2003-07-20 22:29:38 +03:00
|
|
|
#include <map>
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2003-07-20 22:29:38 +03:00
|
|
|
#include "normalise.hh"
|
|
|
|
#include "references.hh"
|
2003-08-01 17:11:19 +03:00
|
|
|
#include "pathlocks.hh"
|
2003-07-20 22:29:38 +03:00
|
|
|
#include "globals.hh"
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
static string pathNullDevice = "/dev/null";
|
|
|
|
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
struct Pipe
|
|
|
|
{
|
|
|
|
int readSide, writeSide;
|
|
|
|
|
|
|
|
Pipe();
|
|
|
|
~Pipe();
|
|
|
|
void create();
|
|
|
|
void closeReadSide();
|
|
|
|
void closeWriteSide();
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
Pipe::Pipe()
|
|
|
|
: readSide(0), writeSide(0)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Pipe::~Pipe()
|
|
|
|
{
|
|
|
|
closeReadSide();
|
|
|
|
closeWriteSide();
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Pipe::create()
|
|
|
|
{
|
|
|
|
int fds[2];
|
|
|
|
if (pipe(fds) != 0) throw SysError("creating pipe");
|
|
|
|
readSide = fds[0];
|
|
|
|
writeSide = fds[1];
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Pipe::closeReadSide()
|
|
|
|
{
|
|
|
|
if (readSide != 0) {
|
|
|
|
if (close(readSide) == -1)
|
|
|
|
printMsg(lvlError, format("cannot close read side of pipe"));
|
|
|
|
readSide = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Pipe::closeWriteSide()
|
|
|
|
{
|
|
|
|
if (writeSide != 0) {
|
|
|
|
if (close(writeSide) == -1)
|
|
|
|
printMsg(lvlError, format("cannot close write side of pipe"));
|
|
|
|
writeSide = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* A goal is a store expression that still has to be normalised. */
|
|
|
|
struct Goal
|
|
|
|
{
|
|
|
|
/* The path of the store expression. */
|
|
|
|
Path nePath;
|
|
|
|
|
|
|
|
/* The store expression stored at nePath. */
|
|
|
|
StoreExpr expr;
|
|
|
|
|
|
|
|
/* The unfinished inputs are the input store expressions that
|
|
|
|
still have to be normalised. */
|
|
|
|
PathSet unfinishedInputs;
|
|
|
|
|
|
|
|
/* The waiters are the store expressions that have this one as an
|
|
|
|
unfinished input. */
|
|
|
|
PathSet waiters;
|
|
|
|
|
|
|
|
/* The remainder is state held during the build. */
|
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
/* Whether it's being built by a hook or by ourselves. */
|
|
|
|
bool inHook;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Locks on the output paths. */
|
|
|
|
PathLocks outputLocks;
|
|
|
|
|
|
|
|
/* Input paths, with their closure elements. */
|
|
|
|
ClosureElems inClosures;
|
|
|
|
|
|
|
|
/* Referenceable paths (i.e., input and output paths). */
|
|
|
|
PathSet allPaths;
|
|
|
|
|
|
|
|
/* The process ID of the builder. */
|
|
|
|
pid_t pid;
|
|
|
|
|
|
|
|
/* The temporary directory. */
|
|
|
|
Path tmpDir;
|
|
|
|
|
|
|
|
/* File descriptor for the log file. */
|
|
|
|
int fdLogFile;
|
|
|
|
|
|
|
|
/* Pipe for the builder's standard output/error. */
|
2004-05-13 22:14:49 +03:00
|
|
|
Pipe logPipe;
|
|
|
|
|
|
|
|
/* Pipes for talking to the build hook (if any). */
|
|
|
|
Pipe toHook;
|
|
|
|
Pipe fromHook;
|
|
|
|
|
|
|
|
/* !!! clean up */
|
|
|
|
PathSet fnord;
|
|
|
|
map<Path, Path> xyzzy;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
Goal();
|
|
|
|
~Goal();
|
|
|
|
|
|
|
|
void deleteTmpDir(bool force);
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
Goal::Goal()
|
|
|
|
: pid(0)
|
|
|
|
, tmpDir("")
|
|
|
|
, fdLogFile(0)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Goal::~Goal()
|
|
|
|
{
|
|
|
|
/* Careful: we should never ever throw an exception from a
|
|
|
|
destructor. */
|
|
|
|
|
|
|
|
if (pid) {
|
|
|
|
printMsg(lvlError, format("killing child process %1% (%2%)")
|
|
|
|
% pid % nePath);
|
|
|
|
|
|
|
|
/* Send a KILL signal to every process in the child
|
|
|
|
process group (which hopefully includes *all* its
|
|
|
|
children). */
|
|
|
|
if (kill(-pid, SIGKILL) != 0)
|
|
|
|
printMsg(lvlError, format("killing process %1%") % pid);
|
|
|
|
else {
|
|
|
|
/* Wait until the child dies, disregarding the exit
|
|
|
|
status. */
|
|
|
|
int status;
|
|
|
|
while (waitpid(pid, &status, 0) == -1)
|
|
|
|
if (errno != EINTR) printMsg(lvlError,
|
|
|
|
format("waiting for process %1%") % pid);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fdLogFile && (close(fdLogFile) != 0))
|
|
|
|
printMsg(lvlError, format("cannot close fd"));
|
|
|
|
|
|
|
|
try {
|
|
|
|
deleteTmpDir(false);
|
|
|
|
} catch (Error & e) {
|
|
|
|
printMsg(lvlError, format("error (ignored): %1%") % e.msg());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Goal::deleteTmpDir(bool force)
|
|
|
|
{
|
|
|
|
if (tmpDir != "") {
|
|
|
|
if (keepFailed && !force)
|
|
|
|
printMsg(lvlTalkative,
|
|
|
|
format("builder for `%1%' failed; keeping build directory `%2%'")
|
|
|
|
% nePath % tmpDir);
|
|
|
|
else
|
|
|
|
deletePath(tmpDir);
|
|
|
|
tmpDir = "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* A set of goals keyed on the path of the store expression. */
|
|
|
|
typedef map<Path, Goal> Goals;
|
|
|
|
|
|
|
|
|
|
|
|
/* A mapping used to remember for each child process what derivation
|
|
|
|
store expression it is building. */
|
|
|
|
typedef map<pid_t, Path> Building;
|
|
|
|
|
|
|
|
|
|
|
|
/* The normaliser class. */
|
|
|
|
class Normaliser
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
/* The goals of the normaliser. This describes a dependency graph
|
|
|
|
of derivation expressions that have yet to be normalised. */
|
|
|
|
Goals goals;
|
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
/* Finished goals are removed in run() at top-level; they are not
|
|
|
|
deleted as soon as they are finished, since there may be
|
|
|
|
references hanging about. */
|
|
|
|
PathSet deadGoals;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* The set of `buildable' goals, which are the ones with an empty
|
|
|
|
list of unfinished inputs. */
|
|
|
|
PathSet buildable;
|
|
|
|
|
2004-05-14 15:24:29 +03:00
|
|
|
/* Should be set whenever a goal is added to `buildable'. */
|
|
|
|
bool newBuildables;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Child processes currently running. */
|
|
|
|
Building building;
|
|
|
|
|
|
|
|
public:
|
|
|
|
Normaliser();
|
|
|
|
|
|
|
|
/* Add the normalisation of a store expression of a goal. Returns
|
|
|
|
true if the expression has been added; false if it's
|
|
|
|
