2003-07-20 22:29:38 +03:00
|
|
|
#include <map>
|
2004-06-18 21:09:32 +03:00
|
|
|
#include <boost/shared_ptr.hpp>
|
|
|
|
#include <boost/enable_shared_from_this.hpp>
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2003-07-20 22:29:38 +03:00
|
|
|
#include "normalise.hh"
|
|
|
|
#include "references.hh"
|
2003-08-01 17:11:19 +03:00
|
|
|
#include "pathlocks.hh"
|
2003-07-20 22:29:38 +03:00
|
|
|
#include "globals.hh"
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* !!! TODO storeExprFromPath shouldn't be used here */
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
static string pathNullDevice = "/dev/null";
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Forward definition. */
|
|
|
|
class Worker;
|
|
|
|
|
|
|
|
|
|
|
|
/* A pointer to a goal. */
|
|
|
|
class Goal;
|
|
|
|
typedef shared_ptr<Goal> GoalPtr;
|
|
|
|
|
|
|
|
/* A set of goals. */
|
|
|
|
typedef set<GoalPtr> Goals;
|
|
|
|
|
|
|
|
/* A map of paths to goals (and the other way around). */
|
|
|
|
typedef map<Path, GoalPtr> GoalMap;
|
|
|
|
typedef map<GoalPtr, Path> GoalMapRev;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class Goal : public enable_shared_from_this<Goal>
|
|
|
|
{
|
|
|
|
protected:
|
|
|
|
|
|
|
|
/* Backlink to the worker. */
|
|
|
|
Worker & worker;
|
|
|
|
|
|
|
|
/* Goals waiting for this one to finish. */
|
|
|
|
Goals waiters;
|
|
|
|
|
|
|
|
/* Number of goals we are waiting for. */
|
|
|
|
unsigned int nrWaitees;
|
|
|
|
|
|
|
|
|
|
|
|
Goal(Worker & _worker) : worker(_worker)
|
|
|
|
{
|
|
|
|
nrWaitees = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual ~Goal()
|
|
|
|
{
|
|
|
|
debug("goal destroyed");
|
|
|
|
}
|
|
|
|
|
|
|
|
public:
|
|
|
|
virtual void work() = 0;
|
|
|
|
|
|
|
|
virtual string name()
|
|
|
|
{
|
|
|
|
return "(noname)";
|
|
|
|
}
|
|
|
|
|
|
|
|
void addWaiter(GoalPtr waiter);
|
|
|
|
|
|
|
|
void waiteeDone();
|
|
|
|
|
|
|
|
void amDone();
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* A mapping used to remember for each child process to what goal it
|
|
|
|
belongs, and a file descriptor for receiving log data. */
|
2004-06-20 00:45:04 +03:00
|
|
|
struct Child
|
|
|
|
{
|
|
|
|
GoalPtr goal;
|
|
|
|
int fdOutput;
|
|
|
|
bool inBuildSlot;
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef map<pid_t, Child> Children;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
|
|
|
|
/* The worker class. */
|
|
|
|
class Worker
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
|
|
|
|
/* The goals of the worker. */
|
|
|
|
Goals goals;
|
|
|
|
|
|
|
|
/* Goals that are ready to do some work. */
|
|
|
|
Goals awake;
|
|
|
|
|
|
|
|
/* Goals waiting for a build slot. */
|
|
|
|
Goals wantingToBuild;
|
|
|
|
|
|
|
|
/* Child processes currently running. */
|
|
|
|
Children children;
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Number of build slots occupied. Not all child processes
|
|
|
|
(namely build hooks) count as occupied build slots. */
|
|
|
|
unsigned int nrChildren;
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Maps used to prevent multiple instantiation of a goal for the
|
|
|
|
same expression / path. */
|
|
|
|
GoalMap normalisationGoals;
|
|
|
|
GoalMapRev normalisationGoalsRev;
|
|
|
|
GoalMap realisationGoals;
|
|
|
|
GoalMapRev realisationGoalsRev;
|
|
|
|
GoalMap substitutionGoals;
|
|
|
|
GoalMapRev substitutionGoalsRev;
|
|
|
|
|
|
|
|
public:
|
|
|
|
|
|
|
|
Worker();
|
|
|
|
~Worker();
|
|
|
|
|
|
|
|
/* Add a goal. */
|
|
|
|
void addNormalisationGoal(const Path & nePath, GoalPtr waiter);
|
|
|
|
void addRealisationGoal(const Path & nePath, GoalPtr waiter);
|
|
|
|
void addSubstitutionGoal(const Path & storePath, GoalPtr waiter);
|
|
|
|
|
|
|
|
/* Remove a finished goal. */
|
|
|
|
void removeGoal(GoalPtr goal);
|
|
|
|
|
|
|
|
/* Wake up a goal (i.e., there is something for it to do). */
|
|
|
|
void wakeUp(GoalPtr goal);
|
|
|
|
|
|
|
|
/* Can we start another child process? */
|
|
|
|
bool canBuildMore();
|
|
|
|
|
|
|
|
/* Registers / unregisters a running child process. */
|
2004-06-20 00:45:04 +03:00
|
|
|
void childStarted(GoalPtr goal, pid_t pid, int fdOutput,
|
|
|
|
bool inBuildSlot);
|
2004-06-18 21:09:32 +03:00
|
|
|
void childTerminated(pid_t pid);
|
|
|
|
|
|
|
|
/* Add a goal to the set of goals waiting for a build slot. */
|
|
|
|
void waitForBuildSlot(GoalPtr goal);
|
|
|
|
|
|
|
|
/* Loop until all goals have been realised. */
|
|
|
|
void run();
|
|
|
|
|
|
|
|
/* Wait for input to become available. */
|
|
|
|
void waitForInput();
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
void killChild(pid_t pid)
|
|
|
|
{
|
|
|
|
/* Send a KILL signal to every process in the child process group
|
|
|
|
(which hopefully includes *all* its children). */
|
|
|
|
if (kill(-pid, SIGKILL) != 0)
|
|
|
|
printMsg(lvlError, format("killing process %1%") % pid);
|
|
|
|
else {
|
|
|
|
/* Wait until the child dies, disregarding the exit status. */
|
|
|
|
int status;
|
|
|
|
while (waitpid(pid, &status, 0) == -1)
|
|
|
|
if (errno != EINTR) printMsg(lvlError,
|
|
|
|
format("waiting for process %1%") % pid);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
void Goal::addWaiter(GoalPtr waiter)
|
|
|
|
{
|
|
|
|
waiters.insert(waiter);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Goal::waiteeDone()
|
|
|
|
{
|
|
|
|
assert(nrWaitees > 0);
|
|
|
|
if (!--nrWaitees) worker.wakeUp(shared_from_this());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Goal::amDone()
|
|
|
|
{
|
|
|
|
debug("done");
|
|
|
|
for (Goals::iterator i = waiters.begin(); i != waiters.end(); ++i)
|
|
|
|
(*i)->waiteeDone();
|
|
|
|
worker.removeGoal(shared_from_this());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
class NormalisationGoal : public Goal
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
private:
|
|
|
|
/* The path of the derivation store expression. */
|
2004-05-11 21:05:44 +03:00
|
|
|
Path nePath;
|
|
|
|
|
|
|
|
/* The store expression stored at nePath. */
|
|
|
|
StoreExpr expr;
|
|
|
|
|
|
|
|
/* The remainder is state held during the build. */
|
|
|
|
|
|
|
|
/* Locks on the output paths. */
|
|
|
|
PathLocks outputLocks;
|
|
|
|
|
|
|
|
/* Input paths, with their closure elements. */
|
|
|
|
ClosureElems inClosures;
|
|
|
|
|
|
|
|
/* Referenceable paths (i.e., input and output paths). */
|
|
|
|
PathSet allPaths;
|
|
|
|
|
2004-06-08 16:21:03 +03:00
|
|
|
/* The normal forms of the input store expressions. */
|
|
|
|
PathSet inputNFs;
|
|
|
|
|
|
|
|
/* The successor mappings for the input store expressions. */
|
|
|
|
map<Path, Path> inputSucs;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* The process ID of the builder. */
|
|
|
|
pid_t pid;
|
|
|
|
|
|
|
|
/* The temporary directory. */
|
|
|
|
Path tmpDir;
|
|
|
|
|
|
|
|
/* File descriptor for the log file. */
|
2004-06-15 16:49:42 +03:00
|
|
|
AutoCloseFD fdLogFile;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Pipe for the builder's standard output/error. */
|
2004-05-13 22:14:49 +03:00
|
|
|
Pipe logPipe;
|
|
|
|
|
|
|
|
/* Pipes for talking to the build hook (if any). */
|
|
|
|
Pipe toHook;
|
|
|
|
Pipe fromHook;
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
typedef void (NormalisationGoal::*GoalState)();
|
|
|
|
GoalState state;
|
|
|
|
|
|
|
|
public:
|
|
|
|
NormalisationGoal(const Path & _nePath, Worker & _worker);
|
|
|
|
~NormalisationGoal();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void work();
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
private:
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The states. */
|
|
|
|
void init();
|
|
|
|
void haveStoreExpr();
|
|
|
|
void inputNormalised();
|
|
|
|
void inputRealised();
|
|
|
|
void tryToBuild();
|
|
|
|
void buildDone();
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Is the build hook willing to perform the build? */
|
|
|
|
typedef enum {rpAccept, rpDecline, rpPostpone, rpDone} HookReply;
|
|
|
|
HookReply tryBuildHook();
|
|
|
|
|
|
|
|
/* Synchronously wait for a build hook to finish. */
|
|
|
|
void terminateBuildHook();
|
|
|
|
|
|
|
|
/* Acquires locks on the output paths and gathers information
|
|
|
|
about the build (e.g., the input closures). During this
|
|
|
|
process its possible that we find out that the build is
|
|
|
|
unnecessary, in which case we return false (this is not an
|
|
|
|
error condition!). */
|
|
|
|
bool prepareBuild();
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Start building a derivation. */
|
|
|
|
void startBuilder();
|
|
|
|
|
|
|
|
/* Must be called after the output paths have become valid (either
|
|
|
|
due to a successful build or hook, or because they already
|
|
|
|
were). */
|
|
|
|
void createClosure();
|
|
|
|
|
|
|
|
/* Open a log file and a pipe to it. */
|
|
|
|
void openLogFile();
|
|
|
|
|
|
|
|
/* Common initialisation to be performed in child processes (i.e.,
|
|
|
|
both in builders and in build hooks. */
|
|
|
|
void initChild();
|
|
|
|
|
|
|
|
/* Delete the temporary directory, if we have one. */
|
2004-05-11 21:05:44 +03:00
|
|
|
void deleteTmpDir(bool force);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
string name()
|
|
|
|
{
|
|
|
|
return nePath;
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
NormalisationGoal::NormalisationGoal(const Path & _nePath, Worker & _worker)
|
|
|
|
: Goal(_worker)
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
nePath = _nePath;
|
|
|
|
pid = -1;
|
|
|
|
state = &NormalisationGoal::init;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
NormalisationGoal::~NormalisationGoal()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
|
|
|
/* Careful: we should never ever throw an exception from a
|
|
|
|
destructor. */
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
if (pid != -1) {
|
2004-05-11 21:05:44 +03:00
|
|
|
printMsg(lvlError, format("killing child process %1% (%2%)")
|
|
|
|
% pid % nePath);
|
2004-06-20 22:17:54 +03:00
|
|
|
killChild(pid);
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
deleteTmpDir(false);
|
|
|
|
} catch (Error & e) {
|
|
|
|
printMsg(lvlError, format("error (ignored): %1%") % e.msg());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::work()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
(this->*state)();
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::init()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug(format("init of norm `%1%'") % nePath);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* If we already have a successor, then we are done already; don't
|
|
|
|
add the expression as a goal. */
|
|
|
|
Path nfPath;
|
|
|
|
if (querySuccessor(nePath, nfPath)) {
|
|
|
|
amDone();
|
|
|
|
return;
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The first thing to do is to make sure that the store expression
|
|
|
|
exists. If it doesn't, it may be created through a
|
|
|
|
substitute. */
|
|
|
|
nrWaitees = 1;
|
|
|
|
worker.addSubstitutionGoal(nePath, shared_from_this());
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &NormalisationGoal::haveStoreExpr;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::haveStoreExpr()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug(format("loading store expr `%1%'") % nePath);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
assert(isValidPath(nePath));
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
/* Get the store expression. */
|
2004-06-18 21:09:32 +03:00
|
|
|
expr = storeExprFromPath(nePath);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* If this is a normal form (i.e., a closure) we are also done. */
|
2004-06-18 21:09:32 +03:00
|
|
|
if (expr.type == StoreExpr::neClosure) {
|
|
|
|
amDone();
|
|
|
|
return;
|
2004-05-14 15:24:29 +03:00
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
assert(expr.type == StoreExpr::neDerivation);
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Inputs must be normalised before we can build this goal. */
|
|
|
|
for (PathSet::iterator i = expr.derivation.inputs.begin();
|
|
|
|
i != expr.derivation.inputs.end(); ++i)
|
|
|
|
worker.addNormalisationGoal(*i, shared_from_this());
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
nrWaitees = expr.derivation.inputs.size();
|
|
|
|
|
|
|
|
state = &NormalisationGoal::inputNormalised;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-08-01 17:11:19 +03:00
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::inputNormalised()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug(format("all inputs normalised of `%1%'") % nePath);
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Inputs must also be realised before we can build this goal. */
|
|
|
|
for (PathSet::iterator i = expr.derivation.inputs.begin();
|
|
|
|
i != expr.derivation.inputs.end(); ++i)
|
|
|
|
{
|
|
|
|
Path neInput = *i, nfInput;
|
|
|
|
if (querySuccessor(neInput, nfInput))
|
|
|
|
neInput = nfInput;
|
|
|
|
/* Otherwise the input must be a closure. */
|
|
|
|
worker.addRealisationGoal(neInput, shared_from_this());
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
nrWaitees = expr.derivation.inputs.size();
|
2003-08-20 17:11:40 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &NormalisationGoal::inputRealised;
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::inputRealised()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug(format("all inputs realised of `%1%'") % nePath);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Okay, try to build. Note that here we don't wait for a build
|
|
|
|
slot to become available, since we don't need one if there is a
|
|
|
|
build hook. */
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &NormalisationGoal::tryToBuild;
|
2004-06-20 00:45:04 +03:00
|
|
|
worker.wakeUp(shared_from_this());
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::tryToBuild()
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug(format("trying to build `%1%'") % nePath);
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Is the build hook willing to accept this job? */
|
|
|
|
switch (tryBuildHook()) {
|
|
|
|
case rpAccept:
|
|
|
|
/* Yes, it has started doing so. Wait until we get
|
|
|
|
EOF from the hook. */
|
|
|
|
state = &NormalisationGoal::buildDone;
|
|
|
|
return;
|
|
|
|
case rpPostpone:
|
|
|
|
/* Not now; wait until at least one child finishes. */
|
|
|
|
worker.waitForBuildSlot(shared_from_this());
|
|
|
|
return;
|
|
|
|
case rpDecline:
|
|
|
|
/* We should do it ourselves. */
|
|
|
|
break;
|
|
|
|
case rpDone:
|
|
|
|
/* Somebody else did it (there is a successor now). */
|
|
|
|
amDone();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Make sure that we are allowed to start a build. */
|
|
|
|
if (!worker.canBuildMore()) {
|
|
|
|
worker.waitForBuildSlot(shared_from_this());
|
|
|
|
return;
|
2003-08-01 17:11:19 +03:00
|
|
|
}
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Acquire locks and such. If we then see that there now is a
|
|
|
|
successor, we're done. */
|
|
|
|
if (!prepareBuild()) {
|
|
|
|
amDone();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Okay, we have to build. */
