forked from lix-project/lix
5a303093dc
'nix-daemon' now creates subdirectories for users when they first connect. Fixes #509 (CVE-2019-17365). Should also fix #3127.
323 lines
9.8 KiB
C++
323 lines
9.8 KiB
C++
#pragma once
|
||
|
||
#include "sqlite.hh"
|
||
|
||
#include "pathlocks.hh"
|
||
#include "store-api.hh"
|
||
#include "sync.hh"
|
||
#include "util.hh"
|
||
|
||
#include <chrono>
|
||
#include <future>
|
||
#include <string>
|
||
#include <unordered_set>
|
||
|
||
|
||
namespace nix {
|
||
|
||
|
||
/* Nix store and database schema version. Version 1 (or 0) was Nix <=
|
||
0.7. Version 2 was Nix 0.8 and 0.9. Version 3 is Nix 0.10.
|
||
Version 4 is Nix 0.11. Version 5 is Nix 0.12-0.16. Version 6 is
|
||
Nix 1.0. Version 7 is Nix 1.3. Version 10 is 2.0. */
|
||
const int nixSchemaVersion = 10;
|
||
|
||
|
||
struct Derivation;
|
||
|
||
|
||
struct OptimiseStats
|
||
{
|
||
unsigned long filesLinked = 0;
|
||
unsigned long long bytesFreed = 0;
|
||
unsigned long long blocksFreed = 0;
|
||
};
|
||
|
||
|
||
class LocalStore : public LocalFSStore
|
||
{
|
||
private:
|
||
|
||
/* Lock file used for upgrading. */
|
||
AutoCloseFD globalLock;
|
||
|
||
struct State
|
||
{
|
||
/* The SQLite database object. */
|
||
SQLite db;
|
||
|
||
/* Some precompiled SQLite statements. */
|
||
SQLiteStmt stmtRegisterValidPath;
|
||
SQLiteStmt stmtUpdatePathInfo;
|
||
SQLiteStmt stmtAddReference;
|
||
SQLiteStmt stmtQueryPathInfo;
|
||
SQLiteStmt stmtQueryReferences;
|
||
SQLiteStmt stmtQueryReferrers;
|
||
SQLiteStmt stmtInvalidatePath;
|
||
SQLiteStmt stmtAddDerivationOutput;
|
||
SQLiteStmt stmtQueryValidDerivers;
|
||
SQLiteStmt stmtQueryDerivationOutputs;
|
||
SQLiteStmt stmtQueryPathFromHashPart;
|
||
SQLiteStmt stmtQueryValidPaths;
|
||
|
||
/* The file to which we write our temporary roots. */
|
||
AutoCloseFD fdTempRoots;
|
||
|
||
/* The last time we checked whether to do an auto-GC, or an
|
||
auto-GC finished. */
|
||
std::chrono::time_point<std::chrono::steady_clock> lastGCCheck;
|
||
|
||
/* Whether auto-GC is running. If so, get gcFuture to wait for
|
||
the GC to finish. */
|
||
bool gcRunning = false;
|
||
std::shared_future<void> gcFuture;
|
||
|
||
/* How much disk space was available after the previous
|
||
auto-GC. If the current available disk space is below
|
||
minFree but not much below availAfterGC, then there is no
|
||
point in starting a new GC. */
|
||
uint64_t availAfterGC = std::numeric_limits<uint64_t>::max();
|
||
|
||
std::unique_ptr<PublicKeys> publicKeys;
|
||
};
|
||
|
||
Sync<State, std::recursive_mutex> _state;
|
||
|
||
public:
|
||
|
||
PathSetting realStoreDir_;
|
||
|
||
const Path realStoreDir;
|
||
const Path dbDir;
|
||
const Path linksDir;
|
||
const Path reservedPath;
|
||
const Path schemaPath;
|
||
const Path trashDir;
|
||
const Path tempRootsDir;
|
||
const Path fnTempRoots;
|
||
|
||
private:
|
||
|
||
Setting<bool> requireSigs{(Store*) this,
|
||
settings.requireSigs,
|
||
"require-sigs", "whether store paths should have a trusted signature on import"};
|
||
|
||
const PublicKeys & getPublicKeys();
|
||
|
||
public:
|
||
|
||
// Hack for build-remote.cc.