unnecessary (the expression is a closure, or already has a
|
|
|
|
known successor). */
|
|
|
|
bool addGoal(Path nePath);
|
|
|
|
|
|
|
|
/* Perform build actions until all goals have been realised. */
|
|
|
|
void run();
|
|
|
|
|
|
|
|
private:
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
bool canBuildMore();
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Start building a derivation. Returns false if we decline to
|
|
|
|
build it right now. */
|
|
|
|
bool startBuild(Path nePath);
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* Acquires locks on the output paths and gathers information
|
|
|
|
about the build (e.g., the input closures). During this
|
|
|
|
process its possible that we find out that the build is
|
|
|
|
unnecessary, in which case we return false (this is not an
|
|
|
|
error condition!). */
|
|
|
|
bool prepareBuild(Goal & goal);
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
void startBuildChild(Goal & goal);
|
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
typedef enum {rpAccept, rpDecline, rpPostpone} HookReply;
|
|
|
|
HookReply tryBuildHook(Goal & goal);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
void terminateBuildHook(Goal & goal);
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
void openLogFile(Goal & goal);
|
|
|
|
|
|
|
|
void initChild(Goal & goal);
|
|
|
|
|
|
|
|
void childStarted(Goal & goal, pid_t pid);
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Read from the logger pipes, and watch for child termination as
|
2004-05-13 22:14:49 +03:00
|
|
|
a side effect. Return true when a child terminates, false
|
|
|
|
otherwise. */
|
|
|
|
bool waitForChildren();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Wait for child processes to finish building a derivation. */
|
|
|
|
void reapChild(Goal & goal);
|
|
|
|
|
|
|
|
/* Called when a build has finished succesfully. */
|
|
|
|
void finishGoal(Goal & goal);
|
|
|
|
|
|
|
|
/* Removes a goal from the graph and wakes up all waiters. */
|
|
|
|
void removeGoal(Goal & goal);
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
static Path useSuccessor(const Path & path)
|
2003-08-01 17:11:19 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
string pathSucc;
|
2003-10-15 15:42:39 +03:00
|
|
|
if (querySuccessor(path, pathSucc)) {
|
2003-10-08 18:06:59 +03:00
|
|
|
debug(format("successor %1% -> %2%") % (string) path % pathSucc);
|
|
|
|
return pathSucc;
|
2003-08-01 17:11:19 +03:00
|
|
|
} else
|
2003-10-08 18:06:59 +03:00
|
|
|
return path;
|
2003-08-01 17:11:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
Normaliser::Normaliser()
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool Normaliser::addGoal(Path nePath)
|
|
|
|
{
|
|
|
|
checkInterrupt();
|
|
|
|
|
|
|
|
Goal goal;
|
|
|
|
goal.nePath = nePath;
|
|
|
|
|
|
|
|
/* If this already a goal, return. */
|
|
|
|
if (goals.find(nePath) != goals.end()) return true;
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* If we already have a successor, then we are done already; don't
|
|
|
|
add the expression as a goal. */
|
|
|
|
Path nfPath;
|
|
|
|
if (querySuccessor(nePath, nfPath)) return false;
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
/* Get the store expression. */
|
2004-05-11 21:05:44 +03:00
|
|
|
goal.expr = storeExprFromPath(nePath);
|
|
|
|
|
|
|
|
/* If this is a normal form (i.e., a closure) we are also done. */
|
|
|
|
if (goal.expr.type == StoreExpr::neClosure) return false;
|
|
|
|
if (goal.expr.type != StoreExpr::neDerivation) abort();
|
|
|
|
|
|
|
|
/* Otherwise, it's a derivation expression for which the successor
|
|
|
|
is not known, and we have to build it to determine its normal
|
|
|
|
form. So add it as a goal. */
|
|
|
|
startNest(nest, lvlChatty,
|
|
|
|
format("adding build goal `%1%'") % nePath);
|
|
|
|
|
|
|
|
/* Inputs may also need to be added as goals if they haven't been
|
|
|
|
normalised yet. */
|
|
|
|
for (PathSet::iterator i = goal.expr.derivation.inputs.begin();
|
|
|
|
i != goal.expr.derivation.inputs.end(); ++i)
|
|
|
|
if (addGoal(*i)) {
|
|
|
|
goal.unfinishedInputs.insert(*i);
|
|
|
|
goals[*i].waiters.insert(nePath);
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Maintain the invariant that all goals with no unfinished inputs
|
|
|
|
are in the `buildable' set. */
|
2004-05-14 15:24:29 +03:00
|
|
|
if (goal.unfinishedInputs.empty()) {
|
2004-05-11 21:05:44 +03:00
|
|
|
buildable.insert(nePath);
|
2004-05-14 15:24:29 +03:00
|
|
|
newBuildables = true;
|
|
|
|
}
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Add the goal to the goal graph. */
|
|
|
|
goals[nePath] = goal;
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
return true;
|
|
|
|
}
|
2003-08-01 17:11:19 +03:00
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
void Normaliser::run()
|
|
|
|
{
|
|
|
|
startNest(nest, lvlChatty, format("running normaliser"));
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
while (!goals.empty()) {
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-05-13 22:35:46 +03:00
|
|
|
debug("main loop - starting jobs");
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Start building as many buildable goals as possible. */
|
|
|
|
bool madeProgress = false;
|
2004-05-14 15:24:29 +03:00
|
|
|
|
|
|
|
do {
|
|
|
|
newBuildables = false;
|
|
|
|
for (PathSet::iterator i = buildable.begin();
|
|
|
|
i != buildable.end(); ++i)
|
|
|
|
if (startBuild(*i)) {
|
|
|
|
madeProgress = true;
|
|
|
|
buildable.erase(*i);
|
|
|
|
}
|
|
|
|
/* Continue while `newBuildables' is true. This happens
|
|
|
|
when startBuild() fast-builds a goal and wakes up
|
|
|
|
another goal. */
|
|
|
|
} while (newBuildables);
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* Wait until any child finishes (which may allow us to build
|
|
|
|
new goals). */
|
2004-05-11 21:05:44 +03:00
|
|
|
if (building.empty())
|
|
|
|
assert(madeProgress); /* shouldn't happen */
|
|
|
|
else
|
2004-05-13 22:14:49 +03:00
|
|
|
do {
|
|
|
|
printMsg(lvlVomit, "waiting for children");
|
|
|
|
} while (!waitForChildren());
|
2004-05-14 01:52:37 +03:00
|
|
|
|
|
|
|
/* Remove finished goals from the graph. */
|
|
|
|
for (PathSet::iterator i = deadGoals.begin();
|
|
|
|
i != deadGoals.end(); ++i)
|
|
|
|
goals.erase(*i);
|
|
|
|
deadGoals.clear();
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-08-20 17:11:40 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
