v/vlib/os
2025-06-28 09:27:09 +03:00
..
asset builtin,os: enable no warnings for gg programs like v -gc boehm_leak -cg -keepc run examples/gg/minimal.v (part 1 - before the gg loop) (#24749) 2025-06-18 16:37:57 +03:00
bare parser, ast, fmt: convert "hello".str => c"hello" (fix #24635) (#24652) 2025-06-08 11:44:38 +03:00
cmdline
filelock os.filelock: compile without warnings with gcc on windows 2025-04-23 07:52:07 +03:00
font os.font: fixes for -os android 2025-06-18 16:38:40 +03:00
notify fmt: remove the prefixed module name of const names, that are in the same module (related #22183) (#22185) 2024-09-10 11:25:56 +03:00
args.v
const.v
const_nix.c.v
const_windows.c.v
debugger_darwin.c.v all: fix typos (#24470) 2025-05-13 22:05:22 +03:00
debugger_default.c.v os: improve documentation (#24790) 2025-06-25 22:29:47 +03:00
debugger_freebsd.c.v all: fix typos (#24470) 2025-05-13 22:05:22 +03:00
debugger_linux.c.v all: fix typos (#24470) 2025-05-13 22:05:22 +03:00
debugger_openbsd.c.v os: add debugger_present implementation for OpenBSD (fix #23603) (#24490) 2025-05-15 13:05:39 +03:00
debugger_windows.c.v
dir_expansions_test.v all: change single blank comment to blank line (#22016) 2024-08-09 14:55:58 +03:00
environment.c.v os: fix documentation for environ function (#24796) 2025-06-26 19:25:02 +03:00
environment.js.v
environment_test.v os: use _wputenv instead of _putenv to stay in sync with _wgetenv (fix changing env variables with non ASCII content on windows) (#22920) 2024-11-21 01:33:02 +02:00
fd.c.v all: replace fn name '@xxx' with 'xxx' (#22506) 2024-10-12 22:17:02 +03:00
file.c.v os: improve documentation (#24790) 2025-06-25 22:29:47 +03:00
file.js.v fmt: fix alignment of struct init fields (#22025) 2024-08-11 09:11:24 +03:00
file_buffering.c.v
file_buffering_test.v all: change single blank comment to blank line (#22016) 2024-08-09 14:55:58 +03:00
file_le_be.c.v os: fix swap_bytes_u64 (#24033) 2025-03-25 15:34:57 +02:00
file_le_be_test.v os: fix swap_bytes_u64 (#24033) 2025-03-25 15:34:57 +02:00
file_test.v os: fix os.File's tell/0 method for windows (fix #24217) (#24218) 2025-05-20 15:41:15 +03:00
filepath.v Revert "os: deprecate os.getwd in favor of os.get_current_dir (part 1) (#22966)" 2024-11-25 15:10:15 +02:00
filepath_test.v Revert "os: deprecate os.getwd in favor of os.get_current_dir (part 1) (#22966)" 2024-11-25 15:10:15 +02:00
filepath_windows.v
find_abs_path_of_executable_test.v os: do not resolve symlinks in os.find_abs_path_of_executable/1 (fix #24759) (#24761) 2025-06-24 02:53:13 +03:00
glob_test.v
inode.c.v os: improve documentation (#24790) 2025-06-25 22:29:47 +03:00
inode_test.v
join_path_test.v
open_and_read_from_file_test.js.v tools: cleanup entries from the hardcoded skip_files list in common.v (used by v test, v test-self etc); use the new // vtest build: syntax to mark the tests instead (#23918) 2025-03-13 19:51:51 +02:00
open_uri_default.c.v
open_uri_windows.c.v
os.c.v os: add os.write_bytes/2 as a complement to os.read_bytes/1, add test 2025-06-28 09:27:09 +03:00
os.js.v fmt: fix alignment of struct init fields (#22025) 2024-08-11 09:11:24 +03:00
os.v os: improve documentation (#24790) 2025-06-25 22:29:47 +03:00
os_android_outside_termux.c.v
os_darwin.c.v
os_js.js.v Revert "os: deprecate os.getwd in favor of os.get_current_dir (part 1) (#22966)" 2024-11-25 15:10:15 +02:00
os_linux.c.v
