diff --git a/Makefile.am b/Makefile.am index a75d9b2f2a..6388767468 100644 --- a/Makefile.am +++ b/Makefile.am @@ -463,7 +463,7 @@ CAPABILITIES = $(if @ENABLE_SETCAP@,true,false) RUN_GDB = $(if $(GDB_FRONTEND),$(GDB_FRONTEND),gdb --tui --args) if ENABLE_SETCAP -SET_CAPS_COMMAND=sudo @SETCAP@ cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep coolforkit && sudo @SETCAP@ cap_sys_admin=ep coolmount +SET_CAPS_COMMAND=sudo @SETCAP@ cap_fowner,cap_chown,cap_sys_chroot=ep coolforkit && sudo @SETCAP@ cap_sys_admin=ep coolmount else SET_CAPS_COMMAND=echo "Skipping capability setting" endif diff --git a/common/JailUtil.cpp b/common/JailUtil.cpp index 137fb8c747..ad3e34e889 100644 --- a/common/JailUtil.cpp +++ b/common/JailUtil.cpp @@ -14,6 +14,7 @@ #include "FileUtil.hpp" #include "JailUtil.hpp" +#include #include #include #include @@ -314,107 +315,6 @@ void setupChildRoot(bool bindMount, const std::string& childRoot, const std::str "mount_jail_tree config in coolwsd.xml."); } -/// Create a random device, either via mknod or by bind-mounting. -bool createRandomDeviceInJail(const std::string& root, const std::string& devicePath, dev_t dev) -{ - const std::string absPath = root + devicePath; - - if (FileUtil::Stat(absPath).exists()) - { - LOG_DBG("Random device [" << devicePath << "] already exits"); - return true; - } - - LOG_DBG("Making [" << devicePath << "] node in [" << root << "/dev]"); - - if (mknod((absPath).c_str(), - S_IFCHR | S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH, dev) == 0) - { - LOG_DBG("Created random device [" << absPath << ']'); - return true; - } - - const auto mknodErrno = errno; - - if (isBindMountingEnabled()) - { - static bool warned = false; - if (!warned) - { - warned = true; - LOG_WRN("Performance issue: nodev mount permission or mknod fails. Have to bind mount " - "random devices"); - } - - Poco::File(absPath).createFile(); - if (coolmount("-b", devicePath, absPath)) - { - LOG_DBG("Bind mounted [" << devicePath << "] -> [" << absPath << ']'); - return true; - } - - LOG_INF("Failed to bind mount [" << devicePath << "] -> [" << absPath << ']'); - } - else - { - LOG_INF("Failed to create random device via mknod(" - << absPath << "). Mount must not use nodev flag, or bind-mount must be enabled: " - << strerror(mknodErrno)); - } - - static bool warned = false; - if (!warned) - { - warned = true; - LOG_ERR("Failed to create random device [" - << devicePath << "] at [" << absPath - << "]. Please either allow creating devices or enable bind-mounting. Some " - "features, such us password-protection and document-signing, might not work"); - } - - return false; -} - -// This is the second stage of setting up /dev/[u]random -// in the jails. Here we create the random devices in -// /tmp/dev/ in the jail chroot. See setupRandomDeviceLinks(). -void setupJailDevNodes(const std::string& root) -{ - if (!FileUtil::isWritable(root)) - { - LOG_WRN("Path [" << root << "] is read-only. Will not create the random device nodes."); - return; - } - - const auto pathDev = Poco::Path(root, "/dev"); - - try - { - // Create the path first. - Poco::File(pathDev).createDirectory(); - } - catch (const std::exception& ex) - { - LOG_ERR("Failed to create [" << pathDev.toString() << "]: " << ex.what()); - return; - } - -#ifndef __FreeBSD__ - // Create