2015-04-09 10:12:50 +00:00
|
|
|
#include "download.hh"
|
|
|
|
#include "util.hh"
|
|
|
|
#include "globals.hh"
|
2015-05-05 15:09:42 +00:00
|
|
|
#include "hash.hh"
|
|
|
|
#include "store-api.hh"
|
2016-07-26 19:16:52 +00:00
|
|
|
#include "archive.hh"
|
2017-02-14 13:20:00 +00:00
|
|
|
#include "s3.hh"
|
2017-03-13 13:40:15 +00:00
|
|
|
#include "compression.hh"
|
2017-07-11 21:11:35 +00:00
|
|
|
#include "pathlocks.hh"
|
2018-03-27 22:01:47 +00:00
|
|
|
#include "finally.hh"
|
2019-09-11 13:25:43 +00:00
|
|
|
#include "tarfile.hh"
|
2017-03-13 13:40:15 +00:00
|
|
|
|
2017-03-03 21:12:17 +00:00
|
|
|
#ifdef ENABLE_S3
|
|
|
|
#include <aws/core/client/ClientConfiguration.h>
|
|
|
|
#endif
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
2015-04-09 10:12:50 +00:00
|
|
|
#include <curl/curl.h>
|
|
|
|
|
2018-01-31 21:34:19 +00:00
|
|
|
#include <algorithm>
|
2019-07-10 17:46:15 +00:00
|
|
|
#include <cmath>
|
2018-01-31 21:34:19 +00:00
|
|
|
#include <cstring>
|
|
|
|
#include <iostream>
|
|
|
|
#include <queue>
|
2019-07-10 17:46:15 +00:00
|
|
|
#include <random>
|
2018-01-31 21:34:19 +00:00
|
|
|
#include <thread>
|
2015-10-07 15:31:50 +00:00
|
|
|
|
2017-10-30 09:16:19 +00:00
|
|
|
using namespace std::string_literals;
|
|
|
|
|
2015-04-09 10:12:50 +00:00
|
|
|
namespace nix {
|
|
|
|
|
2019-06-17 06:43:45 +00:00
|
|
|
DownloadSettings downloadSettings;
|
2018-03-27 16:54:02 +00:00
|
|
|
|
|
|
|
static GlobalConfig::Register r1(&downloadSettings);
|
|
|
|
|
2019-11-06 16:30:48 +00:00
|
|
|
CachedDownloadRequest::CachedDownloadRequest(const std::string & uri)
|
|
|
|
: uri(uri), ttl(settings.tarballTtl)
|
|
|
|
{ }
|
|
|
|
|
2016-04-14 14:27:48 +00:00
|
|
|
std::string resolveUri(const std::string & uri)
|
|
|
|
{
|
|
|
|
if (uri.compare(0, 8, "channel:") == 0)
|
|
|
|
return "https://nixos.org/channels/" + std::string(uri, 8) + "/nixexprs.tar.xz";
|
|
|
|
else
|
|
|
|
return uri;
|
|
|
|
}
|
|
|
|
|
2016-02-29 17:15:20 +00:00
|
|
|
struct CurlDownloader : public Downloader
|
2015-04-09 10:12:50 +00:00
|
|
|
{
|
2016-09-14 14:00:40 +00:00
|
|
|
CURLM * curlm = 0;
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2019-07-10 17:46:15 +00:00
|
|
|
std::random_device rd;
|
|
|
|
std::mt19937 mt19937;
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
struct DownloadItem : public std::enable_shared_from_this<DownloadItem>
|
2015-04-09 10:12:50 +00:00
|
|
|
{
|
2016-09-14 14:00:40 +00:00
|
|
|
CurlDownloader & downloader;
|
|
|
|
DownloadRequest request;
|
|
|
|
DownloadResult result;
|
2017-05-16 14:09:57 +00:00
|
|
|
Activity act;
|
2016-09-16 16:54:14 +00:00
|
|
|
bool done = false; // whether either the success or failure function has been called
|
2018-03-27 20:16:01 +00:00
|
|
|
Callback<DownloadResult> callback;
|
2016-09-14 14:00:40 +00:00
|
|
|
CURL * req = 0;
|
|
|
|
bool active = false; // whether the handle has been added to the multi object
|
|
|
|
std::string status;
|
|
|
|
|
2019-07-10 17:46:15 +00:00
|
|
|
unsigned int attempt = 0;
|
|
|
|
|
|
|
|
/* Don't start this download until the specified time point
|
|
|
|
has been reached. */
|
|
|
|
std::chrono::steady_clock::time_point embargo;
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
struct curl_slist * requestHeaders = 0;
|
|
|
|
|
2017-03-13 13:40:15 +00:00
|
|
|
std::string encoding;
|
|
|
|
|
2019-07-10 21:12:17 +00:00
|
|
|
bool acceptRanges = false;
|
|
|
|
|
|
|
|
curl_off_t writtenToSink = 0;
|
|
|
|
|
2018-03-27 20:16:01 +00:00
|
|
|
DownloadItem(CurlDownloader & downloader,
|
|
|
|
const DownloadRequest & request,
|
2019-09-03 10:51:35 +00:00
|
|
|
Callback<DownloadResult> && callback)
|
2017-08-14 18:14:55 +00:00
|
|
|
: downloader(downloader)
|
|
|
|
, request(request)
|
2018-06-01 12:14:22 +00:00
|
|
|
, act(*logger, lvlTalkative, actDownload,
|
|
|
|
fmt(request.data ? "uploading '%s'" : "downloading '%s'", request.uri),
|
|
|
|
{request.uri}, request.parentAct)
|
2019-09-03 10:51:35 +00:00
|
|
|
, callback(std::move(callback))
|
2018-08-06 13:40:29 +00:00
|
|
|
, finalSink([this](const unsigned char * data, size_t len) {
|
2019-07-10 21:12:17 +00:00
|
|
|
if (this->request.dataCallback) {
|
|
|
|
writtenToSink += len;
|
2018-08-06 13:40:29 +00:00
|
|
|
this->request.dataCallback((char *) data, len);
|
2019-07-10 21:12:17 +00:00
|
|
|
} else
|
2018-08-06 13:40:29 +00:00
|
|
|
this->result.data->append((char *) data, len);
|
|
|
|
})
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
|
|
|
if (!request.expectedETag.empty())
|
|
|
|
requestHeaders = curl_slist_append(requestHeaders, ("If-None-Match: " + request.expectedETag).c_str());
|
2018-01-26 19:12:30 +00:00
|
|
|
if (!request.mimeType.empty())
|
|
|
|
requestHeaders = curl_slist_append(requestHeaders, ("Content-Type: " + request.mimeType).c_str());
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
~DownloadItem()
|
|
|
|
{
|
|
|
|
if (req) {
|
|
|
|
if (active)
|
|
|
|
curl_multi_remove_handle(downloader.curlm, req);
|
|
|
|
curl_easy_cleanup(req);
|
|
|
|
}
|
|
|
|
if (requestHeaders) curl_slist_free_all(requestHeaders);
|
|
|
|
try {
|
|
|
|
if (!done)
|
2017-07-30 11:27:57 +00:00
|
|
|
fail(DownloadError(Interrupted, format("download of '%s' was interrupted") % request.uri));
|
2016-09-14 14:00:40 +00:00
|
|
|
} catch (...) {
|
|
|
|
ignoreException();
|
|
|
|
}
|
|
|
|
}
|
2016-02-29 17:15:20 +00:00
|
|
|
|
2018-08-06 13:40:29 +00:00
|
|
|
void failEx(std::exception_ptr ex)
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
2016-09-16 16:54:14 +00:00
|
|
|
assert(!done);
|
2016-09-14 14:00:40 +00:00
|
|
|
done = true;
|
2018-08-06 13:40:29 +00:00
|
|