assert(buildable.empty() && building.empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
bool Normaliser::canBuildMore()
|
|
|
|
{
|
2004-05-14 01:52:37 +03:00
|
|
|
/* !!! O(n) - not that it matters */
|
|
|
|
unsigned int localJobs = 0;
|
|
|
|
for (Building::iterator i = building.begin();
|
|
|
|
i != building.end(); ++i)
|
|
|
|
if (!goals[i->second].inHook) localJobs++;
|
|
|
|
return localJobs < maxBuildJobs;
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
bool Normaliser::startBuild(Path nePath)
|
|
|
|
{
|
|
|
|
checkInterrupt();
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
Goals::iterator goalIt = goals.find(nePath);
|
|
|
|
assert(goalIt != goals.end());
|
|
|
|
Goal & goal(goalIt->second);
|
|
|
|
assert(goal.unfinishedInputs.empty());
|
|
|
|
|
|
|
|
startNest(nest, lvlTalkative,
|
|
|
|
format("starting normalisation of goal `%1%'") % nePath);
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* Is the build hook willing to accept this job? */
|
2004-05-14 01:52:37 +03:00
|
|
|
switch (tryBuildHook(goal)) {
|
|
|
|
case rpAccept: return true;
|
|
|
|
case rpPostpone: return false;
|
|
|
|
case rpDecline: ;
|
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
if (!canBuildMore()) {
|
|
|
|
debug("postponing build");
|
|
|
|
return false;
|
|
|
|
}
|
2004-05-14 01:52:37 +03:00
|
|
|
|
|
|
|
goal.inHook = false;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
/* Prepare the build, i.e., acquire locks and gather necessary
|
|
|
|
information. */
|
|
|
|
if (!prepareBuild(goal)) return true;
|
|
|
|
|
|
|
|
/* Otherwise, start the build in a child process. */
|
|
|
|
startBuildChild(goal);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool Normaliser::prepareBuild(Goal & goal)
|
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
/* The outputs are referenceable paths. */
|
2004-05-11 21:05:44 +03:00
|
|
|
for (PathSet::iterator i = goal.expr.derivation.outputs.begin();
|
|
|
|
i != goal.expr.derivation.outputs.end(); ++i)
|
2003-08-01 17:11:19 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
debug(format("building path `%1%'") % *i);
|
2004-05-11 21:05:44 +03:00
|
|
|
goal.allPaths.insert(*i);
|
2003-08-01 17:11:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Obtain locks on all output paths. The locks are automatically
|
|
|
|
released when we exit this function or Nix crashes. */
|
2004-05-12 12:35:51 +03:00
|
|
|
/* !!! BUG: this could block, which is not allowed. */
|
2004-05-11 21:05:44 +03:00
|
|
|
goal.outputLocks.lockPaths(goal.expr.derivation.outputs);
|
2003-08-01 17:11:19 +03:00
|
|
|
|
|
|
|
/* Now check again whether there is a successor. This is because
|
|
|
|
another process may have started building in parallel. After
|
|
|
|
it has finished and released the locks, we can (and should)
|
|
|
|
reuse its results. (Strictly speaking the first successor
|
2004-05-11 21:05:44 +03:00
|
|
|
check can be omitted, but that would be less efficient.) Note
|
|
|
|
that since we now hold the locks on the output paths, no other
|
|
|
|
process can build this expression, so no further checks are
|
|
|
|
necessary. */
|
|
|
|
Path nfPath;
|
2004-05-13 22:14:49 +03:00
|
|
|
if (querySuccessor(goal.nePath, nfPath)) {
|
2004-05-11 21:05:44 +03:00
|
|
|
debug(format("skipping build of expression `%1%', someone beat us to it")
|
2004-05-13 22:14:49 +03:00
|
|
|
% goal.nePath);
|
2004-05-11 21:05:44 +03:00
|
|
|
goal.outputLocks.setDeletion(true);
|
|
|
|
removeGoal(goal);
|
2004-05-13 22:14:49 +03:00
|
|
|
return false;
|
2003-08-01 17:11:19 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
|
|
|
/* Realise inputs (and remember all input paths). */
|
2004-05-11 21:05:44 +03:00
|
|
|
for (PathSet::iterator i = goal.expr.derivation.inputs.begin();
|
|
|
|
i != goal.expr.derivation.inputs.end(); ++i)
|
2003-08-20 17:11:40 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2004-05-11 21:05:44 +03:00
|
|
|
Path nfPath = useSuccessor(*i);
|
|
|
|
realiseClosure(nfPath);
|
2004-05-13 22:14:49 +03:00
|
|
|
goal.fnord.insert(nfPath);
|
|
|
|
if (nfPath != *i) goal.xyzzy[*i] = nfPath;
|
2003-10-08 18:06:59 +03:00
|
|
|
/* !!! nfPath should be a root of the garbage collector while
|
|
|
|
we are building */
|
2004-05-11 21:05:44 +03:00
|
|
|
StoreExpr ne = storeExprFromPath(nfPath);
|
2003-11-18 13:22:29 +02:00
|
|
|
if (ne.type != StoreExpr::neClosure) abort();
|
2003-10-07 15:27:49 +03:00
|
|
|
for (ClosureElems::iterator j = ne.closure.elems.begin();
|
2004-05-11 21:05:44 +03:00
|
|
|
j != ne.closure.elems.end(); ++j)
|
2003-08-20 17:11:40 +03:00
|
|
|
{
|
2004-05-11 21:05:44 +03:00
|
|
|
goal.inClosures[j->first] = j->second;
|
|
|
|
goal.allPaths.insert(j->first);
|
2003-08-20 17:11:40 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* We can skip running the builder if all output paths are already
|
|
|
|
valid. */
|
|
|
|
bool fastBuild = true;
|
|
|
|
for (PathSet::iterator i = goal.expr.derivation.outputs.begin();
|
|
|
|
i != goal.expr.derivation.outputs.end(); ++i)
|
|
|
|
{
|
|
|
|
if (!isValidPath(*i)) {
|
|
|
|
fastBuild = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fastBuild) {
|
|
|
|
printMsg(lvlChatty, format("skipping build; output paths already exist"));
|
|
|
|
finishGoal(goal);
|
2004-05-13 22:14:49 +03:00
|
|
|
return false;
|
2004-05-12 12:35:51 +03:00
|
|
|
}
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Normaliser::startBuildChild(Goal & goal)
|
|
|
|
{
|
2004-05-12 17:20:32 +03:00
|
|
|
/* Right platform? */
|
|
|
|
if (goal.expr.derivation.platform != thisSystem)
|
|
|
|
throw Error(format("a `%1%' is required, but I am a `%2%'")
|
|
|
|
% goal.expr.derivation.platform % thisSystem);
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* If any of the outputs already exist but are not registered,
|
|
|
|
delete them. */
|
|
|
|
for (PathSet::iterator i = goal.expr.derivation.outputs.begin();
|
|
|
|
i != goal.expr.derivation.outputs.end(); ++i)
|
|
|
|
{
|
|
|
|
Path path = *i;
|
|
|
|
if (isValidPath(path))
|
|
|
|
throw Error(format("obstructed build: path `%1%' exists") % path);
|
|
|
|
if (pathExists(path)) {
|
|
|
|
debug(format("removing unregistered path `%1%'") % path);
|
|
|
|
deletePath(path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Construct the environment passed to the builder. */
|
|
|
|
typedef map<string, string> Environment;
|
|
|
|
Environment env;
|
