2016-06-02 14:29:49 +00:00
|
|
|
#include "command.hh"
|
|
|
|
#include "common-args.hh"
|
|
|
|
#include "shared.hh"
|
|
|
|
#include "store-api.hh"
|
|
|
|
#include "derivations.hh"
|
2016-06-02 14:51:43 +00:00
|
|
|
#include "local-store.hh"
|
2016-06-02 16:19:10 +00:00
|
|
|
#include "finally.hh"
|
2017-08-29 11:21:07 +00:00
|
|
|
#include "fs-accessor.hh"
|
2017-08-29 13:13:30 +00:00
|
|
|
#include "progress-bar.hh"
|
2018-08-19 10:05:08 +00:00
|
|
|
#include "affinity.hh"
|
2016-06-02 14:51:43 +00:00
|
|
|
|
|
|
|
#if __linux__
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#endif
|
2016-06-02 14:29:49 +00:00
|
|
|
|
2018-08-09 11:01:03 +00:00
|
|
|
#include <queue>
|
|
|
|
|
2016-06-02 14:29:49 +00:00
|
|
|
using namespace nix;
|
|
|
|
|
2017-08-29 11:21:07 +00:00
|
|
|
std::string chrootHelperName = "__run_in_chroot";
|
|
|
|
|
2017-04-25 10:06:32 +00:00
|
|
|
struct CmdRun : InstallablesCommand
|
2016-06-02 14:29:49 +00:00
|
|
|
{
|
2017-10-24 10:45:11 +00:00
|
|
|
std::vector<std::string> command = { "bash" };
|
2017-08-29 13:00:08 +00:00
|
|
|
StringSet keep, unset;
|
|
|
|
bool ignoreEnvironment = false;
|
2017-08-29 12:28:57 +00:00
|
|
|
|
2016-06-02 14:29:49 +00:00
|
|
|
CmdRun()
|
|
|
|
{
|
2017-08-29 12:28:57 +00:00
|
|
|
mkFlag()
|
|
|
|
.longName("command")
|
|
|
|
.shortName('c')
|
|
|
|
.description("command and arguments to be executed; defaults to 'bash'")
|
|
|
|
.labels({"command", "args"})
|
2017-11-20 17:07:58 +00:00
|
|
|
.arity(ArityAny)
|
2017-10-24 10:45:11 +00:00
|
|
|
.handler([&](std::vector<std::string> ss) {
|
2017-08-29 12:28:57 +00:00
|
|
|
if (ss.empty()) throw UsageError("--command requires at least one argument");
|
|
|
|
command = ss;
|
|
|
|
});
|
2017-08-29 13:00:08 +00:00
|
|
|
|
|
|
|
mkFlag()
|
|
|
|
.longName("ignore-environment")
|
|
|
|
.shortName('i')
|
|
|
|
.description("clear the entire environment (except those specified with --keep)")
|
2017-09-06 14:20:34 +00:00
|
|
|
.set(&ignoreEnvironment, true);
|
2017-08-29 13:00:08 +00:00
|
|
|
|
|
|
|
mkFlag()
|
|
|
|
.longName("keep")
|
|
|
|
.shortName('k')
|
|
|
|
.description("keep specified environment variable")
|
|
|
|
.arity(1)
|
|
|
|
.labels({"name"})
|
2017-10-24 10:45:11 +00:00
|
|
|
.handler([&](std::vector<std::string> ss) { keep.insert(ss.front()); });
|
2017-08-29 13:00:08 +00:00
|
|
|
|
|
|
|
mkFlag()
|
|
|
|
.longName("unset")
|
|
|
|
.shortName('u')
|
|
|
|
.description("unset specified environment variable")
|
|
|
|
.arity(1)
|
|
|
|
.labels({"name"})
|
2017-10-24 10:45:11 +00:00
|
|
|
.handler([&](std::vector<std::string> ss) { unset.insert(ss.front()); });
|
2016-06-02 14:29:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "run a shell in which the specified packages are available";
|
|
|
|
}
|
|
|
|
|
2017-09-07 18:09:04 +00:00
|
|
|
Examples examples() override
|
|
|
|
{
|
|
|
|
return {
|
|
|
|
Example{
|
|
|
|
"To start a shell providing GNU Hello from NixOS 17.03:",
|
|
|
|
"nix run -f channel:nixos-17.03 hello"
|
|
|
|
},
|
|
|
|
Example{
|
|
|
|
"To start a shell providing youtube-dl from your 'nixpkgs' channel:",
|
|
|
|
"nix run nixpkgs.youtube-dl"
|
|
|
|
},
|
|
|
|
Example{
|
|
|
|
"To run GNU Hello:",
|
|
|
|
"nix run nixpkgs.hello -c hello --greeting 'Hi everybody!'"
