mirror of
https://github.com/mjl-/mox.git
synced 2024-12-25 16:03:48 +03:00
log when mox root process cannot forward signals to unprivileged child
and give the mox.service permissions to send such signals.
This commit is contained in:
parent
3d4cd00430
commit
32d4e9a14c
2 changed files with 6 additions and 3 deletions
|
@ -59,8 +59,11 @@ func ForkExecUnprivileged() {
|
|||
sigc := make(chan os.Signal, 1)
|
||||
signal.Notify(sigc, os.Interrupt, syscall.SIGTERM)
|
||||
go func() {
|
||||
sig := <-sigc
|
||||
p.Signal(sig)
|
||||
for {
|
||||
sig := <-sigc
|
||||
err := p.Signal(sig)
|
||||
pkglog.Check(err, "forwarding signal root to unprivileged process")
|
||||
}
|
||||
}()
|
||||
|
||||
st, err := p.Wait()
|
||||
|
|
|
@ -23,7 +23,7 @@ ReadWritePaths=/home/mox/config /home/mox/data
|
|||
ProtectKernelTunables=yes
|
||||
ProtectControlGroups=yes
|
||||
AmbientCapabilities=
|
||||
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE CAP_CHOWN CAP_FSETID CAP_DAC_OVERRIDE CAP_DAC_READ_SEARCH CAP_FOWNER
|
||||
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE CAP_CHOWN CAP_FSETID CAP_DAC_OVERRIDE CAP_DAC_READ_SEARCH CAP_FOWNER CAP_KILL
|
||||
NoNewPrivileges=yes
|
||||
RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX AF_NETLINK
|
||||
ProtectProc=invisible
|
||||
|
|
Loading…
Reference in a new issue