2007-03-30 16:24:35 +03:00
|
|
|
#include "config.h"
|
|
|
|
|
2006-09-05 00:06:23 +03:00
|
|
|
#include "shared.hh"
|
|
|
|
#include "globals.hh"
|
2006-11-30 19:43:04 +02:00
|
|
|
#include "store-api.hh"
|
2006-09-05 00:06:23 +03:00
|
|
|
#include "util.hh"
|
2008-08-04 16:44:46 +03:00
|
|
|
#include "misc.hh"
|
2006-09-05 00:06:23 +03:00
|
|
|
|
2003-07-04 18:42:03 +03:00
|
|
|
#include <iostream>
|
2003-07-24 11:53:43 +03:00
|
|
|
#include <cctype>
|
2007-05-01 18:16:17 +03:00
|
|
|
#include <exception>
|
2003-07-04 18:42:03 +03:00
|
|
|
|
2004-03-27 19:58:04 +02:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2003-07-04 18:42:03 +03:00
|
|
|
#include <aterm2.h>
|
|
|
|
|
|
|
|
|
2006-09-05 00:06:23 +03:00
|
|
|
namespace nix {
|
2003-07-04 18:42:03 +03:00
|
|
|
|
|
|
|
|
2004-05-11 21:05:44 +03:00
|
|
|
volatile sig_atomic_t blockInt = 0;
|
|
|
|
|
|
|
|
|
2006-03-11 00:27:26 +02:00
|
|
|
static void sigintHandler(int signo)
|
2004-01-15 22:23:55 +02:00
|
|
|
{
|
2004-05-11 21:05:44 +03:00
|
|
|
if (!blockInt) {
|
|
|
|
_isInterrupted = 1;
|
|
|
|
blockInt = 1;
|
|
|
|
}
|
2004-01-15 22:23:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-02-01 14:36:25 +02:00
|
|
|
Path makeRootName(const Path & gcRoot, int & counter)
|
|
|
|
{
|
|
|
|
counter++;
|
|
|
|
if (counter == 1)
|
|
|
|
return gcRoot;
|
|
|
|
else
|
|
|
|
return (format("%1%-%2%") % gcRoot % counter).str();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void printGCWarning()
|
|
|
|
{
|
2006-08-29 18:40:49 +03:00
|
|
|
static bool haveWarned = false;
|
|
|
|
warnOnce(haveWarned,
|
2006-12-05 02:34:42 +02:00
|
|
|
"you did not specify `--add-root'; "
|
2006-08-29 18:40:49 +03:00
|
|
|
"the result might be removed by the garbage collector");
|
2005-02-01 14:36:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-08-04 16:44:46 +03:00
|
|
|
void printMissing(const PathSet & paths)
|
|
|
|
{
|
|
|
|
unsigned long long downloadSize;
|
|
|
|
PathSet willBuild, willSubstitute, unknown;
|
|
|
|
queryMissing(paths, willBuild, willSubstitute, unknown, downloadSize);
|
|
|
|
|
|
|
|
if (!willBuild.empty()) {
|
|
|
|
printMsg(lvlInfo, format("the following derivations will be built:"));
|
|
|
|
foreach (PathSet::iterator, i, willBuild)
|
|
|
|
printMsg(lvlInfo, format(" %1%") % *i);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!willSubstitute.empty()) {
|
|
|
|
printMsg(lvlInfo, format("the following paths will be downloaded/copied (%.2f MiB):") %
|
|
|
|
(downloadSize / (1024.0 * 1024.0)));
|
|
|
|
foreach (PathSet::iterator, i, willSubstitute)
|
|
|
|
printMsg(lvlInfo, format(" %1%") % *i);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!unknown.empty()) {
|
|
|
|
printMsg(lvlInfo, format("don't know how to build the following paths%1%:")
|
|
|
|
% (readOnlyMode ? " (may be caused by read-only store access)" : ""));
|
|
|
|
foreach (PathSet::iterator, i, unknown)
|
|
|
|
printMsg(lvlInfo, format(" %1%") % *i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-03-11 00:27:26 +02:00
|
|
|
static void setLogType(string lt)
