123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111 |
- #!/bin/sh -e
- # This script is spawned by s6-overlay-suexec, as the
- # first thing in the userland boot process.
- # It is normally run as root, but some configurations want to
- # run completely unprivileged and s6-overlay-suexec is denied
- # suid, in which case preinit will be unprivileged as well.
- # The point of preinit is to sanity check the system to make
- # sure s6-linux-init can run in a safe configuration. If we
- # are root, or if the system has been correctly prepared by the
- # container manager for a privilegeless execution, we can fix
- # any issue we encounter. Otherwise, we just report the problem
- # and abort execution.
- # The UID, USER, EUID, GID, GROUP and EGID variables are set for
- # us by s6-overlay-suexec, so we can check every possible case.
- prog=/package/admin/s6-overlay/libexec/preinit
- checknoexec () {
- IFS=,
- set -- $1
- IFS=
- while test "$#" -gt 0 ; do
- if test "$1" = noexec ; then
- return 0
- fi
- shift
- done
- return 1
- }
- # Ensure /run is writable
- if test "0$S6_READ_ONLY_ROOT" -ne 0 ; then
- echo "$prog: info: read-only root" 1>&2
- if ! test -d /run ; then
- echo "$prog: fatal: /run is missing or not a directory" 1>&2
- exit 100
- fi
- if : > '/run/test of writability' 2>/dev/null ; then
- echo "$prog: info: writable /run. Checking for executability." 1>&2
- s6-rmrf '/run/test of writability'
- if ! s6-mount -o remount,rw,exec tmpfs /run 2>/dev/null ; then
- notfound=true
- while read these filesystem type options please ; do
- if test $filesystem = /run ; then
- notfound=false
- if checknoexec "$options" ; then
- echo "$prog: warning: your container manager pre-mounts run with \
- the incorrect noexec option, which s6-overlay cannot work with; expect /init \
- to crash soon. To fix the issue, either pre-mount /run with the exec option, \
- or as a workaround give this container the CAP_SYS_ADMIN capability so \
- s6-overlay can fix it at run time." 1>&2
- fi
- break
- fi
- done < /proc/mounts
- if $notfound ; then
- echo "$prog: warning: unable to find /run in /proc/mounts, check that \
- your container manager pre-mounts /proc, and that /run is a tmpfs. The container \
- is likely to crash soon, if /run is (incorrectly) mounted noexec." 1>&2
- fi
- fi
- else
- echo "$prog: info: creating a tmpfs on /run" 1>&2
- s6-mount -wt tmpfs -o exec,mode=0755 tmpfs /run
- fi
- else
- s6-mkdir -p -m 0755 /run
- fi
- eval `s6-overlay-stat /run`
- if test "0$S6_VERBOSITY" -gt 1 ; then
- echo "$prog: info: container permissions: uid=$UID ($USER), euid=$EUID, gid=$GID ($GROUP), egid=$EGID"
- echo "$prog: info: /run permissions: uid=$uid ($user), gid=$gid ($group), perms=$perms"
- fi
- if test "$UID" -ne "$uid" ; then # /run does not belong to the container user
- if test "$EUID" -eq 0 ; then
- echo "$prog: info: /run belongs to uid $uid instead of $UID - fixing it"
- s6-chown -U -- /run
- s6-chmod 0755 /run
- elif test "$GID" -eq 0 && test "$gid" -eq 0 ; then # Unprivileged Kubernetes Environment
- if echo "$perms" | s6-grep -qF gxgwgr && echo "$perms" | s6-grep -qvF ow ; then
- echo "$prog: info: using /run with gid 0"
- else
- echo "$prog: fatal: wrong permissions on /run for a gid 0 setup"
- exit 100
- fi
- else
- echo "$prog: fatal: /run belongs to uid $uid instead of $UID and we're lacking the privileges to fix it."
- exit 100
- fi
- fi
- # Ensure /var/run is a symlink to /run
- if test -L /var/run && test "`s6-linkname -f /var/run`" = /run ; then : ; else
- echo "$prog: notice: /var/run is not a symlink to /run, fixing it" 1>&2
- s6-rmrf /var/run
- s6-ln -s /run /var/run
- fi
- # Clean up in case /run hasn't been wiped or USER has changed
- s6-rmrf /run/s6 /run/service /run/uncaught-logs /run/s6-rc*
- s6-mkdir -m 0755 /run/s6 /run/service
- if test "0$UID" -ne 0 ; then
- s6-chown -U -- /run/s6
- s6-chown -U -- /run/service
- fi
|