|
||
PathSet locksHeld = tokenizeString<PathSet>(getEnv("NIX_HELD_LOCKS"));
|
||
|
||
/* Initialise the local store, upgrading the schema if
|
||
necessary. */
|
||
LocalStore(const Params & params);
|
||
|
||
~LocalStore();
|
||
|
||
/* Implementations of abstract store API methods. */
|
||
|
||
std::string getUri() override;
|
||
|
||
bool isValidPathUncached(const Path & path) override;
|
||
|
||
PathSet queryValidPaths(const PathSet & paths,
|
||
SubstituteFlag maybeSubstitute = NoSubstitute) override;
|
||
|
||
PathSet queryAllValidPaths() override;
|
||
|
||
void queryPathInfoUncached(const Path & path,
|
||
Callback<std::shared_ptr<ValidPathInfo>> callback) noexcept override;
|
||
|
||
void queryReferrers(const Path & path, PathSet & referrers) override;
|
||
|
||
PathSet queryValidDerivers(const Path & path) override;
|
||
|
||
PathSet queryDerivationOutputs(const Path & path) override;
|
||
|
||
StringSet queryDerivationOutputNames(const Path & path) override;
|
||
|
||
Path queryPathFromHashPart(const string & hashPart) override;
|
||
|
||
PathSet querySubstitutablePaths(const PathSet & paths) override;
|
||
|
||
void querySubstitutablePathInfos(const PathSet & paths,
|
||
SubstitutablePathInfos & infos) override;
|
||
|
||
void addToStore(const ValidPathInfo & info, Source & source,
|
||
RepairFlag repair, CheckSigsFlag checkSigs,
|
||
std::shared_ptr<FSAccessor> accessor) override;
|
||
|
||
Path addToStore(const string & name, const Path & srcPath,
|
||
bool recursive, HashType hashAlgo,
|
||
PathFilter & filter, RepairFlag repair) override;
|
||
|
||
/* Like addToStore(), but the contents of the path are contained
|
||
in `dump', which is either a NAR serialisation (if recursive ==
|
||
true) or simply the contents of a regular file (if recursive ==
|
||
false). */
|
||
Path addToStoreFromDump(const string & dump, const string & name,
|
||
bool recursive = true, HashType hashAlgo = htSHA256, RepairFlag repair = NoRepair);
|
||
|
||
Path addTextToStore(const string & name, const string & s,
|
||
const PathSet & references, RepairFlag repair) override;
|
||
|
||
void buildPaths(const PathSet & paths, BuildMode buildMode) override;
|
||
|
||
BuildResult buildDerivation(const Path & drvPath, const BasicDerivation & drv,
|
||
BuildMode buildMode) override;
|
||
|
||
void ensurePath(const Path & path) override;
|
||
|
||
void addTempRoot(const Path & path) override;
|
||
|
||
void addIndirectRoot(const Path & path) override;
|
||
|
||
void syncWithGC() override;
|
||
|
||
private:
|
||
|
||
typedef std::shared_ptr<AutoCloseFD> FDPtr;
|
||
typedef list<FDPtr> FDs;
|
||
|
||
void findTempRoots(FDs & fds, Roots & roots, bool censor);
|
||
|
||
public:
|
||
|
||
Roots findRoots(bool censor) override;
|
||
|
||
void collectGarbage(const GCOptions & options, GCResults & results) override;
|
||
|
||
/* Optimise the disk space usage of the Nix store by hard-linking
|
||
files with the same contents. */
|
||
void optimiseStore(OptimiseStats & stats);
|
||
|
||
void optimiseStore() override;
|
||
|
||
/* Optimise a single store path. */
|
||
void optimisePath(const Path & path);
|
||
|
||
bool verifyStore(bool checkContents, RepairFlag repair) override;
|
||
|
||
/* Register the validity of a path, i.e., that `path' exists, that
|
||
the paths referenced by it exists, and in the case of an output
|
||
path of a derivation, that it has been produced by a successful
|
||
execution of the derivation (or something equivalent). Also
|
||
register the hash of the file system contents of the path. The
|
||
hash must be a SHA-256 hash. */
|
||
void registerValidPath(const ValidPathInfo & info);
|
||
|
||
void registerValidPaths(const ValidPathInfos & infos);
|
||
|
||
unsigned int getProtocol() override;
|
||
|
||
void vacuumDB();
|
||
|
||
