2006-09-04 21:06:23 +00:00
|
|
|
|
#include "globals.hh"
|
2016-02-09 20:07:48 +00:00
|
|
|
|
#include "shared.hh"
|
2006-11-30 17:43:04 +00:00
|
|
|
|
#include "store-api.hh"
|
2022-03-01 18:31:36 +00:00
|
|
|
|
#include "gc-store.hh"
|
2006-09-04 21:06:23 +00:00
|
|
|
|
#include "util.hh"
|
2020-06-05 16:20:11 +00:00
|
|
|
|
#include "loggers.hh"
|
2006-09-04 21:06:23 +00:00
|
|
|
|
|
2016-02-22 13:49:15 +00:00
|
|
|
|
#include <algorithm>
|
2003-07-24 08:53:43 +00:00
|
|
|
|
#include <cctype>
|
2007-05-01 15:16:17 +00:00
|
|
|
|
#include <exception>
|
2016-02-22 13:49:15 +00:00
|
|
|
|
#include <iostream>
|
|
|
|
|
#include <mutex>
|
2003-07-04 15:42:03 +00:00
|
|
|
|
|
2014-12-14 00:51:14 +00:00
|
|
|
|
#include <cstdlib>
|
2012-12-11 10:49:42 +00:00
|
|
|
|
#include <sys/time.h>
|
2004-03-27 17:58:04 +00:00
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
#include <unistd.h>
|
2013-07-30 21:25:37 +00:00
|
|
|
|
#include <signal.h>
|
2021-10-15 07:33:49 +00:00
|
|
|
|
#ifdef __linux__
|
2021-10-14 21:43:07 +00:00
|
|
|
|
#include <features.h>
|
2021-10-15 07:33:49 +00:00
|
|
|
|
#endif
|
2021-10-14 21:43:07 +00:00
|
|
|
|
#ifdef __GLIBC__
|
2021-10-13 17:10:35 +00:00
|
|
|
|
#include <gnu/lib-names.h>
|
|
|
|
|
#include <nss.h>
|
|
|
|
|
#include <dlfcn.h>
|
2021-10-14 21:43:07 +00:00
|
|
|
|
#endif
|
2004-03-27 17:58:04 +00:00
|
|
|
|
|
2016-02-22 13:49:15 +00:00
|
|
|
|
#include <openssl/crypto.h>
|
2014-12-05 20:05:24 +00:00
|
|
|
|
|
2021-01-06 15:43:09 +00:00
|
|
|
|
#include <sodium.h>
|
|
|
|
|
|
2003-07-04 15:42:03 +00:00
|
|
|
|
|
2006-09-04 21:06:23 +00:00
|
|
|
|
namespace nix {
|
2003-07-04 15:42:03 +00:00
|
|
|
|
|
|
|
|
|
|
2013-12-20 12:19:10 +00:00
|
|
|
|
static bool gcWarning = true;
|
|
|
|
|
|
2005-02-01 12:36:25 +00:00
|
|
|
|
void printGCWarning()
|
|
|
|
|
{
|
2013-12-20 12:19:10 +00:00
|
|
|
|
if (!gcWarning) return;
|
2006-08-29 15:40:49 +00:00
|
|
|
|
static bool haveWarned = false;
|
2012-07-30 21:13:25 +00:00
|
|
|
|
warnOnce(haveWarned,
|
2017-07-30 11:27:57 +00:00
|
|
|
|
"you did not specify '--add-root'; "
|
2006-08-29 15:40:49 +00:00
|
|
|
|
"the result might be removed by the garbage collector");
|
2005-02-01 12:36:25 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2021-04-05 13:48:18 +00:00
|
|
|
|
void printMissing(ref<Store> store, const std::vector<DerivedPath> & paths, Verbosity lvl)
|
2008-08-04 13:44:46 +00:00
|
|
|
|
{
|
2020-07-30 11:10:49 +00:00
|
|
|
|
uint64_t downloadSize, narSize;
|
2019-12-05 18:11:09 +00:00
|
|
|
|
StorePathSet willBuild, willSubstitute, unknown;
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 13:28:26 +00:00
|
|
|
|
store->queryMissing(paths, willBuild, willSubstitute, unknown, downloadSize, narSize);
|
2017-08-31 15:57:04 +00:00
