aboutsummaryrefslogtreecommitdiff
path: root/src/libstore/optimise-store.cc
diff options
context:
space:
mode:
authorEelco Dolstra <e.dolstra@tudelft.nl>2008-06-09 13:52:45 +0000
committerEelco Dolstra <e.dolstra@tudelft.nl>2008-06-09 13:52:45 +0000
commitb0e92f6d474ce91d7f071f9ed62bbb2015009c58 (patch)
treec3d28be6b89dfa618df290d5c78c55897b119b6c /src/libstore/optimise-store.cc
parent4ed01ed791b3bb7a4010049c6128aa2d49a81a29 (diff)
* Merged the no-bdb branch (-r10900:HEAD
https://svn.nixos.org/repos/nix/nix/branches/no-bdb).
Diffstat (limited to 'src/libstore/optimise-store.cc')
-rw-r--r--src/libstore/optimise-store.cc129
1 files changed, 129 insertions, 0 deletions
diff --git a/src/libstore/optimise-store.cc b/src/libstore/optimise-store.cc
new file mode 100644
index 000000000..c260f253e
--- /dev/null
+++ b/src/libstore/optimise-store.cc
@@ -0,0 +1,129 @@
+#include "util.hh"
+#include "local-store.hh"
+
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <unistd.h>
+
+
+namespace nix {
+
+
+typedef std::map<Hash, std::pair<Path, ino_t> > HashToPath;
+
+
+static void makeWritable(const Path & path)
+{
+ struct stat st;
+ if (lstat(path.c_str(), &st))
+ throw SysError(format("getting attributes of path `%1%'") % path);
+ if (chmod(path.c_str(), st.st_mode | S_IWUSR) == -1)
+ throw SysError(format("changing writability of `%1%'") % path);
+}
+
+
+static void hashAndLink(bool dryRun, HashToPath & hashToPath,
+ OptimiseStats & stats, const Path & path)
+{
+ struct stat st;
+ if (lstat(path.c_str(), &st))
+ throw SysError(format("getting attributes of path `%1%'") % path);
+
+ /* Sometimes SNAFUs can cause files in the Nix store to be
+ modified, in particular when running programs as root under
+ NixOS (example: $fontconfig/var/cache being modified). Skip
+ those files. */
+ if (S_ISREG(st.st_mode) && (st.st_mode & S_IWUSR)) {
+ printMsg(lvlError, format("skipping suspicious writable file `%1%'") % path);
+ return;
+ }
+
+ /* We can hard link regular files and symlinks. */
+ if (S_ISREG(st.st_mode) || S_ISLNK(st.st_mode)) {
+
+ /* Hash the file. Note that hashPath() returns the hash over
+ the NAR serialisation, which includes the execute bit on
+ the file. Thus, executable and non-executable files with
+ the same contents *won't* be linked (which is good because
+ otherwise the permissions would be screwed up).
+
+ Also note that if `path' is a symlink, then we're hashing
+ the contents of the symlink (i.e. the result of
+ readlink()), not the contents of the target (which may not
+ even exist). */
+ Hash hash = hashPath(htSHA256, path);
+ stats.totalFiles++;
+ printMsg(lvlDebug, format("`%1%' has hash `%2%'") % path % printHash(hash));
+
+ std::pair<Path, ino_t> prevPath = hashToPath[hash];
+
+ if (prevPath.first == "") {
+ hashToPath[hash] = std::pair<Path, ino_t>(path, st.st_ino);
+ return;
+ }
+
+ /* Yes! We've seen a file with the same contents. Replace
+ the current file with a hard link to that file. */
+ stats.sameContents++;
+ if (prevPath.second == st.st_ino) {
+ printMsg(lvlDebug, format("`%1%' is already linked to `%2%'") % path % prevPath.first);
+ return;
+ }
+
+ if (!dryRun) {
+
+ printMsg(lvlTalkative, format("linking `%1%' to `%2%'") % path % prevPath.first);
+
+ Path tempLink = (format("%1%.tmp-%2%-%3%")
+ % path % getpid() % rand()).str();
+
+ /* Make the containing directory writable, but only if
+ it's not the store itself (we don't want or need to
+ mess with its permissions). */
+ bool mustToggle = !isStorePath(path);
+ if (mustToggle) makeWritable(dirOf(path));
+
+ if (link(prevPath.first.c_str(), tempLink.c_str()) == -1)
+ throw SysError(format("cannot link `%1%' to `%2%'")
+ % tempLink % prevPath.first);
+
+ /* Atomically replace the old file with the new hard link. */
+ if (rename(tempLink.c_str(), path.c_str()) == -1)
+ throw SysError(format("cannot rename `%1%' to `%2%'")
+ % tempLink % path);
+
+ /* Make the directory read-only again and reset its
+ timestamp back to 0. */
+ if (mustToggle) canonicalisePathMetaData(dirOf(path), false);
+
+ } else
+ printMsg(lvlTalkative, format("would link `%1%' to `%2%'") % path % prevPath.first);
+
+ stats.filesLinked++;
+ stats.bytesFreed += st.st_size;
+ }
+
+ if (S_ISDIR(st.st_mode)) {
+ Strings names = readDirectory(path);
+ for (Strings::iterator i = names.begin(); i != names.end(); ++i)
+ hashAndLink(dryRun, hashToPath, stats, path + "/" + *i);
+ }
+}
+
+
+void LocalStore::optimiseStore(bool dryRun, OptimiseStats & stats)
+{
+ HashToPath hashToPath;
+
+ PathSet paths = queryValidPaths();
+
+ for (PathSet::iterator i = paths.begin(); i != paths.end(); ++i) {
+ addTempRoot(*i);
+ if (!isValidPath(*i)) continue; /* path was GC'ed, probably */
+ startNest(nest, lvlChatty, format("hashing files in `%1%'") % *i);
+ hashAndLink(dryRun, hashToPath, stats, *i);
+ }
+}
+
+
+}