2004-04-23 17:16:08 +02:00
|
|
|
|
#include "config.h"
|
|
|
|
|
|
2014-07-10 16:50:51 +02:00
|
|
|
|
#include "util.hh"
|
|
|
|
|
#include "affinity.hh"
|
|
|
|
|
|
2003-06-16 15:33:38 +02:00
|
|
|
|
#include <iostream>
|
2003-09-11 10:31:29 +02:00
|
|
|
|
#include <cerrno>
|
|
|
|
|
#include <cstdio>
|
2008-05-21 13:17:31 +02:00
|
|
|
|
#include <cstdlib>
|
2004-03-22 21:53:49 +01:00
|
|
|
|
#include <sstream>
|
2007-12-14 15:49:35 +01:00
|
|
|
|
#include <cstring>
|
2003-06-16 15:33:38 +02:00
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
#include <sys/wait.h>
|
2012-03-05 20:29:00 +01:00
|
|
|
|
#include <unistd.h>
|
2006-12-02 16:45:51 +01:00
|
|
|
|
#include <fcntl.h>
|
2010-06-24 19:51:13 +02:00
|
|
|
|
#include <limits.h>
|
2006-09-27 23:04:07 +02:00
|
|
|
|
|
2013-03-18 16:13:53 +01:00
|
|
|
|
#ifdef __APPLE__
|
|
|
|
|
#include <sys/syscall.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
2014-08-21 15:31:43 +02:00
|
|
|
|
#ifdef __linux__
|
|
|
|
|
#include <sys/prctl.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
2003-05-26 15:45:00 +02:00
|
|
|
|
|
2006-12-07 17:40:41 +01:00
|
|
|
|
extern char * * environ;
|
|
|
|
|
|
|
|
|
|
|
2006-09-04 23:06:23 +02:00
|
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
|
|
|
2014-03-28 16:59:26 +01:00
|
|
|
|
BaseError::BaseError(const FormatOrString & fs, unsigned int status)
|
2010-12-13 17:53:23 +01:00
|
|
|
|
: status(status)
|
2003-06-27 16:56:12 +02:00
|
|
|
|
{
|
2014-03-28 16:59:26 +01:00
|
|
|
|
err = fs.s;
|
2003-06-27 16:56:12 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-03-28 16:59:26 +01:00
|
|
|
|
BaseError & BaseError::addPrefix(const FormatOrString & fs)
|
2006-03-08 15:11:19 +01:00
|
|
|
|
{
|
2014-03-28 16:59:26 +01:00
|
|
|
|
prefix_ = fs.s + prefix_;
|
2006-03-08 15:11:19 +01:00
|
|
|
|
return *this;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-03-28 16:59:26 +01:00
|
|
|
|
SysError::SysError(const FormatOrString & fs)
|
|
|
|
|
: Error(format("%1%: %2%") % fs.s % strerror(errno))
|
2006-12-05 02:31:45 +01:00
|
|
|
|
, errNo(errno)
|
2003-06-16 15:33:38 +02:00
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
2003-05-26 15:45:00 +02:00
|
|
|
|
|
2004-05-12 11:35:51 +02:00
|
|
|
|
string getEnv(const string & key, const string & def)
|
|
|
|
|
{
|
|
|
|
|
char * value = getenv(key.c_str());
|
|
|
|
|
return value ? string(value) : def;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-10-07 16:37:41 +02:00
|
|
|
|
Path absPath(Path path, Path dir)
|
2003-05-26 15:45:00 +02:00
|
|
|
|
{
|
2003-06-16 15:33:38 +02:00
|
|
|
|
if (path[0] != '/') {
|
2003-05-26 15:45:00 +02:00
|
|
|
|
if (dir == "") {
|
2010-02-10 16:55:50 +01:00
|
|
|
|
#ifdef __GNU__
|
|
|
|
|
/* GNU (aka. GNU/Hurd) doesn't have any limitation on path
|
|
|
|
|
lengths and doesn't define `PATH_MAX'. */
|
|
|
|
|
char *buf = getcwd(NULL, 0);
|
|
|
|
|
if (buf == NULL)
|
|
|
|
|
#else
|
2003-05-26 15:45:00 +02:00
|
|
|
|
char buf[PATH_MAX];
|
|
|
|
|
if (!getcwd(buf, sizeof(buf)))
|
2010-02-10 16:55:50 +01:00
|
|
|
|
#endif
|
2003-06-16 15:33:38 +02:00
|
|
|
|
throw SysError("cannot get cwd");
|
2003-05-26 15:45:00 +02:00
|
|
|
|
dir = buf;
|
2010-02-10 16:55:50 +01:00
|
|
|
|
#ifdef __GNU__
|
|
|
|
|
free(buf);
|
|
|
|
|
#endif
|
2003-05-26 15:45:00 +02:00
|
|
|
|
}
|
2003-06-16 15:33:38 +02:00
|
|
|
|
path = dir + "/" + path;
|
2003-05-26 15:45:00 +02:00
|
|
|
|
}
|
2003-07-07 11:25:26 +02:00
|
|
|
|
return canonPath(path);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2006-01-08 18:16:03 +01:00
|
|
|
|
Path canonPath(const Path & path, bool resolveSymlinks)
|
2003-07-07 11:25:26 +02:00
|
|
|
|
{
|
2003-07-08 21:58:41 +02:00
|
|
|
|
string s;
|
|
|
|
|
|
|
|
|
|
if (path[0] != '/')
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw Error(format("not an absolute path: ‘%1%’") % path);
|
2003-07-08 21:58:41 +02:00
|
|
|
|
|
|
|
|
|
string::const_iterator i = path.begin(), end = path.end();
|
2006-01-08 18:16:03 +01:00
|
|
|
|
string temp;
|
|
|
|
|
|
|
|
|
|
/* Count the number of times we follow a symlink and stop at some
|
|
|
|
|
arbitrary (but high) limit to prevent infinite loops. */
|
|
|
|
|
unsigned int followCount = 0, maxFollow = 1024;
|
2003-07-08 21:58:41 +02:00
|
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
|
|
|
|
|
|
/* Skip slashes. */
|
|
|
|
|
while (i != end && *i == '/') i++;
|
|
|
|
|
if (i == end) break;
|
|
|
|
|
|
|
|
|
|
/* Ignore `.'. */
|
|
|
|
|
if (*i == '.' && (i + 1 == end || i[1] == '/'))
|
|
|
|
|
i++;
|
|
|
|
|
|
|
|
|
|
/* If `..', delete the last component. */
|
2013-01-03 13:00:46 +01:00
|
|
|
|
else if (*i == '.' && i + 1 < end && i[1] == '.' &&
|
2003-07-08 21:58:41 +02:00
|
|
|
|
(i + 2 == end || i[2] == '/'))
|
|
|
|
|
{
|
|
|
|
|
if (!s.empty()) s.erase(s.rfind('/'));
|
|
|
|
|
i += 2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Normal component; copy it. */
|
|
|
|
|
else {
|
|
|
|
|
s += '/';
|
|
|
|
|
while (i != end && *i != '/') s += *i++;
|
2006-01-08 18:16:03 +01:00
|
|
|
|
|
|
|
|
|
/* If s points to a symlink, resolve it and restart (since
|
|
|
|
|
the symlink target might contain new symlinks). */
|
|
|
|
|
if (resolveSymlinks && isLink(s)) {
|
2007-11-29 17:18:24 +01:00
|
|
|
|
if (++followCount >= maxFollow)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw Error(format("infinite symlink recursion in path ‘%1%’") % path);
|
2006-01-08 18:16:03 +01:00
|
|
|
|
temp = absPath(readLink(s), dirOf(s))
|
|
|
|
|
+ string(i, end);
|
|
|
|
|
i = temp.begin(); /* restart */
|