|
2004-03-22 22:53:49 +02:00
|
|
|
{
|
|
|
|
if (lt == "pretty") logType = ltPretty;
|
|
|
|
else if (lt == "escapes") logType = ltEscapes;
|
|
|
|
else if (lt == "flat") logType = ltFlat;
|
|
|
|
else throw UsageError("unknown log type");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-19 18:39:47 +02:00
|
|
|
void initDerivationsHelpers();
|
2004-10-29 14:22:49 +03:00
|
|
|
|
|
|
|
|
2007-05-01 18:16:17 +03:00
|
|
|
static void closeStore()
|
|
|
|
{
|
|
|
|
try {
|
|
|
|
throw;
|
|
|
|
} catch (std::exception & e) {
|
|
|
|
printMsg(lvlError,
|
|
|
|
format("FATAL: unexpected exception (closing store and aborting): %1%") % e.what());
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
store.reset((StoreAPI *) 0);
|
|
|
|
} catch (...) {
|
|
|
|
ignoreException();
|
|
|
|
}
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-06-14 19:03:02 +03:00
|
|
|
RemoveTempRoots::~RemoveTempRoots()
|
|
|
|
{
|
|
|
|
removeTempRoots();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-06-30 16:28:29 +03:00
|
|
|
static bool showTrace = false;
|
|
|
|
|
|
|
|
|
2003-07-04 18:42:03 +03:00
|
|
|
/* Initialize and reorder arguments, then call the actual argument
|
|
|
|
processor. */
|
|
|
|
static void initAndRun(int argc, char * * argv)
|
|
|
|
{
|
|
|
|
/* Setup Nix paths. */
|
2005-01-28 15:19:16 +02:00
|
|
|
nixStore = canonPath(getEnv("NIX_STORE_DIR", getEnv("NIX_STORE", NIX_STORE_DIR)));
|
2005-01-14 15:51:38 +02:00
|
|
|
nixDataDir = canonPath(getEnv("NIX_DATA_DIR", NIX_DATA_DIR));
|
|
|
|
nixLogDir = canonPath(getEnv("NIX_LOG_DIR", NIX_LOG_DIR));
|
|
|
|
nixStateDir = canonPath(getEnv("NIX_STATE_DIR", NIX_STATE_DIR));
|
2004-05-04 15:15:30 +03:00
|
|
|
nixDBPath = getEnv("NIX_DB_DIR", nixStateDir + "/db");
|
2005-02-02 00:07:48 +02:00
|
|
|
nixConfDir = canonPath(getEnv("NIX_CONF_DIR", NIX_CONF_DIR));
|
2006-07-20 16:21:37 +03:00
|
|
|
nixLibexecDir = canonPath(getEnv("NIX_LIBEXEC_DIR", NIX_LIBEXEC_DIR));
|
2006-12-04 15:09:16 +02:00
|
|
|
nixBinDir = canonPath(getEnv("NIX_BIN_DIR", NIX_BIN_DIR));
|
2004-03-27 19:58:04 +02:00
|
|
|
|
2007-08-12 03:29:28 +03:00
|
|
|
string subs = getEnv("NIX_SUBSTITUTERS", "default");
|
2008-07-18 16:05:10 +03:00
|
|
|
if (subs == "default") {
|
|
|
|
substituters.push_back(nixLibexecDir + "/nix/substituters/copy-from-other-stores.pl");
|
|
|
|
substituters.push_back(nixLibexecDir + "/nix/substituters/download-using-manifests.pl");
|
|
|
|
} else
|
2007-08-12 03:29:28 +03:00
|
|
|
substituters = tokenizeString(subs, ":");
|
|
|
|
|
2006-08-10 23:19:13 +03:00
|
|
|
/* Get some settings from the configuration file. */
|
2006-07-06 18:30:37 +03:00
|
|
|
thisSystem = querySetting("system", SYSTEM);
|
2006-12-08 17:44:00 +02:00
|
|
|
maxBuildJobs = queryIntSetting("build-max-jobs", 1);
|
|
|
|
maxSilentTime = queryIntSetting("build-max-silent-time", 0);
|
2006-07-06 18:30:37 +03:00
|
|
|
|
2004-01-15 22:23:55 +02:00
|
|
|
/* Catch SIGINT. */
|
2010-01-12 14:22:38 +02:00
|
|
|
struct sigaction act;
|
2004-01-15 22:23:55 +02:00
|
|
|
act.sa_handler = sigintHandler;
|
|
|
