2023-10-25 07:43:36 +03:00
|
|
|
#include "current-process.hh"
|
2021-07-27 15:23:24 +03:00
|
|
|
#include "run.hh"
|
2023-02-05 19:16:17 +02:00
|
|
|
#include "command-installable-value.hh"
|
2016-06-02 17:29:49 +03:00
|
|
|
#include "common-args.hh"
|
|
|
|
#include "shared.hh"
|
|
|
|
#include "store-api.hh"
|
|
|
|
#include "derivations.hh"
|
2016-06-02 17:51:43 +03:00
|
|
|
#include "local-store.hh"
|
2016-06-02 19:19:10 +03:00
|
|
|
#include "finally.hh"
|
2023-11-01 18:09:28 +02:00
|
|
|
#include "source-accessor.hh"
|
2017-08-29 16:13:30 +03:00
|
|
|
#include "progress-bar.hh"
|
2019-06-01 00:45:13 +03:00
|
|
|
#include "eval.hh"
|
2022-12-23 17:28:26 +02:00
|
|
|
#include "build/personality.hh"
|
2016-06-02 17:51:43 +03:00
|
|
|
|
|
|
|
#if __linux__
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#endif
|
2016-06-02 17:29:49 +03:00
|
|
|
|
2018-08-09 14:01:03 +03:00
|
|
|
#include <queue>
|
|
|
|
|
2016-06-02 17:29:49 +03:00
|
|
|
using namespace nix;
|
|
|
|
|
2017-08-29 14:21:07 +03:00
|
|
|
std::string chrootHelperName = "__run_in_chroot";
|
|
|
|
|
2021-07-27 15:23:24 +03:00
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
void runProgramInStore(ref<Store> store,
|
2023-11-30 09:17:25 +02:00
|
|
|
bool search,
|
2021-07-27 15:23:24 +03:00
|
|
|
const std::string & program,
|
2022-12-23 17:28:26 +02:00
|
|
|
const Strings & args,
|
|
|
|
std::optional<std::string_view> system)
|
2019-06-01 00:45:13 +03:00
|
|
|
{
|
2021-07-27 15:23:24 +03:00
|
|
|
stopProgressBar();
|
2020-12-01 15:57:56 +02:00
|
|
|
|
2021-07-27 15:23:24 +03:00
|
|
|
restoreProcessContext();
|
2020-12-01 15:57:56 +02:00
|
|
|
|
2021-07-27 15:23:24 +03:00
|
|
|
/* If this is a diverted store (i.e. its "logical" location
|
|
|
|
(typically /nix/store) differs from its "physical" location
|
|
|
|
(e.g. /home/eelco/nix/store), then run the command in a
|
|
|
|
chroot. For non-root users, this requires running it in new
|
|
|
|
mount and user namespaces. Unfortunately,
|
|
|
|
unshare(CLONE_NEWUSER) doesn't work in a multithreaded program
|
|
|
|
(which "nix" is), so we exec() a single-threaded helper program
|
|
|
|
(chrootHelper() below) to do the work. */
|
2022-03-28 15:58:38 +03:00
|
|
|
auto store2 = store.dynamic_pointer_cast<LocalFSStore>();
|
2019-06-01 00:45:13 +03:00
|
|
|
|
2022-03-28 15:58:38 +03:00
|
|
|
if (!store2)
|
|
|
|
throw Error("store '%s' is not a local store so it does not support command execution", store->getUri());
|
|
|
|
|
|
|
|
if (store->storeDir != store2->getRealStoreDir()) {
|
2022-12-23 17:28:26 +02:00
|
|
|
Strings helperArgs = { chrootHelperName, store->storeDir, store2->getRealStoreDir(), std::string(system.value_or("")), program };
|
2021-07-27 15:23:24 +03:00
|
|
|
for (auto & arg : args) helperArgs.push_back(arg);
|
2019-06-01 00:45:13 +03:00
|
|
|
|
2022-06-22 23:43:53 +03:00
|
|
|
execv(getSelfExe().value_or("nix").c_str(), stringsToCharPtrs(helperArgs).data());
|
2019-06-01 00:45:13 +03:00
|
|
|
|
2021-07-27 15:23:24 +03:00
|
|
|
throw SysError("could not execute chroot helper");
|
|
|
|
}
|
2019-06-01 00:45:13 +03:00
|
|
|
|
2022-12-23 17:28:26 +02:00
|
|
|
if (system)
|
|
|
|
setPersonality(*system);
|
|
|
|
|
2023-11-30 09:17:25 +02:00
|
|
|
if (search)
|
|
|
|
execvp(program.c_str(), stringsToCharPtrs(args).data());
|
|
|
|
else
|
|
|
|
execv(program.c_str(), stringsToCharPtrs(args).data());
|
