2016-07-19 01:50:27 +03:00
|
|
|
#include <cstdlib>
|
|
|
|
#include <cstring>
|
|
|
|
#include <algorithm>
|
2017-01-10 17:29:06 +02:00
|
|
|
#include <set>
|
2016-07-19 01:50:27 +03:00
|
|
|
#include <memory>
|
|
|
|
#include <tuple>
|
|
|
|
#include <iomanip>
|
2017-01-24 14:57:26 +02:00
|
|
|
#if __APPLE__
|
2017-01-24 13:22:02 +02:00
|
|
|
#include <sys/time.h>
|
|
|
|
#endif
|
2016-07-19 01:50:27 +03:00
|
|
|
|
2017-05-02 14:17:37 +03:00
|
|
|
#include "machines.hh"
|
2016-07-19 01:50:27 +03:00
|
|
|
#include "shared.hh"
|
|
|
|
#include "pathlocks.hh"
|
|
|
|
#include "globals.hh"
|
|
|
|
#include "serialise.hh"
|
|
|
|
#include "store-api.hh"
|
|
|
|
#include "derivations.hh"
|
2017-10-23 20:06:55 +03:00
|
|
|
#include "local-store.hh"
|
2020-03-30 15:29:29 +03:00
|
|
|
#include "../nix/legacy.hh"
|
2016-07-19 01:50:27 +03:00
|
|
|
|
|
|
|
using namespace nix;
|
|
|
|
using std::cin;
|
|
|
|
|
2017-03-03 17:18:49 +02:00
|
|
|
static void handleAlarm(int sig) {
|
2016-07-19 01:50:27 +03:00
|
|
|
}
|
|
|
|
|
2017-05-01 18:35:30 +03:00
|
|
|
std::string escapeUri(std::string uri)
|
|
|
|
{
|
|
|
|
std::replace(uri.begin(), uri.end(), '/', '_');
|
|
|
|
return uri;
|
|
|
|
}
|
|
|
|
|
2016-07-19 01:50:27 +03:00
|
|
|
static string currentLoad;
|
|
|
|
|
2020-07-30 14:10:49 +03:00
|
|
|
static AutoCloseFD openSlotLock(const Machine & m, uint64_t slot)
|
2017-01-24 16:28:50 +02:00
|
|
|
{
|
2017-05-01 18:35:30 +03:00
|
|
|
return openLockFile(fmt("%s/%s-%d", currentLoad, escapeUri(m.storeUri), slot), true);
|
2016-07-19 01:50:27 +03:00
|
|
|
}
|
|
|
|
|
2019-03-06 07:03:25 +02:00
|
|
|
static bool allSupportedLocally(const std::set<std::string>& requiredFeatures) {
|
|
|
|
for (auto & feature : requiredFeatures)
|
|
|
|
if (!settings.systemFeatures.get().count(feature)) return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-10-26 12:35:46 +03:00
|
|
|
static int _main(int argc, char * * argv)
|
2016-07-19 01:50:27 +03:00
|
|
|
{
|
2018-10-26 12:35:46 +03:00
|
|
|
{
|
2017-10-24 14:41:52 +03:00
|
|
|
logger = makeJSONLogger(*logger);
|
|
|
|
|
2016-07-19 01:50:27 +03:00
|
|
|
/* Ensure we don't get any SSH passphrase or host key popups. */
|
2017-05-01 18:35:30 +03:00
|
|
|
unsetenv("DISPLAY");
|
|
|
|
unsetenv("SSH_ASKPASS");
|
2016-07-19 01:50:27 +03:00
|
|
|
|
2017-10-23 21:43:04 +03:00
|
|
|
if (argc != 2)
|
2016-07-19 01:50:27 +03:00
|
|
|
throw UsageError("called without required arguments");
|
|
|
|
|
2017-10-23 21:43:04 +03:00
|
|
|
