||||
func (p *pipes) prepareCmd(cmd *exec.Cmd) (int, int, error) {
|
func (p *pipes) prepareCmd(cmd *exec.Cmd) (argsFd, statFd int, err error) {
|
||||||
if err := p.pipe(); err != nil {
|
argsFd, statFd = -1, -1
|
||||||
return -1, -1, err
|
if err = p.pipe(); err != nil {
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// save a reference of cmd for future use
|
// save a reference of cmd for future use
|
||||||
p.cmd = cmd
|
p.cmd = cmd
|
||||||
|
|
||||||
// ExtraFiles: If non-nil, entry i becomes file descriptor 3+i.
|
argsFd = int(proc.ExtraFile(cmd, p.argsP[0]))
|
||||||
argsFd := 3 + len(cmd.ExtraFiles)
|
|
||||||
cmd.ExtraFiles = append(cmd.ExtraFiles, p.argsP[0])
|
|
||||||
|
|
||||||
if p.ready != nil {
|
if p.ready != nil {
|
||||||
cmd.ExtraFiles = append(cmd.ExtraFiles, p.statP[1])
|
statFd = int(proc.ExtraFile(cmd, p.statP[1]))
|
||||||
return argsFd, argsFd + 1, nil
|
|
||||||
} else {
|
|
||||||
return argsFd, -1, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *pipes) readyWriteArgs() error {
|
func (p *pipes) readyWriteArgs() error {
|
||||||
|
@ -10,7 +10,8 @@ import (
|
|||||||
"syscall"
|
"syscall"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
)
|
)
|
||||||
|
|
||||||
// InternalChildStub is an internal function but exported because it is cross-package;
|
// InternalChildStub is an internal function but exported because it is cross-package;
|
||||||
@ -33,7 +34,7 @@ func InternalChildStub() {
|
|||||||
genericStub(argsFD, statFD)
|
genericStub(argsFD, statFD)
|
||||||
}
|
}
|
||||||
|
|
||||||
os.Exit(0)
|
fmsg.Exit(0)
|
||||||
}
|
}
|
||||||
|
|
||||||
// InternalReplaceExecCommand is an internal function but exported because it is cross-package;
|
// InternalReplaceExecCommand is an internal function but exported because it is cross-package;
|
||||||
|
@ -3,7 +3,7 @@ package helper_test
|
|||||||
import (
|
import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestHelperChildStub(t *testing.T) {
|
func TestHelperChildStub(t *testing.T) {
|
||||||
|
@ -1,32 +1,50 @@
|
|||||||
package app
|
package app
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"net"
|
|
||||||
"os/exec"
|
|
||||||
"sync"
|
"sync"
|
||||||
|
"sync/atomic"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/cmd/fshim/ipc/shim"
|
||||||
|
"git.gensokyo.uk/security/fortify/fst"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
)
|
)
|
||||||
|
|
||||||
type App interface {
|
type App interface {
|
||||||
Seal(config *Config) error
|
// ID returns a copy of App's unique ID.
|
||||||
|
ID() fst.ID
|
||||||
|
// Start sets up the system and starts the App.
|
||||||
Start() error
|
Start() error
|
||||||
|
// Wait waits for App's process to exit and reverts system setup.
|
||||||
Wait() (int, error)
|
Wait() (int, error)
|
||||||
|
// WaitErr returns error returned by the underlying wait syscall.
|
||||||
WaitErr() error
|
WaitErr() error
|
||||||
|
|
||||||
|
Seal(config *fst.Config) error
|
||||||
String() string
|
String() string
|
||||||
}
|
}
|
||||||
|
|
||||||
type app struct {
|
type app struct {
|
||||||
|
// single-use config reference
|
||||||
|
ct *appCt
|
||||||
|
|
||||||
|
// application unique identifier
|
||||||
|
id *fst.ID
|
||||||
|
// operating system interface
|
||||||
|
os linux.System
|
||||||
|
// shim process manager
|
||||||
|
shim *shim.Shim
|
||||||
// child process related information
|
// child process related information
|
||||||
seal *appSeal
|
seal *appSeal
|
||||||
// underlying fortified child process
|
|
||||||
cmd *exec.Cmd
|
|
||||||
// wayland connection if wayland mediation is enabled
|
|
||||||
wayland *net.UnixConn
|
|
||||||
// error returned waiting for process
|
// error returned waiting for process
|
||||||
wait error
|
waitErr error
|
||||||
|
|
||||||
lock sync.RWMutex
|
lock sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (a *app) ID() fst.ID {
|
||||||
|
return *a.id
|
||||||
|
}
|
||||||
|
|
||||||
func (a *app) String() string {
|
func (a *app) String() string {
|
||||||
if a == nil {
|
if a == nil {
|
||||||
return "(invalid fortified app)"
|
return "(invalid fortified app)"
|
||||||
@ -35,21 +53,45 @@ func (a *app) String() string {
|
|||||||
a.lock.RLock()
|
a.lock.RLock()
|
||||||
defer a.lock.RUnlock()
|
defer a.lock.RUnlock()
|
||||||
|
|
||||||
if a.cmd != nil {
|
if a.shim != nil {
|
||||||
return a.cmd.String()
|
return a.shim.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
if a.seal != nil {
|
if a.seal != nil {
|
||||||
return "(sealed fortified app as uid " + a.seal.sys.Uid + ")"
|
return "(sealed fortified app as uid " + a.seal.sys.user.us + ")"
|
||||||
}
|
}
|
||||||
|
|
||||||
return "(unsealed fortified app)"
|
return "(unsealed fortified app)"
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *app) WaitErr() error {
|
func (a *app) WaitErr() error {
|
||||||
return a.wait
|
return a.waitErr
|
||||||
}
|
}
|
||||||
|
|
||||||
func New() App {
|
func New(os linux.System) (App, error) {
|
||||||
return new(app)
|
a := new(app)
|
||||||
|
a.id = new(fst.ID)
|
||||||
|
a.os = os
|
||||||
|
return a, fst.NewAppID(a.id)
|
||||||
|
}
|
||||||
|
|
||||||
|
// appCt ensures its wrapped val is only accessed once
|
||||||
|
type appCt struct {
|
||||||
|
val *fst.Config
|
||||||
|
done *atomic.Bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *appCt) Unwrap() *fst.Config {
|
||||||
|
if !a.done.Load() {
|
||||||
|
defer a.done.Store(true)
|
||||||
|
return a.val
|
||||||
|
}
|
||||||
|
panic("attempted to access config reference twice")
|
||||||
|
}
|
||||||
|
|
||||||
|
func newAppCt(config *fst.Config) (ct *appCt) {
|
||||||
|
ct = new(appCt)
|
||||||
|
ct.done = new(atomic.Bool)
|
||||||
|
ct.val = config
|
||||||
|
return ct
|
||||||
}
|
}
|
||||||
|
225
internal/app/app_nixos_test.go
Normal file
225
internal/app/app_nixos_test.go
Normal file
@ -0,0 +1,225 @@
|
|||||||
|
package app_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"git.gensokyo.uk/security/fortify/acl"
|
||||||
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
|
"git.gensokyo.uk/security/fortify/fst"
|
||||||
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
|
)
|
||||||
|
|
||||||
|
var testCasesNixos = []sealTestCase{
|
||||||
|
{
|
||||||
|
"nixos chromium direct wayland", new(stubNixOS),
|
||||||
|
&fst.Config{
|
||||||
|
ID: "org.chromium.Chromium",
|
||||||
|
Command: []string{"/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start"},
|
||||||
|
Confinement: fst.ConfinementConfig{
|
||||||
|
AppID: 1, Groups: []string{}, Username: "u0_a1",
|
||||||
|
Outer: "/var/lib/persist/module/fortify/0/1",
|
||||||
|
Sandbox: &fst.SandboxConfig{
|
||||||
|
UserNS: true, Net: true, MapRealUID: true, DirectWayland: true, Env: nil,
|
||||||
|
Filesystem: []*fst.FilesystemConfig{
|
||||||
|
{Src: "/bin", Must: true}, {Src: "/usr/bin", Must: true},
|
||||||
|
{Src: "/nix/store", Must: true}, {Src: "/run/current-system", Must: true},
|
||||||
|
{Src: "/sys/block"}, {Src: "/sys/bus"}, {Src: "/sys/class"}, {Src: "/sys/dev"}, {Src: "/sys/devices"},
|
||||||
|
{Src: "/run/opengl-driver", Must: true}, {Src: "/dev/dri", Device: true},
|
||||||
|
}, AutoEtc: true,
|
||||||
|
Override: []string{"/var/run/nscd"},
|
||||||
|
},
|
||||||
|
SystemBus: &dbus.Config{
|
||||||
|
Talk: []string{"org.bluez", "org.freedesktop.Avahi", "org.freedesktop.UPower"},
|
||||||
|
Filter: true,
|
||||||
|
},
|
||||||
|
SessionBus: &dbus.Config{
|
||||||
|
Talk: []string{
|
||||||
|
"org.freedesktop.FileManager1", "org.freedesktop.Notifications",
|
||||||
|
"org.freedesktop.ScreenSaver", "org.freedesktop.secrets",
|
||||||
|
"org.kde.kwalletd5", "org.kde.kwalletd6",
|
||||||
|
},
|
||||||
|
Own: []string{
|
||||||
|
"org.chromium.Chromium.*",
|
||||||
|
"org.mpris.MediaPlayer2.org.chromium.Chromium.*",
|
||||||
|
"org.mpris.MediaPlayer2.chromium.*",
|
||||||
|
},
|
||||||
|
Call: map[string]string{}, Broadcast: map[string]string{},
|
||||||
|
Filter: true,
|
||||||
|
},
|
||||||
|
Enablements: system.EWayland.Mask() | system.EDBus.Mask() | system.EPulse.Mask(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
fst.ID{
|
||||||
|
0x8e, 0x2c, 0x76, 0xb0,
|
||||||
|
0x66, 0xda, 0xbe, 0x57,
|
||||||
|
0x4c, 0xf0, 0x73, 0xbd,
|
||||||
|
0xb4, 0x6e, 0xb5, 0xc1,
|
||||||
|
},
|
||||||
|
system.New(1000001).
|
||||||
|
Ensure("/tmp/fortify.1971", 0711).
|
||||||
|
Ephemeral(system.Process, "/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1", 0711).
|
||||||
|
Ensure("/tmp/fortify.1971/tmpdir", 0700).UpdatePermType(system.User, "/tmp/fortify.1971/tmpdir", acl.Execute).
|
||||||
|
Ensure("/tmp/fortify.1971/tmpdir/1", 01700).UpdatePermType(system.User, "/tmp/fortify.1971/tmpdir/1", acl.Read, acl.Write, acl.Execute).
|
||||||
|
Ensure("/run/user/1971/fortify", 0700).UpdatePermType(system.User, "/run/user/1971/fortify", acl.Execute).
|
||||||
|
Ensure("/run/user/1971", 0700).UpdatePermType(system.User, "/run/user/1971", acl.Execute). // this is ordered as is because the previous Ensure only calls mkdir if XDG_RUNTIME_DIR is unset
|
||||||
|
Ephemeral(system.Process, "/run/user/1971/fortify/8e2c76b066dabe574cf073bdb46eb5c1", 0700).UpdatePermType(system.Process, "/run/user/1971/fortify/8e2c76b066dabe574cf073bdb46eb5c1", acl.Execute).
|
||||||
|
WriteType(system.Process, "/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/passwd", "u0_a1:x:1971:1971:Fortify:/var/lib/persist/module/fortify/0/1:/run/current-system/sw/bin/zsh\n").
|
||||||
|
WriteType(system.Process, "/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/group", "fortify:x:1971:\n").
|
||||||
|
Link("/run/user/1971/wayland-0", "/run/user/1971/fortify/8e2c76b066dabe574cf073bdb46eb5c1/wayland").
|
||||||
|
UpdatePermType(system.EWayland, "/run/user/1971/wayland-0", acl.Read, acl.Write, acl.Execute).
|
||||||
|
Link("/run/user/1971/pulse/native", "/run/user/1971/fortify/8e2c76b066dabe574cf073bdb46eb5c1/pulse").
|
||||||
|
CopyFile("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/pulse-cookie", "/home/ophestra/xdg/config/pulse/cookie").
|
||||||
|
MustProxyDBus("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", &dbus.Config{
|
||||||
|
Talk: []string{
|
||||||
|
"org.freedesktop.FileManager1", "org.freedesktop.Notifications",
|
||||||
|
"org.freedesktop.ScreenSaver", "org.freedesktop.secrets",
|
||||||
|
"org.kde.kwalletd5", "org.kde.kwalletd6",
|
||||||
|
},
|
||||||
|
Own: []string{
|
||||||
|
"org.chromium.Chromium.*",
|
||||||
|
"org.mpris.MediaPlayer2.org.chromium.Chromium.*",
|
||||||
|
"org.mpris.MediaPlayer2.chromium.*",
|
||||||
|
},
|
||||||
|
Call: map[string]string{}, Broadcast: map[string]string{},
|
||||||
|
Filter: true,
|
||||||
|
}, "/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", &dbus.Config{
|
||||||
|
Talk: []string{
|
||||||
|
"org.bluez",
|
||||||
|
"org.freedesktop.Avahi",
|
||||||
|
"org.freedesktop.UPower",
|
||||||
|
},
|
||||||
|
Filter: true,
|
||||||
|
}).
|
||||||
|
UpdatePerm("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", acl.Read, acl.Write).
|
||||||
|
UpdatePerm("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", acl.Read, acl.Write),
|
||||||
|
(&bwrap.Config{
|
||||||
|
Net: true,
|
||||||
|
UserNS: true,
|
||||||
|
Chdir: "/var/lib/persist/module/fortify/0/1",
|
||||||
|
Clearenv: true,
|
||||||
|
SetEnv: map[string]string{
|
||||||
|
"DBUS_SESSION_BUS_ADDRESS": "unix:path=/run/user/1971/bus",
|
||||||
|
"DBUS_SYSTEM_BUS_ADDRESS": "unix:path=/run/dbus/system_bus_socket",
|
||||||
|
"HOME": "/var/lib/persist/module/fortify/0/1",
|
||||||
|
"PULSE_COOKIE": "/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/pulse-cookie",
|
||||||
|
"PULSE_SERVER": "unix:/run/user/1971/pulse/native",
|
||||||
|
"SHELL": "/run/current-system/sw/bin/zsh",
|
||||||
|
"TERM": "xterm-256color",
|
||||||
|
"USER": "u0_a1",
|
||||||
|
"WAYLAND_DISPLAY": "/run/user/1971/wayland-0",
|
||||||
|
"XDG_RUNTIME_DIR": "/run/user/1971",
|
||||||
|
"XDG_SESSION_CLASS": "user",
|
||||||
|
"XDG_SESSION_TYPE": "tty",
|
||||||
|
},
|
||||||
|
Chmod: make(bwrap.ChmodConfig),
|
||||||
|
NewSession: true,
|
||||||
|
DieWithParent: true,
|
||||||
|
AsInit: true,
|
||||||
|
}).SetUID(1971).SetGID(1971).
|
||||||
|
Procfs("/proc").
|
||||||
|
Tmpfs("/fortify", 4096).
|
||||||
|
DevTmpfs("/dev").Mqueue("/dev/mqueue").
|
||||||
|
Bind("/bin", "/bin").
|
||||||
|
Bind("/usr/bin", "/usr/bin").
|
||||||
|
Bind("/nix/store", "/nix/store").
|
||||||
|
Bind("/run/current-system", "/run/current-system").
|
||||||
|
Bind("/sys/block", "/sys/block", true).
|
||||||
|
Bind("/sys/bus", "/sys/bus", true).
|
||||||
|
Bind("/sys/class", "/sys/class", true).
|
||||||
|
Bind("/sys/dev", "/sys/dev", true).
|
||||||
|
Bind("/sys/devices", "/sys/devices", true).
|
||||||
|
Bind("/run/opengl-driver", "/run/opengl-driver").
|
||||||
|
Bind("/dev/dri", "/dev/dri", true, true, true).
|
||||||
|
Bind("/etc", "/fortify/etc").
|
||||||
|
Symlink("/fortify/etc/alsa", "/etc/alsa").
|
||||||
|
Symlink("/fortify/etc/bashrc", "/etc/bashrc").
|
||||||
|
Symlink("/fortify/etc/binfmt.d", "/etc/binfmt.d").
|
||||||
|
Symlink("/fortify/etc/dbus-1", "/etc/dbus-1").
|
||||||
|
Symlink("/fortify/etc/default", "/etc/default").
|
||||||
|
Symlink("/fortify/etc/ethertypes", "/etc/ethertypes").
|
||||||
|
Symlink("/fortify/etc/fonts", "/etc/fonts").
|
||||||
|
Symlink("/fortify/etc/fstab", "/etc/fstab").
|
||||||
|
Symlink("/fortify/etc/fuse.conf", "/etc/fuse.conf").
|
||||||
|
Symlink("/fortify/etc/host.conf", "/etc/host.conf").
|
||||||
|
Symlink("/fortify/etc/hostid", "/etc/hostid").
|
||||||
|
Symlink("/fortify/etc/hostname", "/etc/hostname").
|
||||||
|
Symlink("/fortify/etc/hostname.CHECKSUM", "/etc/hostname.CHECKSUM").
|
||||||
|
Symlink("/fortify/etc/hosts", "/etc/hosts").
|
||||||
|
Symlink("/fortify/etc/inputrc", "/etc/inputrc").
|
||||||
|
Symlink("/fortify/etc/ipsec.d", "/etc/ipsec.d").
|
||||||
|
Symlink("/fortify/etc/issue", "/etc/issue").
|
||||||
|
Symlink("/fortify/etc/kbd", "/etc/kbd").
|
||||||
|
Symlink("/fortify/etc/libblockdev", "/etc/libblockdev").
|
||||||
|
Symlink("/fortify/etc/locale.conf", "/etc/locale.conf").
|
||||||
|
Symlink("/fortify/etc/localtime", "/etc/localtime").
|
||||||
|
Symlink("/fortify/etc/login.defs", "/etc/login.defs").
|
||||||
|
Symlink("/fortify/etc/lsb-release", "/etc/lsb-release").
|
||||||
|
Symlink("/fortify/etc/lvm", "/etc/lvm").
|
||||||
|
Symlink("/fortify/etc/machine-id", "/etc/machine-id").
|
||||||
|
Symlink("/fortify/etc/man_db.conf", "/etc/man_db.conf").
|
||||||
|
Symlink("/fortify/etc/modprobe.d", "/etc/modprobe.d").
|
||||||
|
Symlink("/fortify/etc/modules-load.d", "/etc/modules-load.d").
|
||||||
|
Symlink("/proc/mounts", "/etc/mtab").
|
||||||
|
Symlink("/fortify/etc/nanorc", "/etc/nanorc").
|
||||||
|
Symlink("/fortify/etc/netgroup", "/etc/netgroup").
|
||||||
|
Symlink("/fortify/etc/NetworkManager", "/etc/NetworkManager").
|
||||||
|
Symlink("/fortify/etc/nix", "/etc/nix").
|
||||||
|
Symlink("/fortify/etc/nixos", "/etc/nixos").
|
||||||
|
Symlink("/fortify/etc/NIXOS", "/etc/NIXOS").
|
||||||
|
Symlink("/fortify/etc/nscd.conf", "/etc/nscd.conf").
|
||||||
|
Symlink("/fortify/etc/nsswitch.conf", "/etc/nsswitch.conf").
|
||||||
|
Symlink("/fortify/etc/opensnitchd", "/etc/opensnitchd").
|
||||||
|
Symlink("/fortify/etc/os-release", "/etc/os-release").
|
||||||
|
Symlink("/fortify/etc/pam", "/etc/pam").
|
||||||
|
Symlink("/fortify/etc/pam.d", "/etc/pam.d").
|
||||||
|
Symlink("/fortify/etc/pipewire", "/etc/pipewire").
|
||||||
|
Symlink("/fortify/etc/pki", "/etc/pki").
|
||||||
|
Symlink("/fortify/etc/polkit-1", "/etc/polkit-1").
|
||||||
|
Symlink("/fortify/etc/profile", "/etc/profile").
|
||||||
|
Symlink("/fortify/etc/protocols", "/etc/protocols").
|
||||||
|
Symlink("/fortify/etc/qemu", "/etc/qemu").
|
||||||
|
Symlink("/fortify/etc/resolv.conf", "/etc/resolv.conf").
|
||||||
|
Symlink("/fortify/etc/resolvconf.conf", "/etc/resolvconf.conf").
|
||||||
|
Symlink("/fortify/etc/rpc", "/etc/rpc").
|
||||||
|
Symlink("/fortify/etc/samba", "/etc/samba").
|
||||||
|
Symlink("/fortify/etc/sddm.conf", "/etc/sddm.conf").
|
||||||
|
Symlink("/fortify/etc/secureboot", "/etc/secureboot").
|
||||||
|
Symlink("/fortify/etc/services", "/etc/services").
|
||||||
|
Symlink("/fortify/etc/set-environment", "/etc/set-environment").
|
||||||
|
Symlink("/fortify/etc/shadow", "/etc/shadow").
|
||||||
|
Symlink("/fortify/etc/shells", "/etc/shells").
|
||||||
|
Symlink("/fortify/etc/ssh", "/etc/ssh").
|
||||||
|
Symlink("/fortify/etc/ssl", "/etc/ssl").
|
||||||
|
Symlink("/fortify/etc/static", "/etc/static").
|
||||||
|
Symlink("/fortify/etc/subgid", "/etc/subgid").
|
||||||
|
Symlink("/fortify/etc/subuid", "/etc/subuid").
|
||||||
|
Symlink("/fortify/etc/sudoers", "/etc/sudoers").
|
||||||
|
Symlink("/fortify/etc/sysctl.d", "/etc/sysctl.d").
|
||||||
|
Symlink("/fortify/etc/systemd", "/etc/systemd").
|
||||||
|
Symlink("/fortify/etc/terminfo", "/etc/terminfo").
|
||||||
|
Symlink("/fortify/etc/tmpfiles.d", "/etc/tmpfiles.d").
|
||||||
|
Symlink("/fortify/etc/udev", "/etc/udev").
|
||||||
|
Symlink("/fortify/etc/udisks2", "/etc/udisks2").
|
||||||
|
Symlink("/fortify/etc/UPower", "/etc/UPower").
|
||||||
|
Symlink("/fortify/etc/vconsole.conf", "/etc/vconsole.conf").
|
||||||
|
Symlink("/fortify/etc/X11", "/etc/X11").
|
||||||
|
Symlink("/fortify/etc/zfs", "/etc/zfs").
|
||||||
|
Symlink("/fortify/etc/zinputrc", "/etc/zinputrc").
|
||||||
|
Symlink("/fortify/etc/zoneinfo", "/etc/zoneinfo").
|
||||||
|
Symlink("/fortify/etc/zprofile", "/etc/zprofile").
|
||||||
|
Symlink("/fortify/etc/zshenv", "/etc/zshenv").
|
||||||
|
Symlink("/fortify/etc/zshrc", "/etc/zshrc").
|
||||||
|
Bind("/tmp/fortify.1971/tmpdir/1", "/tmp", false, true).
|
||||||
|
Tmpfs("/tmp/fortify.1971", 1048576).
|
||||||
|
Tmpfs("/run/user", 1048576).
|
||||||
|
Tmpfs("/run/user/1971", 8388608).
|
||||||
|
Bind("/var/lib/persist/module/fortify/0/1", "/var/lib/persist/module/fortify/0/1", false, true).
|
||||||
|
Bind("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/passwd", "/etc/passwd").
|
||||||
|
Bind("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/group", "/etc/group").
|
||||||
|
Bind("/run/user/1971/fortify/8e2c76b066dabe574cf073bdb46eb5c1/wayland", "/run/user/1971/wayland-0").
|
||||||
|
Bind("/run/user/1971/fortify/8e2c76b066dabe574cf073bdb46eb5c1/pulse", "/run/user/1971/pulse/native").
|
||||||
|
Bind("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/pulse-cookie", "/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/pulse-cookie").
|
||||||
|
Bind("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", "/run/user/1971/bus").
|
||||||
|
Bind("/tmp/fortify.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", "/run/dbus/system_bus_socket").
|
||||||
|
Tmpfs("/var/run/nscd", 8192),
|
||||||
|
},
|
||||||
|
}
|
452
internal/app/app_pd_test.go
Normal file
452
internal/app/app_pd_test.go
Normal file
@ -0,0 +1,452 @@
|
|||||||
|
package app_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"git.gensokyo.uk/security/fortify/acl"
|
||||||
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
|
"git.gensokyo.uk/security/fortify/fst"
|
||||||
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
|
)
|
||||||
|
|
||||||
|
var testCasesPd = []sealTestCase{
|
||||||
|
{
|
||||||
|
"nixos permissive defaults no enablements", new(stubNixOS),
|
||||||
|
&fst.Config{
|
||||||
|
Command: make([]string, 0),
|
||||||
|
Confinement: fst.ConfinementConfig{
|
||||||
|
AppID: 0,
|
||||||
|
Username: "chronos",
|
||||||
|
Outer: "/home/chronos",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
fst.ID{
|
||||||
|
0x4a, 0x45, 0x0b, 0x65,
|
||||||
|
0x96, 0xd7, 0xbc, 0x15,
|
||||||
|
0xbd, 0x01, 0x78, 0x0e,
|
||||||
|
0xb9, 0xa6, 0x07, 0xac,
|
||||||
|
},
|
||||||
|
system.New(1000000).
|
||||||
|
Ensure("/tmp/fortify.1971", 0711).
|
||||||
|
Ephemeral(system.Process, "/tmp/fortify.1971/4a450b6596d7bc15bd01780eb9a607ac", 0711).
|
||||||
|
Ensure("/tmp/fortify.1971/tmpdir", 0700).UpdatePermType(system.User, "/tmp/fortify.1971/tmpdir", acl.Execute).
|
||||||
|
Ensure("/tmp/fortify.1971/tmpdir/0", 01700).UpdatePermType(system.User, "/tmp/fortify.1971/tmpdir/0", acl.Read, acl.Write, acl.Execute).
|
||||||
|
Ensure("/run/user/1971/fortify", 0700).UpdatePermType(system.User, "/run/user/1971/fortify", acl.Execute).
|
||||||
|
Ensure("/run/user/1971", 0700).UpdatePermType(system.User, "/run/user/1971", acl.Execute). // this is ordered as is because the previous Ensure only calls mkdir if XDG_RUNTIME_DIR is unset
|
||||||
|
Ephemeral(system.Process, "/run/user/1971/fortify/4a450b6596d7bc15bd01780eb9a607ac", 0700).UpdatePermType(system.Process, "/run/user/1971/fortify/4a450b6596d7bc15bd01780eb9a607ac", acl.Execute).
|
||||||
|
WriteType(system.Process, "/tmp/fortify.1971/4a450b6596d7bc15bd01780eb9a607ac/passwd", "chronos:x:65534:65534:Fortify:/home/chronos:/run/current-system/sw/bin/zsh\n").