|
|
|
|
end = temp.end();
|
|
|
|
|
s = "";
|
|
|
|
|
}
|
2003-07-08 21:58:41 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return s.empty() ? "/" : s;
|
2003-06-16 15:33:38 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-10-07 16:37:41 +02:00
|
|
|
|
Path dirOf(const Path & path)
|
2003-06-16 15:33:38 +02:00
|
|
|
|
{
|
2006-05-11 04:19:43 +02:00
|
|
|
|
Path::size_type pos = path.rfind('/');
|
2003-07-04 14:18:06 +02:00
|
|
|
|
if (pos == string::npos)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw Error(format("invalid file name ‘%1%’") % path);
|
2006-01-09 15:52:46 +01:00
|
|
|
|
return pos == 0 ? "/" : Path(path, 0, pos);
|
2003-05-26 15:45:00 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-10-07 16:37:41 +02:00
|
|
|
|
string baseNameOf(const Path & path)
|
2003-05-26 15:45:00 +02:00
|
|
|
|
{
|
2006-05-11 04:19:43 +02:00
|
|
|
|
Path::size_type pos = path.rfind('/');
|
2003-07-04 14:18:06 +02:00
|
|
|
|
if (pos == string::npos)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw Error(format("invalid file name ‘%1%’") % path);
|
2003-06-16 15:33:38 +02:00
|
|
|
|
return string(path, pos + 1);
|
2003-05-26 15:45:00 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2013-07-12 14:01:25 +02:00
|
|
|
|
bool isInDir(const Path & path, const Path & dir)
|
|
|
|
|
{
|
|
|
|
|
return path[0] == '/'
|
|
|
|
|
&& string(path, 0, dir.size()) == dir
|
|
|
|
|
&& path.size() >= dir.size() + 2
|
|
|
|
|
&& path[dir.size()] == '/';
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2010-12-13 14:32:58 +01:00
|
|
|
|
struct stat lstat(const Path & path)
|
|
|
|
|
{
|
|
|
|
|
struct stat st;
|
|
|
|
|
if (lstat(path.c_str(), &st))
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("getting status of ‘%1%’") % path);
|
2010-12-13 14:32:58 +01:00
|
|
|
|
return st;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-10-07 16:37:41 +02:00
|
|
|
|
bool pathExists(const Path & path)
|
2003-07-08 15:22:08 +02:00
|
|
|
|
{
|
|
|
|
|
int res;
|
|
|
|
|
struct stat st;
|
2004-02-06 11:59:06 +01:00
|
|
|
|
res = lstat(path.c_str(), &st);
|
2003-07-08 15:22:08 +02:00
|
|
|
|
if (!res) return true;
|
2004-08-04 11:25:21 +02:00
|
|
|
|
if (errno != ENOENT && errno != ENOTDIR)
|
2003-07-08 15:22:08 +02:00
|
|
|
|
throw SysError(format("getting status of %1%") % path);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-01-05 17:26:43 +01:00
|
|
|
|
Path readLink(const Path & path)
|
|
|
|
|
{
|
2007-09-17 18:08:24 +02:00
|
|
|
|
checkInterrupt();
|
2010-12-13 14:32:58 +01:00
|
|
|
|
struct stat st = lstat(path);
|
2004-01-05 17:26:43 +01:00
|
|
|
|
if (!S_ISLNK(st.st_mode))
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw Error(format("‘%1%’ is not a symlink") % path);
|
2004-01-05 17:26:43 +01:00
|
|
|
|
char buf[st.st_size];
|
|
|
|
|
if (readlink(path.c_str(), buf, st.st_size) != st.st_size)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("reading symbolic link ‘%1%’") % path);
|
2004-01-05 17:26:43 +01:00
|
|
|
|
return string(buf, st.st_size);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2005-02-01 14:48:46 +01:00
|
|
|
|
bool isLink(const Path & path)
|
|
|
|
|
{
|
2010-12-13 14:32:58 +01:00
|
|
|
|
struct stat st = lstat(path);
|
2005-02-01 14:48:46 +01:00
|
|
|
|
return S_ISLNK(st.st_mode);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-08-01 16:37:47 +02:00
|
|
|
|
DirEntries readDirectory(const Path & path)
|
2003-11-19 18:27:16 +01:00
|
|
|
|
{
|
2014-08-01 16:37:47 +02:00
|
|
|
|
DirEntries entries;
|
|
|
|
|
entries.reserve(64);
|
2003-11-19 18:27:16 +01:00
|
|
|
|
|
|
|
|
|
AutoCloseDir dir = opendir(path.c_str());
|
2014-08-20 17:00:17 +02:00
|
|
|
|
if (!dir) throw SysError(format("opening directory ‘%1%’") % path);
|
2003-11-19 18:27:16 +01:00
|
|
|
|
|
|
|
|
|
struct dirent * dirent;
|
|
|
|
|
while (errno = 0, dirent = readdir(dir)) { /* sic */
|
2004-01-15 21:23:55 +01:00
|
|
|
|
checkInterrupt();
|
2003-11-19 18:27:16 +01:00
|
|
|
|
string name = dirent->d_name;
|
|
|
|
|
if (name == "." || name == "..") continue;
|
2014-08-01 17:30:51 +02:00
|
|
|
|
entries.emplace_back(name, dirent->d_ino, dirent->d_type);
|
2003-11-19 18:27:16 +01:00
|
|
|
|
}
|
2014-08-20 17:00:17 +02:00
|
|
|
|
if (errno) throw SysError(format("reading directory ‘%1%’") % path);
|
2003-11-19 18:27:16 +01:00
|
|
|
|
|
2014-08-01 16:37:47 +02:00
|
|
|
|
return entries;
|
2003-11-19 18:27:16 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-10-03 22:37:51 +02:00
|
|
|
|
unsigned char getFileType(const Path & path)
|
|
|
|
|
{
|
|
|
|
|
struct stat st = lstat(path);
|
|
|
|
|
if (S_ISDIR(st.st_mode)) return DT_DIR;
|
|
|
|
|
if (S_ISLNK(st.st_mode)) return DT_LNK;
|
|
|
|
|
if (S_ISREG(st.st_mode)) return DT_REG;
|
|
|
|
|
return DT_UNKNOWN;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2005-02-01 23:07:48 +01:00
|
|
|
|
string readFile(int fd)
|
|
|
|
|
{
|
|
|
|
|
struct stat st;
|
|
|
|
|
if (fstat(fd, &st) == -1)
|
|
|
|
|
throw SysError("statting file");
|
2013-01-03 13:00:46 +01:00
|
|
|
|
|
2006-10-30 12:56:09 +01:00
|
|
|
|
unsigned char * buf = new unsigned char[st.st_size];
|
|
|
|
|
AutoDeleteArray<unsigned char> d(buf);
|
2005-02-01 23:07:48 +01:00
|
|
|
|
readFull(fd, buf, st.st_size);
|
|
|
|
|
|
|
|
|
|
return string((char *) buf, st.st_size);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2012-08-20 21:27:30 +02:00
|
|
|
|
string readFile(const Path & path, bool drain)
|
2005-02-01 23:07:48 +01:00
|
|
|
|
{
|
|
|
|
|
AutoCloseFD fd = open(path.c_str(), O_RDONLY);
|
|
|
