aboutsummaryrefslogtreecommitdiff
path: root/src/Package.zig
diff options
context:
space:
mode:
authorAndrew Kelley <andrew@ziglang.org>2023-10-09 11:47:37 -0700
committerGitHub <noreply@github.com>2023-10-09 11:47:37 -0700
commitf7bc55c0136b91805bd046a8cc8ea745d7e7567d (patch)
tree8379c645854d3c513ebb18e7fbabc7ab5ed1a283 /src/Package.zig
parent75b48ef503204d3ba005647ecce8fda4657a8588 (diff)
parent95907cb79578779108f3772cb93648d38354b9ec (diff)
downloadzig-f7bc55c0136b91805bd046a8cc8ea745d7e7567d.tar.gz
zig-f7bc55c0136b91805bd046a8cc8ea745d7e7567d.zip
Merge pull request #17392 from ziglang/fetch
rework package manager
Diffstat (limited to 'src/Package.zig')
-rw-r--r--src/Package.zig1444
1 files changed, 124 insertions, 1320 deletions
diff --git a/src/Package.zig b/src/Package.zig
index 14052e3de4..c36830d599 100644
--- a/src/Package.zig
+++ b/src/Package.zig
@@ -1,1349 +1,153 @@
-const Package = @This();
-
-const builtin = @import("builtin");
-const std = @import("std");
-const fs = std.fs;
-const mem = std.mem;
-const Allocator = mem.Allocator;
-const ascii = std.ascii;
-const assert = std.debug.assert;
-const log = std.log.scoped(.package);
-const main = @import("main.zig");
-const ThreadPool = std.Thread.Pool;
-
-const Compilation = @import("Compilation.zig");
-const Module = @import("Module.zig");
-const Cache = std.Build.Cache;
-const build_options = @import("build_options");
-const git = @import("git.zig");
-const computePackageHash = @import("Package/hash.zig").compute;
-
-pub const Manifest = @import("Manifest.zig");
-pub const Table = std.StringHashMapUnmanaged(*Package);
-
-root_src_directory: Compilation.Directory,
-/// Relative to `root_src_directory`. May contain path separators.
-root_src_path: []const u8,
-/// The dependency table of this module. Shared dependencies such as 'std', 'builtin', and 'root'
-/// are not specified in every dependency table, but instead only in the table of `main_pkg`.
-/// `Module.importFile` is responsible for detecting these names and using the correct package.
-table: Table = .{},
-/// Whether to free `root_src_directory` on `destroy`.
-root_src_directory_owned: bool = false,
-
-/// Allocate a Package. No references to the slices passed are kept.
-pub fn create(
- gpa: Allocator,
- /// Null indicates the current working directory
- root_src_dir_path: ?[]const u8,
- /// Relative to root_src_dir_path
- root_src_path: []const u8,
-) !*Package {
- const ptr = try gpa.create(Package);
- errdefer gpa.destroy(ptr);
-
- const owned_dir_path = if (root_src_dir_path) |p| try gpa.dupe(u8, p) else null;
- errdefer if (owned_dir_path) |p| gpa.free(p);
-
- const owned_src_path = try gpa.dupe(u8, root_src_path);
- errdefer gpa.free(owned_src_path);
-
- ptr.* = .{
- .root_src_directory = .{
- .path = owned_dir_path,
- .handle = if (owned_dir_path) |p| try fs.cwd().openDir(p, .{}) else fs.cwd(),
- },
- .root_src_path = owned_src_path,
- .root_src_directory_owned = true,
- };
-
- return ptr;
-}
-
-pub fn createWithDir(
- gpa: Allocator,
- directory: Compilation.Directory,
- /// Relative to `directory`. If null, means `directory` is the root src dir
- /// and is owned externally.
- root_src_dir_path: ?[]const u8,
- /// Relative to root_src_dir_path
- root_src_path: []const u8,
-) !*Package {
- const ptr = try gpa.create(Package);
- errdefer gpa.destroy(ptr);
-
- const owned_src_path = try gpa.dupe(u8, root_src_path);
- errdefer gpa.free(owned_src_path);
-
- if (root_src_dir_path) |p| {
- const owned_dir_path = try directory.join(gpa, &[1][]const u8{p});
- errdefer gpa.free(owned_dir_path);
-
- ptr.* = .{
- .root_src_directory = .{
- .path = owned_dir_path,
- .handle = try directory.handle.openDir(p, .{}),
- },
- .root_src_directory_owned = true,
- .root_src_path = owned_src_path,
- };
- } else {
- ptr.* = .{
- .root_src_directory = directory,
- .root_src_directory_owned = false,
- .root_src_path = owned_src_path,
+pub const Module = @import("Package/Module.zig");
+pub const Fetch = @import("Package/Fetch.zig");
+pub const build_zig_basename = "build.zig";
+pub const Manifest = @import("Package/Manifest.zig");
+
+pub const Path = struct {
+ root_dir: Cache.Directory,
+ /// The path, relative to the root dir, that this `Path` represents.
+ /// Empty string means the root_dir is the path.
+ sub_path: []const u8 = "",
+
+ pub fn clone(p: Path, arena: Allocator) Allocator.Error!Path {
+ return .{
+ .root_dir = try p.root_dir.clone(arena),
+ .sub_path = try arena.dupe(u8, p.sub_path),
};
}
- return ptr;
-}
-/// Free all memory associated with this package. It does not destroy any packages
-/// inside its table; the caller is responsible for calling destroy() on them.
-pub fn destroy(pkg: *Package, gpa: Allocator) void {
- gpa.free(pkg.root_src_path);
-
- if (pkg.root_src_directory_owned) {
- // If root_src_directory.path is null then the handle is the cwd()
- // which shouldn't be closed.
- if (pkg.root_src_directory.path) |p| {
- gpa.free(p);
- pkg.root_src_directory.handle.close();
- }
+ pub fn cwd() Path {
+ return .{ .root_dir = Cache.Directory.cwd() };
}
- pkg.deinitTable(gpa);
- gpa.destroy(pkg);
-}
-
-/// Only frees memory associated with the table.
-pub fn deinitTable(pkg: *Package, gpa: Allocator) void {
- pkg.table.deinit(gpa);
-}
-
-pub fn add(pkg: *Package, gpa: Allocator, name: []const u8, package: *Package) !void {
- try pkg.table.ensureUnusedCapacity(gpa, 1);
- const name_dupe = try gpa.dupe(u8, name);
- pkg.table.putAssumeCapacityNoClobber(name_dupe, package);
-}
-
-/// Compute a readable name for the package. The returned name should be freed from gpa. This
-/// function is very slow, as it traverses the whole package hierarchy to find a path to this
-/// package. It should only be used for error output.
-pub fn getName(target: *const Package, gpa: Allocator, mod: Module) ![]const u8 {
- // we'll do a breadth-first search from the root module to try and find a short name for this
- // module, using a DoublyLinkedList of module/parent pairs. note that the "parent" there is
- // just the first-found shortest path - a module may be children of arbitrarily many other
- // modules. This path may vary between executions due to hashmap iteration order, but that
- // doesn't matter too much.
