blob: dadd5691dc5a7256b293568cf84f4ed3ede649a3 [file] [log] [blame]
// Copyright 2014 The Bazel Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.devtools.build.lib.sandbox;
import com.google.common.annotations.VisibleForTesting;
import com.google.common.base.Predicates;
import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableMap;
import com.google.common.collect.ImmutableSet;
import com.google.common.io.Files;
import com.google.devtools.build.lib.actions.ActionExecutionContext;
import com.google.devtools.build.lib.actions.ActionInput;
import com.google.devtools.build.lib.actions.ActionInputHelper;
import com.google.devtools.build.lib.actions.ActionStatusMessage;
import com.google.devtools.build.lib.actions.Artifact;
import com.google.devtools.build.lib.actions.EnvironmentalExecException;
import com.google.devtools.build.lib.actions.ExecException;
import com.google.devtools.build.lib.actions.ExecutionStrategy;
import com.google.devtools.build.lib.actions.Executor;
import com.google.devtools.build.lib.actions.Spawn;
import com.google.devtools.build.lib.actions.SpawnActionContext;
import com.google.devtools.build.lib.actions.UserExecException;
import com.google.devtools.build.lib.analysis.AnalysisUtils;
import com.google.devtools.build.lib.analysis.BlazeDirectories;
import com.google.devtools.build.lib.analysis.config.RunUnder;
import com.google.devtools.build.lib.cmdline.Label;
import com.google.devtools.build.lib.rules.cpp.CppCompileAction;
import com.google.devtools.build.lib.rules.fileset.FilesetActionContext;
import com.google.devtools.build.lib.rules.test.TestRunnerAction;
import com.google.devtools.build.lib.standalone.StandaloneSpawnStrategy;
import com.google.devtools.build.lib.unix.NativePosixFiles;
import com.google.devtools.build.lib.util.Preconditions;
import com.google.devtools.build.lib.util.io.FileOutErr;
import com.google.devtools.build.lib.vfs.FileStatus;
import com.google.devtools.build.lib.vfs.FileSystem;
import com.google.devtools.build.lib.vfs.FileSystemUtils;
import com.google.devtools.build.lib.vfs.Path;
import com.google.devtools.build.lib.vfs.PathFragment;
import com.google.devtools.build.lib.vfs.SearchPath;
import com.google.devtools.build.lib.vfs.Symlinks;
import java.io.File;
import java.io.IOException;
import java.nio.charset.StandardCharsets;
import java.util.List;
import java.util.Map;
import java.util.Map.Entry;
import java.util.UUID;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.atomic.AtomicInteger;
/**
* Strategy that uses sandboxing to execute a process.
*/
@ExecutionStrategy(
name = {"sandboxed"},
contextType = SpawnActionContext.class
)
public class LinuxSandboxedStrategy implements SpawnActionContext {
private final ExecutorService backgroundWorkers;
private final SandboxOptions sandboxOptions;
private final ImmutableMap<String, String> clientEnv;
private final BlazeDirectories blazeDirs;
private final Path execRoot;
private final boolean verboseFailures;
private final boolean unblockNetwork;
private final UUID uuid = UUID.randomUUID();
private final AtomicInteger execCounter = new AtomicInteger();
private final String productName;
public LinuxSandboxedStrategy(
SandboxOptions options,
Map<String, String> clientEnv,
BlazeDirectories blazeDirs,
ExecutorService backgroundWorkers,
boolean verboseFailures,
boolean unblockNetwork,
String productName) {
this.sandboxOptions = options;
this.clientEnv = ImmutableMap.copyOf(clientEnv);
this.blazeDirs = blazeDirs;
this.execRoot = blazeDirs.getExecRoot();
this.backgroundWorkers = Preconditions.checkNotNull(backgroundWorkers);
this.verboseFailures = verboseFailures;
this.unblockNetwork = unblockNetwork;
this.productName = productName;
}
/**
* Executes the given {@code spawn}.
*/
@Override
public void exec(Spawn spawn, ActionExecutionContext actionExecutionContext)
throws ExecException {
Executor executor = actionExecutionContext.getExecutor();
// Certain actions can't run remotely or in a sandbox - pass them on to the standalone strategy.
if (!spawn.isRemotable()) {
StandaloneSpawnStrategy standaloneStrategy =
Preconditions.checkNotNull(executor.getContext(StandaloneSpawnStrategy.class));
standaloneStrategy.exec(spawn, actionExecutionContext);
return;
}
if (executor.reportsSubcommands()) {
executor.reportSubcommand(
Label.print(spawn.getOwner().getLabel()) + " [" + spawn.getResourceOwner().prettyPrint()
+ "]", spawn.asShellCommand(executor.getExecRoot()));
}
executor
.getEventBus()
.post(ActionStatusMessage.runningStrategy(spawn.getResourceOwner(), "sandbox"));
FileOutErr outErr = actionExecutionContext.getFileOutErr();
// The execId is a unique ID just for this invocation of "exec".
String execId = uuid + "-" + execCounter.getAndIncrement();
// Each invocation of "exec" gets its own sandbox.
Path sandboxPath =
execRoot.getRelative(productName + "-sandbox").getRelative(execId);
// Gather all necessary mounts for the sandbox.
ImmutableMap<Path, Path> mounts;
try {
mounts = getMounts(spawn, actionExecutionContext);
} catch (IllegalArgumentException | IOException e) {
throw new EnvironmentalExecException("Could not prepare mounts for sandbox execution", e);
}
ImmutableSet<Path> createDirs = createImportantDirs(spawn.getEnvironment());
int timeout = getTimeout(spawn);
ImmutableSet.Builder<PathFragment> outputFiles = ImmutableSet.builder();
for (PathFragment optionalOutput : spawn.getOptionalOutputFiles()) {
Preconditions.checkArgument(!optionalOutput.isAbsolute());
outputFiles.add(optionalOutput);
}
for (ActionInput output : spawn.getOutputFiles()) {
outputFiles.add(new PathFragment(output.getExecPathString()));
}
try {
final NamespaceSandboxRunner runner =
new NamespaceSandboxRunner(
execRoot,
sandboxPath,
mounts,
createDirs,
verboseFailures,
sandboxOptions.sandboxDebug);
try {
runner.run(
spawn.getArguments(),
spawn.getEnvironment(),
execRoot.getPathFile(),
outErr,
outputFiles.build(),
timeout,
!this.unblockNetwork && !spawn.getExecutionInfo().containsKey("requires-network"));
} finally {
// Due to the Linux kernel behavior, if we try to remove the sandbox too quickly after the
// process has exited, we get "Device busy" errors because some of the mounts have not yet
// been undone. A second later it usually works. We will just clean the old sandboxes up
// using a background worker.
backgroundWorkers.execute(
new Runnable() {
@Override
public void run() {
try {
while (!Thread.currentThread().isInterrupted()) {
try {
runner.cleanup();
return;
} catch (IOException e2) {
// Sleep & retry.
Thread.sleep(250);
}
}
} catch (InterruptedException e) {
// Exit.
}
}
});
}
} catch (IOException e) {
throw new UserExecException("I/O error during sandboxed execution", e);
}
}
private int getTimeout(Spawn spawn) throws ExecException {
String timeoutStr = spawn.getExecutionInfo().get("timeout");
if (timeoutStr != null) {
try {
return Integer.parseInt(timeoutStr);
} catch (NumberFormatException e) {
throw new UserExecException("Could not parse timeout", e);
}
}
return -1;
}
/**
* Most programs expect certain directories to be present, e.g. /tmp. Make sure they are.
*
* <p>Note that $HOME is handled by namespace-sandbox.c, because it changes user to nobody and the
* home directory of that user is not known by us.
*/
private ImmutableSet<Path> createImportantDirs(Map<String, String> env) {
ImmutableSet.Builder<Path> dirs = ImmutableSet.builder();
FileSystem fs = blazeDirs.getFileSystem();
if (env.containsKey("TEST_TMPDIR")) {
PathFragment testTmpDir = new PathFragment(env.get("TEST_TMPDIR"));
if (testTmpDir.isAbsolute()) {
dirs.add(fs.getPath(testTmpDir));
} else {
dirs.add(execRoot.getRelative(testTmpDir));
}
}
dirs.add(fs.getPath("/tmp"));
return dirs.build();
}
private ImmutableMap<Path, Path> getMounts(Spawn spawn, ActionExecutionContext executionContext)
throws IOException, ExecException {
ImmutableMap.Builder<Path, Path> result = new ImmutableMap.Builder<>();
result.putAll(mountUsualUnixDirs());
result.putAll(mountUserDefinedPath());
MountMap mounts = new MountMap();
mounts.putAll(setupBlazeUtils());
mounts.putAll(mountRunfilesFromManifests(spawn));
mounts.putAll(mountRunfilesFromSuppliers(spawn));
mounts.putAll(mountFilesFromFilesetManifests(spawn, executionContext));
mounts.putAll(mountInputs(spawn, executionContext));
mounts.putAll(mountRunUnderCommand(spawn));
result.putAll(finalizeMounts(mounts));
return result.build();
}
/**
* Helper method of {@link #finalizeMounts}. This method handles adding a single path
* to the output map, including making sure it exists and adding the target of a
* symbolic link if necessary.