|
|
if (fd == -1)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("opening file ‘%1%’") % path);
|
2012-08-20 21:27:30 +02:00
|
|
|
|
return drain ? drainFD(fd) : readFile(fd);
|
2005-02-01 23:07:48 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2010-02-24 13:16:50 +01:00
|
|
|
|
void writeFile(const Path & path, const string & s)
|
2005-02-09 10:50:29 +01:00
|
|
|
|
{
|
|
|
|
|
AutoCloseFD fd = open(path.c_str(), O_WRONLY | O_TRUNC | O_CREAT, 0666);
|
|
|
|
|
if (fd == -1)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("opening file ‘%1%’") % path);
|
2012-02-09 18:27:45 +01:00
|
|
|
|
writeFull(fd, (unsigned char *) s.data(), s.size());
|
2005-02-09 10:50:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2009-03-28 20:29:55 +01:00
|
|
|
|
string readLine(int fd)
|
|
|
|
|
{
|
|
|
|
|
string s;
|
|
|
|
|
while (1) {
|
|
|
|
|
checkInterrupt();
|
|
|
|
|
char ch;
|
|
|
|
|
ssize_t rd = read(fd, &ch, 1);
|
|
|
|
|
if (rd == -1) {
|
|
|
|
|
if (errno != EINTR)
|
|
|
|
|
throw SysError("reading a line");
|
|
|
|
|
} else if (rd == 0)
|
2012-08-01 17:19:24 +02:00
|
|
|
|
throw EndOfFile("unexpected EOF reading a line");
|
2009-03-28 20:29:55 +01:00
|
|
|
|
else {
|
|
|
|
|
if (ch == '\n') return s;
|
|
|
|
|
s += ch;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void writeLine(int fd, string s)
|
|
|
|
|
{
|
|
|
|
|
s += '\n';
|
2012-02-09 18:27:45 +01:00
|
|
|
|
writeFull(fd, (const unsigned char *) s.data(), s.size());
|
2009-03-28 20:29:55 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2012-08-02 04:34:46 +02:00
|
|
|
|
static void _deletePath(const Path & path, unsigned long long & bytesFreed)
|
2003-06-23 16:40:49 +02:00
|
|
|
|
{
|
2004-01-15 21:23:55 +01:00
|
|
|
|
checkInterrupt();
|
|
|
|
|
|
2004-03-22 22:42:28 +01:00
|
|
|
|
printMsg(lvlVomit, format("%1%") % path);
|
2003-08-08 16:55:56 +02:00
|
|
|
|
|
2010-12-13 14:32:58 +01:00
|
|
|
|
struct stat st = lstat(path);
|
2003-06-23 16:40:49 +02:00
|
|
|
|
|
2012-08-02 04:34:46 +02:00
|
|
|
|
if (!S_ISDIR(st.st_mode) && st.st_nlink == 1)
|
|
|
|
|
bytesFreed += st.st_blocks * 512;
|
2005-12-15 22:11:39 +01:00
|
|
|
|
|
2003-06-23 16:40:49 +02:00
|
|
|
|
if (S_ISDIR(st.st_mode)) {
|
2013-01-03 13:00:46 +01:00
|
|
|
|
/* Make the directory writable. */
|
|
|
|
|
if (!(st.st_mode & S_IWUSR)) {
|
|
|
|
|
if (chmod(path.c_str(), st.st_mode | S_IWUSR) == -1)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("making ‘%1%’ writable") % path);
|
2013-01-03 13:00:46 +01:00
|
|
|
|
}
|
2003-08-22 22:12:44 +02:00
|
|
|
|
|
2014-08-01 16:37:47 +02:00
|
|
|
|
for (auto & i : readDirectory(path))
|
|
|
|
|
_deletePath(path + "/" + i.name, bytesFreed);
|
2003-06-23 16:40:49 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (remove(path.c_str()) == -1)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("cannot unlink ‘%1%’") % path);
|
2003-08-22 22:12:44 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-03-22 22:42:28 +01:00
|
|
|
|
void deletePath(const Path & path)
|
2005-12-15 22:11:39 +01:00
|
|
|
|
{
|
2012-08-02 04:34:46 +02:00
|
|
|
|
unsigned long long dummy;
|
|
|
|
|
deletePath(path, dummy);
|
2005-12-15 22:11:39 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2012-08-02 04:34:46 +02:00
|
|
|
|
void deletePath(const Path & path, unsigned long long & bytesFreed)
|
2004-03-22 22:42:28 +01:00
|
|
|
|
{
|
|
|
|
|
startNest(nest, lvlDebug,
|
2014-08-20 17:00:17 +02:00
|
|
|
|
format("recursively deleting path ‘%1%’") % path);
|
2005-12-15 22:11:39 +01:00
|
|
|
|
bytesFreed = 0;
|
2012-08-02 04:34:46 +02:00
|
|
|
|
_deletePath(path, bytesFreed);
|
2004-03-22 22:42:28 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2008-03-27 14:45:17 +01:00
|
|
|
|
static Path tempName(Path tmpRoot, const Path & prefix, bool includePid,
|
|
|
|
|
int & counter)
|
2003-10-02 13:55:38 +02:00
|
|
|
|
{
|
2008-03-27 14:45:17 +01:00
|
|
|
|
tmpRoot = canonPath(tmpRoot.empty() ? getEnv("TMPDIR", "/tmp") : tmpRoot, true);
|
|
|
|
|
if (includePid)
|
|
|
|
|
return (format("%1%/%2%-%3%-%4%") % tmpRoot % prefix % getpid() % counter++).str();
|
|
|
|
|
else
|
|
|
|
|
return (format("%1%/%2%-%3%") % tmpRoot % prefix % counter++).str();
|
2003-10-02 13:55:38 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2008-03-27 14:45:17 +01:00
|
|
|
|
Path createTempDir(const Path & tmpRoot, const Path & prefix,
|
2012-07-26 21:04:40 +02:00
|
|
|
|
bool includePid, bool useGlobalCounter, mode_t mode)
|
2003-10-02 13:55:38 +02:00
|
|
|
|
{
|
2008-03-27 14:45:17 +01:00
|
|
|
|
static int globalCounter = 0;
|
|
|
|
|
int localCounter = 0;
|
|
|
|
|
int & counter(useGlobalCounter ? globalCounter : localCounter);
|
2013-01-03 13:00:46 +01:00
|
|
|
|
|
2003-10-02 13:55:38 +02:00
|
|
|
|
while (1) {
|
2004-01-15 21:23:55 +01:00
|
|
|
|
checkInterrupt();
|
2013-01-03 13:00:46 +01:00
|
|
|
|
Path tmpDir = tempName(tmpRoot, prefix, includePid, counter);
|
|
|
|
|
if (mkdir(tmpDir.c_str(), mode) == 0) {
|
|
|
|
|
/* Explicitly set the group of the directory. This is to
|
|
|
|
|
work around around problems caused by BSD's group
|
|
|
|
|
ownership semantics (directories inherit the group of
|
|
|
|
|
the parent). For instance, the group of /tmp on
|
|
|
|
|
FreeBSD is "wheel", so all directories created in /tmp
|
|
|
|
|
will be owned by "wheel"; but if the user is not in
|
|
|
|
|
"wheel", then "tar" will fail to unpack archives that
|
|
|
|
|
have the setgid bit set on directories. */
|
|
|
|
|
if (chown(tmpDir.c_str(), (uid_t) -1, getegid()) != 0)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("setting group of directory ‘%1%’") % tmpDir);
