From 5eb25b8357da83fd5fd7f8ddb55fe8d11b4f28c5 Mon Sep 17 00:00:00 2001 From: TheSpad Date: Sun, 28 Aug 2022 20:30:30 +0100 Subject: [PATCH] Fix tamper check for custom files --- root/docker-mods | 32 +++++++++++++++++-- .../s6-overlay/s6-rc.d/init-custom-files/run | 25 --------------- 2 files changed, 30 insertions(+), 27 deletions(-) diff --git a/root/docker-mods b/root/docker-mods index 17aa908..1ce68d2 100755 --- a/root/docker-mods +++ b/root/docker-mods @@ -9,10 +9,38 @@ set_legacy_executable_bits() { /etc/services.d/*/* 2>/dev/null || true } -# Tamper check custom service locations tamper_check() { + SCRIPTS_DIR_OLD="/config/custom-cont-init.d" + SCRIPTS_DIR="/custom-cont-init.d" SERVICES_DIR_OLD="/config/custom-services.d" - SERVICES_DIR="/custom-services.d" + SERVICES_DIR="/custom-services.d" + + # Tamper check custom script locations + if [[ -d "${SCRIPTS_DIR_OLD}" ]] && [[ -n "$(find ${SCRIPTS_DIR_OLD} ! -user root)" ]]; then + echo "**** Potential tampering with custom scripts detected ****" + randstr=$( + tr