2019-06-01 00:45:13 +03:00
|
|
|
|
2021-07-27 15:23:24 +03:00
|
|
|
throw SysError("unable to execute '%s'", program);
|
|
|
|
}
|
2019-06-01 00:45:13 +03:00
|
|
|
|
2021-07-27 15:23:24 +03:00
|
|
|
}
|
2019-06-01 00:45:13 +03:00
|
|
|
|
2021-07-27 15:23:24 +03:00
|
|
|
struct CmdShell : InstallablesCommand, MixEnvironment
|
2016-06-02 17:29:49 +03:00
|
|
|
{
|
2020-12-01 15:57:56 +02:00
|
|
|
|
|
|
|
using InstallablesCommand::run;
|
|
|
|
|
2020-04-07 15:29:40 +03:00
|
|
|
std::vector<std::string> command = { getEnv("SHELL").value_or("bash") };
|
2017-08-29 15:28:57 +03:00
|
|
|
|
2020-04-29 23:02:37 +03:00
|
|
|
CmdShell()
|
2016-06-02 17:29:49 +03:00
|
|
|
{
|
2020-05-04 23:40:19 +03:00
|
|
|
addFlag({
|
|
|
|
.longName = "command",
|
|
|
|
.shortName = 'c',
|
2021-01-13 15:18:04 +02:00
|
|
|
.description = "Command and arguments to be executed, defaulting to `$SHELL`",
|
2020-05-04 23:40:19 +03:00
|
|
|
.labels = {"command", "args"},
|
|
|
|
.handler = {[&](std::vector<std::string> ss) {
|
2017-08-29 15:28:57 +03:00
|
|
|
if (ss.empty()) throw UsageError("--command requires at least one argument");
|
|
|
|
command = ss;
|
2020-05-04 23:40:19 +03:00
|
|
|
}}
|
|
|
|
});
|
2016-06-02 17:29:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "run a shell in which the specified packages are available";
|
|
|
|
}
|
|
|
|
|
2020-12-08 18:16:23 +02:00
|
|
|
std::string doc() override
|
2017-09-07 21:09:04 +03:00
|
|
|
{
|
2020-12-08 18:16:23 +02:00
|
|
|
return
|
|
|
|
#include "shell.md"
|
|
|
|
;
|
2017-09-07 21:09:04 +03:00
|
|
|
}
|
|
|
|
|
Make command infra less stateful and more regular
Already, we had classes like `BuiltPathsCommand` and `StorePathsCommand`
which provided alternative `run` virtual functions providing the
implementation with more arguments. This was a very nice and easy way to
make writing command; just fill in the virtual functions and it is
fairly clear what to do.
However, exception to this pattern were `Installable{,s}Command`. These
two classes instead just had a field where the installables would be
stored, and various side-effecting `prepare` and `load` machinery too
fill them in. Command would wish out those fields.
This isn't so clear to use.
What this commit does is make those command classes like the others,
with richer `run` functions.
Not only does this restore the pattern making commands easier to write,
it has a number of other benefits:
- `prepare` and `load` are gone entirely! One command just hands just
hands off to the next.
- `useDefaultInstallables` because `defaultInstallables`. This takes
over `prepare` for the one case that needs it, and provides enough
flexiblity to handle `nix repl`'s idiosyncratic migration.
- We can use `ref` instead of `std::shared_ptr`. The former must be
initialized (so it is like Rust's `Box` rather than `Option<Box>`,
This expresses the invariant that the installable are in fact
initialized much better.
This is possible because since we just have local variables not
fields, we can stop worrying about the not-yet-initialized case.
- Fewer lines of code! (Finally I have a large refactor that makes the
number go down not up...)
- `nix repl` is now implemented in a clearer way.
The last item deserves further mention. `nix repl` is not like the other
installable commands because instead working from once-loaded
installables, it needs to be able to load them again and again.
