2024-10-13 18:48:01 -04:00
|
|
|
# typed: strict
|
2019-04-19 15:38:03 +09:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2024-04-30 11:10:23 +02:00
|
|
|
# Performs {Formula#mktemp}'s functionality and tracks the results.
|
2018-07-13 14:42:49 +01:00
|
|
|
# Each instance is only intended to be used once.
|
2024-10-13 18:48:01 -04:00
|
|
|
# Can also be used to create a temporary directory with the brew instance's group.
|
2018-07-13 14:42:49 +01:00
|
|
|
class Mktemp
|
2024-10-13 18:48:01 -04:00
|
|
|
# Path to the tmpdir used in this run
|
|
|
|
sig { returns(T.nilable(Pathname)) }
|
2018-07-13 14:42:49 +01:00
|
|
|
attr_reader :tmpdir
|
|
|
|
|
2024-10-13 18:48:01 -04:00
|
|
|
sig { params(prefix: String, retain: T::Boolean, retain_in_cache: T::Boolean).void }
|
|
|
|
def initialize(prefix, retain: false, retain_in_cache: false)
|
2018-07-13 14:42:49 +01:00
|
|
|
@prefix = prefix
|
2024-10-13 18:48:01 -04:00
|
|
|
@retain_in_cache = T.let(retain_in_cache, T::Boolean)
|
|
|
|
@retain = T.let(retain || @retain_in_cache, T::Boolean)
|
|
|
|
@quiet = T.let(false, T::Boolean)
|
|
|
|
@tmpdir = T.let(nil, T.nilable(Pathname))
|
2018-07-13 14:42:49 +01:00
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Instructs this {Mktemp} to retain the staged files.
|
2020-10-20 12:03:48 +02:00
|
|
|
sig { void }
|
2018-07-13 14:42:49 +01:00
|
|
|
def retain!
|
|
|
|
@retain = true
|
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# True if the staged temporary files should be retained.
|
2024-10-13 18:48:01 -04:00
|
|
|
sig { returns(T::Boolean) }
|
2018-07-13 14:42:49 +01:00
|
|
|
def retain?
|
|
|
|
@retain
|
|
|
|
end
|
|
|
|
|
2022-07-31 21:06:33 +01:00
|
|
|
# True if the source files should be retained.
|
2024-10-13 18:48:01 -04:00
|
|
|
sig { returns(T::Boolean) }
|
2022-08-01 18:30:14 -07:00
|
|
|
def retain_in_cache?
|
|
|
|
@retain_in_cache
|
2022-07-31 21:06:33 +01:00
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Instructs this Mktemp to not emit messages when retention is triggered.
|
2020-10-20 12:03:48 +02:00
|
|
|
sig { void }
|
2018-07-13 14:42:49 +01:00
|
|
|
def quiet!
|
|
|
|
@quiet = true
|
|
|
|
end
|
|
|
|
|
2020-10-20 12:03:48 +02:00
|
|
|
sig { returns(String) }
|
2018-07-13 14:42:49 +01:00
|
|
|
def to_s
|
|
|
|
"[Mktemp: #{tmpdir} retain=#{@retain} quiet=#{@quiet}]"
|
|
|
|
end
|
|
|
|
|
2024-10-13 18:48:01 -04:00
|
|
|
sig { params(chdir: T::Boolean, _block: T.proc.params(arg0: Mktemp).void).void }
|
|
|
|
def run(chdir: true, &_block)
|
2022-08-02 08:50:37 -07:00
|
|
|
prefix_name = @prefix.tr "@", "AT"
|
2022-08-05 16:12:39 -07:00
|
|
|
@tmpdir = if retain_in_cache?
