From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6622136737823981568 X-Received: by 2002:adf:e948:: with SMTP id m8-v6mr205654wrn.6.1542029831057; Mon, 12 Nov 2018 05:37:11 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:adf:b587:: with SMTP id c7-v6ls2433735wre.21.gmail; Mon, 12 Nov 2018 05:37:10 -0800 (PST) X-Google-Smtp-Source: AJdET5cTCpMt3Nitppf1TFPrfnOPRuVVLNYYneh4ZnX0+Jswr05SA6IJKLCE6Ud6MC4d0ZZTG/XY X-Received: by 2002:a5d:5686:: with SMTP id f6-v6mr210462wrv.9.1542029830665; Mon, 12 Nov 2018 05:37:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542029830; cv=none; d=google.com; s=arc-20160816; b=DIgRxve7XsV6W/O5rJ/Yrd76g7JUnAQxrJmCFOIQAYfsbnG73o7awIsTRdHL3GQoSY QaJb+gptWW9uV0U6vH2LdpQ7Zu5E2M6IlihLlhaRJDB8Um59iWBuwnWXGW9Rw2y5vIDI qGL2BKPzPDbaSt8ND4umv3tTVnbFPimz8j0dpEPmhqHejR0EnhMYy8Ou8qNE0J0BGcNq dE4hLnWnHiLPowgzK2oUIZI1um3WrJtVOqascwUDhBs146u29rW3zYHtyA542OfdxCCs 2667GaiyMCDzTVn32wcHZhpwmYlcAYOySw0UdRHDWjXf6eLFDFKnbxlrUcekBMOSgJEg udeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date; bh=Hz6eD5oWME3Y4rHLI4LzLeckE7MGQhKk7Qo6/1xJDtI=; b=CQkbn3kIayRbtIvoVU2wH7enNRDQ6a1FJXpjIZEiZfrhu5Y1NxqVn2QKrlSuJM6VEE xgZ09Iowl/tkXUP3ul+tTcAs0cxhOh54xaPEeGk+zKW5UEW93wfmykl6Dlv8kwbDlMOj aa2yz1T6wwmpBa9MkQWMQLcmX9BSWi0UoE+IAANbW24mgohNJJeUZ0/5F23vIEByLRjK Dz0pRODWyNeWAUK7reXNCWoRenwGnT0PVyLsxGVfsQW8de4YsVVRM/WcxCKz0YQB9S58 fBP3gBJBfzGpP2q2JonakMImLUbAhxcuUvK1xnsq7vsNaMGrigUy7N1hNWMmMz7WREXq E2Sg== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=henning.schild@siemens.com Return-Path: Received: from lizzard.sbs.de (lizzard.sbs.de. [194.138.37.39]) by gmr-mx.google.com with ESMTPS id 18-v6si374232wrb.2.2018.11.12.05.37.10 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 12 Nov 2018 05:37:10 -0800 (PST) Received-SPF: pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.39 as permitted sender) client-ip=194.138.37.39; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=henning.schild@siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by lizzard.sbs.de (8.15.2/8.15.2) with ESMTPS id wACDbAI1004411 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 12 Nov 2018 14:37:10 +0100 Received: from md1za8fc.ad001.siemens.net ([139.25.69.119]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id wACDbAXX018253; Mon, 12 Nov 2018 14:37:10 +0100 Date: Mon, 12 Nov 2018 14:37:09 +0100 From: Henning Schild To: Jan Kiszka Cc: isar-users Subject: Re: [PATCH] buildchroot: Align UID and GID of builder user with caller Message-ID: <20181112143709.7272ba47@md1za8fc.ad001.siemens.net> In-Reply-To: <51a426a6-c057-ada1-6d26-d9f7e31b27c4@siemens.com> References: <0ec8a678-7297-4ad9-4a9b-49d87f504061@web.de> <20181112101648.051ce0ed@md1za8fc.ad001.siemens.net> <680671b8-2c63-3447-ca15-35431178b266@siemens.com> <20181112104255.464bdf54@md1za8fc.ad001.siemens.net> <7acfa387-b037-af81-82a3-748edd97c008@siemens.com> <20181112110625.1f55f7a5@md1za8fc.ad001.siemens.net> <0cae7837-9c01-d87b-dd65-851c670caced@siemens.com> <20181112125836.370607f1@md1za8fc.ad001.siemens.net> <3b6545c8-e765-5ac6-56b6-da0fbe7ba9e9@siemens.com> <51a426a6-c057-ada1-6d26-d9f7e31b27c4@siemens.com> X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-TUID: DLebn3/LSBn8 Am Mon, 12 Nov 2018 13:27:34 +0100 schrieb Jan Kiszka : > On 12.11.18 13:11, Jan Kiszka wrote: > > On 12.11.18 12:58, Henning