If a build log is not available locally, then ‘nix-store -l’ will now try to download it from the servers listed in the ‘log-servers’ option in nix.conf. For instance, if you have: log-servers = http://hydra.nixos.org/log then it will try to get logs from http://hydra.nixos.org/log/<base name of the store path>. So you can do things like: $ nix-store -l $(which xterm) and get a log even if xterm wasn't built locally.
		
			
				
	
	
		
			247 lines
		
	
	
	
		
			7.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			247 lines
		
	
	
	
		
			7.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| #include "config.h"
 | |
| 
 | |
| #include "globals.hh"
 | |
| #include "util.hh"
 | |
| 
 | |
| #include <map>
 | |
| #include <algorithm>
 | |
| #include <unistd.h>
 | |
| 
 | |
| 
 | |
| namespace nix {
 | |
| 
 | |
| 
 | |
| /* The default location of the daemon socket, relative to nixStateDir.
 | |
|    The socket is in a directory to allow you to control access to the
 | |
|    Nix daemon by setting the mode/ownership of the directory
 | |
|    appropriately.  (This wouldn't work on the socket itself since it
 | |
|    must be deleted and recreated on startup.) */
 | |
| #define DEFAULT_SOCKET_PATH "/daemon-socket/socket"
 | |
| 
 | |
| 
 | |
| Settings settings;
 | |
| 
 | |
| 
 | |
| Settings::Settings()
 | |
| {
 | |
|     keepFailed = false;
 | |
|     keepGoing = false;
 | |
|     tryFallback = false;
 | |
|     buildVerbosity = lvlError;
 | |
|     maxBuildJobs = 1;
 | |
|     buildCores = 1;
 | |
| #ifdef _SC_NPROCESSORS_ONLN
 | |
|     long res = sysconf(_SC_NPROCESSORS_ONLN);
 | |
|     if (res > 0) buildCores = res;
 | |
| #endif
 | |
|     readOnlyMode = false;
 | |
|     thisSystem = SYSTEM;
 | |
|     maxSilentTime = 0;
 | |
|     buildTimeout = 0;
 | |
|     useBuildHook = true;
 | |
|     printBuildTrace = false;
 | |
|     reservedSize = 1024 * 1024;
 | |
|     fsyncMetadata = true;
 | |
|     useSQLiteWAL = true;
 | |
|     syncBeforeRegistering = false;
 | |
|     useSubstitutes = true;
 | |
|     buildUsersGroup = getuid() == 0 ? "nixbld" : "";
 | |
|     useChroot = false;
 | |
|     useSshSubstituter = false;
 | |
|     impersonateLinux26 = false;
 | |
|     keepLog = true;
 | |
|     compressLog = true;
 | |
|     maxLogSize = 0;
 | |
|     cacheFailure = false;
 | |
|     pollInterval = 5;
 | |
|     checkRootReachability = false;
 | |
|     gcKeepOutputs = false;
 | |
|     gcKeepDerivations = true;
 | |
|     autoOptimiseStore = false;
 | |
|     envKeepDerivations = false;
 | |
|     lockCPU = getEnv("NIX_AFFINITY_HACK", "1") == "1";
 | |
|     showTrace = false;
 | |
| }
 | |
| 
 | |
| 
 | |
| void Settings::processEnvironment()
 | |
| {
 | |
|     nixStore = canonPath(getEnv("NIX_STORE_DIR", getEnv("NIX_STORE", NIX_STORE_DIR)));
 | |
|     nixDataDir = canonPath(getEnv("NIX_DATA_DIR", NIX_DATA_DIR));
 | |
|     nixLogDir = canonPath(getEnv("NIX_LOG_DIR", NIX_LOG_DIR));
 | |
|     nixStateDir = canonPath(getEnv("NIX_STATE_DIR", NIX_STATE_DIR));
 | |
|     nixDBPath = getEnv("NIX_DB_DIR", nixStateDir + "/db");
 | |
|     nixConfDir = canonPath(getEnv("NIX_CONF_DIR", NIX_CONF_DIR));
 | |
|     nixLibexecDir = canonPath(getEnv("NIX_LIBEXEC_DIR", NIX_LIBEXEC_DIR));
 | |