|
callback.rethrow(ex);
|
|
|
|
}
|
|
|
|
|
|
|
|
template<class T>
|
|
|
|
void fail(const T & e)
|
|
|
|
{
|
|
|
|
failEx(std::make_exception_ptr(e));
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
|
|
|
|
2018-08-06 13:40:29 +00:00
|
|
|
LambdaSink finalSink;
|
|
|
|
std::shared_ptr<CompressionSink> decompressionSink;
|
|
|
|
|
|
|
|
std::exception_ptr writeException;
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
size_t writeCallback(void * contents, size_t size, size_t nmemb)
|
|
|
|
{
|
2018-08-06 13:40:29 +00:00
|
|
|
try {
|
|
|
|
size_t realSize = size * nmemb;
|
|
|
|
result.bodySize += realSize;
|
|
|
|
|
|
|
|
if (!decompressionSink)
|
|
|
|
decompressionSink = makeDecompressionSink(encoding, finalSink);
|
|
|
|
|
|
|
|
(*decompressionSink)((unsigned char *) contents, realSize);
|
|
|
|
|
|
|
|
return realSize;
|
|
|
|
} catch (...) {
|
|
|
|
writeException = std::current_exception();
|
|
|
|
return 0;
|
|
|
|
}
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static size_t writeCallbackWrapper(void * contents, size_t size, size_t nmemb, void * userp)
|
|
|
|
{
|
|
|
|
return ((DownloadItem *) userp)->writeCallback(contents, size, nmemb);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t headerCallback(void * contents, size_t size, size_t nmemb)
|
|
|
|
{
|
|
|
|
size_t realSize = size * nmemb;
|
|
|
|
std::string line((char *) contents, realSize);
|
2017-07-30 11:27:57 +00:00
|
|
|
printMsg(lvlVomit, format("got header for '%s': %s") % request.uri % trim(line));
|
2016-09-14 14:00:40 +00:00
|
|
|
if (line.compare(0, 5, "HTTP/") == 0) { // new response starts
|
|
|
|
result.etag = "";
|
|
|
|
auto ss = tokenizeString<vector<string>>(line, " ");
|
|
|
|
status = ss.size() >= 2 ? ss[1] : "";
|
|
|
|
result.data = std::make_shared<std::string>();
|
2018-08-06 09:31:14 +00:00
|
|
|
result.bodySize = 0;
|
2019-07-10 21:12:17 +00:00
|
|
|
acceptRanges = false;
|
2017-03-13 13:40:15 +00:00
|
|
|
encoding = "";
|
2016-09-14 14:00:40 +00:00
|
|
|
} else {
|
|
|
|
auto i = line.find(':');
|
|
|
|
if (i != string::npos) {
|
|
|
|
string name = toLower(trim(string(line, 0, i)));
|
|
|
|
if (name == "etag") {
|
|
|
|
result.etag = trim(string(line, i + 1));
|
|
|
|
/* Hack to work around a GitHub bug: it sends
|
|
|
|
ETags, but ignores If-None-Match. So if we get
|
|
|
|
the expected ETag on a 200 response, then shut
|
|
|
|
down the connection because we already have the
|
|
|
|
data. */
|
|
|
|
if (result.etag == request.expectedETag && status == "200") {
|
|
|
|
debug(format("shutting down on 200 HTTP response with expected ETag"));
|
|
|
|
return 0;
|
|
|
|
}
|
2017-03-13 13:40:15 +00:00
|
|
|
} else if (name == "content-encoding")
|
2019-07-10 21:12:17 +00:00
|
|
|
encoding = trim(string(line, i + 1));
|
|
|
|
else if (name == "accept-ranges" && toLower(trim(std::string(line, i + 1))) == "bytes")
|
|
|
|
acceptRanges = true;
|
2015-04-09 10:12:50 +00:00
|
|
|
}
|
|
|
|
}
|
2016-09-14 14:00:40 +00:00
|
|
|
return realSize;
|
2015-04-09 10:12:50 +00:00
|
|
|
}
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
static size_t headerCallbackWrapper(void * contents, size_t size, size_t nmemb, void * userp)
|
|
|
|
{
|
|
|
|
return ((DownloadItem *) userp)->headerCallback(contents, size, nmemb);
|
|
|
|
}
|
2016-02-29 17:15:20 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
int progressCallback(double dltotal, double dlnow)
|
|
|
|
{
|
2017-11-30 17:38:12 +00:00
|
|
|
try {
|
|
|
|
act.progress(dlnow, dltotal);
|
|
|
|
} catch (nix::Interrupted &) {
|
|
|
|
assert(_isInterrupted);
|
|
|
|
}
|
2016-09-14 14:00:40 +00:00
|
|
|
return _isInterrupted;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int progressCallbackWrapper(void * userp, double dltotal, double dlnow, double ultotal, double ulnow)
|
|
|
|
{
|
|
|
|
return ((DownloadItem *) userp)->progressCallback(dltotal, dlnow);
|
|
|
|
}
|
|
|
|
|
2017-01-24 12:15:24 +00:00
|
|
|
static int debugCallback(CURL * handle, curl_infotype type, char * data, size_t size, void * userptr)
|
|
|
|
{
|
|
|
|
if (type == CURLINFO_TEXT)
|
|
|
|
vomit("curl: %s", chomp(std::string(data, size)));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-01-26 19:12:30 +00:00
|
|
|
size_t readOffset = 0;
|
2018-06-01 15:53:28 +00:00
|
|
|
size_t readCallback(char *buffer, size_t size, size_t nitems)
|
2018-01-26 19:12:30 +00:00
|
|
|
{
|
|
|
|
if (readOffset == request.data->length())
|
|
|
|
return 0;
|
|
|
|
auto count = std::min(size * nitems, request.data->length() - readOffset);
|
2018-03-15 03:53:43 +00:00
|
|
|
assert(count);
|
2018-01-26 19:12:30 +00:00
|
|
|
memcpy(buffer, request.data->data() + readOffset, count);
|
|
|
|
readOffset += count;
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
2018-06-01 15:53:28 +00:00
|
|
|
static size_t readCallbackWrapper(char *buffer, size_t size, size_t nitems, void * userp)
|
2018-01-26 19:12:30 +00:00
|
|
|
{
|
|
|
|
return ((DownloadItem *) userp)->readCallback(buffer, size, nitems);
|
|
|
|
}
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
void init()
|
|
|
|
{
|
|
|
|
if (!req) req = curl_easy_init();
|
|
|
|
|
|
|
|
curl_easy_reset(req);
|
2017-01-24 12:15:24 +00:00
|
|
|
|
|
|
|
if (verbosity >= lvlVomit) {
|
|
|
|
curl_easy_setopt(req, CURLOPT_VERBOSE, 1);
|
|
|
|
curl_easy_setopt(req, CURLOPT_DEBUGFUNCTION, DownloadItem::debugCallback);
|
|
|
|
}
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_URL, request.uri.c_str());
|
|
|
|
curl_easy_setopt(req, CURLOPT_FOLLOWLOCATION, 1L);
|
2018-06-18 08:36:19 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_MAXREDIRS, 10);
|
