2016-12-30 23:22:27 +01:00
|
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
2017-04-21 18:44:59 +02:00
|
|
|
|
;;; Copyright © 2016, 2017 Ludovic Courtès <ludo@gnu.org>
|
2016-12-30 23:22:27 +01:00
|
|
|
|
;;;
|
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
|
;;;
|
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
|
;;; your option) any later version.
|
|
|
|
|
;;;
|
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
|
;;;
|
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
|
|
(define-module (guix ssh)
|
|
|
|
|
#:use-module (guix store)
|
2017-11-19 22:45:06 +01:00
|
|
|
|
#:use-module (guix i18n)
|
2018-01-07 22:13:45 +01:00
|
|
|
|
#:use-module ((guix utils) #:select (&fix-hint))
|
2017-04-21 18:44:59 +02:00
|
|
|
|
#:use-module (ssh session)
|
|
|
|
|
#:use-module (ssh auth)
|
|
|
|
|
#:use-module (ssh key)
|
2016-12-30 23:22:27 +01:00
|
|
|
|
#:use-module (ssh channel)
|
|
|
|
|
#:use-module (ssh popen)
|
|
|
|
|
#:use-module (ssh session)
|
|
|
|
|
#:use-module (ssh dist)
|
|
|
|
|
#:use-module (ssh dist node)
|
|
|
|
|
#:use-module (srfi srfi-11)
|
2016-12-31 18:34:17 +01:00
|
|
|
|
#:use-module (srfi srfi-34)
|
|
|
|
|
#:use-module (srfi srfi-35)
|
2016-12-30 23:22:27 +01:00
|
|
|
|
#:use-module (ice-9 match)
|
2016-12-31 18:34:17 +01:00
|
|
|
|
#:use-module (ice-9 binary-ports)
|
2017-04-21 18:44:59 +02:00
|
|
|
|
#:export (open-ssh-session
|
2017-04-21 19:01:03 +02:00
|
|
|
|
remote-daemon-channel
|
2017-04-21 18:44:59 +02:00
|
|
|
|
connect-to-remote-daemon
|
2016-12-30 23:22:27 +01:00
|
|
|
|
send-files
|
|
|
|
|
retrieve-files
|
|
|
|
|
remote-store-host
|
|
|
|
|
|
|
|
|
|
file-retrieval-port))
|
|
|
|
|
|
|
|
|
|
;;; Commentary:
|
|
|
|
|
;;;
|
|
|
|
|
;;; This module provides tools to support communication with remote stores
|
|
|
|
|
;;; over SSH, using Guile-SSH.
|
|
|
|
|
;;;
|
|
|
|
|
;;; Code:
|
|
|
|
|
|
2017-04-21 18:44:59 +02:00
|
|
|
|
(define %compression
|
|
|
|
|
"zlib@openssh.com,zlib")
|
|
|
|
|
|
|
|
|
|
(define* (open-ssh-session host #:key user port
|
|
|
|
|
(compression %compression))
|
|
|
|
|
"Open an SSH session for HOST and return it. When USER and PORT are #f, use
|
|
|
|
|
default values or whatever '~/.ssh/config' specifies; otherwise use them.
|
|
|
|
|
Throw an error on failure."
|
|
|
|
|
(let ((session (make-session #:user user
|
|
|
|
|
#:host host
|
|
|
|
|
#:port port
|
|
|
|
|
#:timeout 10 ;seconds
|
|
|
|
|
;; #:log-verbosity 'protocol
|
|
|
|
|
|
|
|
|
|
;; We need lightweight compression when
|
|
|
|
|
;; exchanging full archives.
|
|
|
|
|
#:compression compression
|
|
|
|
|
#:compression-level 3)))
|
|
|
|
|
|
|
|
|
|
;; Honor ~/.ssh/config.
|
|
|
|
|
(session-parse-config! session)
|
|
|
|
|
|
|
|
|
|
(match (connect! session)
|
|
|
|
|
('ok
|
|
|
|
|
;; Use public key authentication, via the SSH agent if it's available.
|
|
|
|
|
(match (userauth-public-key/auto! session)
|
|
|
|
|
('success
|
|
|
|
|
session)
|
|
|
|
|
(x
|
|
|
|
|
(disconnect! session)
|
|
|
|
|
(raise (condition
|
|
|
|
|
(&message
|
ui: Rename '_' to 'G_'.