|     nixBinDir = canonPath(getEnv("NIX_BIN_DIR", NIX_BIN_DIR));
 | |
|     nixDaemonSocketFile = canonPath(nixStateDir + DEFAULT_SOCKET_PATH);
 | |
| }
 | |
| 
 | |
| 
 | |
| void Settings::loadConfFile()
 | |
| {
 | |
|     Path settingsFile = (format("%1%/%2%") % nixConfDir % "nix.conf").str();
 | |
|     if (!pathExists(settingsFile)) return;
 | |
|     string contents = readFile(settingsFile);
 | |
| 
 | |
|     unsigned int pos = 0;
 | |
| 
 | |
|     while (pos < contents.size()) {
 | |
|         string line;
 | |
|         while (pos < contents.size() && contents[pos] != '\n')
 | |
|             line += contents[pos++];
 | |
|         pos++;
 | |
| 
 | |
|         string::size_type hash = line.find('#');
 | |
|         if (hash != string::npos)
 | |
|             line = string(line, 0, hash);
 | |
| 
 | |
|         vector<string> tokens = tokenizeString<vector<string> >(line);
 | |
|         if (tokens.empty()) continue;
 | |
| 
 | |
|         if (tokens.size() < 2 || tokens[1] != "=")
 | |
|             throw Error(format("illegal configuration line `%1%' in `%2%'") % line % settingsFile);
 | |
| 
 | |
|         string name = tokens[0];
 | |
| 
 | |
|         vector<string>::iterator i = tokens.begin();
 | |
|         advance(i, 2);
 | |
|         settings[name] = concatStringsSep(" ", Strings(i, tokens.end())); // FIXME: slow
 | |
|     };
 | |
| }
 | |
| 
 | |
| 
 | |
| void Settings::set(const string & name, const string & value)
 | |
| {
 | |
|     settings[name] = value;
 | |
|     overrides[name] = value;
 | |
| }
 | |
| 
 | |
| 
 | |
| void Settings::update()
 | |
| {
 | |
|     get(tryFallback, "build-fallback");
 | |
|     get(maxBuildJobs, "build-max-jobs");
 | |
|     get(buildCores, "build-cores");
 | |
|     get(thisSystem, "system");
 | |
|     get(maxSilentTime, "build-max-silent-time");
 | |
|     get(buildTimeout, "build-timeout");
 | |
|     get(reservedSize, "gc-reserved-space");
 | |
|     get(fsyncMetadata, "fsync-metadata");
 | |
|     get(useSQLiteWAL, "use-sqlite-wal");
 | |
|     get(syncBeforeRegistering, "sync-before-registering");
 | |
|     get(useSubstitutes, "build-use-substitutes");
 | |
|     get(buildUsersGroup, "build-users-group");
 | |
|     get(useChroot, "build-use-chroot");
 | |
|     get(dirsInChroot, "build-chroot-dirs");
 | |
|     get(impersonateLinux26, "build-impersonate-linux-26");
 | |
|     get(keepLog, "build-keep-log");
 | |
|     get(compressLog, "build-compress-log");
 | |
|     get(maxLogSize, "build-max-log-size");
 | |
|     get(cacheFailure, "build-cache-failure");
 | |
|     get(pollInterval, "build-poll-interval");
 | |
|     get(checkRootReachability, "gc-check-reachability");
 | |
|     get(gcKeepOutputs, "gc-keep-outputs");
 | |
|     get(gcKeepDerivations, "gc-keep-derivations");
 | |
|     get(autoOptimiseStore, "auto-optimise-store");
 | |
|     get(envKeepDerivations, "env-keep-derivations");
 | |
|     get(sshSubstituterHosts, "ssh-substituter-hosts");
 | |
|     get(useSshSubstituter, "use-ssh-substituter");
 | |
|     get(logServers, "log-servers");
 | |
| 
 | |
|     string subs = getEnv("NIX_SUBSTITUTERS", "default");
 | |
|     if (subs == "default") {
 | |
|         substituters.clear();
 | |
| #if 0
 | |
|         if (getEnv("NIX_OTHER_STORES") != "")