2016-09-14 14:00:40 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_NOSIGNAL, 1);
|
2017-05-11 13:09:09 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_USERAGENT,
|
|
|
|
("curl/" LIBCURL_VERSION " Nix/" + nixVersion +
|
2018-03-27 16:54:02 +00:00
|
|
|
(downloadSettings.userAgentSuffix != "" ? " " + downloadSettings.userAgentSuffix.get() : "")).c_str());
|
2016-10-14 12:44:15 +00:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x072b00
|
2016-09-14 14:00:40 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_PIPEWAIT, 1);
|
2016-10-04 12:43:23 +00:00
|
|
|
#endif
|
2016-10-14 12:44:15 +00:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x072f00
|
2018-03-27 16:54:02 +00:00
|
|
|
if (downloadSettings.enableHttp2)
|
2016-09-14 14:34:37 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_HTTP_VERSION, CURL_HTTP_VERSION_2TLS);
|
2019-06-28 14:13:22 +00:00
|
|
|
else
|
|
|
|
curl_easy_setopt(req, CURLOPT_HTTP_VERSION, CURL_HTTP_VERSION_1_1);
|
2016-10-04 12:43:23 +00:00
|
|
|
#endif
|
2016-09-14 14:00:40 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_WRITEFUNCTION, DownloadItem::writeCallbackWrapper);
|
|
|
|
curl_easy_setopt(req, CURLOPT_WRITEDATA, this);
|
|
|
|
curl_easy_setopt(req, CURLOPT_HEADERFUNCTION, DownloadItem::headerCallbackWrapper);
|
|
|
|
curl_easy_setopt(req, CURLOPT_HEADERDATA, this);
|
|
|
|
|
|
|
|
curl_easy_setopt(req, CURLOPT_PROGRESSFUNCTION, progressCallbackWrapper);
|
|
|
|
curl_easy_setopt(req, CURLOPT_PROGRESSDATA, this);
|
|
|
|
curl_easy_setopt(req, CURLOPT_NOPROGRESS, 0);
|
|
|
|
|
|
|
|
curl_easy_setopt(req, CURLOPT_HTTPHEADER, requestHeaders);
|
|
|
|
|
|
|
|
if (request.head)
|
|
|
|
curl_easy_setopt(req, CURLOPT_NOBODY, 1);
|
|
|
|
|
2018-01-26 19:12:30 +00:00
|
|
|
if (request.data) {
|
|
|
|
curl_easy_setopt(req, CURLOPT_UPLOAD, 1L);
|
|
|
|
curl_easy_setopt(req, CURLOPT_READFUNCTION, readCallbackWrapper);
|
|
|
|
curl_easy_setopt(req, CURLOPT_READDATA, this);
|
|
|
|
curl_easy_setopt(req, CURLOPT_INFILESIZE_LARGE, (curl_off_t) request.data->length());
|
|
|
|
}
|
|
|
|
|
2017-06-12 14:44:43 +00:00
|
|
|
if (request.verifyTLS) {
|
2019-10-12 13:00:19 +00:00
|
|
|
debug("verify TLS: Nix CA file = '%s'", settings.caFile);
|
2017-06-12 14:44:43 +00:00
|
|
|
if (settings.caFile != "")
|
|
|
|
curl_easy_setopt(req, CURLOPT_CAINFO, settings.caFile.c_str());
|
|
|
|
} else {
|
2016-09-14 14:00:40 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_SSL_VERIFYPEER, 0);
|
|
|
|
curl_easy_setopt(req, CURLOPT_SSL_VERIFYHOST, 0);
|
|
|
|
}
|
|
|
|
|
2018-03-27 16:54:02 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_CONNECTTIMEOUT, downloadSettings.connectTimeout.get());
|
2017-04-19 12:54:52 +00:00
|
|
|
|
2017-09-01 14:51:26 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_LOW_SPEED_LIMIT, 1L);
|
2019-08-07 19:14:40 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_LOW_SPEED_TIME, downloadSettings.stalledDownloadTimeout.get());
|
2017-09-01 14:51:26 +00:00
|
|
|
|
2017-02-09 17:16:09 +00:00
|
|
|
/* If no file exist in the specified path, curl continues to work
|
2017-02-16 13:46:36 +00:00
|
|
|
anyway as if netrc support was disabled. */
|
2017-04-13 18:53:23 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_NETRC_FILE, settings.netrcFile.get().c_str());
|
2017-02-01 12:37:34 +00:00
|
|
|
curl_easy_setopt(req, CURLOPT_NETRC, CURL_NETRC_OPTIONAL);
|
|
|
|
|
2019-07-10 21:12:17 +00:00
|
|
|
if (writtenToSink)
|
|
|
|
curl_easy_setopt(req, CURLOPT_RESUME_FROM_LARGE, writtenToSink);
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
result.data = std::make_shared<std::string>();
|
2018-08-06 09:31:14 +00:00
|
|
|
result.bodySize = 0;
|
2015-10-07 15:31:50 +00:00
|
|
|
}
|
2015-05-05 12:39:48 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
void finish(CURLcode code)
|
|
|
|
{
|
|
|
|
long httpStatus = 0;
|
|
|
|
curl_easy_getinfo(req, CURLINFO_RESPONSE_CODE, &httpStatus);
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2019-05-22 21:36:29 +00:00
|
|
|
char * effectiveUriCStr;
|
|
|
|
curl_easy_getinfo(req, CURLINFO_EFFECTIVE_URL, &effectiveUriCStr);
|
|
|
|
if (effectiveUriCStr)
|
|
|
|
result.effectiveUri = effectiveUriCStr;
|
2016-02-29 17:15:20 +00:00
|
|
|
|
2018-06-05 12:37:26 +00:00
|
|
|
debug("finished %s of '%s'; curl status = %d, HTTP status = %d, body = %d bytes",
|
2018-08-06 09:31:14 +00:00
|
|
|
request.verb(), request.uri, code, httpStatus, result.bodySize);
|
2016-02-29 17:15:20 +00:00
|
|
|
|
2019-06-24 19:06:37 +00:00
|
|
|
if (decompressionSink) {
|
|
|
|
try {
|
|
|
|
decompressionSink->finish();
|
|
|
|
} catch (...) {
|
|
|
|
writeException = std::current_exception();
|
|
|
|
}
|
|
|
|
}
|
2018-08-06 13:40:29 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
if (code == CURLE_WRITE_ERROR && result.etag == request.expectedETag) {
|
|
|
|
code = CURLE_OK;
|
|
|
|
httpStatus = 304;
|
|
|
|
}
|
|
|
|
|
2018-08-06 13:40:29 +00:00
|
|
|
if (writeException)
|
|
|
|
failEx(writeException);
|
|
|
|
|
|
|
|
else if (code == CURLE_OK &&
|
2019-07-10 21:12:17 +00:00
|
|
|
(httpStatus == 200 || httpStatus == 201 || httpStatus == 204 || httpStatus == 206 || httpStatus == 304 || httpStatus == 226 /* FTP */ || httpStatus == 0 /* other protocol */))
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
|
|
|
result.cached = httpStatus == 304;
|
2019-09-03 10:51:14 +00:00
|
|
|
act.progress(result.bodySize, result.bodySize);
|
2016-09-14 14:00:40 +00:00
|
|
|
done = true;
|
2019-09-03 10:51:14 +00:00
|
|
|
callback(std::move(result));
|
2018-08-06 13:40:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
else {
|
2017-09-25 19:36:01 +00:00