|
2013-01-03 13:00:46 +01:00
|
|
|
|
return tmpDir;
|
|
|
|
|
}
|
|
|
|
|
if (errno != EEXIST)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("creating directory ‘%1%’") % tmpDir);
|
2003-10-02 13:55:38 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2007-10-27 02:46:59 +02:00
|
|
|
|
Paths createDirs(const Path & path)
|
2005-03-24 18:46:38 +01:00
|
|
|
|
{
|
2008-06-09 15:52:45 +02:00
|
|
|
|
Paths created;
|
|
|
|
|
if (path == "/") return created;
|
2010-12-13 14:32:58 +01:00
|
|
|
|
|
|
|
|
|
struct stat st;
|
|
|
|
|
if (lstat(path.c_str(), &st) == -1) {
|
2008-06-09 15:52:45 +02:00
|
|
|
|
created = createDirs(dirOf(path));
|
2010-12-13 14:32:58 +01:00
|
|
|
|
if (mkdir(path.c_str(), 0777) == -1 && errno != EEXIST)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("creating directory ‘%1%’") % path);
|
2010-12-13 14:32:58 +01:00
|
|
|
|
st = lstat(path);
|
2007-10-27 02:46:59 +02:00
|
|
|
|
created.push_back(path);
|
|
|
|
|
}
|
2010-12-13 14:32:58 +01:00
|
|
|
|
|
2014-10-03 16:53:28 +02:00
|
|
|
|
if (S_ISLNK(st.st_mode) && stat(path.c_str(), &st) == -1)
|
|
|
|
|
throw SysError(format("statting symlink ‘%1%’") % path);
|
|
|
|
|
|
2014-08-20 17:00:17 +02:00
|
|
|
|
if (!S_ISDIR(st.st_mode)) throw Error(format("‘%1%’ is not a directory") % path);
|
2013-01-03 13:00:46 +01:00
|
|
|
|
|
2007-10-27 02:46:59 +02:00
|
|
|
|
return created;
|
2005-03-24 18:46:38 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-02-27 23:17:53 +01:00
|
|
|
|
void createSymlink(const Path & target, const Path & link)
|
|
|
|
|
{
|
|
|
|
|
if (symlink(target.c_str(), link.c_str()))
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("creating symlink from ‘%1%’ to ‘%2%’") % link % target);
|
2014-02-27 23:17:53 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-03-22 21:53:49 +01:00
|
|
|
|
LogType logType = ltPretty;
|
2004-08-18 14:19:06 +02:00
|
|
|
|
Verbosity verbosity = lvlInfo;
|
2003-07-24 10:53:43 +02:00
|
|
|
|
|
2003-07-04 14:18:06 +02:00
|
|
|
|
static int nestingLevel = 0;
|
|
|
|
|
|
|
|
|
|
|
2003-11-09 11:35:45 +01:00
|
|
|
|
Nest::Nest()
|
2003-07-04 14:18:06 +02:00
|
|
|
|
{
|
2003-11-09 11:35:45 +01:00
|
|
|
|
nest = false;
|
2003-07-04 14:18:06 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Nest::~Nest()
|
|
|
|
|
{
|
2004-03-22 22:42:28 +01:00
|
|
|
|
close();
|
2004-03-22 21:53:49 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static string escVerbosity(Verbosity level)
|
|
|
|
|
{
|
2006-08-26 18:48:01 +02:00
|
|
|
|
return int2String((int) level);
|
2003-07-04 14:18:06 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-03-28 16:59:26 +01:00
|
|
|
|
void Nest::open(Verbosity level, const FormatOrString & fs)
|
2003-11-09 11:35:45 +01:00
|
|
|
|
{
|
|
|
|
|
if (level <= verbosity) {
|
2004-03-22 21:53:49 +01:00
|
|
|
|
if (logType == ltEscapes)
|
2006-09-04 23:06:23 +02:00
|
|
|
|
std::cerr << "\033[" << escVerbosity(level) << "p"
|
2014-03-28 16:59:26 +01:00
|
|
|
|
<< fs.s << "\n";
|
2004-03-22 22:42:28 +01:00
|
|
|
|
else
|
2014-03-28 16:59:26 +01:00
|
|
|
|
printMsg_(level, fs);
|
2003-11-09 11:35:45 +01:00
|
|
|
|
nest = true;
|
|
|
|
|
nestingLevel++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-03-22 22:42:28 +01:00
|
|
|
|
void Nest::close()
|
|
|
|
|
{
|
|
|
|
|
if (nest) {
|
|
|
|
|
nestingLevel--;
|
|
|
|
|
if (logType == ltEscapes)
|
2006-09-04 23:06:23 +02:00
|
|
|
|
std::cerr << "\033[q";
|
2004-03-27 16:33:19 +01:00
|
|
|
|
nest = false;
|
2004-03-22 22:42:28 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-03-28 16:59:26 +01:00
|
|
|
|
void printMsg_(Verbosity level, const FormatOrString & fs)
|
2003-07-04 14:18:06 +02:00
|
|
|
|
{
|
2004-01-15 21:23:55 +01:00
|
|
|
|
checkInterrupt();
|
2003-07-24 10:53:43 +02:00
|
|
|
|
if (level > verbosity) return;
|
2004-03-22 21:53:49 +01:00
|
|
|
|
string prefix;
|
|
|
|
|
if (logType == ltPretty)
|
|
|
|
|
for (int i = 0; i < nestingLevel; i++)
|
|
|
|
|
prefix += "| ";
|
|
|
|
|
else if (logType == ltEscapes && level != lvlInfo)
|
|
|
|
|
prefix = "\033[" + escVerbosity(level) + "s";
|
2014-03-28 16:59:26 +01:00
|
|
|
|
string s = (format("%1%%2%\n") % prefix % fs.s).str();
|
2014-08-20 16:01:16 +02:00
|
|
|
|
if (!isatty(STDERR_FILENO)) s = filterANSIEscapes(s);
|
2012-11-15 15:01:02 +01:00
|
|
|
|
writeToStderr(s);
|
2003-06-23 16:40:49 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-03-28 16:59:26 +01:00
|
|
|
|
void warnOnce(bool & haveWarned, const FormatOrString & fs)
|
2006-08-29 17:29:38 +02:00
|
|
|
|
{
|
|
|
|
|
if (!haveWarned) {
|
2014-03-28 16:59:26 +01:00
|
|
|
|
printMsg(lvlError, format("warning: %1%") % fs.s);
|
2006-08-29 17:29:38 +02:00
|
|
|
|
haveWarned = true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-08-01 19:29:03 +02:00
|
|
|
|
static void defaultWriteToStderr(const unsigned char * buf, size_t count)
|
|
|
|
|
{
|
|
|
|
|
writeFull(STDERR_FILENO, buf, count);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2012-11-15 15:01:02 +01:00
|
|
|
|
void writeToStderr(const string & s)
|
|
|
|
|
{
|
|
|
|
|
try {
|
2014-08-01 19:29:03 +02:00
|
|
|
|
auto p = _writeToStderr;
|
|
|
|
|
if (!p) p = defaultWriteToStderr;
|
|
|
|
|
p((const unsigned char *) s.data(), s.size());
|
2012-11-15 15:01:02 +01:00
|
|
|
|
} catch (SysError & e) {
|
|
|
|
|
/* Ignore failing writes to stderr if we're in an exception
|
|
|
|
|
handler, otherwise throw an exception. We need to ignore
|
|
|
|
|
