diff options
author | Ludovic Courtès <ludo@gnu.org> | 2015-07-01 14:56:34 +0200 |
---|---|---|
committer | Ludovic Courtès <ludo@gnu.org> | 2015-07-02 22:53:00 +0200 |
commit | 2cd28517b13524c242c7758783b0b2d8250fdded (patch) | |
tree | 4001bc369c1d051b6201585058ac211da62499d9 | |
parent | 6e38685ef65284093df79ebe7378bac33b0e7e5d (diff) | |
download | guix-2cd28517b13524c242c7758783b0b2d8250fdded.tar.gz |
Preserve supplementary groups of build users
The following patch is an attempt to address this bug (see <http://bugs.gnu.org/18994>) by preserving the supplementary groups of build users in the build environment. In practice, I would expect that supplementary groups would contain only one or two groups: the build users group, and possibly the “kvm” group. [Changed &at(0) to data() and removed tabs - Eelco]
-rw-r--r-- | nix/libstore/build.cc | 22 |
1 files changed, 18 insertions, 4 deletions
diff --git a/nix/libstore/build.cc b/nix/libstore/build.cc index 9041ae0095..5c05d8fa85 100644 --- a/nix/libstore/build.cc +++ b/nix/libstore/build.cc @@ -447,6 +447,7 @@ private: string user; uid_t uid; gid_t gid; + std::vector<gid_t> supplementaryGIDs; public: UserLock(); @@ -460,6 +461,7 @@ public: string getUser() { return user; } uid_t getUID() { return uid; } uid_t getGID() { return gid; } + std::vector<gid_t> getSupplementaryGIDs() { return supplementaryGIDs; } bool enabled() { return uid != 0; } @@ -539,6 +541,17 @@ void UserLock::acquire() throw Error(format("the Nix user should not be a member of `%1%'") % settings.buildUsersGroup); + /* Get the list of supplementary groups of this build user. This + is usually either empty or contains a group such as "kvm". */ + supplementaryGIDs.resize(10); + int ngroups = supplementaryGIDs.size(); + int err = getgrouplist(pw->pw_name, pw->pw_gid, + supplementaryGIDs.data(), &ngroups); + if (err == -1) + throw Error(format("failed to get list of supplementary groups for ‘%1’") % pw->pw_name); + + supplementaryGIDs.resize(ngroups); + return; } } @@ -2173,10 +2186,11 @@ void DerivationGoal::runChild() setuid() when run as root sets the real, effective and saved UIDs. */ if (buildUser.enabled()) { - printMsg(lvlChatty, format("switching to user `%1%'") % buildUser.getUser()); - - if (setgroups(0, 0) == -1) - throw SysError("cannot clear the set of supplementary groups"); + /* Preserve supplementary groups of the build user, to allow + admins to specify groups such as "kvm". */ + if (setgroups(buildUser.getSupplementaryGIDs().size(), + buildUser.getSupplementaryGIDs().data()) == -1) + throw SysError("cannot set supplementary groups of build user"); if (setgid(buildUser.getGID()) == -1 || getgid() != buildUser.getGID() || |