|
|
|
// We treat most errors as transient, but won't retry when hopeless
|
|
|
|
Error err = Transient;
|
|
|
|
|
2018-06-05 14:03:32 +00:00
|
|
|
if (httpStatus == 404 || httpStatus == 410 || code == CURLE_FILE_COULDNT_READ_FILE) {
|
2017-09-25 19:36:01 +00:00
|
|
|
// The file is definitely not there
|
|
|
|
err = NotFound;
|
|
|
|
} else if (httpStatus == 401 || httpStatus == 403 || httpStatus == 407) {
|
|
|
|
// Don't retry on authentication/authorization failures
|
|
|
|
err = Forbidden;
|
|
|
|
} else if (httpStatus >= 400 && httpStatus < 500 && httpStatus != 408) {
|
|
|
|
// Most 4xx errors are client errors and are probably not worth retrying:
|
|
|
|
// * 408 means the server timed out waiting for us, so we try again
|
|
|
|
err = Misc;
|
|
|
|
} else if (httpStatus == 501 || httpStatus == 505 || httpStatus == 511) {
|
|
|
|
// Let's treat most 5xx (server) errors as transient, except for a handful:
|
|
|
|
// * 501 not implemented
|
|
|
|
// * 505 http version not supported
|
|
|
|
// * 511 we're behind a captive portal
|
|
|
|
err = Misc;
|
|
|
|
} else {
|
|
|
|
// Don't bother retrying on certain cURL errors either
|
|
|
|
switch (code) {
|
|
|
|
case CURLE_FAILED_INIT:
|
2018-01-19 13:05:08 +00:00
|
|
|
case CURLE_URL_MALFORMAT:
|
2017-09-25 19:36:01 +00:00
|
|
|
case CURLE_NOT_BUILT_IN:
|
|
|
|
case CURLE_REMOTE_ACCESS_DENIED:
|
|
|
|
case CURLE_FILE_COULDNT_READ_FILE:
|
|
|
|
case CURLE_FUNCTION_NOT_FOUND:
|
|
|
|
case CURLE_ABORTED_BY_CALLBACK:
|
|
|
|
case CURLE_BAD_FUNCTION_ARGUMENT:
|
|
|
|
case CURLE_INTERFACE_FAILED:
|
|
|
|
case CURLE_UNKNOWN_OPTION:
|
2018-03-16 11:03:18 +00:00
|
|
|
case CURLE_SSL_CACERT_BADFILE:
|
2018-06-18 08:36:19 +00:00
|
|
|
case CURLE_TOO_MANY_REDIRECTS:
|
2018-08-06 13:40:29 +00:00
|
|
|
case CURLE_WRITE_ERROR:
|
2018-01-29 15:22:59 +00:00
|
|
|
err = Misc;
|
|
|
|
break;
|
2017-09-25 19:36:01 +00:00
|
|
|
default: // Shut up warnings
|
2018-01-29 15:22:59 +00:00
|
|
|
break;
|
2017-09-25 19:36:01 +00:00
|
|
|
}
|
|
|
|
}
|
2016-02-29 17:15:20 +00:00
|
|
|
|
2019-07-10 17:46:15 +00:00
|
|
|
attempt++;
|
|
|
|
|
|
|
|
auto exc =
|
2016-09-16 16:54:14 +00:00
|
|
|
code == CURLE_ABORTED_BY_CALLBACK && _isInterrupted
|
2018-06-05 12:37:26 +00:00
|
|
|
? DownloadError(Interrupted, fmt("%s of '%s' was interrupted", request.verb(), request.uri))
|
2016-09-16 16:54:14 +00:00
|
|
|
: httpStatus != 0
|
2018-06-01 12:14:22 +00:00
|
|
|
? DownloadError(err,
|
|
|
|
fmt("unable to %s '%s': HTTP error %d",
|
2018-06-05 12:37:26 +00:00
|
|
|
request.verb(), request.uri, httpStatus)
|
2018-06-01 12:14:22 +00:00
|
|
|
+ (code == CURLE_OK ? "" : fmt(" (curl error: %s)", curl_easy_strerror(code)))
|
|
|
|
)
|
|
|
|
: DownloadError(err,
|
|
|
|
fmt("unable to %s '%s': %s (%d)",
|
2019-07-10 17:46:15 +00:00
|
|
|
request.verb(), request.uri, curl_easy_strerror(code), code));
|
|
|
|
|
|
|
|
/* If this is a transient error, then maybe retry the
|
2019-07-10 21:12:17 +00:00
|
|
|
download after a while. If we're writing to a
|
|
|
|
sink, we can only retry if the server supports
|
|
|
|
ranged requests. */
|
|
|
|
if (err == Transient
|
|
|
|
&& attempt < request.tries
|
|
|
|
&& (!this->request.dataCallback
|
|
|
|
|| writtenToSink == 0
|
|
|
|
|| (acceptRanges && encoding.empty())))
|
|
|
|
{
|
2019-07-10 17:46:15 +00:00
|
|
|
int ms = request.baseRetryTimeMs * std::pow(2.0f, attempt - 1 + std::uniform_real_distribution<>(0.0, 0.5)(downloader.mt19937));
|
2019-07-10 21:12:17 +00:00
|
|
|
if (writtenToSink)
|
|
|
|
warn("%s; retrying from offset %d in %d ms", exc.what(), writtenToSink, ms);
|
|
|
|
else
|
|
|
|
warn("%s; retrying in %d ms", exc.what(), ms);
|
2019-07-10 17:46:15 +00:00
|
|
|
embargo = std::chrono::steady_clock::now() + std::chrono::milliseconds(ms);
|
|
|
|
downloader.enqueueItem(shared_from_this());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
fail(exc);
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
struct State
|
|
|
|
{
|
2019-07-10 17:46:15 +00:00
|
|
|
struct EmbargoComparator {
|
|
|
|
bool operator() (const std::shared_ptr<DownloadItem> & i1, const std::shared_ptr<DownloadItem> & i2) {
|
|
|
|
return i1->embargo > i2->embargo;
|
|
|
|
}
|
|
|
|
};
|
2016-09-14 14:00:40 +00:00
|
|
|
bool quit = false;
|
2019-07-10 17:46:15 +00:00
|
|
|
std::priority_queue<std::shared_ptr<DownloadItem>, std::vector<std::shared_ptr<DownloadItem>>, EmbargoComparator> incoming;
|
2016-09-14 14:00:40 +00:00
|
|
|
};
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
Sync<State> state_;
|
2015-05-05 12:39:48 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
/* We can't use a std::condition_variable to wake up the curl
|
|
|
|
thread, because it only monitors file descriptors. So use a
|
|
|
|
pipe instead. */
|
|
|
|
Pipe wakeupPipe;
|
2016-02-22 12:13:19 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
std::thread workerThread;
|
2015-10-21 13:03:29 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
CurlDownloader()
|
2019-07-10 17:46:15 +00:00
|
|
|
: mt19937(rd())
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
|
|
|
static std::once_flag globalInit;
|
|
|
|
std::call_once(globalInit, curl_global_init, CURL_GLOBAL_ALL);
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
curlm = curl_multi_init();
|
2015-10-21 12:59:01 +00:00
|
|
|
|
2017-12-10 01:02:21 +00:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x072b00 // Multiplex requires >= 7.43.0
|
2016-09-14 14:00:40 +00:00
|
|
|
curl_multi_setopt(curlm, CURLMOPT_PIPELINING, CURLPIPE_MULTIPLEX);
|
2016-10-04 12:43:23 +00:00
|
|
|
#endif
|
2017-12-10 01:02:21 +00:00
|
|
|
