diff options
author | Eelco Dolstra <e.dolstra@tudelft.nl> | 2004-09-09T21·12+0000 |
---|---|---|
committer | Eelco Dolstra <e.dolstra@tudelft.nl> | 2004-09-09T21·12+0000 |
commit | 47f87072ad42338a9b6397a250abf2775d051d8e (patch) | |
tree | 6b90037f189ae2b2c750c5c4286b55ef866278d1 /src/libutil/util.hh | |
parent | 5396304c73190c6898981caf653fc1b28be71f70 (diff) |
* A very dirty hack to make setuid installations a bit nicer to use.
Previously there was the problem that all files read by nix-env etc. should be reachable and readable by the Nix user. So for instance building a Nix expression in your home directory meant that the home directory should have at least g+x or o+x permission so that the Nix user could reach the Nix expression. Now we just switch back to the original user just prior to reading sources and the like. The places where this happens are somewhat arbitrary, however. Any scope that has a live SwitchToOriginalUser object in it is executed as the original user. * Back out r1385. setreuid() sets the saved uid to the new real/effective uid, which prevents us from switching back to the original uid. setresuid() doesn't have this problem (although the manpage has a bug: specifying -1 for the saved uid doesn't leave it unchanged; an explicit value must be specified).
Diffstat (limited to 'src/libutil/util.hh')
-rw-r--r-- | src/libutil/util.hh | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/src/libutil/util.hh b/src/libutil/util.hh index 13f28dc221b8..ae5b4882e62d 100644 --- a/src/libutil/util.hh +++ b/src/libutil/util.hh @@ -246,4 +246,14 @@ string statusToString(int status); bool statusOk(int status); +/* !!! HACK HACK HACK - this should be in shared.hh, but it's to + facilitate a quick hack - will remove this eventually (famous last + words). */ +struct SwitchToOriginalUser +{ + SwitchToOriginalUser(); + ~SwitchToOriginalUser(); +}; + + #endif /* !__UTIL_H */ |