mirror of
https://github.com/NixOS/nix.git
synced 2024-11-21 22:32:26 +00:00
Create a NixOS integration test for the rootless daemon
The test plan is taken from https://github.com/thufschmitt/rootless-nix-daemon-test. That intentionally used non-NixOS to get around the ambient Nix daemon, but with newer NixOS we can in fact disable the ambient Nix daemon an run our own! A few things which are needed to make this nicer in the future - https://github.com/NixOS/nixpkgs/issues/3702 A now-fixed issue, but won't be available until 23.05 - https://github.com/NixOS/nixpkgs/issues/263248 https://github.com/NixOS/nixpkgs/issues/263250 Newly opened issues inspired by the process of writing this test.
This commit is contained in:
parent
c53498b0bf
commit
24318d8055
3
.gitignore
vendored
3
.gitignore
vendored
@ -108,6 +108,9 @@ perl/Makefile.config
|
||||
|
||||
/misc/systemd/nix-daemon.service
|
||||
/misc/systemd/nix-daemon.socket
|
||||
/misc/systemd/nix-gc-trace.service
|
||||
/misc/systemd/nix-gc-trace.socket
|
||||
|
||||
/misc/systemd/nix-daemon.conf
|
||||
/misc/upstart/nix-daemon.conf
|
||||
|
||||
|
@ -1,6 +1,8 @@
|
||||
ifdef HOST_LINUX
|
||||
|
||||
$(foreach n, nix-daemon.socket nix-daemon.service, $(eval $(call install-file-in, $(d)/$(n), $(prefix)/lib/systemd/system, 0644)))
|
||||
$(foreach n,\
|
||||
nix-daemon.socket nix-daemon.service nix-gc-trace.socket nix-gc-trace.service,\
|
||||
$(eval $(call install-file-in, $(d)/$(n), $(prefix)/lib/systemd/system, 0644)))
|
||||
$(foreach n, nix-daemon.conf, $(eval $(call install-file-in, $(d)/$(n), $(prefix)/lib/tmpfiles.d, 0644)))
|
||||
|
||||
clean-files += $(d)/nix-daemon.socket $(d)/nix-daemon.service $(d)/nix-daemon.conf
|
||||
|
21
misc/systemd/nix-gc-trace.service.in
Normal file
21
misc/systemd/nix-gc-trace.service.in
Normal file
@ -0,0 +1,21 @@
|
||||
[Unit]
|
||||
Description=Nix GC Tracer Daemon
|
||||
RequiresMountsFor=@storedir@
|
||||
RequiresMountsFor=@localstatedir@
|
||||
ConditionPathIsReadWrite=@localstatedir@/nix/gc-socket
|
||||
ProcSubset=pid
|
||||
|
||||
[Service]
|
||||
ExecStart=@@libexecdir@/nix/nix-find-roots nix-find-roots
|
||||
Type=simple
|
||||
StandardError=journal
|
||||
ProtectSystem=full
|
||||
ReadWritePaths=@localstatedir@/nix/gc-socket
|
||||
SystemCallFilter=@system-service
|
||||
SystemCallErrorNumber=EPERM
|
||||
PrivateNetwork=true
|
||||
PrivateDevices=true
|
||||
ProtectKernelTunables=true
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
12
misc/systemd/nix-gc-trace.socket.in
Normal file
12
misc/systemd/nix-gc-trace.socket.in
Normal file
@ -0,0 +1,12 @@
|
||||
[Unit]
|
||||
Description=Nix Daemon Socket
|
||||
Before=multi-user.target
|
||||
RequiresMountsFor=@storedir@
|
||||
ConditionPathIsReadWrite=@localstatedir@/nix/gc-socket
|
||||
|
||||
[Socket]
|
||||
ListenStream=@localstatedir@/nix/gc-socket/socket
|
||||
Accept=false
|
||||
|
||||
[Install]
|
||||
WantedBy=sockets.target
|
@ -109,7 +109,7 @@ in
|
||||
nix.package = lib.mkForce pkgs.nixVersions.nix_2_13;
