diff options
author | Eelco Dolstra <e.dolstra@tudelft.nl> | 2004-08-20T14·49+0000 |
---|---|---|
committer | Eelco Dolstra <e.dolstra@tudelft.nl> | 2004-08-20T14·49+0000 |
commit | 2d35116c13e0c11210cb712f9ce6e8a38058f350 (patch) | |
tree | 62c38ca3f7a11691c54a630a4a78f0ad8810a5ad /src/Makefile.am | |
parent | 8f1dcdfc0ae05c403fe59b592093d3e61e87f1b0 (diff) |
* Setuid support for sharing a Nix installation between multiple
users. If the configure flag `--enable-setuid' is used, the Nix programs nix-env, nix-store, etc. are installed with the setuid bit turned on so that they are executed as the user and group specified by `--with-nix-user=USER' and `--with-nix-group=GROUP', respectively (with defaults `nix' and `nix'). The setuid programs drop all special privileges if they are executed by a user who is not a member of the Nix group. The setuid feature is a quick hack to enable sharing of a Nix installation between users who trust each other. It is not generally secure, since any user in the Nix group can modify (by building an appropriate derivation) any object in the store, and for instance inject trojans into binaries used by other users. The setuid programs are owned by root, not the Nix user. This is because on Unix normal users cannot change the real uid, only the effective uid. Many programs don't work properly when the real uid differs from the effective uid. For instance, Perl will turn on taint mode. However, the setuid programs drop all root privileges immediately, changing all uids and gids to the Nix user and group.
Diffstat (limited to 'src/Makefile.am')
-rw-r--r-- | src/Makefile.am | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/src/Makefile.am b/src/Makefile.am index 29bd535f6ee0..6c3e5ee209ae 100644 --- a/src/Makefile.am +++ b/src/Makefile.am @@ -1,2 +1,8 @@ SUBDIRS = bin2c boost libutil libstore libmain nix-store nix-hash \ libexpr nix-instantiate nix-env log2xml + +SETUID_PROGS = nix-store nix-instantiate nix-env +install-exec-hook: +if SETUID_HACK + cd $(DESTDIR)$(bindir) && chown root $(SETUID_PROGS) && chmod u+s $(SETUID_PROGS) +endif |