2003-07-20 22:29:38 +03:00
|
|
|
#include <map>
|
2004-06-18 21:09:32 +03:00
|
|
|
#include <boost/shared_ptr.hpp>
|
2004-06-25 18:36:09 +03:00
|
|
|
#include <boost/weak_ptr.hpp>
|
2004-06-18 21:09:32 +03:00
|
|
|
#include <boost/enable_shared_from_this.hpp>
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2005-01-04 19:38:26 +02:00
|
|
|
#include <sys/time.h>
|
2004-05-11 21:05:44 +03:00
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
2004-07-01 14:11:16 +03:00
|
|
|
#include <errno.h>
|
2004-11-29 17:09:29 +02:00
|
|
|
#include <utime.h>
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2003-07-20 22:29:38 +03:00
|
|
|
#include "normalise.hh"
|
|
|
|
#include "references.hh"
|
2003-08-01 17:11:19 +03:00
|
|
|
#include "pathlocks.hh"
|
2003-07-20 22:29:38 +03:00
|
|
|
#include "globals.hh"
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* !!! TODO storeExprFromPath shouldn't be used here */
|
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
static string pathNullDevice = "/dev/null";
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Forward definition. */
|
|
|
|
class Worker;
|
|
|
|
|
|
|
|
|
|
|
|
/* A pointer to a goal. */
|
|
|
|
class Goal;
|
|
|
|
typedef shared_ptr<Goal> GoalPtr;
|
2004-06-25 18:36:09 +03:00
|
|
|
typedef weak_ptr<Goal> WeakGoalPtr;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
/* Set of goals. */
|
2004-06-18 21:09:32 +03:00
|
|
|
typedef set<GoalPtr> Goals;
|
2004-06-25 18:36:09 +03:00
|
|
|
typedef set<WeakGoalPtr> WeakGoals;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* A map of paths to goals (and the other way around). */
|
2004-06-25 18:36:09 +03:00
|
|
|
typedef map<Path, WeakGoalPtr> WeakGoalMap;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class Goal : public enable_shared_from_this<Goal>
|
|
|
|
{
|
|
|
|
protected:
|
|
|
|
|
|
|
|
/* Backlink to the worker. */
|
|
|
|
Worker & worker;
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
/* Goals that this goal is waiting for. */
|
|
|
|
Goals waitees;
|
|
|
|
|
|
|
|
/* Goals waiting for this one to finish. Must use weak pointers
|
|
|
|
here to prevent cycles. */
|
|
|
|
WeakGoals waiters;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-08-30 14:51:36 +03:00
|
|
|
/* Number of goals we are/were waiting for that have failed. */
|
2004-06-25 13:21:44 +03:00
|
|
|
unsigned int nrFailed;
|
|
|
|
|
|
|
|
/* Whether amDone() has been called. */
|
|
|
|
bool done;
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
Goal(Worker & _worker) : worker(_worker)
|
|
|
|
{
|
2004-06-25 13:21:44 +03:00
|
|
|
done = false;
|
2004-08-30 14:51:36 +03:00
|
|
|
nrFailed = 0;
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
virtual ~Goal()
|
|
|
|
{
|
2004-06-22 12:51:44 +03:00
|
|
|
printMsg(lvlVomit, "goal destroyed");
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public:
|
|
|
|
virtual void work() = 0;
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
virtual string name() = 0;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
void addWaitee(GoalPtr waitee);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
virtual void waiteeDone(GoalPtr waitee, bool success);
|
2004-06-25 13:21:44 +03:00
|
|
|
|
2004-06-29 12:41:50 +03:00
|
|
|
virtual void writeLog(int fd, const unsigned char * buf, size_t count)
|
|
|
|
{
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
void trace(const format & f);
|
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
protected:
|
|
|
|
void amDone(bool success = true);
|
2004-06-18 21:09:32 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* A mapping used to remember for each child process to what goal it
|
|
|
|
belongs, and a file descriptor for receiving log data. */
|
2004-06-20 00:45:04 +03:00
|
|
|
struct Child
|
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
WeakGoalPtr goal;
|
2004-06-20 00:45:04 +03:00
|
|
|
int fdOutput;
|
|
|
|
bool inBuildSlot;
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef map<pid_t, Child> Children;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
|
|
|
|
/* The worker class. */
|
|
|
|
class Worker
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
/* Note: the worker should only have strong pointers to the
|
|
|
|
top-level goals. */
|
|
|
|
|
|
|
|
/* The top-level goals of the worker. */
|
|
|
|
Goals topGoals;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Goals that are ready to do some work. */
|
2004-06-25 18:36:09 +03:00
|
|
|
WeakGoals awake;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Goals waiting for a build slot. */
|
2004-06-25 18:36:09 +03:00
|
|
|
WeakGoals wantingToBuild;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Child processes currently running. */
|
|
|
|
Children children;
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Number of build slots occupied. Not all child processes
|
|
|
|
(namely build hooks) count as occupied build slots. */
|
|
|
|
unsigned int nrChildren;
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Maps used to prevent multiple instantiation of a goal for the
|
|
|
|
same expression / path. */
|
2004-06-25 18:36:09 +03:00
|
|
|
WeakGoalMap normalisationGoals;
|
|
|
|
WeakGoalMap realisationGoals;
|
|
|
|
WeakGoalMap substitutionGoals;
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
public:
|
|
|
|
|
|
|
|
Worker();
|
|
|
|
~Worker();
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
/* Make a goal (with caching). */
|
|
|
|
GoalPtr makeNormalisationGoal(const Path & nePath);
|
|
|
|
GoalPtr makeRealisationGoal(const Path & nePath);
|
|
|
|
GoalPtr makeSubstitutionGoal(const Path & storePath);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
/* Remove a dead goal. */
|
2004-06-18 21:09:32 +03:00
|
|
|
void removeGoal(GoalPtr goal);
|
|
|
|
|
|
|
|
/* Wake up a goal (i.e., there is something for it to do). */
|
|
|
|
void wakeUp(GoalPtr goal);
|
|
|
|
|
|
|
|
/* Can we start another child process? */
|
|
|
|
bool canBuildMore();
|
|
|
|
|
|
|
|
/* Registers / unregisters a running child process. */
|
2004-06-20 00:45:04 +03:00
|
|
|
void childStarted(GoalPtr goal, pid_t pid, int fdOutput,
|
|
|
|
bool inBuildSlot);
|
2004-07-01 19:24:35 +03:00
|
|
|
void childTerminated(pid_t pid, bool wakeSleepers = true);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Add a goal to the set of goals waiting for a build slot. */
|
2004-07-01 19:24:35 +03:00
|
|
|
void waitForBuildSlot(GoalPtr goal, bool reallyWait = false);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
/* Loop until the specified top-level goal has finished. Returns
|
|
|
|
true if it has finished succesfully. */
|
|
|
|
bool run(GoalPtr topGoal);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Wait for input to become available. */
|
|
|
|
void waitForInput();
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2004-06-24 16:40:38 +03:00
|
|
|
class SubstError : public Error
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
SubstError(const format & f) : Error(f) { };
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
class BuildError : public Error
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
BuildError(const format & f) : Error(f) { };
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
void Goal::addWaitee(GoalPtr waitee)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
waitees.insert(waitee);
|
|
|
|
waitee->waiters.insert(shared_from_this());
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
void Goal::waiteeDone(GoalPtr waitee, bool success)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
assert(waitees.find(waitee) != waitees.end());
|
|
|
|
waitees.erase(waitee);
|
2004-06-28 13:42:57 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
if (!success) ++nrFailed;
|
2004-06-28 13:42:57 +03:00
|
|
|
|
2004-08-30 14:51:36 +03:00
|
|
|
if (waitees.empty() || (!success && !keepGoing)) {
|
2004-06-28 13:42:57 +03:00
|
|
|
|
|
|
|
/* If we failed and keepGoing is not set, we remove all
|
|
|
|
remaining waitees. */
|
|
|
|
for (Goals::iterator i = waitees.begin(); i != waitees.end(); ++i) {
|
|
|
|
GoalPtr goal = *i;
|
|
|
|
WeakGoals waiters2;
|
|
|
|
for (WeakGoals::iterator j = goal->waiters.begin();
|
|
|
|
j != goal->waiters.end(); ++j)
|
|
|
|
if (j->lock() != shared_from_this())
|
|
|
|
waiters2.insert(*j);
|
|
|
|
goal->waiters = waiters2;
|
|
|
|
}
|
|
|
|
waitees.clear();
|
2004-07-01 19:24:35 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
worker.wakeUp(shared_from_this());
|
2004-06-28 13:42:57 +03:00
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
void Goal::amDone(bool success)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
trace("done");
|
2004-06-25 13:21:44 +03:00
|
|
|
assert(!done);
|
|
|
|
done = true;
|
2004-06-25 18:36:09 +03:00
|
|
|
for (WeakGoals::iterator i = waiters.begin(); i != waiters.end(); ++i) {
|
|
|
|
GoalPtr goal = i->lock();
|
|
|
|
if (goal) goal->waiteeDone(shared_from_this(), success);
|
|
|
|
}
|
|
|
|
waiters.clear();
|
2004-06-18 21:09:32 +03:00
|
|
|
worker.removeGoal(shared_from_this());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
void Goal::trace(const format & f)
|
|
|
|
{
|
|
|
|
debug(format("%1%: %2%") % name() % f);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-22 13:21:44 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
/* Common initialisation performed in child processes. */
|
|
|
|
void commonChildInit(Pipe & logPipe)
|
|
|
|
{
|
|
|
|
/* Put the child in a separate process group so that it doesn't
|
|
|
|
receive terminal signals. */
|
|
|
|
if (setpgid(0, 0) == -1)