- var node_arena = std.heap.ArenaAllocator.init(gpa);
- defer node_arena.deinit();
- const Parented = struct {
- parent: ?*const @This(),
- mod: *const Package,
- };
- const Queue = std.DoublyLinkedList(Parented);
- var to_check: Queue = .{};
-
- {
- const new = try node_arena.allocator().create(Queue.Node);
- new.* = .{ .data = .{ .parent = null, .mod = mod.root_pkg } };
- to_check.prepend(new);
- }
-
- if (mod.main_pkg != mod.root_pkg) {
- const new = try node_arena.allocator().create(Queue.Node);
- // TODO: once #12201 is resolved, we may want a way of indicating a different name for this
- new.* = .{ .data = .{ .parent = null, .mod = mod.main_pkg } };
- to_check.prepend(new);
- }
-
- // set of modules we've already checked to prevent loops
- var checked = std.AutoHashMap(*const Package, void).init(gpa);
- defer checked.deinit();
-
- const linked = while (to_check.pop()) |node| {
- const check = &node.data;
-
- if (checked.contains(check.mod)) continue;
- try checked.put(check.mod, {});
-
- if (check.mod == target) break check;
-
- var it = check.mod.table.iterator();
- while (it.next()) |kv| {
- var new = try node_arena.allocator().create(Queue.Node);
- new.* = .{ .data = .{
- .parent = check,
- .mod = kv.value_ptr.*,
- } };
- to_check.prepend(new);
- }
- } else {
- // this can happen for e.g. @cImport packages
- return gpa.dupe(u8, "<unnamed>");
- };
-
- // we found a path to the module! unfortunately, we can only traverse *up* it, so we have to put
- // all the names into a buffer so we can then print them in order.
- var names = std.ArrayList([]const u8).init(gpa);
- defer names.deinit();
-
- var cur: *const Parented = linked;
- while (cur.parent) |parent| : (cur = parent) {
- // find cur's name in parent
- var it = parent.mod.table.iterator();
- const name = while (it.next()) |kv| {
- if (kv.value_ptr.* == cur.mod) {
- break kv.key_ptr.*;
- }
- } else unreachable;
- try names.append(name);
- }
-
- // finally, print the names into a buffer!
- var buf = std.ArrayList(u8).init(gpa);
- defer buf.deinit();
- try buf.writer().writeAll("root");
- var i: usize = names.items.len;
- while (i > 0) {
- i -= 1;
- try buf.writer().print(".{s}", .{names.items[i]});
+ pub fn join(p: Path, arena: Allocator, sub_path: []const u8) Allocator.Error!Path {
+ if (sub_path.len == 0) return p;
+ const parts: []const []const u8 =
+ if (p.sub_path.len == 0) &.{sub_path} else &.{ p.sub_path, sub_path };
+ return .{
+ .root_dir = p.root_dir,
+ .sub_path = try fs.path.join(arena, parts),
+ };
}
- return buf.toOwnedSlice();
-}
-
-pub const build_zig_basename = "build.zig";
-
-/// Fetches a package and all of its dependencies recursively. Writes the
-/// corresponding datastructures for the build runner into `dependencies_source`.
-pub fn fetchAndAddDependencies(
- pkg: *Package,
- deps_pkg: *Package,
- arena: Allocator,
- thread_pool: *ThreadPool,
- http_client: *std.http.Client,
- directory: Compilation.Directory,
- global_cache_directory: Compilation.Directory,
- local_cache_directory: Compilation.Directory,
- dependencies_source: *std.ArrayList(u8),
- error_bundle: *std.zig.ErrorBundle.Wip,
- all_modules: *AllModules,
- root_prog_node: *std.Progress.Node,
- /// null for the root package
- this_hash: ?[]const u8,
-) !void {
- const max_bytes = 10 * 1024 * 1024;
- const gpa = thread_pool.allocator;
- const build_zig_zon_bytes = directory.handle.readFileAllocOptions(
- arena,
- Manifest.basename,
- max_bytes,
- null,
- 1,
- 0,
- ) catch |err| switch (err) {
- error.FileNotFound => {
- // Handle the same as no dependencies.
- if (this_hash) |hash| {
- try dependencies_source.writer().print(
- \\ pub const {} = struct {{
- \\ pub const build_root = "{}";
- \\ pub const build_zig = @import("{}");
- \\ pub const deps: []const struct {{ []const u8, []const u8 }} = &.{{}};
- \\ }};
- \\
- , .{
- std.zig.fmtId(hash),
- std.zig.fmtEscapes(pkg.root_src_directory.path.?),
- std.zig.fmtEscapes(hash),
- });
- } else {
- try dependencies_source.writer().writeAll(
- \\pub const packages = struct {};
- \\pub const root_deps: []const struct { []const u8, []const u8 } = &.{};
- \\
- );
- }
- return;
- },
- else => |e| return e,
- };
-
- var ast = try std.zig.Ast.parse(gpa, build_zig_zon_bytes, .zon);
- defer ast.deinit(gpa);
-
- if (ast.errors.len > 0) {
- const file_path = try directory.join(arena, &.{Manifest.basename});
- try main.putAstErrorsIntoBundle(gpa, ast, file_path, error_bundle);
- return error.PackageFetchFailed;
+ pub fn resolvePosix(p: Path, arena: Allocator, sub_path: []const u8) Allocator.Error!Path {
+ if (sub_path.len == 0) return p;
+ return .{
+ .root_dir = p.root_dir,
+ .sub_path = try fs.path.resolvePosix(arena, &.{ p.sub_path, sub_path }),
+ };
}
- var manifest = try Manifest.parse(gpa, ast);
- defer manifest.deinit(gpa);
-
- if (manifest.errors.len > 0) {
- const file_path = try directory.join(arena, &.{Manifest.basename});
- for (manifest.errors) |msg| {
- const str = try error_bundle.addString(msg.msg);
- try Report.addErrorMessage(&ast, file_path, error_bundle, 0, str, msg.tok, msg.off);
- }
- return error.PackageFetchFailed;
+ pub fn joinString(p: Path, allocator: Allocator, sub_path: []const u8) Allocator.Error![]u8 {
+ const parts: []const []const u8 =
+ if (p.sub_path.len == 0) &.{sub_path} else &.{ p.sub_path, sub_path };
+ return p.root_dir.join(allocator, parts);
}
- const report: Report = .{
- .ast = &ast,
- .directory = directory,
- .error_bundle = error_bundle,
- };
-
- for (manifest.dependencies.values()) |dep| {
- // If the hash is invalid, let errors happen later
- // We only want to add these for progress reporting
- const hash = dep.hash orelse continue;
- if (hash.len != hex_multihash_len) continue;
- const gop = try all_modules.getOrPut(gpa, hash[0..hex_multihash_len].*);
- if (!gop.found_existing) gop.value_ptr.* = null;
+ pub fn joinStringZ(p: Path, allocator: Allocator, sub_path: []const u8) Allocator.Error![:0]u8 {
+ const parts: []const []const u8 =
+ if (p.sub_path.len == 0) &.{sub_path} else &.{ p.sub_path, sub_path };
+ return p.root_dir.joinZ(allocator, parts);
}
- root_prog_node.setEstimatedTotalItems(all_modules.count());
-
- if (this_hash == null) {
- try dependencies_source.writer().writeAll("pub const packages = struct {\n");
+ pub fn openFile(
+ p: Path,
+ sub_path: []const u8,
+ flags: fs.File.OpenFlags,
+ ) !fs.File {
+ var buf: [fs.MAX_PATH_BYTES]u8 = undefined;
+ const joined_path = if (p.sub_path.len == 0) sub_path else p: {
+ break :p std.fmt.bufPrint(&buf, "{s}" ++ fs.path.sep_str ++ "{s}", .{
+ p.sub_path, sub_path,
+ }) catch return error.NameTooLong;
+ };
+ return p.root_dir.handle.openFile(joined_path, flags);
}
- for (manifest.dependencies.keys(), manifest.dependencies.values()) |name, *dep| {
- var fetch_location = try FetchLocation.init(gpa, dep.*, directory, report);
- defer fetch_location.deinit(gpa);
-
- // Directories do not provide a hash in build.zig.zon.