|
|
|
|
startBuilder();
|
|
|
|
|
|
|
|
/* This state will be reached when we get EOF on the child's
|
|
|
|
log pipe. */
|
|
|
|
state = &NormalisationGoal::buildDone;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void NormalisationGoal::buildDone()
|
|
|
|
{
|
|
|
|
debug(format("build done for `%1%'") % nePath);
|
|
|
|
|
|
|
|
int status;
|
|
|
|
|
|
|
|
/* Since we got an EOF on the logger pipe, the builder is presumed
|
|
|
|
to have terminated. In fact, the builder could also have
|
|
|
|
simply have closed its end of the pipe --- just don't do that
|
|
|
|
:-) */
|
|
|
|
/* !!! this could block! */
|
|
|
|
if (waitpid(pid, &status, 0) != pid)
|
|
|
|
throw SysError(format("builder for `%1%' should have terminated")
|
|
|
|
% nePath);
|
|
|
|
|
|
|
|
/* So the child is gone now. */
|
|
|
|
worker.childTerminated(pid);
|
|
|
|
pid = -1;
|
|
|
|
|
|
|
|
/* Close the read side of the logger pipe. */
|
|
|
|
logPipe.readSide.close();
|
|
|
|
|
|
|
|
/* Close the log file. */
|
|
|
|
fdLogFile.close();
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
debug(format("builder process for `%1%' finished") % nePath);
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
/* Check the exit status. */
|
|
|
|
if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
|
|
|
|
deleteTmpDir(false);
|
2004-06-22 11:50:25 +03:00
|
|
|
throw Error(format("builder for `%1%' %2%")
|
|
|
|
% nePath % statusToString(status));
|
2004-06-20 22:17:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
deleteTmpDir(true);
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
/* Compute a closure store expression, and register it as our
|
|
|
|
successor. */
|
|
|
|
createClosure();
|
|
|
|
|
|
|
|
amDone();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static string readLine(int fd)
|
|
|
|
{
|
|
|
|
string s;
|
|
|
|
while (1) {
|
|
|
|
char ch;
|
|
|
|
ssize_t rd = read(fd, &ch, 1);
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError("reading a line");
|
|
|
|
} else if (rd == 0)
|
|
|
|
throw Error("unexpected EOF reading a line");
|
|
|
|
else {
|
|
|
|
if (ch == '\n') return s;
|
|
|
|
s += ch;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void writeLine(int fd, string s)
|
|
|
|
{
|
|
|
|
s += '\n';
|
|
|
|
writeFull(fd, (const unsigned char *) s.c_str(), s.size());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* !!! ugly hack */
|
|
|
|
static void drain(int fd)
|
|
|
|
{
|
|
|
|
unsigned char buffer[1024];
|
|
|
|
while (1) {
|
|
|
|
ssize_t rd = read(fd, buffer, sizeof buffer);
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError("draining");
|
|
|
|
} else if (rd == 0) break;
|
|
|
|
else writeFull(STDERR_FILENO, buffer, rd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
NormalisationGoal::HookReply NormalisationGoal::tryBuildHook()
|
|
|
|
{
|
|
|
|
Path buildHook = getEnv("NIX_BUILD_HOOK");
|
|
|
|
if (buildHook == "") return rpDecline;
|
|
|
|
buildHook = absPath(buildHook);
|
|
|
|
|
|
|
|
/* Create a directory where we will store files used for
|
|
|
|
communication between us and the build hook. */
|
|
|
|
tmpDir = createTempDir();
|
|
|
|
|
|
|
|
/* Create the log file and pipe. */
|
|
|
|
openLogFile();
|
|
|
|
|
|
|
|
/* Create the communication pipes. */
|
|
|
|
toHook.create();
|
|
|
|
fromHook.create();
|
|
|
|
|
|
|
|
/* Fork the hook. */
|
|
|
|
switch (pid = fork()) {
|
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
try { /* child */
|
|
|
|
|
|
|
|
initChild();
|
|
|
|
|
|
|
|
execl(buildHook.c_str(), buildHook.c_str(),
|
|
|
|
(worker.canBuildMore() ? (string) "1" : "0").c_str(),
|
|
|
|
thisSystem.c_str(),
|
|
|
|
expr.derivation.platform.c_str(),
|
|
|
|
nePath.c_str(), 0);
|
|
|
|
|
|
|
|
throw SysError(format("executing `%1%'") % buildHook);
|
|
|
|
|
|
|
|
} catch (exception & e) {
|
|
|
|
cerr << format("build error: %1%\n") % e.what();
|
|
|
|
}
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* parent */
|
|
|
|
logPipe.writeSide.close();
|
|
|
|
worker.childStarted(shared_from_this(),
|
|
|
|
pid, logPipe.readSide, false);
|
|
|
|
|
|
|
|
fromHook.writeSide.close();
|
|
|
|
toHook.readSide.close();
|
|
|
|
|
|
|
|
/* Read the first line of input, which should be a word indicating
|
|
|
|
whether the hook wishes to perform the build. !!! potential
|
|
|
|
for deadlock here: we should also read from the child's logger
|
|
|
|
pipe. */
|
|
|
|
string reply;
|
|
|
|
try {
|
|
|
|
reply = readLine(fromHook.readSide);
|
|
|
|
} catch (Error & e) {
|
|
|
|
drain(logPipe.readSide);
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
|
|
|
|
debug(format("hook reply is `%1%'") % reply);
|
|
|
|
|
|
|
|
if (reply == "decline" || reply == "postpone") {
|
|
|
|
/* Clean up the child. !!! hacky / should verify */
|
|
|
|
drain(logPipe.readSide);
|
|
|
|
terminateBuildHook();
|
|
|
|
return reply == "decline" ? rpDecline : rpPostpone;
|
|
|
|
}
|
|
|
|
|
|
|
|
else if (reply == "accept") {
|
|
|
|
|
|
|
|
/* Acquire locks and such. If we then see that there now is a
|
|
|
|
successor, we're done. */
|
|
|
|
if (!prepareBuild()) {
|
2004-06-20 22:17:54 +03:00
|
|
|
/* Tell the hook to exit. */
|
2004-06-20 00:45:04 +03:00
|
|
|
writeLine(toHook.writeSide, "cancel");
|
|
|
|
terminateBuildHook();
|
|
|
|
return rpDone;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Write the information that the hook needs to perform the
|
|
|
|
build, i.e., the set of input paths (including closure
|
|
|
|
expressions), the set of output paths, and the successor
|
|
|
|
mappings for the input expressions. */
|
|
|
|
|
|
|
|
Path inputListFN = tmpDir + "/inputs";
|
|
|
|
Path outputListFN = tmpDir + "/outputs";
|
|
|
|
Path successorsListFN = tmpDir + "/successors";
|
|
|
|
|
|
|
|
string s;
|
|
|
|
for (ClosureElems::iterator i = inClosures.begin();
|
|
|
|
i != inClosures.end(); ++i)
|
|
|
|
s += i->first + "\n";
|
|
|
|
for (PathSet::iterator i = inputNFs.begin();
|
|
|
|
i != inputNFs.end(); ++i)
|
|
|
|
s += *i + "\n";
|
|
|
|
writeStringToFile(inputListFN, s);
|
|
|
|
|
|
|
|
s = "";
|
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
|
|
|
s += *i + "\n";
|
|
|
|
writeStringToFile(outputListFN, s);
|
|
|
|
|
|
|
|
s = "";
|
|
|
|
for (map<Path, Path>::iterator i = inputSucs.begin();
|
|
|
|
i != inputSucs.end(); ++i)
|
|
|
|
s += i->first + " " + i->second + "\n";
|
|
|
|
writeStringToFile(successorsListFN, s);
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
/* Tell the hook to proceed. */
|
2004-06-20 00:45:04 +03:00
|
|
|
writeLine(toHook.writeSide, "okay");
|
|
|
|
|
|
|
|
return rpAccept;
|
|
|
|
}
|
|
|
|
|
|
|
|
else throw Error(format("bad hook reply `%1%'") % reply);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void NormalisationGoal::terminateBuildHook()
|
|
|
|
{
|
|
|
|
/* !!! drain stdout of hook */
|
|
|
|
debug("terminating build hook");
|
|
|
|
int status;
|
|
|
|
if (waitpid(pid, &status, 0) != pid)
|
|
|
|
printMsg(lvlError, format("process `%1%' missing") % pid);
|
|
|
|
worker.childTerminated(pid);
|
|
|
|
pid = -1;
|
|
|
|
fromHook.readSide.close();
|
|
|
|
toHook.writeSide.close();
|
|
|
|
fdLogFile.close();
|
|
|
|
logPipe.readSide.close();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool NormalisationGoal::prepareBuild()
|
|
|
|
{
|
2003-08-01 17:11:19 +03:00
|
|
|
/* Obtain locks on all output paths. The locks are automatically
|
|
|
|
released when we exit this function or Nix crashes. */
|
2004-05-12 12:35:51 +03:00
|
|
|