#if LIBCURL_VERSION_NUM >= 0x071e00 // Max connections requires >= 7.30.0
|
2016-09-14 14:34:37 +00:00
|
|
|
curl_multi_setopt(curlm, CURLMOPT_MAX_TOTAL_CONNECTIONS,
|
2018-03-27 16:54:02 +00:00
|
|
|
downloadSettings.httpConnections.get());
|
2017-12-10 01:02:21 +00:00
|
|
|
#endif
|
2016-09-14 14:34:37 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
wakeupPipe.create();
|
|
|
|
fcntl(wakeupPipe.readSide.get(), F_SETFL, O_NONBLOCK);
|
|
|
|
|
|
|
|
workerThread = std::thread([&]() { workerThreadEntry(); });
|
|
|
|
}
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
~CurlDownloader()
|
2017-01-17 17:21:02 +00:00
|
|
|
{
|
|
|
|
stopWorkerThread();
|
|
|
|
|
|
|
|
workerThread.join();
|
|
|
|
|
|
|
|
if (curlm) curl_multi_cleanup(curlm);
|
|
|
|
}
|
|
|
|
|
|
|
|
void stopWorkerThread()
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
|
|
|
/* Signal the worker thread to exit. */
|
|
|
|
{
|
|
|
|
auto state(state_.lock());
|
|
|
|
state->quit = true;
|
2015-04-09 10:12:50 +00:00
|
|
|
}
|
2017-01-17 17:21:02 +00:00
|
|
|
writeFull(wakeupPipe.writeSide.get(), " ", false);
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
2016-02-29 17:15:20 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
void workerThreadMain()
|
|
|
|
{
|
2017-01-17 17:21:02 +00:00
|
|
|
/* Cause this thread to be notified on SIGINT. */
|
|
|
|
auto callback = createInterruptCallback([&]() {
|
|
|
|
stopWorkerThread();
|
|
|
|
});
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
std::map<CURL *, std::shared_ptr<DownloadItem>> items;
|
|
|
|
|
2016-10-19 13:02:38 +00:00
|
|
|
bool quit = false;
|
2016-09-14 14:00:40 +00:00
|
|
|
|
|
|
|
std::chrono::steady_clock::time_point nextWakeup;
|
|
|
|
|
|
|
|
while (!quit) {
|
|
|
|
checkInterrupt();
|
|
|
|
|
|
|
|
/* Let curl do its thing. */
|
|
|
|
int running;
|
|
|
|
CURLMcode mc = curl_multi_perform(curlm, &running);
|
|
|
|
if (mc != CURLM_OK)
|
|
|
|
throw nix::Error(format("unexpected error from curl_multi_perform(): %s") % curl_multi_strerror(mc));
|
|
|
|
|
|
|
|
/* Set the promises of any finished requests. */
|
|
|
|
CURLMsg * msg;
|
|
|
|
int left;
|
|
|
|
while ((msg = curl_multi_info_read(curlm, &left))) {
|
|
|
|
if (msg->msg == CURLMSG_DONE) {
|
|
|
|
auto i = items.find(msg->easy_handle);
|
|
|
|
assert(i != items.end());
|
|
|
|
i->second->finish(msg->data.result);
|
|
|
|
curl_multi_remove_handle(curlm, i->second->req);
|
|
|
|
i->second->active = false;
|
|
|
|
items.erase(i);
|
|
|
|
}
|
|
|
|
}
|
2015-10-07 15:31:50 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
/* Wait for activity, including wakeup events. */
|
|
|
|
int numfds = 0;
|
|
|
|
struct curl_waitfd extraFDs[1];
|
|
|
|
extraFDs[0].fd = wakeupPipe.readSide.get();
|
|
|
|
extraFDs[0].events = CURL_WAIT_POLLIN;
|
|
|
|
extraFDs[0].revents = 0;
|
2018-05-24 21:23:05 +00:00
|
|
|
long maxSleepTimeMs = items.empty() ? 10000 : 100;
|
2016-09-14 14:00:40 +00:00
|
|
|
auto sleepTimeMs =
|
|
|
|
nextWakeup != std::chrono::steady_clock::time_point()
|
|
|
|
? std::max(0, (int) std::chrono::duration_cast<std::chrono::milliseconds>(nextWakeup - std::chrono::steady_clock::now()).count())
|
2018-05-24 21:23:05 +00:00
|
|
|
: maxSleepTimeMs;
|
2017-01-24 12:15:24 +00:00
|
|
|
vomit("download thread waiting for %d ms", sleepTimeMs);
|
2016-09-14 14:00:40 +00:00
|
|
|
mc = curl_multi_wait(curlm, extraFDs, 1, sleepTimeMs, &numfds);
|
|
|
|
if (mc != CURLM_OK)
|
|
|
|
throw nix::Error(format("unexpected error from curl_multi_wait(): %s") % curl_multi_strerror(mc));
|
|
|
|
|
|
|
|
nextWakeup = std::chrono::steady_clock::time_point();
|
|
|
|
|
2019-07-10 17:46:15 +00:00
|
|
|
/* Add new curl requests from the incoming requests queue,
|
|
|
|
except for requests that are embargoed (waiting for a
|
|
|
|
retry timeout to expire). */
|
2016-09-14 14:00:40 +00:00
|
|
|
if (extraFDs[0].revents & CURL_WAIT_POLLIN) {
|
|
|
|
char buf[1024];
|
|
|
|
auto res = read(extraFDs[0].fd, buf, sizeof(buf));
|
|
|
|
if (res == -1 && errno != EINTR)
|
|
|
|
throw SysError("reading curl wakeup socket");
|
|
|
|
}
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2016-10-17 21:11:04 +00:00
|
|
|
std::vector<std::shared_ptr<DownloadItem>> incoming;
|
2019-07-10 17:46:15 +00:00
|
|
|
auto now = std::chrono::steady_clock::now();
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
|
|
|
auto state(state_.lock());
|
2019-07-10 17:46:15 +00:00
|
|
|
while (!state->incoming.empty()) {
|
|
|
|
auto item = state->incoming.top();
|
|
|
|
if (item->embargo <= now) {
|
|
|
|
incoming.push_back(item);
|
|
|
|
state->incoming.pop();
|
|
|
|
} else {
|
|
|
|
if (nextWakeup == std::chrono::steady_clock::time_point()
|
|
|
|
|| item->embargo < nextWakeup)
|
|
|
|
nextWakeup = item->embargo;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2016-09-14 14:00:40 +00:00
|
|
|
quit = state->quit;
|
|
|
|
}
|
2016-08-11 15:34:43 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
for (auto & item : incoming) {
|
2018-06-05 12:37:26 +00:00
|
|
|
debug("starting %s of %s", item->request.verb(), item->request.uri);
|
2016-09-14 14:00:40 +00:00
|
|
|
item->init();
|
|
|
|
curl_multi_add_handle(curlm, item->req);
|
|
|
|
item->active = true;
|
|
|
|
items[item->req] = item;
|
|
|
|
}
|
|
|
|
}
|
2015-04-09 10:12:50 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
debug("download thread shutting down");
|
2015-04-09 10:12:50 +00:00
|
|
|
}
|
2016-02-29 17:15:20 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
void workerThreadEntry()
|
2016-02-29 17:15:20 +00:00
|
|
|
{
|
2016-09-14 14:00:40 +00:00
|
|
|
try {
|
|
|
|
workerThreadMain();
|
