2016-03-03 19:03:34 +02:00
|
|
|
#include "binary-cache-store.hh"
|
|
|
|
#include "download.hh"
|
2016-03-04 18:23:42 +02:00
|
|
|
#include "globals.hh"
|
2016-04-20 15:12:38 +03:00
|
|
|
#include "nar-info-disk-cache.hh"
|
2016-03-03 19:03:34 +02:00
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
2016-05-30 14:33:05 +03:00
|
|
|
MakeError(UploadToHTTP, Error);
|
|
|
|
|
2016-03-03 19:03:34 +02:00
|
|
|
class HttpBinaryCacheStore : public BinaryCacheStore
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
|
|
|
|
Path cacheUri;
|
|
|
|
|
|
|
|
public:
|
|
|
|
|
2016-05-04 21:15:41 +03:00
|
|
|
HttpBinaryCacheStore(
|
2016-06-01 15:49:12 +03:00
|
|
|
const Params & params, const Path & _cacheUri)
|
2016-05-04 21:15:41 +03:00
|
|
|
: BinaryCacheStore(params)
|
2016-03-03 19:03:34 +02:00
|
|
|
, cacheUri(_cacheUri)
|
|
|
|
{
|
|
|
|
if (cacheUri.back() == '/')
|
|
|
|
cacheUri.pop_back();
|
2016-04-20 15:12:38 +03:00
|
|
|
|
|
|
|
diskCache = getNarInfoDiskCache();
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string getUri() override
|
|
|
|
{
|
|
|
|
return cacheUri;
|
2016-03-03 19:03:34 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void init() override
|
|
|
|
{
|
|
|
|
// FIXME: do this lazily?
|
2016-06-01 16:15:21 +03:00
|
|
|
if (!diskCache->cacheExists(cacheUri, wantMassQuery_, priority)) {
|
2016-05-30 14:33:05 +03:00
|
|
|
try {
|
|
|
|
BinaryCacheStore::init();
|
|
|
|
} catch (UploadToHTTP &) {
|
2018-01-31 16:12:27 +02:00
|
|
|
throw Error("'%s' does not appear to be a binary cache", cacheUri);
|
2016-05-30 14:33:05 +03:00
|
|
|
}
|
2016-06-01 15:49:12 +03:00
|
|
|
diskCache->createCache(cacheUri, storeDir, wantMassQuery_, priority);
|
2016-04-20 15:12:38 +03:00
|
|
|
}
|
2016-03-03 19:03:34 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
protected:
|
|
|
|
|
|
|
|
bool fileExists(const std::string & path) override
|
|
|
|
{
|
|
|
|
try {
|
2016-09-14 17:00:40 +03:00
|
|
|
DownloadRequest request(cacheUri + "/" + path);
|
|
|
|
request.head = true;
|
|
|
|
request.tries = 5;
|
|
|
|
getDownloader()->download(request);
|
2016-03-03 19:03:34 +02:00
|
|
|
return true;
|
|
|
|
} catch (DownloadError & e) {
|
2016-03-30 12:17:51 +03:00
|
|
|
/* S3 buckets return 403 if a file doesn't exist and the
|
|
|
|
bucket is unlistable, so treat 403 as 404. */
|
|
|
|
if (e.error == Downloader::NotFound || e.error == Downloader::Forbidden)
|
2016-03-03 19:03:34 +02:00
|
|
|
return false;
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-14 16:26:01 +02:00
|
|
|
void upsertFile(const std::string & path,
|
|
|
|
const std::string & data,
|
|
|
|
const std::string & mimeType) override
|
2016-03-03 19:03:34 +02:00
|
|
|
{
|
2018-01-31 16:12:27 +02:00
|
|
|
auto req = DownloadRequest(cacheUri + "/" + path);
|
|
|
|
req.data = std::make_shared<string>(data); // FIXME: inefficient