|
|
|
|
throw SysError(format("setting process group"));
|
|
|
|
|
|
|
|
/* Dup the write side of the logger pipe into stderr. */
|
|
|
|
if (dup2(logPipe.writeSide, STDERR_FILENO) == -1)
|
|
|
|
throw SysError("cannot pipe standard error into log file");
|
|
|
|
logPipe.readSide.close();
|
|
|
|
|
|
|
|
/* Dup stderr to stdin. */
|
|
|
|
if (dup2(STDERR_FILENO, STDOUT_FILENO) == -1)
|
|
|
|
throw SysError("cannot dup stderr into stdout");
|
|
|
|
|
|
|
|
/* Reroute stdin to /dev/null. */
|
|
|
|
int fdDevNull = open(pathNullDevice.c_str(), O_RDWR);
|
|
|
|
if (fdDevNull == -1)
|
|
|
|
throw SysError(format("cannot open `%1%'") % pathNullDevice);
|
|
|
|
if (dup2(fdDevNull, STDIN_FILENO) == -1)
|
|
|
|
throw SysError("cannot dup null device into stdin");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-24 16:40:38 +03:00
|
|
|
/* Convert a string list to an array of char pointers. Careful: the
|
|
|
|
string list should outlive the array. */
|
2004-06-22 13:21:44 +03:00
|
|
|
const char * * strings2CharPtrs(const Strings & ss)
|
|
|
|
{
|
|
|
|
const char * * arr = new const char * [ss.size() + 1];
|
|
|
|
const char * * p = arr;
|
|
|
|
for (Strings::const_iterator i = ss.begin(); i != ss.end(); ++i)
|
|
|
|
*p++ = i->c_str();
|
|
|
|
*p = 0;
|
|
|
|
return arr;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
/* Should only be called after an expression has been normalised. */
|
|
|
|
Path queryNormalForm(const Path & nePath)
|
|
|
|
{
|
|
|
|
Path nfPath;
|
2004-08-11 22:03:13 +03:00
|
|
|
if (querySuccessor(nePath, nfPath)) return nfPath;
|
|
|
|
/* If there is no successor, than nePath must be a normal form
|
|
|
|
itself. */
|
|
|
|
StoreExpr ne = storeExprFromPath(nePath);
|
|
|
|
if (ne.type != StoreExpr::neClosure) abort();
|
|
|
|
return nePath;
|
2004-06-28 13:42:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-11-29 17:09:29 +02:00
|
|
|
/* "Fix", or canonicalise, the meta-data of the files in a store path
|
|
|
|
after it has been built. In particular:
|
|
|
|
- the last modification date on each file is set to 0 (i.e.,
|
|
|
|
00:00:00 1/1/1970 UTC)
|
|
|
|
- the permissions are set of 444 or 555 (i.e., read-only with or
|
|
|
|
without execute permission; setuid bits etc. are cleared)
|
|
|
|
- the owner and group are set to the Nix user and group, if we're
|
|
|
|
in a setuid Nix installation
|
|
|
|
*/
|
|
|
|
void canonicalisePathMetaData(const Path & path)
|
|
|
|
{
|
|
|
|
checkInterrupt();
|
|
|
|
|
|
|
|
struct stat st;
|
|
|
|
if (lstat(path.c_str(), &st))
|
|
|
|
throw SysError(format("getting attributes of path `%1%'") % path);
|
|
|
|
|
|
|
|
if (!S_ISLNK(st.st_mode)) {
|
|
|
|
|
|
|
|
/* Mask out all type related bits. */
|
|
|
|
mode_t mode = st.st_mode & ~S_IFMT;
|
|
|
|
|
|
|
|
if (mode != 0444 && mode != 0555) {
|
|
|
|
mode = (st.st_mode & S_IFMT)
|
|
|
|
| 0444
|
|
|
|
| (st.st_mode & S_IXUSR ? 0111 : 0);
|
|
|
|
if (chmod(path.c_str(), mode) == -1)
|
|
|
|
throw SysError(format("changing mode of `%1%' to %2$o") % path % mode);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (st.st_uid != getuid() || st.st_gid != getgid()) {
|
|
|
|
if (chown(path.c_str(), getuid(), getgid()) == -1)
|
|
|
|
throw SysError(format("changing owner/group of `%1%' to %2%/%3%")
|
|
|
|
% path % getuid() % getgid());
|
|
|
|
}
|
|
|
|
|
2004-11-29 21:22:16 +02:00
|
|
|
if (st.st_mtime != 0) {
|
|
|
|
struct utimbuf utimbuf;
|
|
|
|
utimbuf.actime = st.st_atime;
|
|
|
|
utimbuf.modtime = 0;
|
|
|
|
if (utime(path.c_str(), &utimbuf) == -1)
|
|
|
|
throw SysError(format("changing modification time of `%1%'") % path);
|
|
|
|
}
|
|
|
|
|
2004-11-29 17:09:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (S_ISDIR(st.st_mode)) {
|
|
|
|
Strings names = readDirectory(path);
|
|
|
|
for (Strings::iterator i = names.begin(); i != names.end(); ++i)
|
|
|
|
canonicalisePathMetaData(path + "/" + *i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-22 13:21:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
class NormalisationGoal : public Goal
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
private:
|
|
|
|
/* The path of the derivation store expression. */
|
2004-05-11 21:05:44 +03:00
|
|
|
Path nePath;
|
|
|
|
|
|
|
|
/* The store expression stored at nePath. */
|
|
|
|
StoreExpr expr;
|
|
|
|
|
|
|
|
/* The remainder is state held during the build. */
|
|
|
|
|
|
|
|
/* Locks on the output paths. */
|
|
|
|
PathLocks outputLocks;
|
|
|
|
|
|
|
|
/* Input paths, with their closure elements. */
|
|
|
|
ClosureElems inClosures;
|
|
|
|
|
|
|
|
/* Referenceable paths (i.e., input and output paths). */
|
|
|
|
PathSet allPaths;
|
|
|
|
|
2004-06-08 16:21:03 +03:00
|
|
|
/* The normal forms of the input store expressions. */
|
|
|
|
PathSet inputNFs;
|
|
|
|
|
|
|
|
/* The successor mappings for the input store expressions. */
|
|
|
|
map<Path, Path> inputSucs;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* The process ID of the builder. */
|
2004-06-22 12:51:44 +03:00
|
|
|
Pid pid;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* The temporary directory. */
|
|
|
|
Path tmpDir;
|
|
|
|
|
|
|
|
/* File descriptor for the log file. */
|
2004-06-15 16:49:42 +03:00
|
|
|
AutoCloseFD fdLogFile;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Pipe for the builder's standard output/error. */
|
2004-05-13 22:14:49 +03:00
|
|
|
Pipe logPipe;
|
|
|
|
|
|
|
|
/* Pipes for talking to the build hook (if any). */
|
|
|
|
Pipe toHook;
|
|
|
|
Pipe fromHook;
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
typedef void (NormalisationGoal::*GoalState)();
|
|
|
|
GoalState state;
|
|
|
|
|
|
|
|
public:
|
|
|
|
NormalisationGoal(const Path & _nePath, Worker & _worker);
|
|
|
|
~NormalisationGoal();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void work();
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
private:
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The states. */
|
|
|
|
void init();
|
|
|
|
void haveStoreExpr();
|
|
|
|
void inputRealised();
|
|
|
|
void tryToBuild();
|
|
|
|
void buildDone();
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Is the build hook willing to perform the build? */
|
|
|
|
typedef enum {rpAccept, rpDecline, rpPostpone, rpDone} HookReply;
|
|
|
|
HookReply tryBuildHook();
|
|
|
|
|
|
|
|
/* Synchronously wait for a build hook to finish. */
|
|
|
|
void terminateBuildHook();
|
|
|
|
|
|
|
|
/* Acquires locks on the output paths and gathers information
|
|
|
|
about the build (e.g., the input closures). During this
|
|
|
|
process its possible that we find out that the build is
|
|
|
|
unnecessary, in which case we return false (this is not an
|
|
|
|
error condition!). */
|
|
|
|
bool prepareBuild();
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Start building a derivation. */
|
|
|
|
void startBuilder();
|
|
|
|
|
|
|
|
/* Must be called after the output paths have become valid (either
|
|
|
|
due to a successful build or hook, or because they already
|
|
|
|
were). */
|
|
|
|
void createClosure();
|
|
|
|
|
|
|
|
/* Open a log file and a pipe to it. */
|
|
|
|
void openLogFile();
|
|
|
|
|
|
|
|
/* Common initialisation to be performed in child processes (i.e.,
|
|
|
|
both in builders and in build hooks. */
|
|
|
|
void initChild();
|
|
|
|
|
|
|
|
/* Delete the temporary directory, if we have one. */
|
2004-05-11 21:05:44 +03:00
|
|
|
void deleteTmpDir(bool force);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-29 12:41:50 +03:00
|
|
|
/* Callback used by the worker to write to the log. */
|
|
|
|
void writeLog(int fd, const unsigned char * buf, size_t count);
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
string name();
|
2004-05-11 21:05:44 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
NormalisationGoal::NormalisationGoal(const Path & _nePath, Worker & _worker)
|
|
|
|
: Goal(_worker)
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
nePath = _nePath;
|
|
|
|
state = &NormalisationGoal::init;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
NormalisationGoal::~NormalisationGoal()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
if (pid != -1) worker.childTerminated(pid);
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Careful: we should never ever throw an exception from a
|
|
|
|
destructor. */
|
|
|
|
try {
|
|
|
|
deleteTmpDir(false);
|
|
|
|
} catch (Error & e) {
|
|
|
|
printMsg(lvlError, format("error (ignored): %1%") % e.msg());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::work()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
(this->*state)();
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::init()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-22 17:48:59 +03:00
|
|
|
trace("init");
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* If we already have a successor, then we are done already; don't
|
|
|
|
add the expression as a goal. */
|
|
|
|
Path nfPath;
|
|
|
|
if (querySuccessor(nePath, nfPath)) {
|
|
|
|
amDone();
|
|
|
|
return;
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The first thing to do is to make sure that the store expression
|
|
|
|
exists. If it doesn't, it may be created through a
|
|
|
|
substitute. */
|
2004-06-25 18:36:09 +03:00
|
|
|
addWaitee(worker.makeSubstitutionGoal(nePath));
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &NormalisationGoal::haveStoreExpr;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::haveStoreExpr()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-22 17:48:59 +03:00
|
|
|
trace("loading store expression");
