about summary refs log blame commit diff
path: root/src/libstore/globals.cc
blob: 77f25005b85fe527089d84c5266217e33a766a59 (plain) (tree)
1
2
3
4
5
6
7
8
9

                   
                     
                  
                     
 
              
                    
                   

 


               







                                                                      
                  
 
 







                              



                                             



                         
                        





                                  
                                                    
                      


                                                                       
                             


                               
                   




                                  
                              
                               
                                                      
                      
                               

                                     
 
 
 









                                                                                      
                                                                       
 

 
                             












                                                                            
                                                


                                         
                                                                      
                                     
 
                                                  
                                                                                                   
 
                                
 
                                                    
                      
                                                                                        
      


 
                                                             
 
                           
                            
 

 







                                                             
                       
 
                                       

                                        
                              












                                                          
                                          






                                                        
                                                      
                                                  
                                   
                                                                          
                                      

                                       









                                                                                                  
                                                              


                                                                                         


 
                                                     
 


                                                  
 
 
 
                                                   
 





                                                                                                       


 
                                                        
 


                                                  
                                                    
                                     

 






                                                      
 
                                                                  
 



                                                                                               

 
 
                       

             
                                                  



                                                     
                                                           




             
                                            









                                                        





                                              
                                          

 
 
#include "config.h"

#include "globals.hh"
#include "util.hh"
#include "archive.hh"

#include <map>
#include <algorithm>
#include <unistd.h>


namespace nix {


/* The default location of the daemon socket, relative to nixStateDir.
   The socket is in a directory to allow you to control access to the
   Nix daemon by setting the mode/ownership of the directory
   appropriately.  (This wouldn't work on the socket itself since it
   must be deleted and recreated on startup.) */
#define DEFAULT_SOCKET_PATH "/daemon-socket/socket"


Settings settings;


Settings::Settings()
{
    keepFailed = false;
    keepGoing = false;
    tryFallback = false;
    buildVerbosity = lvlError;
    maxBuildJobs = 1;
    buildCores = 1;
#ifdef _SC_NPROCESSORS_ONLN
    long res = sysconf(_SC_NPROCESSORS_ONLN);
    if (res > 0) buildCores = res;
#endif
    readOnlyMode = false;
    thisSystem = SYSTEM;
    maxSilentTime = 0;
    buildTimeout = 0;
    useBuildHook = true;
    printBuildTrace = false;
    reservedSize = 1024 * 1024;
    fsyncMetadata = true;
    useSQLiteWAL = true;
    syncBeforeRegistering = false;
    useSubstitutes = true;
    buildUsersGroup = getuid() == 0 ? "nixbld" : "";
    useChroot = false;
#ifdef DEFAULT_CHROOT_DIRS
    dirsInChroot = tokenizeString<StringSet>(DEFAULT_CHROOT_DIRS, ":");
#endif
    useSshSubstituter = true;
    impersonateLinux26 = false;
    keepLog = true;
    compressLog = true;
    maxLogSize = 0;
    cacheFailure = false;
    pollInterval = 5;
    checkRootReachability = false;
    gcKeepOutputs = false;
    gcKeepDerivations = true;
    autoOptimiseStore = false;
    envKeepDerivations = false;
    lockCPU = getEnv("NIX_AFFINITY_HACK", "1") == "1";
    showTrace = false;
    enableImportNative = false;
    trustedUsers = Strings({"root"});
    allowedUsers = Strings({"*"});
}


void Settings::processEnvironment()
{
    nixStore = canonPath(getEnv("NIX_STORE_DIR", getEnv("NIX_STORE", NIX_STORE_DIR)));
    nixDataDir = canonPath(getEnv("NIX_DATA_DIR", NIX_DATA_DIR));
    nixLogDir = canonPath(getEnv("NIX_LOG_DIR", NIX_LOG_DIR));
    nixStateDir = canonPath(getEnv("NIX_STATE_DIR", NIX_STATE_DIR));
    nixDBPath = getEnv("NIX_DB_DIR", nixStateDir + "/db");
    nixConfDir = canonPath(getEnv("NIX_CONF_DIR", NIX_CONF_DIR));
    nixLibexecDir = canonPath(getEnv("NIX_LIBEXEC_DIR", NIX_LIBEXEC_DIR));
    nixBinDir = canonPath(getEnv("NIX_BIN_DIR", NIX_BIN_DIR));
    nixDaemonSocketFile = canonPath(nixStateDir + DEFAULT_SOCKET_PATH);
}


void Settings::loadConfFile()
{
    Path settingsFile = (format("%1%/%2%") % nixConfDir % "nix.conf").str();
    if (!pathExists(settingsFile)) return;
    string contents = readFile(settingsFile);

    unsigned int pos = 0;

    while (pos < contents.size()) {
        string line;
        while (pos < contents.size() && contents[pos] != '\n')
            line += contents[pos++];
        pos++;

        string::size_type hash = line.find('#');
        if (hash != string::npos)
            line = string(line, 0, hash);

        vector<string> tokens = tokenizeString<vector<string> >(line);
        if (tokens.empty()) continue;

