mirror of
https://github.com/NixOS/nix.git
synced 2024-11-22 23:02:27 +00:00
diff hook: execute as the build user, and pass the temp dir
This commit is contained in:
parent
c78686e411
commit
6df61db060
@ -46,17 +46,15 @@ file containing:
|
||||
#!/bin/sh
|
||||
exec >&2
|
||||
echo "For derivation $3:"
|
||||
/run/current-system/sw/bin/runuser -u nobody -- /run/current-system/sw/bin/diff -r "$1" "$2"
|
||||
/run/current-system/sw/bin/diff -r "$1" "$2"
|
||||
</programlisting>
|
||||
|
||||
<warning>
|
||||
<para>The diff hook can be run as root. Take care to run as little
|
||||
as possible as root, for this example we use <command>runuser</command>
|
||||
to drop privileges.
|
||||
</para>
|
||||
</warning>
|
||||
</para>
|
||||
|
||||
<para>The diff hook is executed by the same user and group who ran the
|
||||
build. However, the diff hook does not have write access to the store
|
||||
path just built.</para>
|
||||
|
||||
<section>
|
||||
<title>
|
||||
Spot-Checking Build Determinism
|
||||
|
@ -252,13 +252,11 @@ false</literal>.</para>
|
||||
same.
|
||||
</para>
|
||||
|
||||
<warning>
|
||||
<para>
|
||||
The root user executes the diff hook in a daemonised
|
||||
installation. See <xref linkend="chap-diff-hook" /> for
|
||||
information on using the diff hook safely.
|
||||
</para>
|
||||
</warning>
|
||||
<para>
|
||||
The diff hook is executed by the same user and group who ran the
|
||||
build. However, the diff hook does not have write access to the
|
||||
store path just built.
|
||||
</para>
|
||||
|
||||
<para>The diff hook program receives three parameters:</para>
|
||||
|
||||
@ -280,6 +278,14 @@ false</literal>.</para>
|
||||
The path to the build's derivation
|
||||
</para>
|
||||
</listitem>
|
||||
|
||||
<listitem>
|
||||
<para>
|
||||
The path to the build's scratch directory. This directory
|
||||
will exist only if the build was run with
|
||||
<option>--keep-failed</option>.
|
||||
</para>
|
||||
</listitem>
|
||||
</orderedlist>
|
||||
|
||||
<para>The diff hook should not print data to stderr or stdout, as
|
||||
|
@ -461,17 +461,26 @@ static void commonChildInit(Pipe & logPipe)
|
||||
close(fdDevNull);
|
||||
}
|
||||
|
||||
void handleDiffHook(Path tryA, Path tryB, Path drvPath)
|
||||
void handleDiffHook(bool allowVfork, uid_t uid, uid_t gid, Path tryA, Path tryB, Path drvPath, Path tmpDir)
|
||||
{
|
||||
auto diffHook = settings.diffHook;
|
||||
if (diffHook != "" && settings.runDiffHook) {
|
||||
try {
|
||||
auto diff = runProgram(diffHook, true, {tryA, tryB, drvPath});
|
||||
if (diff != "")
|
||||
printError(chomp(diff));
|
||||
} catch (Error & error) {
|
||||
printError("diff hook execution failed: %s", error.what());
|
||||
}
|
||||
auto wrapper = [&]() {
|
||||
if (setgid(gid) == -1)
|
||||
throw SysError("setgid failed");
|
||||
if (setuid(uid) == -1)
|
||||
throw SysError("setuid failed");
|
||||
|
||||
try {
|
||||
auto diff = runProgram(diffHook, true, {tryA, tryB, drvPath, tmpDir});
|
||||
if (diff != "")
|
||||
printError(chomp(diff));
|
||||
} catch (Error & error) {
|
||||
printError("diff hook execution failed: %s", error.what());
|
||||
}
|
||||
};
|
||||
|
||||
doFork(allowVfork, wrapper);
|
||||
}
|
||||
}
|
||||
|
||||
@ -3197,14 +3206,18 @@ void DerivationGoal::registerOutputs()
|
||||
if (!worker.store.isValidPath(path)) continue;
|
||||
auto info = *worker.store.queryPathInfo(path);
|
||||
if (hash.first != info.narHash) {
|
||||
handleDiffHook(path, actualPath, drvPath);
|
||||
|
||||
if (settings.keepFailed) {
|
||||
if (settings.runDiffHook || settings.keepFailed) {
|
||||
Path dst = worker.store.toRealPath(path + checkSuffix);
|
||||
deletePath(dst);
|
||||
if (rename(actualPath.c_str(), dst.c_str()))
|
||||
throw SysError(format("renaming '%1%' to '%2%'") % actualPath % dst);
|
||||
|
||||
handleDiffHook(
|
||||
!buildUser && !drv->isBuiltin(),
|
||||
buildUser ? buildUser->getUID() : getuid(),
|
||||
buildUser ? buildUser->getGID() : getgid(),
|
||||
path, dst, drvPath, tmpDir);
|
||||
|
||||
throw Error(format("derivation '%1%' may not be deterministic: output '%2%' differs from '%3%'")
|
||||
% drvPath % path % dst);
|
||||
} else
|
||||
@ -3269,7 +3282,11 @@ void DerivationGoal::registerOutputs()
|
||||
? fmt("output '%1%' of '%2%' differs from '%3%' from previous round", i->second.path, drvPath, prev)
|
||||
: fmt("output '%1%' of '%2%' differs from previous round", i->second.path, drvPath);
|
||||
|
||||
handleDiffHook(prev, i->second.path, drvPath);
|
||||
handleDiffHook(
|
||||
!buildUser && !drv->isBuiltin(),
|
||||
buildUser ? buildUser->getUID() : getuid(),
|
||||
buildUser ? buildUser->getGID() : getgid(),
|
||||
prev, i->second.path, drvPath, tmpDir);
|
||||
|
||||
if (settings.enforceDeterminism)
|
||||
throw NotDeterministic(msg);
|
||||
|
@ -914,8 +914,8 @@ void killUser(uid_t uid)
|
||||
|
||||
/* Wrapper around vfork to prevent the child process from clobbering
|
||||
the caller's stack frame in the parent. */
|
||||
static pid_t doFork(bool allowVfork, std::function<void()> fun) __attribute__((noinline));
|
||||
static pid_t doFork(bool allowVfork, std::function<void()> fun)
|
||||
pid_t doFork(bool allowVfork, std::function<void()> fun) __attribute__((noinline));
|
||||
pid_t doFork(bool allowVfork, std::function<void()> fun)
|
||||
{
|
||||
#ifdef __linux__
|
||||
pid_t pid = allowVfork ? vfork() : fork();
|
||||
|
@ -265,6 +265,8 @@ string runProgram(Path program, bool searchPath = false,
|
||||
const Strings & args = Strings(),
|
||||
const std::optional<std::string> & input = {});
|
||||
|
||||
pid_t doFork(bool allowVfork, std::function<void()> fun);
|
||||
|
||||
struct RunOptions
|
||||
{
|
||||
Path program;
|
||||
|
Loading…
Reference in New Issue
Block a user