2006-11-30 19:54:43 +00:00
|
|
|
#include "serialise.hh"
|
|
|
|
#include "util.hh"
|
2006-11-30 18:35:50 +00:00
|
|
|
#include "remote-store.hh"
|
2006-11-30 20:13:59 +00:00
|
|
|
#include "worker-protocol.hh"
|
2006-11-30 20:45:20 +00:00
|
|
|
#include "archive.hh"
|
2006-12-04 13:09:16 +00:00
|
|
|
#include "globals.hh"
|
2006-11-30 18:35:50 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2006-12-03 02:36:44 +00:00
|
|
|
#include <sys/socket.h>
|
2006-12-04 14:21:39 +00:00
|
|
|
#include <sys/un.h>
|
2006-12-03 02:08:13 +00:00
|
|
|
#include <fcntl.h>
|
|
|
|
|
2006-11-30 19:54:43 +00:00
|
|
|
#include <iostream>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2006-11-30 18:35:50 +00:00
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
|
2006-12-05 01:31:45 +00:00
|
|
|
Path readStorePath(Source & from)
|
|
|
|
{
|
|
|
|
Path path = readString(from);
|
|
|
|
assertStorePath(path);
|
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
PathSet readStorePaths(Source & from)
|
|
|
|
{
|
|
|
|
PathSet paths = readStringSet(from);
|
|
|
|
for (PathSet::iterator i = paths.begin(); i != paths.end(); ++i)
|
|
|
|
assertStorePath(*i);
|
|
|
|
return paths;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 18:35:50 +00:00
|
|
|
RemoteStore::RemoteStore()
|
2006-12-04 13:28:14 +00:00
|
|
|
{
|
|
|
|
string remoteMode = getEnv("NIX_REMOTE");
|
|
|
|
|
|
|
|
if (remoteMode == "slave")
|
|
|
|
/* Fork off a setuid worker to do the privileged work. */
|
|
|
|
forkSlave();
|
|
|
|
else if (remoteMode == "daemon")
|
|
|
|
/* Connect to a daemon that does the privileged work for
|
|
|
|
us. */
|
2006-12-04 14:21:39 +00:00
|
|
|
connectToDaemon();
|
2006-12-04 13:28:14 +00:00
|
|
|
else
|
|
|
|
throw Error(format("invalid setting for NIX_REMOTE, `%1%'")
|
|
|
|
% remoteMode);
|
|
|
|
|
2006-12-04 14:21:39 +00:00
|
|
|
from.fd = fdSocket;
|
|
|
|
to.fd = fdSocket;
|
|
|
|
|
2006-12-04 13:28:14 +00:00
|
|
|
|
|
|
|
/* Send the magic greeting, check for the reply. */
|
|
|
|
try {
|
|
|
|
writeInt(WORKER_MAGIC_1, to);
|
2006-12-04 17:17:13 +00:00
|
|
|
writeInt(verbosity, to);
|
2006-12-04 13:28:14 +00:00
|
|
|
unsigned int magic = readInt(from);
|
|
|
|
if (magic != WORKER_MAGIC_2) throw Error("protocol mismatch");
|
2006-12-04 17:17:13 +00:00
|
|
|
processStderr();
|
2006-12-04 13:28:14 +00:00
|
|
|
} catch (Error & e) {
|
|
|
|
throw Error(format("cannot start worker (%1%)")
|
|
|
|
% e.msg());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void RemoteStore::forkSlave()
|
2006-11-30 18:35:50 +00:00
|
|
|
{
|
2006-12-03 02:36:44 +00:00
|
|
|
int sockets[2];
|
|
|
|
if (socketpair(AF_UNIX, SOCK_STREAM, 0, sockets) == -1)
|
|
|
|
throw SysError("cannot create sockets");
|
2006-11-30 19:54:43 +00:00
|
|
|
|
2006-12-04 14:21:39 +00:00
|
|
|
fdSocket = sockets[0];
|
2006-12-03 02:36:44 +00:00
|
|
|
AutoCloseFD fdChild = sockets[1];
|
2006-11-30 19:54:43 +00:00
|
|
|
|
|
|
|
/* Start the worker. */
|
2006-12-04 13:09:16 +00:00
|
|
|
Path worker = getEnv("NIX_WORKER");
|
|
|
|
if (worker == "")
|
|
|
|
worker = nixBinDir + "/nix-worker";
|
2006-11-30 19:54:43 +00:00
|
|
|
|
2006-12-04 13:15:29 +00:00
|
|
|
string verbosityArg = "-";
|
|
|
|
for (int i = 1; i < verbosity; ++i)
|
|
|
|
verbosityArg += "v";
|
|
|
|
|
2006-11-30 19:54:43 +00:00
|
|
|
child = fork();
|
|
|
|
|
|
|
|
switch (child) {
|
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
try { /* child */
|
2006-12-03 02:36:44 +00:00
|
|
|
|
|
|
|
if (dup2(fdChild, STDOUT_FILENO) == -1)
|
2006-11-30 19:54:43 +00:00
|
|
|
throw SysError("dupping write side");
