2016-06-02 14:29:49 +00:00
|
|
|
#include "command.hh"
|
|
|
|
#include "common-args.hh"
|
|
|
|
#include "shared.hh"
|
|
|
|
#include "store-api.hh"
|
|
|
|
#include "derivations.hh"
|
2016-06-02 14:51:43 +00:00
|
|
|
#include "local-store.hh"
|
2016-06-02 16:19:10 +00:00
|
|
|
#include "finally.hh"
|
2017-08-29 11:21:07 +00:00
|
|
|
#include "fs-accessor.hh"
|
2017-08-29 13:13:30 +00:00
|
|
|
#include "progress-bar.hh"
|
2018-08-19 10:05:08 +00:00
|
|
|
#include "affinity.hh"
|
2019-05-31 21:45:13 +00:00
|
|
|
#include "eval.hh"
|
2016-06-02 14:51:43 +00:00
|
|
|
|
|
|
|
#if __linux__
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#endif
|
2016-06-02 14:29:49 +00:00
|
|
|
|
2018-08-09 11:01:03 +00:00
|
|
|
#include <queue>
|
|
|
|
|
2016-06-02 14:29:49 +00:00
|
|
|
using namespace nix;
|
|
|
|
|
2017-08-29 11:21:07 +00:00
|
|
|
std::string chrootHelperName = "__run_in_chroot";
|
|
|
|
|
2019-05-31 21:45:13 +00:00
|
|
|
struct RunCommon : virtual Command
|
|
|
|
{
|
|
|
|
void runProgram(ref<Store> store,
|
|
|
|
const std::string & program,
|
2019-11-05 00:40:25 +00:00
|
|
|
const Strings & args)
|
2019-05-31 21:45:13 +00:00
|
|
|
{
|
|
|
|
stopProgressBar();
|
|
|
|
|
|
|
|
restoreSignals();
|
|
|
|
|
|
|
|
restoreAffinity();
|
|
|
|
|
|
|
|
/* If this is a diverted store (i.e. its "logical" location
|
|
|
|
(typically /nix/store) differs from its "physical" location
|
|
|
|
(e.g. /home/eelco/nix/store), then run the command in a
|
|
|
|
chroot. For non-root users, this requires running it in new
|
|
|
|
mount and user namespaces. Unfortunately,
|
|
|
|
unshare(CLONE_NEWUSER) doesn't work in a multithreaded
|
|
|
|
program (which "nix" is), so we exec() a single-threaded
|
|
|
|
helper program (chrootHelper() below) to do the work. */
|
|
|
|
auto store2 = store.dynamic_pointer_cast<LocalStore>();
|
|
|
|
|
|
|
|
if (store2 && store->storeDir != store2->realStoreDir) {
|
|
|
|
Strings helperArgs = { chrootHelperName, store->storeDir, store2->realStoreDir, program };
|
|
|
|
for (auto & arg : args) helperArgs.push_back(arg);
|
|
|
|
|
2019-11-05 00:40:25 +00:00
|
|
|
execv(readLink("/proc/self/exe").c_str(), stringsToCharPtrs(helperArgs).data());
|
2019-05-31 21:45:13 +00:00
|
|
|
|
|
|
|
throw SysError("could not execute chroot helper");
|
|
|
|
}
|
|
|
|
|
2019-11-05 00:40:25 +00:00
|
|
|
execvp(program.c_str(), stringsToCharPtrs(args).data());
|
2019-05-31 21:45:13 +00:00
|
|
|
|
|
|
|
throw SysError("unable to execute '%s'", program);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-11-07 23:18:31 +00:00
|
|
|
struct CmdRun : InstallablesCommand, RunCommon, MixEnvironment
|
2016-06-02 14:29:49 +00:00
|
|
|
{
|
2020-04-07 12:29:40 +00:00
|
|
|
std::vector<std::string> command = { getEnv("SHELL").value_or("bash") };
|
2017-08-29 12:28:57 +00:00
|
|
|
|
2016-06-02 14:29:49 +00:00
|
|
|
CmdRun()
|
|
|
|
{
|
2017-08-29 12:28:57 +00:00
|
|
|
mkFlag()