To properly support this, we make a new superclass
`RawInstallablesCommand`. This class has the argument parsing and
completion logic, but does *not* hand off parsed installables but
instead just the raw string arguments.
This is exactly what `nix repl` needs, and allows us to instead of
having the logic awkwardly split between `prepare`,
`useDefaultInstallables,` and `load`, have everything right next to each
other. I think this will enable future simplifications of that argument
defaulting logic, but I am saving those for a future PR --- best to keep
code motion and more complicated boolean expression rewriting separate
steps.
The "diagnostic ignored `-Woverloaded-virtual`" pragma helps because C++
doesn't like our many `run` methods. In our case, we don't mind the
shadowing it all --- it is *intentional* that the derived class only
provides a `run` method, and doesn't call any of the overridden `run`
methods.
Helps with https://github.com/NixOS/rfcs/pull/134
2023-02-04 19:03:47 +02:00
|
|
|
void run(ref<Store> store, Installables && installables) override
|
2019-11-01 03:46:49 +02:00
|
|
|
{
|
2022-03-02 14:54:08 +02:00
|
|
|
auto outPaths = Installable::toStorePaths(getEvalStore(), store, Realise::Outputs, OperateOn::Output, installables);
|
2019-11-01 03:46:49 +02:00
|
|
|
|
|
|
|
auto accessor = store->getFSAccessor();
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
std::unordered_set<StorePath> done;
|
|
|
|
std::queue<StorePath> todo;
|
2020-06-16 23:20:18 +03:00
|
|
|
for (auto & path : outPaths) todo.push(path);
|
2018-08-09 14:01:03 +03:00
|
|
|
|
2019-11-08 01:18:31 +02:00
|
|
|
setEnviron();
|
2019-11-05 02:40:25 +02:00
|
|
|
|
2019-11-22 17:06:44 +02:00
|
|
|
auto unixPath = tokenizeString<Strings>(getEnv("PATH").value_or(""), ":");
|
2018-08-09 14:01:03 +03:00
|
|
|
|
|
|
|
while (!todo.empty()) {
|
2020-06-16 23:20:18 +03:00
|
|
|
auto path = todo.front();
|
2018-08-09 14:01:03 +03:00
|
|
|
todo.pop();
|
2020-06-16 23:20:18 +03:00
|
|
|
if (!done.insert(path).second) continue;
|
2018-08-09 14:01:03 +03:00
|
|
|
|
|
|
|
if (true)
|
2019-12-05 20:11:09 +02:00
|
|
|
unixPath.push_front(store->printStorePath(path) + "/bin");
|
2018-08-09 14:01:03 +03:00
|
|
|
|
2023-11-01 18:09:28 +02:00
|
|
|
auto propPath = CanonPath(store->printStorePath(path)) + "nix-support" + "propagated-user-env-packages";
|
|
|
|
if (auto st = accessor->maybeLstat(propPath); st && st->type == SourceAccessor::tRegular) {
|
|
|
|
for (auto & p : tokenizeString<Paths>(accessor->readFile(propPath)))
|
2019-12-05 20:11:09 +02:00
|
|
|
todo.push(store->parseStorePath(p));
|
2018-08-09 14:01:03 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-02 17:29:49 +03:00
|
|
|
setenv("PATH", concatStringsSep(":", unixPath).c_str(), 1);
|
|
|
|
|
2017-10-24 13:45:11 +03:00
|
|
|
Strings args;
|
|
|
|
for (auto & arg : command) args.push_back(arg);
|
2017-08-29 14:21:07 +03:00
|
|
|
|
2023-11-30 09:17:25 +02:00
|
|
|
runProgramInStore(store, true, *command.begin(), args);
|
2019-06-01 00:45:13 +03:00
|
|
|
}
|
|
|
|
};
|
2017-08-29 16:13:30 +03:00
|
|
|
|
2020-10-06 14:36:55 +03:00
|
|
|
static auto rCmdShell = registerCommand<CmdShell>("shell");
|
2019-02-05 11:49:19 +02:00
|
|
|
|
2023-02-05 19:16:17 +02:00
|
|
|
struct CmdRun : InstallableValueCommand
|
2019-06-01 00:45:13 +03:00
|
|
|
{
|
2020-12-01 15:57:56 +02:00
|
|
|
using InstallableCommand::run;
|
|
|
|
|
2019-06-17 18:05:37 +03:00
|
|
|
std::vector<std::string> args;
|
|
|
|
|
2020-04-29 23:02:37 +03:00
|
|
|
CmdRun()
|
2019-06-01 00:45:13 +03:00
|
|
|
{
|
2020-05-11 16:46:18 +03:00
|
|
|
expectArgs({
|
|