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
if (nrFailed != 0) {
|
|
|
|
printMsg(lvlError,
|
|
|
|
format("cannot normalise missing store expression `%1%'")
|
|
|
|
% nePath);
|
|
|
|
amDone(false);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
assert(isValidPath(nePath));
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-11-18 13:22:29 +02:00
|
|
|
/* Get the store expression. */
|
2004-06-18 21:09:32 +03:00
|
|
|
expr = storeExprFromPath(nePath);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* If this is a normal form (i.e., a closure) we are also done. */
|
2004-06-18 21:09:32 +03:00
|
|
|
if (expr.type == StoreExpr::neClosure) {
|
|
|
|
amDone();
|
|
|
|
return;
|
2004-05-14 15:24:29 +03:00
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
assert(expr.type == StoreExpr::neDerivation);
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-09-12 22:08:57 +03:00
|
|
|
/* Inputs must be realised before we can build this goal. */
|
2004-06-18 21:09:32 +03:00
|
|
|
for (PathSet::iterator i = expr.derivation.inputs.begin();
|
|
|
|
i != expr.derivation.inputs.end(); ++i)
|
2004-09-12 22:08:57 +03:00
|
|
|
addWaitee(worker.makeRealisationGoal(*i));
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &NormalisationGoal::inputRealised;
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::inputRealised()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-22 17:48:59 +03:00
|
|
|
trace("all inputs realised");
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
if (nrFailed != 0) {
|
|
|
|
printMsg(lvlError,
|
|
|
|
format("cannot normalise derivation `%1%': "
|
|
|
|
"%2% closure element(s) could not be realised")
|
|
|
|
% nePath % nrFailed);
|
|
|
|
amDone(false);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Okay, try to build. Note that here we don't wait for a build
|
|
|
|
slot to become available, since we don't need one if there is a
|
|
|
|
build hook. */
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &NormalisationGoal::tryToBuild;
|
2004-06-20 00:45:04 +03:00
|
|
|
worker.wakeUp(shared_from_this());
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::tryToBuild()
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
2004-06-22 17:48:59 +03:00
|
|
|
trace("trying to build");
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
try {
|
|
|
|
|
|
|
|
/* Is the build hook willing to accept this job? */
|
|
|
|
switch (tryBuildHook()) {
|
|
|
|
case rpAccept:
|
|
|
|
/* Yes, it has started doing so. Wait until we get
|
|
|
|
EOF from the hook. */
|
|
|
|
state = &NormalisationGoal::buildDone;
|
|
|
|
return;
|
|
|
|
case rpPostpone:
|
|
|
|
/* Not now; wait until at least one child finishes. */
|
2004-07-01 19:24:35 +03:00
|
|
|
worker.waitForBuildSlot(shared_from_this(), true);
|
2004-06-25 13:21:44 +03:00
|
|
|
return;
|
|
|
|
case rpDecline:
|
|
|
|
/* We should do it ourselves. */
|
|
|
|
break;
|
|
|
|
case rpDone:
|
|
|
|
/* Somebody else did it (there is a successor now). */
|
|
|
|
amDone();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Make sure that we are allowed to start a build. */
|
|
|
|
if (!worker.canBuildMore()) {
|
2004-06-20 00:45:04 +03:00
|
|
|
worker.waitForBuildSlot(shared_from_this());
|
|
|
|
return;
|
2004-06-25 13:21:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Acquire locks and such. If we then see that there now is a
|
|
|
|
successor, we're done. */
|
|
|
|
if (!prepareBuild()) {
|
2004-06-20 00:45:04 +03:00
|
|
|
amDone();
|
|
|
|
return;
|
2004-06-25 13:21:44 +03:00
|
|
|
}
|
2004-06-20 00:45:04 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
/* Okay, we have to build. */
|
|
|
|
startBuilder();
|
2003-08-01 17:11:19 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
} catch (BuildError & e) {
|
|
|
|
printMsg(lvlError, e.msg());
|
|
|
|
amDone(false);
|
2004-06-20 00:45:04 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This state will be reached when we get EOF on the child's
|
|
|
|
log pipe. */
|
|
|
|
state = &NormalisationGoal::buildDone;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void NormalisationGoal::buildDone()
|
|
|
|
{
|
2004-06-22 17:48:59 +03:00
|
|
|
trace("build done");
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
/* Since we got an EOF on the logger pipe, the builder is presumed
|
|
|
|
to have terminated. In fact, the builder could also have
|
|
|
|
simply have closed its end of the pipe --- just don't do that
|
|
|
|
:-) */
|
|
|
|
/* !!! this could block! */
|
2004-06-22 12:51:44 +03:00
|
|
|
pid_t savedPid = pid;
|
|
|
|
int status = pid.wait(true);
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
/* So the child is gone now. */
|
2004-06-22 12:51:44 +03:00
|
|
|
worker.childTerminated(savedPid);
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
/* Close the read side of the logger pipe. */
|
|
|
|
logPipe.readSide.close();
|
|
|
|
|
|
|
|
/* Close the log file. */
|
|
|
|
fdLogFile.close();
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
debug(format("builder process for `%1%' finished") % nePath);
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
/* Check the exit status. */
|
2004-06-22 14:03:41 +03:00
|
|
|
if (!statusOk(status)) {
|
2004-06-20 00:45:04 +03:00
|
|
|
deleteTmpDir(false);
|
2004-06-25 13:21:44 +03:00
|
|
|
printMsg(lvlError, format("builder for `%1%' %2%")
|
2004-06-22 11:50:25 +03:00
|
|
|
% nePath % statusToString(status));
|
2004-06-25 13:21:44 +03:00
|
|
|
amDone(false);
|
|
|
|
return;
|
2004-06-20 22:17:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
deleteTmpDir(true);
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
/* Compute a closure store expression, and register it as our
|
|
|
|
successor. */
|
2004-06-25 13:21:44 +03:00
|
|
|
try {
|
|
|
|
createClosure();
|
|
|
|
} catch (BuildError & e) {
|
|
|
|
printMsg(lvlError, e.msg());
|
|
|
|
amDone(false);
|
|
|
|
return;
|
|
|
|
}
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
amDone();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static string readLine(int fd)
|
|
|
|
{
|
|
|
|
string s;
|
|
|
|
while (1) {
|
|
|
|
char ch;
|
|
|
|
ssize_t rd = read(fd, &ch, 1);
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError("reading a line");
|
|
|
|
} else if (rd == 0)
|
|
|
|
throw Error("unexpected EOF reading a line");
|
|
|
|
else {
|
|
|
|
if (ch == '\n') return s;
|
|
|
|
s += ch;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void writeLine(int fd, string s)
|
|
|
|
{
|
|
|
|
s += '\n';
|
|
|
|
writeFull(fd, (const unsigned char *) s.c_str(), s.size());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* !!! ugly hack */
|
|
|
|
static void drain(int fd)
|
|
|
|
{
|
|
|
|
unsigned char buffer[1024];
|
|
|
|
while (1) {
|
|
|
|
ssize_t rd = read(fd, buffer, sizeof buffer);
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError("draining");
|
|
|
|
} else if (rd == 0) break;
|
|
|
|
else writeFull(STDERR_FILENO, buffer, rd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
NormalisationGoal::HookReply NormalisationGoal::tryBuildHook()
|
|
|
|
{
|
|
|
|
Path buildHook = getEnv("NIX_BUILD_HOOK");
|
|
|
|
if (buildHook == "") return rpDecline;
|
|
|
|
buildHook = absPath(buildHook);
|
|
|
|
|
|
|
|
/* Create a directory where we will store files used for
|
|
|
|
communication between us and the build hook. */
|
|
|
|
tmpDir = createTempDir();
|
|
|
|
|
|
|
|
/* Create the log file and pipe. */
|
|
|
|
openLogFile();
|
|
|
|
|
|
|
|
/* Create the communication pipes. */
|
|
|
|
toHook.create();
|
|
|
|
fromHook.create();
|
|
|
|
|
|
|
|
/* Fork the hook. */
|
2004-06-22 12:51:44 +03:00
|
|
|
pid = fork();
|
|
|
|
switch (pid) {
|
2004-06-20 00:45:04 +03:00
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
try { /* child */
|
|
|
|
|
|
|
|
initChild();
|
|
|
|
|
|
|
|
execl(buildHook.c_str(), buildHook.c_str(),
|
|
|
|
(worker.canBuildMore() ? (string) "1" : "0").c_str(),
|
|
|
|
thisSystem.c_str(),
|
|
|
|
expr.derivation.platform.c_str(),
|
|
|
|
nePath.c_str(), 0);
|
|
|
|
|
|
|
|
throw SysError(format("executing `%1%'") % buildHook);
|
|
|
|
|
|
|
|
} catch (exception & e) {
|
|
|
|
cerr << format("build error: %1%\n") % e.what();
|
|
|
|
}
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* parent */
|
|
|
|
logPipe.writeSide.close();
|
|
|
|
worker.childStarted(shared_from_this(),
|
|
|
|
pid, logPipe.readSide, false);
|
|
|
|
|
|
|
|
fromHook.writeSide.close();
|
|
|
|
toHook.readSide.close();
|
|
|
|
|
|
|
|
/* Read the first line of input, which should be a word indicating
|
|
|
|
whether the hook wishes to perform the build. !!! potential
|
|
|
|
for deadlock here: we should also read from the child's logger
|
|
|
|
pipe. */
|
|
|
|
string reply;
|
|
|
|
try {
|
|
|
|
reply = readLine(fromHook.readSide);
|
|
|
|
} catch (Error & e) {
|
|
|
|
drain(logPipe.readSide);
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
|
|
|
|
debug(format("hook reply is `%1%'") % reply);
|
|
|
|
|
|
|
|
if (reply == "decline" || reply == "postpone") {
|
|
|
|
/* Clean up the child. !!! hacky / should verify */
|
|
|
|
drain(logPipe.readSide);
|
|
|
|
terminateBuildHook();
|
|
|
|
return reply == "decline" ? rpDecline : rpPostpone;
|
|
|
|
}
|
|
|
|
|
|
|
|
else if (reply == "accept") {
|
|
|
|
|
|
|
|
/* Acquire locks and such. If we then see that there now is a
|
|
|
|
successor, we're done. */
|
|
|
|
if (!prepareBuild()) {
|
2004-06-20 22:17:54 +03:00
|
|
|
/* Tell the hook to exit. */
|
2004-06-20 00:45:04 +03:00
|
|
|
writeLine(toHook.writeSide, "cancel");
|
|
|
|
terminateBuildHook();
|
|
|