- // Hash the path to the module rather than its contents.
- const sub_mod, const found_existing = if (fetch_location == .directory)
- try getDirectoryModule(gpa, fetch_location, directory, all_modules, dep, report)
- else
- try getCachedPackage(
- gpa,
- global_cache_directory,
- dep.*,
- all_modules,
- root_prog_node,
- ) orelse .{
- try fetchAndUnpack(
- fetch_location,
- thread_pool,
- http_client,
- directory,
- global_cache_directory,
- dep.*,
- report,
- all_modules,
- root_prog_node,
- name,
- ),
- false,
- };
-
- assert(dep.hash != null);
-
- switch (sub_mod) {
- .zig_pkg => |sub_pkg| {
- if (!found_existing) {
- try sub_pkg.fetchAndAddDependencies(
- deps_pkg,
- arena,
- thread_pool,
- http_client,
- sub_pkg.root_src_directory,
- global_cache_directory,
- local_cache_directory,
- dependencies_source,
- error_bundle,
- all_modules,
- root_prog_node,
- dep.hash.?,
- );
- }
-
- try pkg.add(gpa, name, sub_pkg);
- if (deps_pkg.table.get(dep.hash.?)) |other_sub| {
- // This should be the same package (and hence module) since it's the same hash
- // TODO: dedup multiple versions of the same package
- assert(other_sub == sub_pkg);
- } else {
- try deps_pkg.add(gpa, dep.hash.?, sub_pkg);
- }
- },
- .non_zig_pkg => |sub_pkg| {
- if (!found_existing) {
- try dependencies_source.writer().print(
- \\ pub const {} = struct {{
- \\ pub const build_root = "{}";
- \\ pub const deps: []const struct {{ []const u8, []const u8 }} = &.{{}};
- \\ }};
- \\
- , .{
- std.zig.fmtId(dep.hash.?),
- std.zig.fmtEscapes(sub_pkg.root_src_directory.path.?),
- });
- }
- },
- }
+ pub fn makeOpenPath(p: Path, sub_path: []const u8, opts: fs.OpenDirOptions) !fs.Dir {
+ var buf: [fs.MAX_PATH_BYTES]u8 = undefined;
+ const joined_path = if (p.sub_path.len == 0) sub_path else p: {
+ break :p std.fmt.bufPrint(&buf, "{s}" ++ fs.path.sep_str ++ "{s}", .{
+ p.sub_path, sub_path,
+ }) catch return error.NameTooLong;
+ };
+ return p.root_dir.handle.makeOpenPath(joined_path, opts);
}
- if (this_hash) |hash| {
- try dependencies_source.writer().print(
- \\ pub const {} = struct {{
- \\ pub const build_root = "{}";
- \\ pub const build_zig = @import("{}");
- \\ pub const deps: []const struct {{ []const u8, []const u8 }} = &.{{
- \\
- , .{
- std.zig.fmtId(hash),
- std.zig.fmtEscapes(pkg.root_src_directory.path.?),
- std.zig.fmtEscapes(hash),
- });
- for (manifest.dependencies.keys(), manifest.dependencies.values()) |name, dep| {
- try dependencies_source.writer().print(
- " .{{ \"{}\", \"{}\" }},\n",
- .{ std.zig.fmtEscapes(name), std.zig.fmtEscapes(dep.hash.?) },
- );
- }
- try dependencies_source.writer().writeAll(
- \\ };
- \\ };
- \\
- );
- } else {
- try dependencies_source.writer().writeAll(
- \\};
- \\
- \\pub const root_deps: []const struct { []const u8, []const u8 } = &.{
- \\
- );
- for (manifest.dependencies.keys(), manifest.dependencies.values()) |name, dep| {
- try dependencies_source.writer().print(
- " .{{ \"{}\", \"{}\" }},\n",
- .{ std.zig.fmtEscapes(name), std.zig.fmtEscapes(dep.hash.?) },
- );
- }
- try dependencies_source.writer().writeAll("};\n");
+ pub fn statFile(p: Path, sub_path: []const u8) !fs.Dir.Stat {
+ var buf: [fs.MAX_PATH_BYTES]u8 = undefined;
+ const joined_path = if (p.sub_path.len == 0) sub_path else p: {
+ break :p std.fmt.bufPrint(&buf, "{s}" ++ fs.path.sep_str ++ "{s}", .{
+ p.sub_path, sub_path,
+ }) catch return error.NameTooLong;
+ };
+ return p.root_dir.handle.statFile(joined_path);
+ }
+
+ pub fn atomicFile(
+ p: Path,
+ sub_path: []const u8,
+ options: fs.Dir.AtomicFileOptions,
+ ) !fs.AtomicFile {
+ var buf: [fs.MAX_PATH_BYTES]u8 = undefined;
+ const joined_path = if (p.sub_path.len == 0) sub_path else p: {
+ break :p std.fmt.bufPrint(&buf, "{s}" ++ fs.path.sep_str ++ "{s}", .{
+ p.sub_path, sub_path,
+ }) catch return error.NameTooLong;
+ };
+ return p.root_dir.handle.atomicFile(joined_path, options);
}
-}
-pub fn createFilePkg(
- gpa: Allocator,
- cache_directory: Compilation.Directory,
- basename: []const u8,
- contents: []const u8,
-) !*Package {
- const rand_int = std.crypto.random.int(u64);
- const tmp_dir_sub_path = "tmp" ++ fs.path.sep_str ++ Manifest.hex64(rand_int);
- {
- var tmp_dir = try cache_directory.handle.makeOpenPath(tmp_dir_sub_path, .{});
- defer tmp_dir.close();
- try tmp_dir.writeFile(basename, contents);
+ pub fn access(p: Path, sub_path: []const u8, flags: fs.File.OpenFlags) !void {
+ var buf: [fs.MAX_PATH_BYTES]u8 = undefined;
+ const joined_path = if (p.sub_path.len == 0) sub_path else p: {
+ break :p std.fmt.bufPrint(&buf, "{s}" ++ fs.path.sep_str ++ "{s}", .{
+ p.sub_path, sub_path,
+ }) catch return error.NameTooLong;
+ };
+ return p.root_dir.handle.access(joined_path, flags);
}
- var hh: Cache.HashHelper = .{};
- hh.addBytes(build_options.version);
- hh.addBytes(contents);
- const hex_digest = hh.final();
-
- const o_dir_sub_path = "o" ++ fs.path.sep_str ++ hex_digest;
- try renameTmpIntoCache(cache_directory.handle, tmp_dir_sub_path, o_dir_sub_path);
-
- return createWithDir(gpa, cache_directory, o_dir_sub_path, basename);
-}
-
-pub const Report = struct {
- ast: ?*const std.zig.Ast,
- directory: Compilation.Directory,
- error_bundle: *std.zig.ErrorBundle.Wip,
-
- fn fail(
- report: Report,
- tok: std.zig.Ast.TokenIndex,
+ pub fn format(
+ self: Path,
comptime fmt_string: []const u8,
- fmt_args: anytype,
- ) error{ PackageFetchFailed, OutOfMemory } {
- const msg = try report.error_bundle.printString(fmt_string, fmt_args);
- return failMsg(report, tok, msg);
- }
-
- fn failMsg(
- report: Report,
- tok: std.zig.Ast.TokenIndex,
- msg: u32,
- ) error{ PackageFetchFailed, OutOfMemory } {
- const gpa = report.error_bundle.gpa;
-
- const file_path = try report.directory.join(gpa, &.{Manifest.basename});
- defer gpa.free(file_path);
-
- const eb = report.error_bundle;
-
- if (report.ast) |ast| {
- try addErrorMessage(ast, file_path, eb, 0, msg, tok, 0);
- } else {