|
|
|
|
2003-08-18 17:54:54 +03:00
|
|
|
/* Most shells initialise PATH to some default (/bin:/usr/bin:...) when
|
|
|
|
PATH is not set. We don't want this, so we fill it in with some dummy
|
|
|
|
value. */
|
|
|
|
env["PATH"] = "/path-not-set";
|
|
|
|
|
2003-08-22 23:12:44 +03:00
|
|
|
/* Set HOME to a non-existing path to prevent certain programs from using
|
|
|
|
/etc/passwd (or NIS, or whatever) to locate the home directory (for
|
|
|
|
example, wget looks for ~/.wgetrc). I.e., these tools use /etc/passwd
|
|
|
|
if HOME is not set, but they will just assume that the settings file
|
|
|
|
they are looking for does not exist if HOME is set but points to some
|
|
|
|
non-existing path. */
|
|
|
|
env["HOME"] = "/homeless-shelter";
|
|
|
|
|
2004-03-12 12:45:08 +02:00
|
|
|
/* Tell the builder where the Nix store is. Usually they
|
|
|
|
shouldn't care, but this is useful for purity checking (e.g.,
|
|
|
|
the compiler or linker might only want to accept paths to files
|
|
|
|
in the store or in the build directory). */
|
|
|
|
env["NIX_STORE"] = nixStore;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Add all bindings specified in the derivation expression. */
|
|
|
|
for (StringPairs::iterator i = goal.expr.derivation.env.begin();
|
|
|
|
i != goal.expr.derivation.env.end(); ++i)
|
2003-07-20 22:29:38 +03:00
|
|
|
env[i->first] = i->second;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Create a temporary directory where the build will take
|
|
|
|
place. */
|
|
|
|
goal.tmpDir = createTempDir();
|
|
|
|
|
|
|
|
/* For convenience, set an environment pointing to the top build
|
|
|
|
directory. */
|
|
|
|
env["NIX_BUILD_TOP"] = goal.tmpDir;
|
|
|
|
|
|
|
|
/* Also set TMPDIR and variants to point to this directory. */
|
|
|
|
env["TMPDIR"] = env["TEMPDIR"] = env["TMP"] = env["TEMP"] = goal.tmpDir;
|
|
|
|
|
|
|
|
/* Run the builder. */
|
|
|
|
printMsg(lvlChatty, format("executing builder `%1%'") %
|
|
|
|
goal.expr.derivation.builder);
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* Create the log file and pipe. */
|
|
|
|
openLogFile(goal);
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Fork a child to build the package. Note that while we
|
|
|
|
currently use forks to run and wait for the children, it
|
|
|
|
shouldn't be hard to use threads for this on systems where
|
|
|
|
fork() is unavailable or inefficient. */
|
2004-05-13 22:14:49 +03:00
|
|
|
pid_t pid;
|
|
|
|
switch (pid = fork()) {
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
|
|
|
|
/* Warning: in the child we should absolutely not make any
|
|
|
|
Berkeley DB calls! */
|
|
|
|
|
|
|
|
try { /* child */
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
initChild(goal);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Fill in the arguments. */
|
|
|
|
Strings & args(goal.expr.derivation.args);
|
|
|
|
const char * argArr[args.size() + 2];
|
|
|
|
const char * * p = argArr;
|
|
|
|
string progName = baseNameOf(goal.expr.derivation.builder);
|
|
|
|
*p++ = progName.c_str();
|
|
|
|
for (Strings::const_iterator i = args.begin();
|
|
|
|
i != args.end(); i++)
|
|
|
|
*p++ = i->c_str();
|
|
|
|
*p = 0;
|
|
|
|
|
|
|
|
/* Fill in the environment. */
|
|
|
|
Strings envStrs;
|
|
|
|
const char * envArr[env.size() + 1];
|
|
|
|
p = envArr;
|
|
|
|
for (Environment::const_iterator i = env.begin();
|
|
|
|
i != env.end(); i++)
|
|
|
|
*p++ = envStrs.insert(envStrs.end(),
|
|
|
|
i->first + "=" + i->second)->c_str();
|
|
|
|
*p = 0;
|
|
|
|
|
|
|
|
/* Execute the program. This should not return. */
|
|
|
|
execve(goal.expr.derivation.builder.c_str(),
|
|
|
|
(char * *) argArr, (char * *) envArr);
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError(format("executing `%1%'")
|
2004-05-11 21:05:44 +03:00
|
|
|
% goal.expr.derivation.builder);
|
|
|
|
|
|
|
|
} catch (exception & e) {
|
|
|
|
cerr << format("build error: %1%\n") % e.what();
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
_exit(1);
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* parent */
|
|
|
|
|
|
|
|
childStarted(goal, pid);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
string readLine(int fd)
|
|
|
|
{
|
|
|
|
string s;
|
|
|
|
while (1) {
|
|
|
|
char ch;
|
|
|
|
int rd = read(fd, &ch, 1);
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError("reading a line");
|
|
|
|
} else if (rd == 0)
|
|
|
|
throw Error("unexpected EOF reading a line");
|
|
|
|
else {
|
|
|
|
if (ch == '\n') return s;
|
|
|
|
s += ch;
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
void writeLine(int fd, string s)
|
|
|
|
{
|
|
|
|
s += '\n';
|
|
|
|
writeFull(fd, (const unsigned char *) s.c_str(), s.size());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Normaliser::HookReply Normaliser::tryBuildHook(Goal & goal)
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
|
|
|
Path buildHook = getEnv("NIX_BUILD_HOOK");
|
2004-05-14 01:52:37 +03:00
|
|
|
if (buildHook == "") return rpDecline;
|
2004-05-13 22:14:49 +03:00
|
|
|
buildHook = absPath(buildHook);
|
|
|
|
|
|
|
|
/* Create a directory where we will store files used for
|
|
|
|
communication between us and the build hook. */
|
|
|
|
goal.tmpDir = createTempDir();
|
|
|
|
|
|
|
|
/* Create the log file and pipe. */
|
|
|
|
openLogFile(goal);
|
|
|
|
|
|
|
|
/* Create the communication pipes. */
|
|
|
|
goal.toHook.create();
|
|
|
|
goal.fromHook.create();
|
|
|
|
|
|
|
|
/* Fork the hook. */
|
|
|
|
pid_t pid;
|
|
|
|
switch (pid = fork()) {
|
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
case 0:
|
|
|
|
try { /* child */
|
|
|
|
|
|
|
|
initChild(goal);
|
|
|
|
|
|
|
|
execl(buildHook.c_str(), buildHook.c_str(),
|
|
|
|
(canBuildMore() ? (string) "1" : "0").c_str(),
|
|
|
|
thisSystem.c_str(),
|
|
|
|
goal.expr.derivation.platform.c_str(),
|
2004-05-14 15:24:29 +03:00
|
|
|
goal.nePath.c_str(), 0);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
throw SysError(format("executing `%1%'") % buildHook);
|
|
|
|
|
|
|
|
} catch (exception & e) {
|
|
|
|
cerr << format("build error: %1%\n") % e.what();
|
|
|
|
}
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* parent */
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
childStarted(goal, pid);
|
|
|
|
|
|
|
|
goal.fromHook.closeWriteSide();
|
|
|
|
goal.toHook.closeReadSide();
|
|
|
|
|
|
|
|
/* Read the first line of input, which should be a word indicating
|
|
|
|
