Source file src/cmd/go/internal/fips140/fips140.go
1 // Copyright 2024 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 // Package fips implements support for the GOFIPS140 build setting. 6 // 7 // The GOFIPS140 build setting controls two aspects of the build: 8 // 9 // - Whether binaries are built to default to running in FIPS-140 mode, 10 // meaning whether they default to GODEBUG=fips140=on or =off. 11 // 12 // - Which copy of the crypto/internal/fips140 source code to use. 13 // The default is obviously GOROOT/src/crypto/internal/fips140, 14 // but earlier snapshots that have differing levels of external 15 // validation and certification are stored in GOROOT/lib/fips140 16 // and can be substituted into the build instead. 17 // 18 // This package provides the logic needed by the rest of the go command 19 // to make those decisions and implement the resulting policy. 20 // 21 // [Init] must be called to initialize the FIPS logic. It may fail and 22 // call base.Fatalf. 23 // 24 // When GOFIPS140=off, [Enabled] returns false, and the build is 25 // unchanged from its usual behaviors. 26 // 27 // When GOFIPS140 is anything else, [Enabled] returns true, and the build 28 // sets the default GODEBUG to include fips140=on. This will make 29 // binaries change their behavior at runtime to confirm to various 30 // FIPS-140 details. [cmd/go/internal/load.defaultGODEBUG] calls 31 // [fips.Enabled] when preparing the default settings. 32 // 33 // For all builds, FIPS code and data is laid out in contiguous regions 34 // that are conceptually concatenated into a "fips object file" that the 35 // linker hashes and then binaries can re-hash at startup to detect 36 // corruption of those symbols. When [Enabled] is true, the link step 37 // passes -fipso={a.Objdir}/fips.o to the linker to save a copy of the 38 // fips.o file. Since the first build target always uses a.Objdir set to 39 // $WORK/b001, a build like 40 // 41 // GOFIPS140=latest go build -work my/binary 42 // 43 // will leave fips.o behind in $WORK/b001 44 // (unless the build result is cached, of course). 45 // 46 // When GOFIPS140 is set to something besides off and latest, [Snapshot] 47 // returns true, indicating that the build should replace the latest copy 48 // of crypto/internal/fips140 with an earlier snapshot. The reason to do 49 // this is to use a copy that has been through additional lab validation 50 // (an "in-process" module) or NIST certification (a "certified" module). 51 // The snapshots are stored in GOROOT/lib/fips140 in module zip form. 52 // When a snapshot is being used, Init unpacks it into the module cache 53 // and then uses that directory as the source location. 54 // 55 // A FIPS snapshot like v1.2.3 is integrated into the build in two different ways. 56 // 57 // First, the snapshot's fips140 directory replaces crypto/internal/fips140 58 // using fsys.Bind. The effect is to appear to have deleted crypto/internal/fips140 59 // and everything below it, replacing it with the single subdirectory 60 // crypto/internal/fips140/v1.2.3, which now has the FIPS packages. 61 // This virtual file system replacement makes patterns like std and crypto... 62 // automatically see the snapshot packages instead of the original packages 63 // as they walk GOROOT/src/crypto/internal/fips140. 64 // 65 // Second, ResolveImport is called to resolve an import like crypto/internal/fips140/sha256. 66 // When snapshot v1.2.3 is being used, ResolveImport translates that path to 67 // crypto/internal/fips140/v1.2.3/sha256 and returns the actual source directory 68 // in the unpacked snapshot. Using the actual directory instead of the 69 // virtual directory GOROOT/src/crypto/internal/fips140/v1.2.3 makes sure 70 // that other tools using go list -json output can find the sources, 71 // as well as making sure builds have a real directory in which to run the 72 // assembler, compiler, and so on. The translation of the import path happens 73 // in the same code that handles mapping golang.org/x/mod to 74 // cmd/vendor/golang.org/x/mod when building commands. 75 // 76 // It is not strictly required to include v1.2.3 in the import path when using 77 // a snapshot - we could make things work without doing that - but including 78 // the v1.2.3 gives a different version of the code a different name, which is 79 // always a good general rule. In particular, it will mean that govulncheck need 80 // not have any special cases for crypto/internal/fips140 at all. The reports simply 81 // need to list the relevant symbols in a given Go version. (For example, if a bug 82 // is only in the in-tree copy but not the snapshots, it doesn't list the snapshot 83 // symbols; if it's in any snapshots, it has to list the specific snapshot symbols 84 // in addition to the “normal” symbol.) 