Chroot: change root to explicit prefix and label sub-dirs

Change the root of a session request into an explicit path and apply the
label-to-path conversion using the "path_prefix" policy attribute. This
is in addition to only applying a root change with a "path" attribute.

Ref #3031
Fix #3056
This commit is contained in:
Emery Hemingway 2018-11-23 14:40:38 +01:00 committed by Christian Helmuth
parent 74f2954013
commit 447329eaee
2 changed files with 11 additions and 4 deletions

View File

@ -6,8 +6,10 @@ hierarchy of directories.
Sessions matching policies with _path_ attributes will be "chrooted" to the Sessions matching policies with _path_ attributes will be "chrooted" to the
configured policy path, sessions not matching policies with _path_ attributes configured policy path, sessions not matching policies with _path_ attributes
will be chrooted into paths formed from each session label element. Sessions will be chrooted into paths formed from each session label element. Sessions
requests are downgraded to read-only requests unless matched by polices matching polices with a _path_prefix_ attribute are both rooted at the
with an affirmative _writeable_ attribute. Sessions not matching any attribute path and in sub-directories formed by the session label.
Sessions requests are downgraded to read-only requests unless matched by
polices with an affirmative _writeable_ attribute. Sessions not matching any
policy are rejected. policy are rejected.
Please note that this server is only effective for File_system servers that Please note that this server is only effective for File_system servers that

View File

@ -112,8 +112,13 @@ struct Chroot::Main
Session_label const label = label_from_args(args.string()); Session_label const label = label_from_args(args.string());
Session_policy const policy(label, config_rom.xml()); Session_policy const policy(label, config_rom.xml());
/* Use a chroot path from policy */ if (policy.has_attribute("path_prefix")) {
if (policy.has_attribute("path")) { /* Use a chroot path from policy and label sub-directories */
policy.attribute("path_prefix").value(tmp, sizeof(tmp));
root_path.import(tmp);
root_path.append(path_from_label<Path>(label.string()).string());
} else if (policy.has_attribute("path")) {
/* Use a chroot path from policy */
policy.attribute("path").value(tmp, sizeof(tmp)); policy.attribute("path").value(tmp, sizeof(tmp));
root_path.import(tmp); root_path.import(tmp);
} else { } else {