- try eb.addRootErrorMessage(.{
- .msg = msg,
- .src_loc = .none,
- .notes_len = 0,
- });
- }
-
- return error.PackageFetchFailed;
- }
-
- fn addErrorWithNotes(
- report: Report,
- notes_len: u32,
- msg: Manifest.ErrorMessage,
- ) error{OutOfMemory}!void {
- const eb = report.error_bundle;
- const msg_str = try eb.addString(msg.msg);
- if (report.ast) |ast| {
- const gpa = eb.gpa;
- const file_path = try report.directory.join(gpa, &.{Manifest.basename});
- defer gpa.free(file_path);
- return addErrorMessage(ast, file_path, eb, notes_len, msg_str, msg.tok, msg.off);
- } else {
- return eb.addRootErrorMessage(.{
- .msg = msg_str,
- .src_loc = .none,
- .notes_len = notes_len,
- });
- }
- }
-
- fn addErrorMessage(
- ast: *const std.zig.Ast,
- file_path: []const u8,
- eb: *std.zig.ErrorBundle.Wip,
- notes_len: u32,
- msg_str: u32,
- msg_tok: std.zig.Ast.TokenIndex,
- msg_off: u32,
- ) error{OutOfMemory}!void {
- const token_starts = ast.tokens.items(.start);
- const start_loc = ast.tokenLocation(0, msg_tok);
-
- try eb.addRootErrorMessage(.{
- .msg = msg_str,
- .src_loc = try eb.addSourceLocation(.{
- .src_path = try eb.addString(file_path),
- .span_start = token_starts[msg_tok],
- .span_end = @as(u32, @intCast(token_starts[msg_tok] + ast.tokenSlice(msg_tok).len)),
- .span_main = token_starts[msg_tok] + msg_off,
- .line = @intCast(start_loc.line),
- .column = @as(u32, @intCast(start_loc.column)),
- .source_line = try eb.addString(ast.source[start_loc.line_start..start_loc.line_end]),
- }),
- .notes_len = notes_len,
- });
- }
-};
-
-pub const FetchLocation = union(enum) {
- /// The relative path to a file or directory.
- /// This may be a file that requires unpacking (such as a .tar.gz),
- /// or the path to the root directory of a package.
- file: []const u8,
- directory: []const u8,
- http_request: std.Uri,
- git_request: std.Uri,
-
- pub fn init(
- gpa: Allocator,
- dep: Manifest.Dependency,
- root_dir: Compilation.Directory,
- report: Report,
- ) !FetchLocation {
- switch (dep.location) {
- .url => |url| {
- const uri = std.Uri.parse(url) catch |err| switch (err) {
- error.UnexpectedCharacter => return report.fail(dep.location_tok, "failed to parse dependency location as URI", .{}),
- else => return err,
- };
- return initUri(uri, dep.location_tok, report);
- },
- .path => |path| {
- if (fs.path.isAbsolute(path)) {
- return report.fail(dep.location_tok, "absolute paths are not allowed. Use a relative path instead", .{});
- }
-
- const is_dir = isDirectory(root_dir, path) catch |err| switch (err) {
- error.FileNotFound => return report.fail(dep.location_tok, "file not found: {s}", .{path}),
- else => return err,
- };
-
- return if (is_dir)
- .{ .directory = try gpa.dupe(u8, path) }
- else
- .{ .file = try gpa.dupe(u8, path) };
- },
- }
- }
-
- pub fn initUri(uri: std.Uri, location_tok: std.zig.Ast.TokenIndex, report: Report) !FetchLocation {
- if (ascii.eqlIgnoreCase(uri.scheme, "file")) {
- return report.fail(location_tok, "'file' scheme is not allowed for URLs. Use '.path' instead", .{});
- } else if (ascii.eqlIgnoreCase(uri.scheme, "http") or ascii.eqlIgnoreCase(uri.scheme, "https")) {
- return .{ .http_request = uri };
- } else if (ascii.eqlIgnoreCase(uri.scheme, "git+http") or ascii.eqlIgnoreCase(uri.scheme, "git+https")) {
- return .{ .git_request = uri };
- } else {
- return report.fail(location_tok, "unsupported URL scheme: {s}", .{uri.scheme});
- }
- }
-
- pub fn deinit(f: *FetchLocation, gpa: Allocator) void {
- switch (f.*) {
- .file, .directory => |path| gpa.free(path),
- .http_request, .git_request => {},
- }
- f.* = undefined;
- }
-
- pub fn fetch(
- f: FetchLocation,
- gpa: Allocator,
- root_dir: Compilation.Directory,
- http_client: *std.http.Client,
- dep_location_tok: std.zig.Ast.TokenIndex,
- report: Report,
- ) !ReadableResource {
- switch (f) {
- .file => |file| {
- const owned_path = try gpa.dupe(u8, file);
- errdefer gpa.free(owned_path);
- return .{
- .path = owned_path,
- .resource = .{ .file = try root_dir.handle.openFile(file, .{}) },
- };
- },
- .http_request => |uri| {
- var h = std.http.Headers{ .allocator = gpa };
- defer h.deinit();
-
- var req = try http_client.request(.GET, uri, h, .{});
- errdefer req.deinit();
-
- try req.start(.{});
- try req.wait();
-
- if (req.response.status != .ok) {
- return report.fail(dep_location_tok, "expected response status '200 OK' got '{} {s}'", .{
- @intFromEnum(req.response.status),
- req.response.status.phrase() orelse "",
- });
- }
-
- return .{
- .path = try gpa.dupe(u8, uri.path),
- .resource = .{ .http_request = req },
- };
- },
- .git_request => |uri| {
- var transport_uri = uri;
- transport_uri.scheme = uri.scheme["git+".len..];
- var redirect_uri: []u8 = undefined;
- var session: git.Session = .{ .transport = http_client, .uri = transport_uri };
- session.discoverCapabilities(gpa, &redirect_uri) catch |e| switch (e) {
- error.Redirected => {
- defer gpa.free(redirect_uri);
- return report.fail(dep_location_tok, "repository moved to {s}", .{redirect_uri});
- },
- else => |other| return other,
- };
-
- const want_oid = want_oid: {
- const want_ref = uri.fragment orelse "HEAD";
- if (git.parseOid(want_ref)) |oid| break :want_oid oid else |_| {}
-
- const want_ref_head = try std.fmt.allocPrint(gpa, "refs/heads/{s}", .{want_ref});
- defer gpa.free(want_ref_head);
- const want_ref_tag = try std.fmt.allocPrint(gpa, "refs/tags/{s}", .{want_ref});
- defer gpa.free(want_ref_tag);
-
- var ref_iterator = try session.listRefs(gpa, .{
- .ref_prefixes = &.{ want_ref, want_ref_head, want_ref_tag },
- .include_peeled = true,
- });
- defer ref_iterator.deinit();
- while (try ref_iterator.next()) |ref| {
- if (mem.eql(u8, ref.name, want_ref) or
- mem.eql(u8, ref.name, want_ref_head) or
- mem.eql(u8, ref.name, want_ref_tag))
- {
- break :want_oid ref.peeled orelse ref.oid;
- }
- }
- return report.fail(dep_location_tok, "ref not found: {s}", .{want_ref});
- };