whether the hook wishes to perform the build. !!! potential
|
|
|
|
for deadlock here: we should also read from the child's logger
|
|
|
|
pipe. */
|
|
|
|
string reply = readLine(goal.fromHook.readSide);
|
|
|
|
|
|
|
|
debug(format("hook reply is `%1%'") % reply);
|
|
|
|
|
|
|
|
if (reply == "decline" || reply == "postpone") {
|
|
|
|
/* Clean up the child. !!! hacky / should verify */
|
2004-05-14 01:52:37 +03:00
|
|
|
terminateBuildHook(goal);
|
|
|
|
return reply == "decline" ? rpDecline : rpPostpone;
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
else if (reply == "accept") {
|
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
if (!prepareBuild(goal)) {
|
|
|
|
writeLine(goal.toHook.writeSide, "cancel");
|
|
|
|
terminateBuildHook(goal);
|
|
|
|
return rpAccept;
|
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
Path inputListFN = goal.tmpDir + "/inputs";
|
|
|
|
Path outputListFN = goal.tmpDir + "/outputs";
|
|
|
|
Path successorsListFN = goal.tmpDir + "/successors";
|
|
|
|
|
|
|
|
string s;
|
|
|
|
for (ClosureElems::iterator i = goal.inClosures.begin();
|
|
|
|
i != goal.inClosures.end(); ++i)
|
|
|
|
s += i->first + "\n";
|
|
|
|
for (PathSet::iterator i = goal.fnord.begin();
|
|
|
|
i != goal.fnord.end(); ++i)
|
|
|
|
s += *i + "\n";
|
|
|
|
writeStringToFile(inputListFN, s);
|
|
|
|
|
|
|
|
s = "";
|
|
|
|
for (PathSet::iterator i = goal.expr.derivation.outputs.begin();
|
|
|
|
i != goal.expr.derivation.outputs.end(); ++i)
|
|
|
|
s += *i + "\n";
|
|
|
|
writeStringToFile(outputListFN, s);
|
|
|
|
|
|
|
|
s = "";
|
|
|
|
for (map<Path, Path>::iterator i = goal.xyzzy.begin();
|
|
|
|
i != goal.xyzzy.end(); ++i)
|
|
|
|
s += i->first + " " + i->second + "\n";
|
|
|
|
writeStringToFile(successorsListFN, s);
|
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
writeLine(goal.toHook.writeSide, "okay");
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
goal.inHook = true;
|
|
|
|
|
|
|
|
return rpAccept;
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
else throw Error(format("bad hook reply `%1%'") % reply);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
void Normaliser::terminateBuildHook(Goal & goal)
|
|
|
|
{
|
|
|
|
/* !!! drain stdout of hook, wait for child process */
|
|
|
|
debug("terminating build hook");
|
|
|
|
pid_t pid = goal.pid;
|
|
|
|
int status;
|
|
|
|
if (waitpid(goal.pid, &status, 0) != goal.pid)
|
|
|
|
printMsg(lvlError, format("process `%1%' missing") % goal.pid);
|
|
|
|
goal.pid = 0;
|
|
|
|
goal.fromHook.closeReadSide();
|
|
|
|
goal.toHook.closeWriteSide();
|
|
|
|
close(goal.fdLogFile);
|
|
|
|
goal.fdLogFile = 0;
|
|
|
|
goal.logPipe.closeReadSide();
|
|
|
|
building.erase(pid);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
void Normaliser::openLogFile(Goal & goal)
|
|
|
|
{
|
|
|
|
/* Create a log file. */
|
|
|
|
Path logFileName = nixLogDir + "/" + baseNameOf(goal.nePath);
|
|
|
|
int fdLogFile = open(logFileName.c_str(),
|
|
|
|
O_CREAT | O_WRONLY | O_TRUNC, 0666);
|
|
|
|
if (fdLogFile == -1)
|
|
|
|
throw SysError(format("creating log file `%1%'") % logFileName);
|
|
|
|
goal.fdLogFile = fdLogFile;
|
|
|
|
|
|
|
|
/* Create a pipe to get the output of the child. */
|
|
|
|
goal.logPipe.create();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Normaliser::initChild(Goal & goal)
|
|
|
|
{
|
|
|
|
/* Put the child in a separate process group so that it doesn't
|
|
|
|
receive terminal signals. */
|
2004-05-18 12:45:18 +03:00
|
|
|
if (setpgid(0, 0) == -1)
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError(format("setting process group"));
|
|
|
|
|
|
|
|
if (chdir(goal.tmpDir.c_str()) == -1)
|
|
|
|
throw SysError(format("changing into to `%1%'") % goal.tmpDir);
|
|
|
|
|
|
|
|
/* Dup the write side of the logger pipe into stderr. */
|
|
|
|
if (dup2(goal.logPipe.writeSide, STDERR_FILENO) == -1)
|
|
|
|
throw SysError("cannot pipe standard error into log file");
|
|
|
|
if (close(goal.logPipe.readSide) != 0) /* close read side */
|
|
|
|
throw SysError("closing fd");
|
|
|
|
|
|
|
|
/* Dup stderr to stdin. */
|
|
|
|
if (dup2(STDERR_FILENO, STDOUT_FILENO) == -1)
|
|
|
|
throw SysError("cannot dup stderr into stdout");
|
|
|
|
|
|
|
|
/* Reroute stdin to /dev/null. */
|
|
|
|
int fdDevNull = open(pathNullDevice.c_str(), O_RDWR);
|
|
|
|
if (fdDevNull == -1)
|
|
|
|
throw SysError(format("cannot open `%1%'") % pathNullDevice);
|
|
|
|
if (dup2(fdDevNull, STDIN_FILENO) == -1)
|
|
|
|
throw SysError("cannot dup null device into stdin");
|
|
|
|
|
|
|
|
/* When running a hook, dup the communication pipes. */
|
|
|
|
bool inHook = goal.fromHook.writeSide != 0;
|
|
|
|
if (inHook) {
|
|
|
|
goal.fromHook.closeReadSide();
|
|
|
|
if (dup2(goal.fromHook.writeSide, 3) == -1)
|
|
|
|
throw SysError("dup");
|
|
|
|
|
|
|
|
goal.toHook.closeWriteSide();
|
|
|
|
if (dup2(goal.toHook.readSide, 4) == -1)
|
|
|
|
throw SysError("dup");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Close all other file descriptors. */
|
|
|
|
int maxFD = 0;
|
|
|
|
maxFD = sysconf(_SC_OPEN_MAX);
|
|
|
|
for (int fd = 0; fd < maxFD; ++fd)
|
|
|
|
if (fd != STDIN_FILENO && fd != STDOUT_FILENO && fd != STDERR_FILENO
|
|
|
|
&& (!inHook || (fd != 3 && fd != 4)))
|
|
|
|
close(fd); /* ignore result */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Normaliser::childStarted(Goal & goal, pid_t pid)
|
|
|
|
{
|
|
|
|
goal.pid = pid;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
building[goal.pid] = goal.nePath;
|
|
|
|
|
|
|
|
/* Close the write side of the logger pipe. */
|
2004-05-13 22:14:49 +03:00
|
|
|
goal.logPipe.closeWriteSide();
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
bool Normaliser::waitForChildren()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
|
|
|
checkInterrupt();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
bool terminated = false;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Process log output from the children. We also use this to
|
|
|
|
detect child termination: if we get EOF on the logger pipe of a
|
|
|
|
build, we assume that the builder has terminated. */
|
|
|
|
|
|
|
|
/* Use select() to wait for the input side of any logger pipe to
|
|
|
|
become `available'. Note that `available' (i.e., non-blocking)
|
|
|
|
includes EOF. */
|
|
|
|
fd_set fds;
|
|
|
|
FD_ZERO(&fds);
|
|
|
|
int fdMax = 0;
|
|
|
|
for (Building::iterator i = building.begin();
|
|
|
|
i != building.end(); ++i)
