2006-11-30 21:19:59 +02:00
|
|
|
#include "shared.hh"
|
|
|
|
#include "local-store.hh"
|
|
|
|
#include "util.hh"
|
2006-11-30 21:54:43 +02:00
|
|
|
#include "serialise.hh"
|
2006-11-30 22:13:59 +02:00
|
|
|
#include "worker-protocol.hh"
|
2006-11-30 22:45:20 +02:00
|
|
|
#include "archive.hh"
|
2006-12-03 18:25:19 +02:00
|
|
|
#include "globals.hh"
|
2006-11-30 21:19:59 +02:00
|
|
|
|
2006-12-02 16:27:24 +02:00
|
|
|
#include <iostream>
|
2010-06-24 20:51:04 +03:00
|
|
|
#include <cstring>
|
2006-12-03 05:03:36 +02:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <signal.h>
|
2006-12-04 19:17:13 +02:00
|
|
|
#include <sys/types.h>
|
2006-12-05 19:21:42 +02:00
|
|
|
#include <sys/wait.h>
|
2006-12-04 19:17:13 +02:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/un.h>
|
2006-12-03 05:03:36 +02:00
|
|
|
#include <fcntl.h>
|
2006-12-05 19:21:42 +02:00
|
|
|
#include <errno.h>
|
2006-12-02 16:27:24 +02:00
|
|
|
|
2006-11-30 21:19:59 +02:00
|
|
|
using namespace nix;
|
|
|
|
|
|
|
|
|
2009-09-30 14:32:04 +03:00
|
|
|
/* On platforms that have O_ASYNC, we can detect when a client
|
|
|
|
disconnects and immediately kill any ongoing builds. On platforms
|
|
|
|
that lack it, we only notice the disconnection the next time we try
|
|
|
|
to write to the client. So if you have a builder that never
|
|
|
|
generates output on stdout/stderr, the worker will never notice
|
|
|
|
that the client has disconnected until the builder terminates. */
|
|
|
|
#ifdef O_ASYNC
|
|
|
|
#define HAVE_HUP_NOTIFICATION
|
2006-12-05 00:58:44 +02:00
|
|
|
#ifndef SIGPOLL
|
|
|
|
#define SIGPOLL SIGIO
|
|
|
|
#endif
|
2009-09-30 14:32:04 +03:00
|
|
|
#endif
|
2006-12-05 00:58:44 +02:00
|
|
|
|
|
|
|
|
2006-12-03 18:25:19 +02:00
|
|
|
static FdSource from(STDIN_FILENO);
|
|
|
|
static FdSink to(STDOUT_FILENO);
|
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
bool canSendStderr;
|
2006-12-05 20:21:16 +02:00
|
|
|
pid_t myPid;
|
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
|
|
|
|
|
2006-12-03 05:03:36 +02:00
|
|
|
/* This function is called anytime we want to write something to
|
|
|
|
stderr. If we're in a state where the protocol allows it (i.e.,
|
|
|
|
when canSendStderr), send the message to the client over the
|
|
|
|
socket. */
|
2006-12-03 04:08:13 +02:00
|
|
|
static void tunnelStderr(const unsigned char * buf, size_t count)
|
2006-11-30 21:19:59 +02:00
|
|
|
{
|
2006-12-05 20:21:16 +02:00
|
|
|
/* Don't send the message to the client if we're a child of the
|
|
|
|
process handling the connection. Otherwise we could screw up
|
|
|
|
the protocol. It's up to the parent to redirect stderr and
|
|
|
|
send it to the client somehow (e.g., as in build.cc). */
|
|
|
|
if (canSendStderr && myPid == getpid()) {
|
2006-12-03 04:08:13 +02:00
|
|
|
try {
|
2006-12-03 18:25:19 +02:00
|
|
|
writeInt(STDERR_NEXT, to);
|
2011-12-16 23:29:46 +02:00
|
|
|
writeString(buf, count, to);
|
2011-12-15 01:30:06 +02:00
|
|
|
to.flush();
|
2006-12-03 04:08:13 +02:00
|
|
|
} catch (...) {
|
|
|
|
/* Write failed; that means that the other side is
|
|
|
|
gone. */
|
|
|
|
canSendStderr = false;
|
|
|
|
throw;
|
|
|
|
}
|
2006-12-05 20:21:16 +02:00
|
|
|
} else
|
|
|
|
writeFull(STDERR_FILENO, buf, count);
|
2006-12-03 04:08:13 +02:00
|
|
|
}
|
2006-11-30 21:19:59 +02:00
|
|
|
|
|
|
|
|
2006-12-05 17:36:31 +02:00
|
|
|
/* Return true if the remote side has closed its end of the
|
|
|
|
connection, false otherwise. Should not be called on any socket on
|
|
|
|
which we expect input! */
|
|
|
|
static bool isFarSideClosed(int socket)
|
|
|
|
{
|
|
|
|
struct timeval timeout;
|
|
|
|
timeout.tv_sec = timeout.tv_usec = 0;
|
|
|
|
|
|
|
|
fd_set fds;
|
|
|
|
FD_ZERO(&fds);
|
|
|
|
FD_SET(socket, &fds);
|
2007-02-22 20:15:29 +02:00
|
|
|
|
|
|
|
while (select(socket + 1, &fds, 0, 0, &timeout) == -1)
|
|
|
|
if (errno != EINTR) throw SysError("select()");
|
2006-12-05 17:36:31 +02:00
|
|
|
|
|
|
|
if (!FD_ISSET(socket, &fds)) return false;
|
|
|
|
|
|
|
|
/* Destructive read to determine whether the select() marked the
|
|
|
|
socket as readable because there is actual input or because
|
|
|
|
we've reached EOF (i.e., a read of size 0 is available). */
|
|
|
|
char c;
|
2007-03-28 18:46:21 +03:00
|
|
|
int rd;
|
|
|
|
if ((rd = read(socket, &c, 1)) > 0)
|
2006-12-05 17:36:31 +02:00
|
|
|
throw Error("EOF expected (protocol error?)");
|
2007-03-28 18:46:21 +03:00
|
|
|
else if (rd == -1 && errno != ECONNRESET)
|
|
|
|
throw SysError("expected connection reset or EOF");
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-05 17:36:31 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-04 19:55:14 +02:00
|
|
|
/* A SIGPOLL signal is received when data is available on the client
|
2009-09-30 14:32:04 +03:00
|
|
|
communication socket, or when the client has closed its side of the
|
2006-12-03 05:03:36 +02:00
|
|
|
socket. This handler is enabled at precisely those moments in the
|
|
|
|
protocol when we're doing work and the client is supposed to be
|
2006-12-04 19:55:14 +02:00
|
|
|
quiet. Thus, if we get a SIGPOLL signal, it means that the client
|
2006-12-04 19:17:13 +02:00
|
|
|
has quit. So we should quit as well.
