Source file src/cmd/go/internal/fips140/fips140.go
1 // Copyright 2024 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 // Package fips implements support for the GOFIPS140 build setting. 6 // 7 // The GOFIPS140 build setting controls two aspects of the build: 8 // 9 // - Whether binaries are built to default to running in FIPS-140 mode, 10 // meaning whether they default to GODEBUG=fips140=on or =off. 11 // 12 // - Which copy of the crypto/internal/fips140 source code to use. 13 // The default is obviously GOROOT/src/crypto/internal/fips140, 14 // but earlier snapshots that have differing levels of external 15 // validation and certification are stored in GOROOT/lib/fips140 16 // and can be substituted into the build instead. 17 // 18 // This package provides the logic needed by the rest of the go command 19 // to make those decisions and implement the resulting policy. 20 // 21 // [Init] must be called to initialize the FIPS logic. It may fail and 22 // call base.Fatalf. 23 // 24 // When GOFIPS140=off, [Enabled] returns false, and the build is 25 // unchanged from its usual behaviors. 26 // 27 // When GOFIPS140 is anything else, [Enabled] returns true, and the build 28 // sets the default GODEBUG to include fips140=on. This will make 29 // binaries change their behavior at runtime to confirm to various 30 // FIPS-140 details. [cmd/go/internal/load.defaultGODEBUG] calls 31 // [fips.Enabled] when preparing the default settings. 32 // 33 // For all builds, FIPS code and data is laid out in contiguous regions 34 // that are conceptually concatenated into a "fips object file" that the 35 // linker hashes and then binaries can re-hash at startup to detect 36 // corruption of those symbols. When [Enabled] is true, the link step 37 // passes -fipso={a.Objdir}/fips.o to the linker to save a copy of the 38 // fips.o file. Since the first build target always uses a.Objdir set to 39 // $WORK/b001, a build like 40 // 41 // GOFIPS140=latest go build -work my/binary 42 // 43 // will leave fips.o behind in $WORK/b001 44 // (unless the build result is cached, of course). 45 // 46 // When GOFIPS140 is set to something besides off and latest, [Snapshot] 47 // returns true, indicating that the build should replace the latest copy 48 // of crypto/internal/fips140 with an earlier snapshot. The reason to do 49 // this is to use a copy that has been through additional lab validation 50 // (an "in-process" module) or NIST certification (a "certified" module). 51 // The snapshots are stored in GOROOT/lib/fips140 in module zip form. 52 // When a snapshot is being used, Init unpacks it into the module cache 53 // and then uses that directory as the source location. 54 // 55 // A FIPS snapshot like v1.2.3 is integrated into the build in two different ways. 56 // 57 // First, the snapshot's fips140 directory replaces crypto/internal/fips140 58 // using fsys.Bind. The effect is to appear to have deleted crypto/internal/fips140 59 // and everything below it, replacing it with the single subdirectory 60 // crypto/internal/fips140/v1.2.3, which now has the FIPS packages. 61 // This virtual file system replacement makes patterns like std and crypto... 62 // automatically see the snapshot packages instead of the original packages 63 // as they walk GOROOT/src/crypto/internal/fips140. 64 // 65 // Second, ResolveImport is called to resolve an import like crypto/internal/fips140/sha256. 66 // When snapshot v1.2.3 is being used, ResolveImport translates that path to 67 // crypto/internal/fips140/v1.2.3/sha256 and returns the actual source directory 68 // in the unpacked snapshot. Using the actual directory instead of the 69 // virtual directory GOROOT/src/crypto/internal/fips140/v1.2.3 makes sure 70 // that other tools using go list -json output can find the sources, 71 // as well as making sure builds have a real directory in which to run the 72 // assembler, compiler, and so on. The translation of the import path happens 73 // in the same code that handles mapping golang.org/x/mod to 74 // cmd/vendor/golang.org/x/mod when building commands. 75 // 76 // It is not strictly required to include v1.2.3 in the import path when using 77 // a snapshot - we could make things work without doing that - but including 78 // the v1.2.3 gives a different version of the code a different name, which is 79 // always a good general rule. In particular, it will mean that govulncheck need 80 // not have any special cases for crypto/internal/fips140 at all. The reports simply 81 // need to list the relevant symbols in a given Go version. (For example, if a bug 82 // is only in the in-tree copy but not the snapshots, it doesn't list the snapshot 83 // symbols; if it's in any snapshots, it has to list the specific snapshot symbols 84 // in addition to the “normal” symbol.) 85 package fips140 86 87 import ( 88 "cmd/go/internal/base" 89 "cmd/go/internal/cfg" 90 "cmd/go/internal/fsys" 91 "cmd/go/internal/modfetch" 92 "cmd/go/internal/str" 93 "context" 94 "os" 95 "path" 96 "path/filepath" 97 "slices" 98 "strings" 99 100 "golang.org/x/mod/module" 101 "golang.org/x/mod/semver" 102 ) 103 104 // Init initializes the FIPS settings. 