This avoids collisions with '_' when the latter is used as a 'match'
pattern for instance. See
<https://lists.gnu.org/archive/html/guix-devel/2017-04/msg00464.html>.
* guix/ui.scm: Rename '_' to 'G_'.
* po/guix/Makevars (XGETTEXT_OPTIONS): Adjust accordingly.
* build-aux/compile-all.scm (warnings): Remove 'format'.
* gnu/packages.scm,
gnu/services.scm,
gnu/services/shepherd.scm,
gnu/system.scm,
gnu/system/shadow.scm,
guix/gnupg.scm,
guix/http-client.scm,
guix/import/cpan.scm,
guix/import/elpa.scm,
guix/import/pypi.scm,
guix/nar.scm,
guix/scripts.scm,
guix/scripts/archive.scm,
guix/scripts/authenticate.scm,
guix/scripts/build.scm,
guix/scripts/challenge.scm,
guix/scripts/container.scm,
guix/scripts/container/exec.scm,
guix/scripts/copy.scm,
guix/scripts/download.scm,
guix/scripts/edit.scm,
guix/scripts/environment.scm,
guix/scripts/gc.scm,
guix/scripts/graph.scm,
guix/scripts/hash.scm,
guix/scripts/import.scm,
guix/scripts/import/cpan.scm,
guix/scripts/import/cran.scm,
guix/scripts/import/crate.scm,
guix/scripts/import/elpa.scm,
guix/scripts/import/gem.scm,
guix/scripts/import/gnu.scm,
guix/scripts/import/hackage.scm,
guix/scripts/import/nix.scm,
guix/scripts/import/pypi.scm,
guix/scripts/import/stackage.scm,
guix/scripts/lint.scm,
guix/scripts/offload.scm,
guix/scripts/pack.scm,
guix/scripts/package.scm,
guix/scripts/perform-download.scm,
guix/scripts/publish.scm,
guix/scripts/pull.scm,
guix/scripts/refresh.scm,
guix/scripts/size.scm,
guix/scripts/substitute.scm,
guix/scripts/system.scm,
guix/ssh.scm,
guix/upstream.scm: Use 'G_' instead of '_'. Most of this change was
obtained by running: "sed -i -e's/(_ "/(G_ "/g' `find -name \*.scm`".
2017-05-03 15:57:02 +02:00
|
|
|
|
(message (format #f (G_ "SSH authentication failed for '~a': ~a~%")
|
2017-04-21 18:44:59 +02:00
|
|
|
|
host (get-error session)))))))))
|
|
|
|
|
(x
|
|
|
|
|
;; Connection failed or timeout expired.
|
|
|
|
|
(raise (condition
|
|
|
|
|
(&message
|
ui: Rename '_' to 'G_'.
This avoids collisions with '_' when the latter is used as a 'match'
pattern for instance. See
<https://lists.gnu.org/archive/html/guix-devel/2017-04/msg00464.html>.
* guix/ui.scm: Rename '_' to 'G_'.
* po/guix/Makevars (XGETTEXT_OPTIONS): Adjust accordingly.
* build-aux/compile-all.scm (warnings): Remove 'format'.