|
|
|
|
{
|
|
|
|
Goal & goal(goals[i->second]);
|
2004-05-13 22:14:49 +03:00
|
|
|
int fd = goal.logPipe.readSide;
|
2004-05-11 21:05:44 +03:00
|
|
|
FD_SET(fd, &fds);
|
|
|
|
if (fd >= fdMax) fdMax = fd + 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (select(fdMax, &fds, 0, 0, 0) == -1) {
|
2004-05-13 22:14:49 +03:00
|
|
|
if (errno == EINTR) return false;
|
2004-05-11 21:05:44 +03:00
|
|
|
throw SysError("waiting for input");
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Process all available file descriptors. */
|
|
|
|
for (Building::iterator i = building.begin();
|
|
|
|
i != building.end(); ++i)
|
|
|
|
{
|
|
|
|
checkInterrupt();
|
|
|
|
Goal & goal(goals[i->second]);
|
2004-05-13 22:14:49 +03:00
|
|
|
int fd = goal.logPipe.readSide;
|
2004-05-11 21:05:44 +03:00
|
|
|
if (FD_ISSET(fd, &fds)) {
|
2004-05-14 01:52:37 +03:00
|
|
|
unsigned char buffer[4096];
|
2004-05-11 21:05:44 +03:00
|
|
|
ssize_t rd = read(fd, buffer, sizeof(buffer));
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError(format("reading from `%1%'")
|
|
|
|
% goal.nePath);
|
|
|
|
} else if (rd == 0) {
|
|
|
|
debug(format("EOF on `%1%'") % goal.nePath);
|
|
|
|
reapChild(goal);
|
2004-05-13 22:14:49 +03:00
|
|
|
terminated = true;
|
2004-05-11 21:05:44 +03:00
|
|
|
} else {
|
|
|
|
printMsg(lvlVomit, format("read %1% bytes from `%2%'")
|
|
|
|
% rd % goal.nePath);
|
|
|
|
writeFull(goal.fdLogFile, buffer, rd);
|
|
|
|
if (verbosity >= buildVerbosity)
|
|
|
|
writeFull(STDERR_FILENO, buffer, rd);
|
2003-08-05 12:47:20 +03:00
|
|
|
}
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
return terminated;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
void Normaliser::reapChild(Goal & goal)
|
|
|
|
{
|
|
|
|
int status;
|
|
|
|
|
|
|
|
/* Since we got an EOF on the logger pipe, the builder is presumed
|
|
|
|
to have terminated. In fact, the builder could also have
|
|
|
|
simply have closed its end of the pipe --- just don't do that
|
|
|
|
:-) */
|
2004-05-13 22:14:49 +03:00
|
|
|
/* !!! this could block! */
|
|
|
|
if (waitpid(goal.pid, &status, 0) != goal.pid)
|
2004-05-11 21:05:44 +03:00
|
|
|
throw SysError(format("builder for `%1%' should have terminated")
|
|
|
|
% goal.nePath);
|
|
|
|
|
|
|
|
/* So the child is gone now. */
|
|
|
|
pid_t pid = goal.pid;
|
|
|
|
goal.pid = 0;
|
|
|
|
|
|
|
|
/* Close the read side of the logger pipe. */
|
2004-05-13 22:14:49 +03:00
|
|
|
goal.logPipe.closeReadSide();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Close the log file. */
|
|
|
|
if (close(goal.fdLogFile) != 0)
|
|
|
|
throw SysError("closing fd");
|
|
|
|
goal.fdLogFile = 0;
|
|
|
|
|
|
|
|
debug(format("builder process %1% finished") % pid);
|
|
|
|
|
|
|
|
/* Check the exit status. */
|
|
|
|
if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
|
|
|
|
goal.deleteTmpDir(false);
|
|
|
|
if (WIFEXITED(status))
|
|
|
|
throw Error(format("builder for `%1%' failed with exit code %2%")
|
|
|
|
% goal.nePath % WEXITSTATUS(status));
|
|
|
|
else if (WIFSIGNALED(status))
|
|
|
|
throw Error(format("builder for `%1%' failed due to signal %2%")
|
|
|
|
% goal.nePath % WTERMSIG(status));
|
|
|
|
else
|
|
|
|
throw Error(format("builder for `%1%' failed died abnormally") % goal.nePath);
|
2003-07-20 22:29:38 +03:00
|
|
|
} else
|
2004-05-11 21:05:44 +03:00
|
|
|
goal.deleteTmpDir(true);
|
|
|
|
|
|
|
|
finishGoal(goal);
|
|
|
|
|
|
|
|
building.erase(pid);
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
void Normaliser::finishGoal(Goal & goal)
|
|
|
|
{
|
|
|
|
/* The resulting closure expression. */
|
|
|
|
StoreExpr nf;
|
|
|
|
nf.type = StoreExpr::neClosure;
|
|
|
|
|
|
|
|
startNest(nest, lvlTalkative,
|
|
|
|
format("finishing normalisation of goal `%1%'") % goal.nePath);
|
2004-03-22 23:42:28 +02:00
|
|
|
|
2003-08-01 18:41:47 +03:00
|
|
|
/* Check whether the output paths were created, and grep each
|
2003-08-22 23:12:44 +03:00
|
|
|
output path to determine what other paths it references. Also make all
|
|
|
|
output paths read-only. */
|
2003-10-08 18:06:59 +03:00
|
|
|
PathSet usedPaths;
|
2004-05-11 21:05:44 +03:00
|
|
|
for (PathSet::iterator i = goal.expr.derivation.outputs.begin();
|
|
|
|
i != goal.expr.derivation.outputs.end(); ++i)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
Path path = *i;
|
2003-07-20 22:29:38 +03:00
|
|
|
if (!pathExists(path))
|
2004-05-12 12:35:51 +03:00
|
|
|
throw Error(format("output path `%1%' does not exist") % path);
|
2003-10-07 15:27:49 +03:00
|
|
|
nf.closure.roots.insert(path);
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-08-22 23:12:44 +03:00
|
|
|
makePathReadOnly(path);
|
|
|
|
|
2003-08-20 14:30:45 +03:00
|
|
|
/* For this output path, find the references to other paths contained
|
|
|
|
in it. */
|
2004-03-22 23:42:28 +02:00
|
|
|
startNest(nest2, lvlChatty,
|
2004-05-11 21:05:44 +03:00
|
|
|
format("scanning for store references in `%1%'") % path);
|
2003-08-20 17:11:40 +03:00
|
|
|
Strings refPaths = filterReferences(path,
|
2004-05-11 21:05:44 +03:00
|
|
|
Strings(goal.allPaths.begin(), goal.allPaths.end()));
|
2004-03-22 23:42:28 +02:00
|
|
|
nest2.close();
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-10-07 15:27:49 +03:00
|
|
|
/* Construct a closure element for this output path. */
|
|
|
|
ClosureElem elem;
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-08-20 14:30:45 +03:00
|
|
|
/* For each path referenced by this output path, add its id to the
|
2003-10-07 15:27:49 +03:00
|
|
|
closure element and add the id to the `usedPaths' set (so that the
|
|
|
|
elements referenced by *its* closure are added below). */
|
2003-10-08 18:06:59 +03:00
|
|
|
for (Paths::iterator j = refPaths.begin();
|
2004-05-11 21:05:44 +03:00
|
|
|
j != refPaths.end(); ++j)
|
2003-08-20 14:30:45 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2003-10-08 18:06:59 +03:00
|
|
|
Path path = *j;
|
2003-08-20 17:11:40 +03:00
|
|
|
elem.refs.insert(path);
|
2004-05-11 21:05:44 +03:00
|
|
|
if (goal.inClosures.find(path) != goal.inClosures.end())
|
2003-08-20 17:11:40 +03:00
|
|
|
usedPaths.insert(path);
|
2004-05-11 21:05:44 +03:00
|
|
|
else if (goal.expr.derivation.outputs.find(path) ==
|
|
|
|
goal.expr.derivation.outputs.end())
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 15:39:56 +03:00
|
|
|
abort();
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
2003-10-07 15:27:49 +03:00
|
|
|