 | |
|             substituters.push_back(nixLibexecDir + "/nix/substituters/copy-from-other-stores.pl");
 | |
| #endif
 | |
|         substituters.push_back(nixLibexecDir + "/nix/substituters/download-using-manifests.pl");
 | |
|         substituters.push_back(nixLibexecDir + "/nix/substituters/download-from-binary-cache.pl");
 | |
|         if (useSshSubstituter)
 | |
|             substituters.push_back(nixLibexecDir + "/nix/substituters/download-via-ssh");
 | |
|     } else
 | |
|         substituters = tokenizeString<Strings>(subs, ":");
 | |
| }
 | |
| 
 | |
| 
 | |
| void Settings::get(string & res, const string & name)
 | |
| {
 | |
|     SettingsMap::iterator i = settings.find(name);
 | |
|     if (i == settings.end()) return;
 | |
|     res = i->second;
 | |
| }
 | |
| 
 | |
| 
 | |
| void Settings::get(bool & res, const string & name)
 | |
| {
 | |
|     SettingsMap::iterator i = settings.find(name);
 | |
|     if (i == settings.end()) return;
 | |
|     if (i->second == "true") res = true;
 | |
|     else if (i->second == "false") res = false;
 | |
|     else throw Error(format("configuration option `%1%' should be either `true' or `false', not `%2%'")
 | |
|         % name % i->second);
 | |
| }
 | |
| 
 | |
| 
 | |
| void Settings::get(StringSet & res, const string & name)
 | |
| {
 | |
|     SettingsMap::iterator i = settings.find(name);
 | |
|     if (i == settings.end()) return;
 | |
|     res.clear();
 | |
|     Strings ss = tokenizeString<Strings>(i->second);
 | |
|     res.insert(ss.begin(), ss.end());
 | |
| }
 | |
| 
 | |
| void Settings::get(Strings & res, const string & name)
 | |
| {
 | |
|     SettingsMap::iterator i = settings.find(name);
 | |
|     if (i == settings.end()) return;
 | |
|     res = tokenizeString<Strings>(i->second);
 | |
| }
 | |
| 
 | |
| 
 | |
| template<class N> void Settings::get(N & res, const string & name)
 | |
| {
 | |
|     SettingsMap::iterator i = settings.find(name);
 | |
|     if (i == settings.end()) return;
 | |
|     if (!string2Int(i->second, res))
 | |
|         throw Error(format("configuration setting `%1%' should have an integer value") % name);
 | |
| }
 | |
| 
 | |
| 
 | |
| string Settings::pack()
 | |
| {
 | |
|     string s;
 | |
|     foreach (SettingsMap::iterator, i, settings) {
 | |
|         if (i->first.find('\n') != string::npos ||
 | |
|             i->first.find('=') != string::npos ||
 | |
|             i->second.find('\n') != string::npos)
 | |
|             throw Error("illegal option name/value");
 | |
|         s += i->first; s += '='; s += i->second; s += '\n';
 | |
|     }
 | |
|     return s;
 | |
| }
 | |
| 
 | |
| 
 | |
| void Settings::unpack(const string & pack) {
 | |
|     Strings lines = tokenizeString<Strings>(pack, "\n");
 | |
|     foreach (Strings::iterator, i, lines) {
 | |
|         string::size_type eq = i->find('=');
 | |
|         if (eq == string::npos)
 | |
|             throw Error("illegal option name/value");
 | |
|         set(i->substr(0, eq), i->substr(eq + 1));
 | |
|     }
 | |
| }
 | |
| 
 | |
| 
 | |
| Settings::SettingsMap Settings::getOverrides()
 | |
| {
 | |
|     return overrides;
 | |
| }
 | |
| 
 | |
| 
 | |
| const string nixVersion = PACKAGE_VERSION;
 | |
| 
 | |
| 
 | |
| }
 |