2016-09-16 16:54:14 +00:00
|
|
|
} catch (nix::Interrupted & e) {
|
2016-09-14 14:00:40 +00:00
|
|
|
} catch (std::exception & e) {
|
2019-07-10 20:27:50 +00:00
|
|
|
printError("unexpected error in download thread: %s", e.what());
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
2016-08-10 14:06:33 +00:00
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
|
|
|
auto state(state_.lock());
|
2019-07-10 17:46:15 +00:00
|
|
|
while (!state->incoming.empty()) state->incoming.pop();
|
2016-09-14 14:00:40 +00:00
|
|
|
state->quit = true;
|
2016-08-10 14:06:33 +00:00
|
|
|
}
|
2016-02-29 17:15:20 +00:00
|
|
|
}
|
2016-09-14 14:00:40 +00:00
|
|
|
|
|
|
|
void enqueueItem(std::shared_ptr<DownloadItem> item)
|
|
|
|
{
|
2018-06-05 12:44:26 +00:00
|
|
|
if (item->request.data
|
|
|
|
&& !hasPrefix(item->request.uri, "http://")
|
|
|
|
&& !hasPrefix(item->request.uri, "https://"))
|
|
|
|
throw nix::Error("uploading to '%s' is not supported", item->request.uri);
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
|
|
|
auto state(state_.lock());
|
|
|
|
if (state->quit)
|
|
|
|
throw nix::Error("cannot enqueue download request because the download thread is shutting down");
|
2019-07-10 17:46:15 +00:00
|
|
|
state->incoming.push(item);
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
|
|
|
writeFull(wakeupPipe.writeSide.get(), " ");
|
|
|
|
}
|
|
|
|
|
2019-02-25 16:56:52 +00:00
|
|
|
#ifdef ENABLE_S3
|
|
|
|
std::tuple<std::string, std::string, Store::Params> parseS3Uri(std::string uri)
|
|
|
|
{
|
|
|
|
auto [path, params] = splitUriAndParams(uri);
|
|
|
|
|
|
|
|
auto slash = path.find('/', 5); // 5 is the length of "s3://" prefix
|
2019-02-26 10:04:18 +00:00
|
|
|
if (slash == std::string::npos)
|
|
|
|
throw nix::Error("bad S3 URI '%s'", path);
|
2019-02-25 16:56:52 +00:00
|
|
|
|
|
|
|
std::string bucketName(path, 5, slash - 5);
|
|
|
|
std::string key(path, slash + 1);
|
|
|
|
|
|
|
|
return {bucketName, key, params};
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
void enqueueDownload(const DownloadRequest & request,
|
2018-03-27 20:16:01 +00:00
|
|
|
Callback<DownloadResult> callback) override
|
2016-09-14 14:00:40 +00:00
|
|
|
{
|
2017-02-14 13:20:00 +00:00
|
|
|
/* Ugly hack to support s3:// URIs. */
|
|
|
|
if (hasPrefix(request.uri, "s3://")) {
|
|
|
|
// FIXME: do this on a worker thread
|
2018-03-27 20:16:01 +00:00
|
|
|
try {
|
2017-02-14 13:20:00 +00:00
|
|
|
#ifdef ENABLE_S3
|
2019-02-25 16:56:52 +00:00
|
|
|
auto [bucketName, key, params] = parseS3Uri(request.uri);
|
2019-02-21 13:26:50 +00:00
|
|
|
|
|
|
|
std::string profile = get(params, "profile", "");
|
|
|
|
std::string region = get(params, "region", Aws::Region::US_EAST_1);
|
|
|
|
std::string scheme = get(params, "scheme", "");
|
|
|
|
std::string endpoint = get(params, "endpoint", "");
|
|
|
|
|
|
|
|
S3Helper s3Helper(profile, region, scheme, endpoint);
|
|
|
|
|
2017-02-14 13:20:00 +00:00
|
|
|
// FIXME: implement ETag
|
|
|
|
auto s3Res = s3Helper.getObject(bucketName, key);
|
|
|
|
DownloadResult res;
|
|
|
|
if (!s3Res.data)
|
2017-07-30 11:27:57 +00:00
|
|
|
throw DownloadError(NotFound, fmt("S3 object '%s' does not exist", request.uri));
|
2017-02-14 13:20:00 +00:00
|
|
|
res.data = s3Res.data;
|
2018-03-27 20:16:01 +00:00
|
|
|
callback(std::move(res));
|
2017-02-14 13:20:00 +00:00
|
|
|
#else
|
2017-07-30 11:27:57 +00:00
|
|
|
throw nix::Error("cannot download '%s' because Nix is not built with S3 support", request.uri);
|
2017-02-14 13:20:00 +00:00
|
|
|
#endif
|
2018-03-27 20:16:01 +00:00
|
|
|
} catch (...) { callback.rethrow(); }
|
2017-02-14 13:20:00 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-03 10:51:35 +00:00
|
|
|
enqueueItem(std::make_shared<DownloadItem>(*this, request, std::move(callback)));
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
2015-04-09 10:12:50 +00:00
|
|
|
};
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
ref<Downloader> getDownloader()
|
|
|
|
{
|
2018-03-28 11:16:27 +00:00
|
|
|
static ref<Downloader> downloader = makeDownloader();
|
|
|
|
return downloader;
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
|
|
|
|
2016-02-29 17:15:20 +00:00
|
|
|
ref<Downloader> makeDownloader()
|
2015-04-09 10:12:50 +00:00
|
|
|
{
|
2016-02-29 17:15:20 +00:00
|
|
|
return make_ref<CurlDownloader>();
|
2015-04-09 10:12:50 +00:00
|
|
|
}
|
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
std::future<DownloadResult> Downloader::enqueueDownload(const DownloadRequest & request)
|
|
|
|
{
|
|
|
|
auto promise = std::make_shared<std::promise<DownloadResult>>();
|
|
|
|
enqueueDownload(request,
|
2018-03-27 20:16:01 +00:00
|
|
|
{[promise](std::future<DownloadResult> fut) {
|
|
|
|
try {
|
|
|
|
promise->set_value(fut.get());
|
|
|
|
} catch (...) {
|
|
|
|
promise->set_exception(std::current_exception());
|
|
|
|
}
|
|
|
|
}});
|
2016-09-16 16:54:14 +00:00
|
|
|
return promise->get_future();
|
|
|
|
}
|
|
|
|
|
2016-09-14 14:00:40 +00:00
|
|
|
DownloadResult Downloader::download(const DownloadRequest & request)
|
|
|
|
{
|
2019-07-10 17:46:15 +00:00
|
|
|
return enqueueDownload(request).get();
|
2016-09-14 14:00:40 +00:00
|
|
|
}
|
|
|
|
|
2018-03-27 22:01:47 +00:00
|
|
|
void Downloader::download(DownloadRequest && request, Sink & sink)
|
|
|
|
{
|
|
|
|
/* Note: we can't call 'sink' via request.dataCallback, because
|
|
|
|
that would cause the sink to execute on the downloader
|
|
|
|
thread. If 'sink' is a coroutine, this will fail. Also, if the
|
|
|
|
sink is expensive (e.g. one that does decompression and writing
|
|
|
|
to the Nix store), it would stall the download thread too much.