|
|
|
|
|
|
|
|
Too bad most operating systems don't support the POLL_HUP value for
|
2006-12-04 19:55:14 +02:00
|
|
|
si_code in siginfo_t. That would make most of the SIGPOLL
|
|
|
|
complexity unnecessary, i.e., we could just enable SIGPOLL all the
|
|
|
|
time and wouldn't have to worry about races. */
|
2006-12-05 16:15:51 +02:00
|
|
|
static void sigPollHandler(int sigNo)
|
2006-12-03 05:03:36 +02:00
|
|
|
{
|
2010-06-24 20:51:04 +03:00
|
|
|
using namespace std;
|
2006-12-05 17:36:31 +02:00
|
|
|
try {
|
|
|
|
/* Check that the far side actually closed. We're still
|
|
|
|
getting spurious signals every once in a while. I.e.,
|
|
|
|
there is no input available, but we get a signal with
|
|
|
|
POLL_IN set. Maybe it's delayed or something. */
|
|
|
|
if (isFarSideClosed(from.fd)) {
|
|
|
|
if (!blockInt) {
|
|
|
|
_isInterrupted = 1;
|
|
|
|
blockInt = 1;
|
|
|
|
canSendStderr = false;
|
2009-03-23 15:52:52 +02:00
|
|
|
const char * s = "SIGPOLL\n";
|
2008-12-12 14:59:27 +02:00
|
|
|
write(STDERR_FILENO, s, strlen(s));
|
2006-12-05 17:36:31 +02:00
|
|
|
}
|
|
|
|
} else {
|
2009-03-23 15:52:52 +02:00
|
|
|
const char * s = "spurious SIGPOLL\n";
|
2008-12-12 14:59:27 +02:00
|
|
|
write(STDERR_FILENO, s, strlen(s));
|
2006-12-05 17:36:31 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (Error & e) {
|
|
|
|
/* Shouldn't happen. */
|
2007-03-28 18:46:21 +03:00
|
|
|
string s = "impossible: " + e.msg() + '\n';
|
2012-02-09 19:27:45 +02:00
|
|
|
write(STDERR_FILENO, s.data(), s.size());
|
2007-03-28 18:46:21 +03:00
|
|
|
throw;
|
2006-12-04 19:17:13 +02:00
|
|
|
}
|
2006-12-03 05:03:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-05 16:15:51 +02:00
|
|
|
static void setSigPollAction(bool enable)
|
2006-12-04 19:55:14 +02:00
|
|
|
{
|
2009-09-30 14:32:04 +03:00
|
|
|
#ifdef HAVE_HUP_NOTIFICATION
|
2006-12-04 19:55:14 +02:00
|
|
|
struct sigaction act, oact;
|
2006-12-05 16:15:51 +02:00
|
|
|
act.sa_handler = enable ? sigPollHandler : SIG_IGN;
|
2006-12-04 19:55:14 +02:00
|
|
|
sigfillset(&act.sa_mask);
|
|
|
|
act.sa_flags = 0;
|
|
|
|
if (sigaction(SIGPOLL, &act, &oact))
|
|
|
|
throw SysError("setting handler for SIGPOLL");
|
2009-09-30 14:32:04 +03:00
|
|
|
#endif
|
2006-12-04 19:55:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
/* startWork() means that we're starting an operation for which we
|
|
|
|
want to send out stderr to the client. */
|
|
|
|
static void startWork()
|
|
|
|
{
|
|
|
|
canSendStderr = true;
|
2006-12-03 05:03:36 +02:00
|
|
|
|
|
|
|
/* Handle client death asynchronously. */
|
2006-12-05 16:15:51 +02:00
|
|
|
setSigPollAction(true);
|
2006-12-03 05:16:27 +02:00
|
|
|
|
|
|
|
/* Of course, there is a race condition here: the socket could
|
|
|
|
have closed between when we last read from / wrote to it, and
|
2006-12-04 19:55:14 +02:00
|
|
|
between the time we set the handler for SIGPOLL. In that case
|
|
|
|
we won't get the signal. So do a non-blocking select() to find
|
2006-12-03 05:16:27 +02:00
|
|
|
out if any input is available on the socket. If there is, it
|
|
|
|
has to be the 0-byte read that indicates that the socket has
|
|
|
|
closed. */
|
2006-12-05 17:36:31 +02:00
|
|
|
if (isFarSideClosed(from.fd)) {
|
2006-12-03 05:16:27 +02:00
|
|
|
_isInterrupted = 1;
|
|
|
|
checkInterrupt();
|
|
|
|
}
|
2006-12-03 04:08:13 +02:00
|
|
|
}
|
2006-11-30 21:54:43 +02:00
|
|
|
|
2006-11-30 22:13:59 +02:00
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
/* stopWork() means that we're done; stop sending stderr to the
|
|
|
|
client. */
|
2010-12-17 13:28:26 +02:00
|
|
|
static void stopWork(bool success = true, const string & msg = "", unsigned int status = 0)
|
2006-12-03 04:08:13 +02:00
|
|
|
{
|
2006-12-03 05:03:36 +02:00
|
|
|
/* Stop handling async client death; we're going to a state where
|
|
|
|
we're either sending or receiving from the client, so we'll be
|
|
|
|
notified of client death anyway. */
|
2006-12-05 16:15:51 +02:00
|
|
|
setSigPollAction(false);
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
canSendStderr = false;
|
2006-12-04 19:17:13 +02:00
|
|
|
|
|
|
|
if (success)
|
|
|
|
writeInt(STDERR_LAST, to);
|
|
|
|
else {
|
|
|
|
writeInt(STDERR_ERROR, to);
|
|
|
|
writeString(msg, to);
|
2010-12-17 13:28:26 +02:00
|
|
|
if (status != 0) writeInt(status, to);
|
2006-12-04 19:17:13 +02:00
|
|
|
}
|
2006-12-03 04:08:13 +02:00
|
|
|
}
|
2006-12-01 20:00:01 +02:00
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
|
2007-02-21 18:34:00 +02:00
|
|
|
struct TunnelSink : Sink
|
|
|
|
{
|
|
|
|
Sink & to;
|
2011-12-15 01:30:06 +02:00
|
|
|
TunnelSink(Sink & to) : to(to) { }
|
2011-12-15 18:19:53 +02:00
|
|
|
virtual void operator () (const unsigned char * data, size_t len)
|
2007-02-21 18:34:00 +02:00
|
|
|
{
|
2007-02-21 19:34:02 +02:00
|
|