/* !!! BUG: this could block, which is not allowed. */
|
2004-06-18 21:09:32 +03:00
|
|
|
outputLocks.lockPaths(expr.derivation.outputs);
|
2003-08-01 17:11:19 +03:00
|
|
|
|
|
|
|
/* Now check again whether there is a successor. This is because
|
|
|
|
another process may have started building in parallel. After
|
|
|
|
it has finished and released the locks, we can (and should)
|
|
|
|
reuse its results. (Strictly speaking the first successor
|
2004-05-11 21:05:44 +03:00
|
|
|
check can be omitted, but that would be less efficient.) Note
|
|
|
|
that since we now hold the locks on the output paths, no other
|
|
|
|
process can build this expression, so no further checks are
|
|
|
|
necessary. */
|
|
|
|
Path nfPath;
|
2004-06-18 21:09:32 +03:00
|
|
|
if (querySuccessor(nePath, nfPath)) {
|
2004-05-11 21:05:44 +03:00
|
|
|
debug(format("skipping build of expression `%1%', someone beat us to it")
|
2004-06-18 21:09:32 +03:00
|
|
|
% nePath);
|
|
|
|
outputLocks.setDeletion(true);
|
2004-06-20 00:45:04 +03:00
|
|
|
return false;
|
2003-08-01 17:11:19 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Gather information necessary for computing the closure and/or
|
|
|
|
running the build hook. */
|
|
|
|
|
|
|
|
/* The outputs are referenceable paths. */
|
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
|
|
|
{
|
|
|
|
debug(format("building path `%1%'") % *i);
|
|
|
|
allPaths.insert(*i);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get information about the inputs (these all exist now). */
|
|
|
|
for (PathSet::iterator i = expr.derivation.inputs.begin();
|
|
|
|
i != expr.derivation.inputs.end(); ++i)
|
2003-08-20 17:11:40 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2004-06-18 21:09:32 +03:00
|
|
|
Path nePath = *i, nfPath;
|
|
|
|
if (!querySuccessor(nePath, nfPath)) nfPath = nePath;
|
|
|
|
inputNFs.insert(nfPath);
|
|
|
|
if (nfPath != nePath) inputSucs[nePath] = nfPath;
|
2003-10-08 18:06:59 +03:00
|
|
|
/* !!! nfPath should be a root of the garbage collector while
|
|
|
|
we are building */
|
2004-05-11 21:05:44 +03:00
|
|
|
StoreExpr ne = storeExprFromPath(nfPath);
|
2003-11-18 13:22:29 +02:00
|
|
|
if (ne.type != StoreExpr::neClosure) abort();
|
2003-10-07 15:27:49 +03:00
|
|
|
for (ClosureElems::iterator j = ne.closure.elems.begin();
|
2004-05-11 21:05:44 +03:00
|
|
|
j != ne.closure.elems.end(); ++j)
|
2003-08-20 17:11:40 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
inClosures[j->first] = j->second;
|
|
|
|
allPaths.insert(j->first);
|
2003-08-20 17:11:40 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* We can skip running the builder if all output paths are already
|
|
|
|
valid. */
|
|
|
|
bool fastBuild = true;
|
2004-06-18 21:09:32 +03:00
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
2004-05-11 21:05:44 +03:00
|
|
|
if (!isValidPath(*i)) {
|
|
|
|
fastBuild = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fastBuild) {
|
|
|
|
printMsg(lvlChatty, format("skipping build; output paths already exist"));
|
2004-06-18 21:09:32 +03:00
|
|
|
createClosure();
|
2004-06-20 00:45:04 +03:00
|
|
|
return false;
|
2004-05-12 12:35:51 +03:00
|
|
|
}
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
return true;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::startBuilder()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-05-12 17:20:32 +03:00
|
|
|
/* Right platform? */
|
2004-06-18 21:09:32 +03:00
|
|
|
if (expr.derivation.platform != thisSystem)
|
2004-05-12 17:20:32 +03:00
|
|
|
throw Error(format("a `%1%' is required, but I am a `%2%'")
|
2004-06-18 21:09:32 +03:00
|
|
|
% expr.derivation.platform % thisSystem);
|
2004-05-12 17:20:32 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* If any of the outputs already exist but are not registered,
|
|
|
|
delete them. */
|
2004-06-18 21:09:32 +03:00
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
|
|
|
Path path = *i;
|
|
|
|
if (isValidPath(path))
|
|
|
|
throw Error(format("obstructed build: path `%1%' exists") % path);
|
|
|
|
if (pathExists(path)) {
|
|
|
|
debug(format("removing unregistered path `%1%'") % path);
|
|
|
|
deletePath(path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Construct the environment passed to the builder. */
|
|
|
|
typedef map<string, string> Environment;
|
|
|
|
Environment env;
|
|
|
|
|
2003-08-18 17:54:54 +03:00
|
|
|
/* Most shells initialise PATH to some default (/bin:/usr/bin:...) when
|
|
|
|
PATH is not set. We don't want this, so we fill it in with some dummy
|
|
|
|
value. */
|
|
|
|
env["PATH"] = "/path-not-set";
|
|
|
|
|
2003-08-22 23:12:44 +03:00
|
|
|
/* Set HOME to a non-existing path to prevent certain programs from using
|
|
|
|
/etc/passwd (or NIS, or whatever) to locate the home directory (for
|
|
|
|
example, wget looks for ~/.wgetrc). I.e., these tools use /etc/passwd
|
|
|
|
if HOME is not set, but they will just assume that the settings file
|
|
|
|
they are looking for does not exist if HOME is set but points to some
|
|
|
|
non-existing path. */
|
|
|
|
env["HOME"] = "/homeless-shelter";
|
|
|
|
|
2004-03-12 12:45:08 +02:00
|
|
|
/* Tell the builder where the Nix store is. Usually they
|
|
|
|
shouldn't care, but this is useful for purity checking (e.g.,
|
|
|
|
the compiler or linker might only want to accept paths to files
|
|
|
|
in the store or in the build directory). */
|
|
|
|
env["NIX_STORE"] = nixStore;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Add all bindings specified in the derivation expression. */
|
2004-06-18 21:09:32 +03:00
|
|
|
for (StringPairs::iterator i = expr.derivation.env.begin();
|
|
|
|
i != expr.derivation.env.end(); ++i)
|
2003-07-20 22:29:38 +03:00
|
|
|
env[i->first] = i->second;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Create a temporary directory where the build will take
|
|
|
|
place. */
|
2004-06-18 21:09:32 +03:00
|
|
|
tmpDir = createTempDir();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* For convenience, set an environment pointing to the top build
|
|
|
|
directory. */
|
2004-06-18 21:09:32 +03:00
|
|
|
env["NIX_BUILD_TOP"] = tmpDir;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Also set TMPDIR and variants to point to this directory. */
|
2004-06-18 21:09:32 +03:00
|
|
|
env["TMPDIR"] = env["TEMPDIR"] = env["TMP"] = env["TEMP"] = tmpDir;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Run the builder. */
|
|
|
|
printMsg(lvlChatty, format("executing builder `%1%'") %
|
2004-06-18 21:09:32 +03:00
|
|
|
expr.derivation.builder);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* Create the log file and pipe. */
|
2004-06-18 21:09:32 +03:00
|
|
|
openLogFile();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Fork a child to build the package. Note that while we
|
|
|
|
currently use forks to run and wait for the children, it
|
|
|
|
shouldn't be hard to use threads for this on systems where
|
|
|
|
fork() is unavailable or inefficient. */
|
2004-05-13 22:14:49 +03:00
|
|
|
switch (pid = fork()) {
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
|
|
|
|
/* Warning: in the child we should absolutely not make any
|
|
|
|
Berkeley DB calls! */
|
|
|
|
|
|
|
|
try { /* child */
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
initChild();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Fill in the arguments. */
|
2004-06-18 21:09:32 +03:00
|
|
|
Strings & args(expr.derivation.args);
|
2004-05-11 21:05:44 +03:00
|
|
|
const char * argArr[args.size() + 2];
|
|
|
|
const char * * p = argArr;
|
2004-06-18 21:09:32 +03:00
