2006-11-30 19:19:59 +00:00
|
|
|
#include "shared.hh"
|
|
|
|
#include "local-store.hh"
|
|
|
|
#include "util.hh"
|
2006-11-30 19:54:43 +00:00
|
|
|
#include "serialise.hh"
|
2006-11-30 20:13:59 +00:00
|
|
|
#include "worker-protocol.hh"
|
2006-11-30 20:45:20 +00:00
|
|
|
#include "archive.hh"
|
2006-12-03 16:25:19 +00:00
|
|
|
#include "globals.hh"
|
2006-11-30 19:19:59 +00:00
|
|
|
|
2006-12-02 14:27:24 +00:00
|
|
|
#include <iostream>
|
2006-12-03 03:03:36 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <fcntl.h>
|
2006-12-02 14:27:24 +00:00
|
|
|
|
2006-11-30 19:19:59 +00:00
|
|
|
using namespace nix;
|
|
|
|
|
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
static Path readStorePath(Source & from)
|
2006-11-30 22:43:55 +00:00
|
|
|
{
|
|
|
|
Path path = readString(from);
|
|
|
|
assertStorePath(path);
|
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
static PathSet readStorePaths(Source & from)
|
2006-11-30 22:43:55 +00:00
|
|
|
{
|
|
|
|
PathSet paths = readStringSet(from);
|
|
|
|
for (PathSet::iterator i = paths.begin(); i != paths.end(); ++i)
|
|
|
|
assertStorePath(*i);
|
|
|
|
return paths;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-03 16:25:19 +00:00
|
|
|
static FdSource from(STDIN_FILENO);
|
|
|
|
static FdSink to(STDOUT_FILENO);
|
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
bool canSendStderr;
|
|
|
|
|
|
|
|
|
2006-12-03 03:03:36 +00:00
|
|
|
/* This function is called anytime we want to write something to
|
|
|
|
stderr. If we're in a state where the protocol allows it (i.e.,
|
|
|
|
when canSendStderr), send the message to the client over the
|
|
|
|
socket. */
|
2006-12-03 02:08:13 +00:00
|
|
|
static void tunnelStderr(const unsigned char * buf, size_t count)
|
2006-11-30 19:19:59 +00:00
|
|
|
{
|
2006-12-03 16:25:19 +00:00
|
|
|
if (canSendStderr)
|
|
|
|
writeFull(STDERR_FILENO, (unsigned char *) "L: ", 3);
|
2006-12-03 02:08:13 +00:00
|
|
|
writeFull(STDERR_FILENO, buf, count);
|
|
|
|
if (canSendStderr) {
|
|
|
|
try {
|
2006-12-03 16:25:19 +00:00
|
|
|
writeInt(STDERR_NEXT, to);
|
|
|
|
writeString(string((char *) buf, count), to);
|
2006-12-03 02:08:13 +00:00
|
|
|
} catch (...) {
|
|
|
|
/* Write failed; that means that the other side is
|
|
|
|
gone. */
|
|
|
|
canSendStderr = false;
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2006-11-30 19:19:59 +00:00
|
|
|
|
|
|
|
|
2006-12-03 03:03:36 +00:00
|
|
|
/* A SIGIO signal is received when data is available on the client
|
|
|
|
communication scoket, or when the client has closed its side of the
|
|
|
|
socket. This handler is enabled at precisely those moments in the
|
|
|
|
protocol when we're doing work and the client is supposed to be
|
|
|
|
quiet. Thus, if we get a SIGIO signal, it means that the client
|
|
|
|
has quit. So we should quit as well. */
|
|
|
|
static void sigioHandler(int sigNo)
|
|
|
|
{
|
|
|
|
_isInterrupted = 1;
|
|
|
|
canSendStderr = false;
|
|
|
|
write(STDERR_FILENO, "SIGIO\n", 6);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
/* startWork() means that we're starting an operation for which we
|
|
|
|
want to send out stderr to the client. */
|
|
|
|
static void startWork()
|
|
|
|
{
|
|
|
|
canSendStderr = true;
|
2006-12-03 03:03:36 +00:00
|
|
|
|
|
|
|
/* Handle client death asynchronously. */
|
2006-12-03 03:16:27 +00:00
|
|
|
if (signal(SIGIO, sigioHandler) == SIG_ERR)
|
|
|
|
throw SysError("setting handler for SIGIO");
|
|
|
|
|
|
|
|
/* Of course, there is a race condition here: the socket could
|
|
|
|
have closed between when we last read from / wrote to it, and
|
|
|
|
between the time we set the handler for SIGIO. In that case we
|
|
|
|
won't get the signal. So do a non-blocking select() to find
|
|
|
|
out if any input is available on the socket. If there is, it
|
|
|
|
has to be the 0-byte read that indicates that the socket has
|
|
|
|
closed. */
|
|
|
|
|
|
|
|
struct timeval timeout;
|
|
|
|
timeout.tv_sec = timeout.tv_usec = 0;
|
|
|
|
|
|
|
|
fd_set fds;
|
|
|
|
FD_ZERO(&fds);
|
|
|
|
FD_SET(STDIN_FILENO, &fds);
|
|
|
|
|
|
|
|
if (select(STDIN_FILENO + 1, &fds, 0, 0, &timeout) == -1)
|
|
|
|
throw SysError("select()");
|
|
|