|
|
|
|
|
2006-12-03 02:36:44 +00:00
|
|
|
if (dup2(fdChild, STDIN_FILENO) == -1)
|
2006-11-30 19:54:43 +00:00
|
|
|
throw SysError("dupping read side");
|
|
|
|
|
2006-12-04 14:21:39 +00:00
|
|
|
close(fdSocket);
|
2006-12-03 02:36:44 +00:00
|
|
|
close(fdChild);
|
|
|
|
|
2006-12-04 13:15:29 +00:00
|
|
|
execlp(worker.c_str(), worker.c_str(), "--slave",
|
|
|
|
/* hacky - must be at the end */
|
|
|
|
verbosityArg == "-" ? NULL : verbosityArg.c_str(),
|
|
|
|
NULL);
|
2006-12-03 02:08:13 +00:00
|
|
|
|
2006-11-30 19:54:43 +00:00
|
|
|
throw SysError(format("executing `%1%'") % worker);
|
|
|
|
|
|
|
|
} catch (std::exception & e) {
|
|
|
|
std::cerr << format("child error: %1%\n") % e.what();
|
|
|
|
}
|
|
|
|
quickExit(1);
|
|
|
|
}
|
|
|
|
|
2006-12-03 02:36:44 +00:00
|
|
|
fdChild.close();
|
2006-11-30 19:54:43 +00:00
|
|
|
|
2006-12-04 14:21:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void RemoteStore::connectToDaemon()
|
|
|
|
{
|
|
|
|
fdSocket = socket(PF_UNIX, SOCK_STREAM, 0);
|
|
|
|
if (fdSocket == -1)
|
|
|
|
throw SysError("cannot create Unix domain socket");
|
|
|
|
|
|
|
|
string socketPath = nixStateDir + DEFAULT_SOCKET_PATH;
|
|
|
|
|
|
|
|
struct sockaddr_un addr;
|
|
|
|
addr.sun_family = AF_UNIX;
|
|
|
|
if (socketPath.size() >= sizeof(addr.sun_path))
|
|
|
|
throw Error(format("socket path `%1%' is too long") % socketPath);
|
|
|
|
strcpy(addr.sun_path, socketPath.c_str());
|
|
|
|
|
|
|
|
if (connect(fdSocket, (struct sockaddr *) &addr, sizeof(addr)) == -1)
|
|
|
|
throw SysError(format("cannot connect to daemon at `%1%'") % socketPath);
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
RemoteStore::~RemoteStore()
|
|
|
|
{
|
2006-12-03 02:08:13 +00:00
|
|
|
try {
|
2006-12-04 14:21:39 +00:00
|
|
|
fdSocket.close();
|
|
|
|
if (child != -1)
|
|
|
|
child.wait(true);
|
2007-05-01 15:16:17 +00:00
|
|
|
} catch (...) {
|
|
|
|
ignoreException();
|
2006-12-03 02:08:13 +00:00
|
|
|
}
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool RemoteStore::isValidPath(const Path & path)
|
|
|
|
{
|
2006-11-30 20:13:59 +00:00
|
|
|
writeInt(wopIsValidPath, to);
|
|
|
|
writeString(path, to);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2006-11-30 20:13:59 +00:00
|
|
|
unsigned int reply = readInt(from);
|
|
|
|
return reply != 0;
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 22:43:55 +00:00
|
|
|
bool RemoteStore::hasSubstitutes(const Path & path)
|
|
|
|
{
|
|
|
|
writeInt(wopHasSubstitutes, to);
|
|
|
|
writeString(path, to);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2006-11-30 22:43:55 +00:00
|
|
|
unsigned int reply = readInt(from);
|
|
|
|
return reply != 0;
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Hash RemoteStore::queryPathHash(const Path & path)
|
|
|
|
{
|
2006-12-02 14:27:24 +00:00
|
|
|
writeInt(wopQueryPathHash, to);
|
|
|
|
writeString(path, to);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2006-12-02 14:27:24 +00:00
|
|
|
string hash = readString(from);
|
|
|
|
return parseHash(htSHA256, hash);
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 22:43:55 +00:00
|
|
|
void RemoteStore::queryReferences(const Path & path,
|
2006-11-30 18:35:50 +00:00
|
|
|
PathSet & references)
|
|
|
|
{
|
2006-11-30 22:43:55 +00:00
|
|
|
writeInt(wopQueryReferences, to);
|
|
|
|
writeString(path, to);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2006-12-05 01:31:45 +00:00
|
|
|
PathSet references2 = readStorePaths(from);
|
2006-11-30 22:43:55 +00:00
|
|
|
references.insert(references2.begin(), references2.end());