nf.closure.elems[path] = elem;
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
2003-10-07 15:27:49 +03:00
|
|
|
/* Close the closure. That is, for any referenced path, add the paths
|
2003-08-20 14:30:45 +03:00
|
|
|
referenced by it. */
|
2003-10-08 18:06:59 +03:00
|
|
|
PathSet donePaths;
|
2003-08-20 14:30:45 +03:00
|
|
|
|
|
|
|
while (!usedPaths.empty()) {
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2003-10-08 18:06:59 +03:00
|
|
|
PathSet::iterator i = usedPaths.begin();
|
|
|
|
Path path = *i;
|
2003-08-20 14:30:45 +03:00
|
|
|
usedPaths.erase(i);
|
|
|
|
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 15:39:56 +03:00
|
|
|
if (donePaths.find(path) != donePaths.end()) continue;
|
|
|
|
donePaths.insert(path);
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
ClosureElems::iterator j = goal.inClosures.find(path);
|
|
|
|
if (j == goal.inClosures.end()) abort();
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2003-10-07 15:27:49 +03:00
|
|
|
nf.closure.elems[path] = j->second;
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
for (PathSet::iterator k = j->second.refs.begin();
|
2003-08-20 14:30:45 +03:00
|
|
|
k != j->second.refs.end(); k++)
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 15:39:56 +03:00
|
|
|
usedPaths.insert(*k);
|
2003-08-20 14:30:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* For debugging, print out the referenced and unreferenced paths. */
|
2004-05-11 21:05:44 +03:00
|
|
|
for (ClosureElems::iterator i = goal.inClosures.begin();
|
|
|
|
i != goal.inClosures.end(); ++i)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
PathSet::iterator j = donePaths.find(i->first);
|
2003-08-20 14:30:45 +03:00
|
|
|
if (j == donePaths.end())
|
2004-03-22 23:42:28 +02:00
|
|
|
debug(format("unreferenced input: `%1%'") % i->first);
|
2003-08-20 14:30:45 +03:00
|
|
|
else
|
2004-03-22 23:42:28 +02:00
|
|
|
debug(format("referenced input: `%1%'") % i->first);
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
2003-08-01 18:41:47 +03:00
|
|
|
/* Write the normal form. This does not have to occur in the
|
|
|
|
transaction below because writing terms is idem-potent. */
|
2003-11-18 13:22:29 +02:00
|
|
|
ATerm nfTerm = unparseStoreExpr(nf);
|
2003-11-16 19:46:31 +02:00
|
|
|
printMsg(lvlVomit, format("normal form: %1%") % atPrint(nfTerm));
|
2003-10-08 18:06:59 +03:00
|
|
|
Path nfPath = writeTerm(nfTerm, "-s");
|
2003-08-01 18:41:47 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Register each output path, and register the normal form. This
|
2003-08-01 18:41:47 +03:00
|
|
|
is wrapped in one database transaction to ensure that if we
|
|
|
|
crash, either everything is registered or nothing is. This is
|
|
|
|
for recoverability: unregistered paths in the store can be
|
|
|
|
deleted arbitrarily, while registered paths can only be deleted
|
|
|
|
by running the garbage collector. */
|
2003-10-15 15:42:39 +03:00
|
|
|
Transaction txn;
|
|
|
|
createStoreTransaction(txn);
|
2004-05-11 21:05:44 +03:00
|
|
|
for (PathSet::iterator i = goal.expr.derivation.outputs.begin();
|
|
|
|
i != goal.expr.derivation.outputs.end(); ++i)
|
2003-10-08 18:06:59 +03:00
|
|
|
registerValidPath(txn, *i);
|
2004-05-11 21:05:44 +03:00
|
|
|
registerSuccessor(txn, goal.nePath, nfPath);
|
2003-08-01 18:41:47 +03:00
|
|
|
txn.commit();
|
|
|
|
|
2003-11-21 18:05:19 +02:00
|
|
|
/* It is now safe to delete the lock files, since all future
|
|
|
|
lockers will see the successor; they will not create new lock
|
|
|
|
files with the same names as the old (unlinked) lock files. */
|
2004-05-11 21:05:44 +03:00
|
|
|
goal.outputLocks.setDeletion(true);
|
|
|
|
|
|
|
|
removeGoal(goal);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Normaliser::removeGoal(Goal & goal)
|
|
|
|
{
|
|
|
|
/* Remove this goal from those goals to which it is an input. */
|
|
|
|
for (PathSet::iterator i = goal.waiters.begin();
|
|
|
|
i != goal.waiters.end(); ++i)
|
|
|
|
{
|
|
|
|
Goal & waiter(goals[*i]);
|
|
|
|
PathSet::iterator j = waiter.unfinishedInputs.find(goal.nePath);
|
|
|
|
assert(j != waiter.unfinishedInputs.end());
|
|
|
|
waiter.unfinishedInputs.erase(j);
|
|
|
|
|
|
|
|
/* If there are not inputs left, the goal has become
|
|
|
|
buildable. */
|
|
|
|
if (waiter.unfinishedInputs.empty()) {
|
|
|
|
debug(format("waking up goal `%1%'") % waiter.nePath);
|
|
|
|
buildable.insert(waiter.nePath);
|
2004-05-14 15:24:29 +03:00
|
|
|
newBuildables = true;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-14 01:52:37 +03:00
|
|
|
/* Lazily remove the goal from the graph (it will be actually
|
|
|
|
removed in run(); this is since callers may have references to
|
|
|
|
`goal'). */
|
|
|
|
deadGoals.insert(goal.nePath);
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-11-21 18:05:19 +02:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
Path normaliseStoreExpr(const Path & nePath)
|
|
|
|
{
|
|
|
|
Normaliser normaliser;
|
|
|
|
normaliser.addGoal(nePath);
|
|
|
|
normaliser.run();
|
|
|
|
|
|
|
|
Path nfPath;
|
|
|
|
if (!querySuccessor(nePath, nfPath)) abort();
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
return nfPath;
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
void realiseClosure(const Path & nePath)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2003-11-09 12:35:45 +02:00
|
|
|
startNest(nest, lvlDebug, format("realising closure `%1%'") % nePath);
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
StoreExpr ne = storeExprFromPath(nePath);
|
2003-11-18 13:22:29 +02:00
|
|
|
if (ne.type != StoreExpr::neClosure)
|
2003-10-08 18:06:59 +03:00
|
|
|
throw Error(format("expected closure in `%1%'") % nePath);
|
2003-07-29 12:45:03 +03:00
|
|
|
|
2003-10-07 15:27:49 +03:00
|
|
|
for (ClosureElems::const_iterator i = ne.closure.elems.begin();
|
2004-05-11 21:05:44 +03:00
|
|
|
i != ne.closure.elems.end(); ++i)
|
|
|
|
ensurePath(i->first);
|
2003-10-16 19:29:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
void ensurePath(const Path & path)
|
2003-10-16 19:29:57 +03:00
|
|
|
{
|
|
|
|
/* If the path is already valid, we're done. */
|
|
|
|
if (isValidPath(path)) return;
|
2004-02-13 12:45:09 +02:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
#if 0
|
2004-02-13 12:45:09 +02:00
|
|
|
if (pending.find(path) != pending.end())
|
|
|
|
throw Error(format(
|
|
|
|
"path `%1%' already being realised (possible substitute cycle?)")
