mirror of
				https://gitea.com/Lydanne/buildx.git
				synced 2025-11-04 18:13:42 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			106 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			106 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
   Copyright The containerd Authors.
 | 
						|
 | 
						|
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
   you may not use this file except in compliance with the License.
 | 
						|
   You may obtain a copy of the License at
 | 
						|
 | 
						|
       http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
   Unless required by applicable law or agreed to in writing, software
 | 
						|
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
   See the License for the specific language governing permissions and
 | 
						|
   limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package ttrpc
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"net"
 | 
						|
	"os"
 | 
						|
	"syscall"
 | 
						|
 | 
						|
	"golang.org/x/sys/unix"
 | 
						|
)
 | 
						|
 | 
						|
type UnixCredentialsFunc func(*unix.Ucred) error
 | 
						|
 | 
						|
func (fn UnixCredentialsFunc) Handshake(_ context.Context, conn net.Conn) (net.Conn, interface{}, error) {
 | 
						|
	uc, err := requireUnixSocket(conn)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, fmt.Errorf("ttrpc.UnixCredentialsFunc: require unix socket: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	rs, err := uc.SyscallConn()
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, fmt.Errorf("ttrpc.UnixCredentialsFunc: (net.UnixConn).SyscallConn failed: %w", err)
 | 
						|
	}
 | 
						|
	var (
 | 
						|
		ucred    *unix.Ucred
 | 
						|
		ucredErr error
 | 
						|
	)
 | 
						|
	if err := rs.Control(func(fd uintptr) {
 | 
						|
		ucred, ucredErr = unix.GetsockoptUcred(int(fd), unix.SOL_SOCKET, unix.SO_PEERCRED)
 | 
						|
	}); err != nil {
 | 
						|
		return nil, nil, fmt.Errorf("ttrpc.UnixCredentialsFunc: (*syscall.RawConn).Control failed: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if ucredErr != nil {
 | 
						|
		return nil, nil, fmt.Errorf("ttrpc.UnixCredentialsFunc: failed to retrieve socket peer credentials: %w", ucredErr)
 | 
						|
	}
 | 
						|
 | 
						|
	if err := fn(ucred); err != nil {
 | 
						|
		return nil, nil, fmt.Errorf("ttrpc.UnixCredentialsFunc: credential check failed: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return uc, ucred, nil
 | 
						|
}
 | 
						|
 | 
						|
// UnixSocketRequireUidGid requires specific *effective* UID/GID, rather than the real UID/GID.
 | 
						|
//
 | 
						|
// For example, if a daemon binary is owned by the root (UID 0) with SUID bit but running as an
 | 
						|
// unprivileged user (UID 1001), the effective UID becomes 0, and the real UID becomes 1001.
 | 
						|
// So calling this function with uid=0 allows a connection from effective UID 0 but rejects
 | 
						|
// a connection from effective UID 1001.
 | 
						|
//
 | 
						|
// See socket(7), SO_PEERCRED: "The returned credentials are those that were in effect at the time of the call to connect(2) or socketpair(2)."
 | 
						|
func UnixSocketRequireUidGid(uid, gid int) UnixCredentialsFunc {
 | 
						|
	return func(ucred *unix.Ucred) error {
 | 
						|
		return requireUidGid(ucred, uid, gid)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func UnixSocketRequireRoot() UnixCredentialsFunc {
 | 
						|
	return UnixSocketRequireUidGid(0, 0)
 | 
						|
}
 | 
						|
 | 
						|
// UnixSocketRequireSameUser resolves the current effective unix user and returns a
 | 
						|
// UnixCredentialsFunc that will validate incoming unix connections against the
 | 
						|
// current credentials.
 | 
						|
//
 | 
						|
// This is useful when using abstract sockets that are accessible by all users.
 | 
						|
func UnixSocketRequireSameUser() UnixCredentialsFunc {
 | 
						|
	euid, egid := os.Geteuid(), os.Getegid()
 | 
						|
	return UnixSocketRequireUidGid(euid, egid)
 | 
						|
}
 | 
						|
 | 
						|
func requireUidGid(ucred *unix.Ucred, uid, gid int) error {
 | 
						|
	if (uid != -1 && uint32(uid) != ucred.Uid) || (gid != -1 && uint32(gid) != ucred.Gid) {
 | 
						|
		return fmt.Errorf("ttrpc: invalid credentials: %v", syscall.EPERM)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func requireUnixSocket(conn net.Conn) (*net.UnixConn, error) {
 | 
						|
	uc, ok := conn.(*net.UnixConn)
 | 
						|
	if !ok {
 | 
						|
		return nil, errors.New("a unix socket connection is required")
 | 
						|
	}
 | 
						|
 | 
						|
	return uc, nil
 | 
						|
}
 |