Source file src/cmd/go/internal/fips140/fips140.go

     1  // Copyright 2024 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  // Package fips implements support for the GOFIPS140 build setting.
     6  //
     7  // The GOFIPS140 build setting controls two aspects of the build:
     8  //
     9  //   - Whether binaries are built to default to running in FIPS-140 mode,
    10  //     meaning whether they default to GODEBUG=fips140=on or =off.
    11  //
    12  //   - Which copy of the crypto/internal/fips140 source code to use.
    13  //     The default is obviously GOROOT/src/crypto/internal/fips140,
    14  //     but earlier snapshots that have differing levels of external
    15  //     validation and certification are stored in GOROOT/lib/fips140
    16  //     and can be substituted into the build instead.
    17  //
    18  // This package provides the logic needed by the rest of the go command
    19  // to make those decisions and implement the resulting policy.
    20  //
    21  // [Init] must be called to initialize the FIPS logic. It may fail and
    22  // call base.Fatalf.
    23  //
    24  // When GOFIPS140=off, [Enabled] returns false, and the build is
    25  // unchanged from its usual behaviors.
    26  //
    27  // When GOFIPS140 is anything else, [Enabled] returns true, and the build
    28  // sets the default GODEBUG to include fips140=on. This will make
    29  // binaries change their behavior at runtime to confirm to various
    30  // FIPS-140 details. [cmd/go/internal/load.defaultGODEBUG] calls
    31  // [fips.Enabled] when preparing the default settings.
    32  //
    33  // For all builds, FIPS code and data is laid out in contiguous regions
    34  // that are conceptually concatenated into a "fips object file" that the
    35  // linker hashes and then binaries can re-hash at startup to detect
    36  // corruption of those symbols. When [Enabled] is true, the link step
    37  // passes -fipso={a.Objdir}/fips.o to the linker to save a copy of the
    38  // fips.o file. Since the first build target always uses a.Objdir set to
    39  // $WORK/b001, a build like
    40  //
    41  //	GOFIPS140=latest go build -work my/binary
    42  //
    43  // will leave fips.o behind in $WORK/b001
    44  // (unless the build result is cached, of course).
    45  //
    46  // When GOFIPS140 is set to something besides off and latest, [Snapshot]
    47  // returns true, indicating that the build should replace the latest copy
    48  // of crypto/internal/fips140 with an earlier snapshot. The reason to do
    49  // this is to use a copy that has been through additional lab validation
    50  // (an "in-process" module) or NIST certification (a "certified" module).
    51  // The snapshots are stored in GOROOT/lib/fips140 in module zip form.
    52  // When a snapshot is being used, Init unpacks it into the module cache
    53  // and then uses that directory as the source location.
    54  //
    55  // A FIPS snapshot like v1.2.3 is integrated into the build in two different ways.
    56  //
    57  // First, the snapshot's fips140 directory replaces crypto/internal/fips140
    58  // using fsys.Bind. The effect is to appear to have deleted crypto/internal/fips140
    59  // and everything below it, replacing it with the single subdirectory
    60  // crypto/internal/fips140/v1.2.3, which now has the FIPS packages.
    61  // This virtual file system replacement makes patterns like std and crypto...
    62  // automatically see the snapshot packages instead of the original packages
    63  // as they walk GOROOT/src/crypto/internal/fips140.
    64  //
    65  // Second, ResolveImport is called to resolve an import like crypto/internal/fips140/sha256.
    66  // When snapshot v1.2.3 is being used, ResolveImport translates that path to
    67  // crypto/internal/fips140/v1.2.3/sha256 and returns the actual source directory
    68  // in the unpacked snapshot. Using the actual directory instead of the
    69  // virtual directory GOROOT/src/crypto/internal/fips140/v1.2.3 makes sure
    70  // that other tools using go list -json output can find the sources,
    71  // as well as making sure builds have a real directory in which to run the
    72  // assembler, compiler, and so on. The translation of the import path happens
    73  // in the same code that handles mapping golang.org/x/mod to
    74  // cmd/vendor/golang.org/x/mod when building commands.
    75  //
    76  // It is not strictly required to include v1.2.3 in the import path when using
    77  // a snapshot - we could make things work without doing that - but including
    78  // the v1.2.3 gives a different version of the code a different name, which is
    79  // always a good general rule. In particular, it will mean that govulncheck need
    80  // not have any special cases for crypto/internal/fips140 at all. The reports simply
    81  // need to list the relevant symbols in a given Go version. (For example, if a bug
    82  // is only in the in-tree copy but not the snapshots, it doesn't list the snapshot
    83  // symbols; if it's in any snapshots, it has to list the specific snapshot symbols
    84  // in addition to the “normal” symbol.)
    85  package fips140
    86  
    87  import (
    88  	"cmd/go/internal/base"
    89  	"cmd/go/internal/cfg"
    90  	"cmd/go/internal/fsys"
    91  	"cmd/go/internal/modfetch"
    92  	"cmd/go/internal/str"
    93  	"context"
    94  	"os"
    95  	"path"
    96  	"path/filepath"
    97  	"strings"
    98  
    99  	"golang.org/x/mod/module"
   100  	"golang.org/x/mod/semver"
   101  )
   102  
   103  // Init initializes the FIPS settings.
   104  // It must be called before using any other functions in this package.
   105  // If initialization fails, Init calls base.Fatalf.