85 package fips140 86 87 import ( 88 "cmd/go/internal/base" 89 "cmd/go/internal/cfg" 90 "cmd/go/internal/fsys" 91 "cmd/go/internal/modfetch" 92 "cmd/go/internal/str" 93 "context" 94 "os" 95 "path" 96 "path/filepath" 97 "strings" 98 99 "golang.org/x/mod/module" 100 "golang.org/x/mod/semver" 101 ) 102 103 // Init initializes the FIPS settings. 104 // It must be called before using any other functions in this package. 105 // If initialization fails, Init calls base.Fatalf. 106 func Init() { 107 if initDone { 108 return 109 } 110 initDone = true 111 initVersion() 112 initDir() 113 if Snapshot() { 114 fsys.Bind(Dir(), filepath.Join(cfg.GOROOT, "src/crypto/internal/fips140")) 115 } 116 117 if cfg.Experiment.BoringCrypto && Enabled() { 118 base.Fatalf("go: cannot use GOFIPS140 with GOEXPERIMENT=boringcrypto") 119 } 120 } 121 122 var initDone bool 123 124 // checkInit panics if Init has not been called. 125 func checkInit() { 126 if !initDone { 127 panic("fips: not initialized") 128 } 129 } 130 131 // Version reports the GOFIPS140 version in use, 132 // which is either "off", "latest", or a version like "v1.2.3". 133 // If GOFIPS140 is set to an alias like "inprocess" or "certified", 134 // Version returns the underlying version. 135 func Version() string { 136 checkInit() 137 return version 138 } 139 140 // Enabled reports whether FIPS mode is enabled at all. 141 // That is, it reports whether GOFIPS140 is set to something besides "off". 142 func Enabled() bool { 143 checkInit() 144 return version != "off" 145 } 146 147 // Snapshot reports whether FIPS mode is using a source snapshot 148 // rather than $GOROOT/src/crypto/internal/fips140. 149 // That is, it reports whether GOFIPS140 is set to something besides "latest" or "off". 150 func Snapshot() bool { 151 checkInit() 152 return version != "latest" && version != "off" 153 } 154 155 var version string 156 157 func initVersion() { 158 // For off and latest, use the local source tree. 159 v := cfg.GOFIPS140 160 if v == "off" || v == "" { 161 version = "off" 162 return 163 } 164 if v == "latest" { 165 version = "latest" 166 return 167 } 168 169 // Otherwise version must exist in lib/fips140, either as 170 // a .zip (a source snapshot like v1.2.0.zip) 171 // or a .txt (a redirect like inprocess.txt, containing a version number). 172 if strings.Contains(v, "/") || strings.Contains(v, `\`) || strings.Contains(v, "..") { 173 base.Fatalf("go: malformed GOFIPS140 version %q", cfg.GOFIPS140) 174 } 175 if cfg.GOROOT == "" { 176 base.Fatalf("go: missing GOROOT for GOFIPS140") 177 } 178 179 file := filepath.Join(cfg.GOROOT, "lib", "fips140", v) 180 if data, err := os.ReadFile(file + ".txt"); err == nil { 181 v = strings.TrimSpace(string(data)) 182 file = filepath.Join(cfg.GOROOT, "lib", "fips140", v) 183 if _, err := os.Stat(file + ".zip"); err != nil { 184 base.Fatalf("go: unknown GOFIPS140 version %q (from %q)", v, cfg.GOFIPS140) 185 } 186 } 187 188 if _, err := os.Stat(file + ".zip"); err == nil { 189 // Found version. Add a build tag. 190 cfg.BuildContext.BuildTags = append(cfg.BuildContext.BuildTags, "fips140"+semver.MajorMinor(v)) 191 version = v 192 return 193 } 194 195 base.Fatalf("go: unknown GOFIPS140 version %q", v) 196 } 197 198 // Dir reports the directory containing the crypto/internal/fips140 source code. 199 // If Snapshot() is false, Dir returns GOROOT/src/crypto/internal/fips140. 200 // Otherwise Dir ensures that the snapshot has been unpacked into the 201 // module cache and then returns the directory in the module cache 202 // corresponding to the crypto/internal/fips140 directory. 203 func Dir() string { 204 checkInit() 205 return dir 206 } 207 208 var dir string 209 210 func initDir() { 211 v := version 212 if v == "latest" || v == "off" { 213 dir = filepath.Join(cfg.GOROOT, "src/crypto/internal/fips140") 214 return 215 } 216 217 mod := module.Version{Path: "golang.org/fips140", Version: v} 218 file := filepath.Join(cfg.GOROOT, "lib/fips140", v+".zip") 219 zdir, err := modfetch.Unzip(context.Background(), mod, file) 220 if err != nil { 221 base.Fatalf("go: unpacking GOFIPS140=%v: %v", v, err) 222 } 223 dir = filepath.Join(zdir, "fips140") 224 return 225 } 226 227 // ResolveImport resolves the import path imp. 228 // If it is of the form crypto/internal/fips140/foo 229 // (not crypto/internal/fips140/v1.2.3/foo) 230 // and we are using a snapshot, then LookupImport 231 // rewrites the path to crypto/internal/fips140/v1.2.3/foo 232 // and returns that path and its location in the unpacked 233 // FIPS snapshot. 234 func ResolveImport(imp string) (newPath, dir string, ok bool) { 235 checkInit() 236 const fips = "crypto/internal/fips140" 237 if !Snapshot() || !str.HasPathPrefix(imp, fips) { 238 return "", "", false 239 } 240 fipsv := path.Join(fips, version) 241 var sub string 242 if str.HasPathPrefix(imp, fipsv) { 243 sub = "." + imp[len(fipsv):] 244 } else { 245 sub = "." + imp[len(fips):] 246 } 247 newPath = path.Join(fips, version, sub) 248 dir = filepath.Join(Dir(), version, sub) 249 return newPath, dir, true 250 } 251