|
return rpDone;
|
|
|
|
}
|
|
|
|
|
2004-06-22 17:48:59 +03:00
|
|
|
printMsg(lvlInfo, format("running hook to build path `%1%'")
|
|
|
|
% *expr.derivation.outputs.begin());
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
/* Write the information that the hook needs to perform the
|
|
|
|
build, i.e., the set of input paths (including closure
|
|
|
|
expressions), the set of output paths, and the successor
|
|
|
|
mappings for the input expressions. */
|
|
|
|
|
|
|
|
Path inputListFN = tmpDir + "/inputs";
|
|
|
|
Path outputListFN = tmpDir + "/outputs";
|
|
|
|
Path successorsListFN = tmpDir + "/successors";
|
|
|
|
|
|
|
|
string s;
|
|
|
|
for (ClosureElems::iterator i = inClosures.begin();
|
|
|
|
i != inClosures.end(); ++i)
|
|
|
|
s += i->first + "\n";
|
|
|
|
for (PathSet::iterator i = inputNFs.begin();
|
|
|
|
i != inputNFs.end(); ++i)
|
|
|
|
s += *i + "\n";
|
|
|
|
writeStringToFile(inputListFN, s);
|
|
|
|
|
|
|
|
s = "";
|
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
|
|
|
s += *i + "\n";
|
|
|
|
writeStringToFile(outputListFN, s);
|
|
|
|
|
|
|
|
s = "";
|
|
|
|
for (map<Path, Path>::iterator i = inputSucs.begin();
|
|
|
|
i != inputSucs.end(); ++i)
|
|
|
|
s += i->first + " " + i->second + "\n";
|
|
|
|
writeStringToFile(successorsListFN, s);
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
/* Tell the hook to proceed. */
|
2004-06-20 00:45:04 +03:00
|
|
|
writeLine(toHook.writeSide, "okay");
|
|
|
|
|
|
|
|
return rpAccept;
|
|
|
|
}
|
|
|
|
|
|
|
|
else throw Error(format("bad hook reply `%1%'") % reply);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void NormalisationGoal::terminateBuildHook()
|
|
|
|
{
|
|
|
|
/* !!! drain stdout of hook */
|
|
|
|
debug("terminating build hook");
|
2004-06-22 12:51:44 +03:00
|
|
|
pid_t savedPid = pid;
|
|
|
|
pid.wait(true);
|
2004-07-01 19:24:35 +03:00
|
|
|
worker.childTerminated(savedPid, false);
|
2004-06-20 00:45:04 +03:00
|
|
|
fromHook.readSide.close();
|
|
|
|
toHook.writeSide.close();
|
|
|
|
fdLogFile.close();
|
|
|
|
logPipe.readSide.close();
|
2004-08-05 17:53:27 +03:00
|
|
|
deleteTmpDir(true); /* get rid of the hook's temporary directory */
|
2004-06-20 00:45:04 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool NormalisationGoal::prepareBuild()
|
|
|
|
{
|
2003-08-01 17:11:19 +03:00
|
|
|
/* Obtain locks on all output paths. The locks are automatically
|
|
|
|
released when we exit this function or Nix crashes. */
|
2004-05-12 12:35:51 +03:00
|
|
|
/* !!! BUG: this could block, which is not allowed. */
|
2004-06-18 21:09:32 +03:00
|
|
|
outputLocks.lockPaths(expr.derivation.outputs);
|
2003-08-01 17:11:19 +03:00
|
|
|
|
|
|
|
/* Now check again whether there is a successor. This is because
|
|
|
|
another process may have started building in parallel. After
|
|
|
|
it has finished and released the locks, we can (and should)
|
|
|
|
reuse its results. (Strictly speaking the first successor
|
2004-05-11 21:05:44 +03:00
|
|
|
check can be omitted, but that would be less efficient.) Note
|
|
|
|
that since we now hold the locks on the output paths, no other
|
|
|
|
process can build this expression, so no further checks are
|
|
|
|
necessary. */
|
|
|
|
Path nfPath;
|
2004-06-18 21:09:32 +03:00
|
|
|
if (querySuccessor(nePath, nfPath)) {
|
2004-05-11 21:05:44 +03:00
|
|
|
debug(format("skipping build of expression `%1%', someone beat us to it")
|
2004-06-18 21:09:32 +03:00
|
|
|
% nePath);
|
|
|
|
outputLocks.setDeletion(true);
|
2004-06-20 00:45:04 +03:00
|
|
|
return false;
|
2003-08-01 17:11:19 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Gather information necessary for computing the closure and/or
|
|
|
|
running the build hook. */
|
|
|
|
|
|
|
|
/* The outputs are referenceable paths. */
|
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
|
|
|
{
|
|
|
|
debug(format("building path `%1%'") % *i);
|
|
|
|
allPaths.insert(*i);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get information about the inputs (these all exist now). */
|
|
|
|
for (PathSet::iterator i = expr.derivation.inputs.begin();
|
|
|
|
i != expr.derivation.inputs.end(); ++i)
|
2003-08-20 17:11:40 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2004-06-28 13:42:57 +03:00
|
|
|
Path nePath = *i;
|
|
|
|
Path nfPath = queryNormalForm(nePath);
|
2004-06-18 21:09:32 +03:00
|
|
|
inputNFs.insert(nfPath);
|
|
|
|
if (nfPath != nePath) inputSucs[nePath] = nfPath;
|
2003-10-08 18:06:59 +03:00
|
|
|
/* !!! nfPath should be a root of the garbage collector while
|
|
|
|
we are building */
|
2004-05-11 21:05:44 +03:00
|
|
|
StoreExpr ne = storeExprFromPath(nfPath);
|
2003-11-18 13:22:29 +02:00
|
|
|
if (ne.type != StoreExpr::neClosure) abort();
|
2003-10-07 15:27:49 +03:00
|
|
|
for (ClosureElems::iterator j = ne.closure.elems.begin();
|
2004-05-11 21:05:44 +03:00
|
|
|
j != ne.closure.elems.end(); ++j)
|
2003-08-20 17:11:40 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
inClosures[j->first] = j->second;
|
|
|
|
allPaths.insert(j->first);
|
2003-08-20 17:11:40 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* We can skip running the builder if all output paths are already
|
|
|
|
valid. */
|
|
|
|
bool fastBuild = true;
|
2004-06-18 21:09:32 +03:00
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
2004-05-11 21:05:44 +03:00
|
|
|
if (!isValidPath(*i)) {
|
|
|
|
fastBuild = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fastBuild) {
|
|
|
|
printMsg(lvlChatty, format("skipping build; output paths already exist"));
|
2004-06-18 21:09:32 +03:00
|
|
|
createClosure();
|
2004-06-20 00:45:04 +03:00
|
|
|
return false;
|
2004-05-12 12:35:51 +03:00
|
|
|
}
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
return true;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::startBuilder()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-22 17:48:59 +03:00
|
|
|
startNest(nest, lvlInfo,
|
|
|
|
format("building path `%1%'") % *expr.derivation.outputs.begin());
|
|
|
|
|
2004-05-12 17:20:32 +03:00
|
|
|
/* Right platform? */
|
2004-06-18 21:09:32 +03:00
|
|
|
if (expr.derivation.platform != thisSystem)
|
2004-06-25 13:21:44 +03:00
|
|
|
throw BuildError(
|
|
|
|
format("a `%1%' is required to build `%3%', but I am a `%2%'")
|
|
|
|
% expr.derivation.platform % thisSystem % nePath);
|
2004-05-12 17:20:32 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* If any of the outputs already exist but are not registered,
|
|
|
|
delete them. */
|
2004-06-18 21:09:32 +03:00
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
|
|
|
Path path = *i;
|
|
|
|
if (isValidPath(path))
|
|
|
|
throw Error(format("obstructed build: path `%1%' exists") % path);
|
|
|
|
if (pathExists(path)) {
|
|
|
|
debug(format("removing unregistered path `%1%'") % path);
|
|
|
|
deletePath(path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Construct the environment passed to the builder. */
|
|
|
|
typedef map<string, string> Environment;
|
|
|
|
Environment env;
|
|
|
|
|
2003-08-18 17:54:54 +03:00
|
|
|
/* Most shells initialise PATH to some default (/bin:/usr/bin:...) when
|
|
|
|
PATH is not set. We don't want this, so we fill it in with some dummy
|
|
|
|
value. */
|
|
|
|
env["PATH"] = "/path-not-set";
|
|
|
|
|
2003-08-22 23:12:44 +03:00
|
|
|
/* Set HOME to a non-existing path to prevent certain programs from using
|
|
|
|
/etc/passwd (or NIS, or whatever) to locate the home directory (for
|
|
|
|
example, wget looks for ~/.wgetrc). I.e., these tools use /etc/passwd
|
|
|
|
if HOME is not set, but they will just assume that the settings file
|
|
|
|
they are looking for does not exist if HOME is set but points to some
|
|
|
|
non-existing path. */
|
|
|
|
env["HOME"] = "/homeless-shelter";
|
|
|
|
|
2004-03-12 12:45:08 +02:00
|
|
|
/* Tell the builder where the Nix store is. Usually they
|
|
|
|
shouldn't care, but this is useful for purity checking (e.g.,
|
|
|
|
the compiler or linker might only want to accept paths to files
|
|
|
|
in the store or in the build directory). */
|
|
|
|
env["NIX_STORE"] = nixStore;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Add all bindings specified in the derivation expression. */
|
2004-06-18 21:09:32 +03:00
|
|
|
for (StringPairs::iterator i = expr.derivation.env.begin();
|
|
|
|
i != expr.derivation.env.end(); ++i)
|
2003-07-20 22:29:38 +03:00
|
|
|
env[i->first] = i->second;
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Create a temporary directory where the build will take
|
|
|
|
place. */
|
2004-06-18 21:09:32 +03:00
|
|
|
tmpDir = createTempDir();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* For convenience, set an environment pointing to the top build
|
|
|
|
directory. */
|
2004-06-18 21:09:32 +03:00
|
|
|
env["NIX_BUILD_TOP"] = tmpDir;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Also set TMPDIR and variants to point to this directory. */
|
2004-06-18 21:09:32 +03:00
|
|
|
env["TMPDIR"] = env["TEMPDIR"] = env["TMP"] = env["TEMP"] = tmpDir;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Run the builder. */
|
|
|
|
printMsg(lvlChatty, format("executing builder `%1%'") %
|
2004-06-18 21:09:32 +03:00
|
|
|
expr.derivation.builder);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* Create the log file and pipe. */
|
2004-06-18 21:09:32 +03:00
|
|
|
openLogFile();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
/* Fork a child to build the package. Note that while we
|
|
|
|
currently use forks to run and wait for the children, it
|
|
|
|
shouldn't be hard to use threads for this on systems where
|
|
|
|
