priv_sep.rs (8123B)
1 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 2 pub use priv_sep::UnveilErr; 3 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 4 use priv_sep::{self, Permission, Permissions, Promise, Promises}; 5 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 6 use std::env; 7 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 8 use std::fs; 9 use std::{ 10 io::{Error, ErrorKind}, 11 path::Path, 12 }; 13 /// Used instead of `()` for the parameter 14 /// in the `pledge` functions. This allows 15 /// one to avoid having to disable certain lints. 16 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 17 #[derive(Clone, Copy)] 18 pub struct Zst; 19 /// Calls `pledge` with only the sys calls necessary for a minimal application 20 /// to run. Specifically, the `Promise`s `Cpath`, `Dns`, `Inet`, `Rpath`, `Stdio`, `Unveil`, and `Wpath` 21 /// are passed. 22 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 23 pub fn pledge_init() -> Result<Promises, Error> { 24 let promises = Promises::new([ 25 Promise::Cpath, 26 Promise::Dns, 27 Promise::Inet, 28 Promise::Rpath, 29 Promise::Stdio, 30 Promise::Unveil, 31 Promise::Wpath, 32 ]); 33 match promises.pledge() { 34 Ok(()) => Ok(promises), 35 Err(e) => Err(e), 36 } 37 } 38 /// No-op that always returns `Ok`. 39 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 40 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 41 pub const fn pledge_init() -> Result<Zst, !> { 42 Ok(Zst) 43 } 44 /// Removes `Cpath` and `Wpath` `Promise`s. 45 /// 46 /// This should only be called when `stdout` is written to 47 /// instead of an RPZ file. 48 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 49 pub fn pledge_away_create_write(promises: &mut Promises) -> Result<(), Error> { 50 promises.remove_promises_then_pledge([Promise::Cpath, Promise::Wpath]) 51 } 52 /// No-op that always returns `Ok`. 53 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 54 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 55 pub const fn pledge_away_create_write(_: &mut Zst) -> Result<(), !> { 56 Ok(()) 57 } 58 /// Removes `Promise::Unveil`. 59 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 60 pub fn pledge_away_unveil(promises: &mut Promises) -> Result<(), Error> { 61 promises.remove_then_pledge(Promise::Unveil) 62 } 63 /// No-op that always returns `Ok`. 64 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 65 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 66 pub const fn pledge_away_unveil(_: &mut Zst) -> Result<(), !> { 67 Ok(()) 68 } 69 /// Removes `Promise::Dns` and `Promise::Inet`. 70 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 71 pub fn pledge_away_net(promises: &mut Promises) -> Result<(), Error> { 72 promises.remove_promises_then_pledge([Promise::Dns, Promise::Inet]) 73 } 74 /// No-op that always returns `Ok`. 75 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 76 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 77 pub const fn pledge_away_net(_: &mut Zst) -> Result<(), !> { 78 Ok(()) 79 } 80 /// Removes all `Promise`s except `Stdio`. 81 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 82 pub fn pledge_away_all_but_stdio(promises: &mut Promises) -> Result<(), Error> { 83 promises.retain_then_pledge([Promise::Stdio]) 84 } 85 /// No-op that always returns `Ok`. 86 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 87 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 88 pub const fn pledge_away_all_but_stdio(_: &mut Zst) -> Result<(), !> { 89 Ok(()) 90 } 91 /// Calls `unveil`_on `path` with no `Permissions`. 92 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 93 pub fn unveil_none<P: AsRef<Path>>(path: P) -> Result<(), UnveilErr> { 94 Permissions::NONE.unveil(path) 95 } 96 /// No-op that always returns `Ok`. 97 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 98 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 99 pub fn unveil_none<P: AsRef<Path>>(_: P) -> Result<(), !> { 100 Ok(()) 101 } 102 /// Calls `unveil_none` on `/`. 