* gnu/packages.scm,
gnu/services.scm,
gnu/services/shepherd.scm,
gnu/system.scm,
gnu/system/shadow.scm,
guix/gnupg.scm,
guix/http-client.scm,
guix/import/cpan.scm,
guix/import/elpa.scm,
guix/import/pypi.scm,
guix/nar.scm,
guix/scripts.scm,
guix/scripts/archive.scm,
guix/scripts/authenticate.scm,
guix/scripts/build.scm,
guix/scripts/challenge.scm,
guix/scripts/container.scm,
guix/scripts/container/exec.scm,
guix/scripts/copy.scm,
guix/scripts/download.scm,
guix/scripts/edit.scm,
guix/scripts/environment.scm,
guix/scripts/gc.scm,
guix/scripts/graph.scm,
guix/scripts/hash.scm,
guix/scripts/import.scm,
guix/scripts/import/cpan.scm,
guix/scripts/import/cran.scm,
guix/scripts/import/crate.scm,
guix/scripts/import/elpa.scm,
guix/scripts/import/gem.scm,
guix/scripts/import/gnu.scm,
guix/scripts/import/hackage.scm,
guix/scripts/import/nix.scm,
guix/scripts/import/pypi.scm,
guix/scripts/import/stackage.scm,
guix/scripts/lint.scm,
guix/scripts/offload.scm,
guix/scripts/pack.scm,
guix/scripts/package.scm,
guix/scripts/perform-download.scm,
guix/scripts/publish.scm,
guix/scripts/pull.scm,
guix/scripts/refresh.scm,
guix/scripts/size.scm,
guix/scripts/substitute.scm,
guix/scripts/system.scm,
guix/ssh.scm,
guix/upstream.scm: Use 'G_' instead of '_'. Most of this change was
obtained by running: "sed -i -e's/(_ "/(G_ "/g' `find -name \*.scm`".
2017-05-03 15:57:02 +02:00
|
|
|
|
(message (format #f (G_ "SSH connection to '~a' failed: ~a~%")
|
2017-04-21 18:44:59 +02:00
|
|
|
|
host (get-error session))))))))))
|
|
|
|
|
|
2017-04-21 19:01:03 +02:00
|
|
|
|
(define* (remote-daemon-channel session
|
|
|
|
|
#:optional
|
|
|
|
|
(socket-name
|
|
|
|
|
"/var/guix/daemon-socket/socket"))
|
|
|
|
|
"Return an input/output port (an SSH channel) to the daemon at SESSION."
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(define redirect
|
|
|
|
|
;; Code run in SESSION to redirect the remote process' stdin/stdout to the
|
|
|
|
|
;; daemon's socket, à la socat. The SSH protocol supports forwarding to
|
|
|
|
|
;; Unix-domain sockets but libssh doesn't have an API for that, hence this
|
|
|
|
|
;; hack.
|
|
|
|
|
`(begin
|
2018-01-10 17:52:23 +01:00
|
|
|
|
(use-modules (ice-9 match) (rnrs io ports)
|
|
|
|
|
(rnrs bytevectors) (system foreign))
|
|
|
|
|
|
|
|
|
|
(define read!
|
|
|
|
|
;; XXX: We would use 'get-bytevector-some' but it always returns a
|
|
|
|
|
;; single byte in Guile <= 2.2.3---see <https://bugs.gnu.org/30066>.
|
|
|
|
|
;; This procedure works around it.