|
writeInt(STDERR_WRITE, to);
|
2011-12-16 23:29:46 +02:00
|
|
|
writeString(data, len, to);
|
2007-02-21 18:34:00 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2011-12-16 21:44:13 +02:00
|
|
|
struct TunnelSource : BufferedSource
|
2007-02-21 19:34:02 +02:00
|
|
|
{
|
|
|
|
Source & from;
|
2011-12-15 01:30:06 +02:00
|
|
|
TunnelSource(Source & from) : from(from) { }
|
2011-12-16 21:44:13 +02:00
|
|
|
size_t readUnbuffered(unsigned char * data, size_t len)
|
2007-02-21 19:34:02 +02:00
|
|
|
{
|
|
|
|
/* Careful: we're going to receive data from the client now,
|
|
|
|
so we have to disable the SIGPOLL handler. */
|
|
|
|
setSigPollAction(false);
|
|
|
|
canSendStderr = false;
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2007-02-21 19:34:02 +02:00
|
|
|
writeInt(STDERR_READ, to);
|
|
|
|
writeInt(len, to);
|
2011-12-15 01:30:06 +02:00
|
|
|
to.flush();
|
2011-12-16 23:29:46 +02:00
|
|
|
size_t n = readString(data, len, from);
|
2007-02-21 19:34:02 +02:00
|
|
|
|
|
|
|
startWork();
|
2011-12-16 23:29:46 +02:00
|
|
|
if (n == 0) throw EndOfFile("unexpected end-of-file");
|
|
|
|
return n;
|
2007-02-21 19:34:02 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2008-12-03 20:05:14 +02:00
|
|
|
/* If the NAR archive contains a single file at top-level, then save
|
|
|
|
the contents of the file to `s'. Otherwise barf. */
|
|
|
|
struct RetrieveRegularNARSink : ParseSink
|
|
|
|
{
|
2011-12-01 15:48:48 +02:00
|
|
|
bool regular;
|
2008-12-03 20:05:14 +02:00
|
|
|
string s;
|
|
|
|
|
2011-12-01 15:48:48 +02:00
|
|
|
RetrieveRegularNARSink() : regular(true) { }
|
|
|
|
|
2008-12-03 20:05:14 +02:00
|
|
|
void createDirectory(const Path & path)
|
|
|
|
{
|
2011-12-01 15:48:48 +02:00
|
|
|
regular = false;
|
2008-12-03 20:05:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void receiveContents(unsigned char * data, unsigned int len)
|
|
|
|
{
|
|
|
|
s.append((const char *) data, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
void createSymlink(const Path & path, const string & target)
|
|
|
|
{
|
2011-12-01 15:48:48 +02:00
|
|
|
regular = false;
|
2008-12-03 20:05:14 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* Adapter class of a Source that saves all data read to `s'. */
|
|
|
|
struct SavingSourceAdapter : Source
|
|
|
|
{
|
|
|
|
Source & orig;
|
|
|
|
string s;
|
|
|
|
SavingSourceAdapter(Source & orig) : orig(orig) { }
|
2011-12-16 21:44:13 +02:00
|
|
|
size_t read(unsigned char * data, size_t len)
|
2008-12-03 20:05:14 +02:00
|
|
|
{
|
2011-12-16 21:44:13 +02:00
|
|
|
size_t n = orig.read(data, len);
|
|
|
|
s.append((const char *) data, n);
|
|
|
|
return n;
|
2008-12-03 20:05:14 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2007-11-16 18:15:26 +02:00
|
|
|
static void performOp(unsigned int clientVersion,
|
|
|
|
Source & from, Sink & to, unsigned int op)
|
2006-12-03 04:08:13 +02:00
|
|
|
{
|
|
|
|
switch (op) {
|
|
|
|
|
2012-07-31 00:13:25 +03:00
|
|
|
#if 0
|
2006-12-03 04:08:13 +02:00
|
|
|
case wopQuit: {
|
|
|
|
/* Close the database. */
|
|
|
|
store.reset((StoreAPI *) 0);
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
case wopIsValidPath: {
|
|
|
|
Path path = readStorePath(from);
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
|
|
|
bool result = store->isValidPath(path);
|
|
|
|
stopWork();
|
|
|
|
writeInt(result, to);
|
2006-12-03 04:08:13 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-07-11 18:08:47 +03:00
|
|
|
case wopQueryValidPaths: {
|
|
|
|
PathSet paths = readStorePaths<PathSet>(from);
|
|
|
|
startWork();
|
|
|
|
PathSet res = store->queryValidPaths(paths);
|
|
|
|
stopWork();
|
|
|
|
writeStrings(res, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
case wopHasSubstitutes: {
|
|
|
|
Path path = readStorePath(from);
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
2012-07-12 00:52:18 +03:00
|
|
|
PathSet res = store->querySubstitutablePaths(singleton<PathSet>(path));
|
2006-12-04 19:55:14 +02:00
|
|
|
stopWork();
|
2012-07-12 00:52:18 +03:00
|
|
|
writeInt(res.find(path) != res.end(), to);
|
2006-12-03 04:08:13 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-07-12 00:52:18 +03:00
|
|
|
case wopQuerySubstitutablePaths: {
|
|
|
|
PathSet paths = readStorePaths<PathSet>(from);
|
|
|
|
startWork();
|
|
|
|
PathSet res = store->querySubstitutablePaths(paths);
|
|
|
|
stopWork();
|
|
|
|
writeStrings(res, to);
|
|
|
|
break;
|
|
|
|
}
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
case wopQueryPathHash: {
|
|
|
|
Path path = readStorePath(from);
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
|
|
|
Hash hash = store->queryPathHash(path);
|
|
|
|
stopWork();
|
|
|
|
writeString(printHash(hash), to);
|
2006-12-03 04:08:13 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case wopQueryReferences:
|
