2011-11-23 16:13:37 +01:00
|
|
|
|
package Nix::CopyClosure;
|
|
|
|
|
|
2014-08-20 17:00:17 +02:00
|
|
|
|
use utf8;
|
2011-11-23 16:13:37 +01:00
|
|
|
|
use strict;
|
|
|
|
|
use Nix::Config;
|
|
|
|
|
use Nix::Store;
|
2014-07-11 16:02:19 +02:00
|
|
|
|
use Nix::SSH;
|
2013-04-11 19:52:21 +02:00
|
|
|
|
use List::Util qw(sum);
|
2014-07-10 11:51:22 +02:00
|
|
|
|
use IPC::Open2;
|
|
|
|
|
|
|
|
|
|
|
2014-07-11 16:02:19 +02:00
|
|
|
|
sub copyToOpen {
|
2016-05-03 15:11:14 +02:00
|
|
|
|
my ($from, $to, $sshHost, $storePaths, $includeOutputs, $dryRun, $useSubstitutes) = @_;
|
2011-11-23 16:13:37 +01:00
|
|
|
|
|
2014-07-11 16:02:19 +02:00
|
|
|
|
$useSubstitutes = 0 if $dryRun || !defined $useSubstitutes;
|
2014-07-10 20:43:04 +02:00
|
|
|
|
|
2011-11-23 16:13:37 +01:00
|
|
|
|
# Get the closure of this path.
|
|
|
|
|
my @closure = reverse(topoSortPaths(computeFSClosure(0, $includeOutputs,
|
|
|
|
|
map { followLinksToStorePath $_ } @{$storePaths})));
|
|
|
|
|
|
2014-07-10 11:51:22 +02:00
|
|
|
|
# Send the "query valid paths" command with the "lock" option
|
2014-07-10 14:15:12 +02:00
|
|
|
|
# enabled. This prevents a race where the remote host
|
2014-07-10 20:43:04 +02:00
|
|
|
|
# garbage-collect paths that are already there. Optionally, ask
|
|
|
|
|
# the remote host to substitute missing paths.
|
2014-07-11 16:02:19 +02:00
|
|
|
|
syswrite($to, pack("L<x4L<x4L<x4", 1, 1, $useSubstitutes)) or die;
|
|
|
|
|
writeStrings(\@closure, $to);
|
2014-07-10 11:51:22 +02:00
|
|
|
|
|
|
|
|
|
# Get back the set of paths that are already valid on the remote host.
|
|
|
|
|
my %present;
|
2014-07-24 12:24:25 +02:00
|
|
|
|
$present{$_} = 1 foreach readStrings($from);
|
2014-07-10 11:51:22 +02:00
|
|
|
|
|
|
|
|
|
my @missing = grep { !$present{$_} } @closure;
|
|
|
|
|
return if !@missing;
|
|
|
|
|
|
2014-07-10 17:44:18 +02:00
|
|
|
|
my $missingSize = 0;
|
|
|
|
|
$missingSize += (queryPathInfo($_, 1))[3] foreach @missing;
|
|
|
|
|
|
|
|
|
|
printf STDERR "copying %d missing paths (%.2f MiB) to ‘$sshHost’...\n",
|
2014-07-11 14:27:17 +02:00
|
|
|
|
scalar(@missing), $missingSize / (1024**2);
|
2014-07-10 17:44:18 +02:00
|
|
|
|
return if $dryRun;
|
|
|
|
|
|
2014-07-10 11:51:22 +02:00
|
|
|
|
# Send the "import paths" command.
|
|
|
|
|
syswrite($to, pack("L<x4", 4)) or die;
|
2016-05-03 15:11:14 +02:00
|
|
|
|
exportPaths(fileno($to), @missing);
|
2014-08-20 17:00:17 +02:00
|
|
|
|
readInt($from) == 1 or die "remote machine ‘$sshHost’ failed to import closure\n";
|
2014-07-10 11:51:22 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-07-11 16:02:19 +02:00
|
|
|
|
sub copyTo {
|
2016-05-03 15:11:14 +02:00
|
|
|
|
my ($sshHost, $storePaths, $includeOutputs, $dryRun, $useSubstitutes) = @_;