fork() is unavailable or inefficient. */
|
2004-06-22 12:51:44 +03:00
|
|
|
pid = fork();
|
|
|
|
switch (pid) {
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
|
|
|
|
/* Warning: in the child we should absolutely not make any
|
|
|
|
Berkeley DB calls! */
|
|
|
|
|
|
|
|
try { /* child */
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
initChild();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Fill in the arguments. */
|
2004-06-22 13:21:44 +03:00
|
|
|
Strings args(expr.derivation.args);
|
|
|
|
args.push_front(baseNameOf(expr.derivation.builder));
|
|
|
|
const char * * argArr = strings2CharPtrs(args);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Fill in the environment. */
|
|
|
|
Strings envStrs;
|
|
|
|
for (Environment::const_iterator i = env.begin();
|
2004-06-22 13:21:44 +03:00
|
|
|
i != env.end(); ++i)
|
|
|
|
envStrs.push_back(i->first + "=" + i->second);
|
|
|
|
const char * * envArr = strings2CharPtrs(envStrs);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
/* Execute the program. This should not return. */
|
2004-06-18 21:09:32 +03:00
|
|
|
execve(expr.derivation.builder.c_str(),
|
2004-05-11 21:05:44 +03:00
|
|
|
(char * *) argArr, (char * *) envArr);
|
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError(format("executing `%1%'")
|
2004-06-18 21:09:32 +03:00
|
|
|
% expr.derivation.builder);
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
} catch (exception & e) {
|
|
|
|
cerr << format("build error: %1%\n") % e.what();
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
_exit(1);
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* parent */
|
2004-06-22 12:51:44 +03:00
|
|
|
pid.setSeparatePG(true);
|
2004-06-18 21:09:32 +03:00
|
|
|
logPipe.writeSide.close();
|
2004-06-20 00:45:04 +03:00
|
|
|
worker.childStarted(shared_from_this(),
|
|
|
|
pid, logPipe.readSide, true);
|
2004-05-14 01:52:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::createClosure()
|
2004-05-18 17:52:35 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The resulting closure expression. */
|
|
|
|
StoreExpr nf;
|
|
|
|
nf.type = StoreExpr::neClosure;
|
|
|
|
|
|
|
|
startNest(nest, lvlTalkative,
|
2004-06-22 17:48:59 +03:00
|
|
|
format("computing closure for `%1%'") % nePath);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Check whether the output paths were created, and grep each
|
|
|
|
output path to determine what other paths it references. Also make all
|
|
|
|
output paths read-only. */
|
|
|
|
PathSet usedPaths;
|
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
|
|
|
{
|
|
|
|
Path path = *i;
|
2004-06-25 13:21:44 +03:00
|
|
|
if (!pathExists(path)) {
|
|
|
|
throw BuildError(
|
2004-07-06 14:21:34 +03:00
|
|
|
format("builder for `%1%' failed to produce output path `%2%'")
|
2004-06-25 13:21:44 +03:00
|
|
|
% nePath % path);
|
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
nf.closure.roots.insert(path);
|
2004-05-18 17:52:35 +03:00
|
|
|
|
2004-11-29 17:09:29 +02:00
|
|
|
canonicalisePathMetaData(path);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* For this output path, find the references to other paths contained
|
|
|
|
in it. */
|
|
|
|
startNest(nest2, lvlChatty,
|
|
|
|
format("scanning for store references in `%1%'") % path);
|
2004-08-04 12:25:21 +03:00
|
|
|
Strings refPaths;
|
|
|
|
if (!pathExists(path + "/nix-support/no-scan")) {
|
|
|
|
refPaths = filterReferences(path,
|
|
|
|
Strings(allPaths.begin(), allPaths.end()));
|
|
|
|
}
|
2004-06-18 21:09:32 +03:00
|
|
|
nest2.close();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Construct a closure element for this output path. */
|
|
|
|
ClosureElem elem;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* For each path referenced by this output path, add its id to the
|
|
|
|
closure element and add the id to the `usedPaths' set (so that the
|
|
|
|
elements referenced by *its* closure are added below). */
|
|
|
|
for (Paths::iterator j = refPaths.begin();
|
|
|
|
j != refPaths.end(); ++j)
|
|
|
|
{
|
|
|
|
checkInterrupt();
|
|
|
|
Path path = *j;
|
|
|
|
elem.refs.insert(path);
|
|
|
|
if (inClosures.find(path) != inClosures.end())
|
|
|
|
usedPaths.insert(path);
|
|
|
|
else if (expr.derivation.outputs.find(path) ==
|
|
|
|
expr.derivation.outputs.end())
|
|
|
|
abort();
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
nf.closure.elems[path] = elem;
|
2004-05-18 17:52:35 +03:00
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Close the closure. That is, for any referenced path, add the paths
|
|
|
|
referenced by it. */
|
|
|
|
PathSet donePaths;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
while (!usedPaths.empty()) {
|
|
|
|
checkInterrupt();
|
|
|
|
PathSet::iterator i = usedPaths.begin();
|
|
|
|
Path path = *i;
|
|
|
|
usedPaths.erase(i);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
if (donePaths.find(path) != donePaths.end()) continue;
|
|
|
|
donePaths.insert(path);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
ClosureElems::iterator j = inClosures.find(path);
|
|
|
|
if (j == inClosures.end()) abort();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
nf.closure.elems[path] = j->second;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
for (PathSet::iterator k = j->second.refs.begin();
|
|
|
|
k != j->second.refs.end(); k++)
|
|
|
|
usedPaths.insert(*k);
|
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* For debugging, print out the referenced and unreferenced paths. */
|
|
|
|
for (ClosureElems::iterator i = inClosures.begin();
|
|
|
|
i != inClosures.end(); ++i)
|
|
|
|
{
|
|
|
|
PathSet::iterator j = donePaths.find(i->first);
|
|
|
|
if (j == donePaths.end())
|
|
|
|
debug(format("unreferenced input: `%1%'") % i->first);
|
|
|
|
else
|
|
|
|
debug(format("referenced input: `%1%'") % i->first);
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Write the normal form. This does not have to occur in the
|
|
|
|
transaction below because writing terms is idem-potent. */
|
|
|
|
ATerm nfTerm = unparseStoreExpr(nf);
|
2005-01-14 15:51:38 +02:00
|
|
|
Path nfPath = writeTerm(nfTerm, "s");
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Register each output path, and register the normal form. This
|
|
|
|
is wrapped in one database transaction to ensure that if we
|
|
|
|
crash, either everything is registered or nothing is. This is
|
|
|
|
for recoverability: unregistered paths in the store can be
|
|
|
|
deleted arbitrarily, while registered paths can only be deleted
|
|
|
|
by running the garbage collector. */
|
|
|
|
Transaction txn;
|
|
|
|
createStoreTransaction(txn);
|
|
|
|
for (PathSet::iterator i = expr.derivation.outputs.begin();
|
|
|
|
i != expr.derivation.outputs.end(); ++i)
|
|
|
|
registerValidPath(txn, *i);
|
|
|
|
registerSuccessor(txn, nePath, nfPath);
|
|
|
|
txn.commit();
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* It is now safe to delete the lock files, since all future
|
|
|
|
lockers will see the successor; they will not create new lock
|
|
|
|
files with the same names as the old (unlinked) lock files. */
|
|
|
|
outputLocks.setDeletion(true);
|
2004-05-14 01:52:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::openLogFile()
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
|
|
|
/* Create a log file. */
|
2004-06-18 21:09:32 +03:00
|
|
|
Path logFileName = nixLogDir + "/" + baseNameOf(nePath);
|
|
|
|
fdLogFile = open(logFileName.c_str(),
|
2004-05-13 22:14:49 +03:00
|
|
|
O_CREAT | O_WRONLY | O_TRUNC, 0666);
|
2004-06-18 21:09:32 +03:00
|
|
|
if (fdLogFile == -1)
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError(format("creating log file `%1%'") % logFileName);
|
|
|
|
|
|
|
|
/* Create a pipe to get the output of the child. */
|
2004-06-18 21:09:32 +03:00
|
|
|
logPipe.create();
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::initChild()
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
2004-06-22 13:21:44 +03:00
|
|
|
commonChildInit(logPipe);
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
if (chdir(tmpDir.c_str()) == -1)
|
2004-06-25 13:21:44 +03:00
|
|
|
throw SysError(format("changing into `%1%'") % tmpDir);
|
2004-05-13 22:14:49 +03:00
|
|
|
|
|
|
|
/* When running a hook, dup the communication pipes. */
|
2004-06-18 21:09:32 +03:00
|
|
|
bool inHook = fromHook.writeSide.isOpen();
|
2004-05-13 22:14:49 +03:00
|
|
|
if (inHook) {
|
2004-06-18 21:09:32 +03:00
|
|
|
fromHook.readSide.close();
|
|
|
|
if (dup2(fromHook.writeSide, 3) == -1)
|
2004-06-25 13:21:44 +03:00
|
|
|
throw SysError("dupping from-hook write side");
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
toHook.writeSide.close();
|
|
|
|
if (dup2(toHook.readSide, 4) == -1)
|
2004-06-25 13:21:44 +03:00
|
|
|
throw SysError("dupping to-hook read side");
|
2004-05-13 22:14:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Close all other file descriptors. */
|
|
|
|
int maxFD = 0;
|
|
|
|
maxFD = sysconf(_SC_OPEN_MAX);
|
|
|
|
for (int fd = 0; fd < maxFD; ++fd)
|
|
|
|
if (fd != STDIN_FILENO && fd != STDOUT_FILENO && fd != STDERR_FILENO
|
|
|
|
&& (!inHook || (fd != 3 && fd != 4)))
|
|
|
|
close(fd); /* ignore result */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void NormalisationGoal::deleteTmpDir(bool force)
|
2004-05-13 22:14:49 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
if (tmpDir != "") {
|
|
|
|
if (keepFailed && !force)
|
2004-06-22 17:48:59 +03:00
|
|
|
printMsg(lvlError,
|
2004-06-18 21:09:32 +03:00
|
|
|
format("builder for `%1%' failed; keeping build directory `%2%'")
|
|
|
|
% nePath % tmpDir);