*
* @param finalizedMounts the map to add the mapping(s) to
* @param target the key to add to the map
* @param source the value to add to the map
* @param stat information about source (passed in to avoid fetching it twice)
*/
private static void finalizeMountPath(
MountMap finalizedMounts, Path target, Path source, FileStatus stat) throws IOException {
// The source must exist.
Preconditions.checkArgument(stat != null, "%s does not exist", source.toString());
finalizedMounts.put(target, source);
if (stat.isSymbolicLink()) {
Path symlinkTarget = source.resolveSymbolicLinks();
Preconditions.checkArgument(
symlinkTarget.exists(), "%s does not exist", symlinkTarget.toString());
finalizedMounts.put(symlinkTarget, symlinkTarget);
}
}
/**
* Performs various checks on each mounted file which require stating each one.
* Contained in one function to allow minimizing the number of syscalls involved.
*
* Checks for each mount if the source refers to a symbolic link and if yes, adds another mount
* for the target of that symlink to ensure that it keeps working inside the sandbox.
*
* Checks for each mount if the source refers to a directory and if yes, replaces that mount with
* mounts of all files inside that directory.
*
* Validates all mounts against a set of criteria and throws an exception on error.
*
* @return a new mounts multimap with all mounts and the added mounts.
*/
@VisibleForTesting
static MountMap finalizeMounts(Map<Path, Path> mounts) throws IOException {
MountMap finalizedMounts = new MountMap();
for (Entry<Path, Path> mount : mounts.entrySet()) {
Path target = mount.getKey();
Path source = mount.getValue();
FileStatus stat = source.statNullable(Symlinks.NOFOLLOW);
if (stat != null && stat.isDirectory()) {
for (Path subSource : FileSystemUtils.traverseTree(source, Predicates.alwaysTrue())) {
Path subTarget = target.getRelative(subSource.relativeTo(source));
finalizeMountPath(
finalizedMounts, subTarget, subSource, subSource.statNullable(Symlinks.NOFOLLOW));
}
} else {
finalizeMountPath(finalizedMounts, target, source, stat);
}
}
return finalizedMounts;
}
/**
* Mount a certain set of unix directories to make the usual tools and libraries available to the
* spawn that runs.
*
* Throws an exception if any of them do not exist.
*/
private MountMap mountUsualUnixDirs() throws IOException {
MountMap mounts = new MountMap();
FileSystem fs = blazeDirs.getFileSystem();
mounts.put(fs.getPath("/bin"), fs.getPath("/bin"));
mounts.put(fs.getPath("/sbin"), fs.getPath("/sbin"));
mounts.put(fs.getPath("/etc"), fs.getPath("/etc"));
// Check if /etc/resolv.conf is a symlink and mount its target
// Fix #738
Path resolv = fs.getPath("/etc/resolv.conf");
if (resolv.exists() && resolv.isSymbolicLink()) {
mounts.put(resolv.resolveSymbolicLinks(), resolv.resolveSymbolicLinks());
}
for (String entry : NativePosixFiles.readdir("/")) {
if (entry.startsWith("lib")) {
Path libDir = fs.getRootDirectory().getRelative(entry);
mounts.put(libDir, libDir);
}
}
for (String entry : NativePosixFiles.readdir("/usr")) {
if (!entry.equals("local")) {
Path usrDir = fs.getPath("/usr").getRelative(entry);
mounts.put(usrDir, usrDir);
}
}
for (Path path : mounts.values()) {
Preconditions.checkArgument(path.exists(), "%s does not exist", path.toString());
}
return mounts;
}
/**
* Mount the embedded tools.
