|  | // Copyright 2023 The Go Authors. All rights reserved. | 
|  | // Use of this source code is governed by a BSD-style | 
|  | // license that can be found in the LICENSE file. | 
|  |  | 
|  | //go:build unix | 
|  |  | 
|  | package runtime_test | 
|  |  | 
|  | import ( | 
|  | "bytes" | 
|  | "context" | 
|  | "fmt" | 
|  | "internal/testenv" | 
|  | "io" | 
|  | "os" | 
|  | "os/exec" | 
|  | "path/filepath" | 
|  | "runtime" | 
|  | "strings" | 
|  | "testing" | 
|  | "time" | 
|  | ) | 
|  |  | 
|  | func privesc(command string, args ...string) error { | 
|  | ctx, cancel := context.WithTimeout(context.Background(), time.Second*5) | 
|  | defer cancel() | 
|  | var cmd *exec.Cmd | 
|  | if runtime.GOOS == "darwin" { | 
|  | cmd = exec.CommandContext(ctx, "sudo", append([]string{"-n", command}, args...)...) | 
|  | } else if runtime.GOOS == "openbsd" { | 
|  | cmd = exec.CommandContext(ctx, "doas", append([]string{"-n", command}, args...)...) | 
|  | } else { | 
|  | cmd = exec.CommandContext(ctx, "su", highPrivUser, "-c", fmt.Sprintf("%s %s", command, strings.Join(args, " "))) | 
|  | } | 
|  | _, err := cmd.CombinedOutput() | 
|  | return err | 
|  | } | 
|  |  | 
|  | const highPrivUser = "root" | 
|  |  | 
|  | func setSetuid(t *testing.T, user, bin string) { | 
|  | t.Helper() | 
|  | // We escalate privileges here even if we are root, because for some reason on some builders | 
|  | // (at least freebsd-amd64-13_0) the default PATH doesn't include /usr/sbin, which is where | 
|  | // chown lives, but using 'su root -c' gives us the correct PATH. | 
|  |  | 
|  | // buildTestProg uses os.MkdirTemp which creates directories with 0700, which prevents | 
|  | // setuid binaries from executing because of the missing g+rx, so we need to set the parent | 
|  | // directory to better permissions before anything else. We created this directory, so we | 
|  | // shouldn't need to do any privilege trickery. | 
|  | if err := privesc("chmod", "0777", filepath.Dir(bin)); err != nil { | 
|  | t.Skipf("unable to set permissions on %q, likely no passwordless sudo/su: %s", filepath.Dir(bin), err) | 
|  | } | 
|  |  | 
|  | if err := privesc("chown", user, bin); err != nil { | 
|  | t.Skipf("unable to set permissions on test binary, likely no passwordless sudo/su: %s", err) | 
|  | } | 
|  | if err := privesc("chmod", "u+s", bin); err != nil { | 
|  | t.Skipf("unable to set permissions on test binary, likely no passwordless sudo/su: %s", err) | 
|  | } | 
|  | } | 
|  |  | 
|  | func TestSUID(t *testing.T) { | 
|  | // This test is relatively simple, we build a test program which opens a | 
|  | // file passed via the TEST_OUTPUT envvar, prints the value of the | 
|  | // GOTRACEBACK envvar to stdout, and prints "hello" to stderr. We then chown | 
|  | // the program to "nobody" and set u+s on it. We execute the program, only | 
|  | // passing it two files, for stdin and stdout, and passing | 
|  | // GOTRACEBACK=system in the env. | 
|  | // | 
|  | // We expect that the program will trigger the SUID protections, resetting | 
|  | // the value of GOTRACEBACK, and opening the missing stderr descriptor, such | 
|  | // that the program prints "GOTRACEBACK=none" to stdout, and nothing gets | 
|  | // written to the file pointed at by TEST_OUTPUT. | 
|  |  | 
|  | if *flagQuick { | 
|  | t.Skip("-quick") | 
|  | } | 
|  |  | 
|  | testenv.MustHaveGoBuild(t) | 
|  |  | 
|  | helloBin, err := buildTestProg(t, "testsuid") | 
|  | if err != nil { | 
|  | t.Fatal(err) | 
|  | } | 
|  |  | 
|  | f, err := os.CreateTemp(t.TempDir(), "suid-output") | 
|  | if err != nil { | 
|  | t.Fatal(err) | 
|  | } | 
|  | tempfilePath := f.Name() | 
|  | f.Close() | 
|  |  | 
|  | lowPrivUser := "nobody" | 
|  | setSetuid(t, lowPrivUser, helloBin) | 
|  |  | 
|  | b := bytes.NewBuffer(nil) | 
|  | pr, pw, err := os.Pipe() | 
|  | if err != nil { | 
|  | t.Fatal(err) | 
|  | } | 
|  |  | 
|  | proc, err := os.StartProcess(helloBin, []string{helloBin}, &os.ProcAttr{ | 
|  | Env:   []string{"GOTRACEBACK=system", "TEST_OUTPUT=" + tempfilePath}, | 
|  | Files: []*os.File{os.Stdin, pw}, | 
|  | }) | 
|  | if err != nil { | 
|  | if os.IsPermission(err) { | 
|  | t.Skip("don't have execute permission on setuid binary, possibly directory permission issue?") | 
|  | } | 
|  | t.Fatal(err) | 
|  | } | 
|  | done := make(chan bool, 1) | 
|  | go func() { | 
|  | io.Copy(b, pr) | 
|  | pr.Close() | 
|  | done <- true | 
|  | }() | 
|  | ps, err := proc.Wait() | 
|  | if err != nil { | 
|  | t.Fatal(err) | 
|  | } | 
|  | pw.Close() | 
|  | <-done | 
|  | output := b.String() | 
|  |  | 
|  | if ps.ExitCode() == 99 { | 
|  | t.Skip("binary wasn't setuid (uid == euid), unable to effectively test") | 
|  | } | 
|  |  | 
|  | expected := "GOTRACEBACK=none\n" | 
|  | if output != expected { | 
|  | t.Errorf("unexpected output, got: %q, want %q", output, expected) | 
|  | } | 
|  |  | 
|  | fc, err := os.ReadFile(tempfilePath) | 
|  | if err != nil { | 
|  | t.Fatal(err) | 
|  | } | 
|  | if string(fc) != "" { | 
|  | t.Errorf("unexpected file content, got: %q", string(fc)) | 
|  | } | 
|  |  | 
|  | // TODO: check the registers aren't leaked? | 
|  | } |