|
|
|
|
.longName("command")
|
|
|
|
.shortName('c')
|
2020-04-07 12:29:40 +00:00
|
|
|
.description("command and arguments to be executed; defaults to '$SHELL'")
|
2017-08-29 12:28:57 +00:00
|
|
|
.labels({"command", "args"})
|
2017-11-20 17:07:58 +00:00
|
|
|
.arity(ArityAny)
|
2017-10-24 10:45:11 +00:00
|
|
|
.handler([&](std::vector<std::string> ss) {
|
2017-08-29 12:28:57 +00:00
|
|
|
if (ss.empty()) throw UsageError("--command requires at least one argument");
|
|
|
|
command = ss;
|
|
|
|
});
|
2016-06-02 14:29:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "run a shell in which the specified packages are available";
|
|
|
|
}
|
|
|
|
|
2017-09-07 18:09:04 +00:00
|
|
|
Examples examples() override
|
|
|
|
{
|
|
|
|
return {
|
|
|
|
Example{
|
|
|
|
"To start a shell providing GNU Hello from NixOS 17.03:",
|
|
|
|
"nix run -f channel:nixos-17.03 hello"
|
|
|
|
},
|
|
|
|
Example{
|
|
|
|
"To start a shell providing youtube-dl from your 'nixpkgs' channel:",
|
2019-11-01 04:13:08 +00:00
|
|
|
"nix run nixpkgs#youtube-dl"
|
2017-09-07 18:09:04 +00:00
|
|
|
},
|
|
|
|
Example{
|
|
|
|
"To run GNU Hello:",
|
2019-11-01 04:13:08 +00:00
|
|
|
"nix run nixpkgs#hello -c hello --greeting 'Hi everybody!'"
|
2017-09-07 18:09:04 +00:00
|
|
|
},
|
2018-02-19 19:38:06 +00:00
|
|
|
Example{
|
|
|
|
"To run GNU Hello in a chroot store:",
|
2019-11-01 04:13:08 +00:00
|
|
|
"nix run --store ~/my-nix nixpkgs#hello -c hello"
|
2018-02-19 19:38:06 +00:00
|
|
|
},
|
2017-09-07 18:09:04 +00:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2019-11-01 01:46:49 +00:00
|
|
|
void run(ref<Store> store) override
|
|
|
|
{
|
|
|
|
auto outPaths = toStorePaths(store, Build, installables);
|
|
|
|
|
|
|
|
auto accessor = store->getFSAccessor();
|
|
|
|
|
2017-08-29 13:00:08 +00:00
|
|
|
|
2019-12-05 18:11:09 +00:00
|
|
|
std::unordered_set<StorePath> done;
|
|
|
|
std::queue<StorePath> todo;
|
|
|
|
for (auto & path : outPaths) todo.push(path.clone());
|
2018-08-09 11:01:03 +00:00
|
|
|
|
2019-11-07 23:18:31 +00:00
|
|
|
setEnviron();
|
2019-11-05 00:40:25 +00:00
|
|
|
|
2019-11-22 15:06:44 +00:00
|
|
|
auto unixPath = tokenizeString<Strings>(getEnv("PATH").value_or(""), ":");
|
2018-08-09 11:01:03 +00:00
|
|
|
|
|
|
|
while (!todo.empty()) {
|
2019-12-05 18:11:09 +00:00
|
|
|
auto path = todo.front().clone();
|
2018-08-09 11:01:03 +00:00
|
|
|
todo.pop();
|
2019-12-05 18:11:09 +00:00
|
|
|
if (!done.insert(path.clone()).second) continue;
|
2018-08-09 11:01:03 +00:00
|
|
|
|
|
|
|
if (true)
|
2019-12-05 18:11:09 +00:00
|
|
|
unixPath.push_front(store->printStorePath(path) + "/bin");
|
2018-08-09 11:01:03 +00:00
|
|
|
|
2019-12-05 18:11:09 +00:00
|
|
|
auto propPath = store->printStorePath(path) + "/nix-support/propagated-user-env-packages";
|
2018-08-09 11:01:03 +00:00
|
|
|
if (accessor->stat(propPath).type == FSAccessor::tRegular) {
|
|
|
|
for (auto & p : tokenizeString<Paths>(readFile(propPath)))
