Compare commits
No commits in common. "ee00d1e95e84cec29a68c27af324f3baac91a4a4" and "ec0c9d3bcd1f359ab7d2356a31c5f56c72a5702f" have entirely different histories.
ee00d1e95e
...
ec0c9d3bcd
|
@ -2565,6 +2565,17 @@ static int apply_mount_namespace(
|
||||||
|
|
||||||
assert(context);
|
assert(context);
|
||||||
|
|
||||||
|
/* The runtime struct only contains the parent of the private /tmp,
|
||||||
|
* which is non-accessible to world users. Inside of it there's a /tmp
|
||||||
|
* that is sticky, and that's the one we want to use here. */
|
||||||
|
|
||||||
|
if (context->private_tmp && runtime) {
|
||||||
|
if (runtime->tmp_dir)
|
||||||
|
tmp = strjoina(runtime->tmp_dir, "/tmp");
|
||||||
|
if (runtime->var_tmp_dir)
|
||||||
|
var = strjoina(runtime->var_tmp_dir, "/tmp");
|
||||||
|
}
|
||||||
|
|
||||||
if (params->flags & EXEC_APPLY_CHROOT) {
|
if (params->flags & EXEC_APPLY_CHROOT) {
|
||||||
root_image = context->root_image;
|
root_image = context->root_image;
|
||||||
|
|
||||||
|
@ -2577,18 +2588,7 @@ static int apply_mount_namespace(
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
needs_sandboxing = (params->flags & EXEC_APPLY_SANDBOXING) && !(command->flags & EXEC_COMMAND_FULLY_PRIVILEGED);
|
needs_sandboxing = (params->flags & EXEC_APPLY_SANDBOXING) && !(command->flags & EXEC_COMMAND_FULLY_PRIVILEGED);
|
||||||
if (needs_sandboxing) {
|
if (needs_sandboxing)
|
||||||
/* The runtime struct only contains the parent of the private /tmp,
|
|
||||||
* which is non-accessible to world users. Inside of it there's a /tmp
|
|
||||||
* that is sticky, and that's the one we want to use here. */
|
|
||||||
|
|
||||||
if (context->private_tmp && runtime) {
|
|
||||||
if (runtime->tmp_dir)
|
|
||||||
tmp = strjoina(runtime->tmp_dir, "/tmp");
|
|
||||||
if (runtime->var_tmp_dir)
|
|
||||||
var = strjoina(runtime->var_tmp_dir, "/tmp");
|
|
||||||
}
|
|
||||||
|
|
||||||
ns_info = (NamespaceInfo) {
|
ns_info = (NamespaceInfo) {
|
||||||
.ignore_protect_paths = false,
|
.ignore_protect_paths = false,
|
||||||
.private_dev = context->private_devices,
|
.private_dev = context->private_devices,
|
||||||
|
@ -2600,7 +2600,7 @@ static int apply_mount_namespace(
|
||||||
.mount_apivfs = context->mount_apivfs,
|
.mount_apivfs = context->mount_apivfs,
|
||||||
.private_mounts = context->private_mounts,
|
.private_mounts = context->private_mounts,
|
||||||
};
|
};
|
||||||
} else if (!context->dynamic_user && root_dir)
|
else if (!context->dynamic_user && root_dir)
|
||||||
/*
|
/*
|
||||||
* If DynamicUser=no and RootDirectory= is set then lets pass a relaxed
|
* If DynamicUser=no and RootDirectory= is set then lets pass a relaxed
|
||||||
* sandbox info, otherwise enforce it, don't ignore protected paths and
|
* sandbox info, otherwise enforce it, don't ignore protected paths and
|
||||||
|
@ -3511,17 +3511,13 @@ static int exec_child(
|
||||||
|
|
||||||
if (ns_type_supported(NAMESPACE_NET)) {
|
if (ns_type_supported(NAMESPACE_NET)) {
|
||||||
r = setup_netns(runtime->netns_storage_socket);
|
r = setup_netns(runtime->netns_storage_socket);
|
||||||
if (r == -EPERM)
|
if (r < 0) {
|
||||||
log_unit_warning_errno(unit, r,
|
|
||||||
"PrivateNetwork=yes is configured, but network namespace setup failed, ignoring: %m");
|
|
||||||
else if (r < 0) {
|
|
||||||