|
|
|
|
printMissing(store, willBuild, willSubstitute, unknown, downloadSize, narSize, lvl);
|
2012-11-19 23:27:25 +00:00
|
|
|
|
}
|
|
|
|
|
|
2008-08-04 13:44:46 +00:00
|
|
|
|
|
2019-12-05 18:11:09 +00:00
|
|
|
|
void printMissing(ref<Store> store, const StorePathSet & willBuild,
|
|
|
|
|
const StorePathSet & willSubstitute, const StorePathSet & unknown,
|
2020-07-30 11:10:49 +00:00
|
|
|
|
uint64_t downloadSize, uint64_t narSize, Verbosity lvl)
|
2012-11-19 23:27:25 +00:00
|
|
|
|
{
|
2008-08-04 13:44:46 +00:00
|
|
|
|
if (!willBuild.empty()) {
|
2020-06-17 05:41:25 +00:00
|
|
|
|
if (willBuild.size() == 1)
|
2020-06-18 17:54:16 +00:00
|
|
|
|
printMsg(lvl, "this derivation will be built:");
|
2020-06-17 05:41:25 +00:00
|
|
|
|
else
|
2020-06-18 17:54:16 +00:00
|
|
|
|
printMsg(lvl, "these %d derivations will be built:", willBuild.size());
|
2019-12-05 18:11:09 +00:00
|
|
|
|
auto sorted = store->topoSortPaths(willBuild);
|
2014-09-26 12:09:20 +00:00
|
|
|
|
reverse(sorted.begin(), sorted.end());
|
|
|
|
|
for (auto & i : sorted)
|
2020-06-18 17:54:16 +00:00
|
|
|
|
printMsg(lvl, " %s", store->printStorePath(i));
|
2008-08-04 13:44:46 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!willSubstitute.empty()) {
|
2020-06-17 05:41:25 +00:00
|
|
|
|
const float downloadSizeMiB = downloadSize / (1024.f * 1024.f);
|
|
|
|
|
const float narSizeMiB = narSize / (1024.f * 1024.f);
|
|
|
|
|
if (willSubstitute.size() == 1) {
|
2020-06-18 17:54:16 +00:00
|
|
|
|
printMsg(lvl, "this path will be fetched (%.2f MiB download, %.2f MiB unpacked):",
|
2020-06-17 05:41:25 +00:00
|
|
|
|
downloadSizeMiB,
|
2020-06-18 17:54:16 +00:00
|
|
|
|
narSizeMiB);
|
2020-06-17 05:41:25 +00:00
|
|
|
|
} else {
|
2020-06-18 17:54:16 +00:00
|
|
|
|
printMsg(lvl, "these %d paths will be fetched (%.2f MiB download, %.2f MiB unpacked):",
|
2020-06-17 05:41:25 +00:00
|
|
|
|
willSubstitute.size(),
|
|
|
|
|
downloadSizeMiB,
|
2020-06-18 17:54:16 +00:00
|
|
|
|
narSizeMiB);
|
2020-06-17 05:41:25 +00:00
|
|
|
|
}
|
2014-09-26 12:09:20 +00:00
|
|
|
|
for (auto & i : willSubstitute)
|
2020-06-18 17:54:16 +00:00
|
|
|
|
printMsg(lvl, " %s", store->printStorePath(i));
|
2008-08-04 13:44:46 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!unknown.empty()) {
|
2020-06-18 17:54:16 +00:00
|
|
|
|
printMsg(lvl, "don't know how to build these paths%s:",
|
|
|
|
|
(settings.readOnlyMode ? " (may be caused by read-only store access)" : ""));
|
2014-09-26 12:09:20 +00:00
|
|
|
|
for (auto & i : unknown)
|
2020-06-18 17:54:16 +00:00
|
|
|
|
printMsg(lvl, " %s", store->printStorePath(i));
|
2008-08-04 13:44:46 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2022-02-25 15:00:00 +00:00
|
|
|
|
std::string getArg(const std::string & opt,
|
2012-07-30 23:55:41 +00:00
|
|
|
|
Strings::iterator & i, const Strings::iterator & end)
|
|
|
|
|
{
|
|
|
|
|
++i;
|
2020-04-21 23:07:07 +00:00
|
|
|
|
if (i == end) throw UsageError("'%1%' requires an argument", opt);
|
2012-07-30 23:55:41 +00:00
|
|
|
|
return *i;
|
|
|
|
|
}
|
|
|
|
|
|
2012-10-03 20:37:06 +00:00
|
|
|
|
|
2019-09-04 12:14:03 +00:00
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x10101000L
|
2016-02-22 13:49:15 +00:00
|
|
|
|
/* OpenSSL is not thread-safe by default - it will randomly crash
|
|
|
|
|
unless the user supplies a mutex locking function. So let's do
|
|
|
|
|
that. */
|
|
|
|
|
static std::vector<std::mutex> opensslLocks;
|
|
|
|
|
|
|
|
|
|
static void opensslLockCallback(int mode, int type, const char * file, int line)
|
|
|
|
|
{
|
|
|
|
|
if (mode & CRYPTO_LOCK)
|
|
|
|
|
opensslLocks[type].lock();
|
|
|
|
|
else
|
|
|
|
|
opensslLocks[type].unlock();
|
|
|
|
|
}
|
2019-09-04 12:14:03 +00:00
|
|
|
|
#endif
|
2013-07-30 21:25:37 +00:00
|
|
|
|
|
2021-09-08 18:11:43 +00:00
|
|
|
|
static std::once_flag dns_resolve_flag;
|
|
|
|
|
|
|
|
|
|
static void preloadNSS() {
|
|
|
|
|
/* builtin:fetchurl can trigger a DNS lookup, which with glibc can trigger a dynamic library load of
|
|
|
|
|
one of the glibc NSS libraries in a sandboxed child, which will fail unless the library's already
|
|
|
|
|
been loaded in the parent. So we force a lookup of an invalid domain to force the NSS machinery to
|
|
|
|
|
load its lookup libraries in the parent before any child gets a chance to. */
|
|
|
|
|
std::call_once(dns_resolve_flag, []() {
|
2021-10-14 21:43:07 +00:00
|
|
|
|
#ifdef __GLIBC__
|
2021-10-16 01:39:14 +00:00
|
|
|
|
/* On linux, glibc will run every lookup through the nss layer.
|
|
|
|
|
* That means every lookup goes, by default, through nscd, which acts as a local
|
|
|
|
|
* cache.
|
|
|
|
|
* Because we run builds in a sandbox, we also remove access to nscd otherwise
|
|
|
|
|
* lookups would leak into the sandbox.
|
|
|
|
|
*
|
|
|
|
|
* But now we have a new problem, we need to make sure the nss_dns backend that
|
|
|
|
|
* does the dns lookups when nscd is not available is loaded or available.
|
|
|
|
|
*
|
|
|
|
|
* We can't make it available without leaking nix's environment, so instead we'll
|
|
|
|
|
* load the backend, and configure nss so it does not try to run dns lookups
|
|
|
|
|
* through nscd.
|
|
|
|
|
*
|
|
|
|
|
* This is technically only used for builtins:fetch* functions so we only care
|
|
|
|
|
* about dns.
|
|
|
|
|
*
|
|
|
|
|
* All other platforms are unaffected.
|
|
|
|
|
*/
|
2021-12-13 18:37:30 +00:00
|
|
|
|
if (!dlopen(LIBNSS_DNS_SO, RTLD_NOW))
|
|
|
|
|
warn("unable to load nss_dns backend");
|
|
|
|
|
// FIXME: get hosts entry from nsswitch.conf.
