ostbuild: Use split out linux-user-chroot binary
This way other meta-build projects could use it; mainly mock/pbuilder. Also I don't have to keep running chown root:root; chmod u+s in a separate root terminal after every install.
This commit is contained in:
parent
fea117cd5e
commit
d72d6c5fb1
|
|
@ -36,10 +36,5 @@ pyostbuild_PYTHON = \
|
||||||
src/ostbuild/pyostbuild/subprocess_helpers.py \
|
src/ostbuild/pyostbuild/subprocess_helpers.py \
|
||||||
$(NULL)
|
$(NULL)
|
||||||
|
|
||||||
bin_PROGRAMS += src/ostbuild/ostbuild-user-chroot
|
|
||||||
|
|
||||||
ostbuild_user_chroot_SOURCES = src/ostbuild/ostbuild-user-chroot.c
|
|
||||||
ostbuild_user_chroot_CFLAGS = $(AM_CFLAGS)
|
|
||||||
|
|
||||||
bin_SCRIPTS += src/ostbuild/ostbuild-nice-and-log-output
|
bin_SCRIPTS += src/ostbuild/ostbuild-nice-and-log-output
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,348 +0,0 @@
|
||||||
/* -*- mode: c; tab-width: 2; indent-tabs-mode: nil -*-
|
|
||||||
*
|
|
||||||
* user-chroot: A setuid program that allows non-root users to safely chroot(2)
|
|
||||||
*
|
|
||||||
* "safely": I believe that this program, when deployed as setuid on a
|
|
||||||
* typical "distribution" such as RHEL or Debian, does not, even when
|
|
||||||
* used in combination with typical software installed on that
|
|
||||||
* distribution, allow privilege escalation.
|
|
||||||
*
|
|
||||||
* Copyright 2011 Colin Walters <walters@verbum.org>
|
|
||||||
*
|
|
||||||
* This program is free software; you can redistribute it and/or modify
|
|
||||||
* it under the terms of the GNU General Public License as published by
|
|
||||||
* the Free Software Foundation; either version 2 of the License, or
|
|
||||||
* (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This program is distributed in the hope that it would be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
* GNU General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU General Public License
|
|
||||||
* along with this program; if not, write to the Free Software Foundation,
|
|
||||||
* Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
||||||
*
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
|
|
||||||
#define _GNU_SOURCE
|
|
||||||
#include <unistd.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <fcntl.h>
|
|
||||||
#include <stdarg.h>
|
|
||||||
#include <string.h>
|
|
||||||
#include <assert.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <sys/types.h>
|
|
||||||
#include <sys/prctl.h>
|
|
||||||
#include <sys/mount.h>
|
|
||||||
#include <sys/syscall.h>
|
|
||||||
#include <sys/wait.h>
|
|
||||||
#include <linux/securebits.h>
|
|
||||||
#include <sched.h>
|
|
||||||
|
|
||||||
static void fatal (const char *message, ...) __attribute__ ((noreturn)) __attribute__ ((format (printf, 1, 2)));
|
|
||||||
static void fatal_errno (const char *message) __attribute__ ((noreturn));
|
|
||||||
|
|
||||||
static void
|
|
||||||
fatal (const char *fmt,
|
|
||||||
...)