write errors in exception handlers to ensure that cleanup
|
|
|
|
|
code runs to completion if the other side of stderr has
|
|
|
|
|
been closed unexpectedly. */
|
|
|
|
|
if (!std::uncaught_exception()) throw;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void (*_writeToStderr) (const unsigned char * buf, size_t count) = defaultWriteToStderr;
|
2006-12-03 03:08:13 +01:00
|
|
|
|
|
|
|
|
|
|
2003-07-20 23:11:43 +02:00
|
|
|
|
void readFull(int fd, unsigned char * buf, size_t count)
|
|
|
|
|
{
|
|
|
|
|
while (count) {
|
2004-01-15 21:23:55 +01:00
|
|
|
|
checkInterrupt();
|
2003-07-20 23:11:43 +02:00
|
|
|
|
ssize_t res = read(fd, (char *) buf, count);
|
2004-05-11 15:48:25 +02:00
|
|
|
|
if (res == -1) {
|
|
|
|
|
if (errno == EINTR) continue;
|
|
|
|
|
throw SysError("reading from file");
|
|
|
|
|
}
|
2006-12-04 18:17:13 +01:00
|
|
|
|
if (res == 0) throw EndOfFile("unexpected end-of-file");
|
2003-07-20 23:11:43 +02:00
|
|
|
|
count -= res;
|
|
|
|
|
buf += res;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void writeFull(int fd, const unsigned char * buf, size_t count)
|
|
|
|
|
{
|
|
|
|
|
while (count) {
|
2004-01-15 21:23:55 +01:00
|
|
|
|
checkInterrupt();
|
2003-07-20 23:11:43 +02:00
|
|
|
|
ssize_t res = write(fd, (char *) buf, count);
|
2004-05-11 15:48:25 +02:00
|
|
|
|
if (res == -1) {
|
|
|
|
|
if (errno == EINTR) continue;
|
|
|
|
|
throw SysError("writing to file");
|
|
|
|
|
}
|
2003-07-20 23:11:43 +02:00
|
|
|
|
count -= res;
|
|
|
|
|
buf += res;
|
|
|
|
|
}
|
|
|
|
|
}
|
2003-10-22 12:48:22 +02:00
|
|
|
|
|
|
|
|
|
|
2006-07-20 14:17:25 +02:00
|
|
|
|
string drainFD(int fd)
|
|
|
|
|
{
|
|
|
|
|
string result;
|
|
|
|
|
unsigned char buffer[4096];
|
|
|
|
|
while (1) {
|
2007-08-12 02:29:28 +02:00
|
|
|
|
checkInterrupt();
|
2006-07-20 14:17:25 +02:00
|
|
|
|
ssize_t rd = read(fd, buffer, sizeof buffer);
|
|
|
|
|
if (rd == -1) {
|
|
|
|
|
if (errno != EINTR)
|
|
|
|
|
throw SysError("reading from file");
|
|
|
|
|
}
|
|
|
|
|
else if (rd == 0) break;
|
|
|
|
|
else result.append((char *) buffer, rd);
|
|
|
|
|
}
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
2007-10-27 02:46:59 +02:00
|
|
|
|
AutoDelete::AutoDelete(const string & p, bool recursive) : path(p)
|
2003-10-22 12:48:22 +02:00
|
|
|
|
{
|
|
|
|
|
del = true;
|
2007-10-27 02:46:59 +02:00
|
|
|
|
this->recursive = recursive;
|
2003-10-22 12:48:22 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
AutoDelete::~AutoDelete()
|
|
|
|
|
{
|
2007-10-27 02:46:59 +02:00
|
|
|
|
try {
|
2008-05-21 13:17:31 +02:00
|
|
|
|
if (del) {
|
2007-10-27 02:46:59 +02:00
|
|
|
|
if (recursive)
|
|
|
|
|
deletePath(path);
|
|
|
|
|
else {
|
|
|
|
|
if (remove(path.c_str()) == -1)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("cannot unlink ‘%1%’") % path);
|
2007-10-27 02:46:59 +02:00
|
|
|
|
}
|
2008-05-21 13:17:31 +02:00
|
|
|
|
}
|
2007-10-27 02:46:59 +02:00
|
|
|
|
} catch (...) {
|
|
|
|
|
ignoreException();
|
|
|
|
|
}
|
2003-10-22 12:48:22 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void AutoDelete::cancel()
|
|
|
|
|
{
|
|
|
|
|
del = false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
AutoCloseFD::AutoCloseFD()
|
|
|
|
|
{
|
|
|
|
|
fd = -1;
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
AutoCloseFD::AutoCloseFD(int fd)
|
|
|
|
|
{
|
|
|
|
|
this->fd = fd;
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2005-01-31 11:27:25 +01:00
|
|
|
|
AutoCloseFD::AutoCloseFD(const AutoCloseFD & fd)
|
|
|
|
|
{
|
2013-08-10 23:36:16 +02:00
|
|
|
|
/* Copying an AutoCloseFD isn't allowed (who should get to close
|
|
|
|
|
it?). But as an edge case, allow copying of closed
|
2008-08-02 14:54:35 +02:00
|
|
|
|
AutoCloseFDs. This is necessary due to tiresome reasons
|
|
|
|
|
involving copy constructor use on default object values in STL
|
|
|
|
|
containers (like when you do `map[value]' where value isn't in
|
|
|
|
|
the map yet). */
|
|
|
|
|
this->fd = fd.fd;
|
|
|
|
|
if (this->fd != -1) abort();
|
2005-01-31 11:27:25 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
AutoCloseFD::~AutoCloseFD()
|
|
|
|
|
{
|
2004-06-15 15:49:42 +02:00
|
|
|
|
try {
|
|
|
|
|
close();
|
2007-05-01 17:16:17 +02:00
|
|
|
|
} catch (...) {
|
|
|
|
|
ignoreException();
|
2004-06-15 15:49:42 +02:00
|
|
|
|
}
|
2003-10-22 12:48:22 +02:00
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
void AutoCloseFD::operator =(int fd)
|
|
|
|
|
{
|
2004-06-15 15:49:42 +02:00
|
|
|
|
if (this->fd != fd) close();
|
2003-10-22 12:48:22 +02:00
|
|
|
|
this->fd = fd;
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2005-01-31 11:27:25 +01:00
|
|
|
|
AutoCloseFD::operator int() const
|
2003-10-22 12:48:22 +02:00
|
|
|
|
{
|
|
|
|
|
return fd;
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2004-06-15 15:49:42 +02:00
|
|
|
|
void AutoCloseFD::close()
|
|
|
|
|
{
|
|
|
|
|
if (fd != -1) {
|
|
|
|
|
if (::close(fd) == -1)
|
|
|
|
|
/* This should never happen. */
|
2012-11-15 13:55:02 +01:00
|
|
|
|
throw SysError(format("closing file descriptor %1%") % fd);
|
2004-06-15 15:49:42 +02:00
|
|
|
|
fd = -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2004-06-15 15:49:42 +02:00
|
|
|
|
bool AutoCloseFD::isOpen()
|
|
|
|
|
{
|
|
|
|
|
return fd != -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2005-01-27 13:19:25 +01:00
|
|
|
|
/* Pass responsibility for closing this fd to the caller. */
|
|
|
|
|
int AutoCloseFD::borrow()
|
|
|
|
|
{
|
|
|
|
|
int oldFD = fd;
|
|
|
|
|
fd = -1;
|
|
|
|
|
return oldFD;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-06-15 15:49:42 +02:00