- if (uri.fragment == null) {
- const notes_len = 1;
- try report.addErrorWithNotes(notes_len, .{
- .tok = dep_location_tok,
- .off = 0,
- .msg = "url field is missing an explicit ref",
- });
- const eb = report.error_bundle;
- const notes_start = try eb.reserveNotes(notes_len);
- eb.extra.items[notes_start] = @intFromEnum(try eb.addErrorMessage(.{
- .msg = try eb.printString("try .url = \"{+/}#{}\",", .{ uri, std.fmt.fmtSliceHexLower(&want_oid) }),
- }));
- return error.PackageFetchFailed;
- }
-
- var want_oid_buf: [git.fmt_oid_length]u8 = undefined;
- _ = std.fmt.bufPrint(&want_oid_buf, "{}", .{std.fmt.fmtSliceHexLower(&want_oid)}) catch unreachable;
- var fetch_stream = try session.fetch(gpa, &.{&want_oid_buf});
- errdefer fetch_stream.deinit();
-
- return .{
- .path = try gpa.dupe(u8, &want_oid_buf),
- .resource = .{ .git_fetch_stream = fetch_stream },
- };
- },
- .directory => unreachable, // Directories do not require fetching
- }
- }
-};
-
-pub const ReadableResource = struct {
- path: []const u8,
- resource: union(enum) {
- file: fs.File,
- http_request: std.http.Client.Request,
- git_fetch_stream: git.Session.FetchStream,
- dir: fs.IterableDir,
- },
-
- /// Unpack the package into the global cache directory.
- /// If `ps` does not require unpacking (for example, if it is a directory), then no caching is performed.
- /// In either case, the hash is computed and returned along with the path to the package.
- pub fn unpack(
- rr: *ReadableResource,
- allocator: Allocator,
- thread_pool: *ThreadPool,
- global_cache_directory: Compilation.Directory,
- dep_location_tok: std.zig.Ast.TokenIndex,
- report: Report,
- pkg_prog_node: *std.Progress.Node,
- ) !PackageLocation {
- switch (rr.resource) {
- inline .file, .http_request, .git_fetch_stream, .dir => |*r, tag| {
- const s = fs.path.sep_str;
- const rand_int = std.crypto.random.int(u64);
- const tmp_dir_sub_path = "tmp" ++ s ++ Manifest.hex64(rand_int);
-
- const actual_hash = h: {
- var tmp_directory: Compilation.Directory = d: {
- const path = try global_cache_directory.join(allocator, &.{tmp_dir_sub_path});
- errdefer allocator.free(path);
-
- const iterable_dir = try global_cache_directory.handle.makeOpenPathIterable(tmp_dir_sub_path, .{});
- errdefer iterable_dir.close();
-
- break :d .{
- .path = path,
- .handle = iterable_dir.dir,
- };
- };
- defer tmp_directory.closeAndFree(allocator);
-
- if (tag != .dir) {
- const opt_content_length = try rr.getSize();
-
- var prog_reader: ProgressReader(@TypeOf(r.reader())) = .{
- .child_reader = r.reader(),
- .prog_node = pkg_prog_node,
- .unit = if (opt_content_length) |content_length| unit: {
- const kib = content_length / 1024;
- const mib = kib / 1024;
- if (mib > 0) {
- pkg_prog_node.setEstimatedTotalItems(@intCast(mib));
- pkg_prog_node.setUnit("MiB");
- break :unit .mib;
- } else {
- pkg_prog_node.setEstimatedTotalItems(@intCast(@max(1, kib)));
- pkg_prog_node.setUnit("KiB");
- break :unit .kib;
- }
- } else .any,
- };
-
- switch (try rr.getFileType(dep_location_tok, report)) {
- .tar => try unpackTarball(allocator, prog_reader.reader(), tmp_directory.handle, dep_location_tok, report),
- .@"tar.gz" => try unpackTarballCompressed(allocator, prog_reader, tmp_directory.handle, dep_location_tok, report, std.compress.gzip),
- .@"tar.xz" => try unpackTarballCompressed(allocator, prog_reader, tmp_directory.handle, dep_location_tok, report, std.compress.xz),
- .git_pack => try unpackGitPack(allocator, &prog_reader, git.parseOid(rr.path) catch unreachable, tmp_directory.handle, dep_location_tok, report),
- }
- } else {
- // Recursive directory copy.
- var it = try r.walk(allocator);
- defer it.deinit();
- while (try it.next()) |entry| {
- switch (entry.kind) {
- .directory => try tmp_directory.handle.makePath(entry.path),
- .file => try r.dir.copyFile(
- entry.path,
- tmp_directory.handle,
- entry.path,
- .{},
- ),
- .sym_link => {
- var buf: [fs.MAX_PATH_BYTES]u8 = undefined;
- const link_name = try r.dir.readLink(entry.path, &buf);
- // TODO: if this would create a symlink to outside
- // the destination directory, fail with an error instead.
- try tmp_directory.handle.symLink(link_name, entry.path, .{});
- },
- else => return error.IllegalFileTypeInPackage,
- }
- }
- }
-
- break :h try computePackageHash(thread_pool, .{ .dir = tmp_directory.handle });
- };
-
- const pkg_dir_sub_path = "p" ++ s ++ Manifest.hexDigest(actual_hash);
- const unpacked_path = try global_cache_directory.join(allocator, &.{pkg_dir_sub_path});
- defer allocator.free(unpacked_path);
-
- const relative_unpacked_path = try fs.path.relative(allocator, global_cache_directory.path.?, unpacked_path);
- errdefer allocator.free(relative_unpacked_path);
- try renameTmpIntoCache(global_cache_directory.handle, tmp_dir_sub_path, relative_unpacked_path);
-
- return .{
- .hash = actual_hash,
- .relative_unpacked_path = relative_unpacked_path,
- };
- },
- }
- }
-
- const FileType = enum {
- tar,
- @"tar.gz",
- @"tar.xz",
- git_pack,
- };
-
- pub fn getSize(rr: ReadableResource) !?u64 {
- switch (rr.resource) {
- .file => |f| return (try f.metadata()).size(),
- // TODO: Handle case of chunked content-length
- .http_request => |req| return req.response.content_length,
- .git_fetch_stream => |stream| return stream.request.response.content_length,
- .dir => unreachable,
- }
- }
-
- pub fn getFileType(
- rr: ReadableResource,
- dep_location_tok: std.zig.Ast.TokenIndex,
- report: Report,
- ) !FileType {
- switch (rr.resource) {
- .file => {
- return fileTypeFromPath(rr.path) orelse
- return report.fail(dep_location_tok, "unknown file type", .{});
- },
- .http_request => |req| {
- const content_type = req.response.headers.getFirstValue("Content-Type") orelse
- return report.fail(dep_location_tok, "missing 'Content-Type' header", .{});
-
- // If the response has a different content type than the URI indicates, override
- // the previously assumed file type.