|
2014-07-11 16:02:19 +02:00
|
|
|
|
|
|
|
|
|
# Connect to the remote host.
|
|
|
|
|
my ($from, $to);
|
|
|
|
|
eval {
|
2014-10-14 11:01:18 +02:00
|
|
|
|
($from, $to) = connectToRemoteNix($sshHost, []);
|
2014-07-11 16:02:19 +02:00
|
|
|
|
};
|
|
|
|
|
if ($@) {
|
|
|
|
|
chomp $@;
|
|
|
|
|
warn "$@; falling back to old closure copying method\n";
|
2014-11-10 16:03:51 +01:00
|
|
|
|
$@ = "";
|
2014-07-11 16:02:19 +02:00
|
|
|
|
return oldCopyTo(@_);
|
|
|
|
|
}
|
|
|
|
|
|
2016-05-03 15:11:14 +02:00
|
|
|
|
copyToOpen($from, $to, $sshHost, $storePaths, $includeOutputs, $dryRun, $useSubstitutes);
|
2014-07-11 16:02:19 +02:00
|
|
|
|
|
|
|
|
|
close $to;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-07-10 11:51:22 +02:00
|
|
|
|
# For backwards compatibility with Nix <= 1.7. Will be removed
|
|
|
|
|
# eventually.
|
|
|
|
|
sub oldCopyTo {
|
2016-05-03 15:11:14 +02:00
|
|
|
|
my ($sshHost, $storePaths, $includeOutputs, $dryRun, $useSubstitutes) = @_;
|
2014-07-10 11:51:22 +02:00
|
|
|
|
|
2014-07-11 16:02:19 +02:00
|
|
|
|
# Get the closure of this path.
|
|
|
|
|
my @closure = reverse(topoSortPaths(computeFSClosure(0, $includeOutputs,
|
|
|
|
|
map { followLinksToStorePath $_ } @{$storePaths})));
|
|
|
|
|
|
2014-07-10 20:43:04 +02:00
|
|
|
|
# Optionally use substitutes on the remote host.
|
|
|
|
|
if (!$dryRun && $useSubstitutes) {
|
2014-10-14 11:01:18 +02:00
|
|
|
|
system "ssh $sshHost @globalSshOpts nix-store -r --ignore-unknown @closure";
|
2014-07-10 20:43:04 +02:00
|
|
|
|
# Ignore exit status because this is just an optimisation.
|
|
|
|
|
}
|
|
|
|
|
|
2011-11-23 16:13:37 +01:00
|
|
|
|
# Ask the remote host which paths are invalid. Because of limits
|
|
|
|
|
# to the command line length, do this in chunks. Eventually,
|
|
|
|
|
# we'll want to use ‘--from-stdin’, but we can't rely on the
|
|
|
|
|
# target having this option yet.
|
2014-07-10 11:51:22 +02:00
|
|
|
|
my @missing;
|
2013-04-11 19:52:21 +02:00
|
|
|
|
my $missingSize = 0;
|
2014-07-11 16:02:19 +02:00
|
|
|
|
while (scalar(@closure) > 0) {
|
|
|
|
|
my @ps = splice(@closure, 0, 1500);
|
2014-10-14 11:01:18 +02:00
|
|
|
|
open(READ, "set -f; ssh $sshHost @globalSshOpts nix-store --check-validity --print-invalid @ps|");
|
2011-11-23 16:13:37 +01:00
|
|
|
|
while (<READ>) {
|
|
|
|
|
chomp;
|
|
|
|
|
push @missing, $_;
|
2013-04-11 19:52:21 +02:00
|
|
|
|
my ($deriver, $narHash, $time, $narSize, $refs) = queryPathInfo($_, 1);
|
|
|
|
|
$missingSize += $narSize;
|
2011-11-23 16:13:37 +01:00
|
|
|
|
}
|
|
|
|
|
close READ or die;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
# Export the store paths and import them on the remote machine.
|
|
|
|
|
if (scalar @missing > 0) {
|
|
|
|
|
print STDERR "copying ", scalar @missing, " missing paths to ‘$sshHost’...\n";
|
|
|
|
|
unless ($dryRun) {
|
2014-10-14 11:01:18 +02:00
|
|
|
|
open SSH, "| ssh $sshHost @globalSshOpts 'nix-store --import' > /dev/null" or die;
|
2016-05-03 15:11:14 +02:00
|
|
|
|
exportPaths(fileno(SSH), @missing);
|
2014-08-20 17:00:17 +02:00
|
|
|
|
close SSH or die "copying store paths to remote machine ‘$sshHost’ failed: $?";
|
2011-11-23 16:13:37 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1;
|