the random and urandom devices. - createRandomDeviceInJail(root, "/dev/random", makedev(1, 8)); - createRandomDeviceInJail(root, "/dev/urandom", makedev(1, 9)); -#else - if (!FileUtil::Stat(root + "/dev/random").exists()) - { - const bool res = coolmount("-d", "", root + "/dev"); - if (res) - LOG_TRC("Mounted devfs hierarchy -> [" << root << "/dev]."); - else - LOG_ERR("Failed to mount devfs -> [" << root << "/dev]."); - } -#endif -} - /// The envar name used to control bind-mounting of systemplate/jails. constexpr const char* BIND_MOUNTING_ENVAR_NAME = "COOL_BIND_MOUNT"; diff --git a/common/JailUtil.hpp b/common/JailUtil.hpp index 12b94da919..cbaf31cb4c 100644 --- a/common/JailUtil.hpp +++ b/common/JailUtil.hpp @@ -52,9 +52,6 @@ void createJailPath(const std::string& path); /// Setup the Child-Root directory. void setupChildRoot(bool bindMount, const std::string& jailRoot, const std::string& sysTemplate); -/// Setup /dev/random and /dev/urandom in the given jail path. -void setupJailDevNodes(const std::string& root); - /// Enable bind-mounting in this process. void enableBindMounting(); diff --git a/config.h.in b/config.h.in index 6dfbcf7d40..f83dc2a643 100644 --- a/config.h.in +++ b/config.h.in @@ -105,3 +105,10 @@ /* Define to 1 if this is the WASM app build. */ #undef WASMAPP + +/* Define to 1 if we have sys/random.h */ +#undef HAVE_SYS_RANDOM_H + +/* Define to 1 if we have a getentropy function */ +#undef HAVE_GETENTROPY + diff --git a/coolwsd.spec.in b/coolwsd.spec.in index 4624ba5433..924d3ea2b2 100644 --- a/coolwsd.spec.in +++ b/coolwsd.spec.in @@ -94,7 +94,7 @@ getent group cool >/dev/null || groupadd -r cool getent passwd cool >/dev/null || useradd -g cool -r cool -d /opt/cool -s /bin/bash %post -setcap cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep /usr/bin/coolforkit +setcap cap_fowner,cap_chown,cap_sys_chroot=ep /usr/bin/coolforkit setcap cap_sys_admin=ep /usr/bin/coolmount if [ -f /etc/loolwsd/loolwsd.xml ]; then /usr/bin/coolconfig migrateconfig --write; fi # compatibility with older systemd versions diff --git a/debian/coolwsd.postinst.in b/debian/coolwsd.postinst.in index 96eebef9a1..84f6c53783 100644 --- a/debian/coolwsd.postinst.in +++ b/debian/coolwsd.postinst.in @@ -4,7 +4,7 @@ set -e case "$1" in configure) - setcap cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep /usr/bin/coolforkit || true + setcap cap_fowner,cap_chown,cap_sys_chroot=ep /usr/bin/coolforkit || true setcap cap_sys_admin=ep /usr/bin/coolmount || true if [ -f /etc/loolwsd/loolwsd.xml ]; then /usr/bin/coolconfig migrateconfig --write || true; fi diff --git a/docker/from-source/ArchLinux b/docker/from-source/ArchLinux index 5fd7f81bd0..140d06d7f8 100644 --- a/docker/from-source/ArchLinux +++ b/docker/from-source/ArchLinux @@ -20,7 +20,7 @@ COPY /start-collabora-online.sh / # set up Collabora Online (normally done by postinstall script of package) # Fix permissions -RUN setcap cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep /usr/bin/coolforkit && \ +RUN setcap cap_fowner,cap_chown,cap_sys_chroot=ep /usr/bin/coolforkit && \ setcap cap_sys_admin=ep /usr/bin/coolmount && \ useradd --system --user-group --create-home --home-dir /opt/cool cool && \ rm -rf /opt/cool && \ diff --git a/docker/from-source/Debian b/docker/from-source/Debian index