v/vlib/os
2024-03-25 12:18:27 +02:00
..
bare
cmdline
filelock v.util: make launch_tool more robust, when multiple v -b js file.v commands are run at the same time (all trying to recompile the JS backend program) (#20631) 2024-01-22 18:03:20 +02:00
font all: update copyright year (#20334) 2024-01-01 23:29:54 +02:00
notify all: unwrap const() blocks 2023-11-25 10:02:51 +03:00
args.v all: update copyright year (#20334) 2024-01-01 23:29:54 +02:00
const.v
const_nix.c.v all: unwrap const() blocks 2023-11-25 10:02:51 +03:00
const_windows.c.v all: unwrap const() blocks 2023-11-25 10:02:51 +03:00
debugger_darwin.c.v all: update attributes to use new syntax 2023-11-15 16:16:01 +11:00
debugger_default.c.v all: update attributes to use new syntax 2023-11-15 16:16:01 +11:00
debugger_freebsd.c.v all: update attributes to use new syntax 2023-11-15 16:16:01 +11:00
debugger_linux.c.v all: update attributes to use new syntax 2023-11-15 16:16:01 +11:00
debugger_windows.c.v all: update attributes to use new syntax 2023-11-15 16:16:01 +11:00
dir_expansions_test.v vfmt: change all '$expr' to '${expr}' (#16428) 2022-11-15 16:53:13 +03:00
environment.c.v all: update copyright year (#20334) 2024-01-01 23:29:54 +02:00
environment.js.v vlib: update doc comments (#19231) 2023-08-30 08:50:00 +03:00
environment_test.v vfmt: change all '$expr' to '${expr}' (#16428) 2022-11-15 16:53:13 +03:00
fd.c.v all: update attributes to use new syntax 2023-11-15 16:16:01 +11:00
file.c.v all: fix typos (#21089) 2024-03-25 12:18:27 +02:00
file.js.v os: fix File.read() in JS backends (fix #20501) (#20633) 2024-01-29 15:07:25 +02:00
file_buffering.c.v os: add File.set_buffer and related helpers + tests (#20661) 2024-01-26 20:44:23 +02:00
file_buffering_test.v os: add File.set_buffer and related helpers + tests (#20661) 2024-01-26 20:44:23 +02:00
file_test.v all: fix typos (#21089) 2024-03-25 12:18:27 +02:00
filepath.v all: unwrap const() blocks 2023-11-25 10:02:51 +03:00
filepath_test.v vfmt: change all '$expr' to '${expr}' (#16428) 2022-11-15 16:53:13 +03:00
filepath_windows.v os: correct description of windows_volume function (#14726) 2022-06-09 10:56:58 +03:00
find_abs_path_of_executable_test.v tests: cleanup legacy temp path (#19716) 2023-10-31 15:16:19 +02:00
glob_test.v all: change optional to result of io (#16075) 2022-10-16 09:28:57 +03:00
inode.c.v all: fix typos (#21089) 2024-03-25 12:18:27 +02:00
inode_test.v all: unwrap const() blocks 2023-11-25 10:02:51 +03:00
open_and_read_from_file_test.js.v os: fix File.read() in JS backends (fix #20501) (#20633) 2024-01-29 15:07:25 +02:00
open_uri_default.c.v vlib: update doc comments (#19231) 2023-08-30 08:50:00 +03:00
open_uri_windows.c.v vlib: update doc comments (#19231) 2023-08-30 08:50:00 +03:00
os.c.v all: fix typos (#21089) 2024-03-25 12:18:27 +02:00
os.js.v os: add os.path_devnull (containing /dev/null on POSIX and \\.\nul on Windows) (#20439) 2024-01-08 18:00:36 +02:00
os.v all: fix typos (#21089) 2024-03-25 12:18:27 +02:00
os_android_outside_termux.c.v all: make all struct C.XYZ -> pub struct C.XYZ (#19651) 2023-10-25 15:01:50 +03:00
os_darwin.c.v all: update copyright year (#20334) 2024-01-01 23:29:54 +02:00
os_js.js.v os: return the long path for os.temp_dir() on windows, even for folders like c:\someth~1 (#17623) 2023-03-14 00:51:52 +02:00
os_linux.c.v all: update copyright year (#20334) 2024-01-01 23:29:54 +02:00
os_nix.c.v os: refactor to use os.stat and os.lstat instead of unsafe C calls (#20759) 2024-02-08 19:27:49 +02:00
os_stat_default.c.v os: refactor to use os.stat and os.lstat instead of unsafe C calls (#20759) 2024-02-08 19:27:49 +02:00
os_stat_test.v os: don't check rdev equality on FreeBSD, inside vlib/os/os_stat_test.v (#20885) 2024-02-22 19:31:12 +02:00
os_stat_windows.c.v os: refactor to use os.stat and os.lstat instead of unsafe C calls (#20759) 2024-02-08 19:27:49 +02:00