105 // It must be called before using any other functions in this package. 106 // If initialization fails, Init calls base.Fatalf. 107 func Init() { 108 if initDone { 109 return 110 } 111 initDone = true 112 initVersion() 113 initDir() 114 if Snapshot() { 115 fsys.Bind(Dir(), filepath.Join(cfg.GOROOT, "src/crypto/internal/fips140")) 116 } 117 118 // ExperimentErr != nil if GOEXPERIMENT failed to parse. Typically 119 // cmd/go main will exit in this case, but it is allowed during 120 // toolchain selection, as the GOEXPERIMENT may be valid for the 121 // selected toolchain version. 122 if cfg.ExperimentErr == nil && cfg.Experiment.BoringCrypto && Enabled() { 123 base.Fatalf("go: cannot use GOFIPS140 with GOEXPERIMENT=boringcrypto") 124 } 125 if slices.Contains(cfg.BuildContext.BuildTags, "purego") && Enabled() { 126 base.Fatalf("go: cannot use GOFIPS140 with the purego build tag") 127 } 128 } 129 130 var initDone bool 131 132 // checkInit panics if Init has not been called. 133 func checkInit() { 134 if !initDone { 135 panic("fips: not initialized") 136 } 137 } 138 139 // Version reports the GOFIPS140 version in use, 140 // which is either "off", "latest", or a version like "v1.2.3". 141 // If GOFIPS140 is set to an alias like "inprocess" or "certified", 142 // Version returns the underlying version. 143 func Version() string { 144 checkInit() 145 return version 146 } 147 148 // Enabled reports whether FIPS mode is enabled at all. 149 // That is, it reports whether GOFIPS140 is set to something besides "off". 150 func Enabled() bool { 151 checkInit() 152 return version != "off" 153 } 154 155 // Snapshot reports whether FIPS mode is using a source snapshot 156 // rather than $GOROOT/src/crypto/internal/fips140. 157 // That is, it reports whether GOFIPS140 is set to something besides "latest" or "off". 158 func Snapshot() bool { 159 checkInit() 160 return version != "latest" && version != "off" 161 } 162 163 var version string 164 165 func initVersion() { 166 // For off and latest, use the local source tree. 167 v := cfg.GOFIPS140 168 if v == "off" || v == "" { 169 version = "off" 170 return 171 } 172 if v == "latest" { 173 version = "latest" 174 return 175 } 176 177 // Otherwise version must exist in lib/fips140, either as 178 // a .zip (a source snapshot like v1.2.0.zip) 179 // or a .txt (a redirect like inprocess.txt, containing a version number). 180 if strings.Contains(v, "/") || strings.Contains(v, `\`) || strings.Contains(v, "..") { 181 base.Fatalf("go: malformed GOFIPS140 version %q", cfg.GOFIPS140) 182 } 183 if cfg.GOROOT == "" { 184 base.Fatalf("go: missing GOROOT for GOFIPS140") 185 } 186 187 file := filepath.Join(cfg.GOROOT, "lib", "fips140", v) 188 if data, err := os.ReadFile(file + ".txt"); err == nil { 189 v = strings.TrimSpace(string(data)) 190 file = filepath.Join(cfg.GOROOT, "lib", "fips140", v) 191 if _, err := os.Stat(file + ".zip"); err != nil { 192 base.Fatalf("go: unknown GOFIPS140 version %q (from %q)", v, cfg.GOFIPS140) 193 } 194 } 195 196 if _, err := os.Stat(file + ".zip"); err == nil { 197 // Found version. Add a build tag. 198 cfg.BuildContext.BuildTags = append(cfg.BuildContext.BuildTags, "fips140"+semver.MajorMinor(v)) 199 version = v 200 return 201 } 202 203 base.Fatalf("go: unknown GOFIPS140 version %q", v) 204 } 205 206 // Dir reports the directory containing the crypto/internal/fips140 source code. 207 // If Snapshot() is false, Dir returns GOROOT/src/crypto/internal/fips140. 208 // Otherwise Dir ensures that the snapshot has been unpacked into the 209 // module cache and then returns the directory in the module cache 210 // corresponding to the crypto/internal/fips140 directory. 211 func Dir() string { 212 checkInit() 213 return dir 214 } 215 216 var dir string 217 218 func initDir() { 219 v := version 220 if v == "latest" || v == "off" { 221 dir = filepath.Join(cfg.GOROOT, "src/crypto/internal/fips140") 222 return 223 } 224 225 mod := module.Version{Path: "golang.org/fips140", Version: v} 226 file := filepath.Join(cfg.GOROOT, "lib/fips140", v+".zip") 227 zdir, err := modfetch.Unzip(context.Background(), mod, file) 228 if err != nil { 229 base.Fatalf("go: unpacking GOFIPS140=%v: %v", v, err) 230 } 231 dir = filepath.Join(zdir, "fips140") 232 return 233 } 234 235 // ResolveImport resolves the import path imp. 236 // If it is of the form crypto/internal/fips140/foo 237 // (not crypto/internal/fips140/v1.2.3/foo) 238 // and we are using a snapshot, then LookupImport 239 // rewrites the path to crypto/internal/fips140/v1.2.3/foo 240 // and returns that path and its location in the unpacked 241 // FIPS snapshot. 242 func ResolveImport(imp string) (newPath, dir string, ok bool) { 243 checkInit() 244 const fips = "crypto/internal/fips140" 245 if !Snapshot() || !str.HasPathPrefix(imp, fips) { 246 return "", "", false 247 } 248 fipsv := path.Join(fips, version) 249 var sub string 250 if str.HasPathPrefix(imp, fipsv) { 251 sub = "." + imp[len(fipsv):] 252 } else { 253 sub = "." + imp[len(fips):] 254 } 255 newPath = path.Join(fips, version, sub) 256 dir = filepath.Join(Dir(), version, sub) 257 return newPath, dir, true 258 } 259