2010-02-25 17:52:22 +02:00
|
|
|
case wopQueryReferrers:
|
|
|
|
case wopQueryDerivationOutputs: {
|
2006-12-03 04:08:13 +02:00
|
|
|
Path path = readStorePath(from);
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
2006-12-03 04:08:13 +02:00
|
|
|
PathSet paths;
|
|
|
|
if (op == wopQueryReferences)
|
|
|
|
store->queryReferences(path, paths);
|
2010-02-25 17:52:22 +02:00
|
|
|
else if (op == wopQueryReferrers)
|
2006-12-03 04:08:13 +02:00
|
|
|
store->queryReferrers(path, paths);
|
2010-02-25 17:52:22 +02:00
|
|
|
else paths = store->queryDerivationOutputs(path);
|
2006-12-04 19:55:14 +02:00
|
|
|
stopWork();
|
2011-12-17 00:31:25 +02:00
|
|
|
writeStrings(paths, to);
|
2006-12-03 04:08:13 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-11-06 08:28:20 +02:00
|
|
|
case wopQueryDerivationOutputNames: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
startWork();
|
|
|
|
StringSet names;
|
|
|
|
names = store->queryDerivationOutputNames(path);
|
|
|
|
stopWork();
|
2011-12-20 18:37:01 +02:00
|
|
|
writeStrings(names, to);
|
2011-11-06 08:28:20 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2007-06-12 19:53:44 +03:00
|
|
|
case wopQueryDeriver: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
startWork();
|
|
|
|
Path deriver = store->queryDeriver(path);
|
|
|
|
stopWork();
|
|
|
|
writeString(deriver, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-07-18 01:55:39 +03:00
|
|
|
case wopQueryPathFromHashPart: {
|
|
|
|
string hashPart = readString(from);
|
|
|
|
startWork();
|
|
|
|
Path path = store->queryPathFromHashPart(hashPart);
|
|
|
|
stopWork();
|
|
|
|
writeString(path, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
case wopAddToStore: {
|
|
|
|
string baseName = readString(from);
|
2008-12-03 19:02:29 +02:00
|
|
|
bool fixed = readInt(from) == 1; /* obsolete */
|
2006-12-03 04:08:13 +02:00
|
|
|
bool recursive = readInt(from) == 1;
|
2008-12-03 19:02:29 +02:00
|
|
|
string s = readString(from);
|
|
|
|
/* Compatibility hack. */
|
|
|
|
if (!fixed) {
|
|
|
|
s = "sha256";
|
|
|
|
recursive = true;
|
|
|
|
}
|
|
|
|
HashType hashAlgo = parseHashType(s);
|
|
|
|
|
2008-12-03 20:05:14 +02:00
|
|
|
SavingSourceAdapter savedNAR(from);
|
|
|
|
RetrieveRegularNARSink savedRegular;
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2008-12-03 20:05:14 +02:00
|
|
|
if (recursive) {
|
|
|
|
/* Get the entire NAR dump from the client and save it to
|
|
|
|
a string so that we can pass it to
|
|
|
|
addToStoreFromDump(). */
|
|
|
|
ParseSink sink; /* null sink; just parse the NAR */
|
|
|
|
parseDump(sink, savedNAR);
|
2011-12-01 15:51:05 +02:00
|
|
|
} else
|
2008-12-03 20:05:14 +02:00
|
|
|
parseDump(savedRegular, from);
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
2011-12-01 15:51:05 +02:00
|
|
|
if (!savedRegular.regular) throw Error("regular file expected");
|
2008-12-03 20:05:14 +02:00
|
|
|
Path path = dynamic_cast<LocalStore *>(store.get())
|
|
|
|
->addToStoreFromDump(recursive ? savedNAR.s : savedRegular.s, baseName, recursive, hashAlgo);
|
2006-12-04 19:55:14 +02:00
|
|
|
stopWork();
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:55:14 +02:00
|
|
|
writeString(path, to);
|
2006-12-03 04:08:13 +02:00
|
|
|
break;
|
|
|
|
}
|
2006-12-01 20:00:01 +02:00
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
case wopAddTextToStore: {
|
|
|
|
string suffix = readString(from);
|
|
|
|
string s = readString(from);
|
2011-12-17 00:31:25 +02:00
|
|
|
PathSet refs = readStorePaths<PathSet>(from);
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
|
|
|
Path path = store->addTextToStore(suffix, s, refs);
|
|
|
|
stopWork();
|
|
|
|
writeString(path, to);
|
2006-12-03 04:08:13 +02:00
|
|
|
break;
|
|
|
|
}
|
2006-11-30 22:13:59 +02:00
|
|
|
|
2007-02-21 18:34:00 +02:00
|
|
|
case wopExportPath: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
bool sign = readInt(from) == 1;
|
|
|
|
startWork();
|
|
|
|
TunnelSink sink(to);
|
|
|
|
store->exportPath(path, sign, sink);
|
|
|
|
stopWork();
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-12-17 00:31:25 +02:00
|
|
|
case wopImportPaths: {
|
2007-02-21 19:34:02 +02:00
|
|
|
startWork();
|
|
|
|
TunnelSource source(from);
|
2011-12-17 00:31:25 +02:00
|
|
|
Paths paths = store->importPaths(true, source);
|
2007-02-21 19:34:02 +02:00
|
|
|
stopWork();
|
2011-12-17 00:31:25 +02:00
|
|
|
writeStrings(paths, to);
|
2007-02-21 19:34:02 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-06-27 23:58:15 +03:00
|
|
|
case wopBuildPaths: {
|
2011-12-17 00:31:25 +02:00
|
|
|
PathSet drvs = readStorePaths<PathSet>(from);
|
2006-12-03 04:08:13 +02:00
|
|
|
startWork();
|
2012-06-27 23:58:15 +03:00
|
|
|
store->buildPaths(drvs);
|
2006-12-03 04:08:13 +02:00
|
|
|
stopWork();
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