|
|
|
|
|
(let ((proc (pointer->procedure int
|
|
|
|
|
(dynamic-func "read" (dynamic-link))
|
|
|
|
|
(list int '* size_t))))
|
|
|
|
|
(lambda (port bv)
|
|
|
|
|
(proc (fileno port) (bytevector->pointer bv)
|
|
|
|
|
(bytevector-length bv)))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
|
|
|
|
(let ((sock (socket AF_UNIX SOCK_STREAM 0))
|
|
|
|
|
(stdin (current-input-port))
|
2018-01-10 17:52:23 +01:00
|
|
|
|
(stdout (current-output-port))
|
|
|
|
|
(buffer (make-bytevector 65536)))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(setvbuf stdin _IONBF)
|
|
|
|
|
(setvbuf stdout _IONBF)
|
|
|
|
|
(connect sock AF_UNIX ,socket-name)
|
|
|
|
|
|
|
|
|
|
(let loop ()
|
2018-01-10 23:06:08 +01:00
|
|
|
|
(match (select (list stdin sock) '() '())
|
|
|
|
|
((reads () ())
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(when (memq stdin reads)
|
2018-01-10 17:52:23 +01:00
|
|
|
|
(match (read! stdin buffer)
|
|
|
|
|
((? zero?) ;EOF
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(primitive-exit 0))
|
2018-01-10 17:52:23 +01:00
|
|
|
|
(count
|
|
|
|
|
(put-bytevector sock buffer 0 count))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(when (memq sock reads)
|
2018-01-10 17:52:23 +01:00
|
|
|
|
(match (read! sock buffer)
|
|
|
|
|
((? zero?) ;EOF
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(primitive-exit 0))
|
2018-01-10 17:52:23 +01:00
|
|
|
|
(count
|
|
|
|
|
(put-bytevector stdout buffer 0 count))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(loop))
|
|
|
|
|
(_
|
|
|
|
|
(primitive-exit 1)))))))
|
|
|
|
|
|
2017-04-21 19:01:03 +02:00
|
|
|
|
(open-remote-pipe* session OPEN_BOTH
|
|
|
|
|
;; Sort-of shell-quote REDIRECT.
|
|
|
|
|
"guile" "-c"
|
|
|
|
|
(object->string
|
|
|
|
|
(object->string redirect))))
|
|
|
|
|
|
|
|
|
|
(define* (connect-to-remote-daemon session
|
|
|
|
|
#:optional
|
|
|
|
|
(socket-name
|
|
|
|
|
"/var/guix/daemon-socket/socket"))
|
|
|
|
|
"Connect to the remote build daemon listening on SOCKET-NAME over SESSION,
|
|
|
|
|
an SSH session. Return a <nix-server> object."
|
|
|
|
|
(open-connection #:port (remote-daemon-channel session)))
|
|
|
|
|
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
|
|
|
|
(define (store-import-channel session)
|
|
|
|
|
"Return an output port to which archives to be exported to SESSION's store
|
|
|
|
|
can be written."
|
|
|
|
|
;; Using the 'import-paths' RPC on a remote store would be slow because it
|
|
|
|
|
;; makes a round trip every time 32 KiB have been transferred. This
|
|
|
|
|
;; procedure instead opens a separate channel to use the remote
|
|
|
|
|
;; 'import-paths' procedure, which consumes all the data in a single round
|
2017-06-04 22:53:40 +02:00
|
|
|
|
;; trip. This optimizes the successful case at the expense of error
|
|
|
|
|
;; conditions: errors can only be reported once all the input has been
|
|
|
|
|
;; consumed.
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(define import
|
|
|
|
|
`(begin
|
2017-06-04 22:53:40 +02:00
|
|
|
|
(use-modules (guix) (srfi srfi-34)
|
|
|
|
|
(rnrs io ports) (rnrs bytevectors))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
2017-06-04 22:53:40 +02:00
|
|
|
|
(define (consume-input port)
|
|
|
|
|
(let ((bv (make-bytevector 32768)))
|
|
|
|
|
(let loop ()
|
|
|
|
|
(let ((n (get-bytevector-n! port bv 0
|
|
|
|
|
(bytevector-length bv))))
|
|
|
|
|
(unless (eof-object? n)
|
|
|
|
|
(loop))))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
2017-06-04 22:53:40 +02:00
|
|
|
|
;; Upon completion, write an sexp that denotes the status.
|
|
|
|
|
(write
|
|
|
|
|
(catch #t
|
|
|
|
|
(lambda ()
|
|
|
|
|
(guard (c ((nix-protocol-error? c)
|
|
|
|
|
;; Consume all the input since the only time we can
|
|
|
|
|
;; report the error is after everything has been
|
|
|
|
|
;; consumed.
