Merge pull request #26 from input-output-hk/overhaul

overhaul most of nix-bundle
This commit is contained in:
Matthew Justin Bauer 2018-03-03 14:55:50 -06:00 committed by GitHub
commit 0c91c1282b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 252 additions and 10 deletions

View File

@ -30,12 +30,7 @@ rec {
# TODO: eventually should this go in nixpkgs?
nix-user-chroot = stdenv.lib.makeOverridable stdenv.mkDerivation {
name = "nix-user-chroot-2c52b5f";
src = fetchFromGitHub {
owner = "matthewbauer";
repo = "nix-user-chroot";
rev = "2c52b5f3174e382c2bfdd9e61f3e4a1200077b93";
sha256 = "139ixrg5ihrgsmi2nl1ws3xmi0vqwl5nwfijrggg02wlbiqvdiwq";
};
src = ./nix-user-chroot;
# hack to use when /nix/store is not available
postFixup = ''
@ -64,10 +59,18 @@ rec {
};
};
nix-bootstrap = { target, extraTargets ? [], run, nix-user-chroot' ? nix-user-chroot }:
makebootstrap {
startup = ''.${nix-user-chroot'}/bin/nix-user-chroot ./nix ${target}${run} \$@'';
targets = [ nix-user-chroot' target ] ++ extraTargets;
makeStartup = { target, nixUserChrootFlags, nix-user-chroot', run }:
writeScript "startup" ''
#!/bin/sh
.${nix-user-chroot'}/bin/nix-user-chroot -n ./nix ${nixUserChrootFlags} -- ${target}${run} $@
'';
nix-bootstrap = { target, extraTargets ? [], run, nix-user-chroot' ? nix-user-chroot, nixUserChrootFlags ? "" }:
let
script = makeStartup { inherit target nixUserChrootFlags nix-user-chroot' run; };
in makebootstrap {
startup = ".${script}";
targets = [ "${script}" ] ++ extraTargets;
};
# special case handling because of impurities in nix bootstrap

6
nix-user-chroot/Makefile Normal file
View File

@ -0,0 +1,6 @@
NIX_PATH ?= "nixpkgs=https://github.com/NixOS/nixpkgs/archive/master.tar.gz"
NIX_SSL_CERT_FILE ?= "/homeless-shelter"
ENV_PATH ?= ""
nix-user-chroot: main.cpp
g++ -o nix-user-chroot -DNIX_PATH='$(NIX_PATH)' -DNIX_SSL_CERT_FILE='$(NIX_SSL_CERT_FILE)' -DENV_HOME='$(ENV_HOME)' -DENV_PATH='$(ENV_PATH)' main.cpp