2006-11-30 22:13:59 +02:00
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
case wopEnsurePath: {
|
|
|
|
Path path = readStorePath(from);
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
2006-12-03 04:08:13 +02:00
|
|
|
store->ensurePath(path);
|
2006-12-04 19:55:14 +02:00
|
|
|
stopWork();
|
2006-12-03 04:08:13 +02:00
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
2006-11-30 22:13:59 +02:00
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
case wopAddTempRoot: {
|
|
|
|
Path path = readStorePath(from);
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
2006-12-03 04:08:13 +02:00
|
|
|
store->addTempRoot(path);
|
2006-12-04 19:55:14 +02:00
|
|
|
stopWork();
|
2006-12-03 04:08:13 +02:00
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
2006-12-01 00:43:55 +02:00
|
|
|
|
2006-12-05 01:29:16 +02:00
|
|
|
case wopAddIndirectRoot: {
|
|
|
|
Path path = absPath(readString(from));
|
|
|
|
startWork();
|
|
|
|
store->addIndirectRoot(path);
|
|
|
|
stopWork();
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
case wopSyncWithGC: {
|
2006-12-04 19:55:14 +02:00
|
|
|
startWork();
|
2006-12-03 04:08:13 +02:00
|
|
|
store->syncWithGC();
|
2006-12-04 19:55:14 +02:00
|
|
|
stopWork();
|
2006-12-03 04:08:13 +02:00
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
2006-12-02 16:27:24 +02:00
|
|
|
|
2006-12-05 03:31:45 +02:00
|
|
|
case wopFindRoots: {
|
|
|
|
startWork();
|
|
|
|
Roots roots = store->findRoots();
|
|
|
|
stopWork();
|
|
|
|
writeInt(roots.size(), to);
|
|
|
|
for (Roots::iterator i = roots.begin(); i != roots.end(); ++i) {
|
|
|
|
writeString(i->first, to);
|
|
|
|
writeString(i->second, to);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-12-05 04:18:46 +02:00
|
|
|
case wopCollectGarbage: {
|
2008-06-18 12:34:17 +03:00
|
|
|
GCOptions options;
|
|
|
|
options.action = (GCOptions::GCAction) readInt(from);
|
2011-12-17 00:31:25 +02:00
|
|
|
options.pathsToDelete = readStorePaths<PathSet>(from);
|
2008-06-18 12:34:17 +03:00
|
|
|
options.ignoreLiveness = readInt(from);
|
|
|
|
options.maxFreed = readLongLong(from);
|
2012-03-26 21:00:02 +03:00
|
|
|
readInt(from); // obsolete field
|
2008-12-16 14:23:35 +02:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 5) {
|
2009-11-20 19:12:38 +02:00
|
|
|
/* removed options */
|
|
|
|
readInt(from);
|
|
|
|
readInt(from);
|
2008-12-16 14:23:35 +02:00
|
|
|
}
|
2008-06-18 12:34:17 +03:00
|
|
|
|
|
|
|
GCResults results;
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-05 04:18:46 +02:00
|
|
|
startWork();
|
2008-06-18 12:34:17 +03:00
|
|
|
if (options.ignoreLiveness)
|
2006-12-05 04:18:46 +02:00
|
|
|
throw Error("you are not allowed to ignore liveness");
|
2008-06-18 12:34:17 +03:00
|
|
|
store->collectGarbage(options, results);
|
2006-12-05 04:18:46 +02:00
|
|
|
stopWork();
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2011-12-17 00:31:25 +02:00
|
|
|
writeStrings(results.paths, to);
|
2008-06-18 12:34:17 +03:00
|
|
|
writeLongLong(results.bytesFreed, to);
|
2012-08-02 05:34:46 +03:00
|
|
|
writeLongLong(0, to); // obsolete
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-05 04:18:46 +02:00
|
|
|
break;
|
|
|
|
}
|
2007-09-18 12:11:20 +03:00
|
|
|
|
|
|
|
case wopSetOptions: {
|
2012-07-31 02:55:41 +03:00
|
|
|
settings.keepFailed = readInt(from) != 0;
|
|
|
|
settings.keepGoing = readInt(from) != 0;
|
|
|
|
settings.tryFallback = readInt(from) != 0;
|
2007-09-18 12:11:20 +03:00
|
|
|
verbosity = (Verbosity) readInt(from);
|
2012-07-31 02:55:41 +03:00
|
|
|
settings.maxBuildJobs = readInt(from);
|
|
|
|
settings.maxSilentTime = readInt(from);
|
2007-11-16 18:15:26 +02:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 2)
|
2012-07-31 02:55:41 +03:00
|
|
|
settings.useBuildHook = readInt(from) != 0;
|
2008-11-12 13:08:27 +02:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 4) {
|
2012-07-31 02:55:41 +03:00
|
|
|
settings.buildVerbosity = (Verbosity) readInt(from);
|
2008-11-12 13:08:27 +02:00
|
|
|
logType = (LogType) readInt(from);
|
2012-07-31 02:55:41 +03:00
|
|
|
settings.printBuildTrace = readInt(from) != 0;
|
2008-11-12 13:08:27 +02:00
|
|
|
}
|
2012-05-01 02:15:34 +03:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 6)
|
2012-07-31 02:55:41 +03:00
|
|
|
settings.buildCores = readInt(from);
|
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 10)
|
|
|
|
settings.useSubstitutes = readInt(from) != 0;
|
2012-08-01 01:19:44 +03:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 12) {
|
|
|
|
unsigned int n = readInt(from);
|
|
|
|
for (unsigned int i = 0; i < n; i++) {
|
|
|
|
string name = readString(from);
|
|
|
|
string value = readString(from);
|
|
|
|
settings.set("untrusted-" + name, value);
|
|
|
|
}
|
|
|
|
}
|
2007-09-18 12:11:20 +03:00
|
|
|
startWork();
|
|
|
|
stopWork();
