This removes the requirement to call fmsg.Exit on every exit path, and enables direct use of the "log" package. However, fmsg.BeforeExit is still encouraged when possible to catch exit on suspended output. Signed-off-by: Ophestra <cat@gensokyo.uk>
98 lines
2.5 KiB
Go
98 lines
2.5 KiB
Go
package linux
|
|
|
|
import (
|
|
"errors"
|
|
"io/fs"
|
|
"log"
|
|
"os"
|
|
"os/exec"
|
|
"os/user"
|
|
"path/filepath"
|
|
"strconv"
|
|
"sync"
|
|
"syscall"
|
|
|
|
"git.gensokyo.uk/security/fortify/internal"
|
|
)
|
|
|
|
// Std implements System using the standard library.
|
|
type Std struct {
|
|
paths Paths
|
|
pathsOnce sync.Once
|
|
|
|
uidOnce sync.Once
|
|
uidCopy map[int]struct {
|
|
uid int
|
|
err error
|
|
}
|
|
uidMu sync.RWMutex
|
|
}
|
|
|
|
func (s *Std) Geteuid() int { return os.Geteuid() }
|
|
func (s *Std) LookupEnv(key string) (string, bool) { return os.LookupEnv(key) }
|
|
func (s *Std) TempDir() string { return os.TempDir() }
|
|
func (s *Std) LookPath(file string) (string, error) { return exec.LookPath(file) }
|
|
func (s *Std) MustExecutable() string { return internal.MustExecutable() }
|
|
func (s *Std) LookupGroup(name string) (*user.Group, error) { return user.LookupGroup(name) }
|
|
func (s *Std) ReadDir(name string) ([]os.DirEntry, error) { return os.ReadDir(name) }
|
|
func (s *Std) Stat(name string) (fs.FileInfo, error) { return os.Stat(name) }
|
|
func (s *Std) Open(name string) (fs.File, error) { return os.Open(name) }
|
|
func (s *Std) EvalSymlinks(path string) (string, error) { return filepath.EvalSymlinks(path) }
|
|
func (s *Std) Exit(code int) { internal.Exit(code) }
|
|
|
|
const xdgRuntimeDir = "XDG_RUNTIME_DIR"
|
|
|
|
func (s *Std) Paths() Paths {
|
|
s.pathsOnce.Do(func() { CopyPaths(s, &s.paths) })
|
|
return s.paths
|
|
}
|
|
|
|
func (s *Std) Uid(aid int) (int, error) {
|
|
s.uidOnce.Do(func() {
|
|
s.uidCopy = make(map[int]struct {
|
|
uid int
|
|
err error
|
|
})
|
|
})
|
|
|
|
s.uidMu.RLock()
|
|
if u, ok := s.uidCopy[aid]; ok {
|
|
s.uidMu.RUnlock()
|
|
return u.uid, u.err
|
|
}
|
|
|
|
s.uidMu.RUnlock()
|
|
s.uidMu.Lock()
|
|
defer s.uidMu.Unlock()
|
|
|
|
u := struct {
|
|
uid int
|
|
err error
|
|
}{}
|
|
defer func() { s.uidCopy[aid] = u }()
|
|
|
|
u.uid = -1
|
|
if fsu, ok := internal.Check(internal.Fsu); !ok {
|
|
log.Fatal("invalid fsu path, this copy of fortify is not compiled correctly")
|
|
// unreachable
|
|
return 0, syscall.EBADE
|
|
} else {
|
|
cmd := exec.Command(fsu)
|
|
cmd.Path = fsu
|
|
cmd.Stderr = os.Stderr // pass through fatal messages
|
|
cmd.Env = []string{"FORTIFY_APP_ID=" + strconv.Itoa(aid)}
|
|
cmd.Dir = "/"
|
|
var (
|
|
p []byte
|
|
exitError *exec.ExitError
|
|
)
|
|
|
|
if p, u.err = cmd.Output(); u.err == nil {
|
|
u.uid, u.err = strconv.Atoi(string(p))
|
|
} else if errors.As(u.err, &exitError) && exitError != nil && exitError.ExitCode() == 1 {
|
|
u.err = syscall.EACCES
|
|
}
|
|
return u.uid, u.err
|
|
}
|
|
}
|