|
|
|
|
else
|
|
|
|
deletePath(tmpDir);
|
|
|
|
tmpDir = "";
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-29 12:41:50 +03:00
|
|
|
void NormalisationGoal::writeLog(int fd,
|
|
|
|
const unsigned char * buf, size_t count)
|
|
|
|
{
|
|
|
|
assert(fd == logPipe.readSide);
|
|
|
|
writeFull(fdLogFile, buf, count);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
string NormalisationGoal::name()
|
2004-06-22 17:48:59 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
return (format("normalisation of `%1%'") % nePath).str();
|
2004-06-22 17:48:59 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
class RealisationGoal : public Goal
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
private:
|
2004-06-28 13:42:57 +03:00
|
|
|
/* The path of the store expression. */
|
2004-06-18 21:09:32 +03:00
|
|
|
Path nePath;
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
/* The normal form. */
|
|
|
|
Path nfPath;
|
|
|
|
|
|
|
|
/* Whether we should try to delete a broken successor mapping. */
|
|
|
|
bool tryFallback;
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The store expression stored at nePath. */
|
|
|
|
StoreExpr expr;
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
typedef void (RealisationGoal::*GoalState)();
|
|
|
|
GoalState state;
|
|
|
|
|
|
|
|
public:
|
|
|
|
RealisationGoal(const Path & _nePath, Worker & _worker);
|
|
|
|
~RealisationGoal();
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void work();
|
|
|
|
|
|
|
|
/* The states. */
|
|
|
|
void init();
|
2004-06-28 13:42:57 +03:00
|
|
|
void isNormalised();
|
2004-06-18 21:09:32 +03:00
|
|
|
void haveStoreExpr();
|
|
|
|
void elemFinished();
|
2004-06-22 20:04:10 +03:00
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
void fallBack(const format & error);
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
string name();
|
2004-06-18 21:09:32 +03:00
|
|
|
};
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
RealisationGoal::RealisationGoal(const Path & _nePath, Worker & _worker)
|
|
|
|
: Goal(_worker)
|
|
|
|
{
|
|
|
|
nePath = _nePath;
|
2004-06-28 13:42:57 +03:00
|
|
|
tryFallback = ::tryFallback;
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &RealisationGoal::init;
|
|
|
|
}
|
2004-05-13 22:14:49 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
RealisationGoal::~RealisationGoal()
|
|
|
|
{
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void RealisationGoal::work()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
(this->*state)();
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void RealisationGoal::init()
|
|
|
|
{
|
2004-06-22 20:04:10 +03:00
|
|
|
trace("init");
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
if (querySuccessor(nePath, nfPath)) {
|
2004-06-28 16:51:24 +03:00
|
|
|
nrFailed = 0;
|
2004-06-28 13:42:57 +03:00
|
|
|
isNormalised();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* First normalise the expression (which is a no-op if the
|
|
|
|
expression is already a closure). */
|
|
|
|
addWaitee(worker.makeNormalisationGoal(nePath));
|
|
|
|
|
|
|
|
/* Since there is no successor right now, the normalisation goal
|
|
|
|
will perform an actual build. So there is no sense in trying a
|
|
|
|
fallback if the realisation of the closure fails (it can't
|
|
|
|
really fail). */
|
|
|
|
tryFallback = false;
|
|
|
|
|
|
|
|
state = &RealisationGoal::isNormalised;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void RealisationGoal::isNormalised()
|
|
|
|
{
|
|
|
|
trace("has been normalised");
|
|
|
|
|
2004-06-28 16:51:24 +03:00
|
|
|
if (nrFailed != 0) {
|
|
|
|
amDone(false);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
nfPath = queryNormalForm(nePath);
|
|
|
|
|
|
|
|
/* Now make sure that the store expression exists. If it doesn't,
|
|
|
|
it may be created through a substitute. */
|
|
|
|
addWaitee(worker.makeSubstitutionGoal(nfPath));
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &RealisationGoal::haveStoreExpr;
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void RealisationGoal::haveStoreExpr()
|
|
|
|
{
|
2004-06-22 20:04:10 +03:00
|
|
|
trace("loading store expression");
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
if (nrFailed != 0) {
|
2004-06-28 13:42:57 +03:00
|
|
|
fallBack(format("cannot realise closure `%1%' since that file is missing") % nfPath);
|
2004-06-25 13:21:44 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
assert(isValidPath(nfPath));
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Get the store expression. */
|
2004-06-28 13:42:57 +03:00
|
|
|
expr = storeExprFromPath(nfPath);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* If this is a normal form (i.e., a closure) we are also done. */
|
|
|
|
if (expr.type != StoreExpr::neClosure)
|
2004-06-28 13:42:57 +03:00
|
|
|
throw Error(format("expected closure in `%1%'") % nfPath);
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Each path in the closure should exist, or should be creatable
|
|
|
|
through a substitute. */
|
|
|
|
for (ClosureElems::const_iterator i = expr.closure.elems.begin();
|
|
|
|
i != expr.closure.elems.end(); ++i)
|
2004-06-25 18:36:09 +03:00
|
|
|
addWaitee(worker.makeSubstitutionGoal(i->first));
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
state = &RealisationGoal::elemFinished;
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void RealisationGoal::elemFinished()
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-22 20:04:10 +03:00
|
|
|
trace("all closure elements present");
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
if (nrFailed != 0) {
|
2004-06-28 13:42:57 +03:00
|
|
|
fallBack(
|
2004-06-25 13:21:44 +03:00
|
|
|
format("cannot realise closure `%1%': "
|
|
|
|
"%2% closure element(s) are not present "
|
|
|
|
"and could not be substituted")
|
2004-06-28 13:42:57 +03:00
|
|
|
% nfPath % nrFailed);
|
2004-06-25 13:21:44 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
amDone();
|
|
|
|
}
|
2003-08-22 23:12:44 +03:00
|
|
|
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
void RealisationGoal::fallBack(const format & error)
|
|
|
|
{
|
|
|
|
if (tryFallback && nePath != nfPath) {
|
|
|
|
printMsg(lvlError, format("%1%; trying to normalise derivation instead")
|
|
|
|
% error);
|
|
|
|
tryFallback = false;
|
|
|
|
unregisterSuccessor(nePath);
|
2004-08-30 14:51:36 +03:00
|
|
|
nrFailed = 0;
|
2004-06-28 13:42:57 +03:00
|
|
|
init();
|
|
|
|
} else {
|
|
|
|
printMsg(lvlError, format("%1%; maybe `--fallback' will help") % error);
|
|
|
|
amDone(false);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
string RealisationGoal::name()
|
2004-06-22 20:04:10 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
return (format("realisation of `%1%'") % nePath).str();
|
2004-06-22 20:04:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
2003-07-20 22:29:38 +03:00
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
class SubstitutionGoal : public Goal
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
/* The store path that should be realised through a substitute. */
|
|
|
|
Path storePath;
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
/* The remaining substitutes for this path. */
|
|
|
|
Substitutes subs;
|
|
|
|
|
|
|
|
/* The current substitute. */
|
|
|
|
Substitute sub;
|
|
|
|
|
|
|
|
/* Pipe for the substitute's standard output/error. */
|
|
|
|
Pipe logPipe;
|
|
|
|
|
|
|
|
/* The process ID of the builder. */
|
2004-06-22 12:51:44 +03:00
|
|
|
Pid pid;
|
2004-06-20 22:17:54 +03:00
|
|
|
|
2004-06-21 12:35:50 +03:00
|
|
|
/* Lock on the store path. */
|
2004-06-24 16:40:38 +03:00
|
|
|
shared_ptr<PathLocks> outputLock;
|
2004-06-21 12:35:50 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
typedef void (SubstitutionGoal::*GoalState)();
|
|
|
|
GoalState state;
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
public:
|
|
|
|
SubstitutionGoal(const Path & _nePath, Worker & _worker);
|
2004-06-25 18:36:09 +03:00
|
|
|
~SubstitutionGoal();
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 15:39:56 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void work();
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* The states. */
|
|
|
|
void init();
|
2004-06-20 22:17:54 +03:00
|
|
|
void tryNext();
|
2004-06-22 12:00:31 +03:00
|
|
|
void tryToRun();
|
2004-06-20 22:17:54 +03:00
|
|
|
void finished();
|
2004-06-22 20:04:10 +03:00
|
|
|
|
2004-06-29 12:41:50 +03:00
|
|
|
/* Callback used by the worker to write to the log. */
|
|
|
|
void writeLog(int fd, const unsigned char * buf, size_t count);
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
string name();
|
2004-06-18 21:09:32 +03:00
|
|
|
};
|
2003-08-20 14:30:45 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
SubstitutionGoal::SubstitutionGoal(const Path & _storePath, Worker & _worker)
|
|
|
|
: Goal(_worker)
|
|
|
|
{
|
|
|
|
storePath = _storePath;
|
|
|
|
state = &SubstitutionGoal::init;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
SubstitutionGoal::~SubstitutionGoal()
|
|
|
|
{
|
|
|
|
if (pid != -1) worker.childTerminated(pid);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void SubstitutionGoal::work()
|
|
|
|
{
|
|
|
|
(this->*state)();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::init()
|
|
|
|
{
|
2004-06-22 20:04:10 +03:00
|
|
|
trace("init");
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* If the path already exists we're done. */
|
|
|
|
if (isValidPath(storePath)) {
|
|
|
|
amDone();
|
|
|
|
return;
|
2003-08-20 14:30:45 +03:00
|
|
|
}
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