|
|
|
|
break;
|
|
|
|
}
|
2008-08-04 14:44:50 +03:00
|
|
|
|
|
|
|
case wopQuerySubstitutablePathInfo: {
|
|
|
|
Path path = absPath(readString(from));
|
|
|
|
startWork();
|
2012-07-11 17:43:24 +03:00
|
|
|
SubstitutablePathInfos infos;
|
|
|
|
store->querySubstitutablePathInfos(singleton<PathSet>(path), infos);
|
2008-08-04 14:44:50 +03:00
|
|
|
stopWork();
|
2012-07-11 17:43:24 +03:00
|
|
|
SubstitutablePathInfos::iterator i = infos.find(path);
|
|
|
|
if (i == infos.end())
|
|
|
|
writeInt(0, to);
|
|
|
|
else {
|
|
|
|
writeInt(1, to);
|
|
|
|
writeString(i->second.deriver, to);
|
|
|
|
writeStrings(i->second.references, to);
|
|
|
|
writeLongLong(i->second.downloadSize, to);
|
2010-11-17 16:31:42 +02:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 7)
|
2012-07-11 17:43:24 +03:00
|
|
|
writeLongLong(i->second.narSize, to);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2012-07-11 17:43:24 +03:00
|
|
|
case wopQuerySubstitutablePathInfos: {
|
|
|
|
PathSet paths = readStorePaths<PathSet>(from);
|
|
|
|
startWork();
|
|
|
|
SubstitutablePathInfos infos;
|
|
|
|
store->querySubstitutablePathInfos(paths, infos);
|
|
|
|
stopWork();
|
|
|
|
writeInt(infos.size(), to);
|
|
|
|
foreach (SubstitutablePathInfos::iterator, i, infos) {
|
|
|
|
writeString(i->first, to);
|
|
|
|
writeString(i->second.deriver, to);
|
|
|
|
writeStrings(i->second.references, to);
|
|
|
|
writeLongLong(i->second.downloadSize, to);
|
|
|
|
writeLongLong(i->second.narSize, to);
|
2008-08-04 14:44:50 +03:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2012-07-11 17:49:04 +03:00
|
|
|
case wopQueryAllValidPaths: {
|
2010-02-26 14:05:01 +02:00
|
|
|
startWork();
|
2012-07-11 17:49:04 +03:00
|
|
|
PathSet paths = store->queryAllValidPaths();
|
2010-02-26 14:05:01 +02:00
|
|
|
stopWork();
|
2011-12-17 00:31:25 +02:00
|
|
|
writeStrings(paths, to);
|
2010-02-26 14:05:01 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2010-05-04 13:45:10 +03:00
|
|
|
case wopQueryFailedPaths: {
|
|
|
|
startWork();
|
|
|
|
PathSet paths = store->queryFailedPaths();
|
|
|
|
stopWork();
|
2011-12-17 00:31:25 +02:00
|
|
|
writeStrings(paths, to);
|
2010-05-04 13:45:10 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case wopClearFailedPaths: {
|
2011-12-17 00:31:25 +02:00
|
|
|
PathSet paths = readStrings<PathSet>(from);
|
2010-05-04 13:45:10 +03:00
|
|
|
startWork();
|
|
|
|
store->clearFailedPaths(paths);
|
|
|
|
stopWork();
|
|
|
|
writeInt(1, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2010-11-17 14:08:01 +02:00
|
|
|
case wopQueryPathInfo: {
|
|
|
|
Path path = readStorePath(from);
|
|
|
|
startWork();
|
|
|
|
ValidPathInfo info = store->queryPathInfo(path);
|
|
|
|
stopWork();
|
|
|
|
writeString(info.deriver, to);
|
|
|
|
writeString(printHash(info.hash), to);
|
2011-12-17 00:31:25 +02:00
|
|
|
writeStrings(info.references, to);
|
2010-11-17 14:08:01 +02:00
|
|
|
writeInt(info.registrationTime, to);
|
|
|
|
writeLongLong(info.narSize, to);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
default:
|
|
|
|
throw Error(format("invalid operation %1%") % op);
|
|
|
|
}
|
|
|
|
}
|
2006-12-01 00:43:55 +02:00
|
|
|
|
2006-12-01 20:00:01 +02:00
|
|
|
|
2006-12-03 18:25:19 +02:00
|
|
|
static void processConnection()
|
2006-12-03 04:08:13 +02:00
|
|
|
{
|
2006-12-03 18:25:19 +02:00
|
|
|
canSendStderr = false;
|
2012-07-31 00:13:25 +03:00
|
|
|
myPid = getpid();
|
2006-12-03 18:25:19 +02:00
|
|
|
writeToStderr = tunnelStderr;
|
2006-12-01 20:00:01 +02:00
|
|
|
|
2009-09-30 14:32:04 +03:00
|
|
|
#ifdef HAVE_HUP_NOTIFICATION
|
2006-12-04 19:55:14 +02:00
|
|
|
/* Allow us to receive SIGPOLL for events on the client socket. */
|
2006-12-05 16:15:51 +02:00
|
|
|
setSigPollAction(false);
|
2006-12-04 19:17:13 +02:00
|
|
|
if (fcntl(from.fd, F_SETOWN, getpid()) == -1)
|
2006-12-03 18:25:19 +02:00
|
|
|
throw SysError("F_SETOWN");
|
2009-09-30 14:32:04 +03:00
|
|
|
if (fcntl(from.fd, F_SETFL, fcntl(from.fd, F_GETFL, 0) | O_ASYNC) == -1)
|
2006-12-03 18:25:19 +02:00
|
|
|
throw SysError("F_SETFL");
|
2009-09-30 14:32:04 +03:00
|
|
|
#endif
|
2006-12-03 18:25:19 +02:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
/* Exchange the greeting. */
|
|
|
|
unsigned int magic = readInt(from);
|
|
|
|
if (magic != WORKER_MAGIC_1) throw Error("protocol mismatch");
|
|
|
|
writeInt(WORKER_MAGIC_2, to);
|
2007-09-18 12:11:20 +03:00
|
|
|
writeInt(PROTOCOL_VERSION, to);
|
2011-12-15 01:30:06 +02:00
|
|
|
to.flush();
|
2007-09-18 12:11:20 +03:00
|
|
|
unsigned int clientVersion = readInt(from);
|
|
|
|
|
2012-08-22 17:58:24 +03:00
|
|
|
bool reserveSpace = true;
|
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 11)
|
|
|
|
reserveSpace = readInt(from) != 0;
|
|
|
|
|
2006-12-03 18:25:19 +02:00
|
|
|
/* Send startup error messages to the client. */