|
|
|
|
void Pipe::create()
|
|
|
|
|
{
|
|
|
|
|
int fds[2];
|
|
|
|
|
if (pipe(fds) != 0) throw SysError("creating pipe");
|
|
|
|
|
readSide = fds[0];
|
|
|
|
|
writeSide = fds[1];
|
2012-03-05 20:29:00 +01:00
|
|
|
|
closeOnExec(readSide);
|
|
|
|
|
closeOnExec(writeSide);
|
2004-06-15 15:49:42 +02:00
|
|
|
|
}
|
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
AutoCloseDir::AutoCloseDir()
|
|
|
|
|
{
|
|
|
|
|
dir = 0;
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
AutoCloseDir::AutoCloseDir(DIR * dir)
|
|
|
|
|
{
|
|
|
|
|
this->dir = dir;
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
AutoCloseDir::~AutoCloseDir()
|
|
|
|
|
{
|
2011-12-22 16:55:53 +01:00
|
|
|
|
close();
|
2003-10-22 12:48:22 +02:00
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
void AutoCloseDir::operator =(DIR * dir)
|
|
|
|
|
{
|
|
|
|
|
this->dir = dir;
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2003-10-22 12:48:22 +02:00
|
|
|
|
AutoCloseDir::operator DIR *()
|
|
|
|
|
{
|
|
|
|
|
return dir;
|
|
|
|
|
}
|
|
|
|
|
|
2004-01-15 21:23:55 +01:00
|
|
|
|
|
2011-12-22 16:55:53 +01:00
|
|
|
|
void AutoCloseDir::close()
|
|
|
|
|
{
|
|
|
|
|
if (dir) {
|
2013-01-03 13:00:46 +01:00
|
|
|
|
closedir(dir);
|
|
|
|
|
dir = 0;
|
2011-12-22 16:55:53 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Pid::Pid()
|
2014-07-10 21:48:21 +02:00
|
|
|
|
: pid(-1), separatePG(false), killSignal(SIGKILL)
|
2004-06-22 11:51:44 +02:00
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-07-10 16:50:51 +02:00
|
|
|
|
Pid::Pid(pid_t pid)
|
2014-07-10 21:48:21 +02:00
|
|
|
|
: pid(pid), separatePG(false), killSignal(SIGKILL)
|
2014-07-10 16:50:51 +02:00
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
Pid::~Pid()
|
|
|
|
|
{
|
|
|
|
|
kill();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void Pid::operator =(pid_t pid)
|
|
|
|
|
{
|
|
|
|
|
if (this->pid != pid) kill();
|
|
|
|
|
this->pid = pid;
|
2007-03-19 13:48:45 +01:00
|
|
|
|
killSignal = SIGKILL; // reset signal to default
|
2004-06-22 11:51:44 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Pid::operator pid_t()
|
|
|
|
|
{
|
|
|
|
|
return pid;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-08-04 17:27:45 +02:00
|
|
|
|
void Pid::kill(bool quiet)
|
2004-06-22 11:51:44 +02:00
|
|
|
|
{
|
2012-11-09 18:00:33 +01:00
|
|
|
|
if (pid == -1 || pid == 0) return;
|
|
|
|
|
|
2014-08-04 17:27:45 +02:00
|
|
|
|
if (!quiet)
|
|
|
|
|
printMsg(lvlError, format("killing process %1%") % pid);
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2007-03-19 13:48:45 +01:00
|
|
|
|
/* Send the requested signal to the child. If it has its own
|
|
|
|
|
process group, send the signal to every process in the child
|
|
|
|
|
process group (which hopefully includes *all* its children). */
|
|
|
|
|
if (::kill(separatePG ? -pid : pid, killSignal) != 0)
|
2004-06-25 17:36:09 +02:00
|
|
|
|
printMsg(lvlError, (SysError(format("killing process %1%") % pid).msg()));
|
|
|
|
|
|
|
|
|
|
/* Wait until the child dies, disregarding the exit status. */
|
|
|
|
|
int status;
|
2006-12-03 03:12:26 +01:00
|
|
|
|
while (waitpid(pid, &status, 0) == -1) {
|
|
|
|
|
checkInterrupt();
|
2012-06-25 21:45:16 +02:00
|
|
|
|
if (errno != EINTR) {
|
|
|
|
|
printMsg(lvlError,
|
|
|
|
|
(SysError(format("waiting for process %1%") % pid).msg()));
|
|
|
|
|
break;
|
|
|
|
|
}
|
2006-12-03 03:12:26 +01:00
|
|
|
|
}
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
|
|
|
|
pid = -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
int Pid::wait(bool block)
|
|
|
|
|
{
|
2013-06-20 11:55:15 +02:00
|
|
|
|
assert(pid != -1);
|
2004-06-22 11:51:44 +02:00
|
|
|
|
while (1) {
|
|
|
|
|
int status;
|
|
|
|
|
int res = waitpid(pid, &status, block ? 0 : WNOHANG);
|
|
|
|
|
if (res == pid) {
|
|
|
|
|
pid = -1;
|
|
|
|
|
return status;
|
|
|
|
|
}
|
|
|
|
|
if (res == 0 && !block) return -1;
|
|
|
|
|
if (errno != EINTR)
|
|
|
|
|
throw SysError("cannot get child exit status");
|
2006-12-04 18:17:13 +01:00
|
|
|
|
checkInterrupt();
|
2004-06-22 11:51:44 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void Pid::setSeparatePG(bool separatePG)
|
|
|
|
|
{
|
|
|
|
|
this->separatePG = separatePG;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2007-03-19 13:48:45 +01:00
|
|
|
|
void Pid::setKillSignal(int signal)
|
|
|
|
|
{
|
|
|
|
|
this->killSignal = signal;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2006-12-07 01:16:07 +01:00
|
|
|
|
void killUser(uid_t uid)
|
|
|
|
|
{
|
2014-08-20 17:00:17 +02:00
|
|
|
|
debug(format("killing all processes running under uid ‘%1%’") % uid);
|
2006-12-07 01:16:07 +01:00
|
|
|
|
|
|
|
|
|
assert(uid != 0); /* just to be safe... */
|
|
|
|
|
|
|
|
|
|
/* The system call kill(-1, sig) sends the signal `sig' to all
|
|
|
|
|
users to which the current process can send signals. So we
|
|
|
|
|
fork a process, switch to uid, and send a mass kill. */
|
|
|
|
|
|
2014-07-10 16:50:51 +02:00
|
|
|
|
Pid pid = startProcess([&]() {
|
2006-12-07 01:16:07 +01:00
|
|
|
|
|
2014-07-10 16:50:51 +02:00
|
|
|
|
if (setuid(uid) == -1)
|
|
|
|
|
throw SysError("setting uid");
|
2006-12-07 01:16:07 +01:00
|
|
|
|
|
2014-07-10 16:50:51 +02:00
|
|
|
|
while (true) {
|
2013-03-18 16:13:53 +01:00
|
|
|
|
#ifdef __APPLE__
|
2014-07-10 16:50:51 +02:00
|
|
|
|
/* OSX's kill syscall takes a third parameter that, among
|
|
|
|
|
other things, determines if kill(-1, signo) affects the
|
|
|
|
|
calling process. In the OSX libc, it's set to true,
|
|
|
|
|
which means "follow POSIX", which we don't want here
|
2013-03-18 16:13:53 +01:00
|
|
|
|
*/
|
2014-07-10 16:50:51 +02:00
|
|
|
|
if (syscall(SYS_kill, -1, SIGKILL, false) == 0) break;
|
2013-03-18 16:13:53 +01:00
|
|
|
|
#else
|
2014-07-10 16:50:51 +02:00
|
|
|
|
if (kill(-1, SIGKILL) == 0) break;
|
2013-03-18 16:13:53 +01:00
|
|
|
|
#endif
|
2014-07-10 16:50:51 +02:00
|
|
|
|
if (errno == ESRCH) break; /* no more processes */
|
|
|
|
|
if (errno != EINTR)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("cannot kill processes for uid ‘%1%’") % uid);
|
2006-12-07 01:16:07 +01:00
|
|
|
|
}
|
2014-07-10 16:50:51 +02:00
|
|
|
|
|
2012-11-09 16:42:10 +01:00
|
|
|
|
_exit(0);
|
2014-07-10 16:50:51 +02:00
|
|
|
|
});
|
2013-01-03 13:00:46 +01:00
|
|
|
|
|
2010-03-19 12:36:34 +01:00
|
|
|
|
int status = pid.wait(true);
|
|
|
|
|
if (status != 0)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw Error(format("cannot kill processes for uid ‘%1%’: %2%") % uid % statusToString(status));
|
2006-12-07 01:16:07 +01:00
|
|
|
|
|
|
|
|
|
/* !!! We should really do some check to make sure that there are
|
|
|
|
|
no processes left running under `uid', but there is no portable
|
|
|
|
|
way to do so (I think). The most reliable way may be `ps -eo
|
|
|
|
|
uid | grep -q $uid'. */
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
2006-07-20 14:17:25 +02:00
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
2014-08-21 15:31:43 +02:00
|
|
|
|
pid_t startProcess(std::function<void()> fun,
|
|
|
|
|
bool dieWithParent, const string & errorPrefix)
|
2014-07-10 16:50:51 +02:00
|
|
|
|
{
|
|
|
|
|
pid_t pid = fork();
|
|
|
|
|
if (pid == -1) throw SysError("unable to fork");
|
|
|
|
|
|
|
|
|
|
if (pid == 0) {
|
2014-08-01 19:29:03 +02:00
|
|
|
|
_writeToStderr = 0;
|
2014-07-10 16:50:51 +02:00
|
|
|
|
try {
|
2014-08-21 15:31:43 +02:00
|
|
|
|
#if __linux__
|
|
|
|
|
if (dieWithParent && prctl(PR_SET_PDEATHSIG, SIGKILL) == -1)
|
|
|
|
|
throw SysError("setting death signal");
|
|
|
|
|
#endif
|
2014-07-10 16:50:51 +02:00
|
|
|
|
restoreAffinity();
|
|
|
|
|
fun();
|
|
|
|
|
} catch (std::exception & e) {
|
2014-07-23 19:11:26 +02:00
|
|
|
|
try {
|
|
|
|
|
std::cerr << errorPrefix << e.what() << "\n";
|
|
|
|
|
} catch (...) { }
|
|
|
|
|
} catch (...) { }
|
2014-07-10 16:50:51 +02:00
|
|
|
|
_exit(1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return pid;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2007-02-21 15:31:42 +01:00
|
|
|
|
string runProgram(Path program, bool searchPath, const Strings & args)
|
2006-07-20 14:17:25 +02:00
|
|
|
|
{
|
2007-08-12 02:29:28 +02:00
|
|
|
|
checkInterrupt();
|
2012-11-09 16:58:51 +01:00
|
|
|
|
|
|
|
|
|
std::vector<const char *> cargs; /* careful with c_str()! */
|
|
|
|
|
cargs.push_back(program.c_str());
|
|
|
|
|
for (Strings::const_iterator i = args.begin(); i != args.end(); ++i)
|
|
|
|
|
cargs.push_back(i->c_str());
|
|
|
|
|
cargs.push_back(0);
|
|
|
|
|
|
2006-07-20 14:17:25 +02:00
|
|
|
|
/* Create a pipe. */
|
|
|
|
|
Pipe pipe;
|
|
|
|
|
pipe.create();
|
|
|
|
|
|
|
|
|
|
/* Fork. */
|
2014-07-10 16:50:51 +02:00
|
|
|
|
Pid pid = startProcess([&]() {
|
|
|
|
|
if (dup2(pipe.writeSide, STDOUT_FILENO) == -1)
|
|
|
|
|
throw SysError("dupping stdout");
|
2006-07-20 14:17:25 +02:00
|
|
|
|
|
2014-07-10 16:50:51 +02:00
|
|
|
|
if (searchPath)
|
|
|
|
|
execvp(program.c_str(), (char * *) &cargs[0]);
|
|
|
|
|
else
|
|
|
|
|
execv(program.c_str(), (char * *) &cargs[0]);
|
2006-07-20 14:17:25 +02:00
|
|
|
|
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw SysError(format("executing ‘%1%’") % program);
|
2014-07-10 16:50:51 +02:00
|
|
|
|
});
|
2006-07-20 14:17:25 +02:00
|
|
|
|
|
|
|
|
|
pipe.writeSide.close();
|
|
|
|
|
|
|
|
|
|
string result = drainFD(pipe.readSide);
|
|
|
|
|
|
|
|
|
|
/* Wait for the child to finish. */
|
|
|
|
|
int status = pid.wait(true);
|
|
|
|
|
if (!statusOk(status))
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw ExecError(format("program ‘%1%’ %2%")
|
2006-07-20 14:17:25 +02:00
|
|
|
|
% program % statusToString(status));
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2008-08-02 14:54:35 +02:00
|
|
|
|
void closeMostFDs(const set<int> & exceptions)
|
|
|
|
|
{
|
|
|
|
|
int maxFD = 0;
|
|
|
|
|
maxFD = sysconf(_SC_OPEN_MAX);
|
|
|
|
|
for (int fd = 0; fd < maxFD; ++fd)
|
|
|
|
|
if (fd != STDIN_FILENO && fd != STDOUT_FILENO && fd != STDERR_FILENO
|
|
|
|
|
&& exceptions.find(fd) == exceptions.end())
|
|
|
|
|
close(fd); /* ignore result */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2012-03-05 20:29:00 +01:00
|
|
|
|
void closeOnExec(int fd)
|
|
|
|
|
{
|
|
|
|
|
int prev;
|
|
|
|
|
if ((prev = fcntl(fd, F_GETFD, 0)) == -1 ||
|
|
|
|
|
fcntl(fd, F_SETFD, prev | FD_CLOEXEC) == -1)
|
|
|
|
|
throw SysError("setting close-on-exec flag");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-07-31 10:31:17 +02:00
|
|
|
|
void restoreSIGPIPE()
|
|
|
|
|
{
|
2014-08-20 15:12:58 +02:00
|
|
|
|
struct sigaction act;
|
2014-07-31 10:31:17 +02:00
|
|
|
|
act.sa_handler = SIG_DFL;
|
|
|
|
|
act.sa_flags = 0;
|
|
|
|
|
sigemptyset(&act.sa_mask);
|
2014-08-20 15:12:58 +02:00
|
|
|
|
if (sigaction(SIGPIPE, &act, 0)) throw SysError("resetting SIGPIPE");
|
2014-07-31 10:31:17 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
2004-01-15 21:23:55 +01:00
|
|
|
|
volatile sig_atomic_t _isInterrupted = 0;
|
|
|
|
|
|
|
|
|
|
void _interrupted()
|
|
|
|
|
{
|
2004-05-11 15:48:25 +02:00
|
|
|
|
/* Block user interrupts while an exception is being handled.