|
||||||
|
WriteType(system.Process, "/tmp/fortify.1971/4a450b6596d7bc15bd01780eb9a607ac/group", "fortify:x:65534:\n"),
|
||||||
|
(&bwrap.Config{
|
||||||
|
Net: true,
|
||||||
|
UserNS: true,
|
||||||
|
Clearenv: true,
|
||||||
|
Chdir: "/home/chronos",
|
||||||
|
SetEnv: map[string]string{
|
||||||
|
"HOME": "/home/chronos",
|
||||||
|
"SHELL": "/run/current-system/sw/bin/zsh",
|
||||||
|
"TERM": "xterm-256color",
|
||||||
|
"USER": "chronos",
|
||||||
|
"XDG_RUNTIME_DIR": "/run/user/65534",
|
||||||
|
"XDG_SESSION_CLASS": "user",
|
||||||
|
"XDG_SESSION_TYPE": "tty"},
|
||||||
|
Chmod: make(bwrap.ChmodConfig),
|
||||||
|
DieWithParent: true,
|
||||||
|
AsInit: true,
|
||||||
|
}).SetUID(65534).SetGID(65534).
|
||||||
|
Procfs("/proc").
|
||||||
|
Tmpfs("/fortify", 4096).
|
||||||
|
DevTmpfs("/dev").Mqueue("/dev/mqueue").
|
||||||
|
Bind("/bin", "/bin", false, true).
|
||||||
|
Bind("/boot", "/boot", false, true).
|
||||||
|
Bind("/home", "/home", false, true).
|
||||||
|
Bind("/lib", "/lib", false, true).
|
||||||
|
Bind("/lib64", "/lib64", false, true).
|
||||||
|
Bind("/nix", "/nix", false, true).
|
||||||
|
Bind("/root", "/root", false, true).
|
||||||
|
Bind("/srv", "/srv", false, true).
|
||||||
|
Bind("/sys", "/sys", false, true).
|
||||||
|
Bind("/usr", "/usr", false, true).
|
||||||
|
Bind("/var", "/var", false, true).
|
||||||
|
Bind("/run/agetty.reload", "/run/agetty.reload", false, true).
|
||||||
|
Bind("/run/binfmt", "/run/binfmt", false, true).
|
||||||
|
Bind("/run/booted-system", "/run/booted-system", false, true).
|
||||||
|
Bind("/run/credentials", "/run/credentials", false, true).
|
||||||
|
Bind("/run/cryptsetup", "/run/cryptsetup", false, true).
|
||||||
|
Bind("/run/current-system", "/run/current-system", false, true).
|
||||||
|
Bind("/run/host", "/run/host", false, true).
|
||||||
|
Bind("/run/keys", "/run/keys", false, true).
|
||||||
|
Bind("/run/libvirt", "/run/libvirt", false, true).
|
||||||
|
Bind("/run/libvirtd.pid", "/run/libvirtd.pid", false, true).
|
||||||
|
Bind("/run/lock", "/run/lock", false, true).
|
||||||
|
Bind("/run/log", "/run/log", false, true).
|
||||||
|
Bind("/run/lvm", "/run/lvm", false, true).
|
||||||
|
Bind("/run/mount", "/run/mount", false, true).
|
||||||
|
Bind("/run/NetworkManager", "/run/NetworkManager", false, true).
|
||||||
|
Bind("/run/nginx", "/run/nginx", false, true).
|
||||||
|
Bind("/run/nixos", "/run/nixos", false, true).
|
||||||
|
Bind("/run/nscd", "/run/nscd", false, true).
|
||||||
|
Bind("/run/opengl-driver", "/run/opengl-driver", false, true).
|
||||||
|
Bind("/run/pppd", "/run/pppd", false, true).
|
||||||
|
Bind("/run/resolvconf", "/run/resolvconf", false, true).
|
||||||
|
Bind("/run/sddm", "/run/sddm", false, true).
|
||||||
|
Bind("/run/store", "/run/store", false, true).
|
||||||
|
Bind("/run/syncoid", "/run/syncoid", false, true).
|
||||||
|
Bind("/run/system", "/run/system", false, true).
|
||||||
|
Bind("/run/systemd", "/run/systemd", false, true).
|
||||||
|
Bind("/run/tmpfiles.d", "/run/tmpfiles.d", false, true).
|
||||||
|
Bind("/run/udev", "/run/udev", false, true).
|
||||||
|
Bind("/run/udisks2", "/run/udisks2", false, true).
|
||||||
|
Bind("/run/utmp", "/run/utmp", false, true).
|
||||||
|
Bind("/run/virtlogd.pid", "/run/virtlogd.pid", false, true).
|
||||||
|
Bind("/run/wrappers", "/run/wrappers", false, true).
|
||||||
|
Bind("/run/zed.pid", "/run/zed.pid", false, true).
|
||||||
|
Bind("/run/zed.state", "/run/zed.state", false, true).
|
||||||
|
Bind("/etc", "/fortify/etc").
|
||||||
|
Symlink("/fortify/etc/alsa", "/etc/alsa").
|
||||||
|
Symlink("/fortify/etc/bashrc", "/etc/bashrc").
|
||||||
|
Symlink("/fortify/etc/binfmt.d", "/etc/binfmt.d").
|
||||||
|
Symlink("/fortify/etc/dbus-1", "/etc/dbus-1").
|
||||||
|
Symlink("/fortify/etc/default", "/etc/default").
|
||||||
|
Symlink("/fortify/etc/ethertypes", "/etc/ethertypes").
|
||||||
|
Symlink("/fortify/etc/fonts", "/etc/fonts").
|
||||||
|
Symlink("/fortify/etc/fstab", "/etc/fstab").
|
||||||
|
Symlink("/fortify/etc/fuse.conf", "/etc/fuse.conf").
|
||||||
|
Symlink("/fortify/etc/host.conf", "/etc/host.conf").
|
||||||
|
Symlink("/fortify/etc/hostid", "/etc/hostid").
|
||||||
|
Symlink("/fortify/etc/hostname", "/etc/hostname").
|
||||||
|
Symlink("/fortify/etc/hostname.CHECKSUM", "/etc/hostname.CHECKSUM").
|
||||||
|
Symlink("/fortify/etc/hosts", "/etc/hosts").
|
||||||
|
Symlink("/fortify/etc/inputrc", "/etc/inputrc").
|
||||||
|
Symlink("/fortify/etc/ipsec.d", "/etc/ipsec.d").
|
||||||
|
Symlink("/fortify/etc/issue", "/etc/issue").
|
||||||
|
Symlink("/fortify/etc/kbd", "/etc/kbd").
|
||||||
|
Symlink("/fortify/etc/libblockdev", "/etc/libblockdev").
|
||||||
|
Symlink("/fortify/etc/locale.conf", "/etc/locale.conf").
|
||||||
|
Symlink("/fortify/etc/localtime", "/etc/localtime").
|
||||||
|
Symlink("/fortify/etc/login.defs", "/etc/login.defs").
|
||||||
|
Symlink("/fortify/etc/lsb-release", "/etc/lsb-release").
|
||||||
|
Symlink("/fortify/etc/lvm", "/etc/lvm").
|
||||||
|
Symlink("/fortify/etc/machine-id", "/etc/machine-id").
|
||||||
|
Symlink("/fortify/etc/man_db.conf", "/etc/man_db.conf").
|
||||||
|
Symlink("/fortify/etc/modprobe.d", "/etc/modprobe.d").
|
||||||
|
Symlink("/fortify/etc/modules-load.d", "/etc/modules-load.d").
|
||||||
|
Symlink("/proc/mounts", "/etc/mtab").
|
||||||
|
Symlink("/fortify/etc/nanorc", "/etc/nanorc").
|
||||||
|
Symlink("/fortify/etc/netgroup", "/etc/netgroup").
|
||||||
|
Symlink("/fortify/etc/NetworkManager", "/etc/NetworkManager").
|
||||||
|
Symlink("/fortify/etc/nix", "/etc/nix").
|
||||||
|
Symlink("/fortify/etc/nixos", "/etc/nixos").
|
||||||
|
Symlink("/fortify/etc/NIXOS", "/etc/NIXOS").
|
||||||
|
Symlink("/fortify/etc/nscd.conf", "/etc/nscd.conf").
|
||||||
|
Symlink("/fortify/etc/nsswitch.conf", "/etc/nsswitch.conf").
|
||||||
|
Symlink("/fortify/etc/opensnitchd", "/etc/opensnitchd").
|
||||||
|
Symlink("/fortify/etc/os-release", "/etc/os-release").
|
||||||
|
Symlink("/fortify/etc/pam", "/etc/pam").
|
||||||
|
Symlink("/fortify/etc/pam.d", "/etc/pam.d").
|
||||||
|
Symlink("/fortify/etc/pipewire", "/etc/pipewire").
|
||||||
|
Symlink("/fortify/etc/pki", "/etc/pki").
|
||||||
|
Symlink("/fortify/etc/polkit-1", "/etc/polkit-1").
|
||||||
|
Symlink("/fortify/etc/profile", "/etc/profile").
|
||||||
|
Symlink("/fortify/etc/protocols", "/etc/protocols").
|
||||||
|
Symlink("/fortify/etc/qemu", "/etc/qemu").
|
||||||
|
Symlink("/fortify/etc/resolv.conf", "/etc/resolv.conf").
|
||||||
|
Symlink("/fortify/etc/resolvconf.conf", "/etc/resolvconf.conf").
|
||||||
|
Symlink("/fortify/etc/rpc", "/etc/rpc").
|
||||||
|
Symlink("/fortify/etc/samba", "/etc/samba").
|
||||||
|
Symlink("/fortify/etc/sddm.conf", "/etc/sddm.conf").
|
||||||
|
Symlink("/fortify/etc/secureboot", "/etc/secureboot").
|
||||||
|
Symlink("/fortify/etc/services", "/etc/services").
|
||||||
|
Symlink("/fortify/etc/set-environment", "/etc/set-environment").
|
||||||
|
Symlink("/fortify/etc/shadow", "/etc/shadow").
|
||||||
|
Symlink("/fortify/etc/shells", "/etc/shells").
|
||||||
|
Symlink("/fortify/etc/ssh", "/etc/ssh").
|
||||||
|
Symlink("/fortify/etc/ssl", "/etc/ssl").
|
||||||
|
Symlink("/fortify/etc/static", "/etc/static").
|
||||||
|
Symlink("/fortify/etc/subgid", "/etc/subgid").
|
||||||
|
Symlink("/fortify/etc/subuid", "/etc/subuid").
|
||||||
|
Symlink("/fortify/etc/sudoers", "/etc/sudoers").
|
||||||
|
Symlink("/fortify/etc/sysctl.d", "/etc/sysctl.d").
|
||||||
|
Symlink("/fortify/etc/systemd", "/etc/systemd").
|
||||||
|
Symlink("/fortify/etc/terminfo", "/etc/terminfo").
|
||||||
|
Symlink("/fortify/etc/tmpfiles.d", "/etc/tmpfiles.d").
|
||||||
|
Symlink("/fortify/etc/udev", "/etc/udev").
|
||||||
|
Symlink("/fortify/etc/udisks2", "/etc/udisks2").
|
||||||
|
Symlink("/fortify/etc/UPower", "/etc/UPower").
|
||||||
|
Symlink("/fortify/etc/vconsole.conf", "/etc/vconsole.conf").
|
||||||
|
Symlink("/fortify/etc/X11", "/etc/X11").
|
||||||
|
Symlink("/fortify/etc/zfs", "/etc/zfs").
|
||||||
|
Symlink("/fortify/etc/zinputrc", "/etc/zinputrc").
|
||||||
|
Symlink("/fortify/etc/zoneinfo", "/etc/zoneinfo").
|
||||||
|
Symlink("/fortify/etc/zprofile", "/etc/zprofile").
|
||||||
|
Symlink("/fortify/etc/zshenv", "/etc/zshenv").
|
||||||
|
Symlink("/fortify/etc/zshrc", "/etc/zshrc").
|
||||||
|
Bind("/tmp/fortify.1971/tmpdir/0", "/tmp", false, true).
|
||||||
|
Tmpfs("/tmp/fortify.1971", 1048576).
|
||||||
|
Tmpfs("/run/user", 1048576).
|
||||||
|
Tmpfs("/run/user/65534", 8388608).
|
||||||
|
Bind("/home/chronos", "/home/chronos", false, true).
|
||||||
|
Bind("/tmp/fortify.1971/4a450b6596d7bc15bd01780eb9a607ac/passwd", "/etc/passwd").
|
||||||
|
Bind("/tmp/fortify.1971/4a450b6596d7bc15bd01780eb9a607ac/group", "/etc/group").
|
||||||
|
Tmpfs("/var/run/nscd", 8192),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nixos permissive defaults chromium", new(stubNixOS),
|
||||||
|
&fst.Config{
|
||||||
|
ID: "org.chromium.Chromium",
|
||||||
|
Command: []string{"/run/current-system/sw/bin/zsh", "-c", "exec chromium "},
|
||||||
|
Confinement: fst.ConfinementConfig{
|
||||||
|
AppID: 9,
|
||||||
|
Groups: []string{"video"},
|
||||||
|
Username: "chronos",
|
||||||
|
Outer: "/home/chronos",
|
||||||
|
SessionBus: &dbus.Config{
|
||||||
|
Talk: []string{
|
||||||
|
"org.freedesktop.Notifications",
|
||||||
|
"org.freedesktop.FileManager1",
|
||||||
|
"org.freedesktop.ScreenSaver",
|
||||||
|
"org.freedesktop.secrets",
|
||||||
|
"org.kde.kwalletd5",
|
||||||
|
"org.kde.kwalletd6",
|
||||||
|
"org.gnome.SessionManager",
|
||||||
|
},
|
||||||
|
Own: []string{
|
||||||
|
"org.chromium.Chromium.*",
|
||||||
|
"org.mpris.MediaPlayer2.org.chromium.Chromium.*",
|
||||||
|
"org.mpris.MediaPlayer2.chromium.*",
|
||||||
|
},
|
||||||
|
Call: map[string]string{
|
||||||
|
"org.freedesktop.portal.*": "*",
|
||||||
|
},
|
||||||
|
Broadcast: map[string]string{
|
||||||
|
"org.freedesktop.portal.*": "@/org/freedesktop/portal/*",
|
||||||
|
},
|
||||||
|
Filter: true,
|
||||||
|
},
|
||||||
|
SystemBus: &dbus.Config{
|
||||||
|
Talk: []string{
|
||||||
|
"org.bluez",
|
||||||
|
"org.freedesktop.Avahi",
|
||||||
|
"org.freedesktop.UPower",
|
||||||
|
},
|
||||||
|
Filter: true,
|
||||||
|
},
|
||||||
|
Enablements: system.EWayland.Mask() | system.EDBus.Mask() | system.EPulse.Mask(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
fst.ID{
|
||||||
|
0xeb, 0xf0, 0x83, 0xd1,
|
||||||
|
0xb1, 0x75, 0x91, 0x17,
|
||||||
|
0x82, 0xd4, 0x13, 0x36,
|
||||||
|
0x9b, 0x64, 0xce, 0x7c,
|
||||||
|
},
|
||||||
|
system.New(1000009).
|
||||||
|
Ensure("/tmp/fortify.1971", 0711).
|
||||||
|
Ephemeral(system.Process, "/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c", 0711).
|
||||||
|
Ensure("/tmp/fortify.1971/tmpdir", 0700).UpdatePermType(system.User, "/tmp/fortify.1971/tmpdir", acl.Execute).
|
||||||
|
Ensure("/tmp/fortify.1971/tmpdir/9", 01700).UpdatePermType(system.User, "/tmp/fortify.1971/tmpdir/9", acl.Read, acl.Write, acl.Execute).
|
||||||
|
Ensure("/run/user/1971/fortify", 0700).UpdatePermType(system.User, "/run/user/1971/fortify", acl.Execute).
|
||||||
|
Ensure("/run/user/1971", 0700).UpdatePermType(system.User, "/run/user/1971", acl.Execute). // this is ordered as is because the previous Ensure only calls mkdir if XDG_RUNTIME_DIR is unset
|
||||||
|
Ephemeral(system.Process, "/run/user/1971/fortify/ebf083d1b175911782d413369b64ce7c", 0700).UpdatePermType(system.Process, "/run/user/1971/fortify/ebf083d1b175911782d413369b64ce7c", acl.Execute).
|
||||||
|
WriteType(system.Process, "/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/passwd", "chronos:x:65534:65534:Fortify:/home/chronos:/run/current-system/sw/bin/zsh\n").
|
||||||
|
WriteType(system.Process, "/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/group", "fortify:x:65534:\n").
|
||||||
|
Ensure("/tmp/fortify.1971/wayland", 0711).
|
||||||
|
Wayland("/tmp/fortify.1971/wayland/ebf083d1b175911782d413369b64ce7c", "/run/user/1971/wayland-0", "org.chromium.Chromium", "ebf083d1b175911782d413369b64ce7c").
|
||||||
|
Link("/run/user/1971/pulse/native", "/run/user/1971/fortify/ebf083d1b175911782d413369b64ce7c/pulse").
|
||||||
|
CopyFile("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/pulse-cookie", "/home/ophestra/xdg/config/pulse/cookie").
|
||||||
|
MustProxyDBus("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/bus", &dbus.Config{
|
||||||
|
Talk: []string{
|
||||||
|
"org.freedesktop.Notifications",
|
||||||
|
"org.freedesktop.FileManager1",
|
||||||
|
"org.freedesktop.ScreenSaver",
|
||||||
|
"org.freedesktop.secrets",
|
||||||
|
"org.kde.kwalletd5",
|
||||||
|
"org.kde.kwalletd6",
|
||||||
|
"org.gnome.SessionManager",
|
||||||
|
},
|
||||||
|
Own: []string{
|
||||||
|
"org.chromium.Chromium.*",
|
||||||
|
"org.mpris.MediaPlayer2.org.chromium.Chromium.*",
|
||||||
|
"org.mpris.MediaPlayer2.chromium.*",
|
||||||
|
},
|
||||||
|
Call: map[string]string{
|
||||||
|
"org.freedesktop.portal.*": "*",
|
||||||
|
},
|
||||||
|
Broadcast: map[string]string{
|
||||||
|
"org.freedesktop.portal.*": "@/org/freedesktop/portal/*",
|
||||||
|
},
|
||||||
|
Filter: true,
|
||||||
|
}, "/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/system_bus_socket", &dbus.Config{
|
||||||
|
Talk: []string{
|
||||||
|
"org.bluez",
|
||||||
|
"org.freedesktop.Avahi",
|
||||||
|
"org.freedesktop.UPower",
|
||||||
|
},
|
||||||
|
Filter: true,
|
||||||
|
}).
|
||||||
|
UpdatePerm("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/bus", acl.Read, acl.Write).
|
||||||
|
UpdatePerm("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/system_bus_socket", acl.Read, acl.Write),
|
||||||
|
(&bwrap.Config{
|
||||||
|
Net: true,
|
||||||
|
UserNS: true,
|
||||||
|
Chdir: "/home/chronos",
|
||||||
|
Clearenv: true,
|
||||||
|
SetEnv: map[string]string{
|
||||||
|
"DBUS_SESSION_BUS_ADDRESS": "unix:path=/run/user/65534/bus",
|
||||||
|
"DBUS_SYSTEM_BUS_ADDRESS": "unix:path=/run/dbus/system_bus_socket",
|
||||||
|
"HOME": "/home/chronos",
|
||||||
|
"PULSE_COOKIE": "/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/pulse-cookie",
|
||||||
|
"PULSE_SERVER": "unix:/run/user/65534/pulse/native",
|
||||||
|
"SHELL": "/run/current-system/sw/bin/zsh",
|
||||||
|
"TERM": "xterm-256color",
|
||||||
|
"USER": "chronos",
|
||||||
|
"WAYLAND_DISPLAY": "/run/user/65534/wayland-0",
|
||||||
|
"XDG_RUNTIME_DIR": "/run/user/65534",
|
||||||
|
"XDG_SESSION_CLASS": "user",
|
||||||
|
"XDG_SESSION_TYPE": "tty",
|
||||||
|
},
|
||||||
|
Chmod: make(bwrap.ChmodConfig),
|
||||||
|
DieWithParent: true,
|
||||||
|
AsInit: true,
|
||||||
|
}).SetUID(65534).SetGID(65534).
|
||||||
|
Procfs("/proc").
|
||||||
|
Tmpfs("/fortify", 4096).
|
||||||
|
DevTmpfs("/dev").Mqueue("/dev/mqueue").
|
||||||
|
Bind("/bin", "/bin", false, true).
|
||||||
|
Bind("/boot", "/boot", false, true).
|
||||||
|
Bind("/home", "/home", false, true).
|
||||||
|
Bind("/lib", "/lib", false, true).
|
||||||
|
Bind("/lib64", "/lib64", false, true).
|
||||||
|
Bind("/nix", "/nix", false, true).
|
||||||
|
Bind("/root", "/root", false, true).
|
||||||
|
Bind("/srv", "/srv", false, true).
|
||||||
|
Bind("/sys", "/sys", false, true).
|
||||||
|
Bind("/usr", "/usr", false, true).
|
||||||
|
Bind("/var", "/var", false, true).
|
||||||
|
Bind("/run/agetty.reload", "/run/agetty.reload", false, true).
|
||||||
|
Bind("/run/binfmt", "/run/binfmt", false, true).
|
||||||
|
Bind("/run/booted-system", "/run/booted-system", false, true).
|
||||||
|
Bind("/run/credentials", "/run/credentials", false, true).
|
||||||
|
Bind("/run/cryptsetup", "/run/cryptsetup", false, true).
|
||||||
|
Bind("/run/current-system", "/run/current-system", false, true).
|
||||||
|
Bind("/run/host", "/run/host", false, true).
|
||||||
|
Bind("/run/keys", "/run/keys", false, true).
|
||||||
|
Bind("/run/libvirt", "/run/libvirt", false, true).
|
||||||
|
Bind("/run/libvirtd.pid", "/run/libvirtd.pid", false, true).
|
||||||
|
Bind("/run/lock", "/run/lock", false, true).
|
||||||
|
Bind("/run/log", "/run/log", false, true).
|
||||||
|
Bind("/run/lvm", "/run/lvm", false, true).
|
||||||
|
Bind("/run/mount", "/run/mount", false, true).
|
||||||
|
Bind("/run/NetworkManager", "/run/NetworkManager", false, true).
|
||||||
|
Bind("/run/nginx", "/run/nginx", false, true).
|
||||||
|
Bind("/run/nixos", "/run/nixos", false, true).
|
||||||
|
Bind("/run/nscd", "/run/nscd", false, true).
|
||||||
|
Bind("/run/opengl-driver", "/run/opengl-driver", false, true).
|
||||||
|
Bind("/run/pppd", "/run/pppd", false, true).
|
||||||
|
Bind("/run/resolvconf", "/run/resolvconf", false, true).
|
||||||
|
Bind("/run/sddm", "/run/sddm", false, true).
|
||||||
|
Bind("/run/store", "/run/store", false, true).
|
||||||
|
Bind("/run/syncoid", "/run/syncoid", false, true).
|
||||||
|
Bind("/run/system", "/run/system", false, true).
|
||||||
|
Bind("/run/systemd", "/run/systemd", false, true).
|
||||||
|
Bind("/run/tmpfiles.d", "/run/tmpfiles.d", false, true).
|
||||||
|
Bind("/run/udev", "/run/udev", false, true).
|
||||||
|
Bind("/run/udisks2", "/run/udisks2", false, true).
|
||||||
|
Bind("/run/utmp", "/run/utmp", false, true).
|
||||||
|
Bind("/run/virtlogd.pid", "/run/virtlogd.pid", false, true).
|
||||||
|
Bind("/run/wrappers", "/run/wrappers", false, true).
|
||||||
|
Bind("/run/zed.pid", "/run/zed.pid", false, true).
|
||||||
|
Bind("/run/zed.state", "/run/zed.state", false, true).
|
||||||
|
Bind("/dev/dri", "/dev/dri", true, true, true).
|
||||||
|
Bind("/etc", "/fortify/etc").
|
||||||
|
Symlink("/fortify/etc/alsa", "/etc/alsa").
|
||||||
|
Symlink("/fortify/etc/bashrc", "/etc/bashrc").
|
||||||
|
Symlink("/fortify/etc/binfmt.d", "/etc/binfmt.d").
|
||||||
|
Symlink("/fortify/etc/dbus-1", "/etc/dbus-1").
|
||||||
|
Symlink("/fortify/etc/default", "/etc/default").
|
||||||
|
Symlink("/fortify/etc/ethertypes", "/etc/ethertypes").
|
||||||
|
Symlink("/fortify/etc/fonts", "/etc/fonts").
|
||||||
|
Symlink("/fortify/etc/fstab", "/etc/fstab").
|
||||||
|
Symlink("/fortify/etc/fuse.conf", "/etc/fuse.conf").
|
||||||
|
Symlink("/fortify/etc/host.conf", "/etc/host.conf").
|
||||||
|
Symlink("/fortify/etc/hostid", "/etc/hostid").
|
||||||
|
Symlink("/fortify/etc/hostname", "/etc/hostname").
|
||||||
|
Symlink("/fortify/etc/hostname.CHECKSUM", "/etc/hostname.CHECKSUM").
|
||||||
|
Symlink("/fortify/etc/hosts", "/etc/hosts").
|
||||||
|
Symlink("/fortify/etc/inputrc", "/etc/inputrc").
|
||||||
|
Symlink("/fortify/etc/ipsec.d", "/etc/ipsec.d").
|
||||||
|
Symlink("/fortify/etc/issue", "/etc/issue").
|
||||||
|
Symlink("/fortify/etc/kbd", "/etc/kbd").
|
||||||
|
Symlink("/fortify/etc/libblockdev", "/etc/libblockdev").
|
||||||
|
Symlink("/fortify/etc/locale.conf", "/etc/locale.conf").
|
||||||
|
Symlink("/fortify/etc/localtime", "/etc/localtime").
|
||||||
|
Symlink("/fortify/etc/login.defs", "/etc/login.defs").
|
||||||
|
Symlink("/fortify/etc/lsb-release", "/etc/lsb-release").
|
||||||
|
Symlink("/fortify/etc/lvm", "/etc/lvm").
|
||||||
|
Symlink("/fortify/etc/machine-id", "/etc/machine-id").
|
||||||
|
Symlink("/fortify/etc/man_db.conf", "/etc/man_db.conf").
|
||||||
|
Symlink("/fortify/etc/modprobe.d", "/etc/modprobe.d").
|
||||||
|
Symlink("/fortify/etc/modules-load.d", "/etc/modules-load.d").
|
||||||
|
Symlink("/proc/mounts", "/etc/mtab").
|
||||||
|
Symlink("/fortify/etc/nanorc", "/etc/nanorc").