103 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 104 pub fn veil_all() -> Result<(), UnveilErr> { 105 unveil_none("/") 106 } 107 /// No-op that always returns `Ok`. 108 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 109 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 110 pub const fn veil_all() -> Result<(), !> { 111 Ok(()) 112 } 113 /// Calls `unveil`_on `path` with `Permissions::CREATE`. 114 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 115 pub fn unveil_create<P: AsRef<Path>>(path: P) -> Result<(), UnveilErr> { 116 Permissions::CREATE.unveil(path) 117 } 118 /// No-op that always returns `Ok`. 119 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 120 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 121 pub fn unveil_create<P: AsRef<Path>>(_: P) -> Result<(), !> { 122 Ok(()) 123 } 124 /// Calls `unveil`_on `path` with `Permissions::READ` and returns 125 /// `true` iff `path` exists. 126 #[expect( 127 clippy::wildcard_enum_match_arm, 128 reason = "ErrorKind is non_exhaustive" 129 )] 130 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 131 pub fn unveil_read_dir<P: AsRef<Path>>(path: P) -> Result<bool, UnveilErr> { 132 Permissions::READ.unveil(path).map_or_else( 133 |err| match err { 134 UnveilErr::Io(ref err2) => match err2.kind() { 135 ErrorKind::NotFound => Ok(false), 136 _ => Err(err), 137 }, 138 UnveilErr::Nul(_) => Err(err), 139 }, 140 |()| Ok(true), 141 ) 142 } 143 /// Returns `true` iff `path` exists 144 #[expect( 145 clippy::wildcard_enum_match_arm, 146 reason = "too many branches to write out manually" 147 )] 148 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 149 pub fn unveil_read_dir<P: AsRef<Path>>(path: P) -> Result<bool, Error> { 150 fs::metadata(path).map_or_else( 151 |err| match err.kind() { 152 ErrorKind::NotFound => Ok(false), 153 _ => Err(err), 154 }, 155 |dir| Ok(dir.is_dir()), 156 ) 157 } 158 /// Calls `unveil`_on `path` with `Permissions::READ`. 159 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 160 pub fn unveil_read_file<P: AsRef<Path>>(path: P) -> Result<(), UnveilErr> { 161 Permissions::READ.unveil(path) 162 } 163 /// No-op that always returns `Ok`. 164 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 165 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 166 pub fn unveil_read_file<P: AsRef<Path>>(_: P) -> Result<(), !> { 167 Ok(()) 168 } 169 /// Calls `unveil` on all files necessary for HTTP(S) with `Permissions::READ` 170 /// in addition to setting the `SSL_CERT_FILE` variable to `/etc/ssl/cert.pem`. 171 /// We rely on `SSL_CERT_FILE` as that allows one to `unveil(2)` only `/etc/ssl/cert.pem` 172 /// instead of `/etc/ssl/`. 173 #[expect(unsafe_code, reason = "safety comment justifies its correctness")] 174 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 175 pub fn unveil_https() -> Result<(), UnveilErr> { 176 /// The path to the root certificate store. 177 const CERTS: &str = "/etc/ssl/cert.pem"; 178 unveil_read_file(CERTS).map(|()| { 179 // SAFETY: 180 // `unveil_https` is only called in `super::main` 181 // in a single-threaded context; thus this is OK. 182 unsafe { env::set_var("SSL_CERT_FILE", CERTS) } 183 }) 184 } 185 /// No-op that always returns `Ok`. 186 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 187 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 188 pub const fn unveil_https() -> Result<(), !> { 189 Ok(()) 190 } 191 /// Calls `unveil`_on `path` with create, read, and write `Permissions`. 192 #[cfg(all(feature = "priv_sep", target_os = "openbsd"))] 193 pub fn unveil_create_read_write<P: AsRef<Path>>(path: P) -> Result<(), UnveilErr> { 194 let mut perms = Permissions::ALL; 195 perms.disable(Permission::Execute); 196 perms.unveil(path) 197 } 198 /// No-op that always returns `Ok`. 199 #[cfg(not(all(feature = "priv_sep", target_os = "openbsd")))] 200 #[expect(clippy::unnecessary_wraps, reason = "need to align with OpenBSD code")] 201 pub fn unveil_create_read_write<P: AsRef<Path>>(_: P) -> Result<(), !> { 202 Ok(()) 203 }