From patchwork Fri Apr 18 19:46:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Ludovic_Court=C3=A8s?= X-Patchwork-Id: 41785 Return-Path: X-Original-To: patchwork@mira.cbaines.net Delivered-To: patchwork@mira.cbaines.net Received: by mira.cbaines.net (Postfix, from userid 113) id 85D2D27BC4B; Fri, 18 Apr 2025 20:48:54 +0100 (BST) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mira.cbaines.net X-Spam-Level: X-Spam-Status: No, score=-6.4 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_BLOCKED, RCVD_IN_VALIDITY_CERTIFIED,RCVD_IN_VALIDITY_RPBL,RCVD_IN_VALIDITY_SAFE, SPF_HELO_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mira.cbaines.net (Postfix) with ESMTPS id E8A6227BC49 for ; Fri, 18 Apr 2025 20:48:53 +0100 (BST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1u5rha-0005fx-7O; Fri, 18 Apr 2025 15:48:42 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1u5rhA-0005Vl-7F for guix-patches@gnu.org; Fri, 18 Apr 2025 15:48:19 -0400 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1u5rh9-0000cY-Qw for guix-patches@gnu.org; Fri, 18 Apr 2025 15:48:15 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debbugs.gnu.org; s=debbugs-gnu-org; h=MIME-Version:References:In-Reply-To:Date:From:To:Subject; bh=uqhskkxjhB5Voan1hxxqmujqtPVm+PfXXeOsApJpOiA=; b=hFkwJzfFPkXbnXCfFO0beeyqgRyi6GGPDAqafiHFc2ExJwKAgzjXYKOA6K9/tYnxtTJw9CELDAxPM1ej7Uz7j7Uv2fcSpK4enA3PR0N2inRlLJkLJYlsI+DkJU57AAEwri9BMSzH0SY98+/cGw6W30LpaZAT3YGw0qGvZTyEDgjs35WWk5Y5Yq/BriTICF9QBMWt32LgVTerCgwMtx+hPq54E1dYQUiBgGC4kg4TM7CDy7rm8oxBMYdTeV2TUxLIHPtXJa2QfX1v75aeTxochBKcc5p1soMoXs4XR/YXDXEWEshrPF3XR2IsXHv+iDWpXWlFqMZfII17KVoUUVLAfQ==; Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1u5rh9-0008OH-I5; Fri, 18 Apr 2025 15:48:15 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#77288] [PATCH v3 8/8] DRAFT news: Add entry about unprivileged guix-daemon on Guix System. Resent-From: Ludovic =?utf-8?q?Court=C3=A8s?= Original-Sender: "Debbugs-submit" Resent-CC: pelzflorian@pelzflorian.de, julien@lepiller.eu, guix-patches@gnu.org Resent-Date: Fri, 18 Apr 2025 19:48:15 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 77288 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 77288@debbugs.gnu.org Cc: Ludovic =?utf-8?q?Court=C3=A8s?= , Florian Pelz , Florian Pelz , Julien Lepiller X-Debbugs-Original-Xcc: Florian Pelz , Julien Lepiller Received: via spool by 77288-submit@debbugs.gnu.org id=B77288.174500568332087 (code B ref 77288); Fri, 18 Apr 2025 19:48:15 +0000 Received: (at 77288) by debbugs.gnu.org; 18 Apr 2025 19:48:03 +0000 Received: from localhost ([127.0.0.1]:52960 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1u5rgu-0008L3-7z for submit@debbugs.gnu.org; Fri, 18 Apr 2025 15:48:02 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:47006) by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1u5rgG-0008DM-V7 for 77288@debbugs.gnu.org; Fri, 18 Apr 2025 15:47:25 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1u5rgB-0000WN-4A; Fri, 18 Apr 2025 15:47:15 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-Version:References:In-Reply-To:Date:Subject:To: From; bh=uqhskkxjhB5Voan1hxxqmujqtPVm+PfXXeOsApJpOiA=; b=hV7Ay3QjTn8cekmSnYDU qY3VMuKV19rFWxvGKxbAvZdLRLFgTApzcAu43CavhygocaO2rvMHLkrnN+iqopRlMyQP6Pyi/qFk0 EYesMxzgYrpaMil4eSAkBeL7BIZI8lMpRBmbjWrMYLyuGn5G0nKVaOBnBgiW+XiEj8mx8YVKIt8I8 rMciA9sXpucmxRKdpxoRzV5HS6z43E13hPOefVotu01NSbYZqq9QOi+Rq46Bl/NLrGHaOtLBfv62+ O3HPS+ISvEjAFy2GheYwN4Ou5vWmdvIyCQ5j94QhO+cjHP0EDFDDUh0iMrG7hfWGUxr8AdPRPaj4A auZgthm+kADGDw==; From: Ludovic =?utf-8?q?Court=C3=A8s?= Date: Fri, 18 Apr 2025 21:46:53 +0200 Message-ID: <7d2a308296fb34cd6721db06f83922311eacb2d1.1745005408.git.ludo@gnu.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: References: MIME-Version: 1.0 X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org Sender: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org X-getmail-retrieved-from-mailbox: Patches DRAFT: Temporary commit. * etc/news.scm: Add it. Change-Id: I28eae7f7b4305225b13281b99458cbedda3c3b94 Co-authored-by: Florian Pelz --- etc/news.scm | 88 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 88 insertions(+) diff --git a/etc/news.scm b/etc/news.scm index 4b3da44540..fcac283636 100644 --- a/etc/news.scm +++ b/etc/news.scm @@ -37,6 +37,94 @@ (channel-news (version 0) + (entry (commit "XXX") + (title + (en "Guix System can run @command{guix-daemon} without root +privileges") + (de "Guix System kann @command{guix-daemon} ohne root-Berechtigungen +ausführen") + (fr "Guix System peut faire tourner @command{guix-daemon} sans +privilèges")) + (body + (en "On Guix System, @code{guix-service-type} can now be configured +to run the build daemon, @command{guix-daemon}, without root privileges. In +that configuration, the daemon runs with the authority of the +@code{guix-daemon} user, which we think can reduce the impact of some classes +of vulnerabilities that could affect it. + +For now, this is opt-in: you have to change @code{guix-configuration} to set +the @code{privileged?} field to @code{#f}. When you do this, all the files in +@file{/gnu/store}, @file{/var/guix}, etc. will have their ownership changed to +the @code{guix-daemon} user (instead of @code{root}); this can take a while, +especially if the store is big. To learn more about it, run: + +@example +info guix --index-search=guix-service-type +@end example + +Running @command{guix-daemon} without root privileges will likely become the +default in the future. + +Users of Guix on other distributions can find information on how to migrate in +the manual: + +@example +info guix --index-search=migration +@end example") + (de "Auf Guix System kann @code{guix-service-type} jetzt so +konfiguriert werden, dass der Erstellungs-Daemon @command{guix-daemon} ohne +root-Berechtigungen ausgeführt wird. In dieser Konfiguration läuft der Daemon +mit den Berechtigungen des Benutzers @code{guix-daemon}, wovon wir glauben, +dass es die Auswirkungen mancher Schwachstellen-Kategorien verringert, die ihn +betreffen könnten. + +Fürs Erste bleibt es Ihnen überlassen: Sie müssen @code{guix-configuration} +anpassen und dort das Feld @code{privileged?} auf @code{#f} setzen. Wenn Sie +das tun, wird der Besitzer aller Dateien in @file{/gnu/store}, +@file{/var/guix}, usw. auf den Benutzer @code{guix-daemon} geändert (anstelle +von @code{root}); das kann eine Weile dauern, besonders wenn der Store groß +ist. Um mehr zu erfahren, führen Sie aus: + +@example +info guix --index-search=guix-service-type +@end example + +Schließlich wird das Ausführen von @command{guix-daemon} ohne +root-Berechtigungen wahrscheinlich die Vorgabe. + +Wer Guix auf anderen Distributionen benutzt, kann sich mit dem Handbuch +informieren, wie man umsteigt: + +@example +info guix --index-search=migration +@end example") + (fr "Sur Guix System, @code{guix-service-type} peut maintenant être +configuré pour faire tourner le démon de compilation, @command{guix-daemon}, +sans privilèges ``root''. Dans cette configuration, le démon s'exécute avec +l'autorité du compte @code{guix-daemon}, ce qui selon nous réduit l'impact de +certaines classes de vulnérabilités qui pourraient l'affecter. + +Pour le moment, c'est à activer explicitement : il faut changer +@code{guix-configuration} pour mettre le champ @code{privileged?} à @code{#f}. +Tous les fichiers de @file{/gnu/store}, @file{/var/guix}, etc. voient alors +leur propriétaire changé pour @code{guix-daemon} (au lieu de @code{root}) ; +cette opération peut prendre un moment, particulièrement si le dépôt est gros. +Pour en savoir plus, lancer : + +@example +info guix --index-search=guix-service-type +@end example + +L'exécution de @command{guix-daemon} sans privilèges se fera probablement par +défaut à l'avenir. + +Pour l'utilisation de Guix sur d'autres distributions, des informations sur +comment migrer se trouver dans le manuel : + +@example +info guix --index-search=migration +@end example"))) + (entry (commit "0e51c6547ffdaf91777f7383da4a52a1a07b7286") (title (en "Incompatible upgrade of the Syncthing service"))