|
2019-12-05 18:11:09 +00:00
|
|
|
todo.push(store->parseStorePath(p));
|
2018-08-09 11:01:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-02 14:29:49 +00:00
|
|
|
setenv("PATH", concatStringsSep(":", unixPath).c_str(), 1);
|
|
|
|
|
2017-10-24 10:45:11 +00:00
|
|
|
Strings args;
|
|
|
|
for (auto & arg : command) args.push_back(arg);
|
2017-08-29 11:21:07 +00:00
|
|
|
|
2019-11-05 00:40:25 +00:00
|
|
|
runProgram(store, *command.begin(), args);
|
2019-05-31 21:45:13 +00:00
|
|
|
}
|
|
|
|
};
|
2017-08-29 13:13:30 +00:00
|
|
|
|
2019-06-18 14:01:35 +00:00
|
|
|
static auto r1 = registerCommand<CmdRun>("run");
|
2019-02-05 09:49:19 +00:00
|
|
|
|
2019-05-31 21:45:13 +00:00
|
|
|
struct CmdApp : InstallableCommand, RunCommon
|
|
|
|
{
|
2019-06-17 15:05:37 +00:00
|
|
|
std::vector<std::string> args;
|
|
|
|
|
2019-05-31 21:45:13 +00:00
|
|
|
CmdApp()
|
|
|
|
{
|
2019-06-17 15:05:37 +00:00
|
|
|
expectArgs("args", &args);
|
2019-05-31 21:45:13 +00:00
|
|
|
}
|
2018-08-19 10:05:08 +00:00
|
|
|
|
2019-05-31 21:45:13 +00:00
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "run a Nix application";
|
|
|
|
}
|
2017-08-29 11:21:07 +00:00
|
|
|
|
2019-05-31 21:45:13 +00:00
|
|
|
Examples examples() override
|
|
|
|
{
|
|
|
|
return {
|
|
|
|
Example{
|
|
|
|
"To run Blender:",
|
|
|
|
"nix app blender-bin"
|
|
|
|
},
|
|
|
|
};
|
|
|
|
}
|
2017-08-29 11:21:07 +00:00
|
|
|
|
2019-05-31 21:45:13 +00:00
|
|
|
Strings getDefaultFlakeAttrPaths() override
|
|
|
|
{
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 15:52:10 +00:00
|
|
|
return {"defaultApp." + settings.thisSystem.get()};
|
2019-05-31 21:45:13 +00:00
|
|
|
}
|
2017-08-29 11:21:07 +00:00
|
|
|
|
2019-06-17 14:58:59 +00:00
|
|
|
Strings getDefaultFlakeAttrPathPrefixes() override
|
|
|
|
{
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 15:52:10 +00:00
|
|
|
return {"apps." + settings.thisSystem.get() + "."};
|
2019-06-17 14:58:59 +00:00
|
|
|
}
|
|
|
|
|
2019-05-31 21:45:13 +00:00
|
|
|
void run(ref<Store> store) override
|
|
|
|
{
|
|
|
|
auto state = getEvalState();
|
|
|
|
|
|
|
|
auto app = installable->toApp(*state);
|
2017-08-29 11:21:07 +00:00
|
|
|
|
2019-05-31 21:45:13 +00:00
|
|
|
state->realiseContext(app.context);
|
|
|
|
|
2019-06-17 15:05:37 +00:00
|
|
|
Strings allArgs{app.program};
|
|
|
|
for (auto & i : args) allArgs.push_back(i);
|
|
|
|
|
|
|
|
runProgram(store, app.program, allArgs);
|
2016-06-02 14:29:49 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-06-18 14:01:35 +00:00
|
|
|
static auto r2 = registerCommand<CmdApp>("app");
|
2017-08-29 11:21:07 +00:00
|
|
|
|
|
|
|
void chrootHelper(int argc, char * * argv)
|
|
|
|
{
|
|
|
|
int p = 1;
|
|
|
|
std::string storeDir = argv[p++];
|
|
|
|
std::string realStoreDir = argv[p++];
|
|
|
|
std::string cmd = argv[p++];
|
|
|
|
Strings args;
|
|
|
|
while (p < argc)
|
|
|
|
args.push_back(argv[p++]);