*/
private MountMap setupBlazeUtils() {
MountMap mounts = new MountMap();
Path mount = blazeDirs.getEmbeddedBinariesRoot().getRelative("build-runfiles");
mounts.put(mount, mount);
return mounts;
}
/**
* Mount all runfiles that the spawn needs as specified in its runfiles manifests.
*/
private MountMap mountRunfilesFromManifests(Spawn spawn) throws IOException, ExecException {
MountMap mounts = new MountMap();
for (Entry<PathFragment, Artifact> manifest : spawn.getRunfilesManifests().entrySet()) {
String manifestFilePath = manifest.getValue().getPath().getPathString();
Preconditions.checkState(!manifest.getKey().isAbsolute());
Path targetDirectory = execRoot.getRelative(manifest.getKey());
mounts.putAll(parseManifestFile(targetDirectory, new File(manifestFilePath), false, ""));
}
return mounts;
}
/**
* Mount all files that the spawn needs as specified in its fileset manifests.
*/
private MountMap mountFilesFromFilesetManifests(
Spawn spawn, ActionExecutionContext executionContext) throws IOException, ExecException {
final FilesetActionContext filesetContext =
executionContext.getExecutor().getContext(FilesetActionContext.class);
MountMap mounts = new MountMap();
for (Artifact fileset : spawn.getFilesetManifests()) {
Path manifest =
execRoot.getRelative(AnalysisUtils.getManifestPathFromFilesetPath(fileset.getExecPath()));
Path targetDirectory = execRoot.getRelative(fileset.getExecPathString());
mounts.putAll(
parseManifestFile(
targetDirectory, manifest.getPathFile(), true, filesetContext.getWorkspaceName()));
}
return mounts;
}
static MountMap parseManifestFile(
Path targetDirectory, File manifestFile, boolean isFilesetManifest, String workspaceName)
throws IOException, ExecException {
MountMap mounts = new MountMap();
int lineNum = 0;
for (String line : Files.readLines(manifestFile, StandardCharsets.UTF_8)) {
if (isFilesetManifest && (++lineNum % 2 == 0)) {
continue;
}
if (line.isEmpty()) {
continue;
}
String[] fields = line.trim().split(" ");
Path targetPath;
if (isFilesetManifest) {
PathFragment targetPathFragment = new PathFragment(fields[0]);
if (!workspaceName.isEmpty()) {
if (!targetPathFragment.getSegment(0).equals(workspaceName)) {
throw new EnvironmentalExecException(
"Fileset manifest line must start with workspace name");
}
targetPathFragment = targetPathFragment.subFragment(1, targetPathFragment.segmentCount());
}
targetPath = targetDirectory.getRelative(targetPathFragment);
} else {
targetPath = targetDirectory.getRelative(fields[0]);
}
Path source;
switch (fields.length) {
case 1:
source = targetDirectory.getFileSystem().getPath("/dev/null");
break;
case 2:
source = targetDirectory.getFileSystem().getPath(fields[1]);
break;
default:
throw new IllegalStateException("'" + line + "' splits into more than 2 parts");
}
mounts.put(targetPath, source);
}
return mounts;
}
/**
* Mount all runfiles that the spawn needs as specified via its runfiles suppliers.
*/
private MountMap mountRunfilesFromSuppliers(Spawn spawn) throws IOException {
MountMap mounts = new MountMap();
FileSystem fs = blazeDirs.getFileSystem();
Map<PathFragment, Map<PathFragment, Artifact>> rootsAndMappings =
spawn.getRunfilesSupplier().getMappings();
for (Entry<PathFragment, Map<PathFragment, Artifact>> rootAndMappings :
rootsAndMappings.entrySet()) {
Path root = fs.getRootDirectory().getRelative(rootAndMappings.getKey());
for (Entry<PathFragment, Artifact> mapping : rootAndMappings.getValue().entrySet()) {
Artifact sourceArtifact = mapping.getValue();
Path source = (sourceArtifact != null) ? sourceArtifact.getPath() : fs.getPath("/dev/null");
Preconditions.checkArgument(!mapping.getKey().isAbsolute());
Path target = root.getRelative(mapping.getKey());
mounts.put(target, source);
}
}
return mounts;
}
/**
* Mount all inputs of the spawn.
