watchexec/src/main.rs

255 lines
7.6 KiB
Rust
Raw Normal View History

#[macro_use]
extern crate clap;
extern crate globset;
2016-10-13 23:59:46 +02:00
extern crate env_logger;
extern crate libc;
#[macro_use]
extern crate log;
#[macro_use]
extern crate lazy_static;
2016-09-18 22:42:11 +02:00
extern crate notify;
2016-09-14 15:30:59 +02:00
#[cfg(unix)]
extern crate nix;
#[cfg(windows)]
extern crate winapi;
#[cfg(windows)]
extern crate kernel32;
2016-10-22 21:37:03 +02:00
2016-10-25 13:05:53 +02:00
#[cfg(test)]
extern crate mktemp;
mod cli;
2016-10-12 04:43:53 +02:00
mod gitignore;
2016-09-23 21:52:50 +02:00
mod notification_filter;
mod process;
2016-12-15 02:19:58 +01:00
mod signal;
mod watcher;
2016-09-21 23:02:20 +02:00
use std::collections::HashMap;
2017-02-04 22:18:02 +01:00
use std::path::{Path, PathBuf};
2016-11-09 15:44:00 +01:00
use std::sync::{Arc, RwLock};
use std::sync::mpsc::{channel, Receiver};
use std::time::Duration;
2016-09-18 22:42:11 +02:00
2016-09-23 21:52:50 +02:00
use notification_filter::NotificationFilter;
2016-11-09 23:25:52 +01:00
use process::Process;
2017-03-14 17:30:19 +01:00
use signal::Signal;
use watcher::{Event, Watcher};
2016-09-14 15:30:59 +02:00
fn init_logger(debug: bool) {
2016-10-13 23:59:46 +02:00
let mut log_builder = env_logger::LogBuilder::new();
2016-10-18 15:39:40 +02:00
let level = if debug {
log::LogLevelFilter::Debug
} else {
log::LogLevelFilter::Warn
2016-10-18 15:39:40 +02:00
};
2016-10-13 23:59:46 +02:00
2017-03-23 23:39:38 +01:00
log_builder
.format(|r| format!("*** {}", r.args()))
2016-10-13 23:59:46 +02:00
.filter(None, level);
log_builder.init().expect("unable to initialize logger");
}
2016-10-12 15:43:22 +02:00
fn main() {
let args = cli::get_args();
2016-11-09 15:44:00 +01:00
let child_process: Arc<RwLock<Option<Process>>> = Arc::new(RwLock::new(None));
let weak_child = Arc::downgrade(&child_process);
// Convert signal string to the corresponding integer
let signal = signal::new(args.signal);
2016-12-15 02:19:58 +01:00
signal::install_handler(move |sig: Signal| {
2016-11-09 15:44:00 +01:00
if let Some(lock) = weak_child.upgrade() {
let strong = lock.read().unwrap();
if let Some(ref child) = *strong {
2016-12-15 02:19:58 +01:00
match sig {
2017-03-14 17:30:19 +01:00
Signal::SIGCHLD => child.reap(), // SIGCHLD is special, initiate reap()
_ => child.signal(sig),
2016-12-15 02:19:58 +01:00
}
2016-11-09 15:44:00 +01:00
}
}
});
init_logger(args.debug);
2016-09-21 23:02:20 +02:00
2017-02-04 22:18:02 +01:00
let paths: Vec<PathBuf> = args.paths
.iter()
2017-02-04 22:26:59 +01:00
.map(|p| {
2017-03-23 23:39:38 +01:00
Path::new(&p)
.canonicalize()
.expect(&format!("unable to canonicalize \"{}\"", &p))
.to_owned()
})
2017-02-04 22:18:02 +01:00
.collect();
2016-10-12 04:43:53 +02:00
let gitignore = if !args.no_vcs_ignore {
2017-02-04 22:18:02 +01:00
gitignore::load(&paths)
} else {
2017-02-04 22:26:59 +01:00
gitignore::load(&[])
};
2016-10-12 04:43:53 +02:00
let filter = NotificationFilter::new(args.filters, args.ignores, gitignore)
.expect("unable to create notification filter");
2016-09-21 23:02:20 +02:00
2016-09-14 15:30:59 +02:00
let (tx, rx) = channel();
2017-03-23 23:39:38 +01:00
let watcher =
Watcher::new(tx, &paths, args.poll, args.poll_interval).expect("unable to create watcher");
2016-10-20 02:19:01 +02:00
if watcher.is_polling() {
warn!("Polling for changes every {} ms", args.poll_interval);
}
2016-09-18 22:42:11 +02:00
2016-11-09 15:44:00 +01:00
// Start child process initially, if necessary
if args.run_initially && !args.once {
2016-11-09 23:25:52 +01:00
if args.clear_screen {
cli::clear_screen();
}
2016-11-09 15:44:00 +01:00
let mut guard = child_process.write().unwrap();
2016-11-23 18:59:56 +01:00
*guard = Some(process::spawn(&args.cmd, vec![]));
2016-11-09 15:44:00 +01:00
}
2016-11-09 15:44:00 +01:00
loop {
2016-12-20 17:44:18 +01:00