233
nix-user-chroot/main.cpp Normal file
View File

@ -0,0 +1,233 @@
/*
* This file is based on @lethalman's nix-user-chroot. This file has
* diverged from it though.
*
* Usage: nix-user-chroot <nixpath> <command>
*/
#include <sched.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/wait.h>
#include <signal.h>
#include <fcntl.h>
#include <stdio.h>
#include <string.h>
#include <limits.h>
#include <errno.h>
#include <sys/mount.h>
#include <sys/types.h>
#include <dirent.h>
#include <sys/stat.h>
#include <stdint.h>
#include <list>
#include <string>
using namespace std;
#define err_exit(format, ...) { fprintf(stderr, format ": %s\n", ##__VA_ARGS__, strerror(errno)); exit(EXIT_FAILURE); }
static void usage(const char *pname) {
fprintf(stderr, "Usage: %s -n <nixpath> -- <command>\n", pname);
fprintf(stderr, "\t-c\tclear all env vars\n");
fprintf(stderr, "\t-m <src>:<src>\tmap src on the host to dest in the sandbox\n");
fprintf(stderr, "\t-d\tdelete all default dir mappings, may break things\n");
fprintf(stderr, "\t-p <var>\tpreserve the value of a variable across the -c clear\n");
exit(EXIT_FAILURE);
}
static void update_map(const char *mapping, const char *map_file) {
int fd;
fd = open(map_file, O_WRONLY);
if (fd < 0) {
err_exit("map open");
}
int map_len = strlen(mapping);
if (write(fd, mapping, map_len) != map_len) {
err_exit("map write");
}
close(fd);
}
static void add_path(string src, string dest, string rootdir) {
string path_buf2;
struct stat statbuf;
if (stat(src.c_str(), &statbuf) < 0) {
fprintf(stderr, "Cannot stat %s: %s\n", src.c_str(), strerror(errno));
return;
}
path_buf2 = rootdir + "/" + dest;
if (S_ISDIR(statbuf.st_mode)) {
mkdir(path_buf2.c_str(), statbuf.st_mode & ~S_IFMT);
if (mount(src.c_str(), path_buf2.c_str(), "none", MS_BIND | MS_REC, NULL) < 0) {
fprintf(stderr, "Cannot bind mount %s to %s: %s\n", src.c_str(), path_buf2.c_str(), strerror(errno));
}
} else if (S_ISREG(statbuf.st_mode)) {
printf("bind-mounting file %s not supported", src.c_str());
}
}
struct DirMapping {
string src;
string dest;
};
struct SetEnv {
string key;
string value;
};
struct DirMapping parseMapping(string input) {
auto pos = input.find(":");
string src = input.substr(0, pos);
string dest = input.substr(pos + 1);
return (struct DirMapping){ src, dest };
}
int main(int argc, char *argv[]) {
uint8_t clear_env = 0;
char *nixdir = NULL;
list<struct DirMapping> dirMappings;
list<struct SetEnv> envMappings;
const char *t;
#define x(y) dirMappings.push_back({ "/" y, y })
x("dev");
x("proc");
x("sys");
x("run");
x("tmp");
x("var");
#undef x
int opt;
while ((opt = getopt(argc, argv, "cn:m:dp:")) != -1) {
switch (opt) {
case 'c':
clear_env = 1;
puts("clearing env");
break;
case 'n':
// determine absolute directory for nix dir
nixdir = realpath(optarg, NULL);
if (!nixdir) {
err_exit("realpath(%s)", optarg);
}
break;
case 'm':
dirMappings.push_back(parseMapping(optarg));
break;
case 'd':
dirMappings.clear();
break;
case 'p':
t = getenv(optarg);
if (t) {
envMappings.push_back({ optarg, t });
}
break;
}
}
if (!nixdir) {
fprintf(stderr, "-n <nixdir> is required\n");
exit(EXIT_FAILURE);
}
if (argc <= optind) {
usage(argv[0]);
}
const char *tmpdir = getenv("TMPDIR");
if (!tmpdir) {
tmpdir = "/tmp";
}
char template_[PATH_MAX];
int needed = snprintf(template_, PATH_MAX, "%s/nixXXXXXX", tmpdir);
if (needed < 0) {
err_exit("TMPDIR too long: '%s'", tmpdir);
}
char *rootdir = mkdtemp(template_);
if (!rootdir) {
err_exit("mkdtemp(%s)", template_);
}
// get uid, gid before going to new namespace
uid_t uid = getuid();
gid_t gid = getgid();
// "unshare" into new namespace
if (unshare(CLONE_NEWNS | CLONE_NEWUSER) < 0) {
err_exit("unshare()");
}
// add necessary system stuff to rootdir namespace
for (list<struct DirMapping>::iterator it = dirMappings.begin();
it != dirMappings.end(); ++it) {
struct DirMapping m = *it;
add_path(m.src, m.dest, rootdir);
}
char path_buf[PATH_MAX];
snprintf(path_buf, sizeof(path_buf), "%s/tmp", rootdir);
mkdir(path_buf, ~0);
snprintf(path_buf, sizeof(path_buf), "%s/var", rootdir);
// make sure nixdir exists
struct stat statbuf2;
if (stat(nixdir, &statbuf2) < 0) {
err_exit("stat(%s)", nixdir);
}
// mount /nix to new namespace
snprintf(path_buf, sizeof(path_buf), "%s/nix", rootdir);
mkdir(path_buf, statbuf2.st_mode & ~S_IFMT);
if (mount(nixdir, path_buf, "none", MS_BIND | MS_REC, NULL) < 0) {
err_exit("mount(%s, %s)", nixdir, path_buf);
}
// fixes issue #1 where writing to /proc/self/gid_map fails
// see user_namespaces(7) for more documentation
int fd_setgroups = open("/proc/self/setgroups", O_WRONLY);
if (fd_setgroups > 0) {
write(fd_setgroups, "deny", 4);
}
// map the original uid/gid in the new ns
char map_buf[1024];
snprintf(map_buf, sizeof(map_buf), "%d %d 1", uid, uid);
update_map(map_buf, "/proc/self/uid_map");
snprintf(map_buf, sizeof(map_buf), "%d %d 1", gid, gid);
update_map(map_buf, "/proc/self/gid_map");
// chroot to rootdir
if (chroot(rootdir) < 0) {
err_exit("chroot(%s)", rootdir);
}
chdir("/");
if (clear_env) clearenv();
setenv("NIX_PATH", NIX_PATH, 1);
setenv("NIX_SSL_CERT_FILE", NIX_SSL_CERT_FILE, 1);
setenv("PATH", ENV_PATH, 1);
for (list<struct SetEnv>::iterator it = envMappings.begin();
it != envMappings.end(); ++it) {
struct SetEnv e = *it;
setenv(e.key.c_str(), e.value.c_str(), 1);
}
// execute the command
execvp(argv[optind], argv + optind);
err_exit("execvp(%s)", argv[optind]);
}