v/vlib/os
2025-06-18 16:38:40 +03:00
..
asset builtin,os: enable no warnings for gg programs like v -gc boehm_leak -cg -keepc run examples/gg/minimal.v (part 1 - before the gg loop) (#24749) 2025-06-18 16:37:57 +03:00
bare parser, ast, fmt: convert "hello".str => c"hello" (fix #24635) (#24652) 2025-06-08 11:44:38 +03:00
cmdline
filelock os.filelock: compile without warnings with gcc on windows 2025-04-23 07:52:07 +03:00
font os.font: fixes for -os android 2025-06-18 16:38:40 +03:00
notify fmt: remove the prefixed module name of const names, that are in the same module (related #22183) (#22185) 2024-09-10 11:25:56 +03:00
args.v
const.v
const_nix.c.v
const_windows.c.v
debugger_darwin.c.v all: fix typos (#24470) 2025-05-13 22:05:22 +03:00
debugger_default.c.v os: add note for the availability of the debugger_present implementation (#24492) 2025-05-15 13:29:46 +03:00
debugger_freebsd.c.v all: fix typos (#24470) 2025-05-13 22:05:22 +03:00
debugger_linux.c.v all: fix typos (#24470) 2025-05-13 22:05:22 +03:00
debugger_openbsd.c.v os: add debugger_present implementation for OpenBSD (fix #23603) (#24490) 2025-05-15 13:05:39 +03:00
debugger_windows.c.v
dir_expansions_test.v all: change single blank comment to blank line (#22016) 2024-08-09 14:55:58 +03:00
environment.c.v checker: do not allow &u8(0), force nil like we do with &Type(0) 2025-05-03 22:37:51 +03:00
environment.js.v
environment_test.v os: use _wputenv instead of _putenv to stay in sync with _wgetenv (fix changing env variables with non ASCII content on windows) (#22920) 2024-11-21 01:33:02 +02:00
fd.c.v all: replace fn name '@xxx' with 'xxx' (#22506) 2024-10-12 22:17:02 +03:00
file.c.v os: fix os.File's tell/0 method for windows (fix #24217) (#24218) 2025-05-20 15:41:15 +03:00
file.js.v fmt: fix alignment of struct init fields (#22025) 2024-08-11 09:11:24 +03:00
file_buffering.c.v
file_buffering_test.v all: change single blank comment to blank line (#22016) 2024-08-09 14:55:58 +03:00
file_le_be.c.v os: fix swap_bytes_u64 (#24033) 2025-03-25 15:34:57 +02:00
file_le_be_test.v os: fix swap_bytes_u64 (#24033) 2025-03-25 15:34:57 +02:00
file_test.v os: fix os.File's tell/0 method for windows (fix #24217) (#24218) 2025-05-20 15:41:15 +03:00
filepath.v Revert "os: deprecate os.getwd in favor of os.get_current_dir (part 1) (#22966)" 2024-11-25 15:10:15 +02:00
filepath_test.v Revert "os: deprecate os.getwd in favor of os.get_current_dir (part 1) (#22966)" 2024-11-25 15:10:15 +02:00
filepath_windows.v
find_abs_path_of_executable_test.v Revert "os: deprecate os.getwd in favor of os.get_current_dir (part 1) (#22966)" 2024-11-25 15:10:15 +02:00
glob_test.v
inode.c.v fmt: fix alignment of struct init fields (#22025) 2024-08-11 09:11:24 +03:00
inode_test.v
join_path_test.v
open_and_read_from_file_test.js.v tools: cleanup entries from the hardcoded skip_files list in common.v (used by v test, v test-self etc); use the new // vtest build: syntax to mark the tests instead (#23918) 2025-03-13 19:51:51 +02:00
open_uri_default.c.v
open_uri_windows.c.v
os.c.v checker: do not allow &u8(0), force nil like we do with &Type(0) 2025-05-03 22:37:51 +03:00
os.js.v fmt: fix alignment of struct init fields (#22025) 2024-08-11 09:11:24 +03:00
os.v os: support dotfiles := os.walk_ext('.', '', hidden: true) (#24617) 2025-06-01 17:10:04 +03:00
os_android_outside_termux.c.v fmt: fix alignment of enumeration types (#21999) 2024-08-07 15:46:50 +03:00
os_darwin.c.v
os_js.js.v Revert "os: deprecate os.getwd in favor of os.get_current_dir (part 1) (#22966)" 2024-11-25 15:10:15 +02:00
os_linux.c.v
