gotatun 0.1.1

an implementation of the WireGuard® protocol designed for portability and speed
Documentation
// Copyright (c) 2019 Cloudflare, Inc. All rights reserved.
//
// Modified by Mullvad VPN.
// Copyright (c) 2025 Mullvad VPN.
//
// SPDX-License-Identifier: BSD-3-Clause

use crate::device::Error;
#[cfg(unix)]
use libc::{gid_t, setgid, setuid, uid_t};
use std::io;

#[cfg(target_os = "macos")]
use nix::unistd::User;

pub fn get_saved_ids() -> Result<(uid_t, gid_t), Error> {
    // Get the user name of the sudoer
    #[cfg(target_os = "macos")]
    match std::env::var("USER") {
        Ok(uname) => match User::from_name(&uname) {
            Ok(Some(user)) => Ok((uid_t::from(user.uid), gid_t::from(user.gid))),
            Err(e) => Err(Error::DropPrivileges(format!(
                "Failed parse user; err: {e:?}"
            ))),
            Ok(None) => Err(Error::DropPrivileges("Failed to find user".to_owned())),
        },
        Err(e) => Err(Error::DropPrivileges(format!(
            "Could not get environment variable for user; err: {e:?}"
        ))),
    }
    #[cfg(not(target_os = "macos"))]
    {
        use libc::{getlogin, getpwnam};

        let uname = unsafe { getlogin() };
        if uname.is_null() {
            return Err(Error::DropPrivileges("NULL from getlogin".to_owned()));
        }
        let userinfo = unsafe { getpwnam(uname) };
        if userinfo.is_null() {
            return Err(Error::DropPrivileges("NULL from getpwnam".to_owned()));
        }

        // Saved group ID
        let saved_gid = unsafe { (*userinfo).pw_gid };
        // Saved user ID
        let saved_uid = unsafe { (*userinfo).pw_uid };

        Ok((saved_uid, saved_gid))
    }
}

pub fn drop_privileges() -> Result<(), Error> {
    let (saved_uid, saved_gid) = get_saved_ids()?;

    if -1 == unsafe { setgid(saved_gid) } {
        // Set real and effective group ID
        return Err(Error::DropPrivileges(
            io::Error::last_os_error().to_string(),
        ));
    }

    if -1 == unsafe { setuid(saved_uid) } {
        // Set  real and effective user ID
        return Err(Error::DropPrivileges(
            io::Error::last_os_error().to_string(),
        ));
    }

    // Validated we can't get sudo back again
    if unsafe { (setgid(0) != -1) || (setuid(0) != -1) } {
        Err(Error::DropPrivileges(
            "Failed to permanently drop privileges".to_owned(),
        ))
    } else {
        Ok(())
    }
}