|
|
|
|
|
(consume-input (current-input-port))
|
|
|
|
|
(list 'protocol-error (nix-protocol-error-message c))))
|
|
|
|
|
(with-store store
|
|
|
|
|
(setvbuf (current-input-port) _IONBF)
|
|
|
|
|
(import-paths store (current-input-port))
|
|
|
|
|
'(success))))
|
|
|
|
|
(lambda args
|
|
|
|
|
(cons 'error args))))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
2017-06-04 22:53:40 +02:00
|
|
|
|
(open-remote-pipe session
|
|
|
|
|
(string-join
|
|
|
|
|
`("guile" "-c"
|
|
|
|
|
,(object->string (object->string import))))
|
|
|
|
|
OPEN_BOTH))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
2016-12-31 18:13:29 +01:00
|
|
|
|
(define* (store-export-channel session files
|
|
|
|
|
#:key recursive?)
|
2016-12-30 23:22:27 +01:00
|
|
|
|
"Return an input port from which an export of FILES from SESSION's store can
|
2016-12-31 18:13:29 +01:00
|
|
|
|
be read. When RECURSIVE? is true, the closure of FILES is exported."
|
2016-12-30 23:22:27 +01:00
|
|
|
|
;; Same as above: this is more efficient than calling 'export-paths' on a
|
|
|
|
|
;; remote store.
|
|
|
|
|
(define export
|
|
|
|
|
`(begin
|
2018-01-07 22:13:45 +01:00
|
|
|
|
(eval-when (load expand eval)
|
|
|
|
|
(unless (resolve-module '(guix) #:ensure #f)
|
|
|
|
|
(write `(module-error))
|
|
|
|
|
(exit 7)))
|
|
|
|
|
|
|
|
|
|
(use-modules (guix) (srfi srfi-1)
|
|
|
|
|
(srfi srfi-26) (srfi srfi-34))
|
|
|
|
|
|
|
|
|
|
(guard (c ((nix-connection-error? c)
|
|
|
|
|
(write `(connection-error ,(nix-connection-error-file c)
|
|
|
|
|
,(nix-connection-error-code c))))
|
|
|
|
|
((nix-protocol-error? c)
|
|
|
|
|
(write `(protocol-error ,(nix-protocol-error-status c)
|
|
|
|
|
,(nix-protocol-error-message c))))
|
|
|
|
|
(else
|
|
|
|
|
(write `(exception))))
|
|
|
|
|
(with-store store
|
|
|
|
|
(let* ((files ',files)
|
|
|
|
|
(invalid (remove (cut valid-path? store <>)
|
|
|
|
|
files)))
|
|
|
|
|
(unless (null? invalid)
|
|
|
|
|
(write `(invalid-items ,invalid))
|
|
|
|
|
(exit 1))
|
|
|
|
|
|
|
|
|
|
(write '(exporting)) ;we're ready
|
|
|
|
|
(force-output)
|
|
|
|
|
|
|
|
|
|
(setvbuf (current-output-port) _IONBF)
|
|
|
|
|
(export-paths store files (current-output-port)
|
|
|
|
|
#:recursive? ,recursive?))))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
|
|
|
|
(open-remote-input-pipe session
|
|
|
|
|
(string-join
|
|
|
|
|
`("guile" "-c"
|
|
|
|
|
,(object->string
|
|
|
|
|
(object->string export))))))
|
|
|
|
|
|
|
|
|
|
(define* (send-files local files remote
|
2016-12-31 18:13:29 +01:00
|
|
|
|
#:key
|
|
|
|
|
recursive?
|
|
|
|
|
(log-port (current-error-port)))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
"Send the subset of FILES from LOCAL (a local store) that's missing to
|
2016-12-31 18:32:15 +01:00
|
|
|
|
REMOTE, a remote store. When RECURSIVE? is true, send the closure of FILES.
|
|
|
|
|
Return the list of store items actually sent."
|
2016-12-30 23:22:27 +01:00
|
|
|
|
;; Compute the subset of FILES missing on SESSION and send them.