|
|
.label = "args",
|
|
|
|
.handler = {&args},
|
|
|
|
.completer = completePath
|
|
|
|
});
|
2019-06-01 00:45:13 +03:00
|
|
|
}
|
2018-08-19 13:05:08 +03:00
|
|
|
|
2019-06-01 00:45:13 +03:00
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "run a Nix application";
|
|
|
|
}
|
2017-08-29 14:21:07 +03:00
|
|
|
|
2020-12-08 18:16:23 +02:00
|
|
|
std::string doc() override
|
2019-06-01 00:45:13 +03:00
|
|
|
{
|
2020-12-08 18:16:23 +02:00
|
|
|
return
|
|
|
|
#include "run.md"
|
|
|
|
;
|
2019-06-01 00:45:13 +03:00
|
|
|
}
|
2017-08-29 14:21:07 +03:00
|
|
|
|
2019-06-01 00:45:13 +03:00
|
|
|
Strings getDefaultFlakeAttrPaths() override
|
|
|
|
{
|
2022-02-11 19:11:08 +02:00
|
|
|
Strings res{
|
|
|
|
"apps." + settings.thisSystem.get() + ".default",
|
|
|
|
"defaultApp." + settings.thisSystem.get(),
|
|
|
|
};
|
2020-06-29 20:08:50 +03:00
|
|
|
for (auto & s : SourceExprCommand::getDefaultFlakeAttrPaths())
|
|
|
|
res.push_back(s);
|
|
|
|
return res;
|
2019-06-01 00:45:13 +03:00
|
|
|
}
|
2017-08-29 14:21:07 +03:00
|
|
|
|
2019-06-17 17:58:59 +03:00
|
|
|
Strings getDefaultFlakeAttrPathPrefixes() override
|
|
|
|
{
|
2021-08-21 21:17:05 +03:00
|
|
|
Strings res{"apps." + settings.thisSystem.get() + "."};
|
2020-06-29 20:08:50 +03:00
|
|
|
for (auto & s : SourceExprCommand::getDefaultFlakeAttrPathPrefixes())
|
|
|
|
res.push_back(s);
|
|
|
|
return res;
|
2019-06-17 17:58:59 +03:00
|
|
|
}
|
|
|
|
|
2023-02-05 19:16:17 +02:00
|
|
|
void run(ref<Store> store, ref<InstallableValue> installable) override
|
2019-06-01 00:45:13 +03:00
|
|
|
{
|
|
|
|
auto state = getEvalState();
|
|
|
|
|
2022-04-01 03:30:53 +03:00
|
|
|
lockFlags.applyNixConfig = true;
|
2021-07-16 17:04:47 +03:00
|
|
|
auto app = installable->toApp(*state).resolve(getEvalStore(), store);
|
2019-06-01 00:45:13 +03:00
|
|
|
|
2019-06-17 18:05:37 +03:00
|
|
|
Strings allArgs{app.program};
|
|
|
|
for (auto & i : args) allArgs.push_back(i);
|
|
|
|
|
2023-11-30 09:17:25 +02:00
|
|
|
runProgramInStore(store, false, app.program, allArgs);
|
2016-06-02 17:29:49 +03:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-10-06 14:36:55 +03:00
|
|
|
static auto rCmdRun = registerCommand<CmdRun>("run");
|
2017-08-29 14:21:07 +03:00
|
|
|
|
|
|
|
void chrootHelper(int argc, char * * argv)
|
|
|
|
{
|
|
|
|
int p = 1;
|
|
|
|
std::string storeDir = argv[p++];
|
|
|
|
std::string realStoreDir = argv[p++];
|
2022-12-23 17:28:26 +02:00
|
|
|
std::string system = argv[p++];
|
2017-08-29 14:21:07 +03:00
|
|
|
std::string cmd = argv[p++];
|
|
|
|
Strings args;
|
|
|
|
while (p < argc)
|
|
|
|
args.push_back(argv[p++]);
|
|
|
|
|
|
|
|
#if __linux__
|
|
|
|
uid_t uid = getuid();
|
|
|
|
uid_t gid = getgid();
|
|
|
|
|
|
|
|
if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == -1)
|
2019-07-25 16:37:57 +03:00
|
|
|
/* Try with just CLONE_NEWNS in case user namespaces are
|
|
|
|
specifically disabled. */
|
|
|
|
if (unshare(CLONE_NEWNS) == -1)
|
|
|
|
throw SysError("setting up a private mount namespace");
|
2017-08-29 14:21:07 +03:00
|
|
|
|
|
|
|
/* Bind-mount realStoreDir on /nix/store. If the latter mount
|
|
|
|
point doesn't already exists, we have to create a chroot
|
|
|
|
environment containing the mount point and bind mounts for the
|
|
|
|
children of /. Would be nice if we could use overlayfs here,
|
|
|
|
but that doesn't work in a user namespace yet (Ubuntu has a
|
|
|
|
patch for this:
|
|
|
|
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1478578). */
|
2017-11-20 18:59:32 +02:00
|
|
|
if (!pathExists(storeDir)) {
|
2017-08-29 14:21:07 +03:00
|
|
|
// FIXME: Use overlayfs?