|
|
|
|
req.mimeType = mimeType;
|
2018-01-26 21:12:30 +02:00
|
|
|
try {
|
|
|
|
getDownloader()->download(req);
|
|
|
|
} catch (DownloadError & e) {
|
2018-06-01 15:14:22 +03:00
|
|
|
throw UploadToHTTP("while uploading to HTTP binary cache at '%s': %s", cacheUri, e.msg());
|
2018-01-26 21:12:30 +02:00
|
|
|
}
|
2016-03-03 19:03:34 +02:00
|
|
|
}
|
|
|
|
|
2018-03-28 01:01:47 +03:00
|
|
|
DownloadRequest makeRequest(const std::string & path)
|
2016-03-03 19:03:34 +02:00
|
|
|
{
|
2016-09-14 17:00:40 +03:00
|
|
|
DownloadRequest request(cacheUri + "/" + path);
|
|
|
|
request.tries = 8;
|
2018-03-28 01:01:47 +03:00
|
|
|
return request;
|
|
|
|
}
|
|
|
|
|
|
|
|
void getFile(const std::string & path, Sink & sink) override
|
|
|
|
{
|
|
|
|
auto request(makeRequest(path));
|
|
|
|
try {
|
|
|
|
getDownloader()->download(std::move(request), sink);
|
|
|
|
} catch (DownloadError & e) {
|
|
|
|
if (e.error == Downloader::NotFound || e.error == Downloader::Forbidden)
|
|
|
|
throw NoSuchBinaryCacheFile("file '%s' does not exist in binary cache '%s'", path, getUri());
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void getFile(const std::string & path,
|
|
|
|
Callback<std::shared_ptr<std::string>> callback) override
|
|
|
|
{
|
|
|
|
auto request(makeRequest(path));
|
2016-09-16 19:54:14 +03:00
|
|
|
|
|
|
|
getDownloader()->enqueueDownload(request,
|
2018-03-27 23:16:01 +03:00
|
|
|
{[callback](std::future<DownloadResult> result) {
|
2016-09-16 19:54:14 +03:00
|
|
|
try {
|
2018-03-27 23:16:01 +03:00
|
|
|
callback(result.get().data);
|
2016-09-16 19:54:14 +03:00
|
|
|
} catch (DownloadError & e) {
|
|
|
|
if (e.error == Downloader::NotFound || e.error == Downloader::Forbidden)
|
2018-03-27 23:16:01 +03:00
|
|
|
return callback(std::shared_ptr<std::string>());
|
|
|
|
callback.rethrow();
|
2016-09-20 18:25:12 +03:00
|
|
|
} catch (...) {
|
2018-03-27 23:16:01 +03:00
|
|
|
callback.rethrow();
|
2016-09-16 19:54:14 +03:00
|
|
|
}
|
2018-03-27 23:16:01 +03:00
|
|
|
}});
|
2016-03-03 19:03:34 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
};
|
|
|
|
|
2016-04-29 17:26:16 +03:00
|
|
|
static RegisterStoreImplementation regStore([](
|
2016-06-01 15:49:12 +03:00
|
|
|
const std::string & uri, const Store::Params & params)
|
2016-04-29 17:26:16 +03:00
|
|
|
-> std::shared_ptr<Store>
|
|
|
|
{
|
2016-03-03 19:03:34 +02:00
|
|
|
if (std::string(uri, 0, 7) != "http://" &&
|
2016-06-01 16:15:21 +03:00
|
|
|
std::string(uri, 0, 8) != "https://" &&
|
|
|
|
(getEnv("_NIX_FORCE_HTTP_BINARY_CACHE_STORE") != "1" || std::string(uri, 0, 7) != "file://")
|
|
|
|
) return 0;
|
2016-05-04 21:15:41 +03:00
|
|
|
auto store = std::make_shared<HttpBinaryCacheStore>(params, uri);
|
2016-03-03 19:03:34 +02:00
|
|
|
store->init();
|
|
|
|
return store;
|
|
|
|
});
|
|
|
|
|
|
|
|
}
|
|
|
|
|