2023-10-25 00:43:36 -04:00
|
|
|
#include "current-process.hh"
|
2021-07-27 14:23:24 +02:00
|
|
|
#include "run.hh"
|
2023-02-05 12:16:17 -05:00
|
|
|
#include "command-installable-value.hh"
|
2016-06-02 16:29:49 +02:00
|
|
|
#include "common-args.hh"
|
|
|
|
#include "shared.hh"
|
2024-06-04 19:35:40 +05:30
|
|
|
#include "signals.hh"
|
2016-06-02 16:29:49 +02:00
|
|
|
#include "store-api.hh"
|
|
|
|
#include "derivations.hh"
|
2024-04-17 16:20:56 -04:00
|
|
|
#include "local-fs-store.hh"
|
2016-06-02 18:19:10 +02:00
|
|
|
#include "finally.hh"
|
2023-11-01 17:09:28 +01:00
|
|
|
#include "source-accessor.hh"
|
2017-08-29 15:13:30 +02:00
|
|
|
#include "progress-bar.hh"
|
2019-05-31 23:45:13 +02:00
|
|
|
#include "eval.hh"
|
2016-06-02 16:51:43 +02:00
|
|
|
|
|
|
|
#if __linux__
|
2024-04-17 16:20:56 -04:00
|
|
|
# include <sys/mount.h>
|
|
|
|
# include "personality.hh"
|
2016-06-02 16:51:43 +02:00
|
|
|
#endif
|
2016-06-02 16:29:49 +02:00
|
|
|
|
2018-08-09 13:01:03 +02:00
|
|
|
#include <queue>
|
|
|
|
|
2016-06-02 16:29:49 +02:00
|
|
|
using namespace nix;
|
|
|
|
|
2017-08-29 13:21:07 +02:00
|
|
|
std::string chrootHelperName = "__run_in_chroot";
|
|
|
|
|
2021-07-27 14:23:24 +02:00
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
void runProgramInStore(ref<Store> store,
|
2024-04-13 17:35:15 +02:00
|
|
|
UseLookupPath useLookupPath,
|
2021-07-27 14:23:24 +02:00
|
|
|
const std::string & program,
|
2022-12-23 16:28:26 +01:00
|
|
|
const Strings & args,
|
|
|
|
std::optional<std::string_view> system)
|
2019-05-31 23:45:13 +02:00
|
|
|
{
|
2021-07-27 14:23:24 +02:00
|
|
|
stopProgressBar();
|
2020-12-01 14:57:56 +01:00
|
|
|
|
2021-07-27 14:23:24 +02:00
|
|
|
restoreProcessContext();
|
2020-12-01 14:57:56 +01:00
|
|
|
|
2021-07-27 14:23:24 +02:00
|
|
|
/* If this is a diverted store (i.e. its "logical" location
|
|
|
|
(typically /nix/store) differs from its "physical" location
|
|
|
|
(e.g. /home/eelco/nix/store), then run the command in a
|
|
|
|
chroot. For non-root users, this requires running it in new
|
|
|
|
mount and user namespaces. Unfortunately,
|
|
|
|
unshare(CLONE_NEWUSER) doesn't work in a multithreaded program
|
|
|
|
(which "nix" is), so we exec() a single-threaded helper program
|
|
|
|
(chrootHelper() below) to do the work. */
|
2022-03-28 14:58:38 +02:00
|
|
|
auto store2 = store.dynamic_pointer_cast<LocalFSStore>();
|
2019-05-31 23:45:13 +02:00
|
|
|
|
2022-03-28 14:58:38 +02:00
|
|
|
if (!store2)
|
|
|
|
throw Error("store '%s' is not a local store so it does not support command execution", store->getUri());
|
|
|
|
|
|
|
|
if (store->storeDir != store2->getRealStoreDir()) {
|
2022-12-23 16:28:26 +01:00
|
|
|
Strings helperArgs = { chrootHelperName, store->storeDir, store2->getRealStoreDir(), std::string(system.value_or("")), program };
|
2021-07-27 14:23:24 +02:00
|
|
|
for (auto & arg : args) helperArgs.push_back(arg);
|
2019-05-31 23:45:13 +02:00
|
|
|
|
2022-06-22 22:43:53 +02:00
|
|
|
execv(getSelfExe().value_or("nix").c_str(), stringsToCharPtrs(helperArgs).data());
|
2019-05-31 23:45:13 +02:00
|
|
|
|
2021-07-27 14:23:24 +02:00
|
|
|
throw SysError("could not execute chroot helper");
|
|
|
|
}
|
2019-05-31 23:45:13 +02:00
|
|
|
|
2024-04-17 16:20:56 -04:00
|
|
|
#if __linux__
|
2022-12-23 16:28:26 +01:00
|
|
|
if (system)
|
2024-04-17 16:20:56 -04:00
|
|
|
linux::setPersonality(*system);
|
|
|
|
#endif
|
2022-12-23 16:28:26 +01:00
|
|
|
|
2024-04-13 17:35:15 +02:00
|
|
|
if (useLookupPath == UseLookupPath::Use)
|
2023-11-30 00:17:25 -07:00
|
|
|
execvp(program.c_str(), stringsToCharPtrs(args).data());
|
|
|
|
else
|
|
|
|
execv(program.c_str(), stringsToCharPtrs(args).data());
|
2019-05-31 23:45:13 +02:00
|
|
|
|
2021-07-27 14:23:24 +02:00
|
|
|
throw SysError("unable to execute '%s'", program);
|
|
|
|
}
|
2019-05-31 23:45:13 +02:00
|
|
|
|
2021-07-27 14:23:24 +02:00
|
|
|
}
|
2019-05-31 23:45:13 +02:00
|
|
|
|
2023-02-05 12:16:17 -05:00
|
|
|
