/* GNU Guix --- Functional package management for GNU Copyright (C) 2012 Ludovic Courtès This file is part of GNU Guix. GNU Guix is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. GNU Guix is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with GNU Guix. If not, see . */ #include #include #include "shared.hh" #include #include #include #include #include #include #include #include /* Variables used by `nix-daemon.cc'. */ volatile ::sig_atomic_t blockInt; char **argvSaved; using namespace nix; /* Entry point in `nix-daemon.cc'. */ extern void run (Strings args); /* Command-line options. */ const char *argp_program_version = "guix-daemon (" PACKAGE_NAME ") " PACKAGE_VERSION; const char *argp_program_bug_address = PACKAGE_BUGREPORT; static char doc[] = "guix-daemon -- perform derivation builds and store accesses\ \v\ This program is a daemon meant to run in the background. It serves \ requests sent over a Unix-domain socket. It accesses the store, and \ builds derivations on behalf of its clients."; #define GUIX_OPT_SYSTEM 1 #define GUIX_OPT_DISABLE_CHROOT 2 #define GUIX_OPT_BUILD_USERS_GROUP 3 #define GUIX_OPT_CACHE_FAILURES 4 #define GUIX_OPT_LOSE_LOGS 5 #define GUIX_OPT_DISABLE_LOG_COMPRESSION 6 #define GUIX_OPT_DISABLE_STORE_OPTIMIZATION 7 #define GUIX_OPT_IMPERSONATE_LINUX_26 8 #define GUIX_OPT_DEBUG 9 #define GUIX_OPT_CHROOT_DIR 10 static const struct argp_option options[] = { { "system", GUIX_OPT_SYSTEM, "SYSTEM", 0, "Assume SYSTEM as the current system type" }, { "build-cores", 'C', "N", 0, "Use N CPU cores to build each derivation; 0 means as many as available" }, { "max-jobs", 'M', "N", 0, "Allow at most N build jobs" }, { "disable-chroot", GUIX_OPT_DISABLE_CHROOT, 0, 0, "Disable chroot builds" #ifndef HAVE_CHROOT " (chroots are not supported in this configuration, so " "this option has no effect)" #endif }, { "chroot-directory", GUIX_OPT_CHROOT_DIR, "DIR", 0, "Add DIR to the build chroot" #ifndef HAVE_CHROOT " (chroots are not supported in this configuration, so " "this option has no effect)" #endif }, { "build-users-group", GUIX_OPT_BUILD_USERS_GROUP, "GROUP", 0, "Perform builds as a user of GROUP" }, { "cache-failures", GUIX_OPT_CACHE_FAILURES, 0, 0, "Cache build failures" }, { "lose-logs", GUIX_OPT_LOSE_LOGS, 0, 0, "Do not keep build logs" }, { "disable-log-compression", GUIX_OPT_DISABLE_LOG_COMPRESSION, 0, 0, "Disable compression of the build logs" }, { "disable-store-optimization", GUIX_OPT_DISABLE_STORE_OPTIMIZATION, 0, 0, "Disable automatic file \"deduplication\" in the store" }, { "impersonate-linux-2.6", GUIX_OPT_IMPERSONATE_LINUX_26, 0, 0, "Impersonate Linux 2.6" #ifndef HAVE_SYS_PERSONALITY_H " (this option has no effect in this configuration)" #endif }, { "debug", GUIX_OPT_DEBUG, 0, 0, "Produce debugging output" }, { 0, 0, 0, 0, 0 } }; /* Parse a single option. */ static error_t parse_opt (int key, char *arg, struct argp_state *state) { switch (key) { case GUIX_OPT_DISABLE_CHROOT: settings.useChroot = false; break; case GUIX_OPT_CHROOT_DIR: settings.dirsInChroot.insert (arg); break; case GUIX_OPT_DISABLE_LOG_COMPRESSION: settings.compressLog = false; break; case GUIX_OPT_BUILD_USERS_GROUP: settings.buildUsersGroup = arg; break; case GUIX_OPT_DISABLE_STORE_OPTIMIZATION: settings.autoOptimiseStore = false; break; case GUIX_OPT_CACHE_FAILURES: settings.cacheFailure = true; break; case GUIX_OPT_IMPERSONATE_LINUX_26: settings.impersonateLinux26 = true; break; case GUIX_OPT_LOSE_LOGS: settings.keepLog = false; break; case GUIX_OPT_DEBUG: verbosity = lvlDebug; break; case 'C': settings.buildCores = atoi (arg); break; case 'M': settings.maxBuildJobs = atoi (arg); break; case GUIX_OPT_SYSTEM: settings.thisSystem = arg; break; default: return ARGP_ERR_UNKNOWN; } return 0; } /* Argument parsing. */ static struct argp argp = { options, parse_opt, 0, doc }; int main (int argc, char *argv[]) { Strings nothing; /* Initialize libgcrypt. */ if (!gcry_check_version (GCRYPT_VERSION)) { fprintf (stderr, "error: libgcrypt version mismatch\n"); exit (EXIT_FAILURE); } #ifdef HAVE_CHROOT settings.useChroot = true; #else settings.useChroot = false; #endif argvSaved = argv; try { settings.processEnvironment (); /* FIXME: Disable substitutes until we have something that works. */ settings.useSubstitutes = false; settings.substituters.clear (); argp_parse (&argp, argc, argv, 0, 0, 0); if (geteuid () == 0 && settings.buildUsersGroup.empty ()) fprintf (stderr, "warning: running as root is highly recommended, " "unless `--build-users-group' is used\n"); #ifdef HAVE_CHROOT if (settings.useChroot) { foreach (PathSet::iterator, i, settings.dirsInChroot) { printMsg (lvlDebug, format ("directory `%1%' added to the chroot") % *i); } } #endif run (nothing); } catch (std::exception &e) { fprintf (stderr, "error: %s\n", e.what ()); return EXIT_FAILURE; } return EXIT_SUCCESS; /* never reached */ }