2012-03-04 20:00:24 +00:00
|
|
|
{- Adds hooks to remotes.
|
|
|
|
-
|
2015-01-21 16:50:09 +00:00
|
|
|
- Copyright 2012 Joey Hess <id@joeyh.name>
|
2012-03-04 20:00:24 +00:00
|
|
|
-
|
2019-03-13 19:48:14 +00:00
|
|
|
- Licensed under the GNU AGPL version 3 or higher.
|
2012-03-04 20:00:24 +00:00
|
|
|
-}
|
|
|
|
|
2020-10-28 21:25:59 +00:00
|
|
|
{-# LANGUAGE OverloadedStrings #-}
|
2013-05-11 20:03:00 +00:00
|
|
|
{-# LANGUAGE CPP #-}
|
|
|
|
|
2012-03-04 20:00:24 +00:00
|
|
|
module Remote.Helper.Hooks (addHooks) where
|
|
|
|
|
|
|
|
import qualified Data.Map as M
|
2020-10-28 21:25:59 +00:00
|
|
|
import qualified System.FilePath.ByteString as P
|
2012-03-04 20:00:24 +00:00
|
|
|
|
2016-01-20 20:36:33 +00:00
|
|
|
import Annex.Common
|
2012-03-04 20:00:24 +00:00
|
|
|
import Types.Remote
|
2014-03-13 23:06:26 +00:00
|
|
|
import Types.CleanupActions
|
2012-03-04 20:00:24 +00:00
|
|
|
import qualified Annex
|
2014-07-10 04:32:23 +00:00
|
|
|
import Annex.LockFile
|
2015-11-12 22:05:45 +00:00
|
|
|
import Annex.LockPool
|
2012-04-21 20:59:49 +00:00
|
|
|
import Annex.Perms
|
2012-03-04 20:00:24 +00:00
|
|
|
|
|
|
|
{- Modifies a remote's access functions to first run the
|
|
|
|
- annex-start-command hook, and trigger annex-stop-command on shutdown.
|
|
|
|
- This way, the hooks are only run when a remote is actively being used.
|
|
|
|
-}
|
2013-01-01 17:52:47 +00:00
|
|
|
addHooks :: Remote -> Remote
|
|
|
|
addHooks r = addHooks' r
|
|
|
|
(remoteAnnexStartCommand $ gitconfig r)
|
|
|
|
(remoteAnnexStopCommand $ gitconfig r)
|
2012-03-04 20:00:24 +00:00
|
|
|
addHooks' :: Remote -> Maybe String -> Maybe String -> Remote
|
|
|
|
addHooks' r Nothing Nothing = r
|
|
|
|
addHooks' r starthook stophook = r'
|
2012-11-11 04:51:07 +00:00
|
|
|
where
|
|
|
|
r' = r
|
2024-07-01 14:42:27 +00:00
|
|
|
{ storeKey = \k af o p ->
|
|
|
|
wrapper $ storeKey r k af o p
|
2021-08-17 16:41:36 +00:00
|
|
|
, retrieveKeyFile = \k f d p vc ->
|
|
|
|
wrapper $ retrieveKeyFile r k f d p vc
|
2020-05-13 21:05:56 +00:00
|
|
|
, retrieveKeyFileCheap = case retrieveKeyFileCheap r of
|
|
|
|
Just a -> Just $ \k af f -> wrapper $ a k af f
|
|
|
|
Nothing -> Nothing
|
toward SafeDropProof expiry checking
Added Maybe POSIXTime to SafeDropProof, which gets set when the proof is
based on a LockedCopy. If there are several LockedCopies, it uses the
closest expiry time. That is not optimal, it may be that the proof
expires based on one LockedCopy but another one has not expired. But
that seems unlikely to really happen, and anyway the user can just
re-run a drop if it fails due to expiry.
Pass the SafeDropProof to removeKey, which is responsible for checking
it for expiry in situations where that could be a problem. Which really
only means in Remote.Git.
Made Remote.Git check expiry when dropping from a local remote.
Checking expiry when dropping from a P2P remote is not yet implemented.
P2P.Protocol.remove has SafeDropProof plumbed through to it for that
purpose.
Fixing the remaining 2 build warnings should complete this work.
Note that the use of a POSIXTime here means that if the clock gets set
forward while git-annex is in the middle of a drop, it may say that
dropping took too long. That seems ok. Less ok is that if the clock gets
turned back a sufficient amount (eg 5 minutes), proof expiry won't be
noticed. It might be better to use the Monotonic clock, but that doesn't
advance when a laptop is suspended, and while there is the linux
Boottime clock, that is not available on other systems. Perhaps a
combination of POSIXTime and the Monotonic clock could detect laptop
suspension and also detect clock being turned back?
