feat: add firejailed support (#106)
Reviewed-on: #106 Co-authored-by: Maxim Slipenko <no-reply@maxim.slipenko.com> Co-committed-by: Maxim Slipenko <no-reply@maxim.slipenko.com>
This commit is contained in:
		
							
								
								
									
										237
									
								
								internal/build/firejail.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										237
									
								
								internal/build/firejail.go
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,237 @@ | ||||
| // ALR - Any Linux Repository | ||||
| // Copyright (C) 2025 The ALR Authors | ||||
| // | ||||
| // This program is free software: you can redistribute it and/or modify | ||||
| // it under the terms of the GNU General Public License as published by | ||||
| // the Free Software Foundation, either version 3 of the License, or | ||||
| // (at your option) any later version. | ||||
| // | ||||
| // This program is distributed in the hope that it will be useful, | ||||
| // but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | ||||
| // GNU General Public License for more details. | ||||
| // | ||||
| // You should have received a copy of the GNU General Public License | ||||
| // along with this program.  If not, see <http://www.gnu.org/licenses/>. | ||||
|  | ||||
| package build | ||||
|  | ||||
| import ( | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"log/slog" | ||||
| 	"os" | ||||
| 	"path/filepath" | ||||
| 	"strings" | ||||
|  | ||||
| 	"github.com/goreleaser/nfpm/v2/files" | ||||
| 	"github.com/leonelquinteros/gotext" | ||||
|  | ||||
| 	"gitea.plemya-x.ru/Plemya-x/ALR/internal/osutils" | ||||
| 	"gitea.plemya-x.ru/Plemya-x/ALR/pkg/alrsh" | ||||
| 	"gitea.plemya-x.ru/Plemya-x/ALR/pkg/types" | ||||
| ) | ||||
|  | ||||
| const ( | ||||
| 	firejailedDir     = "/usr/lib/alr/firejailed" | ||||
| 	defaultDirMode    = 0o755 | ||||
| 	defaultScriptMode = 0o755 | ||||
| ) | ||||
|  | ||||
| var ( | ||||
| 	ErrInvalidDestination = errors.New("invalid destination path") | ||||
| 	ErrMissingProfile     = errors.New("default profile is missing") | ||||
| 	ErrEmptyPackageName   = errors.New("package name cannot be empty") | ||||
| ) | ||||
|  | ||||
| var binaryDirectories = []string{ | ||||
| 	"/usr/bin/", | ||||
| 	"/bin/", | ||||
| 	"/usr/local/bin/", | ||||
| } | ||||
|  | ||||
| func applyFirejailIntegration( | ||||
| 	vars *alrsh.Package, | ||||
| 	dirs types.Directories, | ||||
| 	contents []*files.Content, | ||||
| ) ([]*files.Content, error) { | ||||
| 	slog.Info(gotext.Get("Applying FireJail integration"), "package", vars.Name) | ||||
|  | ||||
| 	if err := createFirejailedDirectory(dirs.PkgDir); err != nil { | ||||
| 		return nil, fmt.Errorf("failed to create firejailed directory: %w", err) | ||||
| 	} | ||||
|  | ||||
| 	newContents, err := processBinaryFiles(vars, contents, dirs) | ||||
| 	if err != nil { | ||||
| 		return nil, fmt.Errorf("failed to process binary files: %w", err) | ||||
| 	} | ||||
|  | ||||
| 	return append(contents, newContents...), nil | ||||
| } | ||||
|  | ||||
| func createFirejailedDirectory(pkgDir string) error { | ||||
| 	firejailedPath := filepath.Join(pkgDir, firejailedDir) | ||||
| 	return os.MkdirAll(firejailedPath, defaultDirMode) | ||||
| } | ||||
|  | ||||
| func processBinaryFiles(pkg *alrsh.Package, contents []*files.Content, dirs types.Directories) ([]*files.Content, error) { | ||||
| 	var newContents []*files.Content | ||||
|  | ||||
| 	for _, content := range contents { | ||||
| 		if content.Type == "dir" { | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		if !isBinaryFile(content.Destination) { | ||||
| 			slog.Debug("content not binary file", "content", content) | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		slog.Debug("process content", "content", content) | ||||
|  | ||||
| 		newContent, err := createFirejailedBinary(pkg, content, dirs) | ||||
| 		if err != nil { | ||||
| 			return nil, fmt.Errorf("failed to create firejailed binary for %s: %w", content.Destination, err) | ||||
| 		} | ||||
|  | ||||
| 		if newContent != nil { | ||||
| 			newContents = append(newContents, newContent...) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return newContents, nil | ||||
| } | ||||
|  | ||||
