diff options
author | Lennart Poettering <lennart@poettering.net> | 2021-06-24 18:06:02 +0200 |
---|---|---|
committer | Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> | 2021-06-24 22:30:14 +0200 |
commit | de61a04b188f81a85cdb5c64ddb4987dcd9d30d3 (patch) | |
tree | b83ed81038b2f51d09f4d410a63fe2e259f83f11 /src/tmpfiles | |
parent | 0c651d32d49e66ea0152eea5e65dd19fe01e7a06 (diff) | |
download | systemd-de61a04b188f81a85cdb5c64ddb4987dcd9d30d3.tar.gz |
tree-wide: make specifier expansion --root= aware
This fixes repart's, systemctl's, sysusers' and tmpfiles' specifier
expansion to honour the root dir specified with --root=. This is
relevant for specifiers such as %m, %o, … which are directly sourced
from files on disk.
This doesn't try to be overly smart: specifiers referring to runtime
concepts (i.e. boot ID, architecture, hostname) rather than files on the
medium are left as is. There's certainly a point to be made that they
should fail in case --root= is specified, but I am not entirely convinced
about that, and it's certainly something we can look into later if
there's reason to.
I wondered for a while how to hook this up best, but given that quite a
large number of specifiers resolve to data from files on disks, and most
of our tools needs this, I ultimately decided to make the root dir a
first class parameter to specifier_printf().
Replaces: #16187
Fixes: #16183
Diffstat (limited to 'src/tmpfiles')
-rw-r--r-- | src/tmpfiles/tmpfiles.c | 42 |
1 files changed, 29 insertions, 13 deletions
diff --git a/src/tmpfiles/tmpfiles.c b/src/tmpfiles/tmpfiles.c index 8e8be84728..9ffe784795 100644 --- a/src/tmpfiles/tmpfiles.c +++ b/src/tmpfiles/tmpfiles.c @@ -200,8 +200,8 @@ STATIC_DESTRUCTOR_REGISTER(arg_exclude_prefixes, freep); STATIC_DESTRUCTOR_REGISTER(arg_root, freep); STATIC_DESTRUCTOR_REGISTER(arg_image, freep); -static int specifier_machine_id_safe(char specifier, const void *data, const void *userdata, char **ret); -static int specifier_directory(char specifier, const void *data, const void *userdata, char **ret); +static int specifier_machine_id_safe(char specifier, const void *data, const char *root, const void *userdata, char **ret); +static int specifier_directory(char specifier, const void *data, const char *root, const void *userdata, char **ret); static const Specifier specifier_table[] = { { 'a', specifier_architecture, NULL }, @@ -228,21 +228,20 @@ static const Specifier specifier_table[] = { {} }; -static int specifier_machine_id_safe(char specifier, const void *data, const void *userdata, char **ret) { +static int specifier_machine_id_safe(char specifier, const void *data, const char *root, const void *userdata, char **ret) { int r; - /* If /etc/machine_id is missing or empty (e.g. in a chroot environment) - * return a recognizable error so that the caller can skip the rule - * gracefully. */ + /* If /etc/machine_id is missing or empty (e.g. in a chroot environment) return a recognizable error + * so that the caller can skip the rule gracefully. */ - r = specifier_machine_id(specifier, data, userdata, ret); + r = specifier_machine_id(specifier, data, root, userdata, ret); if (IN_SET(r, -ENOENT, -ENOMEDIUM)) return -ENXIO; return r; } -static int specifier_directory(char specifier, const void *data, const void *userdata, char **ret) { +static int specifier_directory(char specifier, const void *data, const char *root, const void *userdata, char **ret) { struct table_entry { uint64_t type; const char *suffix; @@ -262,8 +261,10 @@ static int specifier_directory(char specifier, const void *data, const void *use [DIRECTORY_LOGS] = { SD_PATH_USER_CONFIGURATION, "log" }, }; - unsigned i; const struct table_entry *paths; + _cleanup_free_ char *p = NULL; + unsigned i; + int r; assert_cc(ELEMENTSOF(paths_system) == ELEMENTSOF(paths_user)); paths = arg_user ? paths_user : paths_system; @@ -271,7 +272,22 @@ static int specifier_directory(char specifier, const void *data, const void *use i = PTR_TO_UINT(data); assert(i < ELEMENTSOF(paths_system)); - return sd_path_lookup(paths[i].type, paths[i].suffix, ret); + r = sd_path_lookup(paths[i].type, paths[i].suffix, &p); + if (r < 0) + return r; + + if (arg_root) { + _cleanup_free_ char *j = NULL; + + j = path_join(arg_root, p); + if (!j) + return -ENOMEM; + + *ret = TAKE_PTR(j); + } else + *ret = TAKE_PTR(p); + + return 0; } static int log_unresolvable_specifier(const char *filename, unsigned line) { @@ -2778,7 +2794,7 @@ static int specifier_expansion_from_arg(Item *i) { if (r < 0) return log_error_errno(r, "Failed to unescape parameter to write: %s", i->argument); - r = specifier_printf(unescaped, PATH_MAX-1, specifier_table, NULL, &resolved); + r = specifier_printf(unescaped, PATH_MAX-1, specifier_table, arg_root, NULL, &resolved); if (r < 0) return r; @@ -2788,7 +2804,7 @@ static int specifier_expansion_from_arg(Item *i) { case SET_XATTR: case RECURSIVE_SET_XATTR: STRV_FOREACH(xattr, i->xattrs) { - r = specifier_printf(*xattr, SIZE_MAX, specifier_table, NULL, &resolved); + r = specifier_printf(*xattr, SIZE_MAX, specifier_table, arg_root, NULL, &resolved); if (r < 0) return r; @@ -3021,7 +3037,7 @@ static int parse_line( i.allow_failure = allow_failure; i.try_replace = try_replace; - r = specifier_printf(path, PATH_MAX-1, specifier_table, NULL, &i.path); + r = specifier_printf(path, PATH_MAX-1, specifier_table, arg_root, NULL, &i.path); if (r == -ENXIO) return log_unresolvable_specifier(fname, line); if (r < 0) { |