|
|
|
|
|
__nss_configure_lookup("hosts", "files dns");
|
2021-10-14 21:43:07 +00:00
|
|
|
|
#endif
|
2021-09-08 18:11:43 +00:00
|
|
|
|
});
|
|
|
|
|
}
|
2013-07-30 21:25:37 +00:00
|
|
|
|
|
2017-01-25 12:37:02 +00:00
|
|
|
|
static void sigHandler(int signo) { }
|
|
|
|
|
|
|
|
|
|
|
2014-08-13 01:50:44 +00:00
|
|
|
|
void initNix()
|
2003-07-04 15:42:03 +00:00
|
|
|
|
{
|
2014-08-13 01:50:44 +00:00
|
|
|
|
/* Turn on buffering for cerr. */
|
|
|
|
|
#if HAVE_PUBSETBUF
|
|
|
|
|
static char buf[1024];
|
|
|
|
|
std::cerr.rdbuf()->pubsetbuf(buf, sizeof(buf));
|
|
|
|
|
#endif
|
|
|
|
|
|
2019-09-04 12:14:03 +00:00
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x10101000L
|
2016-02-22 13:49:15 +00:00
|
|
|
|
/* Initialise OpenSSL locking. */
|
|
|
|
|
opensslLocks = std::vector<std::mutex>(CRYPTO_num_locks());
|
|
|
|
|
CRYPTO_set_locking_callback(opensslLockCallback);
|
2019-09-04 12:14:03 +00:00
|
|
|
|
#endif
|
2015-07-19 23:39:48 +00:00
|
|
|
|
|
2021-01-06 15:43:09 +00:00
|
|
|
|
if (sodium_init() == -1)
|
|
|
|
|
throw Error("could not initialise libsodium");
|
|
|
|
|
|
2018-03-27 16:41:31 +00:00
|
|
|
|
loadConfFile();
|
2012-07-30 21:13:25 +00:00
|
|
|
|
|
2017-01-17 17:21:02 +00:00
|
|
|
|
startSignalHandlerThread();
|
2004-01-15 20:23:55 +00:00
|
|
|
|
|
2017-02-01 12:00:21 +00:00
|
|
|
|
/* Reset SIGCHLD to its default. */
|
2017-01-17 17:21:02 +00:00
|
|
|
|
struct sigaction act;
|
|
|
|
|
sigemptyset(&act.sa_mask);
|
2010-01-12 12:22:38 +00:00
|
|
|
|
act.sa_handler = SIG_DFL;
|
|
|
|
|
act.sa_flags = 0;
|
|
|
|
|
if (sigaction(SIGCHLD, &act, 0))
|
|
|
|
|
throw SysError("resetting SIGCHLD");
|
|
|
|
|
|
2017-01-25 12:37:02 +00:00
|
|
|
|
/* Install a dummy SIGUSR1 handler for use with pthread_kill(). */
|
|
|
|
|
act.sa_handler = sigHandler;
|
|
|
|
|
if (sigaction(SIGUSR1, &act, 0)) throw SysError("handling SIGUSR1");
|
|
|
|
|
|
2019-06-06 00:18:47 +00:00
|
|
|
|
#if __APPLE__
|
|
|
|
|
/* HACK: on darwin, we need can’t use sigprocmask with SIGWINCH.
|
|
|
|
|
* Instead, add a dummy sigaction handler, and signalHandlerThread
|
|
|
|
|
* can handle the rest. */
|
|
|
|
|
struct sigaction sa;
|
|
|
|
|
sa.sa_handler = sigHandler;
|
|
|
|
|
if (sigaction(SIGWINCH, &sa, 0)) throw SysError("handling SIGWINCH");
|
|
|
|
|
#endif
|
2019-06-05 04:40:45 +00:00
|
|
|
|
|
2013-07-30 21:25:37 +00:00
|
|
|
|
/* Register a SIGSEGV handler to detect stack overflows. */
|
|
|
|
|
detectStackOverflow();
|
|
|
|
|
|
2004-09-09 14:16:02 +00:00
|
|
|
|
/* There is no privacy in the Nix system ;-) At least not for
|
|
|
|
|
now. In particular, store objects should be readable by
|
2012-10-03 21:30:45 +00:00
|
|
|
|
everybody. */
|
2004-09-09 14:16:02 +00:00
|
|
|
|
umask(0022);
|
|
|
|
|
|
2012-12-11 10:49:42 +00:00
|
|
|
|
/* Initialise the PRNG. */
|
|
|
|
|
struct timeval tv;
|
|
|
|
|
gettimeofday(&tv, 0);
|
|
|
|
|
srandom(tv.tv_usec);
|
2017-06-12 15:43:19 +00:00
|
|
|
|
|
|
|
|
|
/* On macOS, don't use the per-session TMPDIR (as set e.g. by
|
|
|
|
|