verbosity = (Verbosity) std::stoll(argv[1]);
|
|
|
|
|
|
|
|
FdSource source(STDIN_FILENO);
|
|
|
|
|
|
|
|
/* Read the parent's settings. */
|
|
|
|
while (readInt(source)) {
|
|
|
|
auto name = readString(source);
|
|
|
|
auto value = readString(source);
|
|
|
|
settings.set(name, value);
|
|
|
|
}
|
|
|
|
|
|
|
|
settings.maxBuildJobs.set("1"); // hack to make tests with local?root= work
|
2016-07-19 01:50:27 +03:00
|
|
|
|
2018-02-08 18:26:18 +02:00
|
|
|
initPlugins();
|
|
|
|
|
2017-10-23 21:43:04 +03:00
|
|
|
auto store = openStore().cast<LocalStore>();
|
2016-07-19 01:50:27 +03:00
|
|
|
|
2017-05-01 16:46:47 +03:00
|
|
|
/* It would be more appropriate to use $XDG_RUNTIME_DIR, since
|
2017-07-30 13:28:50 +03:00
|
|
|
that gets cleared on reboot, but it wouldn't work on macOS. */
|
2017-10-23 20:06:55 +03:00
|
|
|
currentLoad = store->stateDir + "/current-load";
|
2016-07-19 01:50:27 +03:00
|
|
|
|
|
|
|
std::shared_ptr<Store> sshStore;
|
|
|
|
AutoCloseFD bestSlotLock;
|
|
|
|
|
2017-05-02 14:44:10 +03:00
|
|
|
auto machines = getMachines();
|
2017-05-01 15:43:14 +03:00
|
|
|
debug("got %d remote builders", machines.size());
|
|
|
|
|
2017-05-02 13:16:29 +03:00
|
|
|
if (machines.empty()) {
|
|
|
|
std::cerr << "# decline-permanently\n";
|
2018-10-26 12:35:46 +03:00
|
|
|
return 0;
|
2017-05-02 13:16:29 +03:00
|
|
|
}
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
std::optional<StorePath> drvPath;
|
2017-05-01 18:35:30 +03:00
|
|
|
string storeUri;
|
2017-10-23 21:43:04 +03:00
|
|
|
|
|
|
|
while (true) {
|
|
|
|
|
|
|
|
try {
|
|
|
|
auto s = readString(source);
|
2018-10-26 12:35:46 +03:00
|
|
|
if (s != "try") return 0;
|
|
|
|
} catch (EndOfFile &) { return 0; }
|
2017-10-23 21:43:04 +03:00
|
|
|
|
|
|
|
auto amWilling = readInt(source);
|
|
|
|
auto neededSystem = readString(source);
|
2019-12-05 20:11:09 +02:00
|
|
|
drvPath = store->parseStorePath(readString(source));
|
2017-10-23 21:43:04 +03:00
|
|
|
auto requiredFeatures = readStrings<std::set<std::string>>(source);
|
|
|
|
|
2020-08-05 19:58:00 +03:00
|
|
|
auto canBuildLocally = amWilling
|
2019-03-06 07:03:25 +02:00
|
|
|
&& ( neededSystem == settings.thisSystem
|
|
|
|
|| settings.extraPlatforms.get().count(neededSystem) > 0)
|
|
|
|
&& allSupportedLocally(requiredFeatures);
|
2016-07-19 01:50:27 +03:00
|
|
|
|
|
|
|
/* Error ignored here, will be caught later */
|
|
|
|
mkdir(currentLoad.c_str(), 0777);
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
bestSlotLock = -1;
|
|
|
|