- if (ascii.eqlIgnoreCase(content_type, "application/x-tar")) return .tar;
-
- return if (ascii.eqlIgnoreCase(content_type, "application/gzip") or
- ascii.eqlIgnoreCase(content_type, "application/x-gzip") or
- ascii.eqlIgnoreCase(content_type, "application/tar+gzip"))
- .@"tar.gz"
- else if (ascii.eqlIgnoreCase(content_type, "application/x-xz"))
- .@"tar.xz"
- else if (ascii.eqlIgnoreCase(content_type, "application/octet-stream")) ty: {
- // support gitlab tarball urls such as https://gitlab.com/<namespace>/<project>/-/archive/<sha>/<project>-<sha>.tar.gz
- // whose content-disposition header is: 'attachment; filename="<project>-<sha>.tar.gz"'
- const content_disposition = req.response.headers.getFirstValue("Content-Disposition") orelse
- return report.fail(dep_location_tok, "missing 'Content-Disposition' header for Content-Type=application/octet-stream", .{});
- break :ty getAttachmentType(content_disposition) orelse
- return report.fail(dep_location_tok, "unsupported 'Content-Disposition' header value: '{s}' for Content-Type=application/octet-stream", .{content_disposition});
- } else return report.fail(dep_location_tok, "unrecognized value for 'Content-Type' header: {s}", .{content_type});
- },
- .git_fetch_stream => return .git_pack,
- .dir => unreachable,
- }
- }
-
- fn fileTypeFromPath(file_path: []const u8) ?FileType {
- if (ascii.endsWithIgnoreCase(file_path, ".tar")) return .tar;
- if (ascii.endsWithIgnoreCase(file_path, ".tar.gz")) return .@"tar.gz";
- if (ascii.endsWithIgnoreCase(file_path, ".tar.xz")) return .@"tar.xz";
- return null;
- }
-
- fn getAttachmentType(content_disposition: []const u8) ?FileType {
- const disposition_type_end = ascii.indexOfIgnoreCase(content_disposition, "attachment;") orelse return null;
-
- var value_start = ascii.indexOfIgnoreCasePos(content_disposition, disposition_type_end + 1, "filename") orelse return null;
- value_start += "filename".len;
- if (content_disposition[value_start] == '*') {
- value_start += 1;
- }
- if (content_disposition[value_start] != '=') return null;
- value_start += 1;
-
- var value_end = mem.indexOfPos(u8, content_disposition, value_start, ";") orelse content_disposition.len;
- if (content_disposition[value_end - 1] == '\"') {
- value_end -= 1;
- }
- return fileTypeFromPath(content_disposition[value_start..value_end]);
- }
-
- pub fn deinit(rr: *ReadableResource, gpa: Allocator) void {
- gpa.free(rr.path);
- switch (rr.resource) {
- .file => |file| file.close(),
- .http_request => |*req| req.deinit(),
- .git_fetch_stream => |*stream| stream.deinit(),
- .dir => |*dir| dir.close(),
- }
- rr.* = undefined;
- }
-};
-
-pub const PackageLocation = struct {
- /// For packages that require unpacking, this is the hash of the package contents.
- /// For directories, this is the hash of the absolute file path.
- hash: [Manifest.Hash.digest_length]u8,
- relative_unpacked_path: []const u8,
-
- pub fn deinit(pl: *PackageLocation, allocator: Allocator) void {
- allocator.free(pl.relative_unpacked_path);
- pl.* = undefined;
- }
-};
-
-const hex_multihash_len = 2 * Manifest.multihash_len;
-const MultiHashHexDigest = [hex_multihash_len]u8;
-
-const DependencyModule = union(enum) {
- zig_pkg: *Package,
- non_zig_pkg: *Package,
-};
-/// This is to avoid creating multiple modules for the same build.zig file.
-/// If the value is `null`, the package is a known dependency, but has not yet
-/// been fetched.
-pub const AllModules = std.AutoHashMapUnmanaged(MultiHashHexDigest, ?DependencyModule);
-
-fn ProgressReader(comptime ReaderType: type) type {
- return struct {
- child_reader: ReaderType,
- bytes_read: u64 = 0,
- prog_node: *std.Progress.Node,
- unit: enum {
- kib,
- mib,
- any,
- },
-
- pub const Error = ReaderType.Error;
- pub const Reader = std.io.Reader(*@This(), Error, read);
-
- pub fn read(self: *@This(), buf: []u8) Error!usize {
- const amt = try self.child_reader.read(buf);
- self.bytes_read += amt;
- const kib = self.bytes_read / 1024;
- const mib = kib / 1024;
- switch (self.unit) {
- .kib => self.prog_node.setCompletedItems(@intCast(kib)),
- .mib => self.prog_node.setCompletedItems(@intCast(mib)),
- .any => {
- if (mib > 0) {
- self.prog_node.setUnit("MiB");
- self.prog_node.setCompletedItems(@intCast(mib));
- } else {
- self.prog_node.setUnit("KiB");
- self.prog_node.setCompletedItems(@intCast(kib));
- }
- },
+ options: std.fmt.FormatOptions,
+ writer: anytype,
+ ) !void {
+ if (fmt_string.len == 1) {
+ // Quote-escape the string.
+ const stringEscape = std.zig.fmt.stringEscape;
+ const f = switch (fmt_string[0]) {
+ 'q' => "",
+ '\'' => '\'',
+ else => @compileError("unsupported format string: " ++ fmt_string),
+ };
+ if (self.root_dir.path) |p| {
+ try stringEscape(p, f, options, writer);
+ if (self.sub_path.len > 0) try writer.writeAll(fs.path.sep_str);
}
- self.prog_node.activate();
- return amt;
- }
-
- pub fn reader(self: *@This()) Reader {
- return .{ .context = self };
- }
- };
-}
-
-/// Get a cached package if it exists.
-/// Returns `null` if the package has not been cached
-/// If the package exists in the cache, returns a pointer to the package and a
-/// boolean indicating whether this package has already been seen in the build
-/// (i.e. whether or not its transitive dependencies have been fetched).
-fn getCachedPackage(
- gpa: Allocator,
- global_cache_directory: Compilation.Directory,
- dep: Manifest.Dependency,
- all_modules: *AllModules,
- root_prog_node: *std.Progress.Node,
-) !?struct { DependencyModule, bool } {
- const s = fs.path.sep_str;
- // Check if the expected_hash is already present in the global package
- // cache, and thereby avoid both fetching and unpacking.
- if (dep.hash) |h| {
- const hex_digest = h[0..hex_multihash_len];
- const pkg_dir_sub_path = "p" ++ s ++ hex_digest;
-
- var pkg_dir = global_cache_directory.handle.openDir(pkg_dir_sub_path, .{}) catch |err| switch (err) {
- error.FileNotFound => return null,
- else => |e| return e,
- };
- errdefer pkg_dir.close();
-
- // The compiler has a rule that a file must not be included in multiple modules,
- // so we must detect if a module has been created for this package and reuse it.