|
|
|
string progName = baseNameOf(expr.derivation.builder);
|
2004-05-11 21:05:44 +03:00
|
|
|
*p++ = progName.c_str();
|
|
|
|
for (Strings::const_iterator i = args.begin();
|
|
|
|
i != args.end(); i++)
|
|
|
|
*p++ = i->c_str();
|
|
|
|
*p = 0;
|
|
|
|
|
|
|
|
/* Fill in the environment. */
|
|
|
|
Strings envStrs;
|
|
|
|
const char * envArr[env.size() + 1];
|
|
|
|
p = envArr;
|
|
|
|
for (Environment::const_iterator i = env.begin();
|
|
|
|
i != env.end(); i++)
|
|
|
|
*p++ = envStrs.insert(envStrs.end(),
|
|
|
|
i->first + "=" + i->second)->c_str();
|
|
|
|
*p = 0;
|
|
|
|
|
|
|
|
/* Execute the program. This should not return. */
|
2004-06-18 21:09:32 +03:00
|
|
|
execve(expr.derivation.builder.c_str(),
|
2004-05-11 21:05:44 +03:00
|
|
|
(char * *) argArr, (char * *) envArr);
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError(format("executing `%1%'")
|
2004-06-18 21:09:32 +03:00
|
|
|
% expr.derivation.builder);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
} catch (exception & e) {
|
|
|
|
cerr << format("build error: %1%\n") % e.what();
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
_exit(1);
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* parent */
|
2004-06-18 21:09:32 +03:00
|
|
|
logPipe.writeSide.close();
|
2004-06-20 00:45:04 +03:00
|
|
|
worker.childStarted(shared_from_this(),
|
|
|
|
pid, logPipe.readSide, true);
|
2004-05-14 01:52:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::createClosure()
|
2004-05-18 17:52:35 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The resulting closure expression. */
|
|
|
|
StoreExpr nf;
|
|
|
|
nf.type = StoreExpr::neClosure;
|
|
|
|
|
|
|
|
startNest(nest, lvlTalkative,
|
|
|
|
format("finishing normalisation of goal `%1%'") % nePath);
|
|
|
|
|
|
|
|
/* Check whether the output paths were created, and grep each
|
|
|
|
output path to determine what other paths it references. Also make all
|
|
|
|
output paths read-only. */
|
|
|
|
PathSet usedPaths;
|
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
|
|
|
{
|
|
|
|
Path path = *i;
|
|
|
|
if (!pathExists(path))
|
|
|
|
throw Error(format("output path `%1%' does not exist") % path);
|
|
|
|
nf.closure.roots.insert(path);
|
2004-05-18 17:52:35 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
makePathReadOnly(path);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* For this output path, find the references to other paths contained
|
|
|
|
in it. */
|
|
|
|
startNest(nest2, lvlChatty,
|
|
|
|
format("scanning for store references in `%1%'") % path);
|
|
|
|
Strings refPaths = filterReferences(path,
|
|
|
|
Strings(allPaths.begin(), allPaths.end()));
|
|
|
|
nest2.close();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Construct a closure element for this output path. */
|
|
|
|
ClosureElem elem;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* For each path referenced by this output path, add its id to the
|
|
|
|
closure element and add the id to the `usedPaths' set (so that the
|
|
|
|
elements referenced by *its* closure are added below). */
|
|
|
|
for (Paths::iterator j = refPaths.begin();
|
|
|
|
j != refPaths.end(); ++j)
|
|
|
|
{
|
|
|
|
checkInterrupt();
|
|
|
|
Path path = *j;
|
|
|
|
elem.refs.insert(path);
|
|
|
|
if (inClosures.find(path) != inClosures.end())
|
|
|
|
usedPaths.insert(path);
|
|
|
|
else if (expr.derivation.outputs.find(path) ==
|
|
|
|
expr.derivation.outputs.end())
|
|
|
|
abort();
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
nf.closure.elems[path] = elem;
|
2004-05-18 17:52:35 +03:00
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Close the closure. That is, for any referenced path, add the paths
|
|
|
|
referenced by it. */
|
|
|
|
PathSet donePaths;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
while (!usedPaths.empty()) {
|
|
|
|
checkInterrupt();
|
|
|
|
PathSet::iterator i = usedPaths.begin();
|
|
|
|
Path path = *i;
|
|
|
|
usedPaths.erase(i);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
if (donePaths.find(path) != donePaths.end()) continue;
|
|
|
|
donePaths.insert(path);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
ClosureElems::iterator j = inClosures.find(path);
|
|
|
|
if (j == inClosures.end()) abort();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
nf.closure.elems[path] = j->second;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
for (PathSet::iterator k = j->second.refs.begin();
|
|
|
|
k != j->second.refs.end(); k++)
|
|
|
|
usedPaths.insert(*k);
|
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* For debugging, print out the referenced and unreferenced paths. */
|
|
|
|
for (ClosureElems::iterator i = inClosures.begin();
|
|
|
|
i != inClosures.end(); ++i)
|
|
|
|
{
|
|
|
|
PathSet::iterator j = donePaths.find(i->first);
|
|
|
|
if (j == donePaths.end())
|
|
|
|
debug(format("unreferenced input: `%1%'") % i->first);
|
|
|
|
else
|
|
|
|
debug(format("referenced input: `%1%'") % i->first);
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Write the normal form. This does not have to occur in the
|
|
|
|
transaction below because writing terms is idem-potent. */
|
|
|
|
ATerm nfTerm = unparseStoreExpr(nf);
|
|
|
|
printMsg(lvlVomit, format("normal form: %1%") % atPrint(nfTerm));
|
|
|
|
Path nfPath = writeTerm(nfTerm, "-s");
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Register each output path, and register the normal form. This
|
|
|
|
is wrapped in one database transaction to ensure that if we
|
|
|
|
crash, either everything is registered or nothing is. This is
|
|
|
|
for recoverability: unregistered paths in the store can be
|
|
|
|
deleted arbitrarily, while registered paths can only be deleted
|
|
|
|
by running the garbage collector. */
|
|
|
|
Transaction txn;
|
|
|
|
createStoreTransaction(txn);
|
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
|
|
|
registerValidPath(txn, *i);
|
|
|
|
registerSuccessor(txn, nePath, nfPath);
|
|
|
|
txn.commit();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* It is now safe to delete the lock files, since all future
|
|
|
|
lockers will see the successor; they will not create new lock
|
|
|
|
files with the same names as the old (unlinked) lock files. */
|
|
|
|
outputLocks.setDeletion(true);
|
2004-05-14 01:52:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::openLogFile()
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
|
|
|
/* Create a log file. */
|
2004-06-18 21:09:32 +03:00
|
|
|
Path logFileName = nixLogDir + "/" + baseNameOf(nePath);
|
|
|
|
fdLogFile = open(logFileName.c_str(),
|
2004-05-13 22:14:49 +03:00
|
|
|
O_CREAT | O_WRONLY | O_TRUNC, 0666);
|
2004-06-18 21:09:32 +03:00
|
|
|
if (fdLogFile == -1)
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError(format("creating log file `%1%'") % logFileName);
|
|
|
|
|
|
|
|
/* Create a pipe to get the output of the child. */
|
2004-06-18 21:09:32 +03:00
|
|
|
logPipe.create();
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::initChild()
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
|
|
|
/* Put the child in a separate process group so that it doesn't
|
|
|
|
receive terminal signals. */
|
2004-05-18 12:45:18 +03:00
|
|
|
if (setpgid(0, 0) == -1)
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError(format("setting process group"));
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
if (chdir(tmpDir.c_str()) == -1)
|
|
|
|
throw SysError(format("changing into to `%1%'") % tmpDir);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