AutoCloseFD lock = openLockFile(currentLoad + "/main-lock", true);
|
|
|
|
lockFile(lock.get(), ltWrite, true);
|
|
|
|
|
|
|
|
bool rightType = false;
|
|
|
|
|
2017-03-03 17:18:49 +02:00
|
|
|
Machine * bestMachine = nullptr;
|
2020-07-30 14:10:49 +03:00
|
|
|
uint64_t bestLoad = 0;
|
2016-07-19 01:50:27 +03:00
|
|
|
for (auto & m : machines) {
|
2017-10-23 21:43:04 +03:00
|
|
|
debug("considering building on remote machine '%s'", m.storeUri);
|
2017-05-01 18:35:30 +03:00
|
|
|
|
2016-07-19 01:50:27 +03:00
|
|
|
if (m.enabled && std::find(m.systemTypes.begin(),
|
|
|
|
m.systemTypes.end(),
|
|
|
|
neededSystem) != m.systemTypes.end() &&
|
|
|
|
m.allSupported(requiredFeatures) &&
|
|
|
|
m.mandatoryMet(requiredFeatures)) {
|
|
|
|
rightType = true;
|
|
|
|
AutoCloseFD free;
|
2020-07-30 14:10:49 +03:00
|
|
|
uint64_t load = 0;
|
|
|
|
for (uint64_t slot = 0; slot < m.maxJobs; ++slot) {
|
2017-01-25 13:51:35 +02:00
|
|
|
auto slotLock = openSlotLock(m, slot);
|
2016-07-19 01:50:27 +03:00
|
|
|
if (lockFile(slotLock.get(), ltWrite, false)) {
|
|
|
|
if (!free) {
|
|
|
|
free = std::move(slotLock);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
++load;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!free) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
bool best = false;
|
|
|
|
if (!bestSlotLock) {
|
|
|
|
best = true;
|
|
|
|
} else if (load / m.speedFactor < bestLoad / bestMachine->speedFactor) {
|
|
|
|
best = true;
|
|
|
|
} else if (load / m.speedFactor == bestLoad / bestMachine->speedFactor) {
|
|
|
|
if (m.speedFactor > bestMachine->speedFactor) {
|
|
|
|
best = true;
|
|
|
|
} else if (m.speedFactor == bestMachine->speedFactor) {
|
|
|
|
if (load < bestLoad) {
|
|
|
|
best = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (best) {
|
|
|
|
bestLoad = load;
|
|
|
|
bestSlotLock = std::move(free);
|
|
|
|
bestMachine = &m;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!bestSlotLock) {
|
2017-03-03 17:18:49 +02:00
|
|
|
if (rightType && !canBuildLocally)
|
|
|
|
std::cerr << "# postpone\n";
|
|
|
|
else
|
2020-08-05 19:58:00 +03:00
|
|
|
{
|
|
|
|
// build the hint template.
|
|
|
|
string hintstring = "required (system, features): (%s, %s)";
|
|
|
|
hintstring += "\n%s available machines:";
|
|
|
|
hintstring += "\n(systems, maxjobs, supportedFeatures, mandatoryFeatures)";
|
|
|
|
|
|
|
|
for (unsigned int i = 0; i < machines.size(); ++i) {
|
|
|
|
hintstring += "\n(%s, %s, %s, %s)";
|
|
|
|
}
|
|
|
|
|
|
|
|
// add the template values.