os_nix.c.v os: add disk_usage/1 (#23634) 2025-02-02 19:32:21 +02:00
os_stat_default.c.v fmt: fix formating a file in an oscillating manner (fix #22223, fix #22026) (#22232) 2024-09-17 09:47:38 +03:00
os_stat_test.v tests: skip an assertion in os_stat_test.v on OpenBSD (fix #22123) (#22124) 2024-08-28 11:23:08 +03:00
os_stat_windows.c.v fmt: fix formating a file in an oscillating manner (fix #22223, fix #22026) (#22232) 2024-09-17 09:47:38 +03:00
os_structs_dirent_default.c.v
os_structs_sigaction_default.c.v
os_structs_stat_default.c.v
os_structs_stat_linux.c.v
os_structs_stat_windows.c.v
os_structs_utsname_default.c.v
os_test.c.v os: support dotfiles := os.walk_ext('.', '', hidden: true) (#24617) 2025-06-01 17:10:04 +03:00
os_windows.c.v os: force using C.CREATE_NO_WINDOW on windows in os.raw_execute/1 (fix #24390) (#24418) 2025-05-05 19:48:11 +03:00
password_nix.c.v
password_windows.c.v
process.c.v os: implement Process.is_pending() on windows (fix #23990) (#23993) 2025-03-21 11:03:03 +02:00
process.js.v
process.v fmt: fix and simplify align of struct fields (#21995) 2024-08-05 20:23:39 +03:00
process_nix.c.v os: implement Process.is_pending() on windows (fix #23990) (#23993) 2025-03-21 11:03:03 +02:00
process_test.v os,tools: make easier analyzing process_test.v failures on the CI 2025-03-26 14:00:47 +02:00
process_windows.c.v checker: do not allow &u8(0), force nil like we do with &Type(0) 2025-05-03 22:37:51 +03:00
README.md
signal.c.v v: use -check-unused-fn-args to cleanup the compiler code itself 2024-11-18 12:10:03 +02:00
signal.js.v
signal.v os: document the various enum values in os.Signal (#22770) 2024-11-05 20:50:09 +02:00
signal_darwin.c.v
signal_default.c.v
signal_linux.c.v
signal_test.v
signal_windows.c.v v: use -check-unused-fn-args to cleanup the compiler code itself 2024-11-18 12:10:03 +02:00
sleeping.c.v os: improve robustness of create_folder_when_it_does_not_exist/1 (fix CI false positives for vab-compiles-v-examples) (#22548) 2024-10-17 15:51:04 +03:00
sleeping.js.v os: improve robustness of create_folder_when_it_does_not_exist/1 (fix CI false positives for vab-compiles-v-examples) (#22548) 2024-10-17 15:51:04 +03:00
xdg_test.v os: implement os.data_dir(), os.state_dir(), os.local_bin_dir() + tests (#22426) 2024-10-07 07:23:50 +03:00

Description

os provides common OS/platform independent functions for accessing command line arguments, reading/writing files, listing folders, handling processes etc.


A few os module functions can lead to the TOCTOU vulnerability if used incorrectly. TOCTOU (Time-of-Check-to-Time-of-Use problem) can occur when a file, folder or similar is checked for certain specifications (e.g. read, write permissions) and a change is made afterwards. In the time between the initial check and the edit, an attacker can then cause damage. The following example shows an attack strategy on the left and an improved variant on the right so that TOCTOU is no longer possible.

Example
Hint: os.create() opens a file in write-only mode

Possibility for TOCTOU attack TOCTOU not possible
if os.is_writable("file") {
    // time to make a quick attack
    // (e.g. symlink /etc/passwd to `file`)

    mut f := os.create('path/to/file')!
    // do something with file
    f.close()
}
mut f := os.create('path/to/file') or {
    println("file not writable")
}

// file is locked
// do something with file

f.close()

Proven affected functions
The following functions should be used with care and only when used correctly.

  • os.is_readable()
  • os.is_writable()
  • os.is_executable()
  • os.is_link()