|
2016-12-31 18:13:29 +01:00
|
|
|
|
(let* ((files (if recursive? (requisites local files) files))
|
|
|
|
|
(session (channel-get-session (nix-server-socket remote)))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(node (make-node session))
|
|
|
|
|
(missing (node-eval node
|
|
|
|
|
`(begin
|
|
|
|
|
(use-modules (guix)
|
|
|
|
|
(srfi srfi-1) (srfi srfi-26))
|
|
|
|
|
|
|
|
|
|
(with-store store
|
|
|
|
|
(remove (cut valid-path? store <>)
|
|
|
|
|
',files)))))
|
|
|
|
|
(count (length missing))
|
|
|
|
|
(port (store-import-channel session)))
|
|
|
|
|
(format log-port (N_ "sending ~a store item to '~a'...~%"
|
|
|
|
|
"sending ~a store items to '~a'...~%" count)
|
|
|
|
|
count (session-get session 'host))
|
|
|
|
|
|
|
|
|
|
;; Send MISSING in topological order.
|
|
|
|
|
(export-paths local missing port)
|
|
|
|
|
|
|
|
|
|
;; Tell the remote process that we're done. (In theory the end-of-archive
|
|
|
|
|
;; mark of 'export-paths' would be enough, but in practice it's not.)
|
|
|
|
|
(channel-send-eof port)
|
|
|
|
|
|
2017-06-04 22:53:40 +02:00
|
|
|
|
;; Wait for completion of the remote process and read the status sexp from
|
|
|
|
|
;; PORT.
|
|
|
|
|
(let* ((result (false-if-exception (read port)))
|
|
|
|
|
(status (zero? (channel-get-exit-status port))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(close-port port)
|
2017-06-04 22:53:40 +02:00
|
|
|
|
(match result
|
|
|
|
|
(('success . _)
|
|
|
|
|
missing)
|
|
|
|
|
(('protocol-error message)
|
|
|
|
|
(raise (condition
|
|
|
|
|
(&nix-protocol-error (message message) (status 42)))))
|
|
|
|
|
(('error key args ...)
|
|
|
|
|
(raise (condition
|
|
|
|
|
(&nix-protocol-error
|
|
|
|
|
(message (call-with-output-string
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(print-exception port #f key args))))
|
|
|
|
|
(status 43)))))
|
|
|
|
|
(_
|
|
|
|
|
(raise (condition
|
|
|
|
|
(&nix-protocol-error
|
|
|
|
|
(message "unknown error while sending files over SSH")
|
|
|
|
|
(status 44)))))))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
|
|
|
|
(define (remote-store-session remote)
|
|
|
|
|
"Return the SSH channel beneath REMOTE, a remote store as returned by
|
|
|
|
|
'connect-to-remote-daemon', or #f."
|
|
|
|
|
(channel-get-session (nix-server-socket remote)))
|
|
|
|
|
|
|
|
|
|
(define (remote-store-host remote)
|
|
|
|
|
"Return the name of the host REMOTE is connected to, where REMOTE is a
|
|
|
|
|
remote store as returned by 'connect-to-remote-daemon'."
|
|
|
|
|
(match (remote-store-session remote)
|
|
|
|
|
(#f #f)
|
|
|
|
|
((? session? session)
|
|
|
|
|
(session-get session 'host))))
|
|
|
|
|
|
2016-12-31 18:13:29 +01:00
|
|
|
|
(define* (file-retrieval-port files remote
|
|
|
|
|
#:key recursive?)
|
2016-12-30 23:22:27 +01:00
|
|
|
|
"Return an input port from which to retrieve FILES (a list of store items)
|
|
|
|
|
from REMOTE, along with the number of items to retrieve (lower than or equal
|
|
|
|
|
to the length of FILES.)"
|
2016-12-31 18:13:29 +01:00
|
|
|
|
(values (store-export-channel (remote-store-session remote) files
|
|
|
|
|
#:recursive? recursive?)
|
|
|
|
|
(length files))) ;XXX: inaccurate when RECURSIVE? is true
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
2018-01-07 22:13:45 +01:00
|
|
|
|
(define-syntax raise-error
|
|
|
|
|
(syntax-rules (=>)
|
|
|
|
|
((_ fmt args ... (=> hint-fmt hint-args ...))