/* Otherwise, get the substitutes. */
|
|
|
|
subs = querySubstitutes(storePath);
|
|
|
|
|
|
|
|
/* Try the first one. */
|
|
|
|
tryNext();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::tryNext()
|
|
|
|
{
|
2004-06-22 20:04:10 +03:00
|
|
|
trace("trying next substitute");
|
2004-06-20 22:17:54 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
if (subs.size() == 0) {
|
|
|
|
/* None left. Terminate this goal and let someone else deal
|
|
|
|
with it. */
|
|
|
|
printMsg(lvlError,
|
|
|
|
format("path `%1%' is required, but it has no (remaining) substitutes")
|
2004-06-20 22:17:54 +03:00
|
|
|
% storePath);
|
2004-06-25 13:21:44 +03:00
|
|
|
amDone(false);
|
|
|
|
return;
|
|
|
|
}
|
2004-06-20 22:17:54 +03:00
|
|
|
sub = subs.front();
|
|
|
|
subs.pop_front();
|
|
|
|
|
2004-12-20 15:43:32 +02:00
|
|
|
/* Wait until we can run the substitute program. */
|
2004-06-22 12:00:31 +03:00
|
|
|
state = &SubstitutionGoal::tryToRun;
|
|
|
|
worker.waitForBuildSlot(shared_from_this());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::tryToRun()
|
|
|
|
{
|
2004-06-22 20:04:10 +03:00
|
|
|
trace("trying to run");
|
|
|
|
|
2004-06-22 12:00:31 +03:00
|
|
|
/* Make sure that we are allowed to start a build. */
|
|
|
|
if (!worker.canBuildMore()) {
|
|
|
|
worker.waitForBuildSlot(shared_from_this());
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-06-21 12:35:50 +03:00
|
|
|
/* Acquire a lock on the output path. */
|
|
|
|
PathSet lockPath;
|
|
|
|
lockPath.insert(storePath);
|
2004-06-24 16:40:38 +03:00
|
|
|
outputLock = shared_ptr<PathLocks>(new PathLocks);
|
|
|
|
outputLock->lockPaths(lockPath);
|
2004-06-21 12:35:50 +03:00
|
|
|
|
|
|
|
/* Check again whether the path is invalid. */
|
|
|
|
if (isValidPath(storePath)) {
|
|
|
|
debug(format("store path `%1%' has become valid") % storePath);
|
2004-06-24 16:40:38 +03:00
|
|
|
outputLock->setDeletion(true);
|
2004-06-21 12:35:50 +03:00
|
|
|
amDone();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-06-24 16:40:38 +03:00
|
|
|
printMsg(lvlInfo,
|
|
|
|
format("substituting path `%1%' using substituter `%2%'")
|
2004-12-20 15:43:32 +02:00
|
|
|
% storePath % sub.program);
|
2004-06-22 20:04:10 +03:00
|
|
|
|
|
|
|
logPipe.create();
|
|
|
|
|
2004-06-21 12:35:50 +03:00
|
|
|
/* Remove the (stale) output path if it exists. */
|
|
|
|
if (pathExists(storePath))
|
|
|
|
deletePath(storePath);
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
/* Fork the substitute program. */
|
2004-06-22 12:51:44 +03:00
|
|
|
pid = fork();
|
|
|
|
switch (pid) {
|
2004-06-20 22:17:54 +03:00
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
try { /* child */
|
|
|
|
|
|
|
|
logPipe.readSide.close();
|
|
|
|
|
|
|
|
/* !!! close other handles */
|
|
|
|
|
2004-06-22 13:21:44 +03:00
|
|
|
commonChildInit(logPipe);
|
2004-06-20 22:17:54 +03:00
|
|
|
|
2004-06-22 13:21:44 +03:00
|
|
|
/* Fill in the arguments. */
|
|
|
|
Strings args(sub.args);
|
|
|
|
args.push_front(storePath);
|
2004-12-20 15:43:32 +02:00
|
|
|
args.push_front(baseNameOf(sub.program));
|
2004-06-22 13:21:44 +03:00
|
|
|
const char * * argArr = strings2CharPtrs(args);
|
2004-06-20 22:17:54 +03:00
|
|
|
|
2004-12-20 15:43:32 +02:00
|
|
|
execv(sub.program.c_str(), (char * *) argArr);
|
2004-06-20 22:17:54 +03:00
|
|
|
|
2004-12-20 15:43:32 +02:00
|
|
|
throw SysError(format("executing `%1%'") % sub.program);
|
2004-06-20 22:17:54 +03:00
|
|
|
|
|
|
|
} catch (exception & e) {
|
|
|
|
cerr << format("substitute error: %1%\n") % e.what();
|
|
|
|
}
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* parent */
|
2004-06-22 12:51:44 +03:00
|
|
|
pid.setSeparatePG(true);
|
2004-06-20 22:17:54 +03:00
|
|
|
logPipe.writeSide.close();
|
|
|
|
worker.childStarted(shared_from_this(),
|
2004-06-22 12:00:31 +03:00
|
|
|
pid, logPipe.readSide, true);
|
2004-06-20 22:17:54 +03:00
|
|
|
|
|
|
|
state = &SubstitutionGoal::finished;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SubstitutionGoal::finished()
|
|
|
|
{
|
2004-06-22 20:04:10 +03:00
|
|
|
trace("substitute finished");
|
2004-06-20 22:17:54 +03:00
|
|
|
|
|
|
|
/* Since we got an EOF on the logger pipe, the substitute is
|
|
|
|
presumed to have terminated. */
|
|
|
|
/* !!! this could block! */
|
2004-06-22 12:51:44 +03:00
|
|
|
pid_t savedPid = pid;
|
|
|
|
int status = pid.wait(true);
|
2004-06-20 22:17:54 +03:00
|
|
|
|
|
|
|
/* So the child is gone now. */
|
2004-06-22 12:51:44 +03:00
|
|
|
worker.childTerminated(savedPid);
|
2004-06-20 22:17:54 +03:00
|
|
|
|
|
|
|
/* Close the read side of the logger pipe. */
|
|
|
|
logPipe.readSide.close();
|
|
|
|
|
|
|
|
debug(format("substitute for `%1%' finished") % storePath);
|
|
|
|
|
2004-06-24 16:40:38 +03:00
|
|
|
/* Check the exit status and the build result. */
|
|
|
|
try {
|
|
|
|
|
|
|
|
if (!statusOk(status))
|
|
|
|
throw SubstError(format("builder for `%1%' %2%")
|
|
|
|
% storePath % statusToString(status));
|
|
|
|
|
|
|
|
if (!pathExists(storePath))
|
|
|
|
throw SubstError(
|
|
|
|
format("substitute did not produce path `%1%'")
|
|
|
|
% storePath);
|
|
|
|
|
|
|
|
} catch (SubstError & e) {
|
2004-06-20 22:17:54 +03:00
|
|
|
|
2004-06-24 16:40:38 +03:00
|
|
|
printMsg(lvlInfo,
|
|
|
|
format("substitution of path `%1%' using substituter `%2%' failed: %3%")
|
2004-12-20 15:43:32 +02:00
|
|
|
% storePath % sub.program % e.msg());
|
2004-06-24 16:40:38 +03:00
|
|
|
|
|
|
|
/* Try the next substitute. */
|
|
|
|
state = &SubstitutionGoal::tryNext;
|
|
|
|
worker.wakeUp(shared_from_this());
|
|
|
|
return;
|
|
|
|
}
|
2004-06-20 22:17:54 +03:00
|
|
|
|
2004-11-29 17:09:29 +02:00
|
|
|
canonicalisePathMetaData(storePath);
|
2004-09-22 15:15:04 +03:00
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
Transaction txn;
|
|
|
|
createStoreTransaction(txn);
|
|
|
|
registerValidPath(txn, storePath);
|
|
|
|
txn.commit();
|
|
|
|
|
2004-06-24 16:40:38 +03:00
|
|
|
outputLock->setDeletion(true);
|
2004-06-21 12:35:50 +03:00
|
|
|
|
2004-06-24 16:40:38 +03:00
|
|
|
printMsg(lvlChatty,
|
|
|
|
format("substitution of path `%1%' succeeded") % storePath);
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
amDone();
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-29 12:41:50 +03:00
|
|
|
void SubstitutionGoal::writeLog(int fd,
|
|
|
|
const unsigned char * buf, size_t count)
|
|
|
|
{
|
|
|
|
assert(fd == logPipe.readSide);
|
|
|
|
/* Don't write substitution output to a log file for now. We
|
|
|
|
probably should, though. */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
string SubstitutionGoal::name()
|
2004-06-22 20:04:10 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
return (format("substitution of `%1%'") % storePath).str();
|
2004-06-22 20:04:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-06-25 13:21:44 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
/* A fake goal used to receive notification of success or failure of
|
|
|
|
other goals. */
|
|
|
|
class PseudoGoal : public Goal
|
|
|
|
{
|
|
|
|
private:
|
|
|
|
bool success;
|
|
|
|
|
|
|
|
public:
|
|
|
|
PseudoGoal(Worker & _worker) : Goal(_worker)
|
|
|
|
{
|
|
|
|
success = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void work()
|
|
|
|
{
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
void waiteeDone(GoalPtr waitee, bool success)
|
2004-06-25 13:21:44 +03:00
|
|
|
{
|
|
|
|
if (!success) this->success = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool isOkay()
|
|
|
|
{
|
|
|
|
return success;
|
|
|
|
}
|
2004-06-25 18:36:09 +03:00
|
|
|
|
|
|
|
string name()
|
|
|
|
{
|
|
|
|
return "pseudo-goal";
|
|
|
|
}
|
2004-06-25 13:21:44 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
static bool working = false;
|
|
|
|
|
|
|
|
|
|
|
|
Worker::Worker()
|
|
|
|
{
|
|
|
|
/* Debugging: prevent recursive workers. */
|
|
|
|
if (working) abort();
|
|
|
|
working = true;
|
2004-06-21 11:51:55 +03:00
|
|
|
nrChildren = 0;
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Worker::~Worker()
|
|
|
|
{
|
|
|
|
working = false;
|
2004-06-25 18:36:09 +03:00
|
|
|
|
|
|
|
/* Explicitly get rid of all strong pointers now. After this all
|
|
|
|
goals that refer to this worker should be gone. (Otherwise we
|
|
|
|
are in trouble, since goals may call childTerminated() etc. in
|
|
|
|
their destructors). */
|
|
|
|
topGoals.clear();
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
template<class T>
|
2004-06-25 18:36:09 +03:00
|
|
|
static GoalPtr addGoal(const Path & path,
|
|
|
|
Worker & worker, WeakGoalMap & goalMap)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
GoalPtr goal = goalMap[path].lock();
|
2004-06-18 21:09:32 +03:00
|
|
|
if (!goal) {
|
|
|
|
goal = GoalPtr(new T(path, worker));
|
|
|
|
goalMap[path] = goal;
|
|
|
|
worker.wakeUp(goal);
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
2004-06-25 18:36:09 +03:00
|
|
|
return goal;
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2003-08-01 18:41:47 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
GoalPtr Worker::makeNormalisationGoal(const Path & nePath)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
return addGoal<NormalisationGoal>(nePath, *this, normalisationGoals);
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
2003-08-01 18:41:47 +03:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
GoalPtr Worker::makeRealisationGoal(const Path & nePath)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
return addGoal<RealisationGoal>(nePath, *this, realisationGoals);
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