|
||||||
|
Symlink("/fortify/etc/netgroup", "/etc/netgroup").
|
||||||
|
Symlink("/fortify/etc/NetworkManager", "/etc/NetworkManager").
|
||||||
|
Symlink("/fortify/etc/nix", "/etc/nix").
|
||||||
|
Symlink("/fortify/etc/nixos", "/etc/nixos").
|
||||||
|
Symlink("/fortify/etc/NIXOS", "/etc/NIXOS").
|
||||||
|
Symlink("/fortify/etc/nscd.conf", "/etc/nscd.conf").
|
||||||
|
Symlink("/fortify/etc/nsswitch.conf", "/etc/nsswitch.conf").
|
||||||
|
Symlink("/fortify/etc/opensnitchd", "/etc/opensnitchd").
|
||||||
|
Symlink("/fortify/etc/os-release", "/etc/os-release").
|
||||||
|
Symlink("/fortify/etc/pam", "/etc/pam").
|
||||||
|
Symlink("/fortify/etc/pam.d", "/etc/pam.d").
|
||||||
|
Symlink("/fortify/etc/pipewire", "/etc/pipewire").
|
||||||
|
Symlink("/fortify/etc/pki", "/etc/pki").
|
||||||
|
Symlink("/fortify/etc/polkit-1", "/etc/polkit-1").
|
||||||
|
Symlink("/fortify/etc/profile", "/etc/profile").
|
||||||
|
Symlink("/fortify/etc/protocols", "/etc/protocols").
|
||||||
|
Symlink("/fortify/etc/qemu", "/etc/qemu").
|
||||||
|
Symlink("/fortify/etc/resolv.conf", "/etc/resolv.conf").
|
||||||
|
Symlink("/fortify/etc/resolvconf.conf", "/etc/resolvconf.conf").
|
||||||
|
Symlink("/fortify/etc/rpc", "/etc/rpc").
|
||||||
|
Symlink("/fortify/etc/samba", "/etc/samba").
|
||||||
|
Symlink("/fortify/etc/sddm.conf", "/etc/sddm.conf").
|
||||||
|
Symlink("/fortify/etc/secureboot", "/etc/secureboot").
|
||||||
|
Symlink("/fortify/etc/services", "/etc/services").
|
||||||
|
Symlink("/fortify/etc/set-environment", "/etc/set-environment").
|
||||||
|
Symlink("/fortify/etc/shadow", "/etc/shadow").
|
||||||
|
Symlink("/fortify/etc/shells", "/etc/shells").
|
||||||
|
Symlink("/fortify/etc/ssh", "/etc/ssh").
|
||||||
|
Symlink("/fortify/etc/ssl", "/etc/ssl").
|
||||||
|
Symlink("/fortify/etc/static", "/etc/static").
|
||||||
|
Symlink("/fortify/etc/subgid", "/etc/subgid").
|
||||||
|
Symlink("/fortify/etc/subuid", "/etc/subuid").
|
||||||
|
Symlink("/fortify/etc/sudoers", "/etc/sudoers").
|
||||||
|
Symlink("/fortify/etc/sysctl.d", "/etc/sysctl.d").
|
||||||
|
Symlink("/fortify/etc/systemd", "/etc/systemd").
|
||||||
|
Symlink("/fortify/etc/terminfo", "/etc/terminfo").
|
||||||
|
Symlink("/fortify/etc/tmpfiles.d", "/etc/tmpfiles.d").
|
||||||
|
Symlink("/fortify/etc/udev", "/etc/udev").
|
||||||
|
Symlink("/fortify/etc/udisks2", "/etc/udisks2").
|
||||||
|
Symlink("/fortify/etc/UPower", "/etc/UPower").
|
||||||
|
Symlink("/fortify/etc/vconsole.conf", "/etc/vconsole.conf").
|
||||||
|
Symlink("/fortify/etc/X11", "/etc/X11").
|
||||||
|
Symlink("/fortify/etc/zfs", "/etc/zfs").
|
||||||
|
Symlink("/fortify/etc/zinputrc", "/etc/zinputrc").
|
||||||
|
Symlink("/fortify/etc/zoneinfo", "/etc/zoneinfo").
|
||||||
|
Symlink("/fortify/etc/zprofile", "/etc/zprofile").
|
||||||
|
Symlink("/fortify/etc/zshenv", "/etc/zshenv").
|
||||||
|
Symlink("/fortify/etc/zshrc", "/etc/zshrc").
|
||||||
|
Bind("/tmp/fortify.1971/tmpdir/9", "/tmp", false, true).
|
||||||
|
Tmpfs("/tmp/fortify.1971", 1048576).
|
||||||
|
Tmpfs("/run/user", 1048576).
|
||||||
|
Tmpfs("/run/user/65534", 8388608).
|
||||||
|
Bind("/home/chronos", "/home/chronos", false, true).
|
||||||
|
Bind("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/passwd", "/etc/passwd").
|
||||||
|
Bind("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/group", "/etc/group").
|
||||||
|
Bind("/tmp/fortify.1971/wayland/ebf083d1b175911782d413369b64ce7c", "/run/user/65534/wayland-0").
|
||||||
|
Bind("/run/user/1971/fortify/ebf083d1b175911782d413369b64ce7c/pulse", "/run/user/65534/pulse/native").
|
||||||
|
Bind("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/pulse-cookie", "/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/pulse-cookie").
|
||||||
|
Bind("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/bus", "/run/user/65534/bus").
|
||||||
|
Bind("/tmp/fortify.1971/ebf083d1b175911782d413369b64ce7c/system_bus_socket", "/run/dbus/system_bus_socket").
|
||||||
|
Tmpfs("/var/run/nscd", 8192),
|
||||||
|
},
|
||||||
|
}
|
153
internal/app/app_stub_test.go
Normal file
153
internal/app/app_stub_test.go
Normal file
@ -0,0 +1,153 @@
|
|||||||
|
package app_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/fs"
|
||||||
|
"os/user"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
|
)
|
||||||
|
|
||||||
|
// fs methods are not implemented using a real FS
|
||||||
|
// to help better understand filesystem access behaviour
|
||||||
|
type stubNixOS struct {
|
||||||
|
lookPathErr map[string]error
|
||||||
|
usernameErr map[string]error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) Geteuid() int {
|
||||||
|
return 1971
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) LookupEnv(key string) (string, bool) {
|
||||||
|
switch key {
|
||||||
|
case "SHELL":
|
||||||
|
return "/run/current-system/sw/bin/zsh", true
|
||||||
|
case "TERM":
|
||||||
|
return "xterm-256color", true
|
||||||
|
case "WAYLAND_DISPLAY":
|
||||||
|
return "wayland-0", true
|
||||||
|
case "PULSE_COOKIE":
|
||||||
|
return "", false
|
||||||
|
case "HOME":
|
||||||
|
return "/home/ophestra", true
|
||||||
|
case "XDG_CONFIG_HOME":
|
||||||
|
return "/home/ophestra/xdg/config", true
|
||||||
|
default:
|
||||||
|
panic(fmt.Sprintf("attempted to access unexpected environment variable %q", key))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) TempDir() string {
|
||||||
|
return "/tmp"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) LookPath(file string) (string, error) {
|
||||||
|
if s.lookPathErr != nil {
|
||||||
|
if err, ok := s.lookPathErr[file]; ok {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
switch file {
|
||||||
|
case "sudo":
|
||||||
|
return "/run/wrappers/bin/sudo", nil
|
||||||
|
case "machinectl":
|
||||||
|
return "/home/ophestra/.nix-profile/bin/machinectl", nil
|
||||||
|
default:
|
||||||
|
panic(fmt.Sprintf("attempted to look up unexpected executable %q", file))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) Executable() (string, error) {
|
||||||
|
return "/home/ophestra/.nix-profile/bin/fortify", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) LookupGroup(name string) (*user.Group, error) {
|
||||||
|
switch name {
|
||||||
|
case "video":
|
||||||
|
return &user.Group{Gid: "26", Name: "video"}, nil
|
||||||
|
default:
|
||||||
|
return nil, user.UnknownGroupError(name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) ReadDir(name string) ([]fs.DirEntry, error) {
|
||||||
|
switch name {
|
||||||
|
case "/":
|
||||||
|
return stubDirEntries("bin", "boot", "dev", "etc", "home", "lib",
|
||||||
|
"lib64", "nix", "proc", "root", "run", "srv", "sys", "tmp", "usr", "var")
|
||||||
|
case "/run":
|
||||||
|
return stubDirEntries("agetty.reload", "binfmt", "booted-system",
|
||||||
|
"credentials", "cryptsetup", "current-system", "dbus", "host", "keys",
|
||||||
|
"libvirt", "libvirtd.pid", "lock", "log", "lvm", "mount", "NetworkManager",
|
||||||
|
"nginx", "nixos", "nscd", "opengl-driver", "pppd", "resolvconf", "sddm",
|
||||||
|
"store", "syncoid", "system", "systemd", "tmpfiles.d", "udev", "udisks2",
|
||||||
|
"user", "utmp", "virtlogd.pid", "wrappers", "zed.pid", "zed.state")
|
||||||
|
case "/etc":
|
||||||
|
return stubDirEntries("alsa", "bashrc", "binfmt.d", "dbus-1", "default",
|
||||||
|
"ethertypes", "fonts", "fstab", "fuse.conf", "group", "host.conf", "hostid",
|
||||||
|
"hostname", "hostname.CHECKSUM", "hosts", "inputrc", "ipsec.d", "issue", "kbd",
|
||||||
|
"libblockdev", "locale.conf", "localtime", "login.defs", "lsb-release", "lvm",
|
||||||
|
"machine-id", "man_db.conf", "modprobe.d", "modules-load.d", "mtab", "nanorc",
|
||||||
|
"netgroup", "NetworkManager", "nix", "nixos", "NIXOS", "nscd.conf", "nsswitch.conf",
|
||||||
|
"opensnitchd", "os-release", "pam", "pam.d", "passwd", "pipewire", "pki", "polkit-1",
|
||||||
|
"profile", "protocols", "qemu", "resolv.conf", "resolvconf.conf", "rpc", "samba",
|
||||||
|
"sddm.conf", "secureboot", "services", "set-environment", "shadow", "shells", "ssh",
|
||||||
|
"ssl", "static", "subgid", "subuid", "sudoers", "sysctl.d", "systemd", "terminfo",
|
||||||
|
"tmpfiles.d", "udev", "udisks2", "UPower", "vconsole.conf", "X11", "zfs", "zinputrc",
|
||||||
|
"zoneinfo", "zprofile", "zshenv", "zshrc")
|
||||||
|
default:
|
||||||
|
panic(fmt.Sprintf("attempted to read unexpected directory %q", name))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) Stat(name string) (fs.FileInfo, error) {
|
||||||
|
switch name {
|
||||||
|
case "/var/run/nscd":
|
||||||
|
return nil, nil
|
||||||
|
case "/run/user/1971/pulse":
|
||||||
|
return nil, nil
|
||||||
|
case "/run/user/1971/pulse/native":
|
||||||
|
return stubFileInfoMode(0666), nil
|
||||||
|
case "/home/ophestra/.pulse-cookie":
|
||||||
|
return stubFileInfoIsDir(true), nil
|
||||||
|
case "/home/ophestra/xdg/config/pulse/cookie":
|
||||||
|
return stubFileInfoIsDir(false), nil
|
||||||
|
default:
|
||||||
|
panic(fmt.Sprintf("attempted to stat unexpected path %q", name))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) Open(name string) (fs.File, error) {
|
||||||
|
switch name {
|
||||||
|
default:
|
||||||
|
panic(fmt.Sprintf("attempted to open unexpected file %q", name))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) Exit(code int) {
|
||||||
|
panic("called exit on stub with code " + strconv.Itoa(code))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) Stdout() io.Writer {
|
||||||
|
panic("requested stdout")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) Paths() linux.Paths {
|
||||||
|
return linux.Paths{
|
||||||
|
SharePath: "/tmp/fortify.1971",
|
||||||
|
RuntimePath: "/run/user/1971",
|
||||||
|
RunDirPath: "/run/user/1971/fortify",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) Uid(aid int) (int, error) {
|
||||||
|
return 1000000 + 0*10000 + aid, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stubNixOS) SdBooted() bool {
|
||||||
|
return true
|
||||||
|
}
|
135
internal/app/app_test.go
Normal file
135
internal/app/app_test.go
Normal file
@ -0,0 +1,135 @@
|
|||||||
|
package app_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io/fs"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/fst"
|
||||||
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/app"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
|
)
|
||||||
|
|
||||||
|
type sealTestCase struct {
|
||||||
|
name string
|
||||||
|
os linux.System
|
||||||
|
config *fst.Config
|
||||||
|
id fst.ID
|
||||||
|
wantSys *system.I
|
||||||
|
wantBwrap *bwrap.Config
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestApp(t *testing.T) {
|
||||||
|
testCases := append(testCasesPd, testCasesNixos...)
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
a := app.NewWithID(tc.id, tc.os)
|
||||||
|
|
||||||
|
if !t.Run("seal", func(t *testing.T) {
|
||||||
|
if err := a.Seal(tc.config); err != nil {
|
||||||
|
t.Errorf("Seal: error = %v", err)
|
||||||
|
}
|
||||||
|
}) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
gotSys, gotBwrap := app.AppSystemBwrap(a)
|
||||||
|
|
||||||
|
t.Run("compare sys", func(t *testing.T) {
|
||||||
|
if !gotSys.Equal(tc.wantSys) {
|
||||||
|
t.Errorf("Seal: sys = %#v, want %#v",
|
||||||
|
gotSys, tc.wantSys)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("compare bwrap", func(t *testing.T) {
|
||||||
|
if !reflect.DeepEqual(gotBwrap, tc.wantBwrap) {
|
||||||
|
t.Errorf("seal: bwrap = %#v, want %#v",
|
||||||
|
gotBwrap, tc.wantBwrap)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func stubDirEntries(names ...string) (e []fs.DirEntry, err error) {
|
||||||
|
e = make([]fs.DirEntry, len(names))
|
||||||
|
for i, name := range names {
|
||||||
|
e[i] = stubDirEntryPath(name)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
type stubDirEntryPath string
|
||||||
|
|
||||||
|
func (p stubDirEntryPath) Name() string {
|
||||||
|
return string(p)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p stubDirEntryPath) IsDir() bool {
|
||||||
|
panic("attempted to call IsDir")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p stubDirEntryPath) Type() fs.FileMode {
|
||||||
|
panic("attempted to call Type")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p stubDirEntryPath) Info() (fs.FileInfo, error) {
|
||||||
|
panic("attempted to call Info")
|
||||||
|
}
|
||||||
|
|
||||||
|
type stubFileInfoMode fs.FileMode
|
||||||
|
|
||||||
|
func (s stubFileInfoMode) Name() string {
|
||||||
|
panic("attempted to call Name")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoMode) Size() int64 {
|
||||||
|
panic("attempted to call Size")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoMode) Mode() fs.FileMode {
|
||||||
|
return fs.FileMode(s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoMode) ModTime() time.Time {
|
||||||
|
panic("attempted to call ModTime")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoMode) IsDir() bool {
|
||||||
|
panic("attempted to call IsDir")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoMode) Sys() any {
|
||||||
|
panic("attempted to call Sys")
|
||||||
|
}
|
||||||
|
|
||||||
|
type stubFileInfoIsDir bool
|
||||||
|
|
||||||
|
func (s stubFileInfoIsDir) Name() string {
|
||||||
|
panic("attempted to call Name")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoIsDir) Size() int64 {
|
||||||
|
panic("attempted to call Size")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoIsDir) Mode() fs.FileMode {
|
||||||
|
panic("attempted to call Mode")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoIsDir) ModTime() time.Time {
|
||||||
|
panic("attempted to call ModTime")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoIsDir) IsDir() bool {
|
||||||
|
return bool(s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s stubFileInfoIsDir) Sys() any {
|
||||||
|
panic("attempted to call Sys")
|
||||||
|
}
|
@ -1,33 +0,0 @@
|
|||||||
package app
|
|
||||||
|
|
||||||
import (
|
|
||||||
"io"
|
|
||||||
"os"
|
|
||||||
)
|
|
||||||
|
|
||||||
func copyFile(dst, src string) error {
|
|
||||||
srcD, err := os.Open(src)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer func() {
|
|
||||||
if srcD.Close() != nil {
|
|
||||||
// unreachable
|
|
||||||
panic("src file closed prematurely")
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
dstD, err := os.OpenFile(dst, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer func() {
|
|
||||||
if dstD.Close() != nil {
|
|
||||||
// unreachable
|
|
||||||
panic("dst file closed prematurely")
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
_, err = io.Copy(dstD, srcD)
|
|
||||||
return err
|
|
||||||
}
|
|
20
internal/app/export_test.go
Normal file
20
internal/app/export_test.go
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
package app
|
||||||
|
|
||||||
|
import (
|
||||||
|
"git.gensokyo.uk/security/fortify/fst"
|
||||||
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
|
)
|
||||||
|
|
||||||
|
func NewWithID(id fst.ID, os linux.System) App {
|
||||||
|
a := new(app)
|
||||||
|
a.id = &id
|
||||||
|
a.os = os
|
||||||
|
return a
|
||||||
|
}
|
||||||
|
|
||||||
|
func AppSystemBwrap(a App) (*system.I, *bwrap.Config) {
|
||||||
|
v := a.(*app)
|
||||||
|
return v.seal.sys.I, v.seal.sys.bwrap
|
||||||
|
}
|
@ -1,18 +0,0 @@
|
|||||||
package app
|
|
||||||
|
|
||||||
import (
|
|
||||||
"crypto/rand"
|
|
||||||
"encoding/hex"
|
|
||||||
)
|
|
||||||
|
|
||||||
type appID [16]byte
|
|
||||||
|
|
||||||
func (a *appID) String() string {
|
|
||||||
return hex.EncodeToString(a[:])
|
|
||||||
}
|
|
||||||
|
|
||||||
func newAppID() (*appID, error) {
|
|
||||||
a := &appID{}
|
|
||||||
_, err := rand.Read(a[:])
|
|
||||||
return a, err
|
|
||||||
}
|
|
@ -1,67 +0,0 @@
|
|||||||
package app
|
|
||||||
|
|
||||||
import (
|
|
||||||
"os/exec"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (a *app) commandBuilderMachineCtl(shimEnv string) (args []string) {
|
|
||||||
args = make([]string, 0, 9+len(a.seal.sys.bwrap.SetEnv))
|
|
||||||
|
|
||||||
// shell --uid=$USER
|
|
||||||
args = append(args, "shell", "--uid="+a.seal.sys.Username)
|
|
||||||
|
|
||||||
// --quiet
|
|
||||||
if !verbose.Get() {
|
|
||||||
args = append(args, "--quiet")
|
|
||||||
}
|
|
||||||
|
|
||||||
// environ
|
|
||||||
envQ := make([]string, 0, len(a.seal.sys.bwrap.SetEnv)+1)
|
|
||||||
for k, v := range a.seal.sys.bwrap.SetEnv {
|
|
||||||
envQ = append(envQ, "-E"+k+"="+v)
|
|
||||||
}
|
|
||||||
// add shim payload to environment for shim path
|
|
||||||
envQ = append(envQ, "-E"+shimEnv)
|
|
||||||
args = append(args, envQ...)
|
|
||||||
|
|
||||||
// -- .host
|
|
||||||
args = append(args, "--", ".host")
|
|
||||||
|
|
||||||
// /bin/sh -c
|
|
||||||
if sh, err := exec.LookPath("sh"); err != nil {
|
|
||||||
// hardcode /bin/sh path since it exists more often than not
|
|
||||||
args = append(args, "/bin/sh", "-c")
|
|
||||||
} else {
|
|
||||||
args = append(args, sh, "-c")
|
|
||||||
}
|
|
||||||
|
|
||||||
// build inner command expression ran as target user
|
|
||||||
innerCommand := strings.Builder{}
|
|
||||||
|
|
||||||
// apply custom environment variables to activation environment
|
|
||||||
innerCommand.WriteString("dbus-update-activation-environment --systemd")
|
|
||||||
for k := range a.seal.sys.bwrap.SetEnv {
|
|
||||||
innerCommand.WriteString(" " + k)
|
|
||||||
}
|
|
||||||
innerCommand.WriteString("; ")
|
|
||||||
|
|
||||||
// override message bus address if enabled
|
|
||||||
if a.seal.et.Has(state.EnableDBus) {
|
|
||||||
innerCommand.WriteString(dbusSessionBusAddress + "=" + "'" + "unix:path=" + a.seal.sys.dbusAddr[0][1] + "' ")
|
|
||||||
if a.seal.sys.dbusSystem {
|
|
||||||
innerCommand.WriteString(dbusSystemBusAddress + "=" + "'" + "unix:path=" + a.seal.sys.dbusAddr[1][1] + "' ")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// launch fortify as shim
|
|
||||||
innerCommand.WriteString("exec " + a.seal.sys.executable + " shim")
|
|
||||||
|
|
||||||
// append inner command
|
|
||||||
args = append(args, innerCommand.String())
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
@ -1,32 +0,0 @@
|
|||||||
package app
|
|
||||||
|
|
||||||
import (
|
|
||||||
"os"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
sudoAskPass = "SUDO_ASKPASS"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (a *app) commandBuilderSudo(shimEnv string) (args []string) {
|
|
||||||
args = make([]string, 0, 8)
|
|
||||||
|
|
||||||
// -Hiu $USER
|
|
||||||
args = append(args, "-Hiu", a.seal.sys.Username)
|
|
||||||
|
|
||||||
// -A?