|
|
|
|
|
|
|
|
Path tmpDir = createTempDir();
|
|
|
|
|
|
|
|
createDirs(tmpDir + storeDir);
|
|
|
|
|
|
|
|
if (mount(realStoreDir.c_str(), (tmpDir + storeDir).c_str(), "", MS_BIND, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir);
|
|
|
|
|
|
|
|
for (auto entry : readDirectory("/")) {
|
2017-11-20 18:58:23 +02:00
|
|
|
auto src = "/" + entry.name;
|
2017-08-29 14:21:07 +03:00
|
|
|
Path dst = tmpDir + "/" + entry.name;
|
|
|
|
if (pathExists(dst)) continue;
|
2020-12-22 13:28:50 +02:00
|
|
|
auto st = lstat(src);
|
|
|
|
if (S_ISDIR(st.st_mode)) {
|
|
|
|
if (mkdir(dst.c_str(), 0700) == -1)
|
|
|
|
throw SysError("creating directory '%s'", dst);
|
|
|
|
if (mount(src.c_str(), dst.c_str(), "", MS_BIND | MS_REC, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", src, dst);
|
|
|
|
} else if (S_ISLNK(st.st_mode))
|
|
|
|
createSymlink(readLink(src), dst);
|
2017-08-29 14:21:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
char * cwd = getcwd(0, 0);
|
|
|
|
if (!cwd) throw SysError("getting current directory");
|
|
|
|
Finally freeCwd([&]() { free(cwd); });
|
|
|
|
|
|
|
|
if (chroot(tmpDir.c_str()) == -1)
|
2020-04-22 02:07:07 +03:00
|
|
|
throw SysError("chrooting into '%s'", tmpDir);
|
2017-08-29 14:21:07 +03:00
|
|
|
|
|
|
|
if (chdir(cwd) == -1)
|
2020-04-22 02:07:07 +03:00
|
|
|
throw SysError("chdir to '%s' in chroot", cwd);
|
2017-08-29 14:21:07 +03:00
|
|
|
} else
|
|
|
|
if (mount(realStoreDir.c_str(), storeDir.c_str(), "", MS_BIND, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir);
|
|
|
|
|
|
|
|
writeFile("/proc/self/setgroups", "deny");
|
|
|
|
writeFile("/proc/self/uid_map", fmt("%d %d %d", uid, uid, 1));
|
|
|
|
writeFile("/proc/self/gid_map", fmt("%d %d %d", gid, gid, 1));
|
|
|
|
|
2022-12-23 17:28:26 +02:00
|
|
|
if (system != "")
|
|
|
|
setPersonality(system);
|
|
|
|
|
2017-08-29 14:21:07 +03:00
|
|
|
execvp(cmd.c_str(), stringsToCharPtrs(args).data());
|
|
|
|
|
|
|
|
throw SysError("unable to exec '%s'", cmd);
|
|
|
|
|
|
|
|
#else
|
2017-08-31 12:05:18 +03:00
|
|
|
throw Error("mounting the Nix store on '%s' is not supported on this platform", storeDir);
|
2017-08-29 14:21:07 +03:00
|
|
|
#endif
|
|
|
|
}
|