debug!("Waiting for filesystem activity");
let paths = wait_fs(&rx, &filter);
2016-11-09 15:44:00 +01:00
if let Some(path) = paths.get(0) {
debug!("Path updated: {:?}", path);
}
// We have three scenarios here:
//
// 1. Make sure the previous run was ended, then run the command again
// 2. Just send a specified signal to the child, do nothing more
// 3. Send SIGTERM to the child, wait for it to exit, then run the command again
// 4. Send a specified signal to the child, wait for it to exit, then run the command again
//
match args.restart {
// Custom restart behaviour (--restart was given, and --signal specified):
// Send specified signal to the child, wait for it to exit, then run the command again
true if signal.is_some() => {
signal_process(&child_process, signal, true);
// Launch child process
if args.clear_screen {
cli::clear_screen();
}
debug!("Launching child process");
{
let mut guard = child_process.write().unwrap();
*guard = Some(process::spawn(&args.cmd, paths));
}
}
// Default restart behaviour (--restart was given, but --signal wasn't specified):
// Send SIGTERM to the child, wait for it to exit, then run the command again
true if signal.is_none() => {
let sigterm = signal::new(Some("SIGTERM".to_owned()));
signal_process(&child_process, sigterm, true);
// Launch child process
if args.clear_screen {
cli::clear_screen();
}
debug!("Launching child process");
{
let mut guard = child_process.write().unwrap();
*guard = Some(process::spawn(&args.cmd, paths));
}
}
// SIGHUP scenario: --signal was given, but --restart was not
// Just send a signal (e.g. SIGHUP) to the child, do nothing more
false if signal.is_some() => signal_process(&child_process, signal, false),
// Default behaviour (neither --signal nor --restart specified):
// Make sure the previous run was ended, then run the command again
false if signal.is_none() => {
signal_process(&child_process, None, true);
// Launch child process
if args.clear_screen {
cli::clear_screen();
}
debug!("Launching child process");
{
let mut guard = child_process.write().unwrap();
*guard = Some(process::spawn(&args.cmd, paths));
}
}
// Catch everything else, just to be sure.
_ => panic!("This should never be called. Please file a bug report!"),
}
// Handle once option for integration testing
if args.once {
signal_process(&child_process, signal, false);
break;
}
2016-09-14 15:30:59 +02:00
}
}
2016-10-12 15:43:22 +02:00
fn wait_fs(rx: &Receiver<Event>, filter: &NotificationFilter) -> Vec<PathBuf> {
let mut paths = vec![];
let mut cache = HashMap::new();
2016-10-12 15:43:22 +02:00
loop {
2016-11-09 15:44:00 +01:00
let e = rx.recv().expect("error when reading event");
if let Some(ref path) = e.path {
// Ignore cache for the initial file. Otherwise, in
// debug mode it's hard to track what's going on
let excluded = filter.is_excluded(path);
if !cache.contains_key(path) {
cache.insert(path.to_owned(), excluded);
}
if !excluded {
paths.push(path.to_owned());
break;
2016-10-12 15:43:22 +02:00
}
2016-11-09 15:44:00 +01:00
}
}
2016-10-12 15:43:22 +02:00
// Wait for filesystem activity to cool off
let timeout = Duration::from_millis(500);
while let Ok(e) = rx.recv_timeout(timeout) {
if let Some(ref path) = e.path {
if cache.contains_key(path) {
continue;
}
let excluded = filter.is_excluded(path);
let p = path.to_owned();
cache.insert(p.clone(), excluded);
if !excluded {
paths.push(p);
}
}
2016-10-12 15:43:22 +02:00
}
2016-11-09 15:44:00 +01:00
paths
2016-10-12 15:43:22 +02:00
}
// signal_process sends signal to process. It waits for the process to exit if wait is true
fn signal_process(process: &RwLock<Option<Process>>, signal: Option<Signal>, wait: bool) {
let guard = process.read().unwrap();
if let Some(ref child) = *guard {
if let Some(s) = signal {
child.signal(s);
}
if wait {
debug!("Waiting for process to exit...");
child.wait();
}
}
}