aboutgitcodebugslistschat
path: root/passt.1
diff options
context:
space:
mode:
authorDavid Gibson <david@gibson.dropbear.id.au>2022-09-12 22:24:00 +1000
committerStefano Brivio <sbrivio@redhat.com>2022-09-13 05:31:51 +0200
commit10c63477476acdd5cbe6f3ac13dc637e80d0104b (patch)
tree82a8d9240f34d4d55cb7c23ba7717adb16f71eaf /passt.1
parent7330ae3abfba9722c04e6c52ae6222de47016834 (diff)
downloadpasst-10c63477476acdd5cbe6f3ac13dc637e80d0104b.tar
passt-10c63477476acdd5cbe6f3ac13dc637e80d0104b.tar.gz
passt-10c63477476acdd5cbe6f3ac13dc637e80d0104b.tar.bz2
passt-10c63477476acdd5cbe6f3ac13dc637e80d0104b.tar.lz
passt-10c63477476acdd5cbe6f3ac13dc637e80d0104b.tar.xz
passt-10c63477476acdd5cbe6f3ac13dc637e80d0104b.tar.zst
passt-10c63477476acdd5cbe6f3ac13dc637e80d0104b.zip
Split checking for root from dropping root privilege
check_root() both checks to see if we are root (in the init namespace), and if we are drops to an unprivileged user. To make future cleanups simpler, split the checking for root (now in check_root()) from the actual dropping of privilege (now in drop_root()). Note that this does slightly alter semantics. Previously we would only setuid() if we were originally root (in the init namespace). Now we will always setuid() and setgid(), though it won't actually change anything if we weren't privileged to begin with. This also means that we will now always attempt to switch to the user specified with --runas, even if we aren't (init namespace) root to begin with. Obviously this will fail with an error if we weren't privileged to start with. --help and the man page are updated accordingly. Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Diffstat (limited to 'passt.1')
-rw-r--r--passt.15
1 files changed, 3 insertions, 2 deletions
diff --git a/passt.1 b/passt.1
index 61f0e4c..88cc879 100644
--- a/passt.1
+++ b/passt.1
@@ -104,9 +104,10 @@ terminal, and to both system logger and standard error otherwise.
.TP
.BR \-\-runas " " \fIUID\fR|\fIUID:GID\fR|\fILOGIN\fR|\fILOGIN:GROUP\fR
-If started as root, change to given UID and corresponding group if UID is given,
+Attempt to change to given UID and corresponding group if UID is given,
or to given UID and given GID if both are given. Alternatively, login name, or
-login name and group name can be passed.
+login name and group name can be passed. This requires privileges (either
+initial effective UID 0 or CAP_SETUID capability) to work.
Default is to change to user \fInobody\fR if started as root.
.TP