os_nix.c.v os: improve documentation (#24790) 2025-06-25 22:29:47 +03:00
os_stat_default.c.v os: improve documentation (#24790) 2025-06-25 22:29:47 +03:00
os_stat_test.v tests: skip an assertion in os_stat_test.v on OpenBSD (fix #22123) (#22124) 2024-08-28 11:23:08 +03:00
os_stat_windows.c.v fmt: fix formating a file in an oscillating manner (fix #22223, fix #22026) (#22232) 2024-09-17 09:47:38 +03:00
os_structs_dirent_default.c.v
os_structs_sigaction_default.c.v
os_structs_stat_default.c.v
os_structs_stat_linux.c.v
os_structs_stat_windows.c.v
os_structs_utsname_default.c.v
os_test.c.v os: add os.write_bytes/2 as a complement to os.read_bytes/1, add test 2025-06-28 09:27:09 +03:00
os_windows.c.v os: force using C.CREATE_NO_WINDOW on windows in os.raw_execute/1 (fix #24390) (#24418) 2025-05-05 19:48:11 +03:00
password_nix.c.v
password_windows.c.v
process.c.v os: improve documentation (#24790) 2025-06-25 22:29:47 +03:00
process.js.v
process.v
process_nix.c.v os: implement Process.is_pending() on windows (fix #23990) (#23993) 2025-03-21 11:03:03 +02:00
process_test.v os,tools: make easier analyzing process_test.v failures on the CI 2025-03-26 14:00:47 +02:00
process_windows.c.v checker: do not allow &u8(0), force nil like we do with &Type(0) 2025-05-03 22:37:51 +03:00
README.md
signal.c.v v: use -check-unused-fn-args to cleanup the compiler code itself 2024-11-18 12:10:03 +02:00
signal.js.v
signal.v os: document the various enum values in os.Signal (#22770) 2024-11-05 20:50:09 +02:00
signal_darwin.c.v
signal_default.c.v
signal_linux.c.v
signal_test.v
signal_windows.c.v v: use -check-unused-fn-args to cleanup the compiler code itself 2024-11-18 12:10:03 +02:00
sleeping.c.v os: improve robustness of create_folder_when_it_does_not_exist/1 (fix CI false positives for vab-compiles-v-examples) (#22548) 2024-10-17 15:51:04 +03:00
sleeping.js.v os: improve robustness of create_folder_when_it_does_not_exist/1 (fix CI false positives for vab-compiles-v-examples) (#22548) 2024-10-17 15:51:04 +03:00
xdg_test.v os: implement os.data_dir(), os.state_dir(), os.local_bin_dir() + tests (#22426) 2024-10-07 07:23:50 +03:00

Description

os provides common OS/platform independent functions for accessing command line arguments, reading/writing files, listing folders, handling processes etc.


A few os module functions can lead to the TOCTOU vulnerability if used incorrectly. TOCTOU (Time-of-Check-to-Time-of-Use problem) can occur when a file, folder or similar is checked for certain specifications (e.g. read, write permissions) and a change is made afterwards. In the time between the initial check and the edit, an attacker can then cause damage. The following example shows an attack strategy on the left and an improved variant on the right so that TOCTOU is no longer possible.

Example
Hint: os.create() opens a file in write-only mode

Possibility for TOCTOU attack TOCTOU not possible
if os.is_writable("file") {
    // time to make a quick attack
    // (e.g. symlink /etc/passwd to `file`)

    mut f := os.create('path/to/file')!
    // do something with file
    f.close()
}
mut f := os.create('path/to/file') or {
    println("file not writable")
}

// file is locked
// do something with file

f.close()

Proven affected functions
The following functions should be used with care and only when used correctly.

  • os.is_readable()
  • os.is_writable()
  • os.is_executable()
  • os.is_link()