For FUSE-based home folders, chdir into them as the user instead of root. By default, filesystems user-mounted via FUSE are not accessible to root. [1] Such user mounts have been common for encrypted home folders since 2003. [2][3][4] This change accommodates users with those home folders. Greetd previously sent affected users into the root directory ("/") because their home folders were inaccessible to root. Now the directory operation occurs after a user's privileges were assumed. Users find themselves in their home folders after logging in. Since the call to PAM's open_session now takes place before any change of folders, the value of the current directory is no longer being exposed to the modules via the environment variable $PWD, but the PAM environment is distinct from the process environment. This commit was tested on Guix without commit 424ecac4 since the Rust crate for nix 0.20 was not immediately available there. [1] https://unix.stackexchange.com/a/17423 [2] https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software [3] https://en.wikipedia.org/wiki/EncFS [4] https://nuetzlich.net/gocryptfs/
1 files changed, 5 insertions(+), 11 deletions(-) M greetd/src/session/worker.rs
M greetd/src/session/worker.rs => greetd/src/session/worker.rs +5 -11
@@ 171,16 171,6 @@ fn worker(sock: &UnixDatagram) -> Result<(), Error> { let uid = Uid::from_raw(user.uid()); let gid = Gid::from_raw(user.primary_group_id()); // Change working directory let pwd = match env::set_current_dir(home) { Ok(_) => home, Err(_) => { env::set_current_dir("/") .map_err(|e| format!("unable to set working directory: {}", e))?; "/" } }; // PAM has to be provided a bunch of environment variables before // open_session. We pass any environment variables from our greeter @@ // through here as well. This allows them to affect PAM (more 193,7 183,6 @@ fn worker(sock: &UnixDatagram) -> Result<(), Error> { format!("LOGNAME={}", username), format!("HOME={}", home), format!("SHELL={}", shell), format!("PWD={}", pwd), format!("GREETD_SOCK={}", env::var("GREETD_SOCK").unwrap()), format!( @@ "TERM={}", 242,6 231,11 @@ fn worker(sock: &UnixDatagram) -> Result<(), Error> { // death signal, which is why we do this here. prctl(PrctlOption::SET_PDEATHSIG(libc::SIGTERM)).expect("unable to set death signal"); // Change working directory if let Err(e) = env::set_current_dir(home) { eprintln!("unable to set working directory: {}", e); } // Run let cpath = CString::new("/bin/sh").unwrap(); execve(