// Copyright 2023 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build unix package runtime_test import ( "bytes" "context" "fmt" "internal/testenv" "io" "os" "os/exec" "path/filepath" "runtime" "strings" "testing" "time" ) func privesc(command string, args ...string) error { ctx, cancel := context.WithTimeout(context.Background(), time.Second*5) defer cancel() var cmd *exec.Cmd if runtime.GOOS == "darwin" { cmd = exec.CommandContext(ctx, "sudo", append([]string{"-n", command}, args...)...) } else if runtime.GOOS == "openbsd" { cmd = exec.CommandContext(ctx, "doas", append([]string{"-n", command}, args...)...) } else { cmd = exec.CommandContext(ctx, "su", highPrivUser, "-c", fmt.Sprintf("%s %s", command, strings.Join(args, " "))) } _, err := cmd.CombinedOutput() return err } const highPrivUser = "root" func setSetuid(t *testing.T, user, bin string) { t.Helper() // We escalate privileges here even if we are root, because for some reason on some builders // (at least freebsd-amd64-13_0) the default PATH doesn't include /usr/sbin, which is where // chown lives, but using 'su root -c' gives us the correct PATH. // buildTestProg uses os.MkdirTemp which creates directories with 0700, which prevents // setuid binaries from executing because of the missing g+rx, so we need to set the parent // directory to better permissions before anything else. We created this directory, so we // shouldn't need to do any privilege trickery. if err := privesc("chmod", "0777", filepath.Dir(bin)); err != nil { t.Skipf("unable to set permissions on %q, likely no passwordless sudo/su: %s", filepath.Dir(bin), err) } if err := privesc("chown", user, bin); err != nil { t.Skipf("unable to set permissions on test binary, likely no passwordless sudo/su: %s", err) } if err := privesc("chmod", "u+s", bin); err != nil { t.Skipf("unable to set permissions on test binary, likely no passwordless sudo/su: %s", err) } } func TestSUID(t *testing.T) { // This test is relatively simple, we build a test program which opens a // file passed via the TEST_OUTPUT envvar, prints the value of the // GOTRACEBACK envvar to stdout, and prints "hello" to stderr. We then chown // the program to "nobody" and set u+s on it. We execute the program, only // passing it two files, for stdin and stdout, and passing // GOTRACEBACK=system in the env. // // We expect that the program will trigger the SUID protections, resetting // the value of GOTRACEBACK, and opening the missing stderr descriptor, such // that the program prints "GOTRACEBACK=none" to stdout, and nothing gets // written to the file pointed at by TEST_OUTPUT. if *flagQuick { t.Skip("-quick") } testenv.MustHaveGoBuild(t) helloBin, err := buildTestProg(t, "testsuid") if err != nil { t.Fatal(err) } f, err := os.CreateTemp(t.TempDir(), "suid-output") if err != nil { t.Fatal(err) } tempfilePath := f.Name() f.Close() lowPrivUser := "nobody" setSetuid(t, lowPrivUser, helloBin) b := bytes.NewBuffer(nil) pr, pw, err := os.Pipe() if err != nil { t.Fatal(err) } proc, err := os.StartProcess(helloBin, []string{helloBin}, &os.ProcAttr{ Env: []string{"GOTRACEBACK=system", "TEST_OUTPUT=" + tempfilePath}, Files: []*os.File{os.Stdin, pw}, }) if err != nil { if os.IsPermission(err) { t.Skip("don't have execute permission on setuid binary, possibly directory permission issue?") } t.Fatal(err) } done := make(chan bool, 1) go func() { io.Copy(b, pr) pr.Close() done <- true }() ps, err := proc.Wait() if err != nil { t.Fatal(err) } pw.Close() <-done output := b.String() if ps.ExitCode() == 99 { t.Skip("binary wasn't setuid (uid == euid), unable to effectively test") } expected := "GOTRACEBACK=none\n" if output != expected { t.Errorf("unexpected output, got: %q, want %q", output, expected) } fc, err := os.ReadFile(tempfilePath) if err != nil { t.Fatal(err) } if string(fc) != "" { t.Errorf("unexpected file content, got: %q", string(fc)) } // TODO: check the registers aren't leaked? }