Schild wrote: > >> Am Mon, 12 Nov 2018 11:09:27 +0100 > >> schrieb Jan Kiszka : > >> > >>> On 12.11.18 11:06, Henning Schild wrote: > >>>> Am Mon, 12 Nov 2018 10:52:22 +0100 > >>>> schrieb Jan Kiszka : > >>>>> On 12.11.18 10:42, Henning Schild wrote: > >>>>>> Am Mon, 12 Nov 2018 10:19:54 +0100 > >>>>>> schrieb Jan Kiszka : > >>>>>>> On 12.11.18 10:16, [ext] Henning Schild wrote: > >>>>>>>> I am afraid that this is not correct. The ids you are taking > >>>>>>>> from the "host" might be taken inside the chroot. As a result > >>>>>>>> creating the user/group would fail. Chances might be low ... > >>>>>>>> This also assumes that > >>>>>>> > >>>>>>> Really? I thought that these commands are run very early > >>>>>>> during bootstrap where there are no other users - if not, > >>>>>>> that would be a bug. > >>>>>> > >>>>>> I think the only uid/gid you can really be sure about is 0. 1 > >>>>>> could already be a regular user on the host, and 1 is "daemon" > >>>>>> on a current debian ... probably there right after > >>>>>> debootstrap. > >>>>> > >>>>> Let me check if we can move the ID assignment earlier, to reduce > >>>>> that risk. > >>>> > >>>> I will look into it. Knowing a problem and reducing the risk is > >>>> not good enough. > >>>>>> > >>>>>> 1000 being the first "user" is more a convention than something > >>>>>> you can rely on for any host. (/etc/login.defs UID_MIN/MAX > >>>>>> etc.) > >>>>> > >>>>> We are talking about transferring the ID's from the host Debian > >>>>> to the buildchroot Debian - is there really a realistic risk of > >>>>> friction? > >>>> > >>>> Now you are assuming that everyone is using your container ;). > >>>> While > >>> > >>> No, this is not about the container. We already solved the problem > >>> for the container long ago (by aligning IDs). This breakage is > >>> about the host (in the container or on your host) and the > >>> buildchroot. > >> > >> If the container has aligned IDs that was a hack as well. I guess > >> for the same problem i just found .... > > > > No, this is working smoothly for quite a while now, also in many CI > > setup, because we control the container content and the fact that > > there are practically no ID overlaps. It is a mandatory feature > > there, for the same reasons like here. > >> The problem is a "chown -R" in do_unpack that brings the hosts uid > >> into the chroot. > >> That should be fixed properly some day ... i just sent a workaround > >> patch. > > > > I'm rather in favor of a proper fix to the ID mess than more > > working around it. The benefit of going for the calling user ID > > would be - if implemented properly > > - that we will have less files owned by root or some other users > > unknown to the build host, and can therefore only be purged by > > means of sudo. > > Actually, also 624b7c484bf5 could be reverted if we managed to align > IDs... I did not go all they way back to blame that chown. In fact reverting 624b7c484bf5 should solve the issue. In a buildchroot we used to have just one user "root", so chowning to anyone else is just wrong. After my patch you can now chown to builder. From inside with "builder" or from outside with the id you extract from etc/passwd. If "file server convenience" is the only reason behind that patch, please revert that one and forget my update. Henning > Jan >