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
# TODO: (nixpkgs update) remoteBuildsSshNg_remote_2_18 = ...
|
||||
|
||||
# Test our Nix as a builder for clients that are older
|
||||
@ -137,6 +137,8 @@ in
|
||||
# TODO: (nixpkgs update) remoteBuildsSshNg_local_2_18 = ...
|
||||
*/
|
||||
|
||||
rootless-daemon = runNixOSTestFor "x86_64-linux" ./rootless-daemon;
|
||||
|
||||
nix-copy-closure = runNixOSTestFor "x86_64-linux" ./nix-copy-closure.nix;
|
||||
|
||||
nix-copy = runNixOSTestFor "x86_64-linux" ./nix-copy.nix;
|
||||
|
198
tests/nixos/rootless-daemon/default.nix
Normal file
198
tests/nixos/rootless-daemon/default.nix
Normal file
@ -0,0 +1,198 @@
|
||||
{ pkgs, ... }:
|
||||
|
||||
{
|
||||
name = "rootless-daemon";
|
||||
|
||||
nodes.machine = { config, ... }: {
|
||||
users.users.alice.isNormalUser = true;
|
||||
#users.users.nix-daemon.isSystemUser = true;
|
||||
users.users.nix-daemon.isNormalUser = true;
|
||||
users.users.nix-daemon.group = "nix-daemon";
|
||||
users.groups.nix-daemon = {};
|
||||
environment.variables.NIX_REMOTE = "daemon"; # Even for root
|
||||
virtualisation.writableStore = true;
|
||||
|
||||
boot.readOnlyNixStore = false;
|
||||
|
||||
# No root daemon
|
||||
nix.enable = false;
|
||||
|
||||
# But put Nix on the path anyways
|
||||
environment.systemPackages = [ pkgs.nix ];
|
||||
|
||||
# And install the unit fies for nix-gc-trace
|
||||
systemd.packages = [ pkgs.nix ];
|
||||
|
||||
# And prepare the socket dirs anyways
|
||||
systemd.tmpfiles.rules = [
|
||||
"d /nix/var/nix/daemon-socket 0755 nix-daemon root - -"
|
||||
"d /nix/var/nix/gc-socket 0755 nix-daemon root - -"
|
||||
];
|
||||
|
||||
# Oops isn't working, because cannot disable Nix daemon and enable
|
||||
# Nix settings yet: https://github.com/NixOS/nixpkgs/issues/263250.
|
||||
nix.settings = {
|
||||
experimental-features = [ "external-gc-daemon" ];
|
||||
};
|
||||
# Plan B given the above
|
||||
#
|
||||
# TODO delete once that issue is fixed.
|
||||
environment.etc."nix/nix.conf".source = pkgs.writeTextFile {
|
||||
name = "nix.conf";
|
||||
text = ''
|
||||
experimental-features = external-gc-daemon
|
||||
'';
|
||||
};
|
||||
|
||||
# systemd.user.sockets.nix-daemon = {
|
||||
# };
|
||||
# systemd.user.services.nix-daemon = {
|
||||
# path = [ pkgs.nix ];
|
||||
# description = "Nix Daemon (non-root)";
|
||||
# unitConfig.ConditionUser = "nix-daemon";
|
||||
# };
|
||||
|
||||
systemd.sockets.nix-gc-trace = {
|
||||
restartTriggers = [ config.environment.etc."nix/nix.conf".source ];
|
||||
};
|
||||
systemd.services.nix-gc-trace = {
|
||||
restartTriggers = [ config.environment.etc."nix/nix.conf".source ];
|
||||
path = [ pkgs.nix ];
|
||||
description = "Nix Find Roots";
|
||||
};
|
||||
# We must enable lingering so that the Systemd User D-Bus is
|
||||
# enabled. We also cannot do this with loginctl enable-linger
|
||||
# because it needs to happen before systemd is loaded.
|
||||
#
|
||||
# See https://github.com/NixOS/nixpkgs/issues/3702
|
||||
#
|
||||
# TODO after upgrading to 23.11 can use new NixOS option for this.
|
||||
system.activationScripts = {
|
||||
enableLingering = ''
|
||||
# remove all existing lingering users
|
||||
rm -rf /var/lib/systemd/linger
|
||||
mkdir -p /var/lib/systemd/linger
|
||||
# enable for the subset of declared users
|
||||
touch /var/lib/systemd/linger/nix-daemon
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
import re
|
||||
|
||||
machine.wait_for_unit("multi-user.target")
|
||||
|
||||
''
