nix-user-chroot/main.c
2016-08-29 11:56:09 +02:00

151 lines
3.8 KiB
C

#define _GNU_SOURCE
#include <sched.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/wait.h>
#include <signal.h>
#include <fcntl.h>
#include <stdio.h>
#include <string.h>
#include <limits.h>
#include <errno.h>
#include <sys/mount.h>
#include <sys/types.h>
#include <dirent.h>
#include <sys/stat.h>
#define err_exit(format, ...) { fprintf(stderr, format ": %s\n", ##__VA_ARGS__, strerror(errno)); exit(EXIT_FAILURE); }
static void usage(char *pname) {
fprintf(stderr, "Usage: %s <nixpath> <command>\n", pname);
exit(EXIT_FAILURE);
}
static void update_map(char *mapping, char *map_file) {
int fd;
fd = open(map_file, O_WRONLY);
if (fd < 0) {
err_exit("map open");
}
int map_len = strlen(mapping);
if (write(fd, mapping, map_len) != map_len) {
err_exit("map write");
}
close(fd);
}
int main(int argc, char *argv[]) {
char map_buf[1024];
char path_buf[PATH_MAX];
char path_buf2[PATH_MAX];
char cwd[PATH_MAX];
if (argc < 3) {
usage(argv[0]);
}
char *tmpdir = getenv("TMPDIR");
if (!tmpdir) {
tmpdir = "/tmp";
}
char template[PATH_MAX];
int needed = snprintf(template, PATH_MAX, "%s/nixXXXXXX", tmpdir);
if (needed < 0) {
err_exit("TMPDIR too long: '%s'", tmpdir);
}
char *rootdir = mkdtemp(template);
if (!rootdir) {
err_exit("mkdtemp(%s)", template);
}
char *nixdir = realpath(argv[1], NULL);
if (!nixdir) {
err_exit("realpath(%s)", argv[1]);
}
uid_t uid = getuid();
gid_t gid = getgid();
if (unshare(CLONE_NEWNS | CLONE_NEWUSER) < 0) {
err_exit("unshare()");
}
// bind mount all / stuff into rootdir
DIR* d = opendir("/");
if (!d) {
err_exit("open /");
}
struct dirent *ent;
while ((ent = readdir(d))) {
// do not bind mount an existing nix installation
if (!strcmp(ent->d_name, ".") || !strcmp(ent->d_name, "..") || !strcmp(ent->d_name, "nix")) {
continue;
}
snprintf(path_buf, sizeof(path_buf), "/%s", ent->d_name);
struct stat statbuf;
if (stat(path_buf, &statbuf) < 0) {
fprintf(stderr, "Cannot stat %s: %s\n", path_buf, strerror(errno));
continue;
}
snprintf(path_buf2, sizeof(path_buf2), "%s/%s", rootdir, ent->d_name);
if (S_ISDIR(statbuf.st_mode)) {
mkdir(path_buf2, statbuf.st_mode & ~S_IFMT);
if (mount(path_buf, path_buf2, "none", MS_BIND | MS_REC, NULL) < 0) {
fprintf(stderr, "Cannot bind mount %s to %s: %s\n", path_buf, path_buf2, strerror(errno));
}
}
}
struct stat statbuf2;
if (stat(nixdir, &statbuf2) < 0) {
err_exit("stat(%s)", nixdir);
}
snprintf(path_buf, sizeof(path_buf), "%s/nix", rootdir);
mkdir(path_buf, statbuf2.st_mode & ~S_IFMT);
if (mount(nixdir, path_buf, "none", MS_BIND | MS_REC, NULL) < 0) {
err_exit("mount(%s, %s)", nixdir, path_buf);
}
// fixes issue #1 where writing to /proc/self/gid_map fails
// see user_namespaces(7) for more documentation
int fd_setgroups = open("/proc/self/setgroups", O_WRONLY);
if (fd_setgroups > 0) {
write(fd_setgroups, "deny", 4);
}
// map the original uid/gid in the new ns
snprintf(map_buf, sizeof(map_buf), "%d %d 1", uid, uid);
update_map(map_buf, "/proc/self/uid_map");
snprintf(map_buf, sizeof(map_buf), "%d %d 1", gid, gid);
update_map(map_buf, "/proc/self/gid_map");
if (!getcwd(cwd, PATH_MAX)) {
err_exit("getcwd()");
}
chdir("/");
if (chroot(rootdir) < 0) {
err_exit("chroot(%s)", rootdir);
}
chdir(cwd);
// execute the command
setenv("NIX_CONF_DIR", "/nix/etc/nix", 1);
execvp(argv[2], argv+2);
err_exit("execvp(%s)", argv[2]);
}