sshd). This breaks build users because they don't have access
|
|
|
|
|
to the TMPDIR, in particular in ‘nix-store --serve’. */
|
|
|
|
|
#if __APPLE__
|
2020-04-12 07:57:22 +00:00
|
|
|
|
if (hasPrefix(getEnv("TMPDIR").value_or("/tmp"), "/var/folders/"))
|
2017-06-12 15:43:19 +00:00
|
|
|
|
unsetenv("TMPDIR");
|
|
|
|
|
#endif
|
2021-09-08 18:11:43 +00:00
|
|
|
|
|
|
|
|
|
preloadNSS();
|
2014-08-13 01:50:44 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2017-10-24 10:45:11 +00:00
|
|
|
|
LegacyArgs::LegacyArgs(const std::string & programName,
|
|
|
|
|
std::function<bool(Strings::iterator & arg, const Strings::iterator & end)> parseArg)
|
|
|
|
|
: MixCommonArgs(programName), parseArg(parseArg)
|
2014-08-13 01:50:44 +00:00
|
|
|
|
{
|
2020-05-04 20:40:19 +00:00
|
|
|
|
addFlag({
|
|
|
|
|
.longName = "no-build-output",
|
|
|
|
|
.shortName = 'Q',
|
2021-01-13 13:18:04 +00:00
|
|
|
|
.description = "Do not show build output.",
|
2020-06-05 16:20:11 +00:00
|
|
|
|
.handler = {[&]() {setLogFormat(LogFormat::raw); }},
|
2020-05-04 20:40:19 +00:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
addFlag({
|
|
|
|
|
.longName = "keep-failed",
|
|
|
|
|
.shortName ='K',
|
2021-01-13 13:18:04 +00:00
|
|
|
|
.description = "Keep temporary directories of failed builds.",
|
2020-05-04 20:40:19 +00:00
|
|
|
|
.handler = {&(bool&) settings.keepFailed, true},
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
addFlag({
|
|
|
|
|
.longName = "keep-going",
|
|
|
|
|
.shortName ='k',
|
2021-01-13 13:18:04 +00:00
|
|
|
|
.description = "Keep going after a build fails.",
|
2020-05-04 20:40:19 +00:00
|
|
|
|
.handler = {&(bool&) settings.keepGoing, true},
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
addFlag({
|
|
|
|
|
.longName = "fallback",
|
2021-01-13 13:18:04 +00:00
|
|
|
|
.description = "Build from source if substitution fails.",
|
2020-05-04 20:40:19 +00:00
|
|
|
|
.handler = {&(bool&) settings.tryFallback, true},
|
|
|
|
|
});
|
2017-10-24 10:45:11 +00:00
|
|
|
|
|
|
|
|
|
auto intSettingAlias = [&](char shortName, const std::string & longName,
|
2021-01-08 10:40:36 +00:00
|
|
|
|
const std::string & description, const std::string & dest)
|
|
|
|
|
{
|
|
|
|
|
addFlag({
|
|
|
|
|
.longName = longName,
|
|
|
|
|
.shortName = shortName,
|
|
|
|
|
.description = description,
|
|
|
|
|
.labels = {"n"},
|
|
|
|
|
.handler = {[=](std::string s) {
|
2021-01-08 11:51:19 +00:00
|
|
|
|
auto n = string2IntWithUnitPrefix<uint64_t>(s);
|
|
|
|
|
settings.set(dest, std::to_string(n));
|
2021-01-08 10:40:36 +00:00
|
|
|
|
}}
|
2016-02-09 20:07:48 +00:00
|
|
|
|
});
|
2017-10-24 10:45:11 +00:00
|
|
|
|
};
|
2016-02-09 20:07:48 +00:00
|
|
|
|
|
2021-01-13 13:18:04 +00:00
|
|
|
|
intSettingAlias(0, "cores", "Maximum number of CPU cores to use inside a build.", "cores");
|
|
|
|
|
intSettingAlias(0, "max-silent-time", "Number of seconds of silence before a build is killed.", "max-silent-time");
|
|
|
|
|
intSettingAlias(0, "timeout", "Number of seconds before a build is killed.", "timeout");
|
2017-02-28 11:54:50 +00:00
|
