-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve root & user separation #37
Comments
From what I understand, you only need real root access for:
Am I right or did I miss something? |
aurutils uses root fairly freely iirc, particularly for chroot builds. Currently the aurto repo files are all root and the update timers are root. Since the timer runs as root it must have root owned config & scripts to be secure. So that's why it is as it is. I'd like everything to be in the home dir, but I'm not sure how best to do that. I already have some passwordless rules for wheel in Maybe we can configure aurutils to not need root, use a home dir chroot directory etc? |
It's fairly easy to have timers or services run in non root. You can use A bigger problem is, afaik, aurutils needs sudo (and uses it freely) because in the end it uses devtools which also expects to use sudo. So, I also would go to a all user's home but I don't see how that's help. If I remember something else, I'll let you know. |
Well the problematic commands are arch-nspawn and mkchrootpkg(uses arch-nspwan underneath anyways). So we need to talk to devtools devs to investigate whether user namespaces could work(The only method to get systemd-nspawn,arch-nspawn is a wraper, to run unpriviledged) |
Can we improve what bits of aurto are root or user?
Currently we require both concepts, the systemd timers run as root, so some root-owned config makes sense for them.
The text was updated successfully, but these errors were encountered: