2003-06-20 13:40:25 +03:00
|
|
|
#include "archive.hh"
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
#include "derivations.hh"
|
2003-09-03 14:20:18 +03:00
|
|
|
#include "dotgraph.hh"
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
#include "globals.hh"
|
2006-11-30 19:43:04 +02:00
|
|
|
#include "local-store.hh"
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
#include "monitor-fd.hh"
|
2014-02-10 14:43:13 +02:00
|
|
|
#include "serve-protocol.hh"
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
#include "shared.hh"
|
|
|
|
#include "util.hh"
|
2014-02-14 13:31:10 +02:00
|
|
|
#include "worker-protocol.hh"
|
2018-09-29 10:42:11 +03:00
|
|
|
#include "graphml.hh"
|
2020-03-30 15:29:29 +03:00
|
|
|
#include "../nix/legacy.hh"
|
2003-03-24 13:50:20 +02:00
|
|
|
|
2010-10-04 20:55:38 +03:00
|
|
|
#include <iostream>
|
|
|
|
#include <algorithm>
|
2012-05-30 07:00:02 +03:00
|
|
|
#include <cstdio>
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
2015-02-10 12:54:06 +02:00
|
|
|
#if HAVE_SODIUM
|
2015-02-04 17:43:32 +02:00
|
|
|
#include <sodium.h>
|
2015-02-10 12:54:06 +02:00
|
|
|
#endif
|
2015-02-04 17:43:32 +02:00
|
|
|
|
2003-03-24 13:50:20 +02:00
|
|
|
|
2006-09-05 00:06:23 +03:00
|
|
|
using namespace nix;
|
|
|
|
using std::cin;
|
|
|
|
using std::cout;
|
|
|
|
|
|
|
|
|
2003-06-18 00:12:58 +03:00
|
|
|
typedef void (* Operation) (Strings opFlags, Strings opArgs);
|
2003-04-02 18:34:05 +03:00
|
|
|
|
|
|
|
|
2005-02-01 14:36:25 +02:00
|
|
|
static Path gcRoot;
|
|
|
|
static int rootNr = 0;
|
2005-02-01 15:48:46 +02:00
|
|
|
static bool indirectRoot = false;
|
2013-12-20 15:09:12 +02:00
|
|
|
static bool noOutput = false;
|
2016-02-04 15:48:42 +02:00
|
|
|
static std::shared_ptr<Store> store;
|
2005-02-01 14:36:25 +02:00
|
|
|
|
|
|
|
|
2016-02-04 16:10:47 +02:00
|
|
|
ref<LocalStore> ensureLocalStore()
|
2008-06-09 16:52:45 +03:00
|
|
|
{
|
2016-02-04 16:10:47 +02:00
|
|
|
auto store2 = std::dynamic_pointer_cast<LocalStore>(store);
|
2010-04-26 15:43:42 +03:00
|
|
|
if (!store2) throw Error("you don't have sufficient rights to use this command");
|
2016-02-04 16:10:47 +02:00
|
|
|
return ref<LocalStore>(store2);
|
2008-06-09 16:52:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
static StorePath useDeriver(const StorePath & path)
|
2012-07-31 02:55:41 +03:00
|
|
|
{
|
2019-12-05 20:11:09 +02:00
|
|
|
if (path.isDerivation()) return path.clone();
|
|
|
|
auto info = store->queryPathInfo(path);
|
|
|
|
if (!info->deriver)
|
|
|
|
throw Error("deriver of path '%s' is not known", store->printStorePath(path));
|
|
|
|
return info->deriver->clone();
|
2006-10-28 19:33:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-30 19:25:19 +02:00
|
|
|
/* Realise the given path. For a derivation that means build it; for
|
|
|
|
other paths it means ensure their validity. */
|
2019-12-05 20:11:09 +02:00
|
|
|
static PathSet realisePath(StorePathWithOutputs path, bool build = true)
|
2005-01-25 12:55:33 +02:00
|
|
|
{
|
2016-06-02 14:33:49 +03:00
|
|
|
auto store2 = std::dynamic_pointer_cast<LocalFSStore>(store);
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
if (path.path.isDerivation()) {
|
2016-05-04 17:04:52 +03:00
|
|
|
if (build) store->buildPaths({path});
|
2019-12-05 20:11:09 +02:00
|
|
|
Derivation drv = store->derivationFromPath(path.path);
|
2012-08-24 23:58:11 +03:00
|
|
|
rootNr++;
|
2011-12-30 19:25:19 +02:00
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
if (path.outputs.empty())
|
|
|
|
for (auto & i : drv.outputs) path.outputs.insert(i.first);
|
2012-11-26 16:39:10 +02:00
|
|
|
|
2011-12-30 19:25:19 +02:00
|
|
|
PathSet outputs;
|
2019-12-05 20:11:09 +02:00
|
|
|
for (auto & j : path.outputs) {
|
2015-07-17 20:24:28 +03:00
|
|
|
DerivationOutputs::iterator i = drv.outputs.find(j);
|
2012-11-26 16:39:10 +02:00
|
|
|
if (i == drv.outputs.end())
|
2019-12-05 20:11:09 +02:00
|
|
|
throw Error("derivation '%s' does not have an output named '%s'",
|
|
|
|
store2->printStorePath(path.path), j);
|
|
|
|
auto outPath = store2->printStorePath(i->second.path);
|
2016-06-02 14:33:49 +03:00
|
|
|
if (store2) {
|
|
|
|
if (gcRoot == "")
|
|
|
|
printGCWarning();
|
|
|
|
else {
|
|
|
|
Path rootName = gcRoot;
|
|
|
|
if (rootNr > 1) rootName += "-" + std::to_string(rootNr);
|
|
|
|
if (i->first != "out") rootName += "-" + i->first;
|
2019-12-05 20:11:09 +02:00
|
|
|
outPath = store2->addPermRoot(store->parseStorePath(outPath), rootName, indirectRoot);
|
2016-06-02 14:33:49 +03:00
|
|
|
}
|
2012-08-24 23:58:11 +03:00
|
|
|
}
|
2011-12-30 19:25:19 +02:00
|
|
|
outputs.insert(outPath);
|
|
|
|
}
|
|
|
|
return outputs;
|
|
|
|
}
|
|
|
|
|
|
|
|
else {
|
2019-12-05 20:11:09 +02:00
|
|
|
if (build) store->ensurePath(path.path);
|
|
|
|
else if (!store->isValidPath(path.path))
|
|
|
|
throw Error("path '%s' does not exist and cannot be created", store->printStorePath(path.path));
|
2016-06-02 14:33:49 +03:00
|
|
|
if (store2) {
|
|
|
|
if (gcRoot == "")
|
|
|
|
printGCWarning();
|
|
|
|
else {
|
|
|
|
Path rootName = gcRoot;
|
|
|
|
rootNr++;
|
|
|
|
if (rootNr > 1) rootName += "-" + std::to_string(rootNr);
|
2019-12-05 20:11:09 +02:00
|
|
|
return {store2->addPermRoot(path.path, rootName, indirectRoot)};
|
2016-06-02 14:33:49 +03:00
|
|
|
}
|
2014-02-26 17:32:46 +02:00
|
|
|
}
|
2019-12-05 20:11:09 +02:00
|
|
|
return {store->printStorePath(path.path)};
|
2005-01-25 12:55:33 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Realise the given paths. */
|
|
|
|
static void opRealise(Strings opFlags, Strings opArgs)
|
2003-03-14 18:43:14 +02:00
|
|
|
{
|
2008-08-04 16:44:46 +03:00
|
|
|
bool dryRun = false;
|
2014-02-18 02:01:14 +02:00
|
|
|
BuildMode buildMode = bmNormal;
|
2012-11-20 01:27:25 +02:00
|
|
|
bool ignoreUnknown = false;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
|
|
|
if (i == "--dry-run") dryRun = true;
|
|
|
|
else if (i == "--repair") buildMode = bmRepair;
|
|
|
|
else if (i == "--check") buildMode = bmCheck;
|
|
|
|
else if (i == "--ignore-unknown") ignoreUnknown = true;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2003-03-13 18:28:32 +02:00
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
std::vector<StorePathWithOutputs> paths;
|
|
|
|
for (auto & i : opArgs)
|
2019-12-16 20:11:47 +02:00
|
|
|
paths.push_back(store->followLinksToStorePathWithOutputs(i));
|
2012-11-20 01:27:25 +02:00
|
|
|
|
|
|
|
unsigned long long downloadSize, narSize;
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet willBuild, willSubstitute, unknown;
|
|
|
|
store->queryMissing(paths, willBuild, willSubstitute, unknown, downloadSize, narSize);
|
2012-11-20 01:27:25 +02:00
|
|
|
|
|
|
|
if (ignoreUnknown) {
|
2019-12-05 20:11:09 +02:00
|
|
|
std::vector<StorePathWithOutputs> paths2;
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : paths)
|
2019-12-05 20:11:09 +02:00
|
|
|
if (!unknown.count(i.path)) paths2.push_back(i);
|
|
|
|
paths = std::move(paths2);
|
|
|
|
unknown = StorePathSet();
|
2012-11-20 01:27:25 +02:00
|
|
|
}
|
2012-07-31 02:55:41 +03:00
|
|
|
|
Explicitly model all settings and fail on unrecognized ones
Previously, the Settings class allowed other code to query for string
properties, which led to a proliferation of code all over the place making
up new options without any sort of central registry of valid options. This
commit pulls all those options back into the central Settings class and
removes the public get() methods, to discourage future abuses like that.
Furthermore, because we know the full set of options ahead of time, we
now fail loudly if someone enters an unrecognized option, thus preventing
subtle typos. With some template fun, we could probably also dump the full
set of options (with documentation, defaults, etc.) to the command line,
but I'm not doing that yet here.
2017-02-22 05:50:18 +02:00
|
|
|
if (settings.printMissing)
|
2016-02-04 15:48:42 +02:00
|
|
|
printMissing(ref<Store>(store), willBuild, willSubstitute, unknown, downloadSize, narSize);
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2008-08-04 16:44:46 +03:00
|
|
|
if (dryRun) return;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2012-06-27 23:58:15 +03:00
|
|
|
/* Build all paths at the same time to exploit parallelism. */
|
2019-12-05 20:11:09 +02:00
|
|
|
store->buildPaths(paths, buildMode);
|
2005-01-19 17:02:02 +02:00
|
|
|
|
2012-11-20 01:27:25 +02:00
|
|
|
if (!ignoreUnknown)
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : paths) {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto paths2 = realisePath(i, false);
|
2013-12-20 14:10:14 +02:00
|
|
|
if (!noOutput)
|
2019-12-05 20:11:09 +02:00
|
|
|
for (auto & j : paths2)
|
|
|
|
cout << fmt("%1%\n", j);
|
2012-11-20 01:27:25 +02:00
|
|
|
}
|
2003-04-02 18:34:05 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-04-07 17:01:51 +03:00
|
|
|
/* Add files to the Nix store and print the resulting paths. */
|
2003-06-18 00:12:58 +03:00
|
|
|
static void opAdd(Strings opFlags, Strings opArgs)
|
2003-04-02 18:34:05 +03:00
|
|
|
{
|
2003-06-18 00:12:58 +03:00
|
|
|
if (!opFlags.empty()) throw UsageError("unknown flag");
|
2003-04-02 18:34:05 +03:00
|
|
|
|
2015-03-25 18:06:12 +02:00
|
|
|
for (auto & i : opArgs)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%s\n", store->printStorePath(store->addToStore(std::string(baseNameOf(i)), i)));
|
2003-03-13 18:28:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-04-07 17:01:51 +03:00
|
|
|
/* Preload the output of a fixed-output derivation into the Nix
|
|
|
|
store. */
|
|
|
|
static void opAddFixed(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2020-03-31 01:15:55 +03:00
|
|
|
auto recursive = FileIngestionMethod::Flat;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
2020-03-29 08:04:55 +03:00
|
|
|
if (i == "--recursive") recursive = FileIngestionMethod::Recursive;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2005-04-07 17:01:51 +03:00
|
|
|
|
|
|
|
if (opArgs.empty())
|
|
|
|
throw UsageError("first argument must be hash algorithm");
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2008-12-03 18:10:17 +02:00
|
|
|
HashType hashAlgo = parseHashType(opArgs.front());
|
2005-04-07 17:01:51 +03:00
|
|
|
opArgs.pop_front();
|
|
|
|
|
2015-03-25 18:06:12 +02:00
|
|
|
for (auto & i : opArgs)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%s\n", store->printStorePath(store->addToStore(std::string(baseNameOf(i)), i, recursive, hashAlgo)));
|
2005-04-07 17:01:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Hack to support caching in `nix-prefetch-url'. */
|
|
|
|
static void opPrintFixedPath(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2020-03-31 01:15:55 +03:00
|
|
|
auto recursive = FileIngestionMethod::Flat;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto i : opFlags)
|
2020-03-29 08:04:55 +03:00
|
|
|
if (i == "--recursive") recursive = FileIngestionMethod::Recursive;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2005-04-07 17:01:51 +03:00
|
|
|
|
2008-12-03 17:06:30 +02:00
|
|
|
if (opArgs.size() != 3)
|
2017-07-30 14:27:57 +03:00
|
|
|
throw UsageError(format("'--print-fixed-path' requires three arguments"));
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2005-04-07 17:01:51 +03:00
|
|
|
Strings::iterator i = opArgs.begin();
|
2008-12-03 18:10:17 +02:00
|
|
|
HashType hashAlgo = parseHashType(*i++);
|
2005-04-07 17:01:51 +03:00
|
|
|
string hash = *i++;
|
|
|
|
string name = *i++;
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%s\n", store->printStorePath(store->makeFixedOutputPath(recursive, Hash(hash, hashAlgo), name)));
|
2005-04-07 17:01:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
static StorePathSet maybeUseOutputs(const StorePath & storePath, bool useOutput, bool forceRealise)
|
2003-07-29 13:43:12 +03:00
|
|
|
{
|
2005-01-25 12:55:33 +02:00
|
|
|
if (forceRealise) realisePath(storePath);
|
2019-12-05 20:11:09 +02:00
|
|
|
if (useOutput && storePath.isDerivation()) {
|
|
|
|
auto drv = store->derivationFromPath(storePath);
|
|
|
|
StorePathSet outputs;
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : drv.outputs)
|
2019-12-05 20:11:09 +02:00
|
|
|
outputs.insert(i.second.path.clone());
|
2011-12-30 19:25:19 +02:00
|
|
|
return outputs;
|
2005-01-19 16:36:00 +02:00
|
|
|
}
|
2019-12-05 20:11:09 +02:00
|
|
|
else return singleton(storePath.clone());
|
2003-07-29 13:43:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-02-17 17:57:46 +02:00
|
|
|
/* Some code to print a tree representation of a derivation dependency
|
|
|
|
graph. Topological sorting is used to keep the tree relatively
|
|
|
|
flat. */
|
2019-12-05 20:11:09 +02:00
|
|
|
static void printTree(const StorePath & path,
|
|
|
|
const string & firstPad, const string & tailPad, StorePathSet & done)
|
2005-02-17 17:57:46 +02:00
|
|
|
{
|
2019-12-05 20:11:09 +02:00
|
|
|
if (!done.insert(path.clone()).second) {
|
|
|
|
cout << fmt("%s%s [...]\n", firstPad, store->printStorePath(path));
|
2005-02-17 17:57:46 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%s%s\n", firstPad, store->printStorePath(path));
|
2005-04-08 15:57:16 +03:00
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
auto info = store->queryPathInfo(path);
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2005-02-22 17:23:24 +02:00
|
|
|
/* Topologically sort under the relation A < B iff A \in
|
2005-02-17 17:57:46 +02:00
|
|
|
closure(B). That is, if derivation A is an (possibly indirect)
|
|
|
|
input of B, then A is printed first. This has the effect of
|
|
|
|
flattening the tree, preventing deeply nested structures. */
|
2019-12-05 20:11:09 +02:00
|
|
|
auto sorted = store->topoSortPaths(info->references);
|
2005-02-17 17:57:46 +02:00
|
|
|
reverse(sorted.begin(), sorted.end());
|
|
|
|
|
2020-03-24 15:17:10 +02:00
|
|
|
for (const auto &[n, i] : enumerate(sorted)) {
|
|
|
|
bool last = n + 1 == sorted.size();
|
|
|
|
printTree(i,
|
|
|
|
tailPad + (last ? treeLast : treeConn),
|
|
|
|
tailPad + (last ? treeNull : treeLine),
|
2005-02-17 17:57:46 +02:00
|
|
|
done);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-07-08 16:22:08 +03:00
|
|
|
/* Perform various sorts of queries. */
|
|
|
|
static void opQuery(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2014-10-14 13:15:39 +03:00
|
|
|
enum QueryType
|
|
|
|
{ qDefault, qOutputs, qRequisites, qReferences, qReferrers
|
|
|
|
, qReferrersClosure, qDeriver, qBinding, qHash, qSize
|
2018-10-20 10:48:53 +03:00
|
|
|
, qTree, qGraph, qGraphML, qResolve, qRoots };
|
2014-10-14 13:15:39 +03:00
|
|
|
QueryType query = qDefault;
|
2005-01-19 16:36:00 +02:00
|
|
|
bool useOutput = false;
|
|
|
|
bool includeOutputs = false;
|
2005-01-25 12:55:33 +02:00
|
|
|
bool forceRealise = false;
|
2005-02-07 16:32:44 +02:00
|
|
|
string bindingName;
|
2003-07-21 17:46:01 +03:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags) {
|
2014-10-14 13:15:39 +03:00
|
|
|
QueryType prev = query;
|
2015-07-17 20:24:28 +03:00
|
|
|
if (i == "--outputs") query = qOutputs;
|
|
|
|
else if (i == "--requisites" || i == "-R") query = qRequisites;
|
|
|
|
else if (i == "--references") query = qReferences;
|
|
|
|
else if (i == "--referrers" || i == "--referers") query = qReferrers;
|
|
|
|
else if (i == "--referrers-closure" || i == "--referers-closure") query = qReferrersClosure;
|
|
|
|
else if (i == "--deriver" || i == "-d") query = qDeriver;
|
|
|
|
else if (i == "--binding" || i == "-b") {
|
2005-02-07 16:32:44 +02:00
|
|
|
if (opArgs.size() == 0)
|
|
|
|
throw UsageError("expected binding name");
|
|
|
|
bindingName = opArgs.front();
|
|
|
|
opArgs.pop_front();
|
|
|
|
query = qBinding;
|
|
|
|
}
|
2015-07-17 20:24:28 +03:00
|
|
|
else if (i == "--hash") query = qHash;
|
|
|
|
else if (i == "--size") query = qSize;
|
|
|
|
else if (i == "--tree") query = qTree;
|
|
|
|
else if (i == "--graph") query = qGraph;
|
2018-09-29 10:42:11 +03:00
|
|
|
else if (i == "--graphml") query = qGraphML;
|
2015-07-17 20:24:28 +03:00
|
|
|
else if (i == "--resolve") query = qResolve;
|
|
|
|
else if (i == "--roots") query = qRoots;
|
|
|
|
else if (i == "--use-output" || i == "-u") useOutput = true;
|
|
|
|
else if (i == "--force-realise" || i == "--force-realize" || i == "-f") forceRealise = true;
|
|
|
|
else if (i == "--include-outputs") includeOutputs = true;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2014-10-14 13:15:39 +03:00
|
|
|
if (prev != qDefault && prev != query)
|
2017-07-30 14:27:57 +03:00
|
|
|
throw UsageError(format("query type '%1%' conflicts with earlier flag") % i);
|
2014-10-14 13:15:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (query == qDefault) query = qOutputs;
|
2003-07-21 17:46:01 +03:00
|
|
|
|
2014-08-20 22:26:37 +03:00
|
|
|
RunPager pager;
|
|
|
|
|
2003-07-21 17:46:01 +03:00
|
|
|
switch (query) {
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2005-01-19 16:36:00 +02:00
|
|
|
case qOutputs: {
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs) {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto i2 = store->followLinksToStorePath(i);
|
|
|
|
if (forceRealise) realisePath(i2);
|
|
|
|
Derivation drv = store->derivationFromPath(i2);
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & j : drv.outputs)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%1%\n", store->printStorePath(j.second.path));
|
2003-07-21 17:46:01 +03:00
|
|
|
}
|
2003-07-08 16:22:08 +03:00
|
|
|
break;
|
2003-07-10 16:41:28 +03:00
|
|
|
}
|
2003-07-08 16:22:08 +03:00
|
|
|
|
2005-01-19 18:59:56 +02:00
|
|
|
case qRequisites:
|
|
|
|
case qReferences:
|
2005-12-13 23:04:48 +02:00
|
|
|
case qReferrers:
|
|
|
|
case qReferrersClosure: {
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet paths;
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs) {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto ps = maybeUseOutputs(store->followLinksToStorePath(i), useOutput, forceRealise);
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & j : ps) {
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
if (query == qRequisites) store->computeFSClosure(j, paths, false, includeOutputs);
|
2016-04-19 19:50:15 +03:00
|
|
|
else if (query == qReferences) {
|
|
|
|
for (auto & p : store->queryPathInfo(j)->references)
|
2019-12-05 20:11:09 +02:00
|
|
|
paths.insert(p.clone());
|
|
|
|
}
|
|
|
|
else if (query == qReferrers) {
|
|
|
|
StorePathSet tmp;
|
|
|
|
store->queryReferrers(j, tmp);
|
|
|
|
for (auto & i : tmp)
|
|
|
|
paths.insert(i.clone());
|
2016-04-19 19:50:15 +03:00
|
|
|
}
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
else if (query == qReferrersClosure) store->computeFSClosure(j, paths, true);
|
2011-12-30 19:25:19 +02:00
|
|
|
}
|
2003-07-21 17:46:01 +03:00
|
|
|
}
|
2019-12-05 20:11:09 +02:00
|
|
|
auto sorted = store->topoSortPaths(paths);
|
|
|
|
for (StorePaths::reverse_iterator i = sorted.rbegin();
|
2007-02-22 00:45:10 +02:00
|
|
|
i != sorted.rend(); ++i)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%s\n", store->printStorePath(*i));
|
2003-07-21 17:46:01 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2005-02-07 15:40:40 +02:00
|
|
|
case qDeriver:
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs) {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto info = store->queryPathInfo(store->followLinksToStorePath(i));
|
|
|
|
cout << fmt("%s\n", info->deriver ? store->printStorePath(*info->deriver) : "unknown-deriver");
|
2005-02-07 15:40:40 +02:00
|
|
|
}
|
|
|
|
break;
|
2005-02-07 16:32:44 +02:00
|
|
|
|
|
|
|
case qBinding:
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs) {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto path = useDeriver(store->followLinksToStorePath(i));
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
Derivation drv = store->derivationFromPath(path);
|
2005-02-07 16:32:44 +02:00
|
|
|
StringPairs::iterator j = drv.env.find(bindingName);
|
|
|
|
if (j == drv.env.end())
|
2019-12-05 20:11:09 +02:00
|
|
|
throw Error("derivation '%s' has no environment binding named '%s'",
|
|
|
|
store->printStorePath(path), bindingName);
|
|
|
|
cout << fmt("%s\n", j->second);
|
2005-02-07 16:32:44 +02:00
|
|
|
}
|
|
|
|
break;
|
2005-02-07 15:40:40 +02:00
|
|
|
|
2005-03-02 17:57:06 +02:00
|
|
|
case qHash:
|
2010-11-17 14:40:52 +02:00
|
|
|
case qSize:
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs) {
|
2019-12-05 20:11:09 +02:00
|
|
|
for (auto & j : maybeUseOutputs(store->followLinksToStorePath(i), useOutput, forceRealise)) {
|
2016-04-19 19:50:15 +03:00
|
|
|
auto info = store->queryPathInfo(j);
|
2011-12-30 19:25:19 +02:00
|
|
|
if (query == qHash) {
|
2020-03-29 01:22:10 +02:00
|
|
|
assert(info->narHash.type == HashType::SHA256);
|
|
|
|
cout << fmt("%s\n", info->narHash.to_string(Base::Base32));
|
2012-07-31 02:55:41 +03:00
|
|
|
} else if (query == qSize)
|
2017-07-04 15:47:59 +03:00
|
|
|
cout << fmt("%d\n", info->narSize);
|
2011-12-30 19:25:19 +02:00
|
|
|
}
|
2005-03-02 17:57:06 +02:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2005-02-17 17:57:46 +02:00
|
|
|
case qTree: {
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet done;
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs)
|
2016-06-01 15:49:12 +03:00
|
|
|
printTree(store->followLinksToStorePath(i), "", "", done);
|
2005-02-17 17:57:46 +02:00
|
|
|
break;
|
|
|
|
}
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2003-07-28 15:19:23 +03:00
|
|
|
case qGraph: {
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet roots;
|
|
|
|
for (auto & i : opArgs)
|
|
|
|
for (auto & j : maybeUseOutputs(store->followLinksToStorePath(i), useOutput, forceRealise))
|
|
|
|
roots.insert(j.clone());
|
|
|
|
printDotGraph(ref<Store>(store), std::move(roots));
|
2003-07-28 15:19:23 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-09-29 10:42:11 +03:00
|
|
|
case qGraphML: {
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet roots;
|
|
|
|
for (auto & i : opArgs)
|
|
|
|
for (auto & j : maybeUseOutputs(store->followLinksToStorePath(i), useOutput, forceRealise))
|
|
|
|
roots.insert(j.clone());
|
|
|
|
printGraphML(ref<Store>(store), std::move(roots));
|
2018-09-29 10:42:11 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2007-01-13 21:50:42 +02:00
|
|
|
case qResolve: {
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%s\n", store->printStorePath(store->followLinksToStorePath(i)));
|
2007-01-13 21:50:42 +02:00
|
|
|
break;
|
|
|
|
}
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2009-11-23 20:16:25 +02:00
|
|
|
case qRoots: {
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet args;
|
|
|
|
for (auto & i : opArgs)
|
|
|
|
for (auto & p : maybeUseOutputs(store->followLinksToStorePath(i), useOutput, forceRealise))
|
|
|
|
args.insert(p.clone());
|
|
|
|
|
|
|
|
StorePathSet referrers;
|
|
|
|
store->computeFSClosure(
|
|
|
|
args, referrers, true, settings.gcKeepOutputs, settings.gcKeepDerivations);
|
|
|
|
|
2019-03-14 14:50:07 +02:00
|
|
|
Roots roots = store->findRoots(false);
|
2019-03-10 01:04:37 +02:00
|
|
|
for (auto & [target, links] : roots)
|
|
|
|
if (referrers.find(target) != referrers.end())
|
2019-03-01 02:15:10 +02:00
|
|
|
for (auto & link : links)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%1% -> %2%\n", link, store->printStorePath(target));
|
2009-11-23 20:16:25 +02:00
|
|
|
break;
|
|
|
|
}
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2003-07-08 16:22:08 +03:00
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
}
|
2003-07-10 21:48:11 +03:00
|
|
|
|
|
|
|
|
2012-01-18 01:07:22 +02:00
|
|
|
static void opPrintEnv(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
if (!opFlags.empty()) throw UsageError("unknown flag");
|
2017-07-30 14:27:57 +03:00
|
|
|
if (opArgs.size() != 1) throw UsageError("'--print-env' requires one derivation store path");
|
2012-01-18 01:07:22 +02:00
|
|
|
|
|
|
|
Path drvPath = opArgs.front();
|
2019-12-05 20:11:09 +02:00
|
|
|
Derivation drv = store->derivationFromPath(store->parseStorePath(drvPath));
|
2012-01-18 01:07:22 +02:00
|
|
|
|
|
|
|
/* Print each environment variable in the derivation in a format
|
|
|
|
that can be sourced by the shell. */
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : drv.env)
|
2017-10-25 14:01:50 +03:00
|
|
|
cout << format("export %1%; %1%=%2%\n") % i.first % shellEscape(i.second);
|
2012-01-18 01:07:22 +02:00
|
|
|
|
|
|
|
/* Also output the arguments. This doesn't preserve whitespace in
|
|
|
|
arguments. */
|
|
|
|
cout << "export _args; _args='";
|
2015-07-17 20:24:28 +03:00
|
|
|
bool first = true;
|
|
|
|
for (auto & i : drv.args) {
|
|
|
|
if (!first) cout << ' ';
|
|
|
|
first = false;
|
|
|
|
cout << shellEscape(i);
|
2012-01-18 01:07:22 +02:00
|
|
|
}
|
|
|
|
cout << "'\n";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-10-28 19:33:54 +03:00
|
|
|
static void opReadLog(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
if (!opFlags.empty()) throw UsageError("unknown flag");
|
|
|
|
|
2014-08-20 16:12:58 +03:00
|
|
|
RunPager pager;
|
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs) {
|
2017-03-13 13:07:50 +02:00
|
|
|
auto path = store->followLinksToStorePath(i);
|
|
|
|
auto log = store->getBuildLog(path);
|
|
|
|
if (!log)
|
2019-12-05 20:11:09 +02:00
|
|
|
throw Error("build log of derivation '%s' is not available", store->printStorePath(path));
|
2017-03-13 13:07:50 +02:00
|
|
|
std::cout << *log;
|
2006-10-28 19:33:54 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-01-29 20:17:36 +02:00
|
|
|
static void opDumpDB(Strings opFlags, Strings opArgs)
|
2004-02-14 23:44:18 +02:00
|
|
|
{
|
2008-01-29 20:17:36 +02:00
|
|
|
if (!opFlags.empty()) throw UsageError("unknown flag");
|
2018-12-12 21:19:54 +02:00
|
|
|
if (!opArgs.empty()) {
|
|
|
|
for (auto & i : opArgs)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << store->makeValidityRegistration(singleton(store->followLinksToStorePath(i)), true, true);
|
2018-12-12 21:19:54 +02:00
|
|
|
} else {
|
2019-12-05 20:11:09 +02:00
|
|
|
for (auto & i : store->queryAllValidPaths())
|
|
|
|
cout << store->makeValidityRegistration(singleton(i), true, true);
|
2018-12-12 21:19:54 +02:00
|
|
|
}
|
2008-01-29 20:17:36 +02:00
|
|
|
}
|
2006-11-13 18:48:27 +02:00
|
|
|
|
2005-03-23 13:25:20 +02:00
|
|
|
|
2008-01-29 20:17:36 +02:00
|
|
|
static void registerValidity(bool reregister, bool hashGiven, bool canonicalise)
|
|
|
|
{
|
2005-03-23 15:07:28 +02:00
|
|
|
ValidPathInfos infos;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2005-03-23 13:25:20 +02:00
|
|
|
while (1) {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto info = decodeValidPathInfo(*store, cin, hashGiven);
|
|
|
|
if (!info) break;
|
|
|
|
if (!store->isValidPath(info->path) || reregister) {
|
2005-03-23 14:06:57 +02:00
|
|
|
/* !!! races */
|
2008-01-29 20:17:36 +02:00
|
|
|
if (canonicalise)
|
2019-12-05 20:11:09 +02:00
|
|
|
canonicalisePathMetaData(store->printStorePath(info->path), -1);
|
2010-11-16 19:11:46 +02:00
|
|
|
if (!hashGiven) {
|
2020-03-29 01:22:10 +02:00
|
|
|
HashResult hash = hashPath(HashType::SHA256, store->printStorePath(info->path));
|
2019-12-05 20:11:09 +02:00
|
|
|
info->narHash = hash.first;
|
|
|
|
info->narSize = hash.second;
|
2010-11-16 19:11:46 +02:00
|
|
|
}
|
2019-12-05 20:11:09 +02:00
|
|
|
infos.push_back(std::move(*info));
|
2005-03-23 14:06:57 +02:00
|
|
|
}
|
2005-03-23 13:25:20 +02:00
|
|
|
}
|
|
|
|
|
2016-02-04 16:10:47 +02:00
|
|
|
ensureLocalStore()->registerValidPaths(infos);
|
2004-02-14 23:44:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-01-29 20:17:36 +02:00
|
|
|
static void opLoadDB(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
if (!opFlags.empty()) throw UsageError("unknown flag");
|
|
|
|
if (!opArgs.empty())
|
|
|
|
throw UsageError("no arguments expected");
|
|
|
|
registerValidity(true, true, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void opRegisterValidity(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
bool reregister = false; // !!! maybe this should be the default
|
|
|
|
bool hashGiven = false;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
|
|
|
if (i == "--reregister") reregister = true;
|
|
|
|
else if (i == "--hash-given") hashGiven = true;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2008-01-29 20:17:36 +02:00
|
|
|
|
|
|
|
if (!opArgs.empty()) throw UsageError("no arguments expected");
|
|
|
|
|
|
|
|
registerValidity(reregister, hashGiven, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-03-23 13:25:20 +02:00
|
|
|
static void opCheckValidity(Strings opFlags, Strings opArgs)
|
2004-02-14 23:44:18 +02:00
|
|
|
{
|
2007-02-21 19:57:59 +02:00
|
|
|
bool printInvalid = false;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
|
|
|
if (i == "--print-invalid") printInvalid = true;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2004-02-14 23:44:18 +02:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs) {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto path = store->followLinksToStorePath(i);
|
2011-09-06 15:06:30 +03:00
|
|
|
if (!store->isValidPath(path)) {
|
2007-02-21 19:57:59 +02:00
|
|
|
if (printInvalid)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%s\n", store->printStorePath(path));
|
2007-02-21 19:57:59 +02:00
|
|
|
else
|
2019-12-05 20:11:09 +02:00
|
|
|
throw Error("path '%s' is not valid", store->printStorePath(path));
|
2011-09-06 15:06:30 +03:00
|
|
|
}
|
2007-02-21 19:57:59 +02:00
|
|
|
}
|
2004-02-14 23:44:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-08-25 14:43:49 +03:00
|
|
|
static void opGC(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2009-11-23 19:23:12 +02:00
|
|
|
bool printRoots = false;
|
2008-06-18 12:34:17 +03:00
|
|
|
GCOptions options;
|
|
|
|
options.action = GCOptions::gcDeleteDead;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2008-06-18 12:34:17 +03:00
|
|
|
GCResults results;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2004-08-25 14:43:49 +03:00
|
|
|
/* Do what? */
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto i = opFlags.begin(); i != opFlags.end(); ++i)
|
2009-11-23 19:23:12 +02:00
|
|
|
if (*i == "--print-roots") printRoots = true;
|
2008-06-18 12:34:17 +03:00
|
|
|
else if (*i == "--print-live") options.action = GCOptions::gcReturnLive;
|
|
|
|
else if (*i == "--print-dead") options.action = GCOptions::gcReturnDead;
|
2009-03-26 13:02:07 +02:00
|
|
|
else if (*i == "--max-freed") {
|
2014-02-17 15:48:50 +02:00
|
|
|
long long maxFreed = getIntArg<long long>(*i, i, opFlags.end(), true);
|
2012-08-02 02:14:30 +03:00
|
|
|
options.maxFreed = maxFreed >= 0 ? maxFreed : 0;
|
2009-03-26 13:02:07 +02:00
|
|
|
}
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("bad sub-operation '%1%' in GC") % *i);
|
2005-01-27 17:21:29 +02:00
|
|
|
|
2008-09-17 17:52:35 +03:00
|
|
|
if (!opArgs.empty()) throw UsageError("no arguments expected");
|
2004-08-25 14:43:49 +03:00
|
|
|
|
2009-11-23 19:23:12 +02:00
|
|
|
if (printRoots) {
|
2019-03-14 14:50:07 +02:00
|
|
|
Roots roots = store->findRoots(false);
|
2019-12-05 20:11:09 +02:00
|
|
|
std::set<std::pair<Path, StorePath>> roots2;
|
2019-03-14 14:59:10 +02:00
|
|
|
// Transpose and sort the roots.
|
2019-03-10 01:04:37 +02:00
|
|
|
for (auto & [target, links] : roots)
|
|
|
|
for (auto & link : links)
|
2019-12-05 20:11:09 +02:00
|
|
|
roots2.emplace(link, target.clone());
|
2019-03-14 14:59:10 +02:00
|
|
|
for (auto & [link, target] : roots2)
|
2019-12-05 20:11:09 +02:00
|
|
|
std::cout << link << " -> " << store->printStorePath(target) << "\n";
|
2009-11-23 19:23:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
else {
|
|
|
|
PrintFreed freed(options.action == GCOptions::gcDeleteDead, results);
|
|
|
|
store->collectGarbage(options, results);
|
|
|
|
|
|
|
|
if (options.action != GCOptions::gcDeleteDead)
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : results.paths)
|
|
|
|
cout << i << std::endl;
|
2009-11-23 19:23:12 +02:00
|
|
|
}
|
2004-08-25 14:43:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-12-23 23:08:42 +02:00
|
|
|
/* Remove paths from the Nix store if possible (i.e., if they do not
|
|
|
|
have any remaining referrers and are not reachable from any GC
|
|
|
|
roots). */
|
|
|
|
static void opDelete(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2008-06-18 12:34:17 +03:00
|
|
|
GCOptions options;
|
|
|
|
options.action = GCOptions::gcDeleteSpecific;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
|
|
|
if (i == "--ignore-liveness") options.ignoreLiveness = true;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2005-12-23 23:08:42 +02:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs)
|
2016-06-01 15:49:12 +03:00
|
|
|
options.pathsToDelete.insert(store->followLinksToStorePath(i));
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2008-06-18 12:34:17 +03:00
|
|
|
GCResults results;
|
2008-09-17 13:02:55 +03:00
|
|
|
PrintFreed freed(true, results);
|
2008-06-18 12:34:17 +03:00
|
|
|
store->collectGarbage(options, results);
|
2005-12-23 23:08:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-27 19:45:02 +02:00
|
|
|
/* Dump a path as a Nix archive. The archive is written to stdout */
|
2003-06-18 17:34:43 +03:00
|
|
|
static void opDump(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
if (!opFlags.empty()) throw UsageError("unknown flag");
|
|
|
|
if (opArgs.size() != 1) throw UsageError("only one argument allowed");
|
|
|
|
|
2006-11-30 21:19:59 +02:00
|
|
|
FdSink sink(STDOUT_FILENO);
|
2003-10-08 18:06:59 +03:00
|
|
|
string path = *opArgs.begin();
|
2003-06-23 17:08:34 +03:00
|
|
|
dumpPath(path, sink);
|
2018-02-13 13:05:25 +02:00
|
|
|
sink.flush();
|
2003-06-23 17:08:34 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-10-27 19:45:02 +02:00
|
|
|
/* Restore a value from a Nix archive. The archive is read from stdin. */
|
2003-06-23 17:08:34 +03:00
|
|
|
static void opRestore(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
if (!opFlags.empty()) throw UsageError("unknown flag");
|
|
|
|
if (opArgs.size() != 1) throw UsageError("only one argument allowed");
|
|
|
|
|
2006-11-30 21:19:59 +02:00
|
|
|
FdSource source(STDIN_FILENO);
|
2003-06-23 17:08:34 +03:00
|
|
|
restorePath(*opArgs.begin(), source);
|
2003-06-18 17:34:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-02-21 01:17:20 +02:00
|
|
|
static void opExport(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
2017-07-30 14:27:57 +03:00
|
|
|
throw UsageError(format("unknown flag '%1%'") % i);
|
2007-02-22 01:00:31 +02:00
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet paths;
|
|
|
|
|
2017-03-01 15:41:54 +02:00
|
|
|
for (auto & i : opArgs)
|
2019-12-05 20:11:09 +02:00
|
|
|
paths.insert(store->followLinksToStorePath(i));
|
2017-03-01 15:41:54 +02:00
|
|
|
|
2007-02-21 01:17:20 +02:00
|
|
|
FdSink sink(STDOUT_FILENO);
|
2019-12-05 20:11:09 +02:00
|
|
|
store->exportPaths(paths, sink);
|
2018-02-13 13:05:25 +02:00
|
|
|
sink.flush();
|
2007-02-21 01:17:20 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-02-21 17:45:32 +02:00
|
|
|
static void opImport(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
2017-07-30 14:27:57 +03:00
|
|
|
throw UsageError(format("unknown flag '%1%'") % i);
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2007-02-21 17:45:32 +02:00
|
|
|
if (!opArgs.empty()) throw UsageError("no arguments expected");
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2007-02-21 17:45:32 +02:00
|
|
|
FdSource source(STDIN_FILENO);
|
2019-12-05 20:11:09 +02:00
|
|
|
auto paths = store->importPaths(source, nullptr, NoCheckSigs);
|
2011-12-17 00:31:25 +02:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : paths)
|
2019-12-05 20:11:09 +02:00
|
|
|
cout << fmt("%s\n", store->printStorePath(i)) << std::flush;
|
2007-02-21 17:45:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-06-18 00:12:58 +03:00
|
|
|
/* Initialise the Nix databases. */
|
|
|
|
static void opInit(Strings opFlags, Strings opArgs)
|
2003-05-26 12:44:18 +03:00
|
|
|
{
|
2003-06-18 00:12:58 +03:00
|
|
|
if (!opFlags.empty()) throw UsageError("unknown flag");
|
|
|
|
if (!opArgs.empty())
|
2004-06-20 22:17:54 +03:00
|
|
|
throw UsageError("no arguments expected");
|
2006-11-30 19:43:04 +02:00
|
|
|
/* Doesn't do anything right now; database tables are initialised
|
|
|
|
automatically. */
|
2003-03-21 17:53:35 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-07-17 15:27:55 +03:00
|
|
|
/* Verify the consistency of the Nix environment. */
|
|
|
|
static void opVerify(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2005-02-08 15:48:53 +02:00
|
|
|
if (!opArgs.empty())
|
|
|
|
throw UsageError("no arguments expected");
|
|
|
|
|
|
|
|
bool checkContents = false;
|
2017-06-28 19:11:01 +03:00
|
|
|
RepairFlag repair = NoRepair;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
|
|
|
if (i == "--check-contents") checkContents = true;
|
2017-06-28 19:11:01 +03:00
|
|
|
else if (i == "--repair") repair = Repair;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2012-07-31 02:55:41 +03:00
|
|
|
|
2015-06-02 03:21:15 +03:00
|
|
|
if (store->verifyStore(checkContents, repair)) {
|
2016-09-21 17:11:01 +03:00
|
|
|
printError("warning: not all errors were fixed");
|
2014-08-13 04:50:44 +03:00
|
|
|
throw Exit(1);
|
2012-10-02 22:04:59 +03:00
|
|
|
}
|
2003-07-17 15:27:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-09-06 15:06:30 +03:00
|
|
|
/* Verify whether the contents of the given store path have not changed. */
|
|
|
|
static void opVerifyPath(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
if (!opFlags.empty())
|
|
|
|
throw UsageError("no flags expected");
|
|
|
|
|
2014-08-13 04:50:44 +03:00
|
|
|
int status = 0;
|
|
|
|
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opArgs) {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto path = store->followLinksToStorePath(i);
|
2020-03-29 01:22:10 +02:00
|
|
|
printMsg(Verbosity::Talkative, "checking path '%s'...", store->printStorePath(path));
|
2016-04-19 19:50:15 +03:00
|
|
|
auto info = store->queryPathInfo(path);
|
|
|
|
HashSink sink(info->narHash.type);
|
2016-03-22 15:21:45 +02:00
|
|
|
store->narFromPath(path, sink);
|
2016-03-21 18:55:57 +02:00
|
|
|
auto current = sink.finish();
|
2016-04-19 19:50:15 +03:00
|
|
|
if (current.first != info->narHash) {
|
2016-09-21 17:11:01 +03:00
|
|
|
printError(
|
2019-12-05 20:11:09 +02:00
|
|
|
"path '%s' was modified! expected hash '%s', got '%s'",
|
|
|
|
store->printStorePath(path), info->narHash.to_string(), current.first.to_string());
|
2014-08-13 04:50:44 +03:00
|
|
|
status = 1;
|
2011-09-06 15:06:30 +03:00
|
|
|
}
|
|
|
|
}
|
2014-08-13 04:50:44 +03:00
|
|
|
|
|
|
|
throw Exit(status);
|
2011-09-06 15:06:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-10-02 21:08:59 +03:00
|
|
|
/* Repair the contents of the given path by redownloading it using a
|
|
|
|
substituter (if available). */
|
|
|
|
static void opRepairPath(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
if (!opFlags.empty())
|
|
|
|
throw UsageError("no flags expected");
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
for (auto & i : opArgs)
|
|
|
|
ensureLocalStore()->repairPath(store->followLinksToStorePath(i));
|
2012-10-02 21:08:59 +03:00
|
|
|
}
|
|
|
|
|
2007-10-10 01:14:27 +03:00
|
|
|
/* Optimise the disk space usage of the Nix store by hard-linking
|
|
|
|
files with the same contents. */
|
|
|
|
static void opOptimise(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2012-07-23 19:08:34 +03:00
|
|
|
if (!opArgs.empty() || !opFlags.empty())
|
2007-10-10 01:14:27 +03:00
|
|
|
throw UsageError("no arguments expected");
|
|
|
|
|
2014-09-01 23:21:42 +03:00
|
|
|
store->optimiseStore();
|
2007-10-10 01:14:27 +03:00
|
|
|
}
|
|
|
|
|
2014-02-14 12:48:42 +02:00
|
|
|
/* Serve the nix store in a way usable by a restricted ssh user. */
|
2014-02-06 18:52:03 +02:00
|
|
|
static void opServe(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2014-07-10 12:51:22 +03:00
|
|
|
bool writeAllowed = false;
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
|
|
|
if (i == "--write") writeAllowed = true;
|
2017-07-30 14:27:57 +03:00
|
|
|
else throw UsageError(format("unknown flag '%1%'") % i);
|
2014-07-10 12:51:22 +03:00
|
|
|
|
|
|
|
if (!opArgs.empty()) throw UsageError("no arguments expected");
|
2014-02-10 13:52:48 +02:00
|
|
|
|
2014-02-06 18:52:03 +02:00
|
|
|
FdSource in(STDIN_FILENO);
|
|
|
|
FdSink out(STDOUT_FILENO);
|
|
|
|
|
2014-02-10 14:43:13 +02:00
|
|
|
/* Exchange the greeting. */
|
|
|
|
unsigned int magic = readInt(in);
|
|
|
|
if (magic != SERVE_MAGIC_1) throw Error("protocol mismatch");
|
2015-07-20 02:16:16 +03:00
|
|
|
out << SERVE_MAGIC_2 << SERVE_PROTOCOL_VERSION;
|
2014-02-10 14:43:13 +02:00
|
|
|
out.flush();
|
2015-10-06 18:33:30 +03:00
|
|
|
unsigned int clientVersion = readInt(in);
|
2014-02-10 14:43:13 +02:00
|
|
|
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
auto getBuildSettings = [&]() {
|
|
|
|
// FIXME: changing options here doesn't work if we're
|
|
|
|
// building through the daemon.
|
2020-03-29 01:22:10 +02:00
|
|
|
verbosity = Verbosity::Error;
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
settings.keepLog = false;
|
|
|
|
settings.useSubstitutes = false;
|
|
|
|
settings.maxSilentTime = readInt(in);
|
|
|
|
settings.buildTimeout = readInt(in);
|
2015-10-06 18:33:30 +03:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 2)
|
2017-04-13 21:53:23 +03:00
|
|
|
settings.maxLogSize = readNum<unsigned long>(in);
|
2016-12-07 14:43:40 +02:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 3) {
|
2017-04-13 21:53:23 +03:00
|
|
|
settings.buildRepeat = readInt(in);
|
|
|
|
settings.enforceDeterminism = readInt(in);
|
2017-04-26 18:58:09 +03:00
|
|
|
settings.runDiffHook = true;
|
2016-12-07 14:43:40 +02:00
|
|
|
}
|
2016-12-06 18:43:39 +02:00
|
|
|
settings.printRepeatedBuilds = false;
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
};
|
|
|
|
|
2014-07-10 12:51:22 +03:00
|
|
|
while (true) {
|
|
|
|
ServeCommand cmd;
|
|
|
|
try {
|
|
|
|
cmd = (ServeCommand) readInt(in);
|
|
|
|
} catch (EndOfFile & e) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (cmd) {
|
2014-07-10 21:43:04 +03:00
|
|
|
|
2014-07-10 12:51:22 +03:00
|
|
|
case cmdQueryValidPaths: {
|
|
|
|
bool lock = readInt(in);
|
2014-07-10 21:43:04 +03:00
|
|
|
bool substitute = readInt(in);
|
2019-12-05 20:11:09 +02:00
|
|
|
auto paths = readStorePaths<StorePathSet>(*store, in);
|
2014-07-10 12:51:22 +03:00
|
|
|
if (lock && writeAllowed)
|
|
|
|
for (auto & path : paths)
|
|
|
|
store->addTempRoot(path);
|
2014-07-10 21:43:04 +03:00
|
|
|
|
|
|
|
/* If requested, substitute missing paths. This
|
|
|
|
implements nix-copy-closure's --use-substitutes
|
|
|
|
flag. */
|
|
|
|
if (substitute && writeAllowed) {
|
|
|
|
/* Filter out .drv files (we don't want to build anything). */
|
2019-12-05 20:11:09 +02:00
|
|
|
std::vector<StorePathWithOutputs> paths2;
|
2014-07-10 21:43:04 +03:00
|
|
|
for (auto & path : paths)
|
2019-12-05 20:11:09 +02:00
|
|
|
if (!path.isDerivation())
|
|
|
|
paths2.emplace_back(path.clone());
|
2014-07-10 21:43:04 +03:00
|
|
|
unsigned long long downloadSize, narSize;
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet willBuild, willSubstitute, unknown;
|
|
|
|
store->queryMissing(paths2,
|
2014-07-10 21:43:04 +03:00
|
|
|
willBuild, willSubstitute, unknown, downloadSize, narSize);
|
|
|
|
/* FIXME: should use ensurePath(), but it only
|
|
|
|
does one path at a time. */
|
|
|
|
if (!willSubstitute.empty())
|
|
|
|
try {
|
2019-12-05 20:11:09 +02:00
|
|
|
std::vector<StorePathWithOutputs> subs;
|
|
|
|
for (auto & p : willSubstitute) subs.emplace_back(p.clone());
|
|
|
|
store->buildPaths(subs);
|
2014-07-10 21:43:04 +03:00
|
|
|
} catch (Error & e) {
|
2016-09-21 17:11:01 +03:00
|
|
|
printError(format("warning: %1%") % e.msg());
|
2014-07-10 21:43:04 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
writeStorePaths(*store, out, store->queryValidPaths(paths));
|
2014-07-10 12:51:22 +03:00
|
|
|
break;
|
|
|
|
}
|
2014-07-10 21:43:04 +03:00
|
|
|
|
2014-07-10 12:51:22 +03:00
|
|
|
case cmdQueryPathInfos: {
|
2019-12-05 20:11:09 +02:00
|
|
|
auto paths = readStorePaths<StorePathSet>(*store, in);
|
2014-07-10 12:51:22 +03:00
|
|
|
// !!! Maybe we want a queryPathInfos?
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : paths) {
|
2016-04-19 19:50:15 +03:00
|
|
|
try {
|
|
|
|
auto info = store->queryPathInfo(i);
|
2019-12-05 20:11:09 +02:00
|
|
|
out << store->printStorePath(info->path)
|
|
|
|
<< (info->deriver ? store->printStorePath(*info->deriver) : "");
|
|
|
|
writeStorePaths(*store, out, info->references);
|
2016-04-19 19:50:15 +03:00
|
|
|
// !!! Maybe we want compression?
|
|
|
|
out << info->narSize // downloadSize
|
|
|
|
<< info->narSize;
|
2017-09-08 17:55:27 +03:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 4)
|
|
|
|
out << (info->narHash ? info->narHash.to_string() : "") << info->ca << info->sigs;
|
2016-04-19 19:50:15 +03:00
|
|
|
} catch (InvalidPath &) {
|
|
|
|
}
|
2014-02-10 14:43:13 +02:00
|
|
|
}
|
2015-07-20 02:16:16 +03:00
|
|
|
out << "";
|
2014-07-10 12:51:22 +03:00
|
|
|
break;
|
2014-02-10 14:43:13 +02:00
|
|
|
}
|
2014-07-10 21:43:04 +03:00
|
|
|
|
2014-07-10 12:51:22 +03:00
|
|
|
case cmdDumpStorePath:
|
2019-12-05 20:11:09 +02:00
|
|
|
store->narFromPath(store->parseStorePath(readString(in)), out);
|
2014-07-10 12:51:22 +03:00
|
|
|
break;
|
2014-07-10 21:43:04 +03:00
|
|
|
|
2014-07-10 15:15:12 +03:00
|
|
|
case cmdImportPaths: {
|
2014-07-11 17:02:19 +03:00
|
|
|
if (!writeAllowed) throw Error("importing paths is not allowed");
|
2017-06-28 19:11:01 +03:00
|
|
|
store->importPaths(in, nullptr, NoCheckSigs); // FIXME: should we skip sig checking?
|
2015-07-20 02:16:16 +03:00
|
|
|
out << 1; // indicate success
|
2014-07-10 12:51:22 +03:00
|
|
|
break;
|
2014-07-10 15:15:12 +03:00
|
|
|
}
|
2014-07-10 21:43:04 +03:00
|
|
|
|
2014-07-11 17:02:19 +03:00
|
|
|
case cmdExportPaths: {
|
2016-05-03 16:11:14 +03:00
|
|
|
readInt(in); // obsolete
|
2019-12-05 20:11:09 +02:00
|
|
|
store->exportPaths(readStorePaths<StorePathSet>(*store, in), out);
|
2014-07-11 17:02:19 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2016-08-12 13:38:08 +03:00
|
|
|
case cmdBuildPaths: {
|
2014-07-24 12:52:52 +03:00
|
|
|
|
2014-07-11 17:02:19 +03:00
|
|
|
if (!writeAllowed) throw Error("building paths is not allowed");
|
2019-12-05 20:11:09 +02:00
|
|
|
|
|
|
|
std::vector<StorePathWithOutputs> paths;
|
|
|
|
for (auto & s : readStrings<Strings>(in))
|
2019-12-16 20:11:47 +02:00
|
|
|
paths.emplace_back(store->parsePathWithOutputs(s));
|
2014-07-11 17:02:19 +03:00
|
|
|
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
getBuildSettings();
|
2014-07-11 17:02:19 +03:00
|
|
|
|
|
|
|
try {
|
2014-07-24 12:52:52 +03:00
|
|
|
MonitorFdHup monitor(in.fd);
|
2014-07-11 17:02:19 +03:00
|
|
|
store->buildPaths(paths);
|
2015-07-20 02:16:16 +03:00
|
|
|
out << 0;
|
2014-07-11 17:02:19 +03:00
|
|
|
} catch (Error & e) {
|
2014-07-24 13:43:59 +03:00
|
|
|
assert(e.status);
|
2015-07-20 02:16:16 +03:00
|
|
|
out << e.status << e.msg();
|
2014-07-11 17:02:19 +03:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
case cmdBuildDerivation: { /* Used by hydra-queue-runner. */
|
|
|
|
|
|
|
|
if (!writeAllowed) throw Error("building paths is not allowed");
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
auto drvPath = store->parseStorePath(readString(in)); // informational only
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
BasicDerivation drv;
|
2016-06-01 15:49:12 +03:00
|
|
|
readDerivation(in, *store, drv);
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
|
|
|
|
getBuildSettings();
|
|
|
|
|
|
|
|
MonitorFdHup monitor(in.fd);
|
|
|
|
auto status = store->buildDerivation(drvPath, drv);
|
|
|
|
|
2015-07-20 02:16:16 +03:00
|
|
|
out << status.status << status.errorMsg;
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
|
2016-12-07 14:43:40 +02:00
|
|
|
if (GET_PROTOCOL_MINOR(clientVersion) >= 3)
|
2016-12-07 17:09:38 +02:00
|
|
|
out << status.timesBuilt << status.isNonDeterministic << status.startTime << status.stopTime;
|
2016-12-07 14:43:40 +02:00
|
|
|
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 18:57:40 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2014-07-24 17:00:29 +03:00
|
|
|
case cmdQueryClosure: {
|
|
|
|
bool includeOutputs = readInt(in);
|
2019-12-05 20:11:09 +02:00
|
|
|
StorePathSet closure;
|
|
|
|
store->computeFSClosure(readStorePaths<StorePathSet>(*store, in),
|
2016-11-10 18:45:04 +02:00
|
|
|
closure, false, includeOutputs);
|
2019-12-05 20:11:09 +02:00
|
|
|
writeStorePaths(*store, out, closure);
|
2014-07-24 17:00:29 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-08-03 22:10:03 +03:00
|
|
|
case cmdAddToStoreNar: {
|
|
|
|
if (!writeAllowed) throw Error("importing paths is not allowed");
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
auto path = readString(in);
|
|
|
|
ValidPathInfo info(store->parseStorePath(path));
|
|
|
|
auto deriver = readString(in);
|
|
|
|
if (deriver != "")
|
|
|
|
info.deriver = store->parseStorePath(deriver);
|
2020-03-29 01:22:10 +02:00
|
|
|
info.narHash = Hash(readString(in), HashType::SHA256);
|