|
|
|
|
|
if (FD_ISSET(STDIN_FILENO, &fds)) {
|
|
|
|
char c;
|
|
|
|
if (read(STDIN_FILENO, &c, 1) != 0)
|
|
|
|
throw Error("EOF expected (protocol error?)");
|
|
|
|
_isInterrupted = 1;
|
|
|
|
checkInterrupt();
|
|
|
|
}
|
2006-12-03 02:08:13 +00:00
|
|
|
}
|
2006-11-30 19:54:43 +00:00
|
|
|
|
2006-11-30 20:13:59 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
/* stopWork() means that we're done; stop sending stderr to the
|
|
|
|
client. */
|
|
|
|
static void stopWork()
|
|
|
|
{
|
2006-12-03 03:03:36 +00:00
|
|
|
/* Stop handling async client death; we're going to a state where
|
|
|
|
we're either sending or receiving from the client, so we'll be
|
|
|
|
notified of client death anyway. */
|
2006-12-03 03:16:27 +00:00
|
|
|
if (signal(SIGIO, SIG_IGN) == SIG_ERR)
|
|
|
|
throw SysError("ignoring SIGIO");
|
2006-12-03 03:03:36 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
canSendStderr = false;
|
2006-12-03 16:25:19 +00:00
|
|
|
writeInt(STDERR_LAST, to);
|
2006-12-03 02:08:13 +00:00
|
|
|
}
|
2006-12-01 18:00:01 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
|
|
|
|
static void performOp(Source & from, Sink & to, unsigned int op)
|
|
|
|
{
|
|
|
|
switch (op) {
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
case wopQuit: {
|
|
|
|
/* Close the database. */
|
|
|
|
store.reset((StoreAPI *) 0);
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
case wopIsValidPath: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
writeInt(store->isValidPath(path), to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case wopHasSubstitutes: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
writeInt(store->hasSubstitutes(path), to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case wopQueryPathHash: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
writeString(printHash(store->queryPathHash(path)), to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case wopQueryReferences:
|
|
|
|
case wopQueryReferrers: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
PathSet paths;
|
|
|
|
if (op == wopQueryReferences)
|
|
|
|
store->queryReferences(path, paths);
|
|
|
|
else
|
|
|
|
store->queryReferrers(path, paths);
|
|
|
|
writeStringSet(paths, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case wopAddToStore: {
|
|
|
|
/* !!! uberquick hack */
|
|
|
|
string baseName = readString(from);
|
|
|
|
bool fixed = readInt(from) == 1;
|
|
|
|
bool recursive = readInt(from) == 1;
|
|
|
|
string hashAlgo = readString(from);
|
2006-11-30 20:13:59 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
Path tmp = createTempDir();
|
|
|
|
Path tmp2 = tmp + "/" + baseName;
|
|
|
|
restorePath(tmp2, from);
|
2006-11-30 20:13:59 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
writeString(store->addToStore(tmp2, fixed, recursive, hashAlgo), to);
|
|
|
|
|
|
|
|
deletePath(tmp);
|
|
|
|
break;
|
|
|
|
}
|
2006-12-01 18:00:01 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
case wopAddTextToStore: {
|
|
|
|
string suffix = readString(from);
|
|
|
|
string s = readString(from);
|
|
|
|
PathSet refs = readStorePaths(from);
|
|
|
|
writeString(store->addTextToStore(suffix, s, refs), to);
|
|
|
|
break;
|
|
|
|
}
|
2006-11-30 20:13:59 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
case wopBuildDerivations: {
|
|
|
|
PathSet drvs = readStorePaths(from);
|
|
|
|
startWork();
|
|
|
|
store->buildDerivations(drvs);
|
|
|
|
stopWork();
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
2006-11-30 20:13:59 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
case wopEnsurePath: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
store->ensurePath(path);
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
2006-11-30 20:13:59 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
case wopAddTempRoot: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
store->addTempRoot(path);
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
2006-11-30 22:43:55 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
case wopSyncWithGC: {
|
|
|
|
store->syncWithGC();
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
2006-12-02 14:27:24 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