| func isBinaryFile(destination string) bool { | ||||
| 	for _, binDir := range binaryDirectories { | ||||
| 		if strings.HasPrefix(destination, binDir) { | ||||
| 			return true | ||||
| 		} | ||||
| 	} | ||||
| 	return false | ||||
| } | ||||
|  | ||||
| func createFirejailedBinary( | ||||
| 	pkg *alrsh.Package, | ||||
| 	content *files.Content, | ||||
| 	dirs types.Directories, | ||||
| ) ([]*files.Content, error) { | ||||
| 	origFilePath, err := generateFirejailedPath(content.Destination) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	profiles := pkg.FireJailProfiles.Resolved() | ||||
| 	sourceProfilePath, ok := profiles[content.Destination] | ||||
|  | ||||
| 	if !ok { | ||||
| 		sourceProfilePath, ok = profiles["default"] | ||||
| 		if !ok { | ||||
| 			return nil, errors.New("default profile is missing") | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	sourceProfilePath = filepath.Join(dirs.ScriptDir, sourceProfilePath) | ||||
| 	dest, err := createFirejailProfilePath(content.Destination) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	err = createProfile(filepath.Join(dirs.PkgDir, dest), sourceProfilePath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	if err := osutils.Move(content.Source, filepath.Join(dirs.PkgDir, origFilePath)); err != nil { | ||||
| 		return nil, fmt.Errorf("failed to move original binary: %w", err) | ||||
| 	} | ||||
|  | ||||
| 	// Create wrapper script | ||||
| 	if err := createWrapperScript(content.Source, origFilePath, dest); err != nil { | ||||
| 		return nil, fmt.Errorf("failed to create wrapper script: %w", err) | ||||
| 	} | ||||
|  | ||||
| 	profile, err := getContentFromPath(dest, dirs.PkgDir) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	bin, err := getContentFromPath(origFilePath, dirs.PkgDir) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	return []*files.Content{ | ||||
| 		bin, | ||||
| 		profile, | ||||
| 	}, nil | ||||
| } | ||||
|  | ||||
| func getContentFromPath(path, base string) (*files.Content, error) { | ||||
| 	absPath := filepath.Join(base, path) | ||||
|  | ||||
| 	fi, err := os.Lstat(absPath) | ||||
| 	if err != nil { | ||||
| 		return nil, fmt.Errorf("failed to get file info: %w", err) | ||||
| 	} | ||||
|  | ||||
| 	return &files.Content{ | ||||
| 		Source:      absPath, | ||||
| 		Destination: path, | ||||
| 		FileInfo: &files.ContentFileInfo{ | ||||
| 			MTime: fi.ModTime(), | ||||
| 			Mode:  fi.Mode(), | ||||
| 			Size:  fi.Size(), | ||||
| 		}, | ||||
| 	}, nil | ||||
| } | ||||
|  | ||||
| func generateSafeName(destination string) (string, error) { | ||||
| 	cleanPath := strings.TrimPrefix(destination, ".") | ||||
| 	if cleanPath == "" { | ||||
| 		return "", fmt.Errorf("invalid destination path: %s", destination) | ||||
| 	} | ||||
| 	return strings.ReplaceAll(cleanPath, "/", "_"), nil | ||||
| } | ||||
|  | ||||
| func generateFirejailedPath(destination string) (string, error) { | ||||
| 	safeName, err := generateSafeName(destination) | ||||
| 	if err != nil { | ||||
| 		return "", err | ||||
| 	} | ||||
| 	return filepath.Join(firejailedDir, safeName), nil | ||||
| } | ||||
|  | ||||
| func createProfile(destProfilePath, profilePath string) error { | ||||
| 	srcFile, err := os.Open(profilePath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	defer srcFile.Close() | ||||
|  | ||||
| 	destFile, err := os.Create(destProfilePath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	defer destFile.Close() | ||||
|  | ||||
| 	_, err = io.Copy(destFile, srcFile) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	return destFile.Sync() | ||||
| } | ||||
|  | ||||
| func createWrapperScript(scriptPath, origFilePath, profilePath string) error { | ||||
| 	scriptContent := fmt.Sprintf("#!/bin/bash\nexec firejail --profile=%q %q \"$@\"\n", profilePath, origFilePath) | ||||
| 	return os.WriteFile(scriptPath, []byte(scriptContent), defaultDirMode) | ||||
| } | ||||
|  | ||||
| func createFirejailProfilePath(binaryPath string) (string, error) { | ||||
| 	name, err := generateSafeName(binaryPath) | ||||
| 	if err != nil { | ||||
| 		return "", err | ||||
| 	} | ||||
| 	return filepath.Join(firejailedDir, fmt.Sprintf("%s.profile", name)), nil | ||||
| } | ||||
		Reference in New Issue
	
	Block a user