|
|
|
|
auto hint = hintformat(hintstring);
|
|
|
|
hint
|
|
|
|
% neededSystem
|
|
|
|
% concatStringsSep<StringSet>(", ", requiredFeatures)
|
|
|
|
% machines.size();
|
|
|
|
|
|
|
|
for (auto & m : machines) {
|
|
|
|
hint % concatStringsSep<vector<string>>(", ", m.systemTypes)
|
|
|
|
% m.maxJobs
|
|
|
|
% concatStringsSep<StringSet>(", ", m.supportedFeatures)
|
|
|
|
% concatStringsSep<StringSet>(", ", m.mandatoryFeatures);
|
|
|
|
}
|
|
|
|
|
|
|
|
logError({
|
|
|
|
.name = "Remote build",
|
|
|
|
.description = "Failed to find a machine for remote build!",
|
|
|
|
.hint = hint
|
|
|
|
});
|
|
|
|
|
2017-03-03 17:18:49 +02:00
|
|
|
std::cerr << "# decline\n";
|
2020-08-05 19:58:00 +03:00
|
|
|
}
|
2016-07-19 01:50:27 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-01-24 13:22:02 +02:00
|
|
|
#if __APPLE__
|
|
|
|
futimes(bestSlotLock.get(), NULL);
|
|
|
|
#else
|
2016-07-19 01:50:27 +03:00
|
|
|
futimens(bestSlotLock.get(), NULL);
|
2017-01-24 13:22:02 +02:00
|
|
|
#endif
|
2016-07-19 01:50:27 +03:00
|
|
|
|
|
|
|
lock = -1;
|
|
|
|
|
|
|
|
try {
|
2017-05-01 18:35:30 +03:00
|
|
|
|
2017-10-24 14:41:52 +03:00
|
|
|
Activity act(*logger, lvlTalkative, actUnknown, fmt("connecting to '%s'", bestMachine->storeUri));
|
|
|
|
|
2017-10-24 16:16:18 +03:00
|
|
|
Store::Params storeParams;
|
2017-11-25 02:03:23 +02:00
|
|
|
if (hasPrefix(bestMachine->storeUri, "ssh://")) {
|
2019-11-13 18:18:17 +02:00
|
|
|
storeParams["max-connections"] = "1";
|
2017-10-24 16:16:18 +03:00
|
|
|
storeParams["log-fd"] = "4";
|
|
|
|
if (bestMachine->sshKey != "")
|
|
|
|
storeParams["ssh-key"] = bestMachine->sshKey;
|
|
|
|
}
|
2017-05-01 18:35:30 +03:00
|
|
|
|
|
|
|
sshStore = openStore(bestMachine->storeUri, storeParams);
|
2017-05-02 15:18:46 +03:00
|
|
|
sshStore->connect();
|
2017-05-01 18:35:30 +03:00
|
|
|
storeUri = bestMachine->storeUri;
|
|
|
|
|
2016-07-19 01:50:27 +03:00
|
|
|
} catch (std::exception & e) {
|
2018-03-20 16:17:59 +02:00
|
|
|
auto msg = chomp(drainFD(5, false));
|
2020-06-15 15:12:39 +03:00
|
|
|
logError({
|
2020-06-02 17:22:24 +03:00
|
|
|
.name = "Remote build",
|
|
|
|
.hint = hintfmt("cannot build on '%s': %s%s",
|
|
|
|
bestMachine->storeUri, e.what(),
|
|
|
|
(msg.empty() ? "" : ": " + msg))
|
2020-05-03 17:01:25 +03:00
|
|
|
});
|
2016-07-19 01:50:27 +03:00
|
|
|
bestMachine->enabled = false;
|
|
|
|
continue;
|
|
|
|
}
|
2017-05-01 18:35:30 +03:00
|
|
|
|
2016-07-19 01:50:27 +03:00
|
|
|
goto connected;
|
|
|
|
}
|
|
|
|
}
|
2017-03-03 17:18:49 +02:00
|
|
|
|
2016-07-19 01:50:27 +03:00
|
|
|
connected:
|
2018-03-20 16:17:59 +02:00
|
|
|
close(5);
|
|
|
|
|
2017-10-24 15:24:57 +03:00
|
|
|
std::cerr << "# accept\n" << storeUri << "\n";
|
2017-05-01 18:35:30 +03:00
|
|
|
|
2017-10-23 21:43:04 +03:00
|
|
|
auto inputs = readStrings<PathSet>(source);