*/
private MountMap mountInputs(Spawn spawn, ActionExecutionContext actionExecutionContext) {
MountMap mounts = new MountMap();
List<ActionInput> inputs =
ActionInputHelper.expandArtifacts(
spawn.getInputFiles(), actionExecutionContext.getArtifactExpander());
if (spawn.getResourceOwner() instanceof CppCompileAction) {
CppCompileAction action = (CppCompileAction) spawn.getResourceOwner();
if (action.shouldScanIncludes()) {
inputs.addAll(action.getAdditionalInputs());
}
}
for (ActionInput input : inputs) {
if (input.getExecPathString().contains("internal/_middlemen/")) {
continue;
}
Path mount = execRoot.getRelative(input.getExecPathString());
mounts.put(mount, mount);
}
return mounts;
}
/**
* If a --run_under= option is set and refers to a command via its path (as opposed to via its
* label), we have to mount this. Note that this is best effort and works fine for shell scripts
* and small binaries, but we can't track any further dependencies of this command.
*
* <p>If --run_under= refers to a label, it is automatically provided in the spawn's input files,
* so mountInputs() will catch that case.
*/
private MountMap mountRunUnderCommand(Spawn spawn) {
MountMap mounts = new MountMap();
if (spawn.getResourceOwner() instanceof TestRunnerAction) {
TestRunnerAction testRunnerAction = ((TestRunnerAction) spawn.getResourceOwner());
RunUnder runUnder = testRunnerAction.getExecutionSettings().getRunUnder();
if (runUnder != null && runUnder.getCommand() != null) {
PathFragment sourceFragment = new PathFragment(runUnder.getCommand());
Path mount;
if (sourceFragment.isAbsolute()) {
mount = blazeDirs.getFileSystem().getPath(sourceFragment);
} else if (blazeDirs.getExecRoot().getRelative(sourceFragment).exists()) {
mount = blazeDirs.getExecRoot().getRelative(sourceFragment);
} else {
List<Path> searchPath =
SearchPath.parse(blazeDirs.getFileSystem(), clientEnv.get("PATH"));
mount = SearchPath.which(searchPath, runUnder.getCommand());
}
if (mount != null) {
mounts.put(mount, mount);
}
}
}
return mounts;
}
/**
* Mount all user defined path in --sandbox_add_path.
*/
private MountMap mountUserDefinedPath() throws IOException {
MountMap mounts = new MountMap();
FileSystem fs = blazeDirs.getFileSystem();
ImmutableList<Path> exclude =
ImmutableList.of(blazeDirs.getWorkspace(), blazeDirs.getOutputBase());
for (String pathStr : sandboxOptions.sandboxAddPath) {
Path path = fs.getPath(pathStr);
// Check if path is in {workspace, outputBase}
for (Path exc : exclude) {
if (path.startsWith(exc)) {
throw new IllegalArgumentException(
"Mounting subdirectory of WORKSPACE or OUTPUTBASE to sandbox is not allowed.");
}
}
// Check if path is ancestor of {workspace, outputBase}
// Mount subdirectory of path except {workspace, outputBase}
mounts.putAll(mountChildDirExclude(path, exclude));
}
return mounts;
}
/**
* Mount all subdirectories recursively except some paths
*/
private MountMap mountDirExclude(Path path, List<Path> exclude) throws IOException {
MountMap mounts = new MountMap();
if (!path.isDirectory(Symlinks.NOFOLLOW)) {
if (!exclude.contains(path)) {
mounts.put(path, path);
}
return mounts;
}
try {
for (Path child : path.getDirectoryEntries()) {
// Ignore broken symlink
if (!child.exists()) {
continue;
}
mounts.putAll(mountChildDirExclude(child, exclude));
}
} catch (IOException e) {
throw new IOException("Illegal additional path for mount", e);
}
return mounts;
}
/**
* Helper function of mountDirExclude and mountUserDefinedPath
*/
private MountMap mountChildDirExclude(Path child, List<Path> exclude) throws IOException {
MountMap mounts = new MountMap();
boolean startsWithFlag = false;
for (Path exc : exclude) {
if (exc.startsWith(child)) {
startsWithFlag = true;
break;
}
}
if (!startsWithFlag) {
mounts.put(child, child);
} else if (!exclude.contains(child)) {
mounts.putAll(mountDirExclude(child, exclude));
}
return mounts;
}
@Override
public boolean willExecuteRemotely(boolean remotable) {
return false;
}
@Override
public String toString() {
return "sandboxed";
}
@Override
public boolean shouldPropagateExecException() {
return verboseFailures && sandboxOptions.sandboxDebug;
}
}