Esempio n. 1
0
    def test_set_keepcaps(self, mock_prctl):
        mock_prctl.return_value = 0
        capabilities.set_keepcaps(True)

        # Disappointingly, ffi.cast(type, 1) != ffi.cast(type, 1)
        # so can't just use assert_called_once_with :-(
        self.assertEqual(1, mock_prctl.call_count)
        self.assertItemsEqual([8, 1], [int(x) for x in mock_prctl.call_args[0]])  # [PR_SET_KEEPCAPS, true]
Esempio n. 2
0
    def test_set_keepcaps(self, mock_prctl):
        mock_prctl.return_value = 0
        capabilities.set_keepcaps(True)

        # Disappointingly, ffi.cast(type, 1) != ffi.cast(type, 1)
        # so can't just use assert_called_once_with :-(
        self.assertEqual(1, mock_prctl.call_count)
        self.assertItemsEqual(
            [8, 1],  # [PR_SET_KEEPCAPS, true]
            [int(x) for x in mock_prctl.call_args[0]])
Esempio n. 3
0
    def _drop_privs(self):
        try:
            # Keep current capabilities across setuid away from root.
            capabilities.set_keepcaps(True)

            if self.group is not None:
                try:
                    os.setgroups([])
                except OSError:
                    msg = _('Failed to remove supplemental groups')
                    LOG.critical(msg)
                    raise FailedToDropPrivileges(msg)

            if self.user is not None:
                setuid(self.user)

            if self.group is not None:
                setgid(self.group)

        finally:
            capabilities.set_keepcaps(False)

        LOG.info(_LI('privsep process running with uid/gid: %(uid)s/%(gid)s'),
                 {
                     'uid': os.getuid(),
                     'gid': os.getgid()
                 })

        capabilities.drop_all_caps_except(self.caps, self.caps, [])

        def fmt_caps(capset):
            if not capset:
                return 'none'
            fc = [capabilities.CAPS_BYVALUE.get(c, str(c)) for c in capset]
            fc.sort()
            return '|'.join(fc)

        eff, prm, inh = capabilities.get_caps()
        LOG.info(
            _LI('privsep process running with capabilities '
                '(eff/prm/inh): %(eff)s/%(prm)s/%(inh)s'), {
                    'eff': fmt_caps(eff),
                    'prm': fmt_caps(prm),
                    'inh': fmt_caps(inh),
                })
Esempio n. 4
0
    def _drop_privs(self):
        try:
            # Keep current capabilities across setuid away from root.
            capabilities.set_keepcaps(True)

            if self.group is not None:
                try:
                    os.setgroups([])
                except OSError:
                    msg = _('Failed to remove supplemental groups')
                    LOG.critical(msg)
                    raise FailedToDropPrivileges(msg)

            if self.user is not None:
                setuid(self.user)

            if self.group is not None:
                setgid(self.group)

        finally:
            capabilities.set_keepcaps(False)

        LOG.info(_LI('privsep process running with uid/gid: %(uid)s/%(gid)s'),
                 {'uid': os.getuid(), 'gid': os.getgid()})

        capabilities.drop_all_caps_except(self.caps, self.caps, [])

        def fmt_caps(capset):
            if not capset:
                return 'none'
            fc = [capabilities.CAPS_BYVALUE.get(c, str(c))
                  for c in capset]
            fc.sort()
            return '|'.join(fc)

        eff, prm, inh = capabilities.get_caps()
        LOG.info(
            _LI('privsep process running with capabilities '
                '(eff/prm/inh): %(eff)s/%(prm)s/%(inh)s'),
            {
                'eff': fmt_caps(eff),
                'prm': fmt_caps(prm),
                'inh': fmt_caps(inh),
            })