|
|
|
|
startWork();
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
2007-09-18 12:11:20 +03:00
|
|
|
/* If we can't accept clientVersion, then throw an error
|
|
|
|
*here* (not above). */
|
|
|
|
|
2008-03-20 20:15:20 +02:00
|
|
|
#if 0
|
2006-12-03 18:25:19 +02:00
|
|
|
/* Prevent users from doing something very dangerous. */
|
2006-12-05 19:44:19 +02:00
|
|
|
if (geteuid() == 0 &&
|
2006-12-06 22:18:29 +02:00
|
|
|
querySetting("build-users-group", "") == "")
|
|
|
|
throw Error("if you run `nix-worker' as root, then you MUST set `build-users-group'!");
|
2008-03-20 20:15:20 +02:00
|
|
|
#endif
|
2006-12-03 18:25:19 +02:00
|
|
|
|
|
|
|
/* Open the store. */
|
2012-05-30 05:59:12 +03:00
|
|
|
store = boost::shared_ptr<StoreAPI>(new LocalStore(reserveSpace));
|
2006-12-03 18:25:19 +02:00
|
|
|
|
|
|
|
stopWork();
|
2011-12-15 01:30:06 +02:00
|
|
|
to.flush();
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-03 18:25:19 +02:00
|
|
|
} catch (Error & e) {
|
2006-12-04 19:17:13 +02:00
|
|
|
stopWork(false, e.msg());
|
2011-12-15 01:30:06 +02:00
|
|
|
to.flush();
|
2006-12-03 18:25:19 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Process client requests. */
|
2006-12-03 04:08:13 +02:00
|
|
|
unsigned int opCount = 0;
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
while (true) {
|
|
|
|
WorkerOp op;
|
|
|
|
try {
|
|
|
|
op = (WorkerOp) readInt(from);
|
|
|
|
} catch (EndOfFile & e) {
|
|
|
|
break;
|
|
|
|
}
|
2006-12-02 18:41:36 +02:00
|
|
|
|
2006-12-03 04:08:13 +02:00
|
|
|
opCount++;
|
|
|
|
|
|
|
|
try {
|
2007-11-16 18:15:26 +02:00
|
|
|
performOp(clientVersion, from, to, op);
|
2006-12-03 04:08:13 +02:00
|
|
|
} catch (Error & e) {
|
2011-12-01 15:48:48 +02:00
|
|
|
/* If we're not in a state were we can send replies, then
|
|
|
|
something went wrong processing the input of the
|
|
|
|
client. This can happen especially if I/O errors occur
|
|
|
|
during addTextToStore() / importPath(). If that
|
|
|
|
happens, just send the error message and exit. */
|
|
|
|
bool errorAllowed = canSendStderr;
|
|
|
|
if (!errorAllowed) printMsg(lvlError, format("error processing client input: %1%") % e.msg());
|
2010-12-17 13:28:26 +02:00
|
|
|
stopWork(false, e.msg(), GET_PROTOCOL_MINOR(clientVersion) >= 8 ? e.status : 0);
|
2011-12-01 15:48:48 +02:00
|
|
|
if (!errorAllowed) break;
|
2006-11-30 22:13:59 +02:00
|
|
|
}
|
2006-12-04 19:55:14 +02:00
|
|
|
|
2011-12-15 01:30:06 +02:00
|
|
|
to.flush();
|
|
|
|
|
2006-12-04 19:55:14 +02:00
|
|
|
assert(!canSendStderr);
|
2006-12-04 19:17:13 +02:00
|
|
|
};
|
2006-12-01 20:00:01 +02:00
|
|
|
|
|
|
|
printMsg(lvlError, format("%1% worker operations") % opCount);
|
2006-11-30 21:19:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-05 19:21:42 +02:00
|
|
|
static void sigChldHandler(int sigNo)
|
|
|
|
{
|
|
|
|
/* Reap all dead children. */
|
2008-11-14 18:50:01 +02:00
|
|
|
while (waitpid(-1, 0, WNOHANG) > 0) ;
|
2006-12-05 19:21:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void setSigChldAction(bool autoReap)
|
2006-12-04 19:17:13 +02:00
|
|
|
{
|
|
|
|
struct sigaction act, oact;
|
2006-12-05 19:21:42 +02:00
|
|
|
act.sa_handler = autoReap ? sigChldHandler : SIG_DFL;
|
2006-12-04 19:17:13 +02:00
|
|
|
sigfillset(&act.sa_mask);
|
|
|
|
act.sa_flags = 0;
|
|
|
|
if (sigaction(SIGCHLD, &act, &oact))
|
|
|
|
throw SysError("setting SIGCHLD handler");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
#define SD_LISTEN_FDS_START 3
|
|
|
|
|
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
static void daemonLoop()
|
|
|
|
{
|
|
|
|
/* Get rid of children automatically; don't let them become
|
|
|
|
zombies. */
|
|
|
|
setSigChldAction(true);
|
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
AutoCloseFD fdSocket;
|
|
|
|
|
|
|
|
/* Handle socket-based activation by systemd. */
|
|
|
|
if (getEnv("LISTEN_FDS") != "") {
|
|
|
|
if (getEnv("LISTEN_PID") != int2String(getpid()) || getEnv("LISTEN_FDS") != "1")
|
|
|
|
throw Error("unexpected systemd environment variables");
|
|
|
|
fdSocket = SD_LISTEN_FDS_START;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Otherwise, create and bind to a Unix domain socket. */
|
|
|
|
else {
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
/* Create and bind to a Unix domain socket. */
|
|
|
|
fdSocket = socket(PF_UNIX, SOCK_STREAM, 0);
|
|
|
|
if (fdSocket == -1)
|
|
|
|
throw SysError("cannot create Unix domain socket");
|
|
|
|
|
2012-07-31 02:55:41 +03:00
|
|
|
string socketPath = settings.nixStateDir + DEFAULT_SOCKET_PATH;
|
2006-12-04 19:17:13 +02:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
createDirs(dirOf(socketPath));
|
2007-08-30 12:50:44 +03:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
/* Urgh, sockaddr_un allows path names of only 108 characters.