/* Dup the write side of the logger pipe into stderr. */
|
2004-06-18 21:09:32 +03:00
|
|
|
if (dup2(logPipe.writeSide, STDERR_FILENO) == -1)
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError("cannot pipe standard error into log file");
|
2004-06-18 21:09:32 +03:00
|
|
|
logPipe.readSide.close();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
/* Dup stderr to stdin. */
|
|
|
|
if (dup2(STDERR_FILENO, STDOUT_FILENO) == -1)
|
|
|
|
throw SysError("cannot dup stderr into stdout");
|
|
|
|
|
|
|
|
/* Reroute stdin to /dev/null. */
|
|
|
|
int fdDevNull = open(pathNullDevice.c_str(), O_RDWR);
|
|
|
|
if (fdDevNull == -1)
|
|
|
|
throw SysError(format("cannot open `%1%'") % pathNullDevice);
|
|
|
|
if (dup2(fdDevNull, STDIN_FILENO) == -1)
|
|
|
|
throw SysError("cannot dup null device into stdin");
|
|
|
|
|
|
|
|
/* When running a hook, dup the communication pipes. */
|
2004-06-18 21:09:32 +03:00
|
|
|
bool inHook = fromHook.writeSide.isOpen();
|
2004-05-13 22:14:49 +03:00
|
|
|
if (inHook) {
|
2004-06-18 21:09:32 +03:00
|
|
|
fromHook.readSide.close();
|
|
|
|
if (dup2(fromHook.writeSide, 3) == -1)
|
2004-06-15 16:49:42 +03:00
|
|
|
throw SysError("dup1");
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
toHook.writeSide.close();
|
|
|
|
if (dup2(toHook.readSide, 4) == -1)
|
2004-06-15 16:49:42 +03:00
|
|
|
throw SysError("dup2");
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Close all other file descriptors. */
|
|
|
|
int maxFD = 0;
|
|
|
|
maxFD = sysconf(_SC_OPEN_MAX);
|
|
|
|
for (int fd = 0; fd < maxFD; ++fd)
|
|
|
|
if (fd != STDIN_FILENO && fd != STDOUT_FILENO && fd != STDERR_FILENO
|
|
|
|
&& (!inHook || (fd != 3 && fd != 4)))
|
|
|
|
close(fd); /* ignore result */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::deleteTmpDir(bool force)
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
if (tmpDir != "") {
|
|
|
|
if (keepFailed && !force)
|
|
|
|
printMsg(lvlTalkative,
|
|
|
|
format("builder for `%1%' failed; keeping build directory `%2%'")
|
|
|
|
% nePath % tmpDir);
|
|
|
|
else
|
|
|
|
deletePath(tmpDir);
|
|
|
|
tmpDir = "";
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
class RealisationGoal : public Goal
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
private:
|
|
|
|
/* The path of the closure store expression. */
|
|
|
|
Path nePath;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The store expression stored at nePath. */
|
|
|
|
StoreExpr expr;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
typedef void (RealisationGoal::*GoalState)();
|
|
|
|
GoalState state;
|
|
|
|
|
|
|
|
public:
|
|
|
|
RealisationGoal(const Path & _nePath, Worker & _worker);
|
|
|
|
~RealisationGoal();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void work();
|
|
|
|
|
|
|
|
/* The states. */
|
|
|
|
void init();
|
|
|
|
void haveStoreExpr();
|
|
|
|
void elemFinished();
|
|
|
|
};
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
RealisationGoal::RealisationGoal(const Path & _nePath, Worker & _worker)
|
|
|
|
: Goal(_worker)
|
|
|
|
{
|
|
|
|
nePath = _nePath;
|
|
|
|
state = &RealisationGoal::init;
|
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
RealisationGoal::~RealisationGoal()
|
|
|
|
{
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void RealisationGoal::work()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
(this->*state)();
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void RealisationGoal::init()
|
|
|
|
{
|
|
|
|
debug(format("init of realisation `%1%'") % nePath);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The first thing to do is to make sure that the store expression
|
|
|
|
exists. If it doesn't, it may be created through a
|
|
|
|
substitute. */
|
|
|
|
nrWaitees = 1;
|
|
|
|
worker.addSubstitutionGoal(nePath, shared_from_this());
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &RealisationGoal::haveStoreExpr;
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void RealisationGoal::haveStoreExpr()
|
|
|
|
{
|
|
|
|
debug(format("loading store expr `%1%'") % nePath);
|
|
|
|
|
|
|
|
assert(isValidPath(nePath));
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Get the store expression. */
|
|
|
|
expr = storeExprFromPath(nePath);
|
|
|
|
|
|
|
|
/* If this is a normal form (i.e., a closure) we are also done. */
|
|
|
|
if (expr.type != StoreExpr::neClosure)
|
|
|
|
throw Error(format("expected closure in `%1%'") % nePath);
|
|
|
|
|
|
|
|
/* Each path in the closure should exist, or should be creatable
|
|
|
|
through a substitute. */
|
|
|
|
for (ClosureElems::const_iterator i = expr.closure.elems.begin();
|
|
|
|
i != expr.closure.elems.end(); ++i)
|
|
|
|
worker.addSubstitutionGoal(i->first, shared_from_this());
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
nrWaitees = expr.closure.elems.size();
|
|
|
|
|
|
|
|
state = &RealisationGoal::elemFinished;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void RealisationGoal::elemFinished()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug(format("all closure elements finished of `%1%'") % nePath);
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
amDone();
|
|
|
|
}
|
2003-08-22 23:12:44 +03:00
|
|
|
|
2003-07-20 22:29:38 +03:00
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
2003-07-20 22:29:38 +03:00
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
class SubstitutionGoal : public Goal
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
/* The store path that should be realised through a substitute. */
|
|
|
|
Path storePath;
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
/* The remaining substitutes for this path. */
|
|
|
|
Substitutes subs;
|
|
|
|
|
|
|
|
/* The current substitute. */
|
|
|
|
Substitute sub;
|
|
|
|
|
|
|
|
/* The normal form of the substitute store expression. */
|
|
|
|
Path nfSub;
|
|
|
|
|
|
|
|
/* Pipe for the substitute's standard output/error. */
|
|
|
|
Pipe logPipe;
|
|
|
|
|
|
|
|
/* The process ID of the builder. */
|
|
|
|
pid_t pid;
|
|
|
|
|
2004-06-21 12:35:50 +03:00
|
|
|
/* Lock on the store path. */
|
|
|
|
PathLocks outputLock;
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
typedef void (SubstitutionGoal::*GoalState)();
|
|
|
|
GoalState state;
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
public:
|
|
|
|
SubstitutionGoal(const Path & _nePath, Worker & _worker);
|
|
|
|
~SubstitutionGoal();
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 15:39:56 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void work();
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The states. */
|
|
|
|
void init();
|
2004-06-20 22:17:54 +03:00
|
|
|
void tryNext();
|
|
|
|
void exprNormalised();
|
|
|
|
void exprRealised();
|
|
|
|
void finished();
|
2004-06-18 21:09:32 +03:00
|
|
|
};
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
SubstitutionGoal::SubstitutionGoal(const Path & _storePath, Worker & _worker)
|
|
|
|
: Goal(_worker)
|
|
|
|
{
|
|
|
|
storePath = _storePath;
|
2004-06-20 22:17:54 +03:00
|
|
|
pid = -1;
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &SubstitutionGoal::init;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
SubstitutionGoal::~SubstitutionGoal()
|
|
|
|
{
|
2004-06-20 22:17:54 +03:00
|
|
|
/* !!! turn this into a destructor for pids */
|
|
|
|
if (pid != -1) {
|
|
|
|
printMsg(lvlError, format("killing child process %1% (%2%)")
|
|
|
|
% pid % storePath);
|
|
|
|
killChild(pid);
|
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::work()
|
|
|
|
{
|
|
|
|
(this->*state)();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::init()