|
|
||||||
{
|
|
||||||
va_list args;
|
|
||||||
|
|
||||||
va_start (args, fmt);
|
|
||||||
|
|
||||||
vfprintf (stderr, fmt, args);
|
|
||||||
putc ('\n', stderr);
|
|
||||||
|
|
||||||
va_end (args);
|
|
||||||
exit (1);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
fatal_errno (const char *message)
|
|
||||||
{
|
|
||||||
perror (message);
|
|
||||||
exit (1);
|
|
||||||
}
|
|
||||||
|
|
||||||
typedef enum {
|
|
||||||
MOUNT_SPEC_BIND,
|
|
||||||
MOUNT_SPEC_READONLY,
|
|
||||||
MOUNT_SPEC_PROCFS
|
|
||||||
} MountSpecType;
|
|
||||||
|
|
||||||
typedef struct _MountSpec MountSpec;
|
|
||||||
struct _MountSpec {
|
|
||||||
MountSpecType type;
|
|
||||||
|
|
||||||
const char *source;
|
|
||||||
const char *dest;
|
|
||||||
|
|
||||||
MountSpec *next;
|
|
||||||
};
|
|
||||||
|
|
||||||
static MountSpec *
|
|
||||||
reverse_mount_list (MountSpec *mount)
|
|
||||||
{
|
|
||||||
MountSpec *prev = NULL;
|
|
||||||
|
|
||||||
while (mount)
|
|
||||||
{
|
|
||||||
MountSpec *next = mount->next;
|
|
||||||
mount->next = prev;
|
|
||||||
prev = mount;
|
|
||||||
mount = next;
|
|
||||||
}
|
|
||||||
|
|
||||||
return prev;
|
|
||||||
}
|
|
||||||
|
|
||||||
int
|
|
||||||
main (int argc,
|
|
||||||
char **argv)
|
|
||||||
{
|
|
||||||
const char *argv0;
|
|
||||||
const char *chroot_dir;
|
|
||||||
const char *program;
|
|
||||||
uid_t ruid, euid, suid;
|
|
||||||
gid_t rgid, egid, sgid;
|
|
||||||
int after_mount_arg_index;
|
|
||||||
unsigned int n_mounts = 0;
|
|
||||||
const unsigned int max_mounts = 50; /* Totally arbitrary... */
|
|
||||||
char **program_argv;
|
|
||||||
MountSpec *bind_mounts = NULL;
|
|
||||||
MountSpec *bind_mount_iter;
|
|
||||||
int unshare_ipc = 0;
|
|
||||||
int unshare_net = 0;
|
|
||||||
int unshare_pid = 0;
|
|
||||||
int clone_flags = 0;
|
|
||||||
int child_status = 0;
|
|
||||||
pid_t child;
|
|
||||||
|
|
||||||
if (argc <= 0)
|
|
||||||
return 1;
|
|
||||||
|
|
||||||
argv0 = argv[0];
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
|
|
||||||
if (argc < 1)
|
|
||||||
fatal ("ROOTDIR argument must be specified");
|
|
||||||
|
|
||||||
after_mount_arg_index = 0;
|
|
||||||
while (after_mount_arg_index < argc)
|
|
||||||
{
|
|
||||||
const char *arg = argv[after_mount_arg_index];
|
|
||||||
MountSpec *mount = NULL;
|
|
||||||
|
|
||||||
if (n_mounts >= max_mounts)
|
|
||||||
fatal ("Too many mounts (maximum of %u)", n_mounts);
|
|
||||||
n_mounts++;
|
|
||||||
|
|
||||||
if (strcmp (arg, "--mount-bind") == 0)
|
|
||||||
{
|
|
||||||
if ((argc - after_mount_arg_index) < 3)
|
|
||||||
fatal ("--mount-bind takes two arguments");
|
|
||||||
|
|
||||||
mount = malloc (sizeof (MountSpec));
|
|
||||||
mount->type = MOUNT_SPEC_BIND;
|
|
||||||
mount->source = argv[after_mount_arg_index+1];
|
|
||||||
mount->dest = argv[after_mount_arg_index+2];
|
|
||||||
mount->next = bind_mounts;
|
|
||||||
|
|
||||||
bind_mounts = mount;
|
|
||||||