|
|
|
|
So chdir to the socket directory so that we can pass a
|
|
|
|
relative path name. */
|
|
|
|
chdir(dirOf(socketPath).c_str());
|
|
|
|
Path socketPathRel = "./" + baseNameOf(socketPath);
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
struct sockaddr_un addr;
|
|
|
|
addr.sun_family = AF_UNIX;
|
|
|
|
if (socketPathRel.size() >= sizeof(addr.sun_path))
|
|
|
|
throw Error(format("socket path `%1%' is too long") % socketPathRel);
|
|
|
|
strcpy(addr.sun_path, socketPathRel.c_str());
|
2006-12-04 19:17:13 +02:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
unlink(socketPath.c_str());
|
2006-12-04 19:17:13 +02:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
/* Make sure that the socket is created with 0666 permission
|
|
|
|
(everybody can connect --- provided they have access to the
|
|
|
|
directory containing the socket). */
|
|
|
|
mode_t oldMode = umask(0111);
|
|
|
|
int res = bind(fdSocket, (struct sockaddr *) &addr, sizeof(addr));
|
|
|
|
umask(oldMode);
|
|
|
|
if (res == -1)
|
|
|
|
throw SysError(format("cannot bind to socket `%1%'") % socketPath);
|
2006-12-04 19:17:13 +02:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
chdir("/"); /* back to the root */
|
2008-04-09 08:57:01 +03:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
if (listen(fdSocket, 5) == -1)
|
|
|
|
throw SysError(format("cannot listen on socket `%1%'") % socketPath);
|
|
|
|
}
|
2006-12-04 19:17:13 +02:00
|
|
|
|
2012-06-19 06:01:46 +03:00
|
|
|
closeOnExec(fdSocket);
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
/* Loop accepting connections. */
|
|
|
|
while (1) {
|
|
|
|
|
|
|
|
try {
|
2010-12-13 15:19:46 +02:00
|
|
|
/* Important: the server process *cannot* open the SQLite
|
|
|
|
database, because it doesn't like forks very much. */
|
2006-12-04 19:17:13 +02:00
|
|
|
assert(!store);
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
/* Accept a connection. */
|
|
|
|
struct sockaddr_un remoteAddr;
|
|
|
|
socklen_t remoteAddrLen = sizeof(remoteAddr);
|
|
|
|
|
|
|
|
AutoCloseFD remote = accept(fdSocket,
|
|
|
|
(struct sockaddr *) &remoteAddr, &remoteAddrLen);
|
|
|
|
checkInterrupt();
|
2009-09-30 14:32:04 +03:00
|
|
|
if (remote == -1) {
|
2012-07-31 00:13:25 +03:00
|
|
|
if (errno == EINTR)
|
|
|
|
continue;
|
|
|
|
else
|
|
|
|
throw SysError("accepting connection");
|
2009-09-30 14:32:04 +03:00
|
|
|
}
|
2006-12-04 19:17:13 +02:00
|
|
|
|
2012-04-15 01:42:16 +03:00
|
|
|
closeOnExec(remote);
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2012-03-05 20:19:29 +02:00
|
|
|
/* Get the identity of the caller, if possible. */
|
|
|
|
uid_t clientUid = -1;
|
|
|
|
pid_t clientPid = -1;
|
|
|
|
|
|
|
|
#if defined(SO_PEERCRED)
|
|
|
|
ucred cred;
|
|
|
|
socklen_t credLen = sizeof(cred);
|
|
|
|
if (getsockopt(remote, SOL_SOCKET, SO_PEERCRED, &cred, &credLen) != -1) {
|
|
|
|
clientPid = cred.pid;
|
|
|
|
clientUid = cred.uid;
|
|
|
|
}
|
|
|
|
#endif
|
2006-12-04 19:17:13 +02:00
|
|
|
|
2012-03-05 20:19:29 +02:00
|
|
|
printMsg(lvlInfo, format("accepted connection from pid %1%, uid %2%") % clientPid % clientUid);
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
/* Fork a child to handle the connection. */
|
|
|
|
pid_t child;
|
|
|
|
child = fork();
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
switch (child) {
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
try { /* child */
|
2008-11-20 14:25:11 +02:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
/* Background the worker. */
|
|
|
|
if (setsid() == -1)
|
|
|
|
throw SysError(format("creating a new session"));
|
|
|
|
|
|
|
|
/* Restore normal handling of SIGCHLD. */
|
|
|
|
setSigChldAction(false);
|
2008-11-20 14:25:11 +02:00
|
|
|
|
2012-03-05 20:19:29 +02:00
|
|
|
/* For debugging, stuff the pid into argv[1]. */
|
|
|
|
if (clientPid != -1 && argvSaved[1]) {
|
|
|
|
string processName = int2String(clientPid);
|
|
|
|
strncpy(argvSaved[1], processName.c_str(), strlen(argvSaved[1]));
|
|
|
|
}
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
/* Handle the connection. */
|
|
|
|
from.fd = remote;
|
|
|
|
to.fd = remote;
|
|
|
|
processConnection();
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-12-04 19:17:13 +02:00
|
|
|
} catch (std::exception & e) {
|
|
|
|
std::cerr << format("child error: %1%\n") % e.what();
|
|
|
|
}
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
} catch (Interrupted & e) {
|
|
|
|
throw;
|
|
|
|
} catch (Error & e) {
|
|
|
|
printMsg(lvlError, format("error processing connection: %1%") % e.msg());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 21:19:59 +02:00
|
|
|
void run(Strings args)
|
|
|
|
{
|
|
|
|
bool slave = false;
|
|
|
|
bool daemon = false;
|
2012-07-31 00:13:25 +03:00
|
|
|
|
2006-11-30 21:19:59 +02:00
|
|
|
for (Strings::iterator i = args.begin(); i != args.end(); ) {
|
|
|
|
string arg = *i++;
|
|
|
|
if (arg == "--slave") slave = true;
|
2006-12-01 20:02:05 +02:00
|
|
|
if (arg == "--daemon") daemon = true;
|
2006-11-30 21:19:59 +02:00
|
|
|
}
|
|
|
|
|
2006-11-30 21:54:43 +02:00
|
|
|
if (slave) {
|
2006-12-03 02:52:27 +02:00
|
|
|
/* This prevents us from receiving signals from the terminal
|
|
|
|
when we're running in setuid mode. */
|
|
|
|
if (setsid() == -1)
|
|
|
|
throw SysError(format("creating a new session"));
|
|
|
|
|
2006-12-03 18:25:19 +02:00
|
|
|
processConnection();
|
2006-11-30 21:54:43 +02:00
|
|
|
}
|
2006-11-30 21:19:59 +02:00
|
|
|
|
2006-12-03 18:25:19 +02:00
|
|
|
else if (daemon) {
|
|
|
|
if (setuidMode)
|
|
|
|
throw Error("daemon cannot be started in setuid mode");
|
2006-12-05 01:29:16 +02:00
|
|
|
chdir("/");
|
2006-12-04 19:17:13 +02:00
|
|
|
daemonLoop();
|
2006-12-03 18:25:19 +02:00
|
|
|
}
|
2006-11-30 21:19:59 +02:00
|
|
|
|
|
|
|
else
|
|
|
|
throw Error("must be run in either --slave or --daemon mode");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void printHelp()
|
|
|
|
{
|
2012-10-03 23:37:06 +03:00
|
|
|
showManPage("nix-worker");
|
2006-11-30 21:19:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-01 20:02:05 +02:00
|
|
|
string programId = "nix-worker";
|