mirror of
https://git.selfprivacy.org/SelfPrivacy/selfprivacy-rest-api.git
synced 2025-01-31 05:06:41 +00:00
feature(system): add root daemon
This commit is contained in:
parent
043d280d53
commit
c8c7aed5a3
126
selfprivacy_api/root_daemon.py
Normal file
126
selfprivacy_api/root_daemon.py
Normal file
|
@ -0,0 +1,126 @@
|
||||||
|
from typing import List
|
||||||
|
from typing import Dict
|
||||||
|
|
||||||
|
import os
|
||||||
|
import os.path
|
||||||
|
|
||||||
|
import socket as socket_module
|
||||||
|
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
SOCKET_PATH = "/tmp/socket_test.s"
|
||||||
|
BUFFER_SIZE = 1024
|
||||||
|
|
||||||
|
services = [
|
||||||
|
# Check that it is the same as the names in systemd services.
|
||||||
|
"bitwarden",
|
||||||
|
"forgejo",
|
||||||
|
"gitea",
|
||||||
|
"jitsimeet",
|
||||||
|
"mailserver",
|
||||||
|
"nextcloud",
|
||||||
|
"ocserv",
|
||||||
|
"pleroma",
|
||||||
|
"prometheus",
|
||||||
|
"roundcube",
|
||||||
|
]
|
||||||
|
|
||||||
|
service_folders: Dict[str, List[str]] = {
|
||||||
|
# Fill by hand from service data
|
||||||
|
"bitwarden": [],
|
||||||
|
"forgejo": [],
|
||||||
|
"gitea": [],
|
||||||
|
"jitsimeet": [],
|
||||||
|
"mailserver": [],
|
||||||
|
"nextcloud": [],
|
||||||
|
"ocserv": [],
|
||||||
|
"pleroma": [],
|
||||||
|
"prometheus": [],
|
||||||
|
"roundcube": [],
|
||||||
|
}
|
||||||
|
|
||||||
|
service_commands = [
|
||||||
|
"systemctl start",
|
||||||
|
"systemctl stop",
|
||||||
|
"systemctl restart",
|
||||||
|
]
|
||||||
|
|
||||||
|
static_commands = ["nixos rebuild" "nixos-store --gc"]
|
||||||
|
|
||||||
|
CHOWN_COMMAND = "chown selfprivacy"
|
||||||
|
# other_commands = [ CHOWN_COMMAND
|
||||||
|
# ]
|
||||||
|
|
||||||
|
|
||||||
|
def get_available_commands() -> List[str]:
|
||||||
|
"""
|
||||||
|
Generate all commands with combinatorics.
|
||||||
|
"""
|
||||||
|
# mounting and unmounting is handled by
|
||||||
|
# selfprivacy being in mount group
|
||||||
|
# chowning still needs root
|
||||||
|
commands = []
|
||||||
|
for command in service_commands:
|
||||||
|
for service in services:
|
||||||
|
# Concatenation of hardcoded strings
|
||||||
|
commands.append(command + " " + service)
|
||||||
|
|
||||||
|
chowns = [CHOWN_COMMAND + " " + folder for folder in service_folders]
|
||||||
|
commands.extend(chowns)
|
||||||
|
|
||||||
|
# chmods are done by selfprivacy user after chowning
|
||||||
|
# they are not needed here
|
||||||
|
|
||||||
|
commands.extend(static_commands)
|
||||||
|
|
||||||
|
return commands
|
||||||
|
|
||||||
|
|
||||||
|
def init() -> socket_module.socket:
|
||||||
|
if os.path.exists(SOCKET_PATH):
|
||||||
|
os.remove(SOCKET_PATH)
|
||||||
|
sock = socket_module.socket(socket_module.AF_UNIX, socket_module.SOCK_STREAM)
|
||||||
|
sock.bind(SOCKET_PATH)
|
||||||
|
return sock
|
||||||
|
|
||||||
|
|
||||||
|
def _spawn_shell(command_string):
|
||||||
|
# We use sh to refrain from parsing and simplify logic
|
||||||
|
# Our commands are hardcoded so sh does not present
|
||||||
|
# an extra attack surface here
|
||||||
|
|
||||||
|
# TODO: continuous forwarding of command output
|
||||||
|
subprocess.check_output("sh", "-c", command_string)
|
||||||
|
|
||||||
|
|
||||||
|
def _process_request(request: str, allowed_commands: str) -> str:
|
||||||
|
for command in allowed_commands:
|
||||||
|
if request == command:
|
||||||
|
# explicitly only calling a _hardcoded_ command
|
||||||
|
# ever
|
||||||
|
_spawn_shell(command)
|
||||||
|
else:
|
||||||
|
return "-1"
|
||||||
|
|
||||||
|
|
||||||
|
def _root_loop(socket: socket_module.socket, allowed_commands):
|
||||||
|
while True:
|
||||||
|
socket.listen(1)
|
||||||
|
conn, addr = socket.accept()
|
||||||
|
datagram = conn.recv(BUFFER_SIZE)
|
||||||
|
if datagram:
|
||||||
|
request = datagram.strip().decode("utf-8")
|
||||||
|
answer = _process_request(request, allowed_commands)
|
||||||
|
conn.send(answer.encode("utf-8"))
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
def main():
|
||||||
|
allowed_commands = get_available_commands()
|
||||||
|
print("\n".join(allowed_commands))
|
||||||
|
|
||||||
|
sock = init()
|
||||||
|
_root_loop(sock, allowed_commands)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
35
tests/test_root_daemon.py
Normal file
35
tests/test_root_daemon.py
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
import pytest
|
||||||
|
|
||||||
|
from selfprivacy_api.root_daemon import get_available_commands, init, main, service_commands, services
|
||||||
|
import selfprivacy_api.root_daemon
|
||||||
|
from os.path import join
|
||||||
|
|
||||||
|
from typing import List
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture()
|
||||||
|
def test_socket(mocker, tmpdir):
|
||||||
|
socket_path = join(tmpdir, "test_socket.s")
|
||||||
|
mocker.patch(
|
||||||
|
"selfprivacy_api.root_daemon.SOCKET_PATH",
|
||||||
|
new=socket_path,
|
||||||
|
)
|
||||||
|
|
||||||
|
def is_in_strings(list: List[str], piece: str):
|
||||||
|
return any([piece in x for x in list])
|
||||||
|
|
||||||
|
|
||||||
|
def test_available_commands():
|
||||||
|
commands = get_available_commands()
|
||||||
|
assert commands != []
|
||||||
|
assert len(commands) >= len(services) * len(service_commands)
|
||||||
|
for service in services:
|
||||||
|
assert is_in_strings(commands, service)
|
||||||
|
|
||||||
|
def test_init():
|
||||||
|
init()
|
||||||
|
|
||||||
|
def test_main():
|
||||||
|
# main()
|
||||||
|
pass
|
||||||
|
|
Loading…
Reference in a new issue