|
||||
|
||||
# Set up the *user* nix-daemon unit files.
|
||||
#
|
||||
# TODO Once https://github.com/NixOS/nixpkgs/issues/263248 is fixed we
|
||||
# can do this declaratively without reinventing the wheel.
|
||||
+ ''
|
||||
machine.succeed("""
|
||||
su --shell=/run/current-system/sw/bin/bash --login nix-daemon -c "$(cat <<'EOF'
|
||||
set -ex
|
||||
export PS4='+(''${BASH_SOURCE[0]-$0}:$LINENO) '
|
||||
|
||||
src_dir=${pkgs.nix}/lib/systemd/system
|
||||
|
||||
unit_dir=$HOME/.config/systemd/user
|
||||
mkdir -p "$unit_dir"
|
||||
cd "$unit_dir"
|
||||
|
||||
# Make sure we do not get a "daemon fork bomb" of the daemon
|
||||
# trying to connect to itself.
|
||||
cp --no-preserve=mode "$src_dir/nix-daemon.service" ./
|
||||
patch -p1 < ${./no-systemd-unit-fork-bomb.patch}
|
||||
|
||||
ln -sf "$src_dir/nix-daemon.socket" ./
|
||||
EOF
|
||||
)"
|
||||
""")
|
||||
|
||||
(c, _) = machine.systemctl(
|
||||
"daemon-reload",
|
||||
user="nix-daemon")
|
||||
assert c == 0
|
||||
|
||||
''
|
||||
|
||||
# Give ownership of the store dir and var to the nix-daemon user.
|
||||
#
|
||||
# We intentionally don't do `-R` on the store because store objects
|
||||
# used by NixOS should still be owned by root.
|
||||
+ ''
|
||||
machine.succeed("""
|
||||
set -ex
|
||||
|
||||
chown nix-daemon /nix/store
|
||||
chown -R nix-daemon /nix/var
|
||||
""")
|
||||
''
|
||||
|
||||
# Test that alice indeed cannot modify the store; we don't want
|
||||
# arbitrary users to have any more permissions than before!
|
||||
+ ''
|
||||
machine.fail("su alice -c 'touch /nix/store/foo'")
|
||||
|
||||
''
|
||||
|
||||
# Start and wait for our units
|
||||
+ ''
|
||||
machine.start_job("nix-gc-trace.socket")
|
||||
machine.wait_for_unit("nix-gc-trace.socket")
|
||||
|
||||
machine.start_job("nix-daemon.socket", user="nix-daemon")
|
||||
machine.wait_for_unit("nix-daemon.socket", user="nix-daemon")
|
||||
|
||||
''
|
||||
|
||||
# Create a store obect, remember its store path in Python.
|
||||
+ ''
|
||||
two = machine.succeed("""
|
||||
su --login alice -c "$(cat <<'EOF'
|
||||
set -ex
|
||||
export PS4='+(''${BASH_SOURCE[0]-$0}:$LINENO) '
|
||||
|
||||
echo ehHtmfuULXYyBV6NBk6QUi8iE0 > two
|
||||
nix-store --add two
|
||||
EOF
|
||||
)"
|
||||
""")
|
||||
two = two.strip()
|
||||
assert re.match(r'^/nix/store/.+-two$', two)
|
||||
|
||||
''
|
||||
|
||||
# Make sure we cannot delete it when it has a GC root, but we can once
|
||||
# that root is destroyed.
|
||||
+ ''
|
||||
machine.succeed(f"""
|
||||
su --login alice -c "$(cat <<'EOF'
|
||||
set -ex
|
||||
export PS4='+(''${{BASH_SOURCE[0]-$0}}:$LINENO) '
|
||||
|
||||
test -f {two}
|
||||
nix-store --realize {two} --add-root foo
|
||||
echo $two
|
||||
EOF
|
||||
)"
|
||||
""")
|
||||
|
||||
machine.fail(f"su --login alice -c 'nix-store --delete {two}'")
|
||||
|
||||
machine.succeed(f"""
|
||||
su --login alice -c "$(cat <<'EOF'
|
||||
set -ex
|
||||
export PS4='+(''${{BASH_SOURCE[0]-$0}}:$LINENO) '
|
||||
|
||||
test -f {two}
|
||||
rm foo
|
||||
nix-store --delete {two}
|
||||
test ! -f {two}
|
||||
EOF
|
||||
)"
|
||||
""")
|
||||
'';
|
||||
}
|
10
tests/nixos/rootless-daemon/no-systemd-unit-fork-bomb.patch
Normal file
10
tests/nixos/rootless-daemon/no-systemd-unit-fork-bomb.patch
Normal file
@ -0,0 +1,10 @@
|
||||
--- a/nix-daemon.service
|
||||
+++ b/nix-daemon.service
|
||||
@@ -11,6 +11,7 @@ ConditionPathIsReadWrite=/nix/var/nix/daemon-socket
|
||||
KillMode=process
|
||||
LimitNOFILE=1048576
|
||||
TasksMax=1048576
|
||||
+Environment=NIX_REMOTE=local
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
Loading…
Reference in New Issue
Block a user