|
sigfillset(&act.sa_mask);
|
|
|
|
act.sa_flags = 0;
|
2010-01-12 14:22:38 +02:00
|
|
|
if (sigaction(SIGINT, &act, 0))
|
2004-01-15 22:23:55 +02:00
|
|
|
throw SysError("installing handler for SIGINT");
|
2010-01-12 14:22:38 +02:00
|
|
|
if (sigaction(SIGTERM, &act, 0))
|
2005-11-04 17:34:09 +02:00
|
|
|
throw SysError("installing handler for SIGTERM");
|
2010-01-12 14:22:38 +02:00
|
|
|
if (sigaction(SIGHUP, &act, 0))
|
2005-11-04 17:34:09 +02:00
|
|
|
throw SysError("installing handler for SIGHUP");
|
2004-01-15 22:23:55 +02:00
|
|
|
|
2004-05-13 22:14:49 +03:00
|
|
|
/* Ignore SIGPIPE. */
|
|
|
|
act.sa_handler = SIG_IGN;
|
|
|
|
act.sa_flags = 0;
|
2010-01-12 14:22:38 +02:00
|
|
|
if (sigaction(SIGPIPE, &act, 0))
|
2004-05-13 22:14:49 +03:00
|
|
|
throw SysError("ignoring SIGPIPE");
|
|
|
|
|
2010-01-12 14:22:38 +02:00
|
|
|
/* Reset SIGCHLD to its default. */
|
|
|
|
act.sa_handler = SIG_DFL;
|
|
|
|
act.sa_flags = 0;
|
|
|
|
if (sigaction(SIGCHLD, &act, 0))
|
|
|
|
throw SysError("resetting SIGCHLD");
|
|
|
|
|
2004-09-09 17:16:02 +03:00
|
|
|
/* There is no privacy in the Nix system ;-) At least not for
|
|
|
|
now. In particular, store objects should be readable by
|
|
|
|
everybody. This prevents nasty surprises when using a shared
|
|
|
|
store (with the setuid() hack). */
|
|
|
|
umask(0022);
|
|
|
|
|
2004-03-22 22:53:49 +02:00
|
|
|
/* Process the NIX_LOG_TYPE environment variable. */
|
2004-05-04 15:15:30 +03:00
|
|
|
string lt = getEnv("NIX_LOG_TYPE");
|
|
|
|
if (lt != "") setLogType(lt);
|
2004-03-22 22:53:49 +02:00
|
|
|
|
2004-10-29 14:22:49 +03:00
|
|
|
/* ATerm stuff. !!! find a better place to put this */
|
2005-01-19 18:39:47 +02:00
|
|
|
initDerivationsHelpers();
|
2004-10-29 14:22:49 +03:00
|
|
|
|
2003-07-04 18:42:03 +03:00
|
|
|
/* Put the arguments in a vector. */
|
2003-12-01 17:55:05 +02:00
|
|
|
Strings args, remaining;
|
2003-07-04 18:42:03 +03:00
|
|
|
while (argc--) args.push_back(*argv++);
|
|
|
|
args.erase(args.begin());
|
|
|
|
|
2003-11-03 20:21:53 +02:00
|
|
|
/* Expand compound dash options (i.e., `-qlf' -> `-q -l -f'), and
|
|
|
|
ignore options for the ATerm library. */
|
2003-12-01 17:55:05 +02:00
|
|
|
for (Strings::iterator i = args.begin(); i != args.end(); ++i) {
|
|
|
|
string arg = *i;
|
|
|
|
if (string(arg, 0, 4) == "-at-") ;
|
2009-11-24 14:26:25 +02:00
|
|
|
else if (arg.length() > 2 && arg[0] == '-' && arg[1] != '-' && !isdigit(arg[1])) {
|
2003-12-01 17:55:05 +02:00
|
|
|
for (unsigned int j = 1; j < arg.length(); j++)
|
|
|
|
if (isalpha(arg[j]))
|
|
|
|
remaining.push_back((string) "-" + arg[j]);
|
2003-07-24 11:53:43 +03:00
|
|
|
else {
|
2003-12-01 17:55:05 +02:00
|
|
|
remaining.push_back(string(arg, j));
|
2003-07-24 11:53:43 +03:00
|
|
|
break;
|
|
|
|
}
|
2003-12-01 17:55:05 +02:00
|
|
|
} else remaining.push_back(arg);
|
2003-07-04 18:42:03 +03:00
|
|
|
}
|
2003-12-01 17:55:05 +02:00
|
|
|
args = remaining;
|
|
|
|
remaining.clear();
|
2003-07-04 18:42:03 +03:00
|
|
|
|
2003-12-01 17:55:05 +02:00
|
|
|
/* Process default options. */
|
|
|