|
|
|
|
|
Throwing an exception while another exception is being handled
|
|
|
|
|
kills the program! */
|
2006-09-04 23:06:23 +02:00
|
|
|
|
if (!std::uncaught_exception()) {
|
2004-05-11 15:48:25 +02:00
|
|
|
|
_isInterrupted = 0;
|
2006-12-04 18:17:13 +01:00
|
|
|
|
throw Interrupted("interrupted by the user");
|
2004-05-11 15:48:25 +02:00
|
|
|
|
}
|
2004-01-15 21:23:55 +01:00
|
|
|
|
}
|
2004-06-20 15:37:51 +02:00
|
|
|
|
|
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
2012-09-19 21:43:23 +02:00
|
|
|
|
template<class C> C tokenizeString(const string & s, const string & separators)
|
2005-09-22 17:43:22 +02:00
|
|
|
|
{
|
2012-09-19 21:43:23 +02:00
|
|
|
|
C result;
|
2005-09-22 17:43:22 +02:00
|
|
|
|
string::size_type pos = s.find_first_not_of(separators, 0);
|
|
|
|
|
while (pos != string::npos) {
|
|
|
|
|
string::size_type end = s.find_first_of(separators, pos + 1);
|
|
|
|
|
if (end == string::npos) end = s.size();
|
|
|
|
|
string token(s, pos, end - pos);
|
2012-11-26 15:39:10 +01:00
|
|
|
|
result.insert(result.end(), token);
|
2005-09-22 17:43:22 +02:00
|
|
|
|
pos = s.find_first_not_of(separators, end);
|
|
|
|
|
}
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2012-09-19 21:43:23 +02:00
|
|
|
|
template Strings tokenizeString(const string & s, const string & separators);
|
2012-11-26 15:39:10 +01:00
|
|
|
|
template StringSet tokenizeString(const string & s, const string & separators);
|
2012-09-19 21:43:23 +02:00
|
|
|
|
template vector<string> tokenizeString(const string & s, const string & separators);
|
|
|
|
|
|
2005-09-22 17:43:22 +02:00
|
|
|
|
|
2010-08-27 15:18:13 +02:00
|
|
|
|
string concatStringsSep(const string & sep, const Strings & ss)
|
|
|
|
|
{
|
|
|
|
|
string s;
|
|
|
|
|
foreach (Strings::const_iterator, i, ss) {
|
|
|
|
|
if (s.size() != 0) s += sep;
|
|
|
|
|
s += *i;
|
|
|
|
|
}
|
|
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2012-11-26 15:39:10 +01:00
|
|
|
|
string concatStringsSep(const string & sep, const StringSet & ss)
|
|
|
|
|
{
|
|
|
|
|
string s;
|
|
|
|
|
foreach (StringSet::const_iterator, i, ss) {
|
|
|
|
|
if (s.size() != 0) s += sep;
|
|
|
|
|
s += *i;
|
|
|
|
|
}
|
|
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2012-08-01 17:19:24 +02:00
|
|
|
|
string chomp(const string & s)
|
|
|
|
|
{
|
|
|
|
|
size_t i = s.find_last_not_of(" \n\r\t");
|
2012-08-01 23:21:47 +02:00
|
|
|
|
return i == string::npos ? "" : string(s, 0, i + 1);
|
2012-08-01 17:19:24 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-06-22 10:50:25 +02:00
|
|
|
|
string statusToString(int status)
|
|
|
|
|
{
|
|
|
|
|
if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
|
|
|
|
|
if (WIFEXITED(status))
|
2004-06-22 19:04:10 +02:00
|
|
|
|
return (format("failed with exit code %1%") % WEXITSTATUS(status)).str();
|
2007-12-14 15:49:35 +01:00
|
|
|
|
else if (WIFSIGNALED(status)) {
|
2013-01-03 13:00:46 +01:00
|
|
|
|
int sig = WTERMSIG(status);
|
2007-12-14 15:49:35 +01:00
|
|
|
|
#if HAVE_STRSIGNAL
|
|
|
|
|
const char * description = strsignal(sig);
|
|
|
|
|
return (format("failed due to signal %1% (%2%)") % sig % description).str();
|
|
|
|
|
#else
|
|
|
|
|
return (format("failed due to signal %1%") % sig).str();
|
|
|
|
|
#endif
|
2013-01-03 13:00:46 +01:00
|
|
|
|
}
|
2004-06-22 10:50:25 +02:00
|
|
|
|
else
|
|
|
|
|
return "died abnormally";
|
|
|
|
|
} else return "succeeded";
|
|
|
|
|
}
|
2004-06-22 13:03:41 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bool statusOk(int status)
|
|
|
|
|
{
|
|
|
|
|
return WIFEXITED(status) && WEXITSTATUS(status) == 0;
|
|
|
|
|
}
|
2004-09-10 15:32:08 +02:00
|
|
|
|
|
|
|
|
|
|
2008-08-25 15:31:57 +02:00
|
|
|
|
bool hasSuffix(const string & s, const string & suffix)
|
|
|
|
|
{
|
|
|
|
|
return s.size() >= suffix.size() && string(s, s.size() - suffix.size()) == suffix;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2010-04-19 15:46:58 +02:00
|
|
|
|
void expect(std::istream & str, const string & s)
|
|
|
|
|
{
|
|
|
|
|
char s2[s.size()];
|
|
|
|
|
str.read(s2, s.size());
|
|
|
|
|
if (string(s2, s.size()) != s)
|
2014-08-20 17:00:17 +02:00
|
|
|
|
throw FormatError(format("expected string ‘%1%’") % s);
|
2010-04-19 15:46:58 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
string parseString(std::istream & str)
|
|
|
|
|
{
|
|
|
|
|
string res;
|
|
|
|
|
expect(str, "\"");
|
|
|
|
|
int c;
|
|
|
|
|
while ((c = str.get()) != '"')
|
|
|
|
|
if (c == '\\') {
|
|
|
|
|
c = str.get();
|
|
|
|
|
if (c == 'n') res += '\n';
|
|
|
|
|
else if (c == 'r') res += '\r';
|
|
|
|
|
else if (c == 't') res += '\t';
|
|
|
|
|
else res += c;
|
|
|
|
|
}
|
|
|
|
|
else res += c;
|
|
|
|
|
return res;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bool endOfList(std::istream & str)
|
|
|
|
|
{
|
|
|
|
|
if (str.peek() == ',') {
|
|
|
|
|
str.get();
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
if (str.peek() == ']') {
|
|
|
|
|
str.get();
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2012-09-29 03:39:30 +02:00
|
|
|
|
string decodeOctalEscaped(const string & s)
|
|
|
|
|
{
|
|
|
|
|
string r;
|
|
|
|
|
for (string::const_iterator i = s.begin(); i != s.end(); ) {
|
|
|
|
|
if (*i != '\\') { r += *i++; continue; }
|
|
|
|
|
unsigned char c = 0;
|
|
|
|
|
++i;
|
|
|
|
|
while (i != s.end() && *i >= '0' && *i < '8')
|
|
|
|
|
c = c * 8 + (*i++ - '0');
|
|
|
|
|
r += c;
|
|
|
|
|
}
|
|
|
|
|
return r;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2007-05-01 17:16:17 +02:00
|
|
|
|
void ignoreException()
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
throw;
|
|
|
|
|
} catch (std::exception & e) {
|
|
|
|
|
printMsg(lvlError, format("error (ignored): %1%") % e.what());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-11-15 15:01:02 +01:00
|
|
|
|
|
2014-08-20 16:01:16 +02:00
|
|
|
|
string filterANSIEscapes(const string & s, bool nixOnly)
|
|
|
|
|
{
|
|
|
|
|
string t, r;
|
|
|
|
|
enum { stTop, stEscape, stCSI } state = stTop;
|
|
|
|
|
for (auto c : s) {
|
|
|
|
|
if (state == stTop) {
|
|
|
|
|
if (c == '\e') {
|
|
|
|
|
state = stEscape;
|
|
|
|
|
r = c;
|
|
|
|
|
} else
|
|
|
|
|
t += c;
|
|
|
|
|
} else if (state == stEscape) {
|
|
|
|
|
r += c;
|
|
|
|
|
if (c == '[')
|
|
|
|
|
state = stCSI;
|
|
|
|
|
else {
|
|
|
|
|
t += r;
|
|
|
|
|
state = stTop;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
r += c;
|
|
|
|
|
if (c >= 0x40 && c != 0x7e) {
|
|
|
|
|
if (nixOnly && (c != 'p' && c != 'q' && c != 's' && c != 'a' && c != 'b'))
|
|
|
|
|
t += r;
|
|
|
|
|
state = stTop;
|
|
|
|
|
r.clear();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
t += r;
|
|
|
|
|
return t;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2006-09-04 23:06:23 +02:00
|
|
|
|
}
|