|
|
|
|
Therefore we use a buffer to communicate data between the
|
|
|
|
download thread and the calling thread. */
|
|
|
|
|
|
|
|
struct State {
|
|
|
|
bool quit = false;
|
|
|
|
std::exception_ptr exc;
|
|
|
|
std::string data;
|
|
|
|
std::condition_variable avail, request;
|
|
|
|
};
|
|
|
|
|
|
|
|
auto _state = std::make_shared<Sync<State>>();
|
|
|
|
|
|
|
|
/* In case of an exception, wake up the download thread. FIXME:
|
|
|
|
abort the download request. */
|
|
|
|
Finally finally([&]() {
|
|
|
|
auto state(_state->lock());
|
|
|
|
state->quit = true;
|
|
|
|
state->request.notify_one();
|
|
|
|
});
|
|
|
|
|
|
|
|
request.dataCallback = [_state](char * buf, size_t len) {
|
|
|
|
|
|
|
|
auto state(_state->lock());
|
|
|
|
|
|
|
|
if (state->quit) return;
|
|
|
|
|
|
|
|
/* If the buffer is full, then go to sleep until the calling
|
|
|
|
thread wakes us up (i.e. when it has removed data from the
|
2018-09-26 19:43:17 +00:00
|
|
|
buffer). We don't wait forever to prevent stalling the
|
|
|
|
download thread. (Hopefully sleeping will throttle the
|
|
|
|
sender.) */
|
|
|
|
if (state->data.size() > 1024 * 1024) {
|
2018-03-27 22:01:47 +00:00
|
|
|
debug("download buffer is full; going to sleep");
|
2018-09-26 19:43:17 +00:00
|
|
|
state.wait_for(state->request, std::chrono::seconds(10));
|
2018-03-27 22:01:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Append data to the buffer and wake up the calling
|
|
|
|
thread. */
|
|
|
|
state->data.append(buf, len);
|
|
|
|
state->avail.notify_one();
|
|
|
|
};
|
|
|
|
|
|
|
|
enqueueDownload(request,
|
|
|
|
{[_state](std::future<DownloadResult> fut) {
|
|
|
|
auto state(_state->lock());
|
|
|
|
state->quit = true;
|
|
|
|
try {
|
|
|
|
fut.get();
|
|
|
|
} catch (...) {
|
|
|
|
state->exc = std::current_exception();
|
|
|
|
}
|
|
|
|
state->avail.notify_one();
|
|
|
|
state->request.notify_one();
|
|
|
|
}});
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
checkInterrupt();
|
|
|
|
|
2018-09-26 19:43:17 +00:00
|
|
|
std::string chunk;
|
|
|
|
|
|
|
|
/* Grab data if available, otherwise wait for the download
|
|
|
|
thread to wake us up. */
|
|
|
|
{
|
|
|
|
auto state(_state->lock());
|
|
|
|
|
|
|
|
while (state->data.empty()) {
|
2018-07-31 15:26:04 +00:00
|
|
|
|
2018-09-26 19:43:17 +00:00
|
|
|
if (state->quit) {
|
|
|
|
if (state->exc) std::rethrow_exception(state->exc);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
state.wait(state->avail);
|
2018-07-31 15:26:04 +00:00
|
|
|
}
|
|
|
|
|
2018-09-26 19:43:17 +00:00
|
|
|
chunk = std::move(state->data);
|
2018-03-27 22:01:47 +00:00
|
|
|
|
|
|
|
state->request.notify_one();
|
|
|
|
}
|
2018-09-26 19:43:17 +00:00
|
|
|
|
|
|
|
/* Flush the data to the sink and wake up the download thread
|
|
|
|
if it's blocked on a full buffer. We don't hold the state
|
|
|
|
lock while doing this to prevent blocking the download
|
|
|
|
thread if sink() takes a long time. */
|
|
|
|
sink((unsigned char *) chunk.data(), chunk.size());
|
2018-03-27 22:01:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-22 21:36:29 +00:00
|
|
|
CachedDownloadResult Downloader::downloadCached(
|
|
|
|
ref<Store> store, const CachedDownloadRequest & request)
|
2015-05-05 15:09:42 +00:00
|
|
|
{
|
2019-05-22 21:36:29 +00:00
|
|
|
auto url = resolveUri(request.uri);
|
2016-04-14 14:27:48 +00:00
|
|
|
|
2019-05-22 21:36:29 +00:00
|
|
|
auto name = request.name;
|
2016-08-15 11:37:11 +00:00
|
|
|
if (name == "") {
|
|
|
|
auto p = url.rfind('/');
|
|
|
|
if (p != string::npos) name = string(url, p + 1);
|
|
|
|
}
|
2016-07-26 19:16:52 +00:00
|
|
|
|
|
|
|
Path expectedStorePath;
|
2019-05-22 21:36:29 +00:00
|
|
|
if (request.expectedHash) {
|
|
|
|
expectedStorePath = store->makeFixedOutputPath(request.unpack, request.expectedHash, name);
|
2019-02-25 15:20:50 +00:00
|
|
|
if (store->isValidPath(expectedStorePath)) {
|
|
|
|
CachedDownloadResult result;
|
2019-05-15 13:38:24 +00:00
|
|
|
result.storePath = expectedStorePath;
|
2019-02-25 15:20:50 +00:00
|
|
|
result.path = store->toRealPath(expectedStorePath);
|
2019-05-28 20:35:41 +00:00
|
|
|
assert(!request.getLastModified); // FIXME
|
2019-02-25 15:20:50 +00:00
|
|
|
return result;
|
|
|
|
}
|
2016-07-26 19:16:52 +00:00
|
|
|
}
|
|
|
|
|
2016-04-20 12:12:38 +00:00
|
|
|
Path cacheDir = getCacheDir() + "/nix/tarballs";
|
2015-05-05 15:09:42 +00:00
|
|
|
createDirs(cacheDir);
|
|
|
|
|
2017-10-30 09:16:19 +00:00
|
|
|
string urlHash = hashString(htSHA256, name + std::string("\0"s) + url).to_string(Base32, false);
|
2015-05-05 15:09:42 +00:00
|
|
|
|
|
|
|
Path dataFile = cacheDir + "/" + urlHash + ".info";
|
|
|
|
Path fileLink = cacheDir + "/" + urlHash + "-file";
|
|
|
|
|
2017-07-30 11:27:57 +00:00
|
|
|
PathLocks lock({fileLink}, fmt("waiting for lock on '%1%'...", fileLink));
|
2017-07-11 21:11:35 +00:00
|
|
|
|
2015-05-05 15:09:42 +00:00
|
|
|
Path storePath;
|
|
|
|
|
|
|
|
string expectedETag;
|
|
|
|
|
|
|
|
bool skip = false;
|
|
|
|
|
2019-02-25 15:20:50 +00:00
|
|
|
CachedDownloadResult result;
|
|
|
|
|
2015-05-05 15:09:42 +00:00
|
|
|
if (pathExists(fileLink) && pathExists(dataFile)) {
|
|
|
|
storePath = readLink(fileLink);
|
|
|
|
store->addTempRoot(storePath);
|
|
|
|
if (store->isValidPath(storePath)) {
|
|
|
|
auto ss = tokenizeString<vector<string>>(readFile(dataFile), "\n");
|
|
|
|
if (ss.size() >= 3 && ss[0] == url) {
|
|
|
|
time_t lastChecked;
|
2019-06-21 10:49:18 +00:00
|
|
|
if (string2Int(ss[2], lastChecked) && (uint64_t) lastChecked + request.ttl >= (uint64_t) time(0)) {
|
2015-05-05 15:09:42 +00:00
|
|
|
skip = true;