|
for (Strings::iterator i = args.begin(); i != args.end(); ++i) {
|
|
|
|
string arg = *i;
|
|
|
|
if (arg == "--verbose" || arg == "-v")
|
|
|
|
verbosity = (Verbosity) ((int) verbosity + 1);
|
2004-03-22 22:53:49 +02:00
|
|
|
else if (arg == "--log-type") {
|
|
|
|
++i;
|
|
|
|
if (i == args.end()) throw UsageError("`--log-type' requires an argument");
|
|
|
|
setLogType(*i);
|
2004-05-12 17:20:32 +03:00
|
|
|
}
|
|
|
|
else if (arg == "--build-output" || arg == "-B")
|
2004-08-18 15:19:06 +03:00
|
|
|
; /* !!! obsolete - remove eventually */
|
|
|
|
else if (arg == "--no-build-output" || arg == "-Q")
|
|
|
|
buildVerbosity = lvlVomit;
|
2008-11-12 13:08:27 +02:00
|
|
|
else if (arg == "--print-build-trace")
|
|
|
|
printBuildTrace = true;
|
2003-12-01 17:55:05 +02:00
|
|
|
else if (arg == "--help") {
|
|
|
|
printHelp();
|
|
|
|
return;
|
2004-05-12 17:20:32 +03:00
|
|
|
}
|
|
|
|
else if (arg == "--version") {
|
2006-09-05 00:06:23 +03:00
|
|
|
std::cout << format("%1% (Nix) %2%") % programId % NIX_VERSION << std::endl;
|
2004-02-02 12:51:54 +02:00
|
|
|
return;
|
2004-05-12 17:20:32 +03:00
|
|
|
}
|
|
|
|
else if (arg == "--keep-failed" || arg == "-K")
|
2003-12-01 17:55:05 +02:00
|
|
|
keepFailed = true;
|
2004-06-25 18:36:09 +03:00
|
|
|
else if (arg == "--keep-going" || arg == "-k")
|
|
|
|
keepGoing = true;
|
2004-06-28 13:42:57 +03:00
|
|
|
else if (arg == "--fallback")
|
|
|
|
tryFallback = true;
|
2006-12-08 17:44:00 +02:00
|
|
|
else if (arg == "--max-jobs" || arg == "-j")
|
2009-11-24 14:26:25 +02:00
|
|
|
maxBuildJobs = getIntArg<unsigned int>(arg, i, args.end());
|
2004-10-25 17:38:23 +03:00
|
|
|
else if (arg == "--readonly-mode")
|
|
|
|
readOnlyMode = true;
|
2006-12-08 17:44:00 +02:00
|
|
|
else if (arg == "--max-silent-time")
|
2009-11-24 14:26:25 +02:00
|
|
|
maxSilentTime = getIntArg<unsigned int>(arg, i, args.end());
|
2007-11-16 18:15:26 +02:00
|
|
|
else if (arg == "--no-build-hook")
|
|
|
|
useBuildHook = false;
|
2009-06-30 16:28:29 +03:00
|
|
|
else if (arg == "--show-trace")
|
|
|
|
showTrace = true;
|
2009-02-27 13:04:41 +02:00
|
|
|
else if (arg == "--option") {
|
|
|
|
++i; if (i == args.end()) throw UsageError("`--option' requires two arguments");
|
|
|
|
string name = *i;
|
|
|
|
++i; if (i == args.end()) throw UsageError("`--option' requires two arguments");
|
|
|
|
string value = *i;
|
|
|
|
overrideSetting(name, tokenizeString(value));
|
|
|
|
}
|
2003-12-01 17:55:05 +02:00
|
|
|
else remaining.push_back(arg);
|
|
|
|
}
|
|
|
|
|
2005-01-31 23:20:59 +02:00
|
|
|
/* Automatically clean up the temporary roots file when we
|
|
|
|
exit. */
|
2008-08-04 14:44:50 +03:00
|
|
|
RemoveTempRoots removeTempRoots __attribute__((unused));
|
2005-01-31 23:20:59 +02:00
|
|
|
|
2007-05-01 18:16:17 +03:00
|
|
|
/* Make sure that the database gets closed properly, even if
|
|
|
|
terminate() is called (which happens sometimes due to bugs in
|
|
|
|
destructor/exceptions interaction, but that needn't preclude a
|
|
|
|
clean shutdown of the database). */
|
|
|
|
std::set_terminate(closeStore);