|
|
||||||
if _, ok := os.LookupEnv(sudoAskPass); ok {
|
|
||||||
verbose.Printf("%s set, adding askpass flag\n", sudoAskPass)
|
|
||||||
args = append(args, "-A")
|
|
||||||
}
|
|
||||||
|
|
||||||
// shim payload
|
|
||||||
args = append(args, shimEnv)
|
|
||||||
|
|
||||||
// -- $@
|
|
||||||
args = append(args, "--", a.seal.sys.executable, "shim")
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
@ -2,42 +2,65 @@ package app
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"os"
|
"fmt"
|
||||||
"os/exec"
|
"io/fs"
|
||||||
"os/user"
|
|
||||||
"path"
|
"path"
|
||||||
|
"regexp"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/dbus"
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
"git.gensokyo.uk/security/fortify/fst"
|
||||||
"git.ophivana.moe/cat/fortify/internal"
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
"git.gensokyo.uk/security/fortify/internal/state"
|
||||||
)
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
|
|
||||||
const (
|
|
||||||
LaunchMethodSudo uint8 = iota
|
|
||||||
LaunchMethodMachineCtl
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
ErrConfig = errors.New("no configuration to seal")
|
ErrConfig = errors.New("no configuration to seal")
|
||||||
ErrUser = errors.New("unknown user")
|
ErrUser = errors.New("invalid aid")
|
||||||
ErrLaunch = errors.New("invalid launch method")
|
ErrHome = errors.New("invalid home directory")
|
||||||
|
ErrName = errors.New("invalid username")
|
||||||
ErrSudo = errors.New("sudo not available")
|
|
||||||
ErrSystemd = errors.New("systemd not available")
|
|
||||||
ErrMachineCtl = errors.New("machinectl not available")
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type (
|
var posixUsername = regexp.MustCompilePOSIX("^[a-z_]([A-Za-z0-9_-]{0,31}|[A-Za-z0-9_-]{0,30}\\$)$")
|
||||||
SealConfigError BaseError
|
|
||||||
LauncherLookupError BaseError
|
// appSeal seals the application with child-related information
|
||||||
SecurityError BaseError
|
type appSeal struct {
|
||||||
)
|
// app unique ID string representation
|
||||||
|
id string
|
||||||
|
// dbus proxy message buffer retriever
|
||||||
|
dbusMsg func(f func(msgbuf []string))
|
||||||
|
|
||||||
|
// freedesktop application ID
|
||||||
|
fid string
|
||||||
|
// argv to start process with in the final confined environment
|
||||||
|
command []string
|
||||||
|
// persistent process state store
|
||||||
|
store state.Store
|
||||||
|
|
||||||
|
// process-specific share directory path
|
||||||
|
share string
|
||||||
|
// process-specific share directory path local to XDG_RUNTIME_DIR
|
||||||
|
shareLocal string
|
||||||
|
|
||||||
|
// pass-through enablement tracking from config
|
||||||
|
et system.Enablements
|
||||||
|
// wayland socket direct access
|
||||||
|
directWayland bool
|
||||||
|
|
||||||
|
// prevents sharing from happening twice
|
||||||
|
shared bool
|
||||||
|
// seal system-level component
|
||||||
|
sys *appSealSys
|
||||||
|
|
||||||
|
linux.Paths
|
||||||
|
|
||||||
|
// protected by upstream mutex
|
||||||
|
}
|
||||||
|
|
||||||
// Seal seals the app launch context
|
// Seal seals the app launch context
|
||||||
func (a *app) Seal(config *Config) error {
|
func (a *app) Seal(config *fst.Config) error {
|
||||||
a.lock.Lock()
|
a.lock.Lock()
|
||||||
defer a.lock.Unlock()
|
defer a.lock.Unlock()
|
||||||
|
|
||||||
@ -46,108 +69,117 @@ func (a *app) Seal(config *Config) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if config == nil {
|
if config == nil {
|
||||||
return (*SealConfigError)(wrapError(ErrConfig, "attempted to seal app with nil config"))
|
return fmsg.WrapError(ErrConfig,
|
||||||
|
"attempted to seal app with nil config")
|
||||||
}
|
}
|
||||||
|
|
||||||
// create seal
|
// create seal
|
||||||
seal := new(appSeal)
|
seal := new(appSeal)
|
||||||
|
|
||||||
// generate application ID
|
|
||||||
if id, err := newAppID(); err != nil {
|
|
||||||
return (*SecurityError)(wrapError(err, "cannot generate application ID:", err))
|
|
||||||
} else {
|
|
||||||
seal.id = id
|
|
||||||
}
|
|
||||||
|
|
||||||
// fetch system constants
|
// fetch system constants
|
||||||
seal.SystemConstants = internal.GetSC()
|
seal.Paths = a.os.Paths()
|
||||||
|
|
||||||
// pass through config values
|
// pass through config values
|
||||||
|
seal.id = a.id.String()
|
||||||
seal.fid = config.ID
|
seal.fid = config.ID
|
||||||
seal.command = config.Command
|
seal.command = config.Command
|
||||||
|
|
||||||
// parses launch method text and looks up tool path
|
|
||||||
switch config.Method {
|
|
||||||
case "sudo":
|
|
||||||
seal.launchOption = LaunchMethodSudo
|
|
||||||
if sudoPath, err := exec.LookPath("sudo"); err != nil {
|
|
||||||
return (*LauncherLookupError)(wrapError(ErrSudo, "sudo not found"))
|
|
||||||
} else {
|
|
||||||
seal.toolPath = sudoPath
|
|
||||||
}
|
|
||||||
case "systemd":
|
|
||||||
seal.launchOption = LaunchMethodMachineCtl
|
|
||||||
if !internal.SdBootedV {
|
|
||||||
return (*LauncherLookupError)(wrapError(ErrSystemd,
|
|
||||||
"system has not been booted with systemd as init system"))
|
|
||||||
}
|
|
||||||
|
|
||||||
if machineCtlPath, err := exec.LookPath("machinectl"); err != nil {
|
|
||||||
return (*LauncherLookupError)(wrapError(ErrMachineCtl, "machinectl not found"))
|
|
||||||
} else {
|
|
||||||
seal.toolPath = machineCtlPath
|
|
||||||
}
|
|
||||||
default:
|
|
||||||
return (*SealConfigError)(wrapError(ErrLaunch, "invalid launch method"))
|
|
||||||
}
|
|
||||||
|
|
||||||
// create seal system component
|
// create seal system component
|
||||||
seal.sys = new(appSealTx)
|
seal.sys = new(appSealSys)
|
||||||
|
|
||||||
// look up fortify executable path
|
// mapped uid
|
||||||
if p, err := os.Executable(); err != nil {
|
if config.Confinement.Sandbox != nil && config.Confinement.Sandbox.MapRealUID {
|
||||||
return (*LauncherLookupError)(wrapError(err, "cannot look up fortify executable path:", err))
|
seal.sys.mappedID = a.os.Geteuid()
|
||||||
} else {
|
} else {
|
||||||
seal.sys.executable = p
|
seal.sys.mappedID = 65534
|
||||||
}
|
}
|
||||||
|
seal.sys.mappedIDString = strconv.Itoa(seal.sys.mappedID)
|
||||||
|
seal.sys.runtime = path.Join("/run/user", seal.sys.mappedIDString)
|
||||||
|
|
||||||
// look up user from system
|
// validate uid and set user info
|
||||||
if u, err := user.Lookup(config.User); err != nil {
|
if config.Confinement.AppID < 0 || config.Confinement.AppID > 9999 {
|
||||||
if errors.As(err, new(user.UnknownUserError)) {
|
return fmsg.WrapError(ErrUser,
|
||||||
return (*SealConfigError)(wrapError(ErrUser, "unknown user", config.User))
|
fmt.Sprintf("aid %d out of range", config.Confinement.AppID))
|
||||||
} else {
|
|
||||||
// unreachable
|
|
||||||
panic(err)
|
|
||||||
}
|
|
||||||
} else {
|
} else {
|
||||||
seal.sys.User = u
|
seal.sys.user = appUser{
|
||||||
seal.sys.runtime = path.Join("/run/user", u.Uid)
|
aid: config.Confinement.AppID,
|
||||||
|
as: strconv.Itoa(config.Confinement.AppID),
|
||||||
|
data: config.Confinement.Outer,
|
||||||
|
home: config.Confinement.Inner,
|
||||||
|
username: config.Confinement.Username,
|
||||||
|
}
|
||||||
|
if seal.sys.user.username == "" {
|
||||||
|
seal.sys.user.username = "chronos"
|
||||||
|
} else if !posixUsername.MatchString(seal.sys.user.username) {
|
||||||
|
return fmsg.WrapError(ErrName,
|
||||||
|
fmt.Sprintf("invalid user name %q", seal.sys.user.username))
|
||||||
|
}
|
||||||
|
if seal.sys.user.data == "" || !path.IsAbs(seal.sys.user.data) {
|
||||||
|
return fmsg.WrapError(ErrHome,
|
||||||
|
fmt.Sprintf("invalid home directory %q", seal.sys.user.data))
|
||||||
|
}
|
||||||
|
if seal.sys.user.home == "" {
|
||||||
|
seal.sys.user.home = seal.sys.user.data
|
||||||
|
}
|
||||||
|
|
||||||
|
// invoke fsu for full uid
|
||||||
|
if u, err := a.os.Uid(seal.sys.user.aid); err != nil {
|
||||||
|
return fmsg.WrapErrorSuffix(err,
|
||||||
|
"cannot obtain uid from fsu:")
|
||||||
|
} else {
|
||||||
|
seal.sys.user.uid = u
|
||||||
|
seal.sys.user.us = strconv.Itoa(u)
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolve supplementary group ids from names
|
||||||
|
seal.sys.user.supp = make([]string, len(config.Confinement.Groups))
|
||||||
|
for i, name := range config.Confinement.Groups {
|
||||||
|
if g, err := a.os.LookupGroup(name); err != nil {
|
||||||
|
return fmsg.WrapError(err,
|
||||||
|
fmt.Sprintf("unknown group %q", name))
|
||||||
|
} else {
|
||||||
|
seal.sys.user.supp[i] = g.Gid
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// map sandbox config to bwrap
|
// map sandbox config to bwrap
|
||||||
if config.Confinement.Sandbox == nil {
|
if config.Confinement.Sandbox == nil {
|
||||||
verbose.Println("sandbox configuration not supplied, PROCEED WITH CAUTION")
|
fmsg.VPrintln("sandbox configuration not supplied, PROCEED WITH CAUTION")
|
||||||
|
|
||||||
// permissive defaults
|
// permissive defaults
|
||||||
conf := &SandboxConfig{
|
conf := &fst.SandboxConfig{
|
||||||
UserNS: true,
|
UserNS: true,
|
||||||
Net: true,
|
Net: true,
|
||||||
NoNewSession: true,
|
NoNewSession: true,
|
||||||
|
AutoEtc: true,
|
||||||
}
|
}
|
||||||
// bind entries in /
|
// bind entries in /
|
||||||
if d, err := os.ReadDir("/"); err != nil {
|
if d, err := a.os.ReadDir("/"); err != nil {
|
||||||
return err
|
return err
|
||||||
} else {
|
} else {
|
||||||
b := make([]*FilesystemConfig, 0, len(d))
|
b := make([]*fst.FilesystemConfig, 0, len(d))
|
||||||
for _, ent := range d {
|
for _, ent := range d {
|
||||||
name := ent.Name()
|
p := "/" + ent.Name()
|
||||||
switch name {
|
switch p {
|
||||||
case "proc":
|
case "/proc":
|
||||||
case "dev":
|
case "/dev":
|
||||||
case "run":
|
case "/run":
|
||||||
case "mnt":
|
case "/tmp":
|
||||||
|
case "/mnt":
|
||||||
|
case "/etc":
|
||||||
|
|
||||||
default:
|
default:
|
||||||
p := "/" + name
|
b = append(b, &fst.FilesystemConfig{Src: p, Write: true, Must: true})
|
||||||
b = append(b, &FilesystemConfig{Src: p, Write: true, Must: true})
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
conf.Filesystem = append(conf.Filesystem, b...)
|
conf.Filesystem = append(conf.Filesystem, b...)
|
||||||
}
|
}
|
||||||
// bind entries in /run
|
// bind entries in /run
|
||||||
if d, err := os.ReadDir("/run"); err != nil {
|
if d, err := a.os.ReadDir("/run"); err != nil {
|
||||||
return err
|
return err
|
||||||
} else {
|
} else {
|
||||||
b := make([]*FilesystemConfig, 0, len(d))
|
b := make([]*fst.FilesystemConfig, 0, len(d))
|
||||||
for _, ent := range d {
|
for _, ent := range d {
|
||||||
name := ent.Name()
|
name := ent.Name()
|
||||||
switch name {
|
switch name {
|
||||||
@ -155,62 +187,56 @@ func (a *app) Seal(config *Config) error {
|
|||||||
case "dbus":
|
case "dbus":
|
||||||
default:
|
default:
|
||||||
p := "/run/" + name
|
p := "/run/" + name
|
||||||
b = append(b, &FilesystemConfig{Src: p, Write: true, Must: true})
|
b = append(b, &fst.FilesystemConfig{Src: p, Write: true, Must: true})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
conf.Filesystem = append(conf.Filesystem, b...)
|
conf.Filesystem = append(conf.Filesystem, b...)
|
||||||
}
|
}
|
||||||
// hide nscd from sandbox if present
|
// hide nscd from sandbox if present
|
||||||
nscd := "/var/run/nscd"
|
nscd := "/var/run/nscd"
|
||||||
if _, err := os.Stat(nscd); !errors.Is(err, os.ErrNotExist) {
|
if _, err := a.os.Stat(nscd); !errors.Is(err, fs.ErrNotExist) {
|
||||||
conf.Tmpfs = append(conf.Tmpfs, bwrap.TmpfsConfig{Size: 8 * 1024, Dir: nscd})
|
conf.Override = append(conf.Override, nscd)
|
||||||
}
|
}
|
||||||
// bind GPU stuff
|
// bind GPU stuff
|
||||||
if config.Confinement.Enablements.Has(state.EnableX) || config.Confinement.Enablements.Has(state.EnableWayland) {
|
if config.Confinement.Enablements.Has(system.EX11) || config.Confinement.Enablements.Has(system.EWayland) {
|
||||||
conf.Filesystem = append(conf.Filesystem, &FilesystemConfig{Src: "/dev/dri", Device: true})
|
conf.Filesystem = append(conf.Filesystem, &fst.FilesystemConfig{Src: "/dev/dri", Device: true})
|
||||||
}
|
}
|
||||||
|
|
||||||
config.Confinement.Sandbox = conf
|
config.Confinement.Sandbox = conf
|
||||||
}
|
}
|
||||||
seal.sys.bwrap = config.Confinement.Sandbox.Bwrap()
|
seal.directWayland = config.Confinement.Sandbox.DirectWayland
|
||||||
|
if b, err := config.Confinement.Sandbox.Bwrap(a.os); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
seal.sys.bwrap = b
|
||||||
|
}
|
||||||
|
seal.sys.override = config.Confinement.Sandbox.Override
|
||||||
if seal.sys.bwrap.SetEnv == nil {
|
if seal.sys.bwrap.SetEnv == nil {
|
||||||
seal.sys.bwrap.SetEnv = make(map[string]string)
|
seal.sys.bwrap.SetEnv = make(map[string]string)
|
||||||
}
|
}
|
||||||
|
|
||||||
// create wayland client wait channel if mediated wayland is enabled
|
|
||||||
// this channel being set enables mediated wayland setup later on
|
|
||||||
if config.Confinement.Sandbox.Wayland {
|
|
||||||
seal.wlDone = make(chan struct{})
|
|
||||||
}
|
|
||||||
|
|
||||||
// open process state store
|
// open process state store
|
||||||
// the simple store only starts holding an open file after first action
|
// the simple store only starts holding an open file after first action
|
||||||
// store activity begins after Start is called and must end before Wait
|
// store activity begins after Start is called and must end before Wait
|
||||||
seal.store = state.NewSimple(seal.SystemConstants.RunDirPath, seal.sys.Uid)
|
seal.store = state.NewMulti(seal.RunDirPath)
|
||||||
|
|
||||||
// parse string UID
|
// initialise system interface with full uid
|
||||||
if u, err := strconv.Atoi(seal.sys.Uid); err != nil {
|
seal.sys.I = system.New(seal.sys.user.uid)
|
||||||
// unreachable unless kernel bug
|
|
||||||
panic("uid parse")
|
|
||||||
} else {
|
|
||||||
seal.sys.uid = u
|
|
||||||
}
|
|
||||||
|
|
||||||
// pass through enablements
|
// pass through enablements
|
||||||
seal.et = config.Confinement.Enablements
|
seal.et = config.Confinement.Enablements
|
||||||
|
|
||||||
// this method calls all share methods in sequence
|
// this method calls all share methods in sequence
|
||||||
if err := seal.shareAll([2]*dbus.Config{config.Confinement.SessionBus, config.Confinement.SystemBus}); err != nil {
|
if err := seal.shareAll([2]*dbus.Config{config.Confinement.SessionBus, config.Confinement.SystemBus}, a.os); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
// verbose log seal information
|
// verbose log seal information
|
||||||
verbose.Println("created application seal as user",
|
fmsg.VPrintf("created application seal for uid %s (%s) groups: %v, command: %s",
|
||||||
seal.sys.Username, "("+seal.sys.Uid+"),",
|
seal.sys.user.us, seal.sys.user.username, config.Confinement.Groups, config.Command)
|
||||||
"method:", config.Method+",",
|
|
||||||
"launcher:", seal.toolPath+",",
|
|
||||||
"command:", config.Command)
|
|
||||||
|
|
||||||
// seal app and release lock
|
// seal app and release lock
|
||||||
a.seal = seal
|
a.seal = seal
|
||||||
|
a.ct = newAppCt(config)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -1,15 +1,11 @@
|
|||||||
package app
|
package app
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
"path"
|
"path"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/acl"
|
"git.gensokyo.uk/security/fortify/acl"
|
||||||
"git.ophivana.moe/cat/fortify/dbus"
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -17,122 +13,32 @@ const (
|
|||||||
dbusSystemBusAddress = "DBUS_SYSTEM_BUS_ADDRESS"
|
dbusSystemBusAddress = "DBUS_SYSTEM_BUS_ADDRESS"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
|
||||||
ErrDBusConfig = errors.New("dbus config not supplied")
|
|
||||||
)
|
|
||||||
|
|
||||||
type (
|
|
||||||
SealDBusError BaseError
|
|
||||||
LookupDBusError BaseError
|
|
||||||
StartDBusError BaseError
|
|
||||||
CloseDBusError BaseError
|
|
||||||
)
|
|
||||||
|
|
||||||
func (seal *appSeal) shareDBus(config [2]*dbus.Config) error {
|
func (seal *appSeal) shareDBus(config [2]*dbus.Config) error {
|
||||||
if !seal.et.Has(state.EnableDBus) {
|
if !seal.et.Has(system.EDBus) {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// session bus is mandatory
|
|
||||||
if config[0] == nil {
|
|
||||||
return (*SealDBusError)(wrapError(ErrDBusConfig, "attempted to seal session bus proxy with nil config"))
|
|
||||||
}
|
|
||||||
|
|
||||||
// system bus is optional
|
|
||||||
seal.sys.dbusSystem = config[1] != nil
|
|
||||||
|
|
||||||
// upstream address, downstream socket path
|
|
||||||
var sessionBus, systemBus [2]string
|
|
||||||
|
|
||||||
// downstream socket paths
|
// downstream socket paths
|
||||||
sessionBus[1] = path.Join(seal.share, "bus")
|
sessionPath, systemPath := path.Join(seal.share, "bus"), path.Join(seal.share, "system_bus_socket")
|
||||||
systemBus[1] = path.Join(seal.share, "system_bus_socket")
|
|
||||||
|
|
||||||
// resolve upstream bus addresses
|
// configure dbus proxy
|
||||||
sessionBus[0], systemBus[0] = dbus.Address()
|
if f, err := seal.sys.ProxyDBus(config[0], config[1], sessionPath, systemPath); err != nil {
|
||||||
|
return err
|
||||||
// create proxy instance
|
} else {
|
||||||
seal.sys.dbus = dbus.New(sessionBus, systemBus)
|
seal.dbusMsg = f
|
||||||
|
|
||||||
// seal dbus proxy
|
|
||||||
if err := seal.sys.dbus.Seal(config[0], config[1]); err != nil {
|
|
||||||
return (*SealDBusError)(wrapError(err, "cannot seal message bus proxy:", err))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// store addresses for cleanup and logging
|
|
||||||
seal.sys.dbusAddr = &[2][2]string{sessionBus, systemBus}
|
|
||||||
|
|
||||||
// share proxy sockets
|
// share proxy sockets
|
||||||
sessionInner := path.Join(seal.sys.runtime, "bus")
|
sessionInner := path.Join(seal.sys.runtime, "bus")
|
||||||
seal.sys.setEnv(dbusSessionBusAddress, "unix:path="+sessionInner)
|
seal.sys.bwrap.SetEnv[dbusSessionBusAddress] = "unix:path=" + sessionInner
|
||||||
seal.sys.bind(sessionBus[1], sessionInner, true)
|
seal.sys.bwrap.Bind(sessionPath, sessionInner)
|
||||||
seal.sys.updatePerm(sessionBus[1], acl.Read, acl.Write)
|
seal.sys.UpdatePerm(sessionPath, acl.Read, acl.Write)
|
||||||
if seal.sys.dbusSystem {
|
if config[1] != nil {
|
||||||
systemInner := "/run/dbus/system_bus_socket"
|
systemInner := "/run/dbus/system_bus_socket"
|
||||||
seal.sys.setEnv(dbusSystemBusAddress, "unix:path="+systemInner)
|
seal.sys.bwrap.SetEnv[dbusSystemBusAddress] = "unix:path=" + systemInner
|
||||||
seal.sys.bind(systemBus[1], systemInner, true)
|
seal.sys.bwrap.Bind(systemPath, systemInner)
|
||||||
seal.sys.updatePerm(systemBus[1], acl.Read, acl.Write)
|
seal.sys.UpdatePerm(systemPath, acl.Read, acl.Write)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (tx *appSealTx) startDBus() error {
|
|
||||||
// ready channel passed to dbus package
|
|
||||||
ready := make(chan error, 1)
|
|
||||||
// used by waiting goroutine to notify process return
|
|
||||||
tx.dbusWait = make(chan struct{})
|
|
||||||
|
|
||||||
// background dbus proxy start
|
|
||||||
if err := tx.dbus.Start(ready, os.Stderr, true); err != nil {
|
|
||||||
return (*StartDBusError)(wrapError(err, "cannot start message bus proxy:", err))
|
|
||||||
}
|
|
||||||
verbose.Println("starting message bus proxy:", tx.dbus)
|
|
||||||
verbose.Println("message bus proxy bwrap args:", tx.dbus.Bwrap())
|
|
||||||
|
|
||||||
// background wait for proxy instance and notify completion
|
|
||||||
go func() {
|
|
||||||
if err := tx.dbus.Wait(); err != nil {
|
|
||||||
fmt.Println("fortify: warn: message bus proxy returned error:", err)
|
|
||||||
go func() { ready <- err }()
|
|
||||||
} else {
|
|
||||||
verbose.Println("message bus proxy exit")
|
|
||||||
}
|
|
||||||
|
|
||||||
// ensure socket removal so ephemeral directory is empty at revert
|
|
||||||
if err := os.Remove(tx.dbusAddr[0][1]); err != nil && !errors.Is(err, os.ErrNotExist) {
|
|
||||||
fmt.Println("fortify: cannot remove dangling session bus socket:", err)
|
|
||||||
}
|
|
||||||
if tx.dbusSystem {
|
|
||||||
if err := os.Remove(tx.dbusAddr[1][1]); err != nil && !errors.Is(err, os.ErrNotExist) {
|
|
||||||
fmt.Println("fortify: cannot remove dangling system bus socket:", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// notify proxy completion
|
|
||||||
tx.dbusWait <- struct{}{}
|
|
||||||
}()
|
|
||||||
|
|
||||||
// ready is not nil if the proxy process faulted
|
|
||||||
if err := <-ready; err != nil {
|
|
||||||
// note that err here is either an I/O related error or a predetermined unexpected behaviour error
|
|
||||||
return (*StartDBusError)(wrapError(err, "message bus proxy fault after start:", err))
|
|
||||||
}
|
|
||||||
verbose.Println("message bus proxy ready")
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (tx *appSealTx) stopDBus() error {
|
|
||||||
if err := tx.dbus.Close(); err != nil {
|
|
||||||
if errors.Is(err, os.ErrClosed) {
|
|
||||||
return (*CloseDBusError)(wrapError(err, "message bus proxy already closed"))
|
|
||||||
} else {
|
|
||||||
return (*CloseDBusError)(wrapError(err, "cannot close message bus proxy:", err))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// block until proxy wait returns
|
|
||||||
<-tx.dbusWait
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
@ -2,11 +2,12 @@ package app
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"os"
|
|
||||||
"path"
|
"path"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/acl"
|
"git.gensokyo.uk/security/fortify/acl"
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -22,44 +23,57 @@ var (
|
|||||||
ErrXDisplay = errors.New(display + " unset")
|
ErrXDisplay = errors.New(display + " unset")
|
||||||
)
|
)
|
||||||
|
|
||||||
type ErrDisplayEnv BaseError
|
func (seal *appSeal) shareDisplay(os linux.System) error {
|
||||||
|
|
||||||
func (seal *appSeal) shareDisplay() error {
|
|
||||||
// pass $TERM to launcher
|
// pass $TERM to launcher
|
||||||
if t, ok := os.LookupEnv(term); ok {
|
if t, ok := os.LookupEnv(term); ok {
|
||||||
seal.sys.setEnv(term, t)
|
seal.sys.bwrap.SetEnv[term] = t
|
||||||
}
|
}
|
||||||
|
|
||||||
// set up wayland
|
// set up wayland
|
||||||
if seal.et.Has(state.EnableWayland) {
|
if seal.et.Has(system.EWayland) {
|
||||||
|
var wp string
|
||||||
if wd, ok := os.LookupEnv(waylandDisplay); !ok {
|
if wd, ok := os.LookupEnv(waylandDisplay); !ok {
|
||||||
return (*ErrDisplayEnv)(wrapError(ErrWayland, "WAYLAND_DISPLAY is not set"))
|
return fmsg.WrapError(ErrWayland,
|
||||||
} else if seal.wlDone == nil {
|
"WAYLAND_DISPLAY is not set")
|
||||||
|
} else {
|
||||||
|
wp = path.Join(seal.RuntimePath, wd)
|
||||||
|
}
|
||||||
|
|
||||||
|
w := path.Join(seal.sys.runtime, "wayland-0")
|
||||||
|
seal.sys.bwrap.SetEnv[waylandDisplay] = w
|
||||||
|
|
||||||
|
if seal.directWayland {
|
||||||