*exit_status = EXIT_NETWORK;
|
*exit_status = EXIT_NETWORK;
|
||||||
return log_unit_error_errno(unit, r, "Failed to set up network namespacing: %m");
|
return log_unit_error_errno(unit, r, "Failed to set up network namespacing: %m");
|
||||||
}
|
}
|
||||||
} else if (context->network_namespace_path) {
|
} else if (context->network_namespace_path) {
|
||||||
*exit_status = EXIT_NETWORK;
|
*exit_status = EXIT_NETWORK;
|
||||||
return log_unit_error_errno(unit, SYNTHETIC_ERRNO(EOPNOTSUPP),
|
return log_unit_error_errno(unit, SYNTHETIC_ERRNO(EOPNOTSUPP), "NetworkNamespacePath= is not supported, refusing.");
|
||||||
"NetworkNamespacePath= is not supported, refusing.");
|
|
||||||
} else
|
} else
|
||||||
log_unit_warning(unit, "PrivateNetwork=yes is configured, but the kernel does not support network namespaces, ignoring.");
|
log_unit_warning(unit, "PrivateNetwork=yes is configured, but the kernel does not support network namespaces, ignoring.");
|
||||||
}
|
}
|
||||||
|
|
|
@ -294,7 +294,6 @@ static void test_exec_privatetmp(Manager *m) {
|
||||||
|
|
||||||
test(__func__, m, "exec-privatetmp-yes.service", can_unshare ? 0 : EXIT_FAILURE, CLD_EXITED);
|
test(__func__, m, "exec-privatetmp-yes.service", can_unshare ? 0 : EXIT_FAILURE, CLD_EXITED);
|
||||||
test(__func__, m, "exec-privatetmp-no.service", 0, CLD_EXITED);
|
test(__func__, m, "exec-privatetmp-no.service", 0, CLD_EXITED);
|
||||||
test(__func__, m, "exec-privatetmp-disabled-by-prefix.service", can_unshare ? 0 : EXIT_FAILURE, CLD_EXITED);
|
|
||||||
|
|
||||||
unlink("/tmp/test-exec_privatetmp");
|
unlink("/tmp/test-exec_privatetmp");
|
||||||
}
|
}
|
||||||
|
|
|
@ -109,7 +109,6 @@ test_data_files = '''
|
||||||
test-execute/exec-privatenetwork-yes.service
|
test-execute/exec-privatenetwork-yes.service
|
||||||
test-execute/exec-privatetmp-no.service
|
test-execute/exec-privatetmp-no.service
|
||||||
test-execute/exec-privatetmp-yes.service
|
test-execute/exec-privatetmp-yes.service
|
||||||
test-execute/exec-privatetmp-disabled-by-prefix.service
|
|
||||||
test-execute/exec-protecthome-tmpfs-vs-protectsystem-strict.service
|
test-execute/exec-protecthome-tmpfs-vs-protectsystem-strict.service
|
||||||
test-execute/exec-protectkernellogs-yes-capabilities.service
|
test-execute/exec-protectkernellogs-yes-capabilities.service
|
||||||
test-execute/exec-protectkernellogs-no-capabilities.service
|
test-execute/exec-protectkernellogs-no-capabilities.service
|
||||||
|
|
|
@ -10,6 +10,7 @@ ExecStart=touch /tmp/a ; /bin/sh -c 'touch /tmp/b' ; touch /tmp/c
|
||||||
ExecStart=test -f /tmp/a
|
ExecStart=test -f /tmp/a
|
||||||
ExecStart=!test -f /tmp/b
|
ExecStart=!test -f /tmp/b
|
||||||
ExecStart=!!test -f /tmp/c
|
ExecStart=!!test -f /tmp/c
|
||||||
|
ExecStart=+test -f /tmp/c
|
||||||
ExecStartPost=rm /tmp/a /tmp/b /tmp/c
|
ExecStartPost=rm /tmp/a /tmp/b /tmp/c
|
||||||
|
|
||||||
PrivateTmp=true
|
PrivateTmp=true
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
[Unit]
|
|
||||||
Description=Test for PrivateTmp=yes with prefix
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStart=/bin/sh -x -c 'test ! -f /tmp/test-exec_privatetmp'
|
|
||||||
ExecStart=+/bin/sh -x -c 'test -f /tmp/test-exec_privatetmp'
|
|
||||||
Type=oneshot
|
|
||||||
PrivateTmp=yes
|
|
Loading…
Reference in New Issue