|
|
|
|
|
2003-12-01 17:55:05 +02:00
|
|
|
run(remaining);
|
2006-03-01 18:36:35 +02:00
|
|
|
|
2006-11-30 19:43:04 +02:00
|
|
|
/* Close the Nix database. */
|
|
|
|
store.reset((StoreAPI *) 0);
|
2003-07-04 18:42:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-03 22:41:22 +02:00
|
|
|
bool setuidMode = false;
|
|
|
|
|
|
|
|
|
2006-12-02 17:45:51 +02:00
|
|
|
static void setuidInit()
|
|
|
|
{
|
|
|
|
/* Don't do anything if this is not a setuid binary. */
|
|
|
|
if (getuid() == geteuid() && getgid() == getegid()) return;
|
|
|
|
|
|
|
|
uid_t nixUid = geteuid();
|
|
|
|
gid_t nixGid = getegid();
|
|
|
|
|
2006-12-06 19:29:10 +02:00
|
|
|
setuidCleanup();
|
2006-12-02 17:45:51 +02:00
|
|
|
|
|
|
|
/* Don't trust the current directory. */
|
|
|
|
if (chdir("/") == -1) abort();
|
|
|
|
|
|
|
|
/* Set the real (and preferably also the save) uid/gid to the
|
|
|
|
effective uid/gid. This matters mostly when we're not using
|
|
|
|
build-users (bad!), since some builders (like Perl) complain
|
|
|
|
when real != effective.
|
|
|
|
|
|
|
|
On systems where setresuid is unavailable, we can't drop the
|
|
|
|
saved uid/gid. This means that we could go back to the
|
|
|
|
original real uid (i.e., the uid of the caller). That's not
|
|
|
|
really a problem, except maybe when we execute a builder and
|
|
|
|
we're not using build-users. In that case, the builder may be
|
|
|
|
able to switch to the uid of the caller and possibly do bad
|
|
|
|
stuff. But note that when not using build-users, the builder
|
|
|
|
could also modify the Nix executables (say, replace them by a
|
|
|
|
Trojan horse), so the problem is already there. */
|
|
|
|
|
2006-12-03 18:25:19 +02:00
|
|
|
#if HAVE_SETRESUID
|
2006-12-03 16:32:22 +02:00
|
|
|
if (setresuid(nixUid, nixUid, nixUid)) abort();
|
|
|
|
if (setresgid(nixGid, nixGid, nixGid)) abort();
|
|
|
|
#elif HAVE_SETREUID
|
2006-12-02 17:45:51 +02:00
|
|
|
/* Note: doesn't set saved uid/gid! */
|
2006-12-03 16:32:22 +02:00
|
|
|
fprintf(stderr, "warning: cannot set saved uid\n");
|
|
|
|
if (setreuid(nixUid, nixUid)) abort();
|
|
|
|
if (setregid(nixGid, nixGid)) abort();
|
|
|
|
#else
|
|
|
|
/* Note: doesn't set real and saved uid/gid! */
|
|
|
|
fprintf(stderr, "warning: cannot set real and saved uids\n");
|
|
|
|
if (setuid(nixUid)) abort();
|
|
|
|
if (setgid(nixGid)) abort();
|
2006-12-02 17:45:51 +02:00
|
|
|
#endif
|
2006-12-03 17:32:38 +02:00
|
|
|
|
|
|
|
setuidMode = true;
|
2006-12-02 17:45:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-09-05 00:06:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-16 19:29:57 +03:00
|
|
|
static char buf[1024];
|
|
|
|
|
2003-07-04 18:42:03 +03:00
|
|
|
int main(int argc, char * * argv)
|
|
|
|
{
|
2006-09-05 00:06:23 +03:00
|
|
|
using namespace nix;
|
2006-12-02 17:45:51 +02:00
|
|
|
|
|
|
|
/* If we're setuid, then we need to take some security precautions
|
|
|
|
right away. */
|
|
|
|
if (argc == 0) abort();
|
|
|
|
setuidInit();
|
* Setuid support for sharing a Nix installation between multiple
users.