|
|
|
|
2021-01-27 11:06:03 +00:00
|
|
|
|
addFlag({
|
|
|
|
|
.longName = "readonly-mode",
|
|
|
|
|
.description = "Do not write to the Nix store.",
|
|
|
|
|
.handler = {&settings.readOnlyMode, true},
|
|
|
|
|
});
|
2016-02-09 20:07:48 +00:00
|
|
|
|
|
2021-01-27 11:06:03 +00:00
|
|
|
|
addFlag({
|
|
|
|
|
.longName = "no-gc-warning",
|
|
|
|
|
.description = "Disable warnings about not using `--add-root`.",
|
2021-07-25 14:06:55 +00:00
|
|
|
|
.handler = {&gcWarning, false},
|
2021-01-27 11:06:03 +00:00
|
|
|
|
});
|
2017-10-24 13:41:11 +00:00
|
|
|
|
|
2020-05-04 20:40:19 +00:00
|
|
|
|
addFlag({
|
|
|
|
|
.longName = "store",
|
2021-01-13 13:18:04 +00:00
|
|
|
|
.description = "The URL of the Nix store to use.",
|
2020-05-04 20:40:19 +00:00
|
|
|
|
.labels = {"store-uri"},
|
|
|
|
|
.handler = {&(std::string&) settings.storeUri},
|
|
|
|
|
});
|
2017-10-24 10:45:11 +00:00
|
|
|
|
}
|
2016-02-09 20:07:48 +00:00
|
|
|
|
|
|
|
|
|
|
2017-10-24 10:45:11 +00:00
|
|
|
|
bool LegacyArgs::processFlag(Strings::iterator & pos, Strings::iterator end)
|
|
|
|
|
{
|
|
|
|
|
if (MixCommonArgs::processFlag(pos, end)) return true;
|
|
|
|
|
bool res = parseArg(pos, end);
|
|
|
|
|
if (res) ++pos;
|
|
|
|
|
return res;
|
|
|
|
|
}
|
2016-02-09 20:07:48 +00:00
|
|
|
|
|
2003-12-01 15:55:05 +00:00
|
|
|
|
|
2017-10-24 10:45:11 +00:00
|
|
|
|
bool LegacyArgs::processArgs(const Strings & args, bool finish)
|
|
|
|
|
{
|
|
|
|
|
if (args.empty()) return true;
|
|
|
|
|
assert(args.size() == 1);
|
|
|
|
|
Strings ss(args);
|
|
|
|
|
auto pos = ss.begin();
|
|
|
|
|
if (!parseArg(pos, ss.end()))
|
2020-04-21 23:07:07 +00:00
|
|
|
|
throw UsageError("unexpected argument '%1%'", args.front());
|
2017-10-24 10:45:11 +00:00
|
|
|
|
return true;
|
|
|
|
|
}
|
2016-02-09 20:07:48 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void parseCmdLine(int argc, char * * argv,
|
|
|
|
|
std::function<bool(Strings::iterator & arg, const Strings::iterator & end)> parseArg)
|
|
|
|
|
{
|
2019-12-05 18:11:09 +00:00
|
|
|
|
parseCmdLine(std::string(baseNameOf(argv[0])), argvToStrings(argc, argv), parseArg);
|
2017-07-25 13:09:06 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2022-02-25 15:00:00 +00:00
|
|
|
|
void parseCmdLine(const std::string & programName, const Strings & args,
|
2017-07-25 13:09:06 +00:00
|
|
|
|
std::function<bool(Strings::iterator & arg, const Strings::iterator & end)> parseArg)
|
|
|
|
|
{
|
|
|
|
|
LegacyArgs(programName, parseArg).parseCmdline(args);
|
2014-08-13 01:50:44 +00:00
|
|
|
|
}
|
2012-07-30 23:55:41 +00:00
|
|
|
|
|
2006-03-01 16:36:35 +00:00
|
|
|
|
|
2022-02-25 15:00:00 +00:00
|
|
|
|
void printVersion(const std::string & programName)
|
2014-08-13 01:50:44 +00:00
|
|
|
|
{
|
|
|
|
|
std::cout << format("%1% (Nix) %2%") % programName % nixVersion << std::endl;
|
2015-07-23 12:19:49 +00:00
|
|
|
|
if (verbosity > lvlInfo) {
|
|
|
|
|
Strings cfg;
|
|
|
|
|
#if HAVE_BOEHMGC
|
|
|
|
|
cfg.push_back("gc");
|
|
|
|
|
#endif
|
|
|
|
|
cfg.push_back("signed-caches");
|
