2016-06-02 17:29:49 +03:00
|
|
|
|
#include "command.hh"
|
|
|
|
|
#include "common-args.hh"
|
|
|
|
|
#include "installables.hh"
|
|
|
|
|
#include "shared.hh"
|
|
|
|
|
#include "store-api.hh"
|
|
|
|
|
#include "derivations.hh"
|
2016-06-02 17:51:43 +03:00
|
|
|
|
#include "local-store.hh"
|
2016-06-02 19:19:10 +03:00
|
|
|
|
#include "finally.hh"
|
2016-06-02 17:51:43 +03:00
|
|
|
|
|
|
|
|
|
#if __linux__
|
|
|
|
|
#include <sys/mount.h>
|
|
|
|
|
#endif
|
2016-06-02 17:29:49 +03:00
|
|
|
|
|
|
|
|
|
using namespace nix;
|
|
|
|
|
|
2017-04-25 12:20:37 +03:00
|
|
|
|
struct CmdRun : MixInstallables
|
2016-06-02 17:29:49 +03:00
|
|
|
|
{
|
|
|
|
|
CmdRun()
|
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::string name() override
|
|
|
|
|
{
|
|
|
|
|
return "run";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
|
{
|
|
|
|
|
return "run a shell in which the specified packages are available";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void run(ref<Store> store) override
|
|
|
|
|
{
|
2017-04-25 12:20:37 +03:00
|
|
|
|
auto paths = buildInstallables(store, false);
|
2016-06-02 17:29:49 +03:00
|
|
|
|
|
2016-06-02 17:51:43 +03:00
|
|
|
|
auto store2 = store.dynamic_pointer_cast<LocalStore>();
|
|
|
|
|
|
|
|
|
|
if (store2 && store->storeDir != store2->realStoreDir) {
|
|
|
|
|
#if __linux__
|
2016-06-02 20:04:09 +03:00
|
|
|
|
uid_t uid = getuid();
|
|
|
|
|
uid_t gid = getgid();
|
|
|
|
|
|
2016-06-02 17:51:43 +03:00
|
|
|
|
if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == -1)
|
|
|
|
|
throw SysError("setting up a private mount namespace");
|
|
|
|
|
|
2016-06-02 19:19:10 +03:00
|
|
|
|
/* Bind-mount realStoreDir on /nix/store. If the latter
|
|
|
|
|
mount point doesn't already exists, we have to create a
|
|
|
|
|
chroot environment containing the mount point and bind
|
|
|
|
|
mounts for the children of /. Would be nice if we could
|
|
|
|
|
use overlayfs here, but that doesn't work in a user
|
|
|
|
|
namespace yet (Ubuntu has a patch for this:
|
|
|
|
|
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1478578). */
|
|
|
|
|
if (!pathExists(store->storeDir)) {
|
|
|
|
|
// FIXME: Use overlayfs?
|
|
|
|
|
|
|
|
|
|
Path tmpDir = createTempDir();
|
|
|
|
|
|
|
|
|
|
createDirs(tmpDir + store->storeDir);
|
|
|
|
|
|
|
|
|
|
if (mount(store2->realStoreDir.c_str(), (tmpDir + store->storeDir).c_str(), "", MS_BIND, 0) == -1)
|
2016-11-26 01:37:43 +02:00
|
|
|
|
throw SysError(format("mounting ‘%s’ on ‘%s’") % store2->realStoreDir % store->storeDir);
|
2016-06-02 19:19:10 +03:00
|
|
|
|
|
|
|
|
|
for (auto entry : readDirectory("/")) {
|
|
|
|
|
Path dst = tmpDir + "/" + entry.name;
|
|
|
|
|
if (pathExists(dst)) continue;
|
|
|
|
|
if (mkdir(dst.c_str(), 0700) == -1)
|
2016-11-26 01:37:43 +02:00
|
|
|
|
throw SysError(format("creating directory ‘%s’") % dst);
|
2016-06-02 19:19:10 +03:00
|
|
|
|
if (mount(("/" + entry.name).c_str(), dst.c_str(), "", MS_BIND | MS_REC, 0) == -1)
|
2016-11-26 01:37:43 +02:00
|
|
|
|
throw SysError(format("mounting ‘%s’ on ‘%s’") % ("/" + entry.name) % dst);
|
2016-06-02 19:19:10 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
char * cwd = getcwd(0, 0);
|
|
|
|
|
if (!cwd) throw SysError("getting current directory");
|
|
|
|
|
Finally freeCwd([&]() { free(cwd); });
|
|
|
|
|
|
|
|
|
|
if (chroot(tmpDir.c_str()) == -1)
|
2016-11-26 01:37:43 +02:00
|
|
|
|
throw SysError(format("chrooting into ‘%s’") % tmpDir);
|
2016-06-02 19:19:10 +03:00
|
|
|
|
|
|
|
|
|
if (chdir(cwd) == -1)
|
2016-11-26 01:37:43 +02:00
|
|
|
|
throw SysError(format("chdir to ‘%s’ in chroot") % cwd);
|
2016-06-02 19:19:10 +03:00
|
|
|
|
} else
|
|
|
|
|
if (mount(store2->realStoreDir.c_str(), store->storeDir.c_str(), "", MS_BIND, 0) == -1)
|
2016-11-26 01:37:43 +02:00
|
|
|
|
throw SysError(format("mounting ‘%s’ on ‘%s’") % store2->realStoreDir % store->storeDir);
|
2016-06-02 20:04:09 +03:00
|
|
|
|
|
|
|
|
|
writeFile("/proc/self/setgroups", "deny");
|
|
|
|
|
writeFile("/proc/self/uid_map", (format("%d %d %d") % uid % uid % 1).str());
|
|
|
|
|
writeFile("/proc/self/gid_map", (format("%d %d %d") % gid % gid % 1).str());
|
2016-06-02 17:51:43 +03:00
|
|
|
|
#else
|
2016-11-26 01:37:43 +02:00
|
|
|
|
throw Error(format("mounting the Nix store on ‘%s’ is not supported on this platform") % store->storeDir);
|
2016-06-02 17:51:43 +03:00
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
2016-06-02 17:29:49 +03:00
|
|
|
|
PathSet outPaths;
|
2017-04-25 12:20:37 +03:00
|
|
|
|
for (auto & path : paths)
|
2016-06-02 17:29:49 +03:00
|
|
|
|
if (isDerivation(path)) {
|
|
|
|
|
Derivation drv = store->derivationFromPath(path);
|
|
|
|
|
for (auto & output : drv.outputs)
|
|
|
|
|
outPaths.insert(output.second.path);
|
|
|
|
|
} else
|
|
|
|
|
outPaths.insert(path);
|
|
|
|
|
|
|
|
|
|
auto unixPath = tokenizeString<Strings>(getEnv("PATH"), ":");
|
|
|
|
|
for (auto & path : outPaths)
|
|
|
|
|
if (pathExists(path + "/bin"))
|
|
|
|
|
unixPath.push_front(path + "/bin");
|
|
|
|
|
setenv("PATH", concatStringsSep(":", unixPath).c_str(), 1);
|
|
|
|
|
|
2016-06-02 17:51:43 +03:00
|
|
|
|
if (execlp("bash", "bash", nullptr) == -1)
|
2016-11-26 01:37:43 +02:00
|
|
|
|
throw SysError("unable to exec ‘bash’");
|
2016-06-02 17:29:49 +03:00
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static RegisterCommand r1(make_ref<CmdRun>());
|