- const gop = try all_modules.getOrPut(gpa, hex_digest.*);
- if (gop.found_existing) {
- if (gop.value_ptr.*) |mod| {
- return .{ mod, true };
- }
- }
-
- root_prog_node.completeOne();
-
- const is_zig_mod = if (pkg_dir.access(build_zig_basename, .{})) |_| true else |_| false;
- const basename = if (is_zig_mod) build_zig_basename else "";
- const pkg = try createWithDir(gpa, global_cache_directory, pkg_dir_sub_path, basename);
-
- const module: DependencyModule = if (is_zig_mod)
- .{ .zig_pkg = pkg }
- else
- .{ .non_zig_pkg = pkg };
-
- try all_modules.put(gpa, hex_digest.*, module);
- return .{ module, false };
- }
-
- return null;
-}
-
-fn getDirectoryModule(
- gpa: Allocator,
- fetch_location: FetchLocation,
- directory: Compilation.Directory,
- all_modules: *AllModules,
- dep: *Manifest.Dependency,
- report: Report,
-) !struct { DependencyModule, bool } {
- assert(fetch_location == .directory);
-
- if (dep.hash != null) {
- return report.fail(dep.hash_tok, "hash not allowed for directory package", .{});
- }
-
- const hash = try computePathHash(gpa, directory, fetch_location.directory);
- const hex_digest = Manifest.hexDigest(hash);
- dep.hash = try gpa.dupe(u8, &hex_digest);
-
- // There is no fixed location to check for directory modules.
- // Instead, check whether it is already listed in all_modules.
- if (all_modules.get(hex_digest)) |mod| return .{ mod.?, true };
-
- var pkg_dir = directory.handle.openDir(fetch_location.directory, .{}) catch |err| switch (err) {
- error.FileNotFound => return report.fail(dep.location_tok, "file not found: {s}", .{fetch_location.directory}),
- else => |e| return e,
- };
- defer pkg_dir.close();
-
- const is_zig_mod = if (pkg_dir.access(build_zig_basename, .{})) |_| true else |_| false;
- const basename = if (is_zig_mod) build_zig_basename else "";
-
- const pkg = try createWithDir(gpa, directory, fetch_location.directory, basename);
- const module: DependencyModule = if (is_zig_mod)
- .{ .zig_pkg = pkg }
- else
- .{ .non_zig_pkg = pkg };
-
- try all_modules.put(gpa, hex_digest, module);
- return .{ module, false };
-}
-
-fn fetchAndUnpack(
- fetch_location: FetchLocation,
- thread_pool: *ThreadPool,
- http_client: *std.http.Client,
- directory: Compilation.Directory,
- global_cache_directory: Compilation.Directory,
- dep: Manifest.Dependency,
- report: Report,
- all_modules: *AllModules,
- root_prog_node: *std.Progress.Node,
- /// This does not have to be any form of canonical or fully-qualified name: it
- /// is only intended to be human-readable for progress reporting.
- name_for_prog: []const u8,
-) !DependencyModule {
- assert(fetch_location != .directory);
-
- const gpa = http_client.allocator;
-
- var pkg_prog_node = root_prog_node.start(name_for_prog, 0);
- defer pkg_prog_node.end();
- pkg_prog_node.activate();
-
- var readable_resource = try fetch_location.fetch(gpa, directory, http_client, dep.location_tok, report);
- defer readable_resource.deinit(gpa);
-
- var package_location = try readable_resource.unpack(
- gpa,
- thread_pool,
- global_cache_directory,
- dep.location_tok,
- report,
- &pkg_prog_node,
- );
- defer package_location.deinit(gpa);
-
- const actual_hex = Manifest.hexDigest(package_location.hash);
- if (dep.hash) |h| {
- if (!mem.eql(u8, h, &actual_hex)) {
- return report.fail(dep.hash_tok, "hash mismatch: expected: {s}, found: {s}", .{
- h, actual_hex,
- });
- }
- } else {
- const notes_len = 1;
- try report.addErrorWithNotes(notes_len, .{
- .tok = dep.location_tok,
- .off = 0,
- .msg = "dependency is missing hash field",
- });
- const eb = report.error_bundle;
- const notes_start = try eb.reserveNotes(notes_len);
- eb.extra.items[notes_start] = @intFromEnum(try eb.addErrorMessage(.{
- .msg = try eb.printString("expected .hash = \"{s}\",", .{&actual_hex}),
- }));
- return error.PackageFetchFailed;
- }
-
- const build_zig_path = try fs.path.join(gpa, &.{ package_location.relative_unpacked_path, build_zig_basename });
- defer gpa.free(build_zig_path);
-
- const is_zig_mod = if (global_cache_directory.handle.access(build_zig_path, .{})) |_| true else |_| false;
- const basename = if (is_zig_mod) build_zig_basename else "";
- const pkg = try createWithDir(gpa, global_cache_directory, package_location.relative_unpacked_path, basename);
- const module: DependencyModule = if (is_zig_mod)
- .{ .zig_pkg = pkg }
- else
- .{ .non_zig_pkg = pkg };
-
- try all_modules.put(gpa, actual_hex, module);
- return module;
-}
-
-fn unpackTarballCompressed(
- gpa: Allocator,
- reader: anytype,
- out_dir: fs.Dir,
- dep_location_tok: std.zig.Ast.TokenIndex,
- report: Report,
- comptime Compression: type,
-) !void {
- var br = std.io.bufferedReaderSize(std.crypto.tls.max_ciphertext_record_len, reader);
-
- var decompress = try Compression.decompress(gpa, br.reader());
- defer decompress.deinit();
-
- return unpackTarball(gpa, decompress.reader(), out_dir, dep_location_tok, report);
-}
-
-fn unpackTarball(
- gpa: Allocator,
- reader: anytype,
- out_dir: fs.Dir,
- dep_location_tok: std.zig.Ast.TokenIndex,
- report: Report,
-) !void {
- var diagnostics: std.tar.Options.Diagnostics = .{ .allocator = gpa };
- defer diagnostics.deinit();
-
- try std.tar.pipeToFileSystem(out_dir, reader, .{
- .diagnostics = &diagnostics,
- .strip_components = 1,
- // TODO: we would like to set this to executable_bit_only, but two
- // things need to happen before that:
- // 1. the tar implementation needs to support it
- // 2. the hashing algorithm here needs to support detecting the is_executable
- // bit on Windows from the ACLs (see the isExecutable function).
- .mode_mode = .ignore,
- });
-
- if (diagnostics.errors.items.len > 0) {
- const notes_len: u32 = @intCast(diagnostics.errors.items.len);
- try report.addErrorWithNotes(notes_len, .{
- .tok = dep_location_tok,
- .off = 0,
- .msg = "unable to unpack tarball",
- });
- const eb = report.error_bundle;
- const notes_start = try eb.reserveNotes(notes_len);
- for (diagnostics.errors.items, notes_start..) |item, note_i| {
- switch (item) {
- .unable_to_create_sym_link => |info| {
- eb.extra.items[note_i] = @intFromEnum(try eb.addErrorMessage(.{
- .msg = try eb.printString("unable to create symlink from '{s}' to '{s}': {s}", .{
- info.file_name, info.link_name, @errorName(info.code),
- }),
- }));
- },
- .unsupported_file_type => |info| {
- eb.extra.items[note_i] = @intFromEnum(try eb.addErrorMessage(.{
- .msg = try eb.printString("file '{s}' has unsupported type '{c}'", .{
- info.file_name, @intFromEnum(info.file_type),
- }),
- }));
- },
+ if (self.sub_path.len > 0) {
+ try stringEscape(self.sub_path, f, options, writer);
}
+ return;
}
- return error.InvalidTarball;
- }
-}
-
-fn unpackGitPack(
- gpa: Allocator,
- reader: anytype,
- want_oid: git.Oid,
- out_dir: fs.Dir,
- dep_location_tok: std.zig.Ast.TokenIndex,
- report: Report,
-) !void {
- // The .git directory is used to store the packfile and associated index, but
- // we do not attempt to replicate the exact structure of a real .git
- // directory, since that isn't relevant for fetching a package.