If the configure flag `--enable-setuid' is used, the Nix programs
nix-env, nix-store, etc. are installed with the setuid bit turned on
so that they are executed as the user and group specified by
`--with-nix-user=USER' and `--with-nix-group=GROUP', respectively
(with defaults `nix' and `nix').
The setuid programs drop all special privileges if they are executed
by a user who is not a member of the Nix group.
The setuid feature is a quick hack to enable sharing of a Nix
installation between users who trust each other. It is not
generally secure, since any user in the Nix group can modify (by
building an appropriate derivation) any object in the store, and for
instance inject trojans into binaries used by other users.
The setuid programs are owned by root, not the Nix user. This is
because on Unix normal users cannot change the real uid, only the
effective uid. Many programs don't work properly when the real uid
differs from the effective uid. For instance, Perl will turn on
taint mode. However, the setuid programs drop all root privileges
immediately, changing all uids and gids to the Nix user and group.
2004-08-20 17:49:05 +03:00
|
|
|
|
2003-07-04 18:42:03 +03:00
|
|
|
/* ATerm setup. */
|
|
|
|
ATerm bottomOfStack;
|
|
|
|
ATinit(argc, argv, &bottomOfStack);
|
|
|
|
|
2003-10-16 14:55:37 +03:00
|
|
|
/* Turn on buffering for cerr. */
|
2003-12-22 18:40:46 +02:00
|
|
|
#if HAVE_PUBSETBUF
|
2006-09-05 00:06:23 +03:00
|
|
|
std::cerr.rdbuf()->pubsetbuf(buf, sizeof(buf));
|
2003-12-22 18:40:46 +02:00
|
|
|
#endif
|
2003-10-16 14:55:37 +03:00
|
|
|
|
2006-11-18 20:56:30 +02:00
|
|
|
std::ios::sync_with_stdio(false);
|
|
|
|
|
2003-07-04 18:42:03 +03:00
|
|
|
try {
|
2004-05-11 21:05:44 +03:00
|
|
|
try {
|
|
|
|
initAndRun(argc, argv);
|
|
|
|
} catch (...) {
|
|
|
|
/* Subtle: we have to make sure that any `interrupted'
|
|
|
|
condition is discharged before we reach printMsg()
|
|
|
|
below, since otherwise it will throw an (uncaught)
|
|
|
|
exception. */
|
|
|
|
blockInt = 1; /* ignore further SIGINTs */
|
|
|
|
_isInterrupted = 0;
|
|
|
|
throw;
|
|
|
|
}
|
2003-07-04 18:42:03 +03:00
|
|
|
} catch (UsageError & e) {
|
2003-11-09 12:35:45 +02:00
|
|
|
printMsg(lvlError,
|
2003-07-24 11:53:43 +03:00
|
|
|
format(
|
|
|
|
"error: %1%\n"
|
|
|
|
"Try `%2% --help' for more information.")
|
|
|
|
% e.what() % programId);
|
2003-07-04 18:42:03 +03:00
|
|
|
return 1;
|
2007-08-12 03:29:28 +03:00
|
|
|
} catch (BaseError & e) {
|
2009-06-30 16:28:29 +03:00
|
|
|
printMsg(lvlError, format("error: %1%%2%") % (showTrace ? e.prefix() : "") % e.msg());
|
|
|
|
if (e.prefix() != "" && !showTrace)
|
|
|
|
printMsg(lvlError, "(use `--show-trace' to show detailed location information)");
|
2003-07-07 12:25:26 +03:00
|
|
|
return 1;
|
2006-09-05 00:06:23 +03:00
|
|
|
} catch (std::exception & e) {
|
2003-11-09 12:35:45 +02:00
|
|
|
printMsg(lvlError, format("error: %1%") % e.what());
|
2003-07-04 18:42:03 +03:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2006-09-05 00:06:23 +03:00
|
|
|
|
|
|
|
|