There is a potential future flag day where
p2pDefaultLockContentRetentionDuration is not assumed, but is probed
using the P2P protocol, and peers that don't support it can no longer
produce a LockedCopy. Until that happens, when git-annex is
communicating with older peers there is a risk of data loss when
a ssh connection closes during LOCKCONTENT.
2024-07-04 16:23:46 +00:00
|
|
|
, removeKey = \proof k ->
|
|
|
|
wrapper $ removeKey r proof k
|
2014-08-06 17:45:19 +00:00
|
|
|
, checkPresent = wrapper . checkPresent r
|
2012-11-11 04:51:07 +00:00
|
|
|
}
|
|
|
|
where
|
|
|
|
wrapper = runHooks r' starthook stophook
|
2012-03-04 20:00:24 +00:00
|
|
|
|
|
|
|
runHooks :: Remote -> Maybe String -> Maybe String -> Annex a -> Annex a
|
|
|
|
runHooks r starthook stophook a = do
|
|
|
|
dir <- fromRepo gitAnnexRemotesDir
|
2020-10-28 21:25:59 +00:00
|
|
|
let lck = dir P.</> remoteid <> ".lck"
|
2015-05-18 20:23:07 +00:00
|
|
|
whenM (notElem lck . M.keys <$> getLockCache) $ do
|
2020-03-05 18:56:47 +00:00
|
|
|
createAnnexDirectory dir
|
2012-03-04 20:00:24 +00:00
|
|
|
firstrun lck
|
|
|
|
a
|
2012-11-11 04:51:07 +00:00
|
|
|
where
|
2020-10-29 14:53:01 +00:00
|
|
|
remoteid = fromUUID (uuid r)
|
2012-11-11 04:51:07 +00:00
|
|
|
run Nothing = noop
|
|
|
|
run (Just command) = void $ liftIO $
|
|
|
|
boolSystem "sh" [Param "-c", Param command]
|
|
|
|
firstrun lck = do
|
|
|
|
-- Take a shared lock; This indicates that git-annex
|
|
|
|
-- is using the remote, and prevents other instances
|
|
|
|
-- of it from running the stophook. If another
|
|
|
|
-- instance is shutting down right now, this
|
|
|
|
-- will block waiting for its exclusive lock to clear.
|
2015-05-18 20:23:07 +00:00
|
|
|
lockFileCached lck
|
2012-03-04 20:00:24 +00:00
|
|
|
|
2012-11-11 04:51:07 +00:00
|
|
|
-- The starthook is run even if some other git-annex
|
|
|
|
-- is already running, and ran it before.
|
|
|
|
-- It would be difficult to use locking to ensure
|
|
|
|
-- it's only run once, and it's also possible for
|
|
|
|
-- git-annex to be interrupted before it can run the
|
|
|
|
-- stophook, in which case the starthook
|
|
|
|
-- would be run again by the next git-annex.
|
|
|
|
-- So, requiring idempotency is the right approach.
|
|
|
|
run starthook
|
2012-03-04 20:00:24 +00:00
|
|
|
|
2020-12-11 19:28:58 +00:00
|
|
|
Annex.addCleanupAction (StopHook $ uuid r) $ runstop lck
|
2013-08-04 17:54:09 +00:00
|
|
|
runstop lck = do
|
2012-11-11 04:51:07 +00:00
|
|
|
-- Drop any shared lock we have, and take an
|
|
|
|
-- exclusive lock, without blocking. If the lock
|
|
|
|
-- succeeds, we're the only process using this remote,
|
|
|
|
-- so can stop it.
|
|
|
|
unlockFile lck
|
2014-01-28 18:17:14 +00:00
|
|
|
#ifndef mingw32_HOST_OS
|
2012-11-11 04:51:07 +00:00
|
|
|
mode <- annexFileMode
|
2023-04-27 19:57:50 +00:00
|
|
|
v <- tryLockExclusive (Just mode) lck
|
2013-05-11 20:03:00 +00:00
|
|
|
#else
|
2014-01-28 18:17:14 +00:00
|
|
|
v <- liftIO $ lockExclusive lck
|
2014-08-20 22:56:25 +00:00
|
|
|
#endif
|
2014-01-28 18:17:14 +00:00
|
|
|
case v of
|
|
|
|
Nothing -> noop
|
|
|
|
Just lockhandle -> do
|
|
|
|
run stophook
|
|
|
|
liftIO $ dropLock lockhandle
|