2020-07-24 09:34:01 +00:00
|
|
|
|
std::cout << "System type: " << settings.thisSystem << "\n";
|
|
|
|
|
std::cout << "Additional system types: " << concatStringsSep(", ", settings.extraPlatforms.get()) << "\n";
|
2015-07-23 12:19:49 +00:00
|
|
|
|
std::cout << "Features: " << concatStringsSep(", ", cfg) << "\n";
|
2020-03-30 13:31:14 +00:00
|
|
|
|
std::cout << "System configuration file: " << settings.nixConfDir + "/nix.conf" << "\n";
|
|
|
|
|
std::cout << "User configuration files: " <<
|
|
|
|
|
concatStringsSep(":", settings.nixUserConfFiles)
|
|
|
|
|
<< "\n";
|
2015-07-23 12:19:49 +00:00
|
|
|
|
std::cout << "Store directory: " << settings.nixStore << "\n";
|
|
|
|
|
std::cout << "State directory: " << settings.nixStateDir << "\n";
|
|
|
|
|
}
|
2014-08-13 01:50:44 +00:00
|
|
|
|
throw Exit();
|
2003-07-04 15:42:03 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2022-02-25 15:00:00 +00:00
|
|
|
|
void showManPage(const std::string & name)
|
2012-10-03 20:37:06 +00:00
|
|
|
|
{
|
2021-04-07 11:10:02 +00:00
|
|
|
|
restoreProcessContext();
|
2018-02-14 22:05:55 +00:00
|
|
|
|
setenv("MANPATH", settings.nixManDir.c_str(), 1);
|
2018-03-21 22:17:37 +00:00
|
|
|
|
execlp("man", "man", name.c_str(), nullptr);
|
2020-04-21 23:07:07 +00:00
|
|
|
|
throw SysError("command 'man %1%' failed", name.c_str());
|
2012-10-03 20:37:06 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2022-02-25 15:00:00 +00:00
|
|
|
|
int handleExceptions(const std::string & programName, std::function<void()> fun)
|
2003-07-04 15:42:03 +00:00
|
|
|
|
{
|
2017-01-25 12:37:02 +00:00
|
|
|
|
ReceiveInterrupts receiveInterrupts; // FIXME: need better place for this
|
|
|
|
|
|
2020-06-15 16:20:05 +00:00
|
|
|
|
ErrorInfo::programName = baseNameOf(programName);
|
2020-04-24 20:57:51 +00:00
|
|
|
|
|
2022-02-25 15:00:00 +00:00
|
|
|
|
std::string error = ANSI_RED "error:" ANSI_NORMAL " ";
|
2003-07-04 15:42:03 +00:00
|
|
|
|
try {
|
2004-05-11 18:05:44 +00:00
|
|
|
|
try {
|
2014-08-13 01:50:44 +00:00
|
|
|
|
fun();
|
2004-05-11 18:05:44 +00:00
|
|
|
|
} catch (...) {
|
|
|
|
|
/* Subtle: we have to make sure that any `interrupted'
|
|
|
|
|
condition is discharged before we reach printMsg()
|
|
|
|
|
below, since otherwise it will throw an (uncaught)
|
|
|
|
|
exception. */
|
2017-04-21 14:28:10 +00:00
|
|
|
|
setInterruptThrown();
|
2004-05-11 18:05:44 +00:00
|
|
|
|
throw;
|
|
|
|
|
}
|
2014-08-13 01:50:44 +00:00
|
|
|
|
} catch (Exit & e) {
|
|
|
|
|
return e.status;
|
2003-07-04 15:42:03 +00:00
|
|
|
|
} catch (UsageError & e) {
|
2020-05-04 19:46:15 +00:00
|
|
|
|
logError(e.info());
|
|
|
|
|
printError("Try '%1% --help' for more information.", programName);
|
2003-07-04 15:42:03 +00:00
|
|
|
|
return 1;
|
2007-08-12 00:29:28 +00:00
|
|
|
|
} catch (BaseError & e) {
|
2020-05-04 19:46:15 +00:00
|
|
|
|
logError(e.info());
|
2020-07-02 15:04:31 +00:00
|
|
|
|
if (e.hasTrace() && !loggerSettings.showTrace.get())
|
2020-06-25 00:28:20 +00:00
|
|
|
|
printError("(use '--show-trace' to show detailed location information)");