        if (tokens.size() < 2 || tokens[1] != "=")
            throw Error(format("illegal configuration line `%1%' in `%2%'") % line % settingsFile);

        string name = tokens[0];

        vector<string>::iterator i = tokens.begin();
        advance(i, 2);
        settings[name] = concatStringsSep(" ", Strings(i, tokens.end())); // FIXME: slow
    };
}


void Settings::set(const string & name, const string & value)
{
    settings[name] = value;
    overrides[name] = value;
}


string Settings::get(const string & name, const string & def)
{
    auto i = settings.find(name);
    if (i == settings.end()) return def;
    return i->second;
}


void Settings::update()
{
    get(tryFallback, "build-fallback");
    get(maxBuildJobs, "build-max-jobs");
    get(buildCores, "build-cores");
    get(thisSystem, "system");
    get(maxSilentTime, "build-max-silent-time");
    get(buildTimeout, "build-timeout");
    get(reservedSize, "gc-reserved-space");
    get(fsyncMetadata, "fsync-metadata");
    get(useSQLiteWAL, "use-sqlite-wal");
    get(syncBeforeRegistering, "sync-before-registering");
    get(useSubstitutes, "build-use-substitutes");
    get(buildUsersGroup, "build-users-group");
    get(useChroot, "build-use-chroot");
    get(dirsInChroot, "build-chroot-dirs");
    get(impersonateLinux26, "build-impersonate-linux-26");
    get(keepLog, "build-keep-log");
    get(compressLog, "build-compress-log");
    get(maxLogSize, "build-max-log-size");
    get(cacheFailure, "build-cache-failure");
    get(pollInterval, "build-poll-interval");
    get(checkRootReachability, "gc-check-reachability");
    get(gcKeepOutputs, "gc-keep-outputs");
    get(gcKeepDerivations, "gc-keep-derivations");
    get(autoOptimiseStore, "auto-optimise-store");
    get(envKeepDerivations, "env-keep-derivations");
    get(sshSubstituterHosts, "ssh-substituter-hosts");
    get(useSshSubstituter, "use-ssh-substituter");
    get(logServers, "log-servers");
    get(enableImportNative, "allow-unsafe-native-code-during-evaluation");
    get(useCaseHack, "use-case-hack");
    get(trustedUsers, "trusted-users");
    get(allowedUsers, "allowed-users");

    string subs = getEnv("NIX_SUBSTITUTERS", "default");
    if (subs == "default") {
        substituters.clear();
#if 0
        if (getEnv("NIX_OTHER_STORES") != "")
            substituters.push_back(nixLibexecDir + "/nix/substituters/copy-from-other-stores.pl");
#endif
        substituters.push_back(nixLibexecDir + "/nix/substituters/download-using-manifests.pl");
        substituters.push_back(nixLibexecDir + "/nix/substituters/download-from-binary-cache.pl");
        if (useSshSubstituter && !sshSubstituterHosts.empty())
            substituters.push_back(nixLibexecDir + "/nix/substituters/download-via-ssh");
    } else
        substituters = tokenizeString<Strings>(subs, ":");
}


void Settings::get(string & res, const string & name)
{
    SettingsMap::iterator i = settings.find(name);
    if (i == settings.end()) return;
    res = i->second;
}


void Settings::get(bool & res, const string & name)
{
    SettingsMap::iterator i = settings.find(name);
    if (i == settings.end()) return;
    if (i->second == "true") res = true;
    else if (i->second == "false") res = false;
    else throw Error(format("configuration option `%1%' should be either `true' or `false', not `%2%'")
        % name % i->second);
}


void Settings::get(StringSet & res, const string & name)
{
    SettingsMap::iterator i = settings.find(name);
    if (i == settings.end()) return;
    res.clear();
    Strings ss = tokenizeString<Strings>(i->second);
    res.insert(ss.begin(), ss.end());
}

void Settings::get(Strings & res, const string & name)
{
    SettingsMap::iterator i = settings.find(name);
    if (i == settings.end()) return;
    res = tokenizeString<Strings>(i->second);
}


template<class N> void Settings::get(N & res, const string & name)
{
    SettingsMap::iterator i = settings.find(name);
    if (i == settings.end()) return;
    if (!string2Int(i->second, res))
        throw Error(format("configuration setting `%1%' should have an integer value") % name);
}


string Settings::pack()
{
    string s;
    foreach (SettingsMap::iterator, i, settings) {
        if (i->first.find('\n') != string::npos ||
            i->first.find('=') != string::npos ||
            i->second.find('\n') != string::npos)
            throw Error("illegal option name/value");
        s += i->first; s += '='; s += i->second; s += '\n';
    }
    return s;
}


void Settings::unpack(const string & pack) {
    Strings lines = tokenizeString<Strings>(pack, "\n");
    foreach (Strings::iterator, i, lines) {
        string::size_type eq = i->find('=');
        if (eq == string::npos)
            throw Error("illegal option name/value");
        set(i->substr(0, eq), i->substr(eq + 1));
    }
}


Settings::SettingsMap Settings::getOverrides()
{
    return overrides;
}


const string nixVersion = PACKAGE_VERSION;


}