mirror of
https://github.com/morgan9e/systemd
synced 2026-04-15 00:47:10 +09:00
mountfsd: allow privileged users to mount bare unprotected filesystems
This is useful when we start to call mountfsd from root, for example from the tests where we just use a simple squashfs/erofs. Note that this requires the caller to be root, and it will be rejected otherwise, as such images are classified as 'unprotected' and the enforced policy does not accept them for unprivileged users.
This commit is contained in:
@@ -93,6 +93,15 @@ if [ "$VERITY_SIG_SUPPORTED" -eq 1 ]; then
|
||||
mv /tmp/app0.roothash.p7s.bak /tmp/app0.roothash.p7s
|
||||
fi
|
||||
|
||||
# Bare squashfs without any verity or signature also should be rejected, even if we ask to trust it
|
||||
(! systemd-run -M testuser@ --user --pipe --wait \
|
||||
--property ExtensionImages=/tmp/app1.raw \
|
||||
true)
|
||||
(! systemd-run -M testuser@ --user --pipe --wait \
|
||||
--property ExtensionImages=/tmp/app1.raw \
|
||||
--property ExtensionImagePolicy=root=verity+signed+unprotected+absent:usr=verity+signed+unprotected+absent \
|
||||
true)
|
||||
|
||||
# Install key in keychain
|
||||
mkdir -p /run/verity.d
|
||||
cp /tmp/test-50-unpriv-cert.crt /run/verity.d/
|
||||
|
||||
Reference in New Issue
Block a user