default:
|
|
|
|
throw Error(format("invalid operation %1%") % op);
|
|
|
|
}
|
|
|
|
}
|
2006-11-30 22:43:55 +00:00
|
|
|
|
2006-12-01 18:00:01 +00:00
|
|
|
|
2006-12-03 16:25:19 +00:00
|
|
|
static void processConnection()
|
2006-12-03 02:08:13 +00:00
|
|
|
{
|
2006-12-03 16:25:19 +00:00
|
|
|
canSendStderr = false;
|
|
|
|
writeToStderr = tunnelStderr;
|
2006-12-01 18:00:01 +00:00
|
|
|
|
2006-12-03 16:25:19 +00:00
|
|
|
/* Allow us to receive SIGIO for events on the client socket. */
|
|
|
|
signal(SIGIO, SIG_IGN);
|
|
|
|
if (fcntl(STDIN_FILENO, F_SETOWN, getpid()) == -1)
|
|
|
|
throw SysError("F_SETOWN");
|
|
|
|
if (fcntl(STDIN_FILENO, F_SETFL, fcntl(STDIN_FILENO, F_GETFL, 0) | FASYNC) == -1)
|
|
|
|
throw SysError("F_SETFL");
|
|
|
|
|
|
|
|
/* Send startup error messages to the client. */
|
|
|
|
startWork();
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
|
|
|
/* Prevent users from doing something very dangerous. */
|
|
|
|
if (setuidMode && geteuid() == 0 &&
|
|
|
|
querySetting("build-users", Strings()).size() == 0)
|
|
|
|
throw Error("if you run `nix-worker' setuid root, then you MUST set `build-users'!");
|
|
|
|
|
|
|
|
/* Open the store. */
|
|
|
|
store = boost::shared_ptr<StoreAPI>(new LocalStore(true));
|
|
|
|
|
|
|
|
stopWork();
|
|
|
|
|
|
|
|
} catch (Error & e) {
|
|
|
|
writeInt(STDERR_ERROR, to);
|
|
|
|
writeString(e.msg(), to);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Exchange the greeting. */
|
2006-12-03 02:08:13 +00:00
|
|
|
unsigned int magic = readInt(from);
|
|
|
|
if (magic != WORKER_MAGIC_1) throw Error("protocol mismatch");
|
|
|
|
writeInt(WORKER_MAGIC_2, to);
|
|
|
|
debug("greeting exchanged");
|
2006-11-30 22:43:55 +00:00
|
|
|
|
2006-12-03 16:25:19 +00:00
|
|
|
/* Process client requests. */
|
2006-12-03 02:08:13 +00:00
|
|
|
bool quit = false;
|
2006-12-02 16:41:36 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
unsigned int opCount = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
WorkerOp op = (WorkerOp) readInt(from);
|
2006-12-02 16:41:36 +00:00
|
|
|
|
2006-12-03 02:08:13 +00:00
|
|
|
opCount++;
|
|
|
|
|
|
|
|
try {
|
|
|
|
performOp(from, to, op);
|
|
|
|
} catch (Error & e) {
|
2006-12-03 16:25:19 +00:00
|
|
|
writeInt(STDERR_ERROR, to);
|
2006-12-03 02:08:13 +00:00
|
|
|
writeString(e.msg(), to);
|
2006-11-30 20:13:59 +00:00
|
|
|
}
|
2006-12-03 02:08:13 +00:00
|
|
|
|
2006-11-30 20:13:59 +00:00
|
|
|
} while (!quit);
|
2006-12-01 18:00:01 +00:00
|
|
|
|
|
|
|
printMsg(lvlError, format("%1% worker operations") % opCount);
|
2006-11-30 19:19:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void run(Strings args)
|
|
|
|
{
|
|
|
|
bool slave = false;
|
|
|
|
bool daemon = false;
|
|
|
|
|
|
|
|
for (Strings::iterator i = args.begin(); i != args.end(); ) {
|
|
|
|
string arg = *i++;
|
|
|
|
if (arg == "--slave") slave = true;
|
2006-12-01 18:02:05 +00:00
|
|
|
if (arg == "--daemon") daemon = true;
|
2006-11-30 19:19:59 +00:00
|
|
|
}
|
|
|
|
|
2006-11-30 19:54:43 +00:00
|
|
|
if (slave) {
|
2006-12-03 00:52:27 +00:00
|
|
|
/* This prevents us from receiving signals from the terminal
|
|
|
|
when we're running in setuid mode. */
|
|
|
|
if (setsid() == -1)
|
|
|
|
throw SysError(format("creating a new session"));
|
|
|
|
|
2006-12-03 16:25:19 +00:00
|
|
|
processConnection();
|
2006-11-30 19:54:43 +00:00
|
|
|
}
|
2006-11-30 19:19:59 +00:00
|
|
|
|
2006-12-03 16:25:19 +00:00
|
|
|
else if (daemon) {
|
|
|
|
if (setuidMode)
|
|
|
|
throw Error("daemon cannot be started in setuid mode");
|
|
|
|
|
2006-11-30 19:19:59 +00:00
|
|
|
throw Error("daemon mode not implemented");
|
2006-12-03 16:25:19 +00:00
|
|
|
}
|
2006-11-30 19:19:59 +00:00
|
|
|
|
|
|
|
else
|
|
|
|
throw Error("must be run in either --slave or --daemon mode");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-02 14:27:24 +00:00
|
|
|
#include "help.txt.hh"
|
|
|
|
|
2006-11-30 19:19:59 +00:00
|
|
|
void printHelp()
|
|
|
|
{
|
2006-12-02 14:27:24 +00:00
|
|
|
std::cout << string((char *) helpText, sizeof helpText);
|
2006-11-30 19:19:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-01 18:02:05 +00:00
|
|
|
string programId = "nix-worker";
|