- {
- var pack_dir = try out_dir.makeOpenPath(".git", .{});
- defer pack_dir.close();
- var pack_file = try pack_dir.createFile("pkg.pack", .{ .read = true });
- defer pack_file.close();
- var fifo = std.fifo.LinearFifo(u8, .{ .Static = 4096 }).init();
- try fifo.pump(reader.reader(), pack_file.writer());
- try pack_file.sync();
-
- var index_file = try pack_dir.createFile("pkg.idx", .{ .read = true });
- defer index_file.close();
- {
- var index_prog_node = reader.prog_node.start("Index pack", 0);
- defer index_prog_node.end();
- index_prog_node.activate();
- var index_buffered_writer = std.io.bufferedWriter(index_file.writer());
- try git.indexPack(gpa, pack_file, index_buffered_writer.writer());
- try index_buffered_writer.flush();
- try index_file.sync();
+ if (fmt_string.len > 0)
+ std.fmt.invalidFmtError(fmt_string, self);
+ if (self.root_dir.path) |p| {
+ try writer.writeAll(p);
+ try writer.writeAll(fs.path.sep_str);
}
-
- {
- var checkout_prog_node = reader.prog_node.start("Checkout", 0);
- defer checkout_prog_node.end();
- checkout_prog_node.activate();
- var repository = try git.Repository.init(gpa, pack_file, index_file);
- defer repository.deinit();
- var diagnostics: git.Diagnostics = .{ .allocator = gpa };
- defer diagnostics.deinit();
- try repository.checkout(out_dir, want_oid, &diagnostics);
-
- if (diagnostics.errors.items.len > 0) {
- const notes_len: u32 = @intCast(diagnostics.errors.items.len);
- try report.addErrorWithNotes(notes_len, .{
- .tok = dep_location_tok,
- .off = 0,
- .msg = "unable to unpack packfile",
- });
- const eb = report.error_bundle;
- const notes_start = try eb.reserveNotes(notes_len);
- for (diagnostics.errors.items, notes_start..) |item, note_i| {
- switch (item) {
- .unable_to_create_sym_link => |info| {
- eb.extra.items[note_i] = @intFromEnum(try eb.addErrorMessage(.{
- .msg = try eb.printString("unable to create symlink from '{s}' to '{s}': {s}", .{
- info.file_name, info.link_name, @errorName(info.code),
- }),
- }));
- },
- }
- }
- return error.InvalidGitPack;
- }
+ if (self.sub_path.len > 0) {
+ try writer.writeAll(self.sub_path);
+ try writer.writeAll(fs.path.sep_str);
}
}
+};
- try out_dir.deleteTree(".git");
-}
-
-/// Compute the hash of a file path.
-fn computePathHash(gpa: Allocator, dir: Compilation.Directory, path: []const u8) ![Manifest.Hash.digest_length]u8 {
- const resolved_path = try std.fs.path.resolve(gpa, &.{ dir.path.?, path });
- defer gpa.free(resolved_path);
- var hasher = Manifest.Hash.init(.{});
- hasher.update(resolved_path);
- return hasher.finalResult();
-}
-
-fn isDirectory(root_dir: Compilation.Directory, path: []const u8) !bool {
- var dir = root_dir.handle.openDir(path, .{}) catch |err| switch (err) {
- error.NotDir => return false,
- else => return err,
- };
- defer dir.close();
- return true;
-}
-
-fn renameTmpIntoCache(
- cache_dir: fs.Dir,
- tmp_dir_sub_path: []const u8,
- dest_dir_sub_path: []const u8,
-) !void {
- assert(dest_dir_sub_path[1] == fs.path.sep);
- var handled_missing_dir = false;
- while (true) {
- cache_dir.rename(tmp_dir_sub_path, dest_dir_sub_path) catch |err| switch (err) {
- error.FileNotFound => {
- if (handled_missing_dir) return err;
- cache_dir.makeDir(dest_dir_sub_path[0..1]) catch |mkd_err| switch (mkd_err) {
- error.PathAlreadyExists => handled_missing_dir = true,
- else => |e| return e,
- };
- continue;
- },
- error.PathAlreadyExists, error.AccessDenied => {
- // Package has been already downloaded and may already be in use on the system.
- cache_dir.deleteTree(tmp_dir_sub_path) catch |del_err| {
- std.log.warn("unable to delete temp directory: {s}", .{@errorName(del_err)});
- };
- },
- else => |e| return e,
- };
- break;
- }
-}
-
-test "getAttachmentType" {
- try std.testing.expectEqual(@as(?ReadableResource.FileType, .@"tar.gz"), ReadableResource.getAttachmentType("attaChment; FILENAME=\"stuff.tar.gz\"; size=42"));
- try std.testing.expectEqual(@as(?ReadableResource.FileType, .@"tar.gz"), ReadableResource.getAttachmentType("attachment; filename*=\"stuff.tar.gz\""));
- try std.testing.expectEqual(@as(?ReadableResource.FileType, .@"tar.xz"), ReadableResource.getAttachmentType("ATTACHMENT; filename=\"stuff.tar.xz\""));
- try std.testing.expectEqual(@as(?ReadableResource.FileType, .@"tar.xz"), ReadableResource.getAttachmentType("attachment; FileName=\"stuff.tar.xz\""));
- try std.testing.expectEqual(@as(?ReadableResource.FileType, .@"tar.gz"), ReadableResource.getAttachmentType("attachment; FileName*=UTF-8\'\'xyz%2Fstuff.tar.gz"));
-
- try std.testing.expect(ReadableResource.getAttachmentType("attachment FileName=\"stuff.tar.gz\"") == null);
- try std.testing.expect(ReadableResource.getAttachmentType("attachment; FileName=\"stuff.tar\"") == null);
- try std.testing.expect(ReadableResource.getAttachmentType("attachment; FileName\"stuff.gz\"") == null);
- try std.testing.expect(ReadableResource.getAttachmentType("attachment; size=42") == null);
- try std.testing.expect(ReadableResource.getAttachmentType("inline; size=42") == null);
- try std.testing.expect(ReadableResource.getAttachmentType("FileName=\"stuff.tar.gz\"; attachment;") == null);
- try std.testing.expect(ReadableResource.getAttachmentType("FileName=\"stuff.tar.gz\";") == null);
-}
+const Package = @This();
+const builtin = @import("builtin");
+const std = @import("std");
+const fs = std.fs;
+const Allocator = std.mem.Allocator;
+const assert = std.debug.assert;
+const Cache = std.Build.Cache;