// hardlink wayland socket
|
// hardlink wayland socket
|
||||||
wp := path.Join(seal.RuntimePath, wd)
|
|
||||||
wpi := path.Join(seal.shareLocal, "wayland")
|
wpi := path.Join(seal.shareLocal, "wayland")
|
||||||
w := path.Join(seal.sys.runtime, "wayland-0")
|
seal.sys.Link(wp, wpi)
|
||||||
seal.sys.link(wp, wpi)
|
seal.sys.bwrap.Bind(wpi, w)
|
||||||
seal.sys.setEnv(waylandDisplay, w)
|
|
||||||
seal.sys.bind(wpi, w, true)
|
|
||||||
|
|
||||||
// ensure Wayland socket ACL (e.g. `/run/user/%d/wayland-%d`)
|
// ensure Wayland socket ACL (e.g. `/run/user/%d/wayland-%d`)
|
||||||
seal.sys.updatePermTag(state.EnableWayland, wp, acl.Read, acl.Write, acl.Execute)
|
seal.sys.UpdatePermType(system.EWayland, wp, acl.Read, acl.Write, acl.Execute)
|
||||||
} else {
|
} else {
|
||||||
// set wayland socket path (e.g. `/run/user/%d/wayland-%d`)
|
wc := path.Join(seal.SharePath, "wayland")
|
||||||
seal.wl = path.Join(seal.RuntimePath, wd)
|
wt := path.Join(wc, seal.id)
|
||||||
|
seal.sys.Ensure(wc, 0711)
|
||||||
|
appID := seal.fid
|
||||||
|
if appID == "" {
|
||||||
|
// use instance ID in case app id is not set
|
||||||
|
appID = "moe.ophivana.fortify." + seal.id
|
||||||
|
}
|
||||||
|
seal.sys.Wayland(wt, wp, appID, seal.id)
|
||||||
|
seal.sys.bwrap.Bind(wt, w)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// set up X11
|
// set up X11
|
||||||
if seal.et.Has(state.EnableX) {
|
if seal.et.Has(system.EX11) {
|
||||||
// discover X11 and grant user permission via the `ChangeHosts` command
|
// discover X11 and grant user permission via the `ChangeHosts` command
|
||||||
if d, ok := os.LookupEnv(display); !ok {
|
if d, ok := os.LookupEnv(display); !ok {
|
||||||
return (*ErrDisplayEnv)(wrapError(ErrXDisplay, "DISPLAY is not set"))
|
return fmsg.WrapError(ErrXDisplay,
|
||||||
|
"DISPLAY is not set")
|
||||||
} else {
|
} else {
|
||||||
seal.sys.changeHosts(seal.sys.Username)
|
seal.sys.ChangeHosts("#" + seal.sys.user.us)
|
||||||
seal.sys.setEnv(display, d)
|
seal.sys.bwrap.SetEnv[display] = d
|
||||||
seal.sys.bind("/tmp/.X11-unix", "/tmp/.X11-unix", true)
|
seal.sys.bwrap.Bind("/tmp/.X11-unix", "/tmp/.X11-unix")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -4,10 +4,11 @@ import (
|
|||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/fs"
|
"io/fs"
|
||||||
"os"
|
|
||||||
"path"
|
"path"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -24,13 +25,8 @@ var (
|
|||||||
ErrPulseMode = errors.New("unexpected pulse socket mode")
|
ErrPulseMode = errors.New("unexpected pulse socket mode")
|
||||||
)
|
)
|
||||||
|
|
||||||
type (
|
func (seal *appSeal) sharePulse(os linux.System) error {
|
||||||
PulseCookieAccessError BaseError
|
if !seal.et.Has(system.EPulse) {
|
||||||
PulseSocketAccessError BaseError
|
|
||||||
)
|
|
||||||
|
|
||||||
func (seal *appSeal) sharePulse() error {
|
|
||||||
if !seal.et.Has(state.EnablePulse) {
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -39,49 +35,50 @@ func (seal *appSeal) sharePulse() error {
|
|||||||
ps := path.Join(pd, "native")
|
ps := path.Join(pd, "native")
|
||||||
if _, err := os.Stat(pd); err != nil {
|
if _, err := os.Stat(pd); err != nil {
|
||||||
if !errors.Is(err, fs.ErrNotExist) {
|
if !errors.Is(err, fs.ErrNotExist) {
|
||||||
return (*PulseSocketAccessError)(wrapError(err,
|
return fmsg.WrapErrorSuffix(err,
|
||||||
fmt.Sprintf("cannot access PulseAudio directory '%s':", pd), err))
|
fmt.Sprintf("cannot access PulseAudio directory %q:", pd))
|
||||||
}
|
}
|
||||||
return (*PulseSocketAccessError)(wrapError(ErrPulseSocket,
|
return fmsg.WrapError(ErrPulseSocket,
|
||||||
fmt.Sprintf("PulseAudio directory '%s' not found", pd)))
|
fmt.Sprintf("PulseAudio directory %q not found", pd))
|
||||||
}
|
}
|
||||||
|
|
||||||
// check PulseAudio socket permission (e.g. `/run/user/%d/pulse/native`)
|
// check PulseAudio socket permission (e.g. `/run/user/%d/pulse/native`)
|
||||||
if s, err := os.Stat(ps); err != nil {
|
if s, err := os.Stat(ps); err != nil {
|
||||||
if !errors.Is(err, fs.ErrNotExist) {
|
if !errors.Is(err, fs.ErrNotExist) {
|
||||||
return (*PulseSocketAccessError)(wrapError(err,
|
return fmsg.WrapErrorSuffix(err,
|
||||||
fmt.Sprintf("cannot access PulseAudio socket '%s':", ps), err))
|
fmt.Sprintf("cannot access PulseAudio socket %q:", ps))
|
||||||
}
|
}
|
||||||
return (*PulseSocketAccessError)(wrapError(ErrPulseSocket,
|
return fmsg.WrapError(ErrPulseSocket,
|
||||||
fmt.Sprintf("PulseAudio directory '%s' found but socket does not exist", pd)))
|
fmt.Sprintf("PulseAudio directory %q found but socket does not exist", pd))
|
||||||
} else {
|
} else {
|
||||||
if m := s.Mode(); m&0o006 != 0o006 {
|
if m := s.Mode(); m&0o006 != 0o006 {
|
||||||
return (*PulseSocketAccessError)(wrapError(ErrPulseMode,
|
return fmsg.WrapError(ErrPulseMode,
|
||||||
fmt.Sprintf("unexpected permissions on '%s':", ps), m))
|
fmt.Sprintf("unexpected permissions on %q:", ps), m)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// hard link pulse socket into target-executable share
|
// hard link pulse socket into target-executable share
|
||||||
psi := path.Join(seal.shareLocal, "pulse")
|
psi := path.Join(seal.shareLocal, "pulse")
|
||||||
p := path.Join(seal.sys.runtime, "pulse", "native")
|
p := path.Join(seal.sys.runtime, "pulse", "native")
|
||||||
seal.sys.link(ps, psi)
|
seal.sys.Link(ps, psi)
|
||||||
seal.sys.bind(psi, p, true)
|
seal.sys.bwrap.Bind(psi, p)
|
||||||
seal.sys.setEnv(pulseServer, "unix:"+p)
|
seal.sys.bwrap.SetEnv[pulseServer] = "unix:" + p
|
||||||
|
|
||||||
// publish current user's pulse cookie for target user
|
// publish current user's pulse cookie for target user
|
||||||
if src, err := discoverPulseCookie(); err != nil {
|
if src, err := discoverPulseCookie(os); err != nil {
|
||||||
return err
|
return err
|
||||||
} else {
|
} else {
|
||||||
dst := path.Join(seal.share, "pulse-cookie")
|
dst := path.Join(seal.share, "pulse-cookie")
|
||||||
seal.sys.setEnv(pulseCookie, dst)
|
seal.sys.bwrap.SetEnv[pulseCookie] = dst
|
||||||
seal.sys.copyFile(dst, src)
|
seal.sys.CopyFile(dst, src)
|
||||||
|
seal.sys.bwrap.Bind(dst, dst)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// discoverPulseCookie attempts various standard methods to discover the current user's PulseAudio authentication cookie
|
// discoverPulseCookie attempts various standard methods to discover the current user's PulseAudio authentication cookie
|
||||||
func discoverPulseCookie() (string, error) {
|
func discoverPulseCookie(os linux.System) (string, error) {
|
||||||
if p, ok := os.LookupEnv(pulseCookie); ok {
|
if p, ok := os.LookupEnv(pulseCookie); ok {
|
||||||
return p, nil
|
return p, nil
|
||||||
}
|
}
|
||||||
@ -91,8 +88,8 @@ func discoverPulseCookie() (string, error) {
|
|||||||
p = path.Join(p, ".pulse-cookie")
|
p = path.Join(p, ".pulse-cookie")
|
||||||
if s, err := os.Stat(p); err != nil {
|
if s, err := os.Stat(p); err != nil {
|
||||||
if !errors.Is(err, fs.ErrNotExist) {
|
if !errors.Is(err, fs.ErrNotExist) {
|
||||||
return p, (*PulseCookieAccessError)(wrapError(err,
|
return p, fmsg.WrapErrorSuffix(err,
|
||||||
fmt.Sprintf("cannot access PulseAudio cookie '%s':", p), err))
|
fmt.Sprintf("cannot access PulseAudio cookie %q:", p))
|
||||||
}
|
}
|
||||||
// not found, try next method
|
// not found, try next method
|
||||||
} else if !s.IsDir() {
|
} else if !s.IsDir() {
|
||||||
@ -105,7 +102,8 @@ func discoverPulseCookie() (string, error) {
|
|||||||
p = path.Join(p, "pulse", "cookie")
|
p = path.Join(p, "pulse", "cookie")
|
||||||
if s, err := os.Stat(p); err != nil {
|
if s, err := os.Stat(p); err != nil {
|
||||||
if !errors.Is(err, fs.ErrNotExist) {
|
if !errors.Is(err, fs.ErrNotExist) {
|
||||||
return p, (*PulseCookieAccessError)(wrapError(err, "cannot access PulseAudio cookie", p+":", err))
|
return p, fmsg.WrapErrorSuffix(err,
|
||||||
|
fmt.Sprintf("cannot access PulseAudio cookie %q:", p))
|
||||||
}
|
}
|
||||||
// not found, try next method
|
// not found, try next method
|
||||||
} else if !s.IsDir() {
|
} else if !s.IsDir() {
|
||||||
@ -113,7 +111,7 @@ func discoverPulseCookie() (string, error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return "", (*PulseCookieAccessError)(wrapError(ErrPulseCookie,
|
return "", fmsg.WrapError(ErrPulseCookie,
|
||||||
fmt.Sprintf("cannot locate PulseAudio cookie (tried $%s, $%s/pulse/cookie, $%s/.pulse-cookie)",
|
fmt.Sprintf("cannot locate PulseAudio cookie (tried $%s, $%s/pulse/cookie, $%s/.pulse-cookie)",
|
||||||
pulseCookie, xdgConfigHome, home)))
|
pulseCookie, xdgConfigHome, home))
|
||||||
}
|
}
|
||||||
|
@ -3,9 +3,8 @@ package app
|
|||||||
import (
|
import (
|
||||||
"path"
|
"path"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/acl"
|
"git.gensokyo.uk/security/fortify/acl"
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -17,58 +16,24 @@ const (
|
|||||||
// shareRuntime queues actions for sharing/ensuring the runtime and share directories
|
// shareRuntime queues actions for sharing/ensuring the runtime and share directories
|
||||||
func (seal *appSeal) shareRuntime() {
|
func (seal *appSeal) shareRuntime() {
|
||||||
// mount tmpfs on inner runtime (e.g. `/run/user/%d`)
|
// mount tmpfs on inner runtime (e.g. `/run/user/%d`)
|
||||||
seal.sys.bwrap.Tmpfs = append(seal.sys.bwrap.Tmpfs,
|
seal.sys.bwrap.Tmpfs("/run/user", 1*1024*1024)
|
||||||
bwrap.PermConfig[bwrap.TmpfsConfig]{
|
seal.sys.bwrap.Tmpfs(seal.sys.runtime, 8*1024*1024)
|
||||||
Path: bwrap.TmpfsConfig{
|
|
||||||
Size: 1 * 1024 * 1024,
|
// point to inner runtime path `/run/user/%d`
|
||||||
Dir: "/run/user",
|
seal.sys.bwrap.SetEnv[xdgRuntimeDir] = seal.sys.runtime
|
||||||
},
|
seal.sys.bwrap.SetEnv[xdgSessionClass] = "user"
|
||||||
},
|
seal.sys.bwrap.SetEnv[xdgSessionType] = "tty"
|
||||||
bwrap.PermConfig[bwrap.TmpfsConfig]{
|
|
||||||
Path: bwrap.TmpfsConfig{
|
|
||||||
Size: 8 * 1024 * 1024,
|
|
||||||
Dir: seal.sys.runtime,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
// ensure RunDir (e.g. `/run/user/%d/fortify`)
|
// ensure RunDir (e.g. `/run/user/%d/fortify`)
|
||||||
seal.sys.ensure(seal.RunDirPath, 0700)
|
seal.sys.Ensure(seal.RunDirPath, 0700)
|
||||||
seal.sys.updatePermTag(state.EnableLength, seal.RunDirPath, acl.Execute)
|
seal.sys.UpdatePermType(system.User, seal.RunDirPath, acl.Execute)
|
||||||
|
|
||||||
// ensure runtime directory ACL (e.g. `/run/user/%d`)
|
// ensure runtime directory ACL (e.g. `/run/user/%d`)
|
||||||
seal.sys.updatePermTag(state.EnableLength, seal.RuntimePath, acl.Execute)
|
seal.sys.Ensure(seal.RuntimePath, 0700) // ensure this dir in case XDG_RUNTIME_DIR is unset
|
||||||
|
seal.sys.UpdatePermType(system.User, seal.RuntimePath, acl.Execute)
|
||||||
// ensure Share (e.g. `/tmp/fortify.%d`)
|
|
||||||
// acl is unnecessary as this directory is world executable
|
|
||||||
seal.sys.ensure(seal.SharePath, 0701)
|
|
||||||
|
|
||||||
// ensure process-specific share (e.g. `/tmp/fortify.%d/%s`)
|
|
||||||
// acl is unnecessary as this directory is world executable
|
|
||||||
seal.share = path.Join(seal.SharePath, seal.id.String())
|
|
||||||
seal.sys.ensureEphemeral(seal.share, 0701)
|
|
||||||
|
|
||||||
// ensure process-specific share local to XDG_RUNTIME_DIR (e.g. `/run/user/%d/fortify/%s`)
|
// ensure process-specific share local to XDG_RUNTIME_DIR (e.g. `/run/user/%d/fortify/%s`)
|
||||||
seal.shareLocal = path.Join(seal.RunDirPath, seal.id.String())
|
seal.shareLocal = path.Join(seal.RunDirPath, seal.id)
|
||||||
seal.sys.ensureEphemeral(seal.shareLocal, 0700)
|
seal.sys.Ephemeral(system.Process, seal.shareLocal, 0700)
|
||||||
seal.sys.updatePerm(seal.shareLocal, acl.Execute)
|
seal.sys.UpdatePerm(seal.shareLocal, acl.Execute)
|
||||||
}
|
|
||||||
|
|
||||||
func (seal *appSeal) shareRuntimeChild() string {
|
|
||||||
// ensure child runtime parent directory (e.g. `/tmp/fortify.%d/runtime`)
|
|
||||||
targetRuntimeParent := path.Join(seal.SharePath, "runtime")
|
|
||||||
seal.sys.ensure(targetRuntimeParent, 0700)
|
|
||||||
seal.sys.updatePermTag(state.EnableLength, targetRuntimeParent, acl.Execute)
|
|
||||||
|
|
||||||
// ensure child runtime directory (e.g. `/tmp/fortify.%d/runtime/%d`)
|
|
||||||
targetRuntime := path.Join(targetRuntimeParent, seal.sys.Uid)
|
|
||||||
seal.sys.ensure(targetRuntime, 0700)
|
|
||||||
seal.sys.updatePermTag(state.EnableLength, targetRuntime, acl.Read, acl.Write, acl.Execute)
|
|
||||||
|
|
||||||
// point to ensured runtime path
|
|
||||||
seal.sys.setEnv(xdgRuntimeDir, targetRuntime)
|
|
||||||
seal.sys.setEnv(xdgSessionClass, "user")
|
|
||||||
seal.sys.setEnv(xdgSessionType, "tty")
|
|
||||||
|
|
||||||
return targetRuntime
|
|
||||||
}
|
}
|
||||||
|
@ -1,8 +1,11 @@
|
|||||||
package app
|
package app
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
|
||||||
"path"
|
"path"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/acl"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -11,33 +14,64 @@ const (
|
|||||||
|
|
||||||
// shareSystem queues various system-related actions
|
// shareSystem queues various system-related actions
|
||||||
func (seal *appSeal) shareSystem() {
|
func (seal *appSeal) shareSystem() {
|
||||||
|
// ensure Share (e.g. `/tmp/fortify.%d`)
|
||||||
|
// acl is unnecessary as this directory is world executable
|
||||||
|
seal.sys.Ensure(seal.SharePath, 0711)
|
||||||
|
|
||||||
|
// ensure process-specific share (e.g. `/tmp/fortify.%d/%s`)
|
||||||
|
// acl is unnecessary as this directory is world executable
|
||||||
|
seal.share = path.Join(seal.SharePath, seal.id)
|
||||||
|
seal.sys.Ephemeral(system.Process, seal.share, 0711)
|
||||||
|
|
||||||
|
// ensure child tmpdir parent directory (e.g. `/tmp/fortify.%d/tmpdir`)
|
||||||
|
targetTmpdirParent := path.Join(seal.SharePath, "tmpdir")
|
||||||
|
seal.sys.Ensure(targetTmpdirParent, 0700)
|
||||||
|
seal.sys.UpdatePermType(system.User, targetTmpdirParent, acl.Execute)
|
||||||
|
|
||||||
|
// ensure child tmpdir (e.g. `/tmp/fortify.%d/tmpdir/%d`)
|
||||||
|
targetTmpdir := path.Join(targetTmpdirParent, seal.sys.user.as)
|
||||||
|
seal.sys.Ensure(targetTmpdir, 01700)
|
||||||
|
seal.sys.UpdatePermType(system.User, targetTmpdir, acl.Read, acl.Write, acl.Execute)
|
||||||
|
seal.sys.bwrap.Bind(targetTmpdir, "/tmp", false, true)
|
||||||
|
|
||||||
|
// mount tmpfs on inner shared directory (e.g. `/tmp/fortify.%d`)
|
||||||
|
seal.sys.bwrap.Tmpfs(seal.SharePath, 1*1024*1024)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (seal *appSeal) sharePasswd(os linux.System) {
|
||||||
// look up shell
|
// look up shell
|
||||||
sh := "/bin/sh"
|
sh := "/bin/sh"
|
||||||
if s, ok := os.LookupEnv(shell); ok {
|
if s, ok := os.LookupEnv(shell); ok {
|
||||||
seal.sys.setEnv(shell, s)
|
seal.sys.bwrap.SetEnv[shell] = s
|
||||||
sh = s
|
sh = s
|
||||||
}
|
}
|
||||||
|
|
||||||
// generate /etc/passwd
|
// generate /etc/passwd
|
||||||
passwdPath := path.Join(seal.share, "passwd")
|
passwdPath := path.Join(seal.share, "passwd")
|
||||||
username := "chronos"
|
username := "chronos"
|
||||||
if seal.sys.Username != "" {
|
if seal.sys.user.username != "" {
|
||||||
username = seal.sys.Username
|
username = seal.sys.user.username
|
||||||
seal.sys.setEnv("USER", seal.sys.Username)
|
|
||||||
}
|
}
|
||||||
homeDir := "/var/empty"
|
homeDir := "/var/empty"
|
||||||
if seal.sys.HomeDir != "" {
|
if seal.sys.user.home != "" {
|
||||||
homeDir = seal.sys.HomeDir
|
homeDir = seal.sys.user.home
|
||||||
seal.sys.setEnv("HOME", seal.sys.HomeDir)
|
|
||||||
}
|
}
|
||||||
passwd := username + ":x:65534:65534:Fortify:" + homeDir + ":" + sh + "\n"
|
|
||||||
seal.sys.writeFile(passwdPath, []byte(passwd))
|
// bind home directory
|
||||||
|
seal.sys.bwrap.Bind(seal.sys.user.data, homeDir, false, true)
|
||||||
|
seal.sys.bwrap.Chdir = homeDir
|
||||||
|
|
||||||
|
seal.sys.bwrap.SetEnv["USER"] = username
|
||||||
|
seal.sys.bwrap.SetEnv["HOME"] = homeDir
|
||||||
|
|
||||||
|
passwd := username + ":x:" + seal.sys.mappedIDString + ":" + seal.sys.mappedIDString + ":Fortify:" + homeDir + ":" + sh + "\n"
|
||||||
|
seal.sys.Write(passwdPath, passwd)
|
||||||
|
|
||||||
// write /etc/group
|
// write /etc/group
|
||||||
groupPath := path.Join(seal.share, "group")
|
groupPath := path.Join(seal.share, "group")
|
||||||
seal.sys.writeFile(groupPath, []byte("fortify:x:65534:\n"))
|
seal.sys.Write(groupPath, "fortify:x:"+seal.sys.mappedIDString+":\n")
|
||||||
|
|
||||||
// bind /etc/passwd and /etc/group
|
// bind /etc/passwd and /etc/group
|
||||||
seal.sys.bind(passwdPath, "/etc/passwd", true)
|
seal.sys.bwrap.Bind(passwdPath, "/etc/passwd")
|
||||||
seal.sys.bind(groupPath, "/etc/group", true)
|
seal.sys.bwrap.Bind(groupPath, "/etc/group")
|
||||||
}
|
}
|
||||||
|
@ -3,35 +3,28 @@ package app
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path"
|
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strconv"
|
"strings"
|
||||||
"time"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
shim0 "git.gensokyo.uk/security/fortify/cmd/fshim/ipc"
|
||||||
"git.ophivana.moe/cat/fortify/internal/shim"
|
"git.gensokyo.uk/security/fortify/cmd/fshim/ipc/shim"
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
"git.gensokyo.uk/security/fortify/helper"
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/state"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
type (
|
// Start selects a user switcher and starts shim.
|
||||||
// ProcessError encapsulates errors returned by starting *exec.Cmd
|
// Note that Wait must be called regardless of error returned by Start.
|
||||||
ProcessError BaseError
|
|
||||||
// ShimError encapsulates errors returned by shim.ServeConfig.
|
|
||||||
ShimError BaseError
|
|
||||||
)
|
|
||||||
|
|
||||||
// Start starts the fortified child
|
|
||||||
func (a *app) Start() error {
|
func (a *app) Start() error {
|
||||||
a.lock.Lock()
|
a.lock.Lock()
|
||||||
defer a.lock.Unlock()
|
defer a.lock.Unlock()
|
||||||
|
|
||||||
// resolve exec paths
|
// resolve exec paths
|
||||||
shimExec := [3]string{a.seal.sys.executable, helper.BubblewrapName}
|
shimExec := [2]string{helper.BubblewrapName}
|
||||||
if len(a.seal.command) > 0 {
|
if len(a.seal.command) > 0 {
|
||||||
shimExec[2] = a.seal.command[0]
|
shimExec[1] = a.seal.command[0]
|
||||||
}
|
}
|
||||||
for i, n := range shimExec {
|
for i, n := range shimExec {
|
||||||
if len(n) == 0 {
|
if len(n) == 0 {
|
||||||
@ -41,71 +34,54 @@ func (a *app) Start() error {
|
|||||||
if s, err := exec.LookPath(n); err == nil {
|
if s, err := exec.LookPath(n); err == nil {
|
||||||
shimExec[i] = s
|
shimExec[i] = s
|
||||||
} else {
|
} else {
|
||||||
return (*ProcessError)(wrapError(err, fmt.Sprintf("cannot find %q: %v", n, err)))
|
return fmsg.WrapError(err,
|
||||||
|
fmt.Sprintf("executable file %q not found in $PATH", n))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := a.seal.sys.commit(); err != nil {
|
// construct shim manager
|
||||||
|
a.shim = shim.New(
|
||||||
|
uint32(a.seal.sys.UID()),
|
||||||
|
a.seal.sys.user.as,
|
||||||
|
a.seal.sys.user.supp,
|
||||||
|
&shim0.Payload{
|
||||||
|
Argv: a.seal.command,
|
||||||
|
Exec: shimExec,
|
||||||
|
Bwrap: a.seal.sys.bwrap,
|
||||||
|
|
||||||
|
Verbose: fmsg.Verbose(),
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
// startup will go ahead, commit system setup
|
||||||
|
if err := a.seal.sys.Commit(); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
a.seal.sys.needRevert = true
|
||||||
|
|
||||||
// select command builder
|
// export sync pipe from sys
|
||||||
var commandBuilder func(shimEnv string) (args []string)
|
a.seal.sys.bwrap.SetSync(a.seal.sys.Sync())
|
||||||
switch a.seal.launchOption {
|
|
||||||
case LaunchMethodSudo:
|
|
||||||
commandBuilder = a.commandBuilderSudo
|
|
||||||
case LaunchMethodMachineCtl:
|
|
||||||
commandBuilder = a.commandBuilderMachineCtl
|
|
||||||
default:
|
|
||||||
panic("unreachable")
|
|
||||||
}
|
|
||||||
|
|
||||||
// configure child process
|
if startTime, err := a.shim.Start(); err != nil {
|
||||||
confSockPath := path.Join(a.seal.share, "shim")
|
return err
|
||||||
a.cmd = exec.Command(a.seal.toolPath, commandBuilder(shim.EnvShim+"="+confSockPath)...)
|
|
||||||
a.cmd.Env = []string{}
|
|
||||||
a.cmd.Stdin = os.Stdin
|
|
||||||
a.cmd.Stdout = os.Stdout
|
|
||||||
a.cmd.Stderr = os.Stderr
|
|
||||||
a.cmd.Dir = a.seal.RunDirPath
|
|
||||||
|
|
||||||
if wls, err := shim.ServeConfig(confSockPath, &shim.Payload{
|
|
||||||
Argv: a.seal.command,
|
|
||||||
Exec: shimExec,
|
|
||||||
Bwrap: a.seal.sys.bwrap,
|
|
||||||
WL: a.seal.wlDone != nil,
|
|
||||||
|
|
||||||
Verbose: verbose.Get(),
|
|
||||||
}, a.seal.wl, a.seal.wlDone); err != nil {
|
|
||||||
return (*ShimError)(wrapError(err, "cannot listen on shim socket:", err))
|
|
||||||
} else {
|
} else {
|
||||||
a.wayland = wls
|
// shim start and setup success, create process state
|
||||||
}
|
sd := state.State{
|
||||||
|
ID: *a.id,
|
||||||
|
PID: a.shim.Unwrap().Process.Pid,
|
||||||
|
Config: a.ct.Unwrap(),
|
||||||
|
Time: *startTime,
|
||||||
|
}
|
||||||
|
|
||||||
// start shim
|
// register process state
|
||||||
verbose.Println("starting shim as target user:", a.cmd)
|
var err0 = new(StateStoreError)
|
||||||
if err := a.cmd.Start(); err != nil {
|
err0.Inner, err0.DoErr = a.seal.store.Do(a.seal.sys.user.aid, func(c state.Cursor) {
|
||||||
return (*ProcessError)(wrapError(err, "cannot start process:", err))
|
err0.InnerErr = c.Save(&sd)
|
||||||
|
})
|
||||||
|
a.seal.sys.saveState = true
|
||||||
|
return err0.equiv("cannot save process state:")
|
||||||
}
|
}
|
||||||
startTime := time.Now().UTC()
|
|
||||||
|
|
||||||
// create process state
|
|
||||||
sd := state.State{
|
|
||||||
PID: a.cmd.Process.Pid,
|
|
||||||
Command: a.seal.command,
|
|
||||||
Capability: a.seal.et,
|
|
||||||
Launcher: a.seal.toolPath,
|
|
||||||
Argv: a.cmd.Args,
|
|
||||||
Time: startTime,
|
|
||||||
}
|
|
||||||
|
|
||||||
// register process state
|
|
||||||
var err = new(StateStoreError)
|
|
||||||
err.Inner, err.DoErr = a.seal.store.Do(func(b state.Backend) {
|
|
||||||
err.InnerErr = b.Save(&sd)
|
|
||||||
})
|
|
||||||
return err.equiv("cannot save process state:", err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// StateStoreError is returned for a failed state save
|
// StateStoreError is returned for a failed state save
|
||||||
@ -121,10 +97,10 @@ type StateStoreError struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (e *StateStoreError) equiv(a ...any) error {
|
func (e *StateStoreError) equiv(a ...any) error {
|
||||||
if e.Inner == true && e.DoErr == nil && e.InnerErr == nil && e.Err == nil {
|
if e.Inner && e.DoErr == nil && e.InnerErr == nil && e.Err == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
return wrapError(e, a...)