|
2022-08-05 17:00:54 -07:00
|
|
|
tmp_dir = HOMEBREW_CACHE/"Sources/#{prefix_name}"
|
2022-08-13 23:30:20 -10:00
|
|
|
chmod_rm_rf(tmp_dir) # clear out previous staging directory
|
2022-08-05 17:00:54 -07:00
|
|
|
tmp_dir.mkpath
|
|
|
|
tmp_dir
|
2022-07-31 20:33:25 +01:00
|
|
|
else
|
2022-08-05 16:12:39 -07:00
|
|
|
Pathname.new(Dir.mktmpdir("#{prefix_name}-", HOMEBREW_TEMP))
|
2022-07-31 20:33:25 +01:00
|
|
|
end
|
2018-07-13 14:42:49 +01:00
|
|
|
|
|
|
|
# Make sure files inside the temporary directory have the same group as the
|
|
|
|
# brew instance.
|
|
|
|
#
|
|
|
|
# Reference from `man 2 open`
|
|
|
|
# > When a new file is created, it is given the group of the directory which
|
|
|
|
# contains it.
|
2025-01-07 17:40:18 +00:00
|
|
|
group_id = if HOMEBREW_ORIGINAL_BREW_FILE.grpowned?
|
|
|
|
HOMEBREW_ORIGINAL_BREW_FILE.stat.gid
|
2018-07-13 14:42:49 +01:00
|
|
|
else
|
|
|
|
Process.gid
|
|
|
|
end
|
|
|
|
begin
|
2024-10-13 18:48:01 -04:00
|
|
|
@tmpdir.chown(nil, group_id)
|
2018-07-13 14:42:49 +01:00
|
|
|
rescue Errno::EPERM
|
2024-10-13 18:48:01 -04:00
|
|
|
require "etc"
|
|
|
|
group_name = begin
|
|
|
|
Etc.getgrgid(group_id)&.name
|
|
|
|
rescue ArgumentError
|
|
|
|
# Cover for misconfigured NSS setups
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
opoo "Failed setting group \"#{group_name || group_id}\" on #{@tmpdir}"
|
2018-07-13 14:42:49 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
begin
|
2024-10-13 18:48:01 -04:00
|
|
|
if chdir
|
|
|
|
Dir.chdir(@tmpdir) { yield self }
|
|
|
|
else
|
|
|
|
yield self
|
|
|
|
end
|
2018-07-13 14:42:49 +01:00
|
|
|
ensure
|
2022-08-05 17:00:54 -07:00
|
|
|
ignore_interrupts { chmod_rm_rf(@tmpdir) } unless retain?
|
2018-07-13 14:42:49 +01:00
|
|
|
end
|
|
|
|
ensure
|
2022-08-02 08:33:40 -07:00
|
|
|
if retain? && @tmpdir.present? && !@quiet
|
2022-08-01 18:30:14 -07:00
|
|
|
message = retain_in_cache? ? "Source files for debugging available at:" : "Temporary files retained at:"
|
2022-07-31 21:06:33 +01:00
|
|
|
ohai message, @tmpdir.to_s
|
|
|
|
end
|
2018-07-13 14:42:49 +01:00
|
|
|
end
|
2021-03-27 16:14:36 +00:00
|
|
|
|
|
|
|
private
|
|
|
|
|
2024-10-13 18:48:01 -04:00
|
|
|
sig { params(path: Pathname).void }
|
2021-03-27 16:14:36 +00:00
|
|
|
def chmod_rm_rf(path)
|
|
|
|
if path.directory? && !path.symlink?
|
2025-04-16 16:22:36 +01:00
|
|
|
FileUtils.chmod("u+rw", path) if path.owned? # Need permissions in order to see the contents
|
2021-03-27 16:14:36 +00:00
|
|
|
path.children.each { |child| chmod_rm_rf(child) }
|
2025-04-16 16:22:36 +01:00
|
|
|
FileUtils.rmdir(path)
|
2021-03-27 16:14:36 +00:00
|
|
|
else
|
2025-04-16 16:22:36 +01:00
|
|
|
FileUtils.rm_f(path)
|
2021-03-27 16:14:36 +00:00
|
|
|
end
|
|
|
|
rescue
|
|
|
|
nil # Just skip this directory.
|
|
|
|
end
|
2018-07-13 14:42:49 +01:00
|
|
|
end
|