   106  func Init() {
   107  	if initDone {
   108  		return
   109  	}
   110  	initDone = true
   111  	initVersion()
   112  	initDir()
   113  	if Snapshot() {
   114  		fsys.Bind(Dir(), filepath.Join(cfg.GOROOT, "src/crypto/internal/fips140"))
   115  	}
   116  
   117  	if cfg.Experiment.BoringCrypto && Enabled() {
   118  		base.Fatalf("go: cannot use GOFIPS140 with GOEXPERIMENT=boringcrypto")
   119  	}
   120  }
   121  
   122  var initDone bool
   123  
   124  // checkInit panics if Init has not been called.
   125  func checkInit() {
   126  	if !initDone {
   127  		panic("fips: not initialized")
   128  	}
   129  }
   130  
   131  // Version reports the GOFIPS140 version in use,
   132  // which is either "off", "latest", or a version like "v1.2.3".
   133  // If GOFIPS140 is set to an alias like "inprocess" or "certified",
   134  // Version returns the underlying version.
   135  func Version() string {
   136  	checkInit()
   137  	return version
   138  }
   139  
   140  // Enabled reports whether FIPS mode is enabled at all.
   141  // That is, it reports whether GOFIPS140 is set to something besides "off".
   142  func Enabled() bool {
   143  	checkInit()
   144  	return version != "off"
   145  }
   146  
   147  // Snapshot reports whether FIPS mode is using a source snapshot
   148  // rather than $GOROOT/src/crypto/internal/fips140.
   149  // That is, it reports whether GOFIPS140 is set to something besides "latest" or "off".
   150  func Snapshot() bool {
   151  	checkInit()
   152  	return version != "latest" && version != "off"
   153  }
   154  
   155  var version string
   156  
   157  func initVersion() {
   158  	// For off and latest, use the local source tree.
   159  	v := cfg.GOFIPS140
   160  	if v == "off" || v == "" {
   161  		version = "off"
   162  		return
   163  	}
   164  	if v == "latest" {
   165  		version = "latest"
   166  		return
   167  	}
   168  
   169  	// Otherwise version must exist in lib/fips140, either as
   170  	// a .zip (a source snapshot like v1.2.0.zip)
   171  	// or a .txt (a redirect like inprocess.txt, containing a version number).
   172  	if strings.Contains(v, "/") || strings.Contains(v, `\`) || strings.Contains(v, "..") {
   173  		base.Fatalf("go: malformed GOFIPS140 version %q", cfg.GOFIPS140)
   174  	}
   175  	if cfg.GOROOT == "" {
   176  		base.Fatalf("go: missing GOROOT for GOFIPS140")
   177  	}
   178  
   179  	file := filepath.Join(cfg.GOROOT, "lib", "fips140", v)
   180  	if data, err := os.ReadFile(file + ".txt"); err == nil {
   181  		v = strings.TrimSpace(string(data))
   182  		file = filepath.Join(cfg.GOROOT, "lib", "fips140", v)
   183  		if _, err := os.Stat(file + ".zip"); err != nil {
   184  			base.Fatalf("go: unknown GOFIPS140 version %q (from %q)", v, cfg.GOFIPS140)
   185  		}
   186  	}
   187  
   188  	if _, err := os.Stat(file + ".zip"); err == nil {
   189  		// Found version. Add a build tag.
   190  		cfg.BuildContext.BuildTags = append(cfg.BuildContext.BuildTags, "fips140"+semver.MajorMinor(v))
   191  		version = v
   192  		return
   193  	}
   194  
   195  	base.Fatalf("go: unknown GOFIPS140 version %q", v)
   196  }
   197  
   198  // Dir reports the directory containing the crypto/internal/fips140 source code.
   199  // If Snapshot() is false, Dir returns GOROOT/src/crypto/internal/fips140.
   200  // Otherwise Dir ensures that the snapshot has been unpacked into the
   201  // module cache and then returns the directory in the module cache
   202  // corresponding to the crypto/internal/fips140 directory.
   203  func Dir() string {
   204  	checkInit()
   205  	return dir
   206  }
   207  
   208  var dir string
   209  
   210  func initDir() {
   211  	v := version
   212  	if v == "latest" || v == "off" {
   213  		dir = filepath.Join(cfg.GOROOT, "src/crypto/internal/fips140")
   214  		return
   215  	}
   216  
   217  	mod := module.Version{Path: "golang.org/fips140", Version: v}
   218  	file := filepath.Join(cfg.GOROOT, "lib/fips140", v+".zip")
   219  	zdir, err := modfetch.Unzip(context.Background(), mod, file)
   220  	if err != nil {
   221  		base.Fatalf("go: unpacking GOFIPS140=%v: %v", v, err)
   222  	}
   223  	dir = filepath.Join(zdir, "fips140")
   224  	return
   225  }
   226  
   227  // ResolveImport resolves the import path imp.
   228  // If it is of the form crypto/internal/fips140/foo
   229  // (not crypto/internal/fips140/v1.2.3/foo)
   230  // and we are using a snapshot, then LookupImport
   231  // rewrites the path to crypto/internal/fips140/v1.2.3/foo
   232  // and returns that path and its location in the unpacked
   233  // FIPS snapshot.
   234  func ResolveImport(imp string) (newPath, dir string, ok bool) {
   235  	checkInit()
   236  	const fips = "crypto/internal/fips140"
   237  	if !Snapshot() || !str.HasPathPrefix(imp, fips) {
   238  		return "", "", false
   239  	}
   240  	fipsv := path.Join(fips, version)
   241  	var sub string
   242  	if str.HasPathPrefix(imp, fipsv) {
   243  		sub = "." + imp[len(fipsv):]
   244  	} else {
   245  		sub = "." + imp[len(fips):]
   246  	}
   247  	newPath = path.Join(fips, version, sub)
   248  	dir = filepath.Join(Dir(), version, sub)
   249  	return newPath, dir, true
   250  }
   251  

View as plain text