Files
snapd/snapdtool/fips_linux.go
Maciej Borzecki d45fdbfe7a snapdtool: simplify check
Signed-off-by: Maciej Borzecki <maciej.borzecki@canonical.com>
2024-06-27 08:29:36 +02:00

147 lines
4.7 KiB
Go

// -*- Mode: Go; indent-tabs-mode: t -*-
//go:build linux
/*
* Copyright (C) 2024 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package snapdtool
import (
"fmt"
"os"
"path/filepath"
"strings"
"github.com/snapcore/snapd/dirs"
"github.com/snapcore/snapd/logger"
"github.com/snapcore/snapd/osutil"
"github.com/snapcore/snapd/osutil/fips"
"github.com/snapcore/snapd/release"
)
func findFIPSLibsAndModules(snapRoot string) (opensslLib, module string) {
// with OpenSSL supported by 22.04 (the snapd snap build base), the FIPS
// module is available as an *.so library loaded by libcrypto.so.3 at
// runtime.
var fipsLibAndModulePathInSnapdSnap = []struct {
opensslLib, moduleFile string
}{
{"usr/lib/x86_64-linux-gnu/libcrypto.so.3", "usr/lib/x86_64-linux-gnu/ossl-modules-3/fips.so"},
{"usr/lib/aarch64-linux-gnu/libcrypto.so.3", "usr/lib/aarch64-linux-gnu/ossl-modules-3/fips.so"},
{"usr/lib/arm-linux-gnueabihf/libcrypto.so.3", "usr/lib/arm-linux-gnueabihf/ossl-modules-3/fips.so"},
{"usr/lib/i386-linux-gnu/libcrypto.so.3", "usr/lib/i386-linux-gnu/ossl-modules-3/fips.so"},
{"usr/lib/riscv64-linux-gnu/libcrypto.so.3", "usr/lib/riscv64-linux-gnu/ossl-modules-3/fips.so"},
{"usr/lib/s390x-linux-gnu/libcrypto.so.3", "usr/lib/s390x-linux-gnu/ossl-modules-3/fips.so"},
}
for _, bundle := range fipsLibAndModulePathInSnapdSnap {
lib := filepath.Join(snapRoot, bundle.opensslLib)
module := filepath.Join(snapRoot, bundle.moduleFile)
if osutil.FileExists(lib) && osutil.FileExists(module) {
return lib, module
}
}
return "", ""
}
// MaybeSetupFIPS checks whether a system-wide FIPS mode is enabled and if
// so sets up an environment such that the current process is able to use
// libraries that are required for FIPS compliance and reexecs.
func MaybeSetupFIPS() error {
enabled, err := fips.IsEnabled()
if err != nil {
return fmt.Errorf("cannot obtain FIPS status: %w", err)
}
if !enabled {
// FIPS not enabled do nothing
return nil
}
logger.Debugf("FIPS mode enabled system wide")
if os.Getenv("SNAPD_FIPS_BOOTSTRAP") == "1" {
// we've already been reexeced into FIPS mode and bootstrap was
// performed
logger.Debugf("FIPS bootstrap complete")
// if we reached this place, then the initialization was
// completed successfully and we can drop the environment
// variables, other processes which may be invoked by snapd will
// perform the initialization cycle on their own when needed
os.Unsetenv("GOFIPS")
os.Unsetenv("SNAPD_FIPS_BOOTSTRAP")
os.Unsetenv("OPENSSL_MODULES")
os.Unsetenv("GO_OPENSSL_VERSION_OVERRIDE")
return nil
}
snapdRev, err := osReadlink(snapdSnap)
if err != nil {
return err
}
currentRevSnapdSnap := filepath.Join(dirs.SnapMountDir, "snapd", snapdRev)
logger.Debugf("snapd snap: %s", currentRevSnapdSnap)
rootDir, exe, err := exeAndRoot()
if err != nil {
return err
}
logger.Debugf("self exe: %s", exe)
logger.Debugf("exe root dir: %q", rootDir)
// on a classic system we need to be reexecuted from the snapd snap for
// the FIPS setup to be relevant, but on core we are not reexeced but
// running directly from the mount of the snapd snap under
// /usr/lib/snapd, yet we still want to set up the right environment
if release.OnClassic {
if rootDir != currentRevSnapdSnap {
// this is only supported for reexecing from the snapd snap
return nil
}
}
lib, mod := findFIPSLibsAndModules(currentRevSnapdSnap)
env := append(os.Environ(), []string{
"SNAPD_FIPS_BOOTSTRAP=1",
// make FIPS mod required at runtime, if the module was not
// found or the setup is incorrect snapd will fail in a
// predictable way
"GOFIPS=1",
}...)
if mod != "" {
// version override uses the version suffix right after *.so.
libVer := strings.TrimPrefix(filepath.Ext(lib), ".")
logger.Debugf("found FIPS library and module at %s (ver %s) and %s", lib, libVer, mod)
env = append(env, []string{
// be specific about where the modules come from
fmt.Sprintf("OPENSSL_MODULES=%s", filepath.Dir(mod)),
// and the openssl lib version
fmt.Sprintf("GO_OPENSSL_VERSION_OVERRIDE=%s", libVer),
}...)
}
// TODO how to ensure that we only load the library from the snapd snap?
panic(syscallExec(filepath.Join(rootDir, exe), os.Args, env))
}