|
|
|
|
},
|
2018-02-19 19:38:06 +00:00
|
|
|
Example{
|
|
|
|
"To run GNU Hello in a chroot store:",
|
|
|
|
"nix run --store ~/my-nix nixpkgs.hello -c hello"
|
|
|
|
},
|
2017-09-07 18:09:04 +00:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2016-06-02 14:29:49 +00:00
|
|
|
void run(ref<Store> store) override
|
|
|
|
{
|
2017-09-10 13:58:30 +00:00
|
|
|
auto outPaths = toStorePaths(store, Build, installables);
|
2016-06-02 14:29:49 +00:00
|
|
|
|
2017-08-29 11:21:07 +00:00
|
|
|
auto accessor = store->getFSAccessor();
|
2016-06-02 14:29:49 +00:00
|
|
|
|
2017-08-29 13:00:08 +00:00
|
|
|
if (ignoreEnvironment) {
|
|
|
|
|
|
|
|
if (!unset.empty())
|
|
|
|
throw UsageError("--unset does not make sense with --ignore-environment");
|
|
|
|
|
|
|
|
std::map<std::string, std::string> kept;
|
|
|
|
for (auto & var : keep) {
|
|
|
|
auto s = getenv(var.c_str());
|
|
|
|
if (s) kept[var] = s;
|
|
|
|
}
|
|
|
|
|
2018-02-26 17:29:40 +00:00
|
|
|
clearEnv();
|
2017-08-29 13:00:08 +00:00
|
|
|
|
|
|
|
for (auto & var : kept)
|
|
|
|
setenv(var.first.c_str(), var.second.c_str(), 1);
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
if (!keep.empty())
|
|
|
|
throw UsageError("--keep does not make sense without --ignore-environment");
|
|
|
|
|
|
|
|
for (auto & var : unset)
|
|
|
|
unsetenv(var.c_str());
|
|
|
|
}
|
|
|
|
|
2019-12-05 18:11:09 +00:00
|
|
|
std::unordered_set<StorePath> done;
|
|
|
|
std::queue<StorePath> todo;
|
|
|
|
for (auto & path : outPaths) todo.push(path.clone());
|
2018-08-09 11:01:03 +00:00
|
|
|
|
2019-11-22 15:06:44 +00:00
|
|
|
auto unixPath = tokenizeString<Strings>(getEnv("PATH").value_or(""), ":");
|
2018-08-09 11:01:03 +00:00
|
|
|
|
|
|
|
while (!todo.empty()) {
|
2019-12-05 18:11:09 +00:00
|
|
|
auto path = todo.front().clone();
|
2018-08-09 11:01:03 +00:00
|
|
|
todo.pop();
|
2019-12-05 18:11:09 +00:00
|
|
|
if (!done.insert(path.clone()).second) continue;
|
2018-08-09 11:01:03 +00:00
|
|
|
|
|
|
|
if (true)
|
2019-12-05 18:11:09 +00:00
|
|
|
unixPath.push_front(store->printStorePath(path) + "/bin");
|
2018-08-09 11:01:03 +00:00
|
|
|
|
2019-12-05 18:11:09 +00:00
|
|
|
auto propPath = store->printStorePath(path) + "/nix-support/propagated-user-env-packages";
|
2018-08-09 11:01:03 +00:00
|
|
|
if (accessor->stat(propPath).type == FSAccessor::tRegular) {
|
|
|
|
for (auto & p : tokenizeString<Paths>(readFile(propPath)))
|
2019-12-05 18:11:09 +00:00
|
|
|
todo.push(store->parseStorePath(p));
|
2018-08-09 11:01:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-02 14:29:49 +00:00
|
|
|
setenv("PATH", concatStringsSep(":", unixPath).c_str(), 1);
|
|
|
|
|
2017-08-29 12:28:57 +00:00
|
|
|
std::string cmd = *command.begin();
|
2017-10-24 10:45:11 +00:00
|
|
|
Strings args;
|
|
|
|
for (auto & arg : command) args.push_back(arg);
|
2017-08-29 11:21:07 +00:00
|
|
|
|
2017-08-29 13:13:30 +00:00
|
|
|
stopProgressBar();
|
|
|
|
|
2018-11-13 15:15:30 +00:00
|
|
|
restoreSignals();
|
2019-02-05 09:49:19 +00:00
|
|
|
|
|
|
|
restoreAffinity();
|
2018-08-19 10:05:08 +00:00
|
|
|
|
2017-08-29 11:21:07 +00:00
|
|
|
/* If this is a diverted store (i.e. its "logical" location
|
|
|
|
(typically /nix/store) differs from its "physical" location
|
|
|
|
(e.g. /home/eelco/nix/store), then run the command in a
|
|
|
|
chroot. For non-root users, this requires running it in new
|
|
|
|
mount and user namespaces. Unfortunately,
|
|
|
|
unshare(CLONE_NEWUSER) doesn't work in a multithreaded
|
|
|
|
program (which "nix" is), so we exec() a single-threaded
|
|
|
|
helper program (chrootHelper() below) to do the work. */
|
|
|
|
auto store2 = store.dynamic_pointer_cast<LocalStore>();
|
|
|
|
|
|
|
|
if (store2 && store->storeDir != store2->realStoreDir) {
|
|
|
|
Strings helperArgs = { chrootHelperName, store->storeDir, store2->realStoreDir, cmd };
