Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Set and restore permissions for /var/run/user/UID #219

Merged
merged 1 commit into from
Apr 18, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
39 changes: 37 additions & 2 deletions app/dockerdwrapper.c
Original file line number Diff line number Diff line change
Expand Up @@ -144,6 +144,33 @@ static void quit_program(int exit_code) {
main_loop_quit();
}

static bool with_compose(void) {
return strcmp(APP_NAME, "dockerdwrapperwithcompose") == 0;
}

static char* xdg_runtime_directory(void) {
return g_strdup_printf("/var/run/user/%d", getuid());
}

static bool set_xdg_directory_permisssions(mode_t mode) {
g_autofree char* xdg_runtime_dir = xdg_runtime_directory();
if (chmod(xdg_runtime_dir, mode) != 0) {
log_error("Failed to set permissions on %s: %s", xdg_runtime_dir, strerror(errno));
return false;
}
return true;
}

static bool let_other_apps_use_our_ipc_socket(void) {
const mode_t group_read_and_exec_perms = 0750;
return set_xdg_directory_permisssions(group_read_and_exec_perms);
}

static bool prevent_others_from_using_our_ipc_socket(void) {
const mode_t user_read_and_exec_perms = 0700;
return set_xdg_directory_permisssions(user_read_and_exec_perms);
}

/**
* @brief Signals handling
*
Expand Down Expand Up @@ -431,7 +458,8 @@ static gboolean get_and_verify_tls_selection(AXParameter* param_handle, bool* us
return true;
}

// Read and verify consistency of settings. Call set_status_parameter() and return false on error.
// Read and verify consistency of settings. Call set_status_parameter() or quit_program() and return
// false on error.
static bool read_settings(struct settings* settings, const struct app_state* app_state) {
AXParameter* param_handle = app_state->param_handle;
settings->use_tcp_socket = is_parameter_yes(param_handle, PARAM_TCP_SOCKET);
Expand All @@ -458,6 +486,11 @@ static bool read_settings(struct settings* settings, const struct app_state* app
return false;
}

if (settings->use_ipc_socket && with_compose() && !let_other_apps_use_our_ipc_socket()) {
quit_program(EX_SOFTWARE);
return false;
}

if (!(settings->data_root = prepare_data_root(param_handle, app_state->sd_card_area)))
return false;

Expand Down Expand Up @@ -731,6 +764,8 @@ static void dockerd_process_exited_callback(GPid pid, gint status, gpointer app_
g_autofree char* pid_path = g_strdup_printf("/var/run/user/%d/docker.pid", getuid());
remove(pid_path);

prevent_others_from_using_our_ipc_socket();

main_loop_quit(); // Trigger a restart of dockerd from main()
}

Expand Down Expand Up @@ -844,7 +879,7 @@ static bool set_env_variables(void) {
g_strdup_printf("/bin:/usr/bin:%s:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin",
APP_DIRECTORY);
g_autofree char* docker_host = g_strdup_printf("unix:///var/run/user/%d/docker.sock", uid);
g_autofree char* xdg_runtime_dir = g_strdup_printf("/var/run/user/%d", uid);
g_autofree char* xdg_runtime_dir = xdg_runtime_directory();

return set_env_variable("PATH", path) && set_env_variable("HOME", APP_DIRECTORY) &&
set_env_variable("DOCKER_HOST", docker_host) &&
Expand Down