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 22:43:55 +00:00
|
|
|
void RemoteStore::queryReferrers(const Path & path,
|
2006-11-30 18:35:50 +00:00
|
|
|
PathSet & referrers)
|
|
|
|
{
|
2006-11-30 22:43:55 +00:00
|
|
|
writeInt(wopQueryReferrers, to);
|
|
|
|
writeString(path, to);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2006-12-05 01:31:45 +00:00
|
|
|
PathSet referrers2 = readStorePaths(from);
|
2006-11-30 22:43:55 +00:00
|
|
|
referrers.insert(referrers2.begin(), referrers2.end());
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-06-12 16:53:44 +00:00
|
|
|
Path RemoteStore::queryDeriver(const Path & path)
|
|
|
|
{
|
|
|
|
writeInt(wopQueryDeriver, to);
|
|
|
|
writeString(path, to);
|
|
|
|
processStderr();
|
|
|
|
return readStorePath(from);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-08-12 00:29:28 +00:00
|
|
|
PathSet RemoteStore::querySubstitutablePaths()
|
|
|
|
{
|
|
|
|
throw Error("not implemented");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-01 20:51:18 +00:00
|
|
|
Path RemoteStore::addToStore(const Path & _srcPath, bool fixed,
|
2006-12-12 23:05:01 +00:00
|
|
|
bool recursive, string hashAlgo, PathFilter & filter)
|
2006-11-30 18:35:50 +00:00
|
|
|
{
|
2006-12-01 20:51:18 +00:00
|
|
|
Path srcPath(absPath(_srcPath));
|
2006-12-01 18:00:01 +00:00
|
|
|
|
2006-11-30 20:45:20 +00:00
|
|
|
writeInt(wopAddToStore, to);
|
|
|
|
writeString(baseNameOf(srcPath), to);
|
2006-12-01 20:51:18 +00:00
|
|
|
writeInt(fixed ? 1 : 0, to);
|
2006-12-01 18:00:01 +00:00
|
|
|
writeInt(recursive ? 1 : 0, to);
|
|
|
|
writeString(hashAlgo, to);
|
2006-12-12 23:05:01 +00:00
|
|
|
dumpPath(srcPath, to, filter);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2007-06-12 16:53:44 +00:00
|
|
|
return readStorePath(from);
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Path RemoteStore::addTextToStore(const string & suffix, const string & s,
|
|
|
|
const PathSet & references)
|
|
|
|
{
|
2006-11-30 20:45:20 +00:00
|
|
|
writeInt(wopAddTextToStore, to);
|
|
|
|
writeString(suffix, to);
|
|
|
|
writeString(s, to);
|
2006-11-30 22:43:55 +00:00
|
|
|
writeStringSet(references, to);
|
2006-11-30 20:45:20 +00:00
|
|
|
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2007-06-12 16:53:44 +00:00
|
|
|
return readStorePath(from);
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-02-20 23:17:20 +00:00
|
|
|
void RemoteStore::exportPath(const Path & path, bool sign,
|
|
|
|
Sink & sink)
|
|
|
|
{
|
2007-02-21 16:34:00 +00:00
|
|
|
writeInt(wopExportPath, to);
|
|
|
|
writeString(path, to);
|
|
|
|
writeInt(sign ? 1 : 0, to);
|
|
|
|
processStderr(&sink); /* sink receives the actual data */
|
|
|
|
readInt(from);
|
2007-02-20 23:17:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-02-21 15:45:32 +00:00
|
|
|
Path RemoteStore::importPath(bool requireSignature, Source & source)
|
|
|
|
{
|
2007-02-21 17:34:02 +00:00
|
|
|
writeInt(wopImportPath, to);
|
|
|
|
/* We ignore requireSignature, since the worker forces it to true
|
|
|
|
anyway. */
|
|
|
|
|
|
|
|
processStderr(0, &source);
|
2007-06-12 16:53:44 +00:00
|
|
|
return readStorePath(from);
|
2007-02-21 15:45:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 18:35:50 +00:00
|
|
|
void RemoteStore::buildDerivations(const PathSet & drvPaths)
|
|
|
|
{
|
2006-11-30 22:43:55 +00:00
|
|
|
writeInt(wopBuildDerivations, to);
|
|
|
|
writeStringSet(drvPaths, to);
|
2006-12-03 02:08:13 +00:00
|
|
|
processStderr();
|
2006-11-30 22:43:55 +00:00
|
|
|
readInt(from);
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 22:43:55 +00:00
|
|
|