/* Repair the contents of the given path by redownloading it using
|
||
a substituter (if available). */
|
||
void repairPath(const Path & path);
|
||
|
||
void addSignatures(const Path & storePath, const StringSet & sigs) override;
|
||
|
||
/* If free disk space in /nix/store if below minFree, delete
|
||
garbage until it exceeds maxFree. */
|
||
void autoGC(bool sync = true);
|
||
|
||
private:
|
||
|
||
int getSchema();
|
||
|
||
void openDB(State & state, bool create);
|
||
|
||
void makeStoreWritable();
|
||
|
||
uint64_t queryValidPathId(State & state, const Path & path);
|
||
|
||
uint64_t addValidPath(State & state, const ValidPathInfo & info, bool checkOutputs = true);
|
||
|
||
void invalidatePath(State & state, const Path & path);
|
||
|
||
/* Delete a path from the Nix store. */
|
||
void invalidatePathChecked(const Path & path);
|
||
|
||
void verifyPath(const Path & path, const PathSet & store,
|
||
PathSet & done, PathSet & validPaths, RepairFlag repair, bool & errors);
|
||
|
||
void updatePathInfo(State & state, const ValidPathInfo & info);
|
||
|
||
void upgradeStore6();
|
||
void upgradeStore7();
|
||
PathSet queryValidPathsOld();
|
||
ValidPathInfo queryPathInfoOld(const Path & path);
|
||
|
||
struct GCState;
|
||
|
||
void deleteGarbage(GCState & state, const Path & path);
|
||
|
||
void tryToDelete(GCState & state, const Path & path);
|
||
|
||
bool canReachRoot(GCState & state, PathSet & visited, const Path & path);
|
||
|
||
void deletePathRecursive(GCState & state, const Path & path);
|
||
|
||
bool isActiveTempFile(const GCState & state,
|
||
const Path & path, const string & suffix);
|
||
|
||
AutoCloseFD openGCLock(LockType lockType);
|
||
|
||
void findRoots(const Path & path, unsigned char type, Roots & roots);
|
||
|
||
void findRootsNoTemp(Roots & roots, bool censor);
|
||
|
||
void findRuntimeRoots(Roots & roots, bool censor);
|
||
|
||
void removeUnusedLinks(const GCState & state);
|
||
|
||
Path createTempDirInStore();
|
||
|
||
void checkDerivationOutputs(const Path & drvPath, const Derivation & drv);
|
||
|
||
typedef std::unordered_set<ino_t> InodeHash;
|
||
|
||
InodeHash loadInodeHash();
|
||
Strings readDirectoryIgnoringInodes(const Path & path, const InodeHash & inodeHash);
|
||
void optimisePath_(Activity * act, OptimiseStats & stats, const Path & path, InodeHash & inodeHash);
|
||
|
||
// Internal versions that are not wrapped in retry_sqlite.
|
||
bool isValidPath_(State & state, const Path & path);
|
||
void queryReferrers(State & state, const Path & path, PathSet & referrers);
|
||
|
||
/* Add signatures to a ValidPathInfo using the secret keys
|
||
specified by the ‘secret-key-files’ option. */
|
||
void signPathInfo(ValidPathInfo & info);
|
||
|
||
Path getRealStoreDir() override { return realStoreDir; }
|
||
|
||
void createUser(const std::string & userName, uid_t userId) override;
|
||
|
||
friend class DerivationGoal;
|
||
friend class SubstitutionGoal;
|
||
};
|
||
|
||
|
||
typedef std::pair<dev_t, ino_t> Inode;
|
||
typedef set<Inode> InodesSeen;
|
||
|
||
|
||
/* "Fix", or canonicalise, the meta-data of the files in a store path
|
||
after it has been built. In particular:
|
||
- the last modification date on each file is set to 1 (i.e.,
|
||
00:00:01 1/1/1970 UTC)
|
||
- the permissions are set of 444 or 555 (i.e., read-only with or
|
||
without execute permission; setuid bits etc. are cleared)
|
||
- the owner and group are set to the Nix user and group, if we're
|
||
running as root. */
|
||
void canonicalisePathMetaData(const Path & path, uid_t fromUid, InodesSeen & inodesSeen);
|
||
void canonicalisePathMetaData(const Path & path, uid_t fromUid);
|
||
|
||
void canonicaliseTimestampAndPermissions(const Path & path);
|
||
|
||
MakeError(PathInUse, Error);
|
||
|
||
}
|