|
2019-05-22 21:36:29 +00:00
|
|
|
result.effectiveUri = request.uri;
|
2019-02-25 15:20:50 +00:00
|
|
|
result.etag = ss[1];
|
2016-08-11 15:34:43 +00:00
|
|
|
} else if (!ss[1].empty()) {
|
2017-07-30 11:27:57 +00:00
|
|
|
debug(format("verifying previous ETag '%1%'") % ss[1]);
|
2015-05-05 15:09:42 +00:00
|
|
|
expectedETag = ss[1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
storePath = "";
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!skip) {
|
|
|
|
|
|
|
|
try {
|
2019-05-22 21:36:29 +00:00
|
|
|
DownloadRequest request2(url);
|
|
|
|
request2.expectedETag = expectedETag;
|
|
|
|
auto res = download(request2);
|
|
|
|
result.effectiveUri = res.effectiveUri;
|
2019-02-25 15:20:50 +00:00
|
|
|
result.etag = res.etag;
|
2015-05-05 15:09:42 +00:00
|
|
|
|
2016-07-26 19:16:52 +00:00
|
|
|
if (!res.cached) {
|
|
|
|
ValidPathInfo info;
|
|
|
|
StringSink sink;
|
|
|
|
dumpString(*res.data, sink);
|
2019-05-22 21:36:29 +00:00
|
|
|
Hash hash = hashString(request.expectedHash ? request.expectedHash.type : htSHA256, *res.data);
|
2016-07-26 19:25:52 +00:00
|
|
|
info.path = store->makeFixedOutputPath(false, hash, name);
|
2016-07-26 19:16:52 +00:00
|
|
|
info.narHash = hashString(htSHA256, *sink.s);
|
2017-05-11 11:26:03 +00:00
|
|
|
info.narSize = sink.s->size();
|
2017-02-22 15:31:04 +00:00
|
|
|
info.ca = makeFixedOutputCA(false, hash);
|
2017-06-28 16:11:01 +00:00
|
|
|
store->addToStore(info, sink.s, NoRepair, NoCheckSigs);
|
2016-07-26 19:16:52 +00:00
|
|
|
storePath = info.path;
|
|
|
|
}
|
2015-05-05 15:09:42 +00:00
|
|
|
|
|
|
|
assert(!storePath.empty());
|
|
|
|
replaceSymlink(storePath, fileLink);
|
|
|
|
|
2015-10-29 12:26:55 +00:00
|
|
|
writeFile(dataFile, url + "\n" + res.etag + "\n" + std::to_string(time(0)) + "\n");
|
2015-05-05 15:09:42 +00:00
|
|
|
} catch (DownloadError & e) {
|
|
|
|
if (storePath.empty()) throw;
|
2019-07-10 20:27:50 +00:00
|
|
|
warn("warning: %s; using cached result", e.msg());
|
2019-02-25 15:20:50 +00:00
|
|
|
result.etag = expectedETag;
|
2015-05-05 15:09:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-22 21:36:29 +00:00
|
|
|
if (request.unpack) {
|
2015-05-05 15:09:42 +00:00
|
|
|
Path unpackedLink = cacheDir + "/" + baseNameOf(storePath) + "-unpacked";
|
2017-07-30 11:27:57 +00:00
|
|
|
PathLocks lock2({unpackedLink}, fmt("waiting for lock on '%1%'...", unpackedLink));
|
2015-05-05 15:09:42 +00:00
|
|
|
Path unpackedStorePath;
|
|
|
|
if (pathExists(unpackedLink)) {
|
|
|
|
unpackedStorePath = readLink(unpackedLink);
|
|
|
|
store->addTempRoot(unpackedStorePath);
|
|
|
|
if (!store->isValidPath(unpackedStorePath))
|
|
|
|
unpackedStorePath = "";
|
2019-05-28 20:35:41 +00:00
|
|
|
else
|
|
|
|
result.lastModified = lstat(unpackedLink).st_mtime;
|
2015-05-05 15:09:42 +00:00
|
|
|
}
|
|
|
|
if (unpackedStorePath.empty()) {
|
2019-09-11 13:25:43 +00:00
|
|
|
printInfo("unpacking '%s'...", url);
|
2015-05-05 15:09:42 +00:00
|
|
|
Path tmpDir = createTempDir();
|
|
|
|
AutoDelete autoDelete(tmpDir, true);
|
2019-09-11 13:25:43 +00:00
|
|
|
unpackTarfile(store->toRealPath(storePath), tmpDir, baseNameOf(url));
|
2019-05-28 20:35:41 +00:00
|
|
|
auto members = readDirectory(tmpDir);
|
|
|
|
if (members.size() != 1)
|
|
|
|
throw nix::Error("tarball '%s' contains an unexpected number of top-level files", url);
|
|
|
|
auto topDir = tmpDir + "/" + members.begin()->name;
|
|
|
|
result.lastModified = lstat(topDir).st_mtime;
|
|
|
|
unpackedStorePath = store->addToStore(name, topDir, true, htSHA256, defaultPathFilter, NoRepair);
|
2015-05-05 15:09:42 +00:00
|
|
|
}
|
2019-05-28 20:35:41 +00:00
|
|
|
// Store the last-modified date of the tarball in the symlink
|
|
|
|
// mtime. This saves us from having to store it somewhere
|
|
|
|
// else.
|
|
|
|
replaceSymlink(unpackedStorePath, unpackedLink, result.lastModified);
|
2016-07-26 19:16:52 +00:00
|
|
|
storePath = unpackedStorePath;
|
2015-05-05 15:09:42 +00:00
|
|
|
}
|
|
|
|
|
2018-03-22 14:56:54 +00:00
|
|
|
if (expectedStorePath != "" && storePath != expectedStorePath) {
|
2019-07-01 22:12:12 +00:00
|
|
|
unsigned int statusCode = 102;
|
2019-05-22 21:36:29 +00:00
|
|
|
Hash gotHash = request.unpack
|
|
|
|
? hashPath(request.expectedHash.type, store->toRealPath(storePath)).first
|
|
|
|
: hashFile(request.expectedHash.type, store->toRealPath(storePath));
|
2019-07-01 22:12:12 +00:00
|
|
|
throw nix::Error(statusCode, "hash mismatch in file downloaded from '%s':\n wanted: %s\n got: %s",
|
2019-05-22 21:36:29 +00:00
|
|
|
url, request.expectedHash.to_string(), gotHash.to_string());
|
2018-03-22 14:56:54 +00:00
|
|
|
}
|
2016-07-26 19:16:52 +00:00
|
|
|
|
2019-05-22 21:43:58 +00:00
|
|
|
if (request.gcRoot)
|
|
|
|
store->addIndirectRoot(fileLink);
|
|
|
|
|
2019-05-15 13:38:24 +00:00
|
|
|
result.storePath = storePath;
|
2019-02-25 15:20:50 +00:00
|
|
|
result.path = store->toRealPath(storePath);
|
|
|
|
return result;
|
2015-05-05 15:09:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-05-06 12:54:31 +00:00
|
|
|
bool isUri(const string & s)
|
|
|
|
{
|
2016-04-14 14:27:48 +00:00
|
|
|
if (s.compare(0, 8, "channel:") == 0) return true;
|
2015-05-06 12:54:31 +00:00
|
|
|
size_t pos = s.find("://");
|
|
|
|
if (pos == string::npos) return false;
|
|
|
|
string scheme(s, 0, pos);
|
2017-11-01 15:32:53 +00:00
|
|
|
return scheme == "http" || scheme == "https" || scheme == "file" || scheme == "channel" || scheme == "git" || scheme == "s3" || scheme == "ssh";
|
2015-05-06 12:54:31 +00:00
|
|
|
}
|
|
|
|
|
2019-07-10 17:46:15 +00:00
|
|
|
|
2015-04-09 10:12:50 +00:00
|
|
|
}
|