|
|
|
|
|
|
|
|
#if __linux__
|
|
|
|
uid_t uid = getuid();
|
|
|
|
uid_t gid = getgid();
|
|
|
|
|
|
|
|
if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == -1)
|
2019-07-25 13:37:57 +00:00
|
|
|
/* Try with just CLONE_NEWNS in case user namespaces are
|
|
|
|
specifically disabled. */
|
|
|
|
if (unshare(CLONE_NEWNS) == -1)
|
|
|
|
throw SysError("setting up a private mount namespace");
|
2017-08-29 11:21:07 +00:00
|
|
|
|
|
|
|
/* Bind-mount realStoreDir on /nix/store. If the latter mount
|
|
|
|
point doesn't already exists, we have to create a chroot
|
|
|
|
environment containing the mount point and bind mounts for the
|
|
|
|
children of /. Would be nice if we could use overlayfs here,
|
|
|
|
but that doesn't work in a user namespace yet (Ubuntu has a
|
|
|
|
patch for this:
|
|
|
|
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1478578). */
|
2017-11-20 16:59:32 +00:00
|
|
|
if (!pathExists(storeDir)) {
|
2017-08-29 11:21:07 +00:00
|
|
|
// FIXME: Use overlayfs?
|
|
|
|
|
|
|
|
Path tmpDir = createTempDir();
|
|
|
|
|
|
|
|
createDirs(tmpDir + storeDir);
|
|
|
|
|
|
|
|
if (mount(realStoreDir.c_str(), (tmpDir + storeDir).c_str(), "", MS_BIND, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir);
|
|
|
|
|
|
|
|
for (auto entry : readDirectory("/")) {
|
2017-11-20 16:58:23 +00:00
|
|
|
auto src = "/" + entry.name;
|
|
|
|
auto st = lstat(src);
|
|
|
|
if (!S_ISDIR(st.st_mode)) continue;
|
2017-08-29 11:21:07 +00:00
|
|
|
Path dst = tmpDir + "/" + entry.name;
|
|
|
|
if (pathExists(dst)) continue;
|
|
|
|
if (mkdir(dst.c_str(), 0700) == -1)
|
2017-11-20 16:58:23 +00:00
|
|
|
throw SysError("creating directory '%s'", dst);
|
|
|
|
if (mount(src.c_str(), dst.c_str(), "", MS_BIND | MS_REC, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", src, dst);
|
2017-08-29 11:21:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
char * cwd = getcwd(0, 0);
|
|
|
|
if (!cwd) throw SysError("getting current directory");
|
|
|
|
Finally freeCwd([&]() { free(cwd); });
|
|
|
|
|
|
|
|
if (chroot(tmpDir.c_str()) == -1)
|
|
|
|
throw SysError(format("chrooting into '%s'") % tmpDir);
|
|
|
|
|
|
|
|
if (chdir(cwd) == -1)
|
|
|
|
throw SysError(format("chdir to '%s' in chroot") % cwd);
|
|
|
|
} else
|
|
|
|
if (mount(realStoreDir.c_str(), storeDir.c_str(), "", MS_BIND, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir);
|
|
|
|
|
|
|
|
writeFile("/proc/self/setgroups", "deny");
|
|
|
|
writeFile("/proc/self/uid_map", fmt("%d %d %d", uid, uid, 1));
|
|
|
|
writeFile("/proc/self/gid_map", fmt("%d %d %d", gid, gid, 1));
|
|
|
|
|
|
|
|
execvp(cmd.c_str(), stringsToCharPtrs(args).data());
|
|
|
|
|
|
|
|
throw SysError("unable to exec '%s'", cmd);
|
|
|
|
|
|
|
|
#else
|
2017-08-31 09:05:18 +00:00
|
|
|
throw Error("mounting the Nix store on '%s' is not supported on this platform", storeDir);
|
2017-08-29 11:21:07 +00:00
|
|
|
#endif
|
|
|
|
}
|