os_structs_dirent_default.c.v all: make all struct C.XYZ -> pub struct C.XYZ (#19651) 2023-10-25 15:01:50 +03:00
os_structs_sigaction_default.c.v all: make all struct C.XYZ -> pub struct C.XYZ (#19651) 2023-10-25 15:01:50 +03:00
os_structs_stat_default.c.v os: add os.stat() and helpers (#20739) 2024-02-07 07:12:03 +02:00
os_structs_stat_linux.c.v all: make all struct C.XYZ -> pub struct C.XYZ (#19651) 2023-10-25 15:01:50 +03:00
os_structs_stat_windows.v os: add os.stat() and helpers (#20739) 2024-02-07 07:12:03 +02:00
os_structs_utsname_default.c.v all: make all struct C.XYZ -> pub struct C.XYZ (#19651) 2023-10-25 15:01:50 +03:00
os_test.c.v os: add error_posix() and error_win32() for explicit platform error handling and default behavior (#20694) 2024-01-31 07:25:07 +02:00
os_windows.c.v all: fix typos (#21089) 2024-03-25 12:18:27 +02:00
password_nix.c.v os,term.termios: add termios.set_state/2, state.disable_echo/0, use them in os.input_password, to fix v -os wasm32_emscripten examples/2048/ 2023-07-31 10:28:45 +03:00
password_windows.c.v clipboard: fix v -cstrict -cc gcc vlib/clipboard/clipboard_test.v 2023-10-15 21:21:29 +03:00
process.c.v os: add proper process termination with p.signal_term() (#20671) 2024-01-27 23:25:36 +02:00
process.js.v vfmt: change all '$expr' to '${expr}' (#16428) 2022-11-15 16:53:13 +03:00
process.v os: cleanup field comments of os.Process (#21023) 2024-03-15 09:11:44 +02:00
process_nix.c.v os: add proper process termination with p.signal_term() (#20671) 2024-01-27 23:25:36 +02:00
process_test.v all: unwrap const() blocks 2023-11-25 10:02:51 +03:00
process_windows.c.v os: add proper process termination with p.signal_term() (#20671) 2024-01-27 23:25:36 +02:00
README.md doc: update trim_doc_node_description, make module readmes more uniform (#20792) 2024-02-12 12:38:47 +02:00
signal.c.v os: add a convenient way to ignore certain system signals (#19639) 2023-10-25 17:15:26 +03:00
signal.js.v os: return the long path for os.temp_dir() on windows, even for folders like c:\someth~1 (#17623) 2023-03-14 00:51:52 +02:00
signal.v Revert "os: add a convenient way to ignore certain system signals (#19632)" (#19637) 2023-10-24 03:06:57 +03:00
signal_darwin.c.v all: update attributes to use new syntax 2023-11-15 16:16:01 +11:00
signal_default.c.v os: fix bootstrapping for OpenBSD 2023-11-16 13:43:55 +02:00
signal_linux.c.v os: fix bootstrapping for OpenBSD 2023-11-16 13:43:55 +02:00
signal_test.v os: add a convenient way to ignore certain system signals (#19639) 2023-10-25 17:15:26 +03:00
signal_windows.c.v all: update attributes to use new syntax 2023-11-15 16:16:01 +11:00

Description

os provides common OS/platform independent functions for accessing command line arguments, reading/writing files, listing folders, handling processes etc.


A few os module functions can lead to the TOCTOU vulnerability if used incorrectly. TOCTOU (Time-of-Check-to-Time-of-Use problem) can occur when a file, folder or similar is checked for certain specifications (e.g. read, write permissions) and a change is made afterwards. In the time between the initial check and the edit, an attacker can then cause damage. The following example shows an attack strategy on the left and an improved variant on the right so that TOCTOU is no longer possible.

Example Hint: os.create() opens a file in write-only mode

Possibility for TOCTOU attack TOCTOU not possible
if os.is_writable("file") {
    // time to make a quick attack
    // (e.g. symlink /etc/passwd to `file`)

    mut f := os.create('path/to/file')!
    // do something with file
    f.close()
}
mut f := os.create('path/to/file') or {
    println("file not writable")
}

// file is locked
// do something with file

f.close()

Proven affected functions
The following functions should be used with care and only when used correctly.

  • os.is_readable()
  • os.is_writable()
  • os.is_executable()
  • os.is_link()