|
|
|
|
auto outputs = readStrings<PathSet>(source);
|
2017-05-01 18:35:30 +03:00
|
|
|
|
2017-10-24 15:47:23 +03:00
|
|
|
AutoCloseFD uploadLock = openLockFile(currentLoad + "/" + escapeUri(storeUri) + ".upload-lock", true);
|
|
|
|
|
2017-10-24 14:41:52 +03:00
|
|
|
{
|
|
|
|
Activity act(*logger, lvlTalkative, actUnknown, fmt("waiting for the upload lock to '%s'", storeUri));
|
2017-05-01 18:35:30 +03:00
|
|
|
|
2017-10-24 14:41:52 +03:00
|
|
|
auto old = signal(SIGALRM, handleAlarm);
|
|
|
|
alarm(15 * 60);
|
|
|
|
if (!lockFile(uploadLock.get(), ltWrite, true))
|
|
|
|
printError("somebody is hogging the upload lock for '%s', continuing...");
|
|
|
|
alarm(0);
|
|
|
|
signal(SIGALRM, old);
|
2017-10-24 15:47:23 +03:00
|
|
|
}
|
|
|
|
|
2018-01-09 23:40:07 +02:00
|
|
|
auto substitute = settings.buildersUseSubstitutes ? Substitute : NoSubstitute;
|
|
|
|
|
2017-10-24 15:47:23 +03:00
|
|
|
{
|
|
|
|
Activity act(*logger, lvlTalkative, actUnknown, fmt("copying dependencies to '%s'", storeUri));
|
2019-12-05 20:11:09 +02:00
|
|
|
copyPaths(store, ref<Store>(sshStore), store->parseStorePathSet(inputs), NoRepair, NoCheckSigs, substitute);
|
2017-10-24 14:41:52 +03:00
|
|
|
}
|
2016-07-19 01:50:27 +03:00
|
|
|
|
2017-10-24 15:47:23 +03:00
|
|
|
uploadLock = -1;
|
|
|
|
|
2020-06-12 14:04:52 +03:00
|
|
|
auto drv = store->readDerivation(*drvPath);
|
2019-12-05 20:11:09 +02:00
|
|
|
drv.inputSrcs = store->parseStorePathSet(inputs);
|
2017-05-01 16:00:39 +03:00
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
auto result = sshStore->buildDerivation(*drvPath, drv);
|
2017-05-08 15:27:12 +03:00
|
|
|
|
|
|
|
if (!result.success())
|
2019-12-05 20:11:09 +02:00
|
|
|
throw Error("build of '%s' on '%s' failed: %s", store->printStorePath(*drvPath), storeUri, result.errorMsg);
|
2016-07-19 01:50:27 +03:00
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet missing;
|
2017-03-16 14:50:01 +02:00
|
|
|
for (auto & path : outputs)
|
2019-12-05 20:11:09 +02:00
|
|
|
if (!store->isValidPath(store->parseStorePath(path))) missing.insert(store->parseStorePath(path));
|
2017-03-16 14:50:01 +02:00
|
|
|
|
|
|
|
if (!missing.empty()) {
|
2017-10-24 15:47:23 +03:00
|
|
|
Activity act(*logger, lvlTalkative, actUnknown, fmt("copying outputs from '%s'", storeUri));
|
2019-12-05 20:11:09 +02:00
|
|
|
for (auto & i : missing)
|
|
|
|
store->locksHeld.insert(store->printStorePath(i)); /* FIXME: ugly */
|
2018-03-13 18:56:51 +02:00
|
|
|
copyPaths(ref<Store>(sshStore), store, missing, NoRepair, NoCheckSigs, NoSubstitute);
|
2016-07-19 01:50:27 +03:00
|
|
|
}
|
2017-03-16 14:50:01 +02:00
|
|
|
|
2018-10-26 12:35:46 +03:00
|
|
|
return 0;
|
|
|
|
}
|
2016-07-19 01:50:27 +03:00
|
|
|
}
|
2018-10-26 12:35:46 +03:00
|
|
|
|
|
|
|
static RegisterLegacyCommand s1("build-remote", _main);
|