after_mount_arg_index += 3;
|
|
||||||
}
|
|
||||||
else if (strcmp (arg, "--mount-readonly") == 0)
|
|
||||||
{
|
|
||||||
MountSpec *mount;
|
|
||||||
|
|
||||||
if ((argc - after_mount_arg_index) < 2)
|
|
||||||
fatal ("--mount-readonly takes one argument");
|
|
||||||
|
|
||||||
mount = malloc (sizeof (MountSpec));
|
|
||||||
mount->type = MOUNT_SPEC_READONLY;
|
|
||||||
mount->source = NULL;
|
|
||||||
mount->dest = argv[after_mount_arg_index+1];
|
|
||||||
mount->next = bind_mounts;
|
|
||||||
|
|
||||||
bind_mounts = mount;
|
|
||||||
after_mount_arg_index += 2;
|
|
||||||
}
|
|
||||||
else if (strcmp (arg, "--mount-proc") == 0)
|
|
||||||
{
|
|
||||||
MountSpec *mount;
|
|
||||||
|
|
||||||
if ((argc - after_mount_arg_index) < 2)
|
|
||||||
fatal ("--mount-proc takes one argument");
|
|
||||||
|
|
||||||
mount = malloc (sizeof (MountSpec));
|
|
||||||
mount->type = MOUNT_SPEC_PROCFS;
|
|
||||||
mount->source = NULL;
|
|
||||||
mount->dest = argv[after_mount_arg_index+1];
|
|
||||||
mount->next = bind_mounts;
|
|
||||||
|
|
||||||
bind_mounts = mount;
|
|
||||||
after_mount_arg_index += 2;
|
|
||||||
}
|
|
||||||
else if (strcmp (arg, "--unshare-ipc") == 0)
|
|
||||||
{
|
|
||||||
unshare_ipc = 1;
|
|
||||||
after_mount_arg_index += 1;
|
|
||||||
}
|
|
||||||
else if (strcmp (arg, "--unshare-pid") == 0)
|
|
||||||
{
|
|
||||||
unshare_pid = 1;
|
|
||||||
after_mount_arg_index += 1;
|
|
||||||
}
|
|
||||||
else if (strcmp (arg, "--unshare-net") == 0)
|
|
||||||
{
|
|
||||||
unshare_net = 1;
|
|
||||||
after_mount_arg_index += 1;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
bind_mounts = reverse_mount_list (bind_mounts);
|
|
||||||
|
|
||||||
if ((argc - after_mount_arg_index) < 2)
|
|
||||||
fatal ("usage: %s [--unshare-ipc] [--unshare-pid] [--unshare-net] [--mount-proc DIR] [--mount-readonly DIR] [--mount-bind SOURCE DEST] ROOTDIR PROGRAM ARGS...", argv0);
|
|
||||||
chroot_dir = argv[after_mount_arg_index];
|
|
||||||
program = argv[after_mount_arg_index+1];
|
|
||||||
program_argv = argv + after_mount_arg_index + 1;
|
|
||||||
|
|
||||||
if (getresgid (&rgid, &egid, &sgid) < 0)
|
|
||||||
fatal_errno ("getresgid");
|
|
||||||
if (getresuid (&ruid, &euid, &suid) < 0)
|
|
||||||
fatal_errno ("getresuid");
|
|
||||||
|
|
||||||
if (ruid == 0)
|
|
||||||
fatal ("error: ruid is 0");
|
|
||||||
if (rgid == 0)
|
|
||||||
rgid = ruid;
|
|
||||||
|
|
||||||
/* CLONE_NEWNS makes it so that when we create bind mounts below,
|
|
||||||
* we're only affecting our children, not the entire system. This
|
|
||||||
* way it's harmless to bind mount e.g. /proc over an arbitrary
|
|
||||||
* directory.
|
|
||||||
*/
|
|
||||||
clone_flags = SIGCHLD | CLONE_NEWNS;
|
|
||||||
/* CLONE_NEWIPC and CLONE_NEWUTS are avenues of communication that
|
|
||||||
* might leak outside the container; any IPC can be done by setting
|
|
||||||
* up a bind mount and using files or sockets there, if desired.