|
|
|
|
{
|
|
|
|
debug(format("init of subst `%1%'") % storePath);
|
|
|
|
|
|
|
|
/* If the path already exists we're done. */
|
|
|
|
if (isValidPath(storePath)) {
|
|
|
|
amDone();
|
|
|
|
return;
|
2003-08-20 14:30:45 +03:00
|
|
|
}
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
/* Otherwise, get the substitutes. */
|
|
|
|
subs = querySubstitutes(storePath);
|
|
|
|
|
|
|
|
/* Try the first one. */
|
|
|
|
tryNext();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::tryNext()
|
|
|
|
{
|
|
|
|
debug(format("trying next substitute of `%1%'") % storePath);
|
|
|
|
|
|
|
|
if (subs.size() == 0) throw Error(
|
|
|
|
format("path `%1%' is required, but it has no (remaining) substitutes")
|
|
|
|
% storePath);
|
|
|
|
sub = subs.front();
|
|
|
|
subs.pop_front();
|
|
|
|
|
|
|
|
/* Normalise the substitute store expression. */
|
|
|
|
worker.addNormalisationGoal(sub.storeExpr, shared_from_this());
|
|
|
|
nrWaitees = 1;
|
|
|
|
|
|
|
|
state = &SubstitutionGoal::exprNormalised;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::exprNormalised()
|
|
|
|
{
|
|
|
|
debug(format("store expr normalised of `%1%'") % storePath);
|
|
|
|
|
|
|
|
/* Realise the substitute store expression. */
|
|
|
|
if (!querySuccessor(sub.storeExpr, nfSub))
|
|
|
|
nfSub = sub.storeExpr;
|
|
|
|
worker.addRealisationGoal(nfSub, shared_from_this());
|
|
|
|
nrWaitees = 1;
|
|
|
|
|
|
|
|
state = &SubstitutionGoal::exprRealised;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::exprRealised()
|
|
|
|
{
|
|
|
|
debug(format("store expr realised of `%1%'") % storePath);
|
|
|
|
|
|
|
|
/* What's the substitute program? */
|
|
|
|
StoreExpr expr = storeExprFromPath(nfSub);
|
|
|
|
assert(expr.type == StoreExpr::neClosure);
|
|
|
|
assert(!expr.closure.roots.empty());
|
|
|
|
Path program =
|
|
|
|
canonPath(*expr.closure.roots.begin() + "/" + sub.program);
|
|
|
|
|
|
|
|
printMsg(lvlChatty, format("executing substitute `%1%'") % program);
|
|
|
|
|
|
|
|
logPipe.create();
|
|
|
|
|
2004-06-21 12:35:50 +03:00
|
|
|
/* Acquire a lock on the output path. */
|
|
|
|
PathSet lockPath;
|
|
|
|
lockPath.insert(storePath);
|
|
|
|
outputLock.lockPaths(lockPath);
|
|
|
|
|
|
|
|
/* Check again whether the path is invalid. */
|
|
|
|
if (isValidPath(storePath)) {
|
|
|
|
debug(format("store path `%1%' has become valid") % storePath);
|
|
|
|
outputLock.setDeletion(true);
|
|
|
|
amDone();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove the (stale) output path if it exists. */
|
|
|
|
if (pathExists(storePath))
|
|
|
|
deletePath(storePath);
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
/* Fork the substitute program. */
|
|
|
|
switch (pid = fork()) {
|
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
try { /* child */
|
|
|
|
|
|
|
|
logPipe.readSide.close();
|
|
|
|
|
|
|
|
/* !!! close other handles */
|
|
|
|
|
|
|
|
/* !!! this is cut & paste - fix */
|
|
|
|
|
|
|
|
/* Put the child in a separate process group so that it
|
|
|
|
doesn't receive terminal signals. */
|
|
|
|
if (setpgid(0, 0) == -1)
|
|
|
|
throw SysError(format("setting process group"));
|
|
|
|
|
|
|
|
/* Dup the write side of the logger pipe into stderr. */
|
|
|
|
if (dup2(logPipe.writeSide, STDERR_FILENO) == -1)
|
|
|
|
throw SysError("cannot pipe standard error into log file");
|
|
|
|
logPipe.readSide.close();
|
|
|
|
|
|
|
|
/* Dup stderr to stdin. */
|
|
|
|
if (dup2(STDERR_FILENO, STDOUT_FILENO) == -1)
|
|
|
|
throw SysError("cannot dup stderr into stdout");
|
|
|
|
|
|
|
|
/* Reroute stdin to /dev/null. */
|
|
|
|
int fdDevNull = open(pathNullDevice.c_str(), O_RDWR);
|
|
|
|
if (fdDevNull == -1)
|
|
|
|
throw SysError(format("cannot open `%1%'") % pathNullDevice);
|
|
|
|
if (dup2(fdDevNull, STDIN_FILENO) == -1)
|
|
|
|
throw SysError("cannot dup null device into stdin");
|
|
|
|
|
|
|
|
/* Fill in the arguments. !!! cut & paste */
|
|
|
|
const char * argArr[sub.args.size() + 3];
|
|
|
|
const char * * p = argArr;
|
|
|
|
string progName = baseNameOf(program);
|
|
|
|
*p++ = progName.c_str();
|
|
|
|
*p++ = storePath.c_str();
|
|
|
|
for (Strings::const_iterator i = sub.args.begin();
|
|
|
|
i != sub.args.end(); i++)
|
|
|
|
*p++ = i->c_str();
|
|
|
|
*p = 0;
|
|
|
|
|
|
|
|
execv(program.c_str(), (char * *) argArr);
|
|
|
|
|
|
|
|
throw SysError(format("executing `%1%'") % program);
|
|
|
|
|
|
|
|
} catch (exception & e) {
|
|
|
|
cerr << format("substitute error: %1%\n") % e.what();
|
|
|
|
}
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* parent */
|
|
|
|
logPipe.writeSide.close();
|
|
|
|
worker.childStarted(shared_from_this(),
|
|
|
|
pid, logPipe.readSide, false);
|
|
|
|
|
|
|
|
state = &SubstitutionGoal::finished;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::finished()
|
|
|
|
{
|
|
|
|
debug(format("substitute finished of `%1%'") % storePath);
|
|
|
|
|
|
|
|
int status;
|
|
|
|
|
|
|
|
/* Since we got an EOF on the logger pipe, the substitute is
|
|
|
|
presumed to have terminated. */
|
|
|
|
/* !!! this could block! */
|
|
|
|
if (waitpid(pid, &status, 0) != pid)
|
|
|
|
throw SysError(format("substitute for `%1%' should have terminated")
|
|
|
|
% storePath);
|
|
|
|
|
|
|
|
/* So the child is gone now. */
|
|
|
|
worker.childTerminated(pid);
|
|
|
|
pid = -1;
|
|
|
|
|
|
|
|
/* Close the read side of the logger pipe. */
|
|
|
|
logPipe.readSide.close();
|
|
|
|
|
|
|
|
debug(format("substitute for `%1%' finished") % storePath);
|
|
|
|
|
|
|
|
/* Check the exit status. */
|
2004-06-22 11:50:25 +03:00
|
|
|
if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
|
|
|
|
throw Error(format("builder for `%1%' %2%")
|
|
|
|
% storePath % statusToString(status));
|
2004-06-20 22:17:54 +03:00
|
|
|
|
|
|
|
if (!pathExists(storePath))
|
|
|
|
throw Error(format("substitute did not produce path `%1%'") % storePath);
|
|
|
|
|
|
|
|
Transaction txn;
|
|
|
|
createStoreTransaction(txn);
|
|
|
|
registerValidPath(txn, storePath);
|
|
|
|
txn.commit();
|
|
|
|
|
2004-06-21 12:35:50 +03:00
|
|
|
outputLock.setDeletion(true);
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
amDone();
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
static bool working = false;
|
|
|
|
|
|
|
|
|
|
|
|
Worker::Worker()
|
|
|
|
{
|
|
|
|
/* Debugging: prevent recursive workers. */
|
|
|
|
if (working) abort();
|
|
|
|
working = true;
|
2004-06-21 11:51:55 +03:00
|
|
|
nrChildren = 0;
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Worker::~Worker()
|
|
|
|
{
|
|
|
|
working = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
template<class T>
|
|
|
|
static void addGoal(const Path & path, GoalPtr waiter,
|
|
|
|
Worker & worker, Goals & goals,
|
|
|
|
GoalMap & goalMap, GoalMapRev & goalMapRev)
|
|
|
|
{
|
|
|
|
GoalPtr goal;
|
|
|
|
goal = goalMap[path];
|
|
|
|
if (!goal) {
|
|
|
|
goal = GoalPtr(new T(path, worker));
|
|
|
|
goals.insert(goal);
|
|
|
|
goalMap[path] = goal;
|
|
|
|
goalMapRev[goal] = path;
|
|
|
|
worker.wakeUp(goal);
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
if (waiter) goal->addWaiter(waiter);
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-08-01 18:41:47 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::addNormalisationGoal(const Path & nePath, GoalPtr waiter)
|
|
|
|
{
|
|
|
|
addGoal<NormalisationGoal>(nePath, waiter, *this, goals,
|
|
|
|
normalisationGoals, normalisationGoalsRev);
|
|
|
|
}
|
2003-08-01 18:41:47 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::addRealisationGoal(const Path & nePath, GoalPtr waiter)