d119670739..71504921db 100644 --- a/docker/from-source/Debian +++ b/docker/from-source/Debian @@ -24,7 +24,7 @@ COPY /start-collabora-online.sh / # set up Collabora Online (normally done by postinstall script of package) # Fix permissions -RUN setcap cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep /usr/bin/coolforkit && \ +RUN setcap cap_fowner,cap_chown,cap_sys_chroot=ep /usr/bin/coolforkit && \ setcap cap_sys_admin=ep /usr/bin/coolmount && \ adduser --quiet --system --group --home /opt/cool cool && \ rm -rf /opt/cool && \ diff --git a/docker/from-source/Ubuntu b/docker/from-source/Ubuntu index 698ac2fc37..9dd0964781 100644 --- a/docker/from-source/Ubuntu +++ b/docker/from-source/Ubuntu @@ -26,7 +26,7 @@ COPY /start-collabora-online.sh / # set up Collabora Online (normally done by postinstall script of package) # Fix permissions -RUN setcap cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep /usr/bin/coolforkit && \ +RUN setcap cap_fowner,cap_chown,cap_sys_chroot=ep /usr/bin/coolforkit && \ setcap cap_sys_admin=ep /usr/bin/coolmount && \ adduser --quiet --system --group --home /opt/cool cool && \ rm -rf /opt/cool && \ diff --git a/docker/from-source/openSUSE b/docker/from-source/openSUSE index 147b739727..d14f7f9905 100644 --- a/docker/from-source/openSUSE +++ b/docker/from-source/openSUSE @@ -20,7 +20,7 @@ COPY /start-collabora-online.sh / # set up Collabora Online (normally done by postinstall script of package) # Fix permissions -RUN setcap cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep /usr/bin/coolforkit && \ +RUN setcap cap_fowner,cap_chown,cap_sys_chroot=ep /usr/bin/coolforkit && \ setcap cap_sys_admin=ep /usr/bin/coolmount && \ groupadd -r cool && \ useradd -g cool -r cool -d /opt/cool -s /bin/bash && \ diff --git a/kit/ForKit.cpp b/kit/ForKit.cpp index e33a9a9b6b..316c571606 100644 --- a/kit/ForKit.cpp +++ b/kit/ForKit.cpp @@ -256,8 +256,6 @@ static bool haveCorrectCapabilities() // Do check them all, don't shortcut with && if (!haveCapability(CAP_SYS_CHROOT)) result = false; - if (!haveCapability(CAP_MKNOD)) - result = false; if (!haveCapability(CAP_FOWNER)) result = false; if (!haveCapability(CAP_CHOWN)) diff --git a/kit/Kit.cpp b/kit/Kit.cpp index f618e0683a..72cc31e7f8 100644 --- a/kit/Kit.cpp +++ b/kit/Kit.cpp @@ -2709,9 +2709,13 @@ void copyCertificateDatabaseToTmp(Poco::Path const& jailPath) } } } + #endif } + + + void lokit_main( #if !MOBILEAPP const std::string& childRoot, @@ -2917,8 +2921,7 @@ void lokit_main( } } - // Setup the devices inside /tmp and set TMPDIR. - JailUtil::setupJailDevNodes(Poco::Path(jailPath, "/tmp").toString()); + // Setup /tmp and set TMPDIR. ::setenv("TMPDIR", "/tmp", 1); allowedPaths += ":w:/tmp"; diff --git a/wsd/COOLWSD.cpp b/wsd/COOLWSD.cpp index 595eea7cbf..6bb7d70991 100644 --- a/wsd/COOLWSD.cpp +++ b/wsd/COOLWSD.cpp @@ -3361,7 +3361,7 @@ bool COOLWSD::createForKit() std::string parentPath = Path(Application::instance().commandPath()).parent().toString(); #if STRACE_COOLFORKIT - // if you want to use this, you need to sudo setcap cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep /usr/bin/strace + // if you want to use this, you need to sudo setcap cap_fowner,cap_chown,cap_sys_chroot=ep /usr/bin/strace args.push_back("-o"); args.push_back("strace.log"); args.push_back("-f");