4 stable releases
1.2.2 | May 2, 2021 |
---|---|
1.2.1 | Mar 12, 2021 |
1.1.1 | Jan 9, 2021 |
#555 in Unix APIs
22 downloads per month
17KB
276 lines
nix-user-chroot
Rust rewrite of lethalman's version to clarify the license situation. This forks also makes it possible to use the nix sandbox!
Run and install nix as user without root permissions. Nix-user-chroot requires user namespaces to perform its task (available since linux 3.8). Note that this is not available for unprivileged users in some Linux distributions such as Red Hat Linux, CentOS when using the stock kernel. It should be available in Ubuntu, Debian and Arch Linux.
Check if your kernel supports user namespaces for unprivileged users
$ unshare --user --pid echo YES
YES
The output should be YES
.
If the command is absent, an alternative is to check the kernel compile options:
$ zgrep CONFIG_USER_NS /proc/config.gz
CONFIG_USER_NS=y
On some systems, like Debian or Ubuntu, the kernel configuration is in a different place, so instead use:
$ grep CONFIG_USER_NS /boot/config-$(uname -r)
CONFIG_USER_NS=y
On debian-based system this feature might be disabled by default. However they provide a sysctl switch to enable it at runtime.
On RedHat / CentOS 7.4 user namespaces are disabled by default, but can be enabled by:
- Adding
namespace.unpriv_enable=1
to the kernel boot parameters viagrubby
echo "user.max_user_namespaces=15076" >> /etc/sysctl.conf
to increase the number of allowed namespaces above the default 0.
For more details, see the RedHat Documentation
Download static binaries
Checkout the latest release and download the binary matching your architecture.
Install with cargo
$ cargo install nix-user-chroot
Build from source
$ git clone https://github.com/nix-community/nix-user-chroot
$ cd nix-user-chroot
$ cargo build --release
If you use rustup, you can also build a statically linked version:
$ rustup target add x86_64-unknown-linux-musl
$ cargo build --release --target=x86_64-unknown-linux-musl
Installation
This will download and extract latest nix binary tarball from the chroot:
$ mkdir -m 0755 ~/.nix
$ nix-user-chroot ~/.nix bash -c "curl -L https://nixos.org/nix/install | bash"
The installation described here will not work on NixOS this way, because you
start with an empty nix store and miss therefore tools like bash and coreutils.
You won't need nix-user-chroot
on NixOS anyway since you can get similar
functionality using nix run --store ~/.nix nixpkgs.bash nixpkgs.coreutils
:
Usage
After installation you can always get into the nix user chroot using:
$ nix-user-chroot ~/.nix bash -l
You are in a user chroot where /
is owned by your user, hence also /nix
is
owned by your user. Everything else is bind mounted from the real root.
The nix config is not in /etc/nix
but in /nix/etc/nix
, so that you can
modify it. This is done with the NIX_CONF_DIR
, which you can override at any
time.
Libraries and applications from Nixpkgs with OpenGL or CUDA support need to load libraries from /run/opengl-driver/lib. For convenience, nix-user-chroot will bind mount /nix/var/nix/opengl-driver/lib (if it exists) to this location. You will still need to link the system libraries here, as their original locations are distro-dependent. For example, for CUDA support on Ubuntu 20.04:
$ mkdir -p /nix/var/nix/opengl-driver/lib
$ ln -s /usr/lib/x86_64-linux-gnu/libcuda.so.1 /nix/var/nix/opengl-driver/lib
If this directory didn't exist when you first entered the nix user chroot, you will need to reenter for /run/opengl-driver/lib to be mounted.
Whishlist
These are features the author would like to see, let me know, if you want to work on this:
Add an --install
flag:
Instead of
$ mkdir -m 0755 ~/.nix
$ nix-user-chroot ~/.nix bash -c "curl -L https://nixos.org/nix/install | bash"
it should just be:
$ nix-user-chroot --install
This assumes we just install to $XDG_DATA_HOME
or $HOME/.data/nix
by default.
Add a setuid version
Since not all linux distributions allow user namespaces by default, we will need packages for those that install setuid binaries to achieve the same.
Similar projects
Dependencies
~1.5MB
~37K SLoC