struct CmdRun : InstallableValueCommand
|
2019-05-31 23:45:13 +02:00
|
|
|
{
|
2020-12-01 14:57:56 +01:00
|
|
|
using InstallableCommand::run;
|
|
|
|
|
2019-06-17 17:05:37 +02:00
|
|
|
std::vector<std::string> args;
|
|
|
|
|
2020-04-29 14:02:37 -06:00
|
|
|
CmdRun()
|
2019-05-31 23:45:13 +02:00
|
|
|
{
|
2020-05-11 15:46:18 +02:00
|
|
|
expectArgs({
|
|
|
|
.label = "args",
|
|
|
|
.handler = {&args},
|
|
|
|
.completer = completePath
|
|
|
|
});
|
2019-05-31 23:45:13 +02:00
|
|
|
}
|
2018-08-19 12:05:08 +02:00
|
|
|
|
2019-05-31 23:45:13 +02:00
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "run a Nix application";
|
|
|
|
}
|
2017-08-29 13:21:07 +02:00
|
|
|
|
2020-12-08 17:16:23 +01:00
|
|
|
std::string doc() override
|
2019-05-31 23:45:13 +02:00
|
|
|
{
|
2020-12-08 17:16:23 +01:00
|
|
|
return
|
|
|
|
#include "run.md"
|
|
|
|
;
|
2019-05-31 23:45:13 +02:00
|
|
|
}
|
2017-08-29 13:21:07 +02:00
|
|
|
|
2019-05-31 23:45:13 +02:00
|
|
|
Strings getDefaultFlakeAttrPaths() override
|
|
|
|
{
|
2022-02-11 18:11:08 +01:00
|
|
|
Strings res{
|
|
|
|
"apps." + settings.thisSystem.get() + ".default",
|
|
|
|
"defaultApp." + settings.thisSystem.get(),
|
|
|
|
};
|
2020-06-29 19:08:50 +02:00
|
|
|
for (auto & s : SourceExprCommand::getDefaultFlakeAttrPaths())
|
|
|
|
res.push_back(s);
|
|
|
|
return res;
|
2019-05-31 23:45:13 +02:00
|
|
|
}
|
2017-08-29 13:21:07 +02:00
|
|
|
|
2019-06-17 16:58:59 +02:00
|
|
|
Strings getDefaultFlakeAttrPathPrefixes() override
|
|
|
|
{
|
2021-08-21 20:17:05 +02:00
|
|
|
Strings res{"apps." + settings.thisSystem.get() + "."};
|
2020-06-29 19:08:50 +02:00
|
|
|
for (auto & s : SourceExprCommand::getDefaultFlakeAttrPathPrefixes())
|
|
|
|
res.push_back(s);
|
|
|
|
return res;
|
2019-06-17 16:58:59 +02:00
|
|
|
}
|
|
|
|
|
2023-02-05 12:16:17 -05:00
|
|
|
void run(ref<Store> store, ref<InstallableValue> installable) override
|
2019-05-31 23:45:13 +02:00
|
|
|
{
|
|
|
|
auto state = getEvalState();
|
|
|
|
|
2022-03-31 20:30:53 -04:00
|
|
|
lockFlags.applyNixConfig = true;
|
2021-07-16 16:04:47 +02:00
|
|
|
auto app = installable->toApp(*state).resolve(getEvalStore(), store);
|
2019-05-31 23:45:13 +02:00
|
|
|
|
2019-06-17 17:05:37 +02:00
|
|
|
Strings allArgs{app.program};
|
|
|
|
for (auto & i : args) allArgs.push_back(i);
|
|
|
|
|
2024-04-13 17:35:15 +02:00
|
|
|
runProgramInStore(store, UseLookupPath::DontUse, app.program, allArgs);
|
2016-06-02 16:29:49 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-10-06 13:36:55 +02:00
|
|
|
static auto rCmdRun = registerCommand<CmdRun>("run");
|
2017-08-29 13:21:07 +02:00
|
|
|
|
|
|
|
void chrootHelper(int argc, char * * argv)
|
|
|
|
{
|
|
|
|
int p = 1;
|
|
|
|
std::string storeDir = argv[p++];
|
|
|
|
std::string realStoreDir = argv[p++];
|
2022-12-23 16:28:26 +01:00
|
|
|
std::string system = argv[p++];
|
2017-08-29 13:21:07 +02:00
|
|
|
std::string cmd = argv[p++];
|
|
|
|
Strings args;
|
|
|
|
while (p < argc)
|
|
|
|
args.push_back(argv[p++]);
|
|
|
|
|
|
|
|
#if __linux__
|
|
|
|
uid_t uid = getuid();
|
|
|
|
uid_t gid = getgid();
|
|
|
|
|
|
|
|
if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == -1)
|
2019-07-25 09:37:57 -04:00
|
|
|
/* Try with just CLONE_NEWNS in case user namespaces are
|
|
|
|
specifically disabled. */
|
|
|
|
if (unshare(CLONE_NEWNS) == -1)
|
|
|
|
throw SysError("setting up a private mount namespace");
|
2017-08-29 13:21:07 +02:00
|
|
|
|
|
|
|
/* Bind-mount realStoreDir on /nix/store. If the latter mount
|
|
|
|
point doesn't already exists, we have to create a chroot
|
|
|
|
environment containing the mount point and bind mounts for the
|
|
|
|
children of /. Would be nice if we could use overlayfs here,
|
|
|
|
but that doesn't work in a user namespace yet (Ubuntu has a
|
|
|
|
patch for this:
|
|
|
|
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1478578). */
|
2017-11-20 17:59:32 +01:00
|
|
|
if (!pathExists(storeDir)) {
|
2017-08-29 13:21:07 +02:00
|
|
|
// FIXME: Use overlayfs?