|
|
||||||
*/
|
|
||||||
if (unshare_ipc)
|
|
||||||
clone_flags |= (CLONE_NEWIPC | CLONE_NEWUTS);
|
|
||||||
/* CLONE_NEWPID helps ensure random build or test scripts don't kill
|
|
||||||
* processes outside of the container.
|
|
||||||
*/
|
|
||||||
if (unshare_pid)
|
|
||||||
clone_flags |= CLONE_NEWPID;
|
|
||||||
|
|
||||||
/* Isolated networking */
|
|
||||||
if (unshare_net)
|
|
||||||
clone_flags |= CLONE_NEWNET;
|
|
||||||
|
|
||||||
if ((child = syscall (__NR_clone, clone_flags, NULL)) < 0)
|
|
||||||
perror ("clone");
|
|
||||||
|
|
||||||
if (child == 0)
|
|
||||||
{
|
|
||||||
/*
|
|
||||||
* SECBIT_NOROOT helps close the main historical reason why only
|
|
||||||
* uid 0 can chroot(2) - because unprivileged users can create
|
|
||||||
* hard links to setuid binaries, and possibly confuse them into
|
|
||||||
* looking at data (or loading libraries) that they don't
|
|
||||||
* expect, and thus elevating privileges. With this, executing
|
|
||||||
* a setuid program doesn't gain us any new Linux capabilities
|
|
||||||
* (but it still changes uid). See below for where we create a
|
|
||||||
* MS_NOSUID bind mount.
|
|
||||||
*/
|
|
||||||
if (prctl (PR_SET_SECUREBITS,
|
|
||||||
SECBIT_NOROOT | SECBIT_NOROOT_LOCKED) < 0)
|
|
||||||
fatal_errno ("prctl (SECBIT_NOROOT)");
|
|
||||||
|
|
||||||
/* This is necessary to undo the damage "sandbox" creates on Fedora
|
|
||||||
* by making / a shared mount instead of private. This isn't
|
|
||||||
* totally correct because the targets for our bind mounts may still
|
|
||||||
* be shared, but really, Fedora's sandbox is broken.
|
|
||||||
*/
|
|
||||||
if (mount (NULL, "/", "none", MS_PRIVATE | MS_REC, NULL) < 0)
|
|
||||||
fatal_errno ("mount(/, MS_PRIVATE | MS_REC)");
|
|
||||||
|
|
||||||
/* I had thought that SECBIT_NOROOT was enough to be safe, but Serge E. Hallyn
|
|
||||||
* pointed out that setuid binaries still change uid to 0. So let's just
|
|
||||||
* disallow them at the rootfs level.
|
|
||||||
*/
|
|
||||||
if (mount (NULL, "/", "none", MS_PRIVATE | MS_REMOUNT | MS_NOSUID, NULL) < 0)
|
|
||||||
fatal_errno ("mount(/, MS_PRIVATE | MS_REC | MS_NOSUID)");
|
|
||||||
|
|
||||||
/* Now let's set up our bind mounts */
|
|
||||||
for (bind_mount_iter = bind_mounts; bind_mount_iter; bind_mount_iter = bind_mount_iter->next)
|
|
||||||
{
|
|
||||||
char *dest;
|
|
||||||
|
|
||||||
asprintf (&dest, "%s%s", chroot_dir, bind_mount_iter->dest);
|
|
||||||
|
|
||||||
if (bind_mount_iter->type == MOUNT_SPEC_READONLY)
|
|
||||||
{
|
|
||||||
if (mount (dest, dest,
|
|
||||||
NULL, MS_BIND | MS_PRIVATE, NULL) < 0)
|
|
||||||
fatal_errno ("mount (MS_BIND)");
|
|
||||||
if (mount (dest, dest,
|
|
||||||
NULL, MS_BIND | MS_PRIVATE | MS_REMOUNT | MS_RDONLY, NULL) < 0)
|
|
||||||
fatal_errno ("mount (MS_BIND | MS_RDONLY)");
|
|
||||||
}
|
|
||||||
else if (bind_mount_iter->type == MOUNT_SPEC_BIND)