|
|
|
|
{
|
|
|
|
addGoal<RealisationGoal>(nePath, waiter, *this, goals,
|
|
|
|
realisationGoals, realisationGoalsRev);
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::addSubstitutionGoal(const Path & storePath, GoalPtr waiter)
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
addGoal<SubstitutionGoal>(storePath, waiter, *this, goals,
|
|
|
|
substitutionGoals, substitutionGoalsRev);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void removeGoal(GoalPtr goal,
|
|
|
|
GoalMap & goalMap, GoalMapRev & goalMapRev)
|
|
|
|
{
|
|
|
|
GoalMapRev::iterator i = goalMapRev.find(goal);
|
|
|
|
if (i != goalMapRev.end()) {
|
|
|
|
goalMapRev.erase(i);
|
|
|
|
goalMap.erase(i->second);
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
void Worker::removeGoal(GoalPtr goal)
|
|
|
|
{
|
|
|
|
goals.erase(goal);
|
|
|
|
::removeGoal(goal, normalisationGoals, normalisationGoalsRev);
|
|
|
|
::removeGoal(goal, realisationGoals, realisationGoalsRev);
|
|
|
|
::removeGoal(goal, substitutionGoals, substitutionGoalsRev);
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-11-21 18:05:19 +02:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::wakeUp(GoalPtr goal)
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug("wake up");
|
|
|
|
awake.insert(goal);
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
bool Worker::canBuildMore()
|
|
|
|
{
|
2004-06-20 00:45:04 +03:00
|
|
|
return nrChildren < maxBuildJobs;
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
void Worker::childStarted(GoalPtr goal,
|
|
|
|
pid_t pid, int fdOutput, bool inBuildSlot)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2004-06-20 00:45:04 +03:00
|
|
|
Child child;
|
|
|
|
child.goal = goal;
|
|
|
|
child.fdOutput = fdOutput;
|
|
|
|
child.inBuildSlot = inBuildSlot;
|
|
|
|
children[pid] = child;
|
|
|
|
if (inBuildSlot) nrChildren++;
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
void Worker::childTerminated(pid_t pid)
|
|
|
|
{
|
2004-06-20 00:45:04 +03:00
|
|
|
Children::iterator i = children.find(pid);
|
|
|
|
assert(i != children.end());
|
|
|
|
|
|
|
|
if (i->second.inBuildSlot) {
|
|
|
|
assert(nrChildren > 0);
|
|
|
|
nrChildren--;
|
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
children.erase(pid);
|
|
|
|
|
|
|
|
/* Wake up goals waiting for a build slot. */
|
|
|
|
for (Goals::iterator i = wantingToBuild.begin();
|
|
|
|
i != wantingToBuild.end(); ++i)
|
|
|
|
wakeUp(*i);
|
|
|
|
wantingToBuild.clear();
|
2003-10-16 19:29:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::waitForBuildSlot(GoalPtr goal)
|
2003-10-16 19:29:57 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug("wait for build slot");
|
|
|
|
if (canBuildMore())
|
|
|
|
wakeUp(goal); /* we can do it right away */
|
|
|
|
else
|
|
|
|
wantingToBuild.insert(goal);
|
|
|
|
}
|
2004-02-13 12:45:09 +02:00
|
|
|
|
2003-10-16 19:29:57 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::run()
|
|
|
|
{
|
|
|
|
startNest(nest, lvlChatty, format("running normaliser"));
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
|
|
|
|
debug(format("main loop (%1% goals left)") % goals.size());
|
|
|
|
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Call every wake goal. */
|
|
|
|
while (!awake.empty()) {
|
|
|
|
Goals awake2(awake); /* !!! why is this necessary? */
|
|
|
|
awake.clear();
|
|
|
|
for (Goals::iterator i = awake2.begin(); i != awake2.end(); ++i) {
|
|
|
|
debug("goal");
|
|
|
|
checkInterrupt();
|
|
|
|
GoalPtr goal = *i;
|
|
|
|
goal->work();
|
|
|
|
}
|
2003-10-16 19:29:57 +03:00
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
if (goals.empty()) break;
|
2003-10-16 19:29:57 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* !!! not when we're polling */
|
|
|
|
assert(!children.empty());
|
|
|
|
|
|
|
|
/* Wait for input. */
|
|
|
|
waitForInput();
|
|
|
|
}
|
2003-10-16 19:29:57 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
assert(awake.empty());
|
|
|
|
assert(wantingToBuild.empty());
|
|
|
|
assert(children.empty());
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::waitForInput()
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
printMsg(lvlVomit, "waiting for children");
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Process log output from the children. We also use this to
|
|
|
|
detect child termination: if we get EOF on the logger pipe of a
|
|
|
|
build, we assume that the builder has terminated. */
|
|
|
|
|
|
|
|
/* Use select() to wait for the input side of any logger pipe to
|
|
|
|
become `available'. Note that `available' (i.e., non-blocking)
|
|
|
|
includes EOF. */
|
|
|
|
fd_set fds;
|
|
|
|
FD_ZERO(&fds);
|
|
|
|
int fdMax = 0;
|
|
|
|
for (Children::iterator i = children.begin();
|
|
|
|
i != children.end(); ++i)
|
|
|
|
{
|
2004-06-20 00:45:04 +03:00
|
|
|
int fd = i->second.fdOutput;
|
2004-06-18 21:09:32 +03:00
|
|
|
FD_SET(fd, &fds);
|
|
|
|
if (fd >= fdMax) fdMax = fd + 1;
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
if (select(fdMax, &fds, 0, 0, 0) == -1) {
|
|
|
|
if (errno == EINTR) return;
|
|
|
|
throw SysError("waiting for input");
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Process all available file descriptors. */
|
|
|
|
for (Children::iterator i = children.begin();
|
|
|
|
i != children.end(); ++i)
|
|
|
|
{
|
|
|
|
checkInterrupt();
|
2004-06-20 00:45:04 +03:00
|
|
|
GoalPtr goal = i->second.goal;
|
|
|
|
int fd = i->second.fdOutput;
|
2004-06-18 21:09:32 +03:00
|
|
|
if (FD_ISSET(fd, &fds)) {
|
|
|
|
unsigned char buffer[4096];
|
|
|
|
ssize_t rd = read(fd, buffer, sizeof(buffer));
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError(format("reading from `%1%'")
|
|
|
|
% goal->name());
|
|
|
|
} else if (rd == 0) {
|
|
|
|
debug(format("EOF on `%1%'") % goal->name());
|
|
|
|
wakeUp(goal);
|
|
|
|
} else {
|
|
|
|
printMsg(lvlVomit, format("read %1% bytes from `%2%'")
|
|
|
|
% rd % goal->name());
|
|
|
|
// writeFull(goal.fdLogFile, buffer, rd);
|
|
|
|
if (verbosity >= buildVerbosity)
|
|
|
|
writeFull(STDERR_FILENO, buffer, rd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
Path normaliseStoreExpr(const Path & nePath)
|
2003-07-29 13:43:12 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
startNest(nest, lvlDebug, format("normalising `%1%'") % nePath);
|
2003-08-25 17:56:11 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
Worker worker;
|
|
|
|
worker.addNormalisationGoal(nePath, GoalPtr());
|
|
|
|
worker.run();
|
2003-07-29 13:43:12 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
Path nfPath;
|
|
|
|
if (!querySuccessor(nePath, nfPath))
|
|
|
|
throw Error("there should be a successor");
|
2003-07-29 13:43:12 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
return nfPath;
|
|
|
|
}
|
2003-07-29 13:43:12 +03:00
|
|
|
|
2003-07-29 17:28:17 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void realiseClosure(const Path & nePath)
|
|
|
|
{
|
|
|
|
startNest(nest, lvlDebug, format("realising closure `%1%'") % nePath);
|
2003-07-29 17:28:17 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
Worker worker;
|
|
|
|
worker.addRealisationGoal(nePath, GoalPtr());
|
|
|
|
worker.run();
|
2003-07-29 13:43:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void ensurePath(const Path & path)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
/* If the path is already valid, we're done. */
|
|
|
|
if (isValidPath(path)) return;
|
|
|
|
|
|
|
|
/* !!! add realisation goal */
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|