|
return fmsg.WrapErrorSuffix(e, a...)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -167,80 +143,117 @@ func (a *app) Wait() (int, error) {
|
|||||||
a.lock.Lock()
|
a.lock.Lock()
|
||||||
defer a.lock.Unlock()
|
defer a.lock.Unlock()
|
||||||
|
|
||||||
var r int
|
if a.shim == nil {
|
||||||
|
fmsg.VPrintln("shim not initialised, skipping cleanup")
|
||||||
// wait for process and resolve exit code
|
return 1, nil
|
||||||
if err := a.cmd.Wait(); err != nil {
|
|
||||||
var exitError *exec.ExitError
|
|
||||||
if !errors.As(err, &exitError) {
|
|
||||||
// should be unreachable
|
|
||||||
a.wait = err
|
|
||||||
}
|
|
||||||
|
|
||||||
// store non-zero return code
|
|
||||||
r = exitError.ExitCode()
|
|
||||||
} else {
|
|
||||||
r = a.cmd.ProcessState.ExitCode()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
verbose.Println("process", strconv.Itoa(a.cmd.Process.Pid), "exited with exit code", r)
|
var r int
|
||||||
|
|
||||||
// close wayland connection
|
if cmd := a.shim.Unwrap(); cmd == nil {
|
||||||
if a.wayland != nil {
|
// failure prior to process start
|
||||||
close(a.seal.wlDone)
|
r = 255
|
||||||
if err := a.wayland.Close(); err != nil {
|
} else {
|
||||||
fmt.Println("fortify: cannot close wayland connection:", err)
|
wait := make(chan error, 1)
|
||||||
|
go func() { wait <- cmd.Wait() }()
|
||||||
|
|
||||||
|
select {
|
||||||
|
// wait for process and resolve exit code
|
||||||
|
case err := <-wait:
|
||||||
|
if err != nil {
|
||||||
|
var exitError *exec.ExitError
|
||||||
|
if !errors.As(err, &exitError) {
|
||||||
|
// should be unreachable
|
||||||
|
a.waitErr = err
|
||||||
|
}
|
||||||
|
|
||||||
|
// store non-zero return code
|
||||||
|
r = exitError.ExitCode()
|
||||||
|
} else {
|
||||||
|
r = cmd.ProcessState.ExitCode()
|
||||||
|
}
|
||||||
|
fmsg.VPrintf("process %d exited with exit code %d", cmd.Process.Pid, r)
|
||||||
|
|
||||||
|
// alternative exit path when kill was unsuccessful
|
||||||
|
case err := <-a.shim.WaitFallback():
|
||||||
|
r = 255
|
||||||
|
if err != nil {
|
||||||
|
fmsg.Printf("cannot terminate shim on faulted setup: %v", err)
|
||||||
|
} else {
|
||||||
|
fmsg.VPrintln("alternative exit path selected")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// child process exited, resume output
|
||||||
|
fmsg.Resume()
|
||||||
|
|
||||||
|
// print queued up dbus messages
|
||||||
|
if a.seal.dbusMsg != nil {
|
||||||
|
a.seal.dbusMsg(func(msgbuf []string) {
|
||||||
|
for _, msg := range msgbuf {
|
||||||
|
fmsg.Println(msg)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
// update store and revert app setup transaction
|
// update store and revert app setup transaction
|
||||||
e := new(StateStoreError)
|
e := new(StateStoreError)
|
||||||
e.Inner, e.DoErr = a.seal.store.Do(func(b state.Backend) {
|
e.Inner, e.DoErr = a.seal.store.Do(a.seal.sys.user.aid, func(b state.Cursor) {
|
||||||
e.InnerErr = func() error {
|
e.InnerErr = func() error {
|
||||||
// destroy defunct state entry
|
// destroy defunct state entry
|
||||||
if err := b.Destroy(a.cmd.Process.Pid); err != nil {
|
if cmd := a.shim.Unwrap(); cmd != nil && a.seal.sys.saveState {
|
||||||
return err
|
if err := b.Destroy(*a.id); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// enablements of remaining launchers
|
// enablements of remaining launchers
|
||||||
rt, tags := new(state.Enablements), new(state.Enablements)
|
rt, ec := new(system.Enablements), new(system.Criteria)
|
||||||
tags.Set(state.EnableLength + 1)
|
ec.Enablements = new(system.Enablements)
|
||||||
|
ec.Set(system.Process)
|
||||||
if states, err := b.Load(); err != nil {
|
if states, err := b.Load(); err != nil {
|
||||||
return err
|
return err
|
||||||
} else {
|
} else {
|
||||||
if l := len(states); l == 0 {
|
if l := len(states); l == 0 {
|
||||||
// cleanup globals as the final launcher
|
// cleanup globals as the final launcher
|
||||||
verbose.Println("no other launchers active, will clean up globals")
|
fmsg.VPrintln("no other launchers active, will clean up globals")
|
||||||
tags.Set(state.EnableLength)
|
ec.Set(system.User)
|
||||||
} else {
|
} else {
|
||||||
verbose.Printf("found %d active launchers, cleaning up without globals\n", l)
|
fmsg.VPrintf("found %d active launchers, cleaning up without globals", l)
|
||||||
}
|
}
|
||||||
|
|
||||||
// accumulate capabilities of other launchers
|
// accumulate capabilities of other launchers
|
||||||
for _, s := range states {
|
for i, s := range states {
|
||||||
*rt |= s.Capability
|
if s.Config != nil {
|
||||||
|
*rt |= s.Config.Confinement.Enablements
|
||||||
|
} else {
|
||||||
|
fmsg.Printf("state entry %d does not contain config", i)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// invert accumulated enablements for cleanup
|
// invert accumulated enablements for cleanup
|
||||||
for i := state.Enablement(0); i < state.EnableLength; i++ {
|
for i := system.Enablement(0); i < system.Enablement(system.ELen); i++ {
|
||||||
if !rt.Has(i) {
|
if !rt.Has(i) {
|
||||||
tags.Set(i)
|
ec.Set(i)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if verbose.Get() {
|
if fmsg.Verbose() {
|
||||||
ct := make([]state.Enablement, 0, state.EnableLength)
|
labels := make([]string, 0, system.ELen+1)
|
||||||
for i := state.Enablement(0); i < state.EnableLength; i++ {
|
for i := system.Enablement(0); i < system.Enablement(system.ELen+2); i++ {
|
||||||
if tags.Has(i) {
|
if ec.Has(i) {
|
||||||
ct = append(ct, i)
|
labels = append(labels, system.TypeString(i))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if len(ct) > 0 {
|
if len(labels) > 0 {
|
||||||
verbose.Println("will revert operations tagged", ct, "as no remaining launchers hold these enablements")
|
fmsg.VPrintln("reverting operations labelled", strings.Join(labels, ", "))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := a.seal.sys.revert(tags); err != nil {
|
if a.seal.sys.needRevert {
|
||||||
return err.(RevertCompoundError)
|
if err := a.seal.sys.Revert(ec); err != nil {
|
||||||
|
return err.(RevertCompoundError)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
@ -1,429 +1,71 @@
|
|||||||
package app
|
package app
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"git.gensokyo.uk/security/fortify/dbus"
|
||||||
"fmt"
|
"git.gensokyo.uk/security/fortify/helper/bwrap"
|
||||||
"io/fs"
|
"git.gensokyo.uk/security/fortify/internal/linux"
|
||||||
"os"
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
"os/user"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/acl"
|
|
||||||
"git.ophivana.moe/cat/fortify/dbus"
|
|
||||||
"git.ophivana.moe/cat/fortify/helper/bwrap"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/state"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
|
||||||
"git.ophivana.moe/cat/fortify/xcb"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// appSeal seals the application with child-related information
|
// appSealSys encapsulates app seal behaviour with OS interactions
|
||||||
type appSeal struct {
|
type appSealSys struct {
|
||||||
// application unique identifier
|
|
||||||
id *appID
|
|
||||||
// wayland socket path if mediated wayland is enabled
|
|
||||||
wl string
|
|
||||||
// wait for wayland client to exit if mediated wayland is enabled,
|
|
||||||
// (wlDone == nil) determines whether mediated wayland setup is performed
|
|
||||||
wlDone chan struct{}
|
|
||||||
|
|
||||||
// freedesktop application ID
|
|
||||||
fid string
|
|
||||||
// argv to start process with in the final confined environment
|
|
||||||
command []string
|
|
||||||
// persistent process state store
|
|
||||||
store state.Store
|
|
||||||
|
|
||||||
// uint8 representation of launch method sealed from config
|
|
||||||
launchOption uint8
|
|
||||||
// process-specific share directory path
|
|
||||||
share string
|
|
||||||
// process-specific share directory path local to XDG_RUNTIME_DIR
|
|
||||||
shareLocal string
|
|
||||||
|
|
||||||
// path to launcher program
|
|
||||||
toolPath string
|
|
||||||
// pass-through enablement tracking from config
|
|
||||||
et state.Enablements
|
|
||||||
|
|
||||||
// prevents sharing from happening twice
|
|
||||||
shared bool
|
|
||||||
// seal system-level component
|
|
||||||
sys *appSealTx
|
|
||||||
|
|
||||||
// used in various sealing operations
|
|
||||||
internal.SystemConstants
|
|
||||||
|
|
||||||
// protected by upstream mutex
|
|
||||||
}
|
|
||||||
|
|
||||||
// appSealTx contains the system-level component of the app seal
|
|
||||||
type appSealTx struct {
|
|
||||||
bwrap *bwrap.Config
|
bwrap *bwrap.Config
|
||||||
|
// paths to override by mounting tmpfs over them
|
||||||
// reference to D-Bus proxy instance, nil if disabled
|
override []string
|
||||||
dbus *dbus.Proxy
|
|
||||||
// notification from goroutine waiting for dbus.Proxy
|
|
||||||
dbusWait chan struct{}
|
|
||||||
// upstream address/downstream path used to initialise dbus.Proxy
|
|
||||||
dbusAddr *[2][2]string
|
|
||||||
// whether system bus proxy is enabled
|
|
||||||
dbusSystem bool
|
|
||||||
|
|
||||||
// paths to append/strip ACLs (of target user) from
|
|
||||||
acl []*appACLEntry
|
|
||||||
// X11 ChangeHosts commands to perform
|
|
||||||
xhost []string
|
|
||||||
// paths of directories to ensure
|
|
||||||
mkdir []appEnsureEntry
|
|
||||||
// dst, data pairs of temporarily available files
|
|
||||||
files [][2]string
|
|
||||||
// dst, src pairs of temporarily shared files
|
|
||||||
tmpfiles [][2]string
|
|
||||||
// dst, src pairs of temporarily hard linked files
|
|
||||||
hardlinks [][2]string
|
|
||||||
|
|
||||||
// default formatted XDG_RUNTIME_DIR of User
|
// default formatted XDG_RUNTIME_DIR of User
|
||||||
runtime string
|
runtime string
|
||||||
// sealed path to fortify executable, used by shim
|
|
||||||
executable string
|
|
||||||
// target user UID as an integer
|
|
||||||
uid int
|
|
||||||
// target user sealed from config
|
// target user sealed from config
|
||||||
*user.User
|
user appUser
|
||||||
|
|
||||||
// prevents commit from happening twice
|
// mapped uid and gid in user namespace
|
||||||
complete bool
|
mappedID int
|
||||||
// prevents cleanup from happening twice
|
// string representation of mappedID
|
||||||
closed bool
|
mappedIDString string
|
||||||
|
|
||||||
|
needRevert bool
|
||||||
|
saveState bool
|
||||||
|
*system.I
|
||||||
|
|
||||||
// protected by upstream mutex
|
// protected by upstream mutex
|
||||||
}
|
}
|
||||||
|
|
||||||
type appEnsureEntry struct {
|
type appUser struct {
|
||||||
path string
|
// full uid resolved by fsu
|
||||||
perm os.FileMode
|
uid int
|
||||||
remove bool
|
// string representation of uid
|
||||||
}
|
us string
|
||||||
|
|
||||||
// setEnv sets an environment variable for the child process
|
// supplementary group ids
|
||||||
func (tx *appSealTx) setEnv(k, v string) {
|
supp []string
|
||||||
tx.bwrap.SetEnv[k] = v
|
|
||||||
}
|
|
||||||
|
|
||||||
// bind mounts a directory within the sandbox
|
// application id
|
||||||
func (tx *appSealTx) bind(src, dest string, ro bool) {
|
aid int
|
||||||
if !ro {
|
// string representation of aid
|
||||||
tx.bwrap.Bind = append(tx.bwrap.Bind, [2]string{src, dest})
|
as string
|
||||||
} else {
|
|
||||||
tx.bwrap.ROBind = append(tx.bwrap.ROBind, [2]string{src, dest})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// ensure appends a directory ensure action
|
// home directory host path
|
||||||
func (tx *appSealTx) ensure(path string, perm os.FileMode) {
|
data string
|
||||||
tx.mkdir = append(tx.mkdir, appEnsureEntry{path, perm, false})
|
// app user home directory
|
||||||
}
|
home string
|
||||||
|
// passwd database username
|
||||||
// ensureEphemeral appends a directory ensure action with removal in rollback
|
username string
|
||||||
func (tx *appSealTx) ensureEphemeral(path string, perm os.FileMode) {
|
|
||||||
tx.mkdir = append(tx.mkdir, appEnsureEntry{path, perm, true})
|
|
||||||
}
|
|
||||||
|
|
||||||
// appACLEntry contains information for applying/reverting an ACL entry
|
|
||||||
type appACLEntry struct {
|
|
||||||
tag state.Enablement
|
|
||||||
path string
|
|
||||||
perms []acl.Perm
|
|
||||||
}
|
|
||||||
|
|
||||||
func (e *appACLEntry) ts() string {
|
|
||||||
switch e.tag {
|
|
||||||
case state.EnableLength:
|
|
||||||
return "Global"
|
|
||||||
case state.EnableLength + 1:
|
|
||||||
return "Process"
|
|
||||||
default:
|
|
||||||
return e.tag.String()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (e *appACLEntry) String() string {
|
|
||||||
var s = []byte("---")
|
|
||||||
for _, p := range e.perms {
|
|
||||||
switch p {
|
|
||||||
case acl.Read:
|
|
||||||
s[0] = 'r'
|
|
||||||
case acl.Write:
|
|
||||||
s[1] = 'w'
|
|
||||||
case acl.Execute:
|
|
||||||
s[2] = 'x'
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return string(s)
|
|
||||||
}
|
|
||||||
|
|
||||||
// updatePerm appends an untagged acl update action
|
|
||||||
func (tx *appSealTx) updatePerm(path string, perms ...acl.Perm) {
|
|
||||||
tx.updatePermTag(state.EnableLength+1, path, perms...)
|
|
||||||
}
|
|
||||||
|
|
||||||
// updatePermTag appends an acl update action
|
|
||||||
// Tagging with state.EnableLength sets cleanup to happen at final active launcher exit,
|
|
||||||
// while tagging with state.EnableLength+1 will unconditionally clean up on exit.
|
|
||||||
func (tx *appSealTx) updatePermTag(tag state.Enablement, path string, perms ...acl.Perm) {
|
|
||||||
tx.acl = append(tx.acl, &appACLEntry{tag, path, perms})
|
|
||||||
}
|
|
||||||
|
|
||||||
// changeHosts appends target username of an X11 ChangeHosts action
|
|
||||||
func (tx *appSealTx) changeHosts(username string) {
|
|
||||||
tx.xhost = append(tx.xhost, username)
|
|
||||||
}
|
|
||||||
|
|
||||||
// writeFile appends a files action
|
|
||||||
func (tx *appSealTx) writeFile(dst string, data []byte) {
|
|
||||||
tx.files = append(tx.files, [2]string{dst, string(data)})
|
|
||||||
tx.updatePerm(dst, acl.Read)
|
|
||||||
tx.bind(dst, dst, true)
|
|
||||||
}
|
|
||||||
|
|
||||||
// copyFile appends a tmpfiles action
|
|
||||||
func (tx *appSealTx) copyFile(dst, src string) {
|
|
||||||
tx.tmpfiles = append(tx.tmpfiles, [2]string{dst, src})
|
|
||||||
tx.updatePerm(dst, acl.Read)
|
|
||||||
tx.bind(dst, dst, true)
|
|
||||||
}
|
|
||||||
|
|
||||||
// link appends a hardlink action
|
|
||||||
func (tx *appSealTx) link(oldname, newname string) {
|
|
||||||
tx.hardlinks = append(tx.hardlinks, [2]string{oldname, newname})
|
|
||||||
}
|
|
||||||
|
|
||||||
type (
|
|
||||||
ChangeHostsError BaseError
|
|
||||||
EnsureDirError BaseError
|
|
||||||
TmpfileError BaseError
|
|
||||||
DBusStartError BaseError
|
|
||||||
ACLUpdateError BaseError
|
|
||||||
)
|
|
||||||
|
|
||||||
// commit applies recorded actions
|
|
||||||
// order: xhost, mkdir, files, tmpfiles, hardlinks, dbus, acl
|
|
||||||
func (tx *appSealTx) commit() error {
|
|
||||||
if tx.complete {
|
|
||||||
panic("seal transaction committed twice")
|
|
||||||
}
|
|
||||||
tx.complete = true
|
|
||||||
|
|
||||||
txp := &appSealTx{User: tx.User, bwrap: &bwrap.Config{SetEnv: make(map[string]string)}}
|
|
||||||
defer func() {
|
|
||||||
// rollback partial commit
|
|
||||||
if txp != nil {
|
|
||||||
// global changes (x11, ACLs) are always repeated and check for other launchers cannot happen here
|
|
||||||
// attempting cleanup here will cause other fortified processes to lose access to them
|
|
||||||
// a better (and more secure) fix is to proxy access to these resources and eliminate the ACLs altogether
|
|
||||||
tags := new(state.Enablements)
|
|
||||||
for e := state.Enablement(0); e < state.EnableLength+2; e++ {
|
|
||||||
tags.Set(e)
|
|
||||||
}
|
|
||||||
if err := txp.revert(tags); err != nil {
|
|
||||||
fmt.Println("fortify: errors returned reverting partial commit:", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
// insert xhost entries
|
|
||||||
for _, username := range tx.xhost {
|
|
||||||
verbose.Printf("inserting XHost entry SI:localuser:%s\n", username)
|
|
||||||
if err := xcb.ChangeHosts(xcb.HostModeInsert, xcb.FamilyServerInterpreted, "localuser\x00"+username); err != nil {
|
|
||||||
return (*ChangeHostsError)(wrapError(err,
|
|
||||||
fmt.Sprintf("cannot insert XHost entry SI:localuser:%s, %s", username, err)))
|
|
||||||
} else {
|
|
||||||
// register partial commit
|
|
||||||
txp.changeHosts(username)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// ensure directories
|
|
||||||
for _, dir := range tx.mkdir {
|
|
||||||
verbose.Println("ensuring directory mode:", dir.perm.String(), "path:", dir.path)
|
|
||||||
if err := os.Mkdir(dir.path, dir.perm); err != nil && !errors.Is(err, fs.ErrExist) {
|
|
||||||
return (*EnsureDirError)(wrapError(err,
|
|
||||||
fmt.Sprintf("cannot create directory '%s': %s", dir.path, err)))
|
|
||||||
} else {
|
|
||||||
// only ephemeral dirs require rollback
|
|
||||||
if dir.remove {
|
|
||||||
// register partial commit
|
|
||||||
txp.ensureEphemeral(dir.path, dir.perm)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// write files
|
|
||||||
for _, file := range tx.files {
|
|
||||||
verbose.Println("writing", len(file[1]), "bytes of data to", file[0])
|
|
||||||
if err := os.WriteFile(file[0], []byte(file[1]), 0600); err != nil {
|
|
||||||
return (*TmpfileError)(wrapError(err,
|
|
||||||
fmt.Sprintf("cannot write file '%s': %s", file[0], err)))
|
|
||||||
} else {
|
|
||||||
// register partial commit
|
|
||||||
txp.writeFile(file[0], make([]byte, 0)) // data not necessary for revert
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// publish tmpfiles
|
|
||||||
for _, tmpfile := range tx.tmpfiles {
|
|
||||||
verbose.Println("publishing tmpfile", tmpfile[0], "from", tmpfile[1])
|
|
||||||
if err := copyFile(tmpfile[0], tmpfile[1]); err != nil {
|
|
||||||
return (*TmpfileError)(wrapError(err,
|
|
||||||
fmt.Sprintf("cannot publish tmpfile '%s' from '%s': %s", tmpfile[0], tmpfile[1], err)))
|
|
||||||
} else {
|
|
||||||
// register partial commit
|
|
||||||
txp.copyFile(tmpfile[0], tmpfile[1])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// create hardlinks
|
|
||||||
for _, link := range tx.hardlinks {
|
|
||||||
verbose.Println("creating hardlink", link[1], "from", link[0])
|
|
||||||
if err := os.Link(link[0], link[1]); err != nil {
|
|
||||||
return (*TmpfileError)(wrapError(err,
|
|
||||||
fmt.Sprintf("cannot create hardlink '%s' from '%s': %s", link[1], link[0], err)))
|
|
||||||
} else {
|
|
||||||
// register partial commit
|
|
||||||
txp.link(link[0], link[1])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if tx.dbus != nil {
|
|
||||||
// start dbus proxy
|
|
||||||
verbose.Printf("session bus proxy on '%s' for upstream '%s'\n", tx.dbusAddr[0][1], tx.dbusAddr[0][0])
|
|
||||||
if tx.dbusSystem {
|
|
||||||
verbose.Printf("system bus proxy on '%s' for upstream '%s'\n", tx.dbusAddr[1][1], tx.dbusAddr[1][0])
|
|
||||||
}
|
|
||||||
if err := tx.startDBus(); err != nil {
|
|
||||||
return (*DBusStartError)(wrapError(err, "cannot start message bus proxy:", err))
|
|
||||||
} else {
|
|
||||||
txp.dbus = tx.dbus
|
|
||||||
txp.dbusAddr = tx.dbusAddr
|
|
||||||
txp.dbusSystem = tx.dbusSystem
|
|
||||||
txp.dbusWait = tx.dbusWait
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// apply ACLs
|
|
||||||
for _, e := range tx.acl {
|
|
||||||
verbose.Println("applying ACL", e, "uid:", tx.Uid, "tag:", e.ts(), "path:", e.path)
|
|
||||||
if err := acl.UpdatePerm(e.path, tx.uid, e.perms...); err != nil {
|
|
||||||
return (*ACLUpdateError)(wrapError(err,
|
|
||||||
fmt.Sprintf("cannot apply ACL to '%s': %s", e.path, err)))
|
|
||||||
} else {
|
|
||||||
// register partial commit
|
|
||||||
txp.updatePermTag(e.tag, e.path, e.perms...)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// disarm partial commit rollback
|
|
||||||
txp = nil
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// revert rolls back recorded actions
|
|
||||||
// order: acl, dbus, hardlinks, tmpfiles, files, mkdir, xhost
|
|
||||||
// errors are printed but not treated as fatal
|
|
||||||
func (tx *appSealTx) revert(tags *state.Enablements) error {
|
|
||||||
if tx.closed {
|
|
||||||
panic("seal transaction reverted twice")
|
|
||||||
}
|
|
||||||
tx.closed = true
|
|
||||||
|
|
||||||
// will be slightly over-sized with ephemeral dirs
|
|
||||||
errs := make([]error, 0, len(tx.acl)+1+len(tx.tmpfiles)+len(tx.mkdir)+len(tx.xhost))
|
|
||||||
joinError := func(err error, a ...any) {
|
|
||||||
var e error
|
|
||||||
if err != nil {
|
|
||||||
e = wrapError(err, a...)
|
|
||||||
}
|
|
||||||
errs = append(errs, e)
|
|
||||||
}
|
|
||||||
|
|
||||||
// revert ACLs
|
|
||||||
for _, e := range tx.acl {
|
|
||||||
if tags.Has(e.tag) {
|
|
||||||
verbose.Println("stripping ACL", e, "uid:", tx.Uid, "tag:", e.ts(), "path:", e.path)
|
|
||||||
err := acl.UpdatePerm(e.path, tx.uid)
|
|
||||||
joinError(err, fmt.Sprintf("cannot strip ACL entry from '%s': %s", e.path, err))
|
|
||||||
} else {
|
|
||||||
verbose.Println("skipping ACL", e, "uid:", tx.Uid, "tag:", e.ts(), "path:", e.path)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if tx.dbus != nil {
|
|
||||||
// stop dbus proxy
|
|
||||||
verbose.Println("terminating message bus proxy")
|
|
||||||
err := tx.stopDBus()
|
|
||||||
joinError(err, "cannot stop message bus proxy:", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// remove hardlinks
|
|
||||||
for _, link := range tx.hardlinks {
|
|
||||||
verbose.Println("removing hardlink", link[1])
|
|
||||||
err := os.Remove(link[1])
|
|
||||||
joinError(err, fmt.Sprintf("cannot remove hardlink '%s': %s", link[1], err))
|
|
||||||
}
|
|
||||||
|
|
||||||
// remove tmpfiles
|
|
||||||
for _, tmpfile := range tx.tmpfiles {
|
|
||||||
verbose.Println("removing tmpfile", tmpfile[0])
|
|
||||||
err := os.Remove(tmpfile[0])
|
|
||||||
joinError(err, fmt.Sprintf("cannot remove tmpfile '%s': %s", tmpfile[0], err))
|
|
||||||
}
|
|
||||||
|
|
||||||
// remove files
|
|
||||||
for _, file := range tx.files {
|
|
||||||
verbose.Println("removing file", file[0])
|
|
||||||
err := os.Remove(file[0])
|
|
||||||
joinError(err, fmt.Sprintf("cannot remove file '%s': %s", file[0], err))
|
|
||||||
}
|
|
||||||
|
|
||||||
// remove (empty) ephemeral directories
|
|
||||||
for i := len(tx.mkdir); i > 0; i-- {
|
|
||||||
dir := tx.mkdir[i-1]
|
|
||||||
if !dir.remove {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
verbose.Println("destroying ephemeral directory mode:", dir.perm.String(), "path:", dir.path)
|
|
||||||
err := os.Remove(dir.path)
|
|
||||||
joinError(err, fmt.Sprintf("cannot remove ephemeral directory '%s': %s", dir.path, err))
|
|
||||||
}
|
|
||||||
|
|
||||||
if tags.Has(state.EnableX) {
|
|
||||||
// rollback xhost insertions
|
|
||||||
for _, username := range tx.xhost {
|
|
||||||
verbose.Printf("deleting XHost entry SI:localuser:%s\n", username)
|
|
||||||
err := xcb.ChangeHosts(xcb.HostModeDelete, xcb.FamilyServerInterpreted, "localuser\x00"+username)
|
|
||||||
joinError(err, "cannot remove XHost entry:", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return errors.Join(errs...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// shareAll calls all share methods in sequence
|
// shareAll calls all share methods in sequence
|
||||||
func (seal *appSeal) shareAll(bus [2]*dbus.Config) error {
|
func (seal *appSeal) shareAll(bus [2]*dbus.Config, os linux.System) error {
|
||||||
if seal.shared {
|
if seal.shared {
|
||||||
panic("seal shared twice")
|
panic("seal shared twice")
|
||||||
}
|
}
|
||||||
seal.shared = true
|
seal.shared = true
|
||||||
|
|
||||||
seal.shareRuntime()
|
|
||||||
seal.shareSystem()
|
seal.shareSystem()
|
||||||
targetRuntime := seal.shareRuntimeChild()
|
seal.shareRuntime()
|
||||||
verbose.Printf("child runtime data dir '%s' configured\n", targetRuntime)
|
seal.sharePasswd(os)
|
||||||
if err := seal.shareDisplay(); err != nil {
|
if err := seal.shareDisplay(os); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if err := seal.sharePulse(); err != nil {
|
if err := seal.sharePulse(os); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -434,12 +76,11 @@ func (seal *appSeal) shareAll(bus [2]*dbus.Config) error {
|
|||||||
|
|
||||||
if err := seal.shareDBus(bus); err != nil {
|
if err := seal.shareDBus(bus); err != nil {
|
||||||
return err
|
return err
|
||||||
} else if seal.sys.dbusAddr != nil { // set if D-Bus enabled and share successful
|
}
|
||||||
verbose.Println("sealed session proxy", bus[0].Args(seal.sys.dbusAddr[0]))
|
|
||||||
if bus[1] != nil {
|
// queue overriding tmpfs at the end of seal.sys.bwrap.Filesystem
|
||||||
verbose.Println("sealed system proxy", bus[1].Args(seal.sys.dbusAddr[1]))
|
for _, dest := range seal.sys.override {
|
||||||
}
|
seal.sys.bwrap.Tmpfs(dest, 8*1024)
|
||||||
verbose.Println("message bus proxy final args:", seal.sys.dbus)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
12
internal/comp.go
Normal file
12
internal/comp.go
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
package internal
|
||||||
|
|
||||||
|
const compPoison = "INVALIDINVALIDINVALIDINVALIDINVALID"
|
||||||
|
|
||||||
|
var (
|
||||||
|
Version = compPoison
|
||||||
|
)
|
||||||
|
|
||||||
|
// Check validates string value set at compile time.
|
||||||
|
func Check(s string) (string, bool) {
|
||||||
|
return s, s != compPoison && s != ""
|
||||||
|
}
|
@ -1,34 +0,0 @@
|
|||||||
package internal
|
|
||||||
|
|
||||||
import (
|
|
||||||
"errors"
|
|
||||||
"fmt"
|
|
||||||
"io/fs"
|
|
||||||
"os"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
systemdCheckPath = "/run/systemd/system"
|
|
||||||
)
|
|
||||||
|
|
||||||
var SdBootedV = func() bool {
|
|
||||||
if v, err := SdBooted(); err != nil {
|
|
||||||
fmt.Println("warn: read systemd marker:", err)
|
|
||||||
return false
|
|
||||||
} else {
|
|
||||||
return v
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
// SdBooted implements https://www.freedesktop.org/software/systemd/man/sd_booted.html
|
|
||||||
func SdBooted() (bool, error) {
|
|
||||||
_, err := os.Stat(systemdCheckPath)
|
|
||||||
if err != nil {
|
|
||||||
if errors.Is(err, fs.ErrNotExist) {
|
|
||||||
err = nil
|
|
||||||
}
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return true, nil
|
|
||||||
}
|
|
@ -1,59 +0,0 @@
|
|||||||
package internal
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
"path"
|
|
||||||
"strconv"
|
|
||||||
"sync"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
|
||||||
)
|
|
||||||
|
|
||||||
// state that remain constant for the lifetime of the process
|
|
||||||
// fetched and cached here
|
|
||||||
|
|
||||||
const (
|
|
||||||
xdgRuntimeDir = "XDG_RUNTIME_DIR"
|
|
||||||
)
|
|
||||||
|
|
||||||
// SystemConstants contains state from the operating system
|
|
||||||
type SystemConstants struct {
|
|
||||||
// path to shared directory e.g. /tmp/fortify.%d
|
|
||||||
SharePath string `json:"share_path"`
|
|
||||||
// XDG_RUNTIME_DIR value e.g. /run/user/%d
|
|
||||||
RuntimePath string `json:"runtime_path"`
|
|
||||||
// application runtime directory e.g. /run/user/%d/fortify
|
|
||||||
RunDirPath string `json:"run_dir_path"`
|
|
||||||
}
|
|
||||||
|
|
||||||
var (
|
|
||||||
scVal SystemConstants
|
|
||||||
scOnce sync.Once
|
|
||||||
)
|
|
||||||
|
|
||||||
func copySC() {
|
|
||||||
sc := SystemConstants{
|
|
||||||
SharePath: path.Join(os.TempDir(), "fortify."+strconv.Itoa(os.Geteuid())),
|
|
||||||
}
|
|
||||||
|
|
||||||
verbose.Println("process share directory at", sc.SharePath)
|
|
||||||
|
|
||||||
// runtimePath, runDirPath
|
|
||||||
if r, ok := os.LookupEnv(xdgRuntimeDir); !ok {
|
|
||||||
fmt.Println("Env variable", xdgRuntimeDir, "unset")
|
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
|
||||||
sc.RuntimePath = r
|
|
||||||
sc.RunDirPath = path.Join(sc.RuntimePath, "fortify")
|
|
||||||
verbose.Println("XDG runtime directory at", sc.RunDirPath)
|
|
||||||
}
|
|
||||||
|
|
||||||
scVal = sc
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetSC returns a populated SystemConstants value
|
|
||||||
func GetSC() SystemConstants {
|
|
||||||
scOnce.Do(copySC)
|
|
||||||
return scVal
|
|
||||||
}
|
|
97
internal/fmsg/defer.go
Normal file
97
internal/fmsg/defer.go
Normal file
@ -0,0 +1,97 @@
|
|||||||
|
package fmsg
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"sync"
|
||||||
|
"sync/atomic"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
wstate atomic.Bool
|
||||||
|
dropped atomic.Uint64
|
||||||
|
withhold = make(chan struct{}, 1)
|
||||||
|
msgbuf = make(chan dOp, 64) // these ops are tiny so a large buffer is allocated for withholding output
|
||||||
|
|
||||||
|
dequeueOnce sync.Once
|
||||||
|
queueSync sync.WaitGroup
|
||||||
|
)
|
||||||
|
|
||||||
|
func dequeue() {
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case op := <-msgbuf:
|
||||||
|
op.Do()
|
||||||
|
queueSync.Done()
|
||||||
|
case <-withhold:
|
||||||
|
<-withhold
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
// queue submits ops to msgbuf but drops messages
|
||||||
|
// when the buffer is full and dequeue is withholding
|
||||||
|
func queue(op dOp) {
|
||||||
|
queueSync.Add(1)
|
||||||
|
|
||||||
|
select {
|
||||||
|
case msgbuf <- op:
|
||||||
|
default:
|
||||||
|
// send the op anyway if not withholding
|
||||||
|
// as dequeue will get to it eventually
|
||||||
|
if !wstate.Load() {
|
||||||
|
msgbuf <- op
|
||||||
|
} else {
|
||||||
|
queueSync.Done()
|
||||||
|
// increment dropped message count
|
||||||
|
dropped.Add(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type dOp interface{ Do() }
|
||||||
|
|
||||||
|
func Exit(code int) {
|
||||||
|
queueSync.Wait()
|
||||||
|
os.Exit(code)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Suspend() {
|
||||||
|
dequeueOnce.Do(dequeue)
|
||||||
|
if wstate.CompareAndSwap(false, true) {
|
||||||
|
queueSync.Wait()
|
||||||
|
withhold <- struct{}{}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func Resume() {
|
||||||
|
dequeueOnce.Do(dequeue)
|
||||||
|
if wstate.CompareAndSwap(true, false) {
|
||||||
|
withhold <- struct{}{}
|
||||||
|
if d := dropped.Swap(0); d != 0 {
|
||||||
|
Printf("dropped %d messages during withhold", d)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type dPrint []any
|
||||||
|
|
||||||
|
func (v dPrint) Do() {
|
||||||
|
std.Print(v...)
|
||||||
|
}
|
||||||
|
|
||||||
|
type dPrintf struct {
|
||||||
|
format string
|
||||||
|
v []any
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *dPrintf) Do() {
|
||||||
|
std.Printf(d.format, d.v...)
|
||||||
|
}
|
||||||
|
|
||||||
|
type dPrintln []any
|
||||||
|
|
||||||
|
func (v dPrintln) Do() {
|
||||||
|
std.Println(v...)
|
||||||
|
}
|
@ -1,4 +1,4 @@
|
|||||||
package app
|
package fmsg
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
@ -29,11 +29,32 @@ func (e *BaseError) Message() string {
|
|||||||
return e.message
|
return e.message
|
||||||
}
|
}
|
||||||
|
|
||||||
func wrapError(err error, a ...any) *BaseError {
|
// WrapError wraps an error with a corresponding message.
|
||||||
return &BaseError{
|
func WrapError(err error, a ...any) error {
|
||||||
message: fmt.Sprintln(a...),
|
if err == nil {
|
||||||
baseError: baseError{err},
|
return nil
|
||||||
}
|
}
|
||||||
|
return wrapError(err, fmt.Sprintln(a...))
|
||||||
|
}
|
||||||
|
|
||||||
|
// WrapErrorSuffix wraps an error with a corresponding message with err at the end of the message.
|
||||||
|
func WrapErrorSuffix(err error, a ...any) error {
|
||||||
|
if err == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return wrapError(err, fmt.Sprintln(append(a, err)...))
|
||||||
|
}
|
||||||
|
|
||||||
|
// WrapErrorFunc wraps an error with a corresponding message returned by f.
|
||||||
|
func WrapErrorFunc(err error, f func(err error) string) error {
|
||||||
|
if err == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return wrapError(err, f(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
func wrapError(err error, message string) *BaseError {
|
||||||
|
return &BaseError{message, baseError{err}}
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var (
|
40
internal/fmsg/fmsg.go
Normal file
40
internal/fmsg/fmsg.go
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
// Package fmsg provides various functions for output messages.
|
||||||
|
package fmsg
|
||||||
|
|
||||||
|
import (
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
)
|
||||||
|
|
||||||
|
var std = log.New(os.Stderr, "fortify: ", 0)
|
||||||
|
|
||||||
|
func SetPrefix(prefix string) {
|
||||||
|
prefix += ": "
|
||||||
|
std.SetPrefix(prefix)
|
||||||
|
std.SetPrefix(prefix)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Print(v ...any) {
|
||||||
|
dequeueOnce.Do(dequeue)
|
||||||
|
queue(dPrint(v))
|
||||||
|
}
|
||||||
|
|
||||||
|
func Printf(format string, v ...any) {
|
||||||
|
dequeueOnce.Do(dequeue)
|
||||||
|
queue(&dPrintf{format, v})
|
||||||
|
}
|
||||||
|
|
||||||
|
func Println(v ...any) {
|
||||||
|
dequeueOnce.Do(dequeue)
|
||||||
|
queue(dPrintln(v))
|
||||||
|
}
|
||||||
|
|
||||||
|
func Fatal(v ...any) {
|
||||||
|
Print(v...)
|
||||||
|
Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Fatalf(format string, v ...any) {
|
||||||
|
Printf(format, v...)
|
||||||
|
Exit(1)
|
||||||
|
}
|
25
internal/fmsg/verbose.go
Normal file
25
internal/fmsg/verbose.go
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
package fmsg
|
||||||
|
|
||||||
|
import "sync/atomic"
|
||||||
|
|
||||||
|
var verbose = new(atomic.Bool)
|
||||||
|
|
||||||
|
func Verbose() bool {
|
||||||
|
return verbose.Load()
|
||||||
|
}
|
||||||
|
|
||||||
|
func SetVerbose(v bool) {
|
||||||
|
verbose.Store(v)
|
||||||
|
}
|
||||||
|
|
||||||
|
func VPrintf(format string, v ...any) {
|
||||||
|
if verbose.Load() {
|
||||||
|
Printf(format, v...)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func VPrintln(v ...any) {
|
||||||
|
if verbose.Load() {
|
||||||
|
Println(v...)
|
||||||
|
}
|
||||||
|
}
|
@ -1,164 +0,0 @@
|
|||||||
package init0
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/gob"
|
|
||||||
"errors"
|
|
||||||
"flag"
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
"os/exec"
|
|
||||||
"os/signal"
|
|
||||||
"path"
|
|
||||||
"strconv"
|
|
||||||
"syscall"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
|
||||||
)
|
|
||||||
|
|
||||||
// everything beyond this point runs within pid namespace
|
|
||||||
// proceed with caution!
|
|
||||||
|
|
||||||
func doInit(fd uintptr) {
|
|
||||||
// re-exec
|
|
||||||
if len(os.Args) > 0 && os.Args[0] != "fortify" && path.IsAbs(os.Args[0]) {
|
|
||||||
if err := syscall.Exec(os.Args[0], []string{"fortify", "init"}, os.Environ()); err != nil {
|
|
||||||
fmt.Println("fortify-init: cannot re-exec self:", err)
|
|
||||||
// continue anyway
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
verbose.Prefix = "fortify-init:"
|
|
||||||
|
|
||||||
var payload Payload
|
|
||||||
p := os.NewFile(fd, "config-stream")
|
|
||||||
if p == nil {
|
|
||||||
fmt.Println("fortify-init: invalid config descriptor")
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
if err := gob.NewDecoder(p).Decode(&payload); err != nil {
|
|
||||||
fmt.Println("fortify-init: cannot decode init payload:", err)
|
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
|
||||||
// sharing stdout with parent
|
|
||||||
// USE WITH CAUTION
|
|
||||||
verbose.Set(payload.Verbose)
|
|
||||||
|
|
||||||
// child does not need to see this
|
|
||||||
if err = os.Unsetenv(EnvInit); err != nil {
|
|
||||||
fmt.Println("fortify-init: cannot unset", EnvInit+":", err)
|
|
||||||
// not fatal
|
|
||||||
} else {
|
|
||||||
verbose.Println("received configuration")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// close config fd
|
|
||||||
if err := p.Close(); err != nil {
|
|
||||||
fmt.Println("fortify-init: cannot close config fd:", err)
|
|
||||||
// not fatal
|
|
||||||
}
|
|
||||||
|
|
||||||
// die with parent
|
|
||||||
if _, _, errno := syscall.RawSyscall(syscall.SYS_PRCTL, syscall.PR_SET_PDEATHSIG, uintptr(syscall.SIGKILL), 0); errno != 0 {
|
|
||||||
fmt.Println("fortify-init: prctl(PR_SET_PDEATHSIG, SIGKILL):", errno.Error())
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd := exec.Command(payload.Argv0)
|
|
||||||
cmd.Stdin, cmd.Stdout, cmd.Stderr = os.Stdin, os.Stdout, os.Stderr
|
|
||||||
cmd.Args = payload.Argv
|
|
||||||
cmd.Env = os.Environ()
|
|
||||||
|
|
||||||
// pass wayland fd
|
|
||||||
if payload.WL != -1 {
|
|
||||||
if f := os.NewFile(uintptr(payload.WL), "wayland"); f != nil {
|
|
||||||
cmd.Env = append(cmd.Env, "WAYLAND_SOCKET="+strconv.Itoa(3+len(cmd.ExtraFiles)))
|
|
||||||
cmd.ExtraFiles = append(cmd.ExtraFiles, f)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := cmd.Start(); err != nil {
|
|
||||||
fmt.Printf("fortify-init: cannot start %q: %v", payload.Argv0, err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
|
||||||
sig := make(chan os.Signal, 2)
|
|
||||||
signal.Notify(sig, syscall.SIGINT, syscall.SIGTERM)
|
|
||||||
|
|
||||||
type winfo struct {
|
|
||||||
wpid int
|
|
||||||
wstatus syscall.WaitStatus
|
|
||||||
}
|
|
||||||
info := make(chan winfo, 1)
|
|
||||||
done := make(chan struct{})
|
|
||||||
|
|
||||||
go func() {
|
|
||||||
var (
|
|
||||||
err error
|
|
||||||
wpid = -2
|
|
||||||
wstatus syscall.WaitStatus
|
|
||||||
)
|
|
||||||
|
|
||||||
// keep going until no child process is left
|
|
||||||
for wpid != -1 {
|
|
||||||
if err != nil {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
if wpid != -2 {
|
|
||||||
info <- winfo{wpid, wstatus}
|
|
||||||
}
|
|
||||||
|
|
||||||
err = syscall.EINTR
|
|
||||||
for errors.Is(err, syscall.EINTR) {
|
|
||||||
wpid, err = syscall.Wait4(-1, &wstatus, 0, nil)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if !errors.Is(err, syscall.ECHILD) {
|
|
||||||
fmt.Println("fortify-init: unexpected wait4 response:", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
close(done)
|
|
||||||
}()
|
|
||||||
|
|
||||||
r := 2
|
|
||||||
for {
|
|
||||||
select {
|
|
||||||
case s := <-sig:
|
|
||||||
verbose.Println("received", s.String())
|
|
||||||
os.Exit(0)
|
|
||||||
case w := <-info:
|
|
||||||
if w.wpid == cmd.Process.Pid {
|
|
||||||
switch {
|
|
||||||
case w.wstatus.Exited():
|
|
||||||
r = w.wstatus.ExitStatus()
|
|
||||||
case w.wstatus.Signaled():
|
|
||||||
r = 128 + int(w.wstatus.Signal())
|
|
||||||
default:
|
|
||||||
r = 255
|
|
||||||
}
|
|
||||||
}
|
|
||||||
case <-done:
|
|
||||||
os.Exit(r)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try runs init and stops execution if FORTIFY_INIT is set.
|
|
||||||
func Try() {
|
|
||||||
if os.Getpid() != 1 {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if args := flag.Args(); len(args) == 1 && args[0] == "init" {
|
|
||||||
if s, ok := os.LookupEnv(EnvInit); ok {
|
|
||||||
if fd, err := strconv.Atoi(s); err != nil {
|
|
||||||
fmt.Printf("fortify-init: cannot parse %q: %v", s, err)
|
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
|
||||||
doInit(uintptr(fd))
|
|
||||||
}
|
|
||||||
panic("unreachable")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
70
internal/linux/interface.go
Normal file
70
internal/linux/interface.go
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
package linux
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io"
|
||||||
|
"io/fs"
|
||||||
|
"os/user"
|
||||||
|
"path"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
)
|
||||||
|
|
||||||
|
// System provides safe access to operating system resources.
|
||||||
|
type System interface {
|
||||||
|
// Geteuid provides [os.Geteuid].
|
||||||
|
Geteuid() int
|
||||||
|
// LookupEnv provides [os.LookupEnv].
|
||||||
|
LookupEnv(key string) (string, bool)
|
||||||
|
// TempDir provides [os.TempDir].
|
||||||
|
TempDir() string
|
||||||
|
// LookPath provides [exec.LookPath].
|
||||||
|
LookPath(file string) (string, error)
|
||||||
|
// Executable provides [os.Executable].
|
||||||
|
Executable() (string, error)
|
||||||
|
// LookupGroup provides [user.LookupGroup].
|
||||||
|
LookupGroup(name string) (*user.Group, error)
|
||||||
|
// ReadDir provides [os.ReadDir].
|
||||||
|
ReadDir(name string) ([]fs.DirEntry, error)
|
||||||
|
// Stat provides [os.Stat].
|
||||||
|
Stat(name string) (fs.FileInfo, error)
|
||||||
|
// Open provides [os.Open]
|
||||||
|
Open(name string) (fs.File, error)
|
||||||
|
// Exit provides [os.Exit].
|
||||||
|
Exit(code int)
|
||||||
|
// Stdout provides [os.Stdout].
|
||||||
|
Stdout() io.Writer
|
||||||
|
|
||||||
|
// Paths returns a populated [Paths] struct.
|
||||||
|
Paths() Paths
|
||||||
|
// Uid invokes fsu and returns target uid.
|
||||||
|
Uid(aid int) (int, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Paths contains environment dependent paths used by fortify.
|
||||||
|
type Paths struct {
|
||||||
|
// path to shared directory e.g. /tmp/fortify.%d
|
||||||
|
SharePath string `json:"share_path"`
|
||||||
|
// XDG_RUNTIME_DIR value e.g. /run/user/%d
|
||||||
|
RuntimePath string `json:"runtime_path"`
|
||||||
|
// application runtime directory e.g. /run/user/%d/fortify
|
||||||
|
RunDirPath string `json:"run_dir_path"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// CopyPaths is a generic implementation of [System.Paths].
|
||||||
|
func CopyPaths(os System, v *Paths) {
|
||||||
|
v.SharePath = path.Join(os.TempDir(), "fortify."+strconv.Itoa(os.Geteuid()))
|
||||||
|
|
||||||
|
fmsg.VPrintf("process share directory at %q", v.SharePath)
|
||||||
|
|
||||||
|
if r, ok := os.LookupEnv(xdgRuntimeDir); !ok || r == "" || !path.IsAbs(r) {
|
||||||
|
// fall back to path in share since fortify has no hard XDG dependency
|
||||||
|
v.RunDirPath = path.Join(v.SharePath, "run")
|
||||||
|
v.RuntimePath = path.Join(v.RunDirPath, "compat")
|
||||||
|
} else {
|
||||||
|
v.RuntimePath = r
|
||||||
|
v.RunDirPath = path.Join(v.RuntimePath, "fortify")
|
||||||
|
}
|
||||||
|
|
||||||
|
fmsg.VPrintf("runtime directory at %q", v.RunDirPath)
|
||||||
|
}
|
88
internal/linux/std.go
Normal file
88
internal/linux/std.go
Normal file
@ -0,0 +1,88 @@
|
|||||||
|
package linux
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io"
|
||||||
|
"io/fs"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"os/user"
|
||||||
|
"strconv"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/internal"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Std implements System using the standard library.
|
||||||
|
type Std struct {
|
||||||
|
paths Paths
|
||||||
|
pathsOnce sync.Once
|
||||||
|
|
||||||
|
uidOnce sync.Once
|
||||||
|
uidCopy map[int]struct {
|
||||||
|
uid int
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
uidMu sync.RWMutex
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Std) Geteuid() int { return os.Geteuid() }
|
||||||
|
func (s *Std) LookupEnv(key string) (string, bool) { return os.LookupEnv(key) }
|
||||||
|
func (s *Std) TempDir() string { return os.TempDir() }
|
||||||
|
func (s *Std) LookPath(file string) (string, error) { return exec.LookPath(file) }
|
||||||
|
func (s *Std) Executable() (string, error) { return os.Executable() }
|
||||||
|
func (s *Std) LookupGroup(name string) (*user.Group, error) { return user.LookupGroup(name) }
|
||||||
|
func (s *Std) ReadDir(name string) ([]os.DirEntry, error) { return os.ReadDir(name) }
|
||||||
|
func (s *Std) Stat(name string) (fs.FileInfo, error) { return os.Stat(name) }
|
||||||
|
func (s *Std) Open(name string) (fs.File, error) { return os.Open(name) }
|
||||||
|
func (s *Std) Exit(code int) { fmsg.Exit(code) }
|
||||||
|
func (s *Std) Stdout() io.Writer { return os.Stdout }
|
||||||
|
|
||||||
|
const xdgRuntimeDir = "XDG_RUNTIME_DIR"
|
||||||
|
|
||||||
|
func (s *Std) Paths() Paths {
|
||||||
|
s.pathsOnce.Do(func() { CopyPaths(s, &s.paths) })
|
||||||
|
return s.paths
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Std) Uid(aid int) (int, error) {
|
||||||
|
s.uidOnce.Do(func() {
|
||||||
|
s.uidCopy = make(map[int]struct {
|
||||||
|
uid int
|
||||||
|
err error
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
s.uidMu.RLock()
|
||||||
|
if u, ok := s.uidCopy[aid]; ok {
|
||||||
|
s.uidMu.RUnlock()
|
||||||
|
return u.uid, u.err
|
||||||
|
}
|
||||||
|
|
||||||
|
s.uidMu.RUnlock()
|
||||||
|
s.uidMu.Lock()
|
||||||
|
defer s.uidMu.Unlock()
|
||||||
|
|
||||||
|
u := struct {
|
||||||
|
uid int
|
||||||
|
err error
|
||||||
|
}{}
|
||||||
|
defer func() { s.uidCopy[aid] = u }()
|
||||||
|
|
||||||
|
u.uid = -1
|
||||||
|
if fsu, ok := internal.Check(internal.Fsu); !ok {
|
||||||
|
fmsg.Fatal("invalid fsu path, this copy of fshim is not compiled correctly")
|
||||||
|
panic("unreachable")
|
||||||
|
} else {
|
||||||
|
cmd := exec.Command(fsu)
|
||||||
|
cmd.Path = fsu
|
||||||
|
cmd.Stderr = os.Stderr // pass through fatal messages
|
||||||
|
cmd.Env = []string{"FORTIFY_APP_ID=" + strconv.Itoa(aid)}
|
||||||
|
cmd.Dir = "/"
|
||||||
|
var p []byte
|
||||||
|
if p, u.err = cmd.Output(); u.err == nil {
|
||||||
|
u.uid, u.err = strconv.Atoi(string(p))
|
||||||
|
}
|
||||||
|
return u.uid, u.err
|
||||||
|
}
|
||||||
|
}
|
12
internal/path.go
Normal file
12
internal/path.go
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
package internal
|
||||||
|
|
||||||
|
import "path"
|
||||||
|
|
||||||
|
var (
|
||||||
|
Fsu = compPoison
|
||||||
|
Finit = compPoison
|
||||||
|
)
|
||||||
|
|
||||||
|
func Path(p string) (string, bool) {
|
||||||
|
return p, p != compPoison && p != "" && path.IsAbs(p)
|
||||||
|
}
|
20
internal/prctl.go
Normal file
20
internal/prctl.go
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
package internal
|
||||||
|
|
||||||
|
import "syscall"
|
||||||
|
|
||||||
|
func PR_SET_DUMPABLE__SUID_DUMP_DISABLE() error {
|
||||||
|
// linux/sched/coredump.h
|
||||||
|
if _, _, errno := syscall.RawSyscall(syscall.SYS_PRCTL, syscall.PR_SET_DUMPABLE, 0, 0); errno != 0 {
|
||||||
|
return errno
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func PR_SET_PDEATHSIG__SIGKILL() error {
|
||||||
|
if _, _, errno := syscall.AllThreadsSyscall(syscall.SYS_PRCTL, syscall.PR_SET_PDEATHSIG, uintptr(syscall.SIGKILL), 0); errno != 0 {
|
||||||
|
return errno
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
42
internal/proc/fd.go
Normal file
42
internal/proc/fd.go
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
package proc
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/gob"
|
||||||
|
"errors"
|
||||||
|
"os"
|
||||||
|
"strconv"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
ErrNotSet = errors.New("environment variable not set")
|
||||||
|
ErrInvalid = errors.New("bad file descriptor")
|
||||||
|
)
|
||||||
|
|
||||||
|
func Setup(extraFiles *[]*os.File) (int, *gob.Encoder, error) {
|
||||||
|
if r, w, err := os.Pipe(); err != nil {
|
||||||
|
return -1, nil, err
|
||||||
|
} else {
|
||||||
|
fd := 3 + len(*extraFiles)
|
||||||
|
*extraFiles = append(*extraFiles, r)
|
||||||
|
return fd, gob.NewEncoder(w), nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func Receive(key string, e any) (func() error, error) {
|
||||||
|
var setup *os.File
|
||||||
|
|
||||||
|
if s, ok := os.LookupEnv(key); !ok {
|
||||||
|
return nil, ErrNotSet
|
||||||
|
} else {
|
||||||
|
if fd, err := strconv.Atoi(s); err != nil {
|
||||||
|
return nil, err
|
||||||
|
} else {
|
||||||
|
setup = os.NewFile(uintptr(fd), "setup")
|
||||||
|
if setup == nil {
|
||||||
|
return nil, ErrInvalid
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return func() error { return setup.Close() }, gob.NewDecoder(setup).Decode(e)
|
||||||
|
}
|
13
internal/proc/files.go
Normal file
13
internal/proc/files.go
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
package proc
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
)
|
||||||
|
|
||||||
|
func ExtraFile(cmd *exec.Cmd, f *os.File) (fd uintptr) {
|
||||||
|
// ExtraFiles: If non-nil, entry i becomes file descriptor 3+i.
|
||||||
|
fd = uintptr(3 + len(cmd.ExtraFiles))
|
||||||
|
cmd.ExtraFiles = append(cmd.ExtraFiles, f)
|
||||||
|
return
|
||||||
|
}
|
@ -1,188 +0,0 @@
|
|||||||
package shim
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/gob"
|
|
||||||
"errors"
|
|
||||||
"flag"
|
|
||||||
"fmt"
|
|
||||||
"net"
|
|
||||||
"os"
|
|
||||||
"path"
|
|
||||||
"strconv"
|
|
||||||
"syscall"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/helper"
|
|
||||||
init0 "git.ophivana.moe/cat/fortify/internal/init"
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
|
||||||
)
|
|
||||||
|
|
||||||
// everything beyond this point runs as target user
|
|
||||||
// proceed with caution!
|
|
||||||
|
|
||||||
func doShim(socket string) {
|
|
||||||
// re-exec
|
|
||||||
if len(os.Args) > 0 && os.Args[0] != "fortify" && path.IsAbs(os.Args[0]) {
|
|
||||||
if err := syscall.Exec(os.Args[0], []string{"fortify", "shim"}, os.Environ()); err != nil {
|
|
||||||
fmt.Println("fortify-shim: cannot re-exec self:", err)
|
|
||||||
// continue anyway
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
verbose.Prefix = "fortify-shim:"
|
|
||||||
|
|
||||||
// dial setup socket
|
|
||||||
var conn *net.UnixConn
|
|
||||||
if c, err := net.DialUnix("unix", nil, &net.UnixAddr{Name: socket, Net: "unix"}); err != nil {
|
|
||||||
fmt.Println("fortify-shim: cannot dial setup socket:", err)
|
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
|
||||||
conn = c
|
|
||||||
}
|
|
||||||
|
|
||||||
// decode payload gob stream
|
|
||||||
var payload Payload
|
|
||||||
if err := gob.NewDecoder(conn).Decode(&payload); err != nil {
|
|
||||||
fmt.Println("fortify-shim: cannot decode shim payload:", err)
|
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
|
||||||
// sharing stdout with parent
|
|
||||||
// USE WITH CAUTION
|
|
||||||
verbose.Set(payload.Verbose)
|
|
||||||
}
|
|
||||||
|
|
||||||
if payload.Bwrap == nil {
|
|
||||||
fmt.Println("fortify-shim: bwrap config not supplied")
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
|
||||||
// receive wayland fd over socket
|
|
||||||
wfd := -1
|
|
||||||
if payload.WL {
|
|
||||||
if fd, err := receiveWLfd(conn); err != nil {
|
|
||||||
fmt.Println("fortify-shim: cannot receive wayland fd:", err)
|
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
|
||||||
wfd = fd
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// close setup socket
|
|
||||||
if err := conn.Close(); err != nil {
|
|
||||||
fmt.Println("fortify-shim: cannot close setup socket:", err)
|
|
||||||
// not fatal
|
|
||||||
}
|
|
||||||
|
|
||||||
var ic init0.Payload
|
|
||||||
|
|
||||||
// resolve argv0
|
|
||||||
ic.Argv = payload.Argv
|
|
||||||
if len(ic.Argv) > 0 {
|
|
||||||
// looked up from $PATH by parent
|
|
||||||
ic.Argv0 = payload.Exec[2]
|
|
||||||
} else {
|
|
||||||
// no argv, look up shell instead
|
|
||||||
var ok bool
|
|
||||||
if ic.Argv0, ok = os.LookupEnv("SHELL"); !ok {
|
|
||||||
fmt.Println("fortify-shim: no command was specified and $SHELL was unset")
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
|
||||||
ic.Argv = []string{ic.Argv0}
|
|
||||||
}
|
|
||||||
|
|
||||||
conf := payload.Bwrap
|
|
||||||
|
|
||||||
var extraFiles []*os.File
|
|
||||||
|
|
||||||
// pass wayland fd
|
|
||||||
if wfd != -1 {
|
|
||||||
if f := os.NewFile(uintptr(wfd), "wayland"); f != nil {
|
|
||||||
ic.WL = 3 + len(extraFiles)
|
|
||||||
extraFiles = append(extraFiles, f)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
ic.WL = -1
|
|
||||||
}
|
|
||||||
|
|
||||||
// share config pipe
|
|
||||||
if r, w, err := os.Pipe(); err != nil {
|
|
||||||
fmt.Println("fortify-shim: cannot pipe:", err)
|
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
|
||||||
conf.SetEnv[init0.EnvInit] = strconv.Itoa(3 + len(extraFiles))
|
|
||||||
extraFiles = append(extraFiles, r)
|
|
||||||
|
|
||||||
verbose.Println("transmitting config to init")
|
|
||||||
go func() {
|
|
||||||
// stream config to pipe
|
|
||||||
if err = gob.NewEncoder(w).Encode(&ic); err != nil {
|
|
||||||
fmt.Println("fortify-shim: cannot transmit init config:", err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
}
|
|
||||||
|
|
||||||
helper.BubblewrapName = payload.Exec[1] // resolved bwrap path by parent
|
|
||||||
if b, err := helper.NewBwrap(conf, nil, payload.Exec[0], func(int, int) []string { return []string{"init"} }); err != nil {
|
|
||||||
fmt.Println("fortify-shim: malformed sandbox config:", err)
|
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
|
||||||
cmd := b.Unwrap()
|
|
||||||
cmd.Stdin, cmd.Stdout, cmd.Stderr = os.Stdin, os.Stdout, os.Stderr
|
|
||||||
cmd.ExtraFiles = extraFiles
|
|
||||||
|
|
||||||
if verbose.Get() {
|
|
||||||
verbose.Println("bwrap args:", conf.Args())
|
|
||||||
}
|
|
||||||
|
|
||||||
// run and pass through exit code
|
|
||||||
if err = b.Start(); err != nil {
|
|
||||||
fmt.Println("fortify-shim: cannot start target process:", err)
|
|
||||||
os.Exit(1)
|
|
||||||
} else if err = b.Wait(); err != nil {
|
|
||||||
verbose.Println("wait:", err)
|
|
||||||
}
|
|
||||||
if b.Unwrap().ProcessState != nil {
|
|
||||||
os.Exit(b.Unwrap().ProcessState.ExitCode())
|
|
||||||
} else {
|
|
||||||
os.Exit(127)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func receiveWLfd(conn *net.UnixConn) (int, error) {
|
|
||||||
oob := make([]byte, syscall.CmsgSpace(4)) // single fd
|
|
||||||
|
|
||||||
if _, oobn, _, _, err := conn.ReadMsgUnix(nil, oob); err != nil {
|
|
||||||
return -1, err
|
|
||||||
} else if len(oob) != oobn {
|
|
||||||
return -1, errors.New("invalid message length")
|
|
||||||
}
|
|
||||||
|
|
||||||
var msg syscall.SocketControlMessage
|
|
||||||
if messages, err := syscall.ParseSocketControlMessage(oob); err != nil {
|
|
||||||
return -1, err
|
|
||||||
} else if len(messages) != 1 {
|
|
||||||
return -1, errors.New("unexpected message count")
|
|
||||||
} else {
|
|
||||||
msg = messages[0]
|
|
||||||
}
|
|
||||||
|
|
||||||
if fds, err := syscall.ParseUnixRights(&msg); err != nil {
|
|
||||||
return -1, err
|
|
||||||
} else if len(fds) != 1 {
|
|
||||||
return -1, errors.New("unexpected fd count")
|
|
||||||
} else {
|
|
||||||
return fds[0], nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try runs shim and stops execution if FORTIFY_SHIM is set.
|
|
||||||
func Try() {
|
|
||||||
if args := flag.Args(); len(args) == 1 && args[0] == "shim" {
|
|
||||||
if s, ok := os.LookupEnv(EnvShim); ok {
|
|
||||||
doShim(s)
|
|
||||||
panic("unreachable")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,82 +0,0 @@
|
|||||||
package shim
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/gob"
|
|
||||||
"errors"
|
|
||||||
"fmt"
|
|
||||||
"net"
|
|
||||||
"os"
|
|
||||||
"syscall"
|
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
|
||||||
)
|
|
||||||
|
|
||||||
// called in the parent process
|
|
||||||
|
|
||||||
func ServeConfig(socket string, payload *Payload, wl string, done chan struct{}) (*net.UnixConn, error) {
|
|
||||||
var ws *net.UnixConn
|
|
||||||
if payload.WL {
|
|
||||||
if f, err := net.DialUnix("unix", nil, &net.UnixAddr{Name: wl, Net: "unix"}); err != nil {
|
|
||||||
return nil, err
|
|
||||||
} else {
|
|
||||||
verbose.Println("connected to wayland at", wl)
|
|
||||||
ws = f
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if c, err := net.ListenUnix("unix", &net.UnixAddr{Name: socket, Net: "unix"}); err != nil {
|
|
||||||
return nil, err
|
|
||||||
} else {
|
|
||||||
verbose.Println("configuring shim on socket", socket)
|
|
||||||
if err = os.Chmod(socket, 0777); err != nil {
|
|
||||||
fmt.Println("fortify: cannot change permissions of shim setup socket:", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
go func() {
|
|
||||||
var conn *net.UnixConn
|
|
||||||
if conn, err = c.AcceptUnix(); err != nil {
|
|
||||||
fmt.Println("fortify: cannot accept connection from shim:", err)
|
|
||||||
} else {
|
|
||||||
if err = gob.NewEncoder(conn).Encode(*payload); err != nil {
|
|
||||||
fmt.Println("fortify: cannot stream shim payload:", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if payload.WL {
|
|
||||||
// get raw connection
|
|
||||||
var rc syscall.RawConn
|
|
||||||
if rc, err = ws.SyscallConn(); err != nil {
|
|
||||||
fmt.Println("fortify: cannot obtain raw wayland connection:", err)
|
|
||||||
return
|
|
||||||
} else {
|
|
||||||
go func() {
|
|
||||||
// pass wayland socket fd
|
|
||||||
if err = rc.Control(func(fd uintptr) {
|
|
||||||
if _, _, err = conn.WriteMsgUnix(nil, syscall.UnixRights(int(fd)), nil); err != nil {
|
|
||||||
fmt.Println("fortify: cannot pass wayland connection to shim:", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
_ = conn.Close()
|
|
||||||
|
|
||||||
// block until shim exits
|
|
||||||
<-done
|
|
||||||
verbose.Println("releasing wayland connection")
|
|
||||||
}); err != nil {
|
|
||||||
fmt.Println("fortify: cannot obtain wayland connection fd:", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
_ = conn.Close()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if err = c.Close(); err != nil {
|
|
||||||
fmt.Println("fortify: cannot close shim socket:", err)
|
|
||||||
}
|
|
||||||
if err = os.Remove(socket); err != nil && !errors.Is(err, os.ErrNotExist) {
|
|
||||||
fmt.Println("fortify: cannot remove dangling shim socket:", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
return ws, nil
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,19 +0,0 @@
|
|||||||
package shim
|
|
||||||
|
|
||||||
import "git.ophivana.moe/cat/fortify/helper/bwrap"
|
|
||||||
|
|
||||||
const EnvShim = "FORTIFY_SHIM"
|
|
||||||
|
|
||||||
type Payload struct {
|
|
||||||
// child full argv
|
|
||||||
Argv []string
|
|
||||||
// fortify, bwrap, target full exec path
|
|
||||||
Exec [3]string
|
|
||||||
// bwrap config
|
|
||||||
Bwrap *bwrap.Config
|
|
||||||
// whether to pass wayland fd
|
|
||||||
WL bool
|
|
||||||
|
|
||||||
// verbosity pass through
|
|
||||||
Verbose bool
|
|
||||||
}
|
|
292
internal/state/multi.go
Normal file
292
internal/state/multi.go
Normal file
@ -0,0 +1,292 @@
|
|||||||
|
package state
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/gob"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io/fs"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"strconv"
|
||||||
|
"sync"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/fst"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
)
|
||||||
|
|
||||||
|
// fine-grained locking and access
|
||||||
|
type multiStore struct {
|
||||||
|
base string
|
||||||
|
|
||||||
|
// initialised backends
|
||||||
|
backends *sync.Map
|
||||||
|
|
||||||
|
lock sync.RWMutex
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *multiStore) Do(aid int, f func(c Cursor)) (bool, error) {
|
||||||
|
s.lock.RLock()
|
||||||
|
defer s.lock.RUnlock()
|
||||||
|
|
||||||
|
// load or initialise new backend
|
||||||
|
b := new(multiBackend)
|
||||||
|
if v, ok := s.backends.LoadOrStore(aid, b); ok {
|
||||||
|
b = v.(*multiBackend)
|
||||||
|
} else {
|
||||||
|
b.lock.Lock()
|
||||||
|
b.path = path.Join(s.base, strconv.Itoa(aid))
|
||||||
|
|
||||||
|
// ensure directory
|
||||||
|
if err := os.MkdirAll(b.path, 0700); err != nil && !errors.Is(err, fs.ErrExist) {
|
||||||
|
s.backends.CompareAndDelete(aid, b)
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// open locker file
|
||||||
|
if l, err := os.OpenFile(b.path+".lock", os.O_RDWR|os.O_CREATE, 0600); err != nil {
|
||||||
|
s.backends.CompareAndDelete(aid, b)
|
||||||
|
return false, err
|
||||||
|
} else {
|
||||||
|
b.lockfile = l
|
||||||
|
}
|
||||||
|
b.lock.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
// lock backend
|
||||||
|
if err := b.lockFile(); err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// expose backend methods without exporting the pointer
|
||||||
|
c := new(struct{ *multiBackend })
|
||||||
|
c.multiBackend = b
|
||||||
|
f(b)
|
||||||
|
// disable access to the backend on a best-effort basis
|
||||||
|
c.multiBackend = nil
|
||||||
|
|
||||||
|
// unlock backend
|
||||||
|
return true, b.unlockFile()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *multiStore) List() ([]int, error) {
|
||||||
|
var entries []os.DirEntry
|
||||||
|
|
||||||
|
// read base directory to get all aids
|
||||||
|
if v, err := os.ReadDir(s.base); err != nil && !errors.Is(err, os.ErrNotExist) {
|
||||||
|
return nil, err
|
||||||
|
} else {
|
||||||
|
entries = v
|
||||||
|
}
|
||||||
|
|
||||||
|
aidsBuf := make([]int, 0, len(entries))
|
||||||
|
for _, e := range entries {
|
||||||
|
// skip non-directories
|
||||||
|
if !e.IsDir() {
|
||||||
|
fmsg.VPrintf("skipped non-directory entry %q", e.Name())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// skip non-numerical names
|
||||||
|
if v, err := strconv.Atoi(e.Name()); err != nil {
|
||||||
|
fmsg.VPrintf("skipped non-aid entry %q", e.Name())
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
if v < 0 || v > 9999 {
|
||||||
|
fmsg.VPrintf("skipped out of bounds entry %q", e.Name())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
aidsBuf = append(aidsBuf, v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return append([]int(nil), aidsBuf...), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *multiStore) Close() error {
|
||||||
|
s.lock.Lock()
|
||||||
|
defer s.lock.Unlock()
|
||||||
|
|
||||||
|
var errs []error
|
||||||
|
s.backends.Range(func(_, value any) bool {
|
||||||
|
b := value.(*multiBackend)
|
||||||
|
errs = append(errs, b.close())
|
||||||
|
return true
|
||||||
|
})
|
||||||
|
|
||||||
|
return errors.Join(errs...)
|
||||||
|
}
|
||||||
|
|
||||||
|
type multiBackend struct {
|
||||||
|
path string
|
||||||
|
|
||||||
|
// created/opened by prepare
|
||||||
|
lockfile *os.File
|
||||||
|
|
||||||
|
lock sync.RWMutex
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *multiBackend) filename(id *fst.ID) string {
|
||||||
|
return path.Join(b.path, id.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *multiBackend) lockFileAct(lt int) (err error) {
|
||||||
|
op := "LockAct"
|
||||||
|
switch lt {
|
||||||
|
case syscall.LOCK_EX:
|
||||||
|
op = "Lock"
|
||||||
|
case syscall.LOCK_UN:
|
||||||
|
op = "Unlock"
|
||||||
|
}
|
||||||
|
|
||||||
|
for {
|
||||||
|
err = syscall.Flock(int(b.lockfile.Fd()), lt)
|
||||||
|
if !errors.Is(err, syscall.EINTR) {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return &fs.PathError{
|
||||||
|
Op: op,
|
||||||
|
Path: b.lockfile.Name(),
|
||||||
|
Err: err,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *multiBackend) lockFile() error {
|
||||||
|
return b.lockFileAct(syscall.LOCK_EX)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *multiBackend) unlockFile() error {
|
||||||
|
return b.lockFileAct(syscall.LOCK_UN)
|
||||||
|
}
|
||||||
|
|
||||||
|
// reads all launchers in simpleBackend
|
||||||
|
// file contents are ignored if decode is false
|
||||||
|
func (b *multiBackend) load(decode bool) (Entries, error) {
|
||||||
|
b.lock.RLock()
|
||||||
|
defer b.lock.RUnlock()
|
||||||
|
|
||||||
|
// read directory contents, should only contain files named after ids
|
||||||
|
var entries []os.DirEntry
|
||||||
|
if pl, err := os.ReadDir(b.path); err != nil {
|
||||||
|
return nil, err
|
||||||
|
} else {
|
||||||
|
entries = pl
|
||||||
|
}
|
||||||
|
|
||||||
|
// allocate as if every entry is valid
|
||||||
|
// since that should be the case assuming no external interference happens
|
||||||
|
r := make(Entries, len(entries))
|
||||||
|
|
||||||
|
for _, e := range entries {
|
||||||
|
if e.IsDir() {
|
||||||
|
return nil, fmt.Errorf("unexpected directory %q in store", e.Name())
|
||||||
|
}
|
||||||
|
|
||||||
|
id := new(fst.ID)
|
||||||
|
if err := fst.ParseAppID(id, e.Name()); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// run in a function to better handle file closing
|
||||||
|
if err := func() error {
|
||||||
|
// open state file for reading
|
||||||
|
if f, err := os.Open(path.Join(b.path, e.Name())); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
defer func() {
|
||||||
|
if f.Close() != nil {
|
||||||
|
// unreachable
|
||||||
|
panic("foreign state file closed prematurely")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
s := new(State)
|
||||||
|
r[*id] = s
|
||||||
|
|
||||||
|
// append regardless, but only parse if required, used to implement Len
|
||||||
|
if decode {
|
||||||
|
if err = gob.NewDecoder(f).Decode(s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if s.ID != *id {
|
||||||
|
return fmt.Errorf("state entry %s has unexpected id %s", id, &s.ID)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return r, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Save writes process state to filesystem
|
||||||
|
func (b *multiBackend) Save(state *State) error {
|
||||||
|
b.lock.Lock()
|
||||||
|
defer b.lock.Unlock()
|
||||||
|
|
||||||
|
if state.Config == nil {
|
||||||
|
return errors.New("state does not contain config")
|
||||||
|
}
|
||||||
|
|
||||||
|
statePath := b.filename(&state.ID)
|
||||||
|
|
||||||
|
// create and open state data file
|
||||||
|
if f, err := os.OpenFile(statePath, os.O_RDWR|os.O_CREATE|os.O_EXCL, 0600); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
defer func() {
|
||||||
|
if f.Close() != nil {
|
||||||
|
// unreachable
|
||||||
|
panic("state file closed prematurely")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
// encode into state file
|
||||||
|
return gob.NewEncoder(f).Encode(state)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *multiBackend) Destroy(id fst.ID) error {
|
||||||
|
b.lock.Lock()
|
||||||
|
defer b.lock.Unlock()
|
||||||
|
|
||||||
|
return os.Remove(b.filename(&id))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *multiBackend) Load() (Entries, error) {
|
||||||
|
return b.load(true)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *multiBackend) Len() (int, error) {
|
||||||
|
// rn consists of only nil entries but has the correct length
|
||||||
|
rn, err := b.load(false)
|
||||||
|
return len(rn), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *multiBackend) close() error {
|
||||||
|
b.lock.Lock()
|
||||||
|
defer b.lock.Unlock()
|
||||||
|
|
||||||
|
err := b.lockfile.Close()
|
||||||
|
if err == nil || errors.Is(err, os.ErrInvalid) || errors.Is(err, os.ErrClosed) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewMulti returns an instance of the multi-file store.
|
||||||
|
func NewMulti(runDir string) Store {
|
||||||
|
b := new(multiStore)
|
||||||
|
b.base = path.Join(runDir, "state")
|
||||||
|
b.backends = new(sync.Map)
|
||||||
|
return b
|
||||||
|
}
|
11
internal/state/multi_test.go
Normal file
11
internal/state/multi_test.go
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
package state_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/state"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestMulti(t *testing.T) {
|
||||||
|
testStore(t, state.NewMulti(t.TempDir()))
|
||||||
|
}
|
@ -1,62 +1,45 @@
|
|||||||
package state
|
package state
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
|
||||||
"strconv"
|
|
||||||
"strings"
|
"strings"
|
||||||
"text/tabwriter"
|
"text/tabwriter"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"git.ophivana.moe/cat/fortify/internal/verbose"
|
"git.gensokyo.uk/security/fortify/internal/fmsg"
|
||||||
|
"git.gensokyo.uk/security/fortify/internal/system"
|
||||||
)
|
)
|
||||||
|
|
||||||
// MustPrintLauncherStateSimpleGlobal prints active launcher states of all simple stores
|
// MustPrintLauncherStateSimpleGlobal prints active launcher states of all simple stores
|
||||||
// in an implementation-specific way.
|
// in an implementation-specific way.
|
||||||
func MustPrintLauncherStateSimpleGlobal(w **tabwriter.Writer, runDir string) {
|
func MustPrintLauncherStateSimpleGlobal(w **tabwriter.Writer, runDir string) {
|
||||||
now := time.Now().UTC()
|
now := time.Now().UTC()
|
||||||
|
s := NewMulti(runDir)
|
||||||
|
|
||||||
// read runtime directory to get all UIDs
|
// read runtime directory to get all UIDs
|
||||||
if dirs, err := os.ReadDir(path.Join(runDir, "state")); err != nil && !errors.Is(err, os.ErrNotExist) {
|
if aids, err := s.List(); err != nil {
|
||||||
fmt.Println("cannot read runtime directory:", err)
|
fmsg.Fatal("cannot list store:", err)
|
||||||
os.Exit(1)
|
|
||||||
} else {
|
} else {
|
||||||
for _, e := range dirs {
|
for _, aid := range aids {
|
||||||
// skip non-directories
|
|
||||||
if !e.IsDir() {
|
|
||||||
verbose.Println("skipped non-directory entry", e.Name())
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// skip non-numerical names
|
|
||||||
if _, err = strconv.Atoi(e.Name()); err != nil {
|
|
||||||
verbose.Println("skipped non-uid entry", e.Name())
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// obtain temporary store
|
|
||||||
s := NewSimple(runDir, e.Name()).(*simpleStore)
|
|
||||||
|
|
||||||
// print states belonging to this store
|
// print states belonging to this store
|
||||||
s.mustPrintLauncherState(w, now)
|
s.(*multiStore).mustPrintLauncherState(aid, w, now)
|
||||||
|
|
||||||
// mustPrintLauncherState causes store activity so store needs to be closed
|
|
||||||
if err = s.Close(); err != nil {
|
|
||||||
fmt.Printf("warn: error closing store for user %s: %s\n", e.Name(), err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// mustPrintLauncherState causes store activity so store needs to be closed
|
||||||
|
if err := s.Close(); err != nil {
|
||||||
|
fmsg.Printf("cannot close store: %v", err)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *simpleStore) mustPrintLauncherState(w **tabwriter.Writer, now time.Time) {
|
func (s *multiStore) mustPrintLauncherState(aid int, w **tabwriter.Writer, now time.Time) {
|
||||||
var innerErr error
|
var innerErr error
|
||||||
|
|
||||||
if ok, err := s.Do(func(b Backend) {
|
if ok, err := s.Do(aid, func(c Cursor) {
|
||||||
innerErr = func() error {
|
innerErr = func() error {
|
||||||
// read launcher states
|
// read launcher states
|
||||||
states, err := b.Load()
|
states, err := c.Load()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@ -66,11 +49,11 @@ func (s *simpleStore) mustPrintLauncherState(w **tabwriter.Writer, now time.Time
|
|||||||
*w = tabwriter.NewWriter(os.Stdout, 0, 1, 4, ' ', 0)
|
*w = tabwriter.NewWriter(os.Stdout, 0, 1, 4, ' ', 0)
|
||||||
|
|
||||||
// write header when initialising
|
// write header when initialising
|
||||||
if !verbose.Get() {
|
if !fmsg.Verbose() {
|
||||||
_, _ = fmt.Fprintln(*w, "\tUID\tPID\tUptime\tEnablements\tLauncher\tCommand")
|
_, _ = fmt.Fprintln(*w, "\tPID\tApp\tUptime\tEnablements\tCommand")
|
||||||
} else {
|
} else {
|
||||||
// argv is emitted in body when verbose
|
// argv is emitted in body when verbose
|
||||||
_, _ = fmt.Fprintln(*w, "\tUID\tPID\tArgv")
|
_, _ = fmt.Fprintln(*w, "\tPID\tApp\tArgv")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -82,42 +65,54 @@ func (s *simpleStore) mustPrintLauncherState(w **tabwriter.Writer, now time.Time
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
// build enablements string
|
// build enablements and command string
|
||||||
ets := strings.Builder{}
|
var (
|
||||||
// append enablement strings in order
|
ets *strings.Builder
|
||||||
for i := Enablement(0); i < EnableLength; i++ {
|
cs = "(No command information)"
|
||||||
if state.Capability.Has(i) {
|
)
|
||||||
ets.WriteString(", " + i.String())
|
|
||||||
|
// check if enablements are provided
|
||||||
|
if state.Config != nil {
|
||||||
|
ets = new(strings.Builder)
|
||||||
|
// append enablement strings in order
|
||||||
|
for i := system.Enablement(0); i < system.Enablement(system.ELen); i++ {
|
||||||
|
if state.Config.Confinement.Enablements.Has(i) {
|
||||||
|
ets.WriteString(", " + i.String())
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
cs = fmt.Sprintf("%q", state.Config.Command)
|
||||||
}
|
}
|
||||||
// prevent an empty string when
|
if ets != nil {
|
||||||
if ets.Len() == 0 {
|
// prevent an empty string
|
||||||
ets.WriteString("(No enablements)")
|
if ets.Len() == 0 {
|
||||||
|
ets.WriteString("(No enablements)")
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
ets = new(strings.Builder)
|
||||||
|
ets.WriteString("(No confinement information)")
|
||||||
}
|
}
|
||||||
|
|
||||||
if !verbose.Get() {
|
if !fmsg.Verbose() {
|
||||||
_, _ = fmt.Fprintf(*w, "\t%s\t%d\t%s\t%s\t%s\t%s\n",
|
_, _ = fmt.Fprintf(*w, "\t%d\t%d\t%s\t%s\t%s\n",
|
||||||
s.path[len(s.path)-1], state.PID, now.Sub(state.Time).Round(time.Second).String(), strings.TrimPrefix(ets.String(), ", "), state.Launcher,
|
state.PID, aid, now.Sub(state.Time).Round(time.Second).String(), strings.TrimPrefix(ets.String(), ", "), cs)
|
||||||
state.Command)
|
|
||||||
} else {
|
} else {
|
||||||
// emit argv instead when verbose
|
// emit argv instead when verbose
|
||||||
_, _ = fmt.Fprintf(*w, "\t%s\t%d\t%s\n",
|
_, _ = fmt.Fprintf(*w, "\t%d\t%d\t%s\n",
|
||||||
s.path[len(s.path)-1], state.PID, state.Argv)
|
state.PID, aid, state.ID)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}()
|
}()
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
fmt.Printf("cannot perform action on store '%s': %s\n", path.Join(s.path...), err)
|
fmsg.Printf("cannot perform action on app %d: %v", aid, err)
|
||||||
if !ok {
|
if !ok {
|
||||||
fmt.Println("warn: store faulted before printing")
|
fmsg.Fatal("store faulted before printing")
|
||||||
os.Exit(1)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if innerErr != nil {
|
if innerErr != nil {
|
||||||
fmt.Printf("cannot print launcher state for store '%s': %s\n", path.Join(s.path...), innerErr)
|
fmsg.Fatalf("cannot print launcher state of app %d: %s", aid, innerErr)
|
||||||
os.Exit(1)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user