|
|
||||||
{
|
|
||||||
if (mount (bind_mount_iter->source, dest,
|
|
||||||
NULL, MS_BIND | MS_PRIVATE, NULL) < 0)
|
|
||||||
fatal_errno ("mount (MS_BIND)");
|
|
||||||
}
|
|
||||||
else if (bind_mount_iter->type == MOUNT_SPEC_PROCFS)
|
|
||||||
{
|
|
||||||
if (mount ("proc", dest,
|
|
||||||
"proc", MS_MGC_VAL | MS_PRIVATE, NULL) < 0)
|
|
||||||
fatal_errno ("mount (\"proc\")");
|
|
||||||
}
|
|
||||||
else
|
|
||||||
assert (0);
|
|
||||||
free (dest);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Actually perform the chroot. */
|
|
||||||
if (chroot (chroot_dir) < 0)
|
|
||||||
fatal_errno ("chroot");
|
|
||||||
if (chdir ("/") < 0)
|
|
||||||
fatal_errno ("chdir");
|
|
||||||
|
|
||||||
/* Switch back to the uid of our invoking process. These calls are
|
|
||||||
* irrevocable - see setuid(2) */
|
|
||||||
if (setgid (rgid) < 0)
|
|
||||||
fatal_errno ("setgid");
|
|
||||||
if (setuid (ruid) < 0)
|
|
||||||
fatal_errno ("setuid");
|
|
||||||
|
|
||||||
if (execv (program, program_argv) < 0)
|
|
||||||
fatal_errno ("execv");
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Let's also setuid back in the parent - there's no reason to stay uid 0, and
|
|
||||||
* it's just better to drop privileges. */
|
|
||||||
if (setgid (rgid) < 0)
|
|
||||||
fatal_errno ("setgid");
|
|
||||||
if (setuid (ruid) < 0)
|
|
||||||
fatal_errno ("setuid");
|
|
||||||
|
|
||||||
/* Kind of lame to sit around blocked in waitpid, but oh well. */
|
|
||||||
if (waitpid (child, &child_status, 0) < 0)
|
|
||||||
fatal_errno ("waitpid");
|
|
||||||
|
|
||||||
if (WIFEXITED (child_status))
|
|
||||||
return WEXITSTATUS (child_status);
|
|
||||||
else
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
@ -118,12 +118,12 @@ class OstbuildChrootCompileOne(builtins.Builtin):
|
||||||
# below for our children inside the chroot.
|
# below for our children inside the chroot.
|
||||||
ostbuild_user_chroot_path = None
|
ostbuild_user_chroot_path = None
|
||||||
for dirname in os.environ['PATH'].split(':'):
|
for dirname in os.environ['PATH'].split(':'):
|
||||||
path = os.path.join(dirname, 'ostbuild-user-chroot')
|
path = os.path.join(dirname, 'linux-user-chroot')
|
||||||
if os.access(path, os.X_OK):
|
if os.access(path, os.X_OK):
|
||||||
ostbuild_user_chroot_path = path
|
ostbuild_user_chroot_path = path
|
||||||
break
|
break
|
||||||
if ostbuild_user_chroot_path is None:
|
if ostbuild_user_chroot_path is None:
|
||||||
ostbuild_user_chroot_path = 'ostbuild-user-chroot'
|
ostbuild_user_chroot_path = 'linux-user-chroot'
|
||||||
|
|
||||||
child_args = [ostbuild_user_chroot_path, '--unshare-pid', '--unshare-net', '--unshare-ipc',
|
child_args = [ostbuild_user_chroot_path, '--unshare-pid', '--unshare-net', '--unshare-ipc',
|
||||||
'--mount-readonly', '/',
|
'--mount-readonly', '/',
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue