mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2024-11-08 16:06:16 -05:00
e37944d827
This change allows overriding the home directory of all filesystem mappings to help hide the identity of the calling user in a container. * doc/guix.texi (Invoking guix environment)[--container]: Mention --user. [--user]: Add item. * guix/scripts/environment.scm (show-help): Add --user. (%options): Add --user. (launch-environment/container) Add 'user' parameter. Update doc. Override 'user-mappings' using 'override-user-mappings'. Consider override for chdir. (mock-passwd, user-override-home, overrid-euser-dir): New procedures. (guix-environment): Disallow --user without --container. Provide user to 'launch-environment/container'. * tests/guix-environment.sh: Add user test. Signed-off-by: Ludovic Courtès <ludo@gnu.org>
135 lines
4 KiB
Bash
135 lines
4 KiB
Bash
# GNU Guix --- Functional package management for GNU
|
|
# Copyright © 2015 David Thompson <davet@gnu.org>
|
|
#
|
|
# This file is part of GNU Guix.
|
|
#
|
|
# GNU Guix is free software; you can redistribute it and/or modify it
|
|
# under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or (at
|
|
# your option) any later version.
|
|
#
|
|
# GNU Guix is distributed in the hope that it will be useful, but
|
|
# WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
#
|
|
# Test 'guix environment'.
|
|
#
|
|
|
|
set -e
|
|
|
|
guix environment --version
|
|
|
|
if ! guile -c '((@@ (guix scripts environment) assert-container-features))'
|
|
then
|
|
# User containers are not supported; skip this test.
|
|
exit 77
|
|
fi
|
|
|
|
tmpdir="t-guix-environment-$$"
|
|
trap 'rm -r "$tmpdir"' EXIT
|
|
|
|
mkdir "$tmpdir"
|
|
|
|
# Make sure the exit value is preserved.
|
|
if guix environment --container --ad-hoc --bootstrap guile-bootstrap \
|
|
-- guile -c '(exit 42)'
|
|
then
|
|
false
|
|
else
|
|
test $? = 42
|
|
fi
|
|
|
|
# Make sure file-not-found errors in mounts are reported.
|
|
if guix environment --container --ad-hoc --bootstrap guile-bootstrap \
|
|
--expose=/does-not-exist -- guile -c 1 2> "$tmpdir/error"
|
|
then
|
|
false
|
|
else
|
|
grep "/does-not-exist" "$tmpdir/error"
|
|
grep "[Nn]o such file" "$tmpdir/error"
|
|
fi
|
|
|
|
# Make sure that the right directories are mapped.
|
|
mount_test_code="
|
|
(use-modules (ice-9 rdelim)
|
|
(ice-9 match)
|
|
(srfi srfi-1))
|
|
|
|
(define mappings
|
|
(filter-map (lambda (line)
|
|
(match (string-split line #\space)
|
|
;; Empty line.
|
|
((\"\") #f)
|
|
;; Ignore the root file system.
|
|
((_ \"/\" _ _ _ _)
|
|
#f)
|
|
;; Ignore these types of file systems, except if they
|
|
;; correspond to a parent file system.
|
|
((_ mount (or \"tmpfs\" \"proc\" \"sysfs\" \"devtmpfs\"
|
|
\"devpts\" \"cgroup\" \"mqueue\") _ _ _)
|
|
(and (string-prefix? (getcwd) mount)
|
|
mount))
|
|
((_ mount _ _ _ _)
|
|
mount)))
|
|
(string-split (call-with-input-file \"/proc/mounts\" read-string)
|
|
#\newline)))
|
|
|
|
(for-each (lambda (mount)
|
|
(display mount)
|
|
(newline))
|
|
mappings)"
|
|
|
|
guix environment --container --ad-hoc --bootstrap guile-bootstrap \
|
|
-- guile -c "$mount_test_code" > $tmpdir/mounts
|
|
|
|
cat "$tmpdir/mounts"
|
|
test `wc -l < $tmpdir/mounts` -eq 4
|
|
|
|
current_dir="`cd $PWD; pwd -P`"
|
|
grep -e "$current_dir$" $tmpdir/mounts # current directory
|
|
grep $(guix build guile-bootstrap) $tmpdir/mounts
|
|
grep -e "$NIX_STORE_DIR/.*-bash" $tmpdir/mounts # bootstrap bash
|
|
|
|
rm $tmpdir/mounts
|
|
|
|
# Make sure 'GUIX_ENVIRONMENT' is linked to '~/.guix-profile' when requested
|
|
# within a container.
|
|
(
|
|
linktest='(exit (string=? (getenv "GUIX_ENVIRONMENT")
|
|
(readlink (string-append (getenv "HOME") "/.guix-profile"))))'
|
|
|
|
cd "$tmpdir" \
|
|
&& guix environment --bootstrap --container --link-profile \
|
|
--ad-hoc guile-bootstrap --pure \
|
|
-- guile -c "$linktest"
|
|
)
|
|
|
|
# Test that user can be mocked.
|
|
usertest='(exit (and (string=? (getenv "HOME") "/home/foognu")
|
|
(string=? (passwd:name (getpwuid 0)) "foognu")
|
|
(file-exists? "/home/foognu/umock")))'
|
|
touch "$tmpdir/umock"
|
|
HOME="$tmpdir" guix environment --bootstrap --container --user=foognu \
|
|
--ad-hoc guile-bootstrap --pure \
|
|
--share="$tmpdir/umock" \
|
|
-- guile -c "$usertest"
|
|
|
|
|
|
# Check the exit code.
|
|
|
|
abnormal_exit_code="
|
|
(use-modules (system foreign))
|
|
;; Purposely make Guile crash with a segfault. :)
|
|
(pointer->string (make-pointer 123) 123)"
|
|
|
|
if guix environment --bootstrap --container \
|
|
--ad-hoc guile-bootstrap -- guile -c "$abnormal_exit_code"
|
|
then false;
|
|
else
|
|
test $? -gt 127
|
|
fi
|