|
|
|
|
% path);
|
|
|
|
pending.insert(path);
|
2003-10-16 19:29:57 +03:00
|
|
|
|
|
|
|
/* Otherwise, try the substitutes. */
|
|
|
|
Paths subPaths = querySubstitutes(path);
|
|
|
|
|
|
|
|
for (Paths::iterator i = subPaths.begin();
|
2004-05-11 21:05:44 +03:00
|
|
|
i != subPaths.end(); ++i)
|
2003-10-16 19:29:57 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2003-10-16 19:29:57 +03:00
|
|
|
try {
|
2004-02-13 12:45:09 +02:00
|
|
|
Path nf = normaliseStoreExpr(*i, pending);
|
|
|
|
realiseClosure(nf, pending);
|
2003-10-16 19:29:57 +03:00
|
|
|
if (isValidPath(path)) return;
|
|
|
|
throw Error(format("substitute failed to produce expected output path"));
|
|
|
|
} catch (Error & e) {
|
2003-11-09 12:35:45 +02:00
|
|
|
printMsg(lvlTalkative,
|
2003-10-16 19:29:57 +03:00
|
|
|
format("building of substitute `%1%' for `%2%' failed: %3%")
|
|
|
|
% *i % path % e.what());
|
|
|
|
}
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
#endif
|
2003-10-16 19:29:57 +03:00
|
|
|
|
|
|
|
throw Error(format("path `%1%' is required, "
|
|
|
|
"but there are no (successful) substitutes") % path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
StoreExpr storeExprFromPath(const Path & path)
|
2003-10-16 19:29:57 +03:00
|
|
|
{
|
2004-04-14 11:08:55 +03:00
|
|
|
assertStorePath(path);
|
2004-05-11 21:05:44 +03:00
|
|
|
ensurePath(path);
|
2003-10-16 19:29:57 +03:00
|
|
|
ATerm t = ATreadFromNamedFile(path.c_str());
|
|
|
|
if (!t) throw Error(format("cannot read aterm from `%1%'") % path);
|
2003-11-18 13:22:29 +02:00
|
|
|
return parseStoreExpr(t);
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
PathSet storeExprRoots(const Path & nePath)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
PathSet paths;
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
StoreExpr ne = storeExprFromPath(nePath);
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
if (ne.type == StoreExpr::neClosure)
|
2003-10-08 18:06:59 +03:00
|
|
|
paths.insert(ne.closure.roots.begin(), ne.closure.roots.end());
|
2003-11-18 13:22:29 +02:00
|
|
|
else if (ne.type == StoreExpr::neDerivation)
|
2003-10-08 18:06:59 +03:00
|
|
|
paths.insert(ne.derivation.outputs.begin(),
|
|
|
|
ne.derivation.outputs.end());
|
2003-07-20 22:29:38 +03:00
|
|
|
else abort();
|
|
|
|
|
|
|
|
return paths;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
static void requisitesWorker(const Path & nePath,
|
|
|
|
bool includeExprs, bool includeSuccessors,
|
|
|
|
PathSet & paths, PathSet & doneSet)
|
2003-07-29 13:43:12 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
if (doneSet.find(nePath) != doneSet.end()) return;
|
|
|
|
doneSet.insert(nePath);
|
2003-08-25 17:56:11 +03:00
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
StoreExpr ne = storeExprFromPath(nePath);
|
2003-07-29 13:43:12 +03:00
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
if (ne.type == StoreExpr::neClosure)
|
2003-10-07 15:27:49 +03:00
|
|
|
for (ClosureElems::iterator i = ne.closure.elems.begin();
|
2004-05-11 21:05:44 +03:00
|
|
|
i != ne.closure.elems.end(); ++i)
|
2003-08-20 17:11:40 +03:00
|
|
|
paths.insert(i->first);
|
2003-07-29 13:43:12 +03:00
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
else if (ne.type == StoreExpr::neDerivation)
|
2003-10-08 18:06:59 +03:00
|
|
|
for (PathSet::iterator i = ne.derivation.inputs.begin();
|
2004-05-11 21:05:44 +03:00
|
|
|
i != ne.derivation.inputs.end(); ++i)
|
2003-10-08 18:06:59 +03:00
|
|
|
requisitesWorker(*i,
|
2003-08-25 17:56:11 +03:00
|
|
|
includeExprs, includeSuccessors, paths, doneSet);
|
2003-07-29 13:43:12 +03:00
|
|
|
|
|
|
|
else abort();
|
2003-07-29 17:28:17 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
if (includeExprs) paths.insert(nePath);
|
2003-07-29 17:28:17 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
string nfPath;
|
|
|
|
if (includeSuccessors && (nfPath = useSuccessor(nePath)) != nePath)
|
|
|
|
requisitesWorker(nfPath, includeExprs, includeSuccessors,
|
|
|
|
paths, doneSet);
|
2003-07-29 13:43:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
PathSet storeExprRequisites(const Path & nePath,
|
2003-07-29 17:28:17 +03:00
|
|
|
bool includeExprs, bool includeSuccessors)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
PathSet paths;
|
|
|
|
PathSet doneSet;
|
|
|
|
requisitesWorker(nePath, includeExprs, includeSuccessors,
|
|
|
|
paths, doneSet);
|
|
|
|
return paths;
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|