|
|
|
|
|
|
|
|
Path tmpDir = createTempDir();
|
|
|
|
|
|
|
|
createDirs(tmpDir + storeDir);
|
|
|
|
|
|
|
|
if (mount(realStoreDir.c_str(), (tmpDir + storeDir).c_str(), "", MS_BIND, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir);
|
|
|
|
|
2024-05-12 17:42:18 +05:30
|
|
|
for (auto entry : std::filesystem::directory_iterator{"/"}) {
|
2024-06-04 19:35:40 +05:30
|
|
|
checkInterrupt();
|
2024-05-07 11:29:33 -04:00
|
|
|
auto src = entry.path().string();
|
|
|
|
Path dst = tmpDir + "/" + entry.path().filename().string();
|
2017-08-29 13:21:07 +02:00
|
|
|
if (pathExists(dst)) continue;
|
2020-12-22 12:28:50 +01:00
|
|
|
auto st = lstat(src);
|
|
|
|
if (S_ISDIR(st.st_mode)) {
|
|
|
|
if (mkdir(dst.c_str(), 0700) == -1)
|
|
|
|
throw SysError("creating directory '%s'", dst);
|
|
|
|
if (mount(src.c_str(), dst.c_str(), "", MS_BIND | MS_REC, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", src, dst);
|
|
|
|
} else if (S_ISLNK(st.st_mode))
|
|
|
|
createSymlink(readLink(src), dst);
|
2017-08-29 13:21:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
char * cwd = getcwd(0, 0);
|
|
|
|
if (!cwd) throw SysError("getting current directory");
|
|
|
|
Finally freeCwd([&]() { free(cwd); });
|
|
|
|
|
|
|
|
if (chroot(tmpDir.c_str()) == -1)
|
2020-04-21 17:07:07 -06:00
|
|
|
throw SysError("chrooting into '%s'", tmpDir);
|
2017-08-29 13:21:07 +02:00
|
|
|
|
|
|
|
if (chdir(cwd) == -1)
|
2020-04-21 17:07:07 -06:00
|
|
|
throw SysError("chdir to '%s' in chroot", cwd);
|
2017-08-29 13:21:07 +02:00
|
|
|
} else
|
|
|
|
if (mount(realStoreDir.c_str(), storeDir.c_str(), "", MS_BIND, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir);
|
|
|
|
|
|
|
|
writeFile("/proc/self/setgroups", "deny");
|
|
|
|
writeFile("/proc/self/uid_map", fmt("%d %d %d", uid, uid, 1));
|
|
|
|
writeFile("/proc/self/gid_map", fmt("%d %d %d", gid, gid, 1));
|
|
|
|
|
2024-04-17 16:20:56 -04:00
|
|
|
#if __linux__
|
2022-12-23 16:28:26 +01:00
|
|
|
if (system != "")
|
2024-04-17 16:20:56 -04:00
|
|
|
linux::setPersonality(system);
|
|
|
|
#endif
|
2022-12-23 16:28:26 +01:00
|
|
|
|
2017-08-29 13:21:07 +02:00
|
|
|
execvp(cmd.c_str(), stringsToCharPtrs(args).data());
|
|
|
|
|
|
|
|
throw SysError("unable to exec '%s'", cmd);
|
|
|
|
|
|
|
|
#else
|
2017-08-31 11:05:18 +02:00
|
|
|
throw Error("mounting the Nix store on '%s' is not supported on this platform", storeDir);
|
2017-08-29 13:21:07 +02:00
|
|
|
#endif
|
|
|
|
}
|