GoalPtr Worker::makeSubstitutionGoal(const Path & storePath)
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
return addGoal<SubstitutionGoal>(storePath, *this, substitutionGoals);
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
static void removeGoal(GoalPtr goal, WeakGoalMap & goalMap)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
/* !!! For now we just let dead goals accumulate. We should
|
|
|
|
probably periodically sweep the goalMap to remove dead
|
|
|
|
goals. */
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
void Worker::removeGoal(GoalPtr goal)
|
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
topGoals.erase(goal);
|
|
|
|
::removeGoal(goal, normalisationGoals);
|
|
|
|
::removeGoal(goal, realisationGoals);
|
|
|
|
::removeGoal(goal, substitutionGoals);
|
2004-05-11 21:05:44 +03:00
|
|
|
}
|
2003-11-21 18:05:19 +02:00
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::wakeUp(GoalPtr goal)
|
2004-05-11 21:05:44 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
goal->trace("woken up");
|
2004-06-18 21:09:32 +03:00
|
|
|
awake.insert(goal);
|
|
|
|
}
|
2004-05-11 21:05:44 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
bool Worker::canBuildMore()
|
|
|
|
{
|
2004-06-20 00:45:04 +03:00
|
|
|
return nrChildren < maxBuildJobs;
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-20 00:45:04 +03:00
|
|
|
void Worker::childStarted(GoalPtr goal,
|
|
|
|
pid_t pid, int fdOutput, bool inBuildSlot)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2004-06-20 00:45:04 +03:00
|
|
|
Child child;
|
|
|
|
child.goal = goal;
|
|
|
|
child.fdOutput = fdOutput;
|
|
|
|
child.inBuildSlot = inBuildSlot;
|
|
|
|
children[pid] = child;
|
|
|
|
if (inBuildSlot) nrChildren++;
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
|
2004-07-01 19:24:35 +03:00
|
|
|
void Worker::childTerminated(pid_t pid, bool wakeSleepers)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-20 00:45:04 +03:00
|
|
|
Children::iterator i = children.find(pid);
|
|
|
|
assert(i != children.end());
|
|
|
|
|
|
|
|
if (i->second.inBuildSlot) {
|
|
|
|
assert(nrChildren > 0);
|
|
|
|
nrChildren--;
|
|
|
|
}
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
children.erase(pid);
|
|
|
|
|
2004-07-01 19:24:35 +03:00
|
|
|
if (wakeSleepers) {
|
|
|
|
|
|
|
|
/* Wake up goals waiting for a build slot. */
|
|
|
|
for (WeakGoals::iterator i = wantingToBuild.begin();
|
|
|
|
i != wantingToBuild.end(); ++i)
|
|
|
|
{
|
|
|
|
GoalPtr goal = i->lock();
|
|
|
|
if (goal) wakeUp(goal);
|
|
|
|
}
|
|
|
|
|
|
|
|
wantingToBuild.clear();
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
}
|
2003-10-16 19:29:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-07-01 19:24:35 +03:00
|
|
|
void Worker::waitForBuildSlot(GoalPtr goal, bool reallyWait)
|
2003-10-16 19:29:57 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
debug("wait for build slot");
|
2004-07-01 19:24:35 +03:00
|
|
|
if (reallyWait && children.size() == 0)
|
|
|
|
throw Error("waiting for a build slot, yet there are no children - "
|
|
|
|
"maybe the build hook gave an inappropriate `postpone' reply?");
|
|
|
|
if (!reallyWait && canBuildMore())
|
2004-06-18 21:09:32 +03:00
|
|
|
wakeUp(goal); /* we can do it right away */
|
|
|
|
else
|
|
|
|
wantingToBuild.insert(goal);
|
|
|
|
}
|
2004-02-13 12:45:09 +02:00
|
|
|
|
2003-10-16 19:29:57 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
bool Worker::run(GoalPtr topGoal)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-25 18:36:09 +03:00
|
|
|
assert(topGoal);
|
|
|
|
|
|
|
|
/* Wrap the specified top-level goal in a pseudo-goal so that we
|
|
|
|
can check whether it succeeded. */
|
|
|
|
shared_ptr<PseudoGoal> pseudo(new PseudoGoal(*this));
|
|
|
|
pseudo->addWaitee(topGoal);
|
|
|
|
|
|
|
|
/* For now, we have only one top-level goal. */
|
|
|
|
topGoals.insert(topGoal);
|
|
|
|
|
2004-06-22 17:48:59 +03:00
|
|
|
startNest(nest, lvlDebug, format("entered goal loop"));
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2004-06-18 21:09:32 +03:00
|
|
|
|
|
|
|
/* Call every wake goal. */
|
|
|
|
while (!awake.empty()) {
|
2004-06-25 18:36:09 +03:00
|
|
|
WeakGoals awake2(awake);
|
2004-06-18 21:09:32 +03:00
|
|
|
awake.clear();
|
2004-06-25 18:36:09 +03:00
|
|
|
for (WeakGoals::iterator i = awake2.begin(); i != awake2.end(); ++i) {
|
2004-06-18 21:09:32 +03:00
|
|
|
checkInterrupt();
|
2004-06-25 18:36:09 +03:00
|
|
|
GoalPtr goal = i->lock();
|
|
|
|
if (goal) goal->work();
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
2003-10-16 19:29:57 +03:00
|
|
|
}
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
if (topGoals.empty()) break;
|
2003-10-16 19:29:57 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* !!! not when we're polling */
|
|
|
|
assert(!children.empty());
|
|
|
|
|
|
|
|
/* Wait for input. */
|
|
|
|
waitForInput();
|
|
|
|
}
|
2003-10-16 19:29:57 +03:00
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
/* If --keep-going is not set, it's possible that the main goal
|
|
|
|
exited while some of its subgoals were still active. But if
|
|
|
|
--keep-going *is* set, then they must all be finished now. */
|
|
|
|
assert(!keepGoing || awake.empty());
|
|
|
|
assert(!keepGoing || wantingToBuild.empty());
|
|
|
|
assert(!keepGoing || children.empty());
|
|
|
|
|
|
|
|
return pseudo->isOkay();
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void Worker::waitForInput()
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
printMsg(lvlVomit, "waiting for children");
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Process log output from the children. We also use this to
|
|
|
|
detect child termination: if we get EOF on the logger pipe of a
|
|
|
|
build, we assume that the builder has terminated. */
|
|
|
|
|
|
|
|
/* Use select() to wait for the input side of any logger pipe to
|
|
|
|
become `available'. Note that `available' (i.e., non-blocking)
|
|
|
|
includes EOF. */
|
|
|
|
fd_set fds;
|
|
|
|
FD_ZERO(&fds);
|
|
|
|
int fdMax = 0;
|
|
|
|
for (Children::iterator i = children.begin();
|
|
|
|
i != children.end(); ++i)
|
|
|
|
{
|
2004-06-20 00:45:04 +03:00
|
|
|
int fd = i->second.fdOutput;
|
2004-06-18 21:09:32 +03:00
|
|
|
FD_SET(fd, &fds);
|
|
|
|
if (fd >= fdMax) fdMax = fd + 1;
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
if (select(fdMax, &fds, 0, 0, 0) == -1) {
|
|
|
|
if (errno == EINTR) return;
|
|
|
|
throw SysError("waiting for input");
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
/* Process all available file descriptors. */
|
|
|
|
for (Children::iterator i = children.begin();
|
|
|
|
i != children.end(); ++i)
|
|
|
|
{
|
|
|
|
checkInterrupt();
|
2004-06-25 18:36:09 +03:00
|
|
|
GoalPtr goal = i->second.goal.lock();
|
|
|
|
assert(goal);
|
2004-06-20 00:45:04 +03:00
|
|
|
int fd = i->second.fdOutput;
|
2004-06-18 21:09:32 +03:00
|
|
|
if (FD_ISSET(fd, &fds)) {
|
|
|
|
unsigned char buffer[4096];
|
|
|
|
ssize_t rd = read(fd, buffer, sizeof(buffer));
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
2004-06-25 18:36:09 +03:00
|
|
|
throw SysError(format("reading from %1%")
|
2004-06-18 21:09:32 +03:00
|
|
|
% goal->name());
|
|
|
|
} else if (rd == 0) {
|
2004-06-25 18:36:09 +03:00
|
|
|
debug(format("%1%: got EOF") % goal->name());
|
2004-06-18 21:09:32 +03:00
|
|
|
wakeUp(goal);
|
|
|
|
} else {
|
2004-06-25 18:36:09 +03:00
|
|
|
printMsg(lvlVomit, format("%1%: read %2% bytes")
|
|
|
|
% goal->name() % rd);
|
2004-06-29 12:41:50 +03:00
|
|
|
goal->writeLog(fd, buffer, (size_t) rd);
|
2004-06-18 21:09:32 +03:00
|
|
|
if (verbosity >= buildVerbosity)
|
|
|
|
writeFull(STDERR_FILENO, buffer, rd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
Path normaliseStoreExpr(const Path & nePath)
|
2003-07-29 13:43:12 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
startNest(nest, lvlDebug, format("normalising `%1%'") % nePath);
|
2003-08-25 17:56:11 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
Worker worker;
|
2004-06-25 18:36:09 +03:00
|
|
|
if (!worker.run(worker.makeNormalisationGoal(nePath)))
|
2004-06-25 13:21:44 +03:00
|
|
|
throw Error(format("normalisation of store expression `%1%' failed") % nePath);
|
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
return queryNormalForm(nePath);
|
2004-06-18 21:09:32 +03:00
|
|
|
}
|
2003-07-29 13:43:12 +03:00
|
|
|
|
2003-07-29 17:28:17 +03:00
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
Path realiseStoreExpr(const Path & nePath)
|
2004-06-18 21:09:32 +03:00
|
|
|
{
|
2004-06-28 13:42:57 +03:00
|
|
|
startNest(nest, lvlDebug, format("realising `%1%'") % nePath);
|
2003-07-29 17:28:17 +03:00
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
Worker worker;
|
2004-06-25 18:36:09 +03:00
|
|
|
if (!worker.run(worker.makeRealisationGoal(nePath)))
|
2004-07-01 19:24:35 +03:00
|
|
|
throw Error(format("realisation of store expression `%1%' failed") % nePath);
|
2004-06-28 13:42:57 +03:00
|
|
|
|
|
|
|
return queryNormalForm(nePath);
|
2003-07-29 13:43:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-18 21:09:32 +03:00
|
|
|
void ensurePath(const Path & path)
|
2003-07-20 22:29:38 +03:00
|
|
|
{
|
2004-06-18 21:09:32 +03:00
|
|
|
/* If the path is already valid, we're done. */
|
|
|
|
if (isValidPath(path)) return;
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
Worker worker;
|
2004-06-25 18:36:09 +03:00
|
|
|
if (!worker.run(worker.makeSubstitutionGoal(path)))
|
2004-06-25 13:21:44 +03:00
|
|
|
throw Error(format("path `%1%' does not exist and cannot be created") % path);
|
2003-07-20 22:29:38 +03:00
|
|
|
}
|