Skip to content

Commit

Permalink
Merge pull request #3923 from obsidiansystems/daemon-auth-cleanup
Browse files Browse the repository at this point in the history
Separate auth and logic for the daemon
  • Loading branch information
edolstra committed Aug 13, 2020
2 parents 574bf60 + 8d4162f commit 859cd4a
Show file tree
Hide file tree
Showing 5 changed files with 25 additions and 16 deletions.
3 changes: 2 additions & 1 deletion src/libstore/build.cc
Expand Up @@ -2920,7 +2920,8 @@ void DerivationGoal::startDaemon()
FdSink to(remote.get());
try {
daemon::processConnection(store, from, to,
daemon::NotTrusted, daemon::Recursive, "nobody", 65535);
daemon::NotTrusted, daemon::Recursive,
[&](Store & store) { store.createUser("nobody", 65535); });
debug("terminated daemon connection");
} catch (SysError &) {
ignoreException();
Expand Down
13 changes: 2 additions & 11 deletions src/libstore/daemon.cc
Expand Up @@ -817,8 +817,7 @@ void processConnection(
FdSink & to,
TrustedFlag trusted,
RecursiveFlag recursive,
const std::string & userName,
uid_t userId)
std::function<void(Store &)> authHook)
{
auto monitor = !recursive ? std::make_unique<MonitorFdHup>(from.fd) : nullptr;

Expand Down Expand Up @@ -859,15 +858,7 @@ void processConnection(

/* If we can't accept clientVersion, then throw an error
*here* (not above). */

#if 0
/* Prevent users from doing something very dangerous. */
if (geteuid() == 0 &&
querySetting("build-users-group", "") == "")
throw Error("if you run 'nix-daemon' as root, then you MUST set 'build-users-group'!");
#endif

store->createUser(userName, userId);
authHook(*store);

tunnelLogger->stopWork();
to.flush();
Expand Down
7 changes: 5 additions & 2 deletions src/libstore/daemon.hh
Expand Up @@ -12,7 +12,10 @@ void processConnection(
FdSink & to,
TrustedFlag trusted,
RecursiveFlag recursive,
const std::string & userName,
uid_t userId);
/* Arbitrary hook to check authorization / initialize user data / whatever
after the protocol has been negotiated. The idea is that this function
and everything it calls doesn't know about this stuff, and the
`nix-daemon` handles that instead. */
std::function<void(Store &)> authHook);

}
15 changes: 13 additions & 2 deletions src/nix-daemon/nix-daemon.cc
Expand Up @@ -239,7 +239,15 @@ static void daemonLoop(char * * argv)
// Handle the connection.
FdSource from(remote.get());
FdSink to(remote.get());
processConnection(openUncachedStore(), from, to, trusted, NotRecursive, user, peer.uid);
processConnection(openUncachedStore(), from, to, trusted, NotRecursive, [&](Store & store) {
#if 0
/* Prevent users from doing something very dangerous. */
if (geteuid() == 0 &&
querySetting("build-users-group", "") == "")
throw Error("if you run 'nix-daemon' as root, then you MUST set 'build-users-group'!");
#endif
store.createUser(user, peer.uid);
});

exit(0);
}, options);
Expand Down Expand Up @@ -324,7 +332,10 @@ static int _main(int argc, char * * argv)
} else {
FdSource from(STDIN_FILENO);
FdSink to(STDOUT_FILENO);
processConnection(openUncachedStore(), from, to, Trusted, NotRecursive, "root", 0);
/* Auth hook is empty because in this mode we blindly trust the
standard streams. Limitting access to thoses is explicitly
not `nix-daemon`'s responsibility. */
processConnection(openUncachedStore(), from, to, Trusted, NotRecursive, [&](Store & _){});
}
} else {
daemonLoop(argv);
Expand Down
3 changes: 3 additions & 0 deletions tests/remote-store.sh
Expand Up @@ -2,6 +2,9 @@ source common.sh

clearStore

# Ensure "fake ssh" remote store works just as legacy fake ssh would.
nix --store ssh-ng://localhost?remote-store=$TEST_ROOT/other-store doctor

startDaemon

storeCleared=1 NIX_REMOTE_=$NIX_REMOTE $SHELL ./user-envs.sh
Expand Down

0 comments on commit 859cd4a

Please sign in to comment.