|
2010-12-13 16:53:23 +00:00
|
|
|
|
return e.status;
|
2013-10-02 12:34:36 +00:00
|
|
|
|
} catch (std::bad_alloc & e) {
|
2020-05-04 19:46:15 +00:00
|
|
|
|
printError(error + "out of memory");
|
2013-10-02 12:34:36 +00:00
|
|
|
|
return 1;
|
2006-09-04 21:06:23 +00:00
|
|
|
|
} catch (std::exception & e) {
|
2020-05-04 19:46:15 +00:00
|
|
|
|
printError(error + e.what());
|
2003-07-04 15:42:03 +00:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2014-08-13 01:50:44 +00:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-08-20 13:12:58 +00:00
|
|
|
|
RunPager::RunPager()
|
|
|
|
|
{
|
2014-12-10 17:16:05 +00:00
|
|
|
|
if (!isatty(STDOUT_FILENO)) return;
|
2015-01-02 14:26:56 +00:00
|
|
|
|
char * pager = getenv("NIX_PAGER");
|
|
|
|
|
if (!pager) pager = getenv("PAGER");
|
2022-02-25 15:00:00 +00:00
|
|
|
|
if (pager && ((std::string) pager == "" || (std::string) pager == "cat")) return;
|
2014-08-20 13:12:58 +00:00
|
|
|
|
|
|
|
|
|
Pipe toPager;
|
|
|
|
|
toPager.create();
|
|
|
|
|
|
2014-12-10 12:48:50 +00:00
|
|
|
|
pid = startProcess([&]() {
|
2016-07-11 19:44:44 +00:00
|
|
|
|
if (dup2(toPager.readSide.get(), STDIN_FILENO) == -1)
|
2014-12-10 12:48:50 +00:00
|
|
|
|
throw SysError("dupping stdin");
|
|
|
|
|
if (!getenv("LESS"))
|
|
|
|
|
setenv("LESS", "FRSXMK", 1);
|
2021-04-07 11:10:02 +00:00
|
|
|
|
restoreProcessContext();
|
2015-01-02 14:26:56 +00:00
|
|
|
|
if (pager)
|
2018-03-21 22:17:37 +00:00
|
|
|
|
execl("/bin/sh", "sh", "-c", pager, nullptr);
|
|
|
|
|
execlp("pager", "pager", nullptr);
|
|
|
|
|
execlp("less", "less", nullptr);
|
|
|
|
|
execlp("more", "more", nullptr);
|
2020-04-21 23:07:07 +00:00
|
|
|
|
throw SysError("executing '%1%'", pager);
|
2014-12-10 12:48:50 +00:00
|
|
|
|
});
|
2014-08-20 13:12:58 +00:00
|
|
|
|
|
2017-02-01 12:00:21 +00:00
|
|
|
|
pid.setKillSignal(SIGINT);
|
2021-11-26 14:38:46 +00:00
|
|
|
|
stdout = fcntl(STDOUT_FILENO, F_DUPFD_CLOEXEC, 0);
|
2016-07-11 19:44:44 +00:00
|
|
|
|
if (dup2(toPager.writeSide.get(), STDOUT_FILENO) == -1)
|
2014-08-20 13:12:58 +00:00
|
|
|
|
throw SysError("dupping stdout");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
RunPager::~RunPager()
|
|
|
|
|
{
|
2014-12-12 13:05:23 +00:00
|
|
|
|
try {
|
|
|
|
|
if (pid != -1) {
|
|
|
|
|
std::cout.flush();
|
2021-11-26 14:38:46 +00:00
|
|
|
|
dup2(stdout, STDOUT_FILENO);
|
2017-01-19 15:58:39 +00:00
|
|
|
|
pid.wait();
|
2014-12-12 13:05:23 +00:00
|
|
|
|
}
|
|
|
|
|
} catch (...) {
|
2017-03-16 09:52:28 +00:00
|
|
|
|
ignoreException();
|
2014-08-20 13:12:58 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2015-05-21 13:21:38 +00:00
|
|
|
|
PrintFreed::~PrintFreed()
|
|
|
|
|
{
|
|
|
|
|
if (show)
|
2020-10-06 08:40:49 +00:00
|
|
|
|
std::cout << fmt("%d store paths deleted, %s freed\n",
|
|
|
|
|
results.paths.size(),
|
|
|
|
|
showBytes(results.bytesFreed));
|
2015-05-21 13:21:38 +00:00
|
|
|
|
}
|
|
|
|
|
|
2017-11-07 20:42:34 +00:00
|
|
|
|
Exit::~Exit() { }
|
2015-05-21 13:21:38 +00:00
|
|
|
|
|
2003-07-04 15:42:03 +00:00
|
|
|
|
}
|