void RemoteStore::ensurePath(const Path & path)
|
2006-11-30 18:35:50 +00:00
|
|
|
{
|
2006-11-30 22:43:55 +00:00
|
|
|
writeInt(wopEnsurePath, to);
|
|
|
|
writeString(path, to);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2006-11-30 22:43:55 +00:00
|
|
|
readInt(from);
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-02 16:41:36 +00:00
|
|
|
void RemoteStore::addTempRoot(const Path & path)
|
|
|
|
{
|
|
|
|
writeInt(wopAddTempRoot, to);
|
|
|
|
writeString(path, to);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2006-12-02 16:41:36 +00:00
|
|
|
readInt(from);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-04 23:29:16 +00:00
|
|
|
void RemoteStore::addIndirectRoot(const Path & path)
|
|
|
|
{
|
|
|
|
writeInt(wopAddIndirectRoot, to);
|
|
|
|
writeString(path, to);
|
|
|
|
processStderr();
|
|
|
|
readInt(from);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-02 16:41:36 +00:00
|
|
|
void RemoteStore::syncWithGC()
|
|
|
|
{
|
|
|
|
writeInt(wopSyncWithGC, to);
|
2006-12-04 17:55:14 +00:00
|
|
|
processStderr();
|
2006-12-02 16:41:36 +00:00
|
|
|
readInt(from);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-05 01:31:45 +00:00
|
|
|
Roots RemoteStore::findRoots()
|
|
|
|
{
|
|
|
|
writeInt(wopFindRoots, to);
|
|
|
|
processStderr();
|
|
|
|
unsigned int count = readInt(from);
|
|
|
|
Roots result;
|
|
|
|
while (count--) {
|
|
|
|
Path link = readString(from);
|
|
|
|
Path target = readStorePath(from);
|
|
|
|
result[link] = target;
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-05 02:18:46 +00:00
|
|
|
void RemoteStore::collectGarbage(GCAction action, const PathSet & pathsToDelete,
|
|
|
|
bool ignoreLiveness, PathSet & result, unsigned long long & bytesFreed)
|
|
|
|
{
|
|
|
|
result.clear();
|
|
|
|
bytesFreed = 0;
|
|
|
|
writeInt(wopCollectGarbage, to);
|
|
|
|
writeInt(action, to);
|
|
|
|
writeStringSet(pathsToDelete, to);
|
|
|
|
writeInt(ignoreLiveness, to);
|
|
|
|
|
|
|
|
processStderr();
|
|
|
|
|
|
|
|
result = readStringSet(from);
|
|
|
|
|
|
|
|
/* Ugh - NAR integers are 64 bits, but read/writeInt() aren't. */
|
|
|
|
unsigned int lo = readInt(from);
|
|
|
|
unsigned int hi = readInt(from);
|
|
|
|
bytesFreed = (((unsigned long long) hi) << 32) | lo;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-02-21 17:34:02 +00:00
|
|
|
void RemoteStore::processStderr(Sink * sink, Source * source)
|
2006-12-03 02:08:13 +00:00
|
|
|
{
|
|
|
|
unsigned int msg;
|
2007-02-21 17:34:02 +00:00
|
|
|
while ((msg = readInt(from)) == STDERR_NEXT
|
|
|
|
|| msg == STDERR_READ || msg == STDERR_WRITE) {
|
|
|
|
if (msg == STDERR_WRITE) {
|
|
|
|
string s = readString(from);
|
2007-02-21 16:34:00 +00:00
|
|
|
if (!sink) throw Error("no sink");
|
|
|
|
(*sink)((const unsigned char *) s.c_str(), s.size());
|
|
|
|
}
|
2007-02-21 17:34:02 +00:00
|
|
|
else if (msg == STDERR_READ) {
|
|
|
|
if (!source) throw Error("no source");
|
|
|
|
unsigned int len = readInt(from);
|
|
|
|
unsigned char * buf = new unsigned char[len];
|
|
|
|
AutoDeleteArray<unsigned char> d(buf);
|
|
|
|
(*source)(buf, len);
|
|
|
|
writeString(string((const char *) buf, len), to);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
string s = readString(from);
|
|
|
|
writeToStderr((const unsigned char *) s.c_str(), s.size());
|
|
|
|
}
|
2006-12-03 02:08:13 +00:00
|
|
|
}
|
|
|
|
if (msg == STDERR_ERROR)
|
|
|
|
throw Error(readString(from));
|
|
|
|
else if (msg != STDERR_LAST)
|
|
|
|
throw Error("protocol error processing standard error");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 18:35:50 +00:00
|
|
|
}
|