|
|
|
|
for (auto & arg : args) helperArgs.push_back(arg);
|
|
|
|
|
|
|
|
execv(readLink("/proc/self/exe").c_str(), stringsToCharPtrs(helperArgs).data());
|
|
|
|
|
|
|
|
throw SysError("could not execute chroot helper");
|
|
|
|
}
|
|
|
|
|
|
|
|
execvp(cmd.c_str(), stringsToCharPtrs(args).data());
|
|
|
|
|
|
|
|
throw SysError("unable to exec '%s'", cmd);
|
2016-06-02 14:29:49 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-06-18 14:01:35 +00:00
|
|
|
static auto r1 = registerCommand<CmdRun>("run");
|
2017-08-29 11:21:07 +00:00
|
|
|
|
|
|
|
void chrootHelper(int argc, char * * argv)
|
|
|
|
{
|
|
|
|
int p = 1;
|
|
|
|
std::string storeDir = argv[p++];
|
|
|
|
std::string realStoreDir = argv[p++];
|
|
|
|
std::string cmd = argv[p++];
|
|
|
|
Strings args;
|
|
|
|
while (p < argc)
|
|
|
|
args.push_back(argv[p++]);
|
|
|
|
|
|
|
|
#if __linux__
|
|
|
|
uid_t uid = getuid();
|
|
|
|
uid_t gid = getgid();
|
|
|
|
|
|
|
|
if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == -1)
|
2019-07-25 13:37:57 +00:00
|
|
|
/* Try with just CLONE_NEWNS in case user namespaces are
|
|
|
|
specifically disabled. */
|
|
|
|
if (unshare(CLONE_NEWNS) == -1)
|
|
|
|
throw SysError("setting up a private mount namespace");
|
2017-08-29 11:21:07 +00:00
|
|
|
|
|
|
|
/* Bind-mount realStoreDir on /nix/store. If the latter mount
|
|
|
|
point doesn't already exists, we have to create a chroot
|
|
|
|
environment containing the mount point and bind mounts for the
|
|
|
|
children of /. Would be nice if we could use overlayfs here,
|
|
|
|
but that doesn't work in a user namespace yet (Ubuntu has a
|
|
|
|
patch for this:
|
|
|
|
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1478578). */
|
2017-11-20 16:59:32 +00:00
|
|
|
if (!pathExists(storeDir)) {
|
2017-08-29 11:21:07 +00:00
|
|
|
// FIXME: Use overlayfs?
|
|
|
|
|
|
|
|
Path tmpDir = createTempDir();
|
|
|
|
|
|
|
|
createDirs(tmpDir + storeDir);
|
|
|
|
|
|
|
|
if (mount(realStoreDir.c_str(), (tmpDir + storeDir).c_str(), "", MS_BIND, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir);
|
|
|
|
|
|
|
|
for (auto entry : readDirectory("/")) {
|
2017-11-20 16:58:23 +00:00
|
|
|
auto src = "/" + entry.name;
|
|
|
|
auto st = lstat(src);
|
|
|
|
if (!S_ISDIR(st.st_mode)) continue;
|
2017-08-29 11:21:07 +00:00
|
|
|
Path dst = tmpDir + "/" + entry.name;
|
|
|
|
if (pathExists(dst)) continue;
|
|
|
|
if (mkdir(dst.c_str(), 0700) == -1)
|
2017-11-20 16:58:23 +00:00
|
|
|
throw SysError("creating directory '%s'", dst);
|
|
|
|
if (mount(src.c_str(), dst.c_str(), "", MS_BIND | MS_REC, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", src, dst);
|
2017-08-29 11:21:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
char * cwd = getcwd(0, 0);
|
|
|
|
if (!cwd) throw SysError("getting current directory");
|
|
|
|
Finally freeCwd([&]() { free(cwd); });
|
|
|
|
|
|
|
|
if (chroot(tmpDir.c_str()) == -1)
|
|
|
|
throw SysError(format("chrooting into '%s'") % tmpDir);
|
|
|
|
|
|
|
|
if (chdir(cwd) == -1)
|
|
|
|
throw SysError(format("chdir to '%s' in chroot") % cwd);
|
|
|
|
} else
|
|
|
|
if (mount(realStoreDir.c_str(), storeDir.c_str(), "", MS_BIND, 0) == -1)
|
|
|
|
throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir);
|
|
|
|
|
|
|
|
writeFile("/proc/self/setgroups", "deny");
|
|
|
|
writeFile("/proc/self/uid_map", fmt("%d %d %d", uid, uid, 1));
|
|
|
|
writeFile("/proc/self/gid_map", fmt("%d %d %d", gid, gid, 1));
|
|
|
|
|
|
|
|
execvp(cmd.c_str(), stringsToCharPtrs(args).data());
|
|
|
|
|
|
|
|
throw SysError("unable to exec '%s'", cmd);
|
|
|
|
|
|
|
|
#else
|
2017-08-31 09:05:18 +00:00
|
|
|
throw Error("mounting the Nix store on '%s' is not supported on this platform", storeDir);
|
2017-08-29 11:21:07 +00:00
|
|
|
#endif
|
|
|
|
}
|