|
|
|
|
|
(raise (condition
|
|
|
|
|
(&message
|
|
|
|
|
(message (format #f fmt args ...)))
|
|
|
|
|
(&fix-hint
|
|
|
|
|
(hint (format #f hint-fmt hint-args ...))))))
|
|
|
|
|
((_ fmt args ...)
|
|
|
|
|
(raise (condition
|
|
|
|
|
(&message
|
|
|
|
|
(message (format #f fmt args ...))))))))
|
|
|
|
|
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(define* (retrieve-files local files remote
|
2016-12-31 18:13:29 +01:00
|
|
|
|
#:key recursive? (log-port (current-error-port)))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
"Retrieve FILES from REMOTE and import them using the 'import-paths' RPC on
|
2016-12-31 18:13:29 +01:00
|
|
|
|
LOCAL. When RECURSIVE? is true, retrieve the closure of FILES."
|
2016-12-30 23:22:27 +01:00
|
|
|
|
(let-values (((port count)
|
2016-12-31 18:13:29 +01:00
|
|
|
|
(file-retrieval-port files remote
|
|
|
|
|
#:recursive? recursive?)))
|
2018-01-07 22:13:45 +01:00
|
|
|
|
(match (read port) ;read the initial status
|
|
|
|
|
(('exporting)
|
|
|
|
|
(format #t (N_ "retrieving ~a store item from '~a'...~%"
|
|
|
|
|
"retrieving ~a store items from '~a'...~%" count)
|
|
|
|
|
count (remote-store-host remote))
|
|
|
|
|
|
|
|
|
|
(let ((result (import-paths local port)))
|
|
|
|
|
(close-port port)
|
|
|
|
|
result))
|
|
|
|
|
((? eof-object?)
|
|
|
|
|
(raise-error (G_ "failed to start Guile on remote host '~A': exit code ~A")
|
|
|
|
|
(remote-store-host remote)
|
|
|
|
|
(channel-get-exit-status port)
|
|
|
|
|
(=> (G_ "Make sure @command{guile} can be found in
|
|
|
|
|
@code{$PATH} on the remote host. Run @command{ssh ~A guile --version} to
|
|
|
|
|
check.")
|
|
|
|
|
(remote-store-host remote))))
|
|
|
|
|
(('module-error . _)
|
|
|
|
|
;; TRANSLATORS: Leave "Guile" untranslated.
|
|
|
|
|
(raise-error (G_ "Guile modules not found on remote host '~A'")
|
|
|
|
|
(remote-store-host remote)
|
|
|
|
|
(=> (G_ "Make sure @code{GUILE_LOAD_PATH} includes Guix'
|
|
|
|
|
own module directory. Run @command{ssh ~A env | grep GUILE_LOAD_PATH} to
|
|
|
|
|
check.")
|
|
|
|
|
(remote-store-host remote))))
|
|
|
|
|
(('connection-error file code . _)
|
|
|
|
|
(raise-error (G_ "failed to connect to '~A' on remote host '~A': ~a")
|
|
|
|
|
file (remote-store-host remote) (strerror code)))
|
|
|
|
|
(('invalid-items items . _)
|
|
|
|
|
(raise-error (N_ "no such item on remote host '~A':~{ ~a~}"
|
|
|
|
|
"no such items on remote host '~A':~{ ~a~}"
|
|
|
|
|
(length items))
|
|
|
|
|
(remote-store-host remote) items))
|
|
|
|
|
(('protocol-error status message . _)
|
|
|
|
|
(raise-error (G_ "protocol error on remote host '~A': ~a")
|
|
|
|
|
(remote-store-host remote) message))
|
|
|
|
|
(_
|
|
|
|
|
(raise-error (G_ "failed to retrieve store items from '~a'")
|
|
|
|
|
(remote-store-host remote))))))
|
2016-12-30 23:22:27 +01:00
|
|
|
|
|
|
|
|
|
;;; ssh.scm ends here
|