From 8bffa1c19fd05f4f04dad4b5b98f85b94f23113c Mon Sep 17 00:00:00 2001 From: Laurent Bercot Date: Mon, 26 Jan 2015 22:26:57 +0000 Subject: - added s6-fdholder-delete(c) - small s6-fdholder-* fixes - s6-fdholder documentation (in review) - s6_svstatus_* bugfix (thanks Olivier Brunel) --- doc/s6-fdholderd.html | 318 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 318 insertions(+) create mode 100644 doc/s6-fdholderd.html (limited to 'doc/s6-fdholderd.html') diff --git a/doc/s6-fdholderd.html b/doc/s6-fdholderd.html new file mode 100644 index 0000000..0977101 --- /dev/null +++ b/doc/s6-fdholderd.html @@ -0,0 +1,318 @@ + + + + + s6: the s6-fdholderd program + + + + + + +

+s6
+Software
+skarnet.org +

+ +

The s6-fdholderd program

+ +

+s6-fdholderd is the serving part of the +s6-fdholder-daemon +fd-holding server. +It assumes that its stdin is a bound and listening Unix +domain socket, and +it accepts connections from clients connecting to it, and stores and +retrieves file descriptors on their behalf. +

+ +

Interface

+ +
+     s6-fdholderd [ -1 ] [ -v verbosity ] [ -c maxconn ] [ -n maxfds ] [ -i rulesdir | -x rulesfile ]
+
+ + + +

Options

+ + + +

Signals

+ + + +

Identifiers

+ + + + +

Configuration

+
+ +

+ Before running s6-fdholderd (or its wrapper +s6-fdholder-daemon), it is necessary +to configure it. This is done by a series of rules, or ruleset, +stored in either a rulesfile in the +CDB format, +or in a rulesdir, i.e. a directory in the filesystem following a +certain format. s6-fdholderd will refuse to run if neither the -i +nor the -x option have been provided. +

+ +

+ Rulesets can be converted between the rulesdir and +rulesfile formats with the +s6-accessrules-cdb-from-fs and +s6-accessrules-fs-from-cdb +conversion tools. +

+ +

Rules format

+ +

+ The rules file, or rules directory, follows the +s6 accessrules format for uid and +gid checking. For every connecting client, s6-fdholderd matches the uid +and gid of the client against the provided ruleset, and determines what +the client is authorized to do. +

+ +

+ By default, no client is allowed to do anything - not even +connect to the server. Even root, the super-user, will be denied +access. That's why +it is essential to create a sensible ruleset prior to running the server +in order to do anything useful. +

+ +

+ The various rights that a client can have are the following (using a +rulesdir as an example, but a rulesfile works the same way): +

+ + + +

+ The other rights are defined in the "environment" part of the ruleset: +

+ + + +

Configuration examples

+ +

+ Assuming you want to run a s6-fdholderd daemon in the +/service/fdholder directory with the -i rules option, +you should: +

+ + + +

+ Depending on your policy, you should now give certain rights to +certain users or groups. For instance: +

+ + + +

Notes

+ + + + + -- cgit v1.2.3