Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use more permissive umask for .service units (LP: #2072486) #516

Merged
merged 3 commits into from
Sep 12, 2024

Conversation

slyon
Copy link
Collaborator

@slyon slyon commented Sep 10, 2024

Description

networkd:openvswitch:sriov: Permissive umask for .service units (LP#2072486)

Writing world-inaccessible config files doesn't help when the data can still be accessed by any local user through the systemd APIs, e.g.: systemctl show UNIT_NAME.service

Using 640 permission on such .service unit files provides a false illusion of security and leads to systemd warnings in the journal, like this:
systemd[1]: Configuration file /run/systemd/system/netplan-ovs-cleanup.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway.

Also:

  • Update tests according
  • Update doc/tread model accordingly

FR-8238

Checklist

  • Runs make check successfully.
  • Retains code coverage (make check-coverage).
  • New/changed keys in YAML format are documented.
  • (Optional) Adds example YAML for new feature.
  • (Optional) Closes an open bug in Launchpad. LP#2072486

…#2072487)

Writing world-inaccessible config files doesn't help when the data can still be
accessed by any local user through the systemd APIs, e.g.:
"systemctl show UNIT_NAME.service"

Using 640 permission on such .service unit files provides a false illusion of
security and leads to systemd warnings in the journal, like this:
"systemd[1]: Configuration file /run/systemd/system/netplan-ovs-cleanup.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway."
@slyon slyon changed the title Use more ermissive umask for .service units (LP: #2072487) Use more permissive umask for .service units (LP: #2072487) Sep 10, 2024
@slyon slyon added the stable Might be merged in a stable branch label Sep 10, 2024
@slyon slyon changed the title Use more permissive umask for .service units (LP: #2072487) Use more permissive umask for .service units (LP: #2072486) Sep 10, 2024
Copy link
Collaborator

@daniloegea daniloegea left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me.

@slyon slyon merged commit 4a82c3b into canonical:main Sep 12, 2024
17 checks passed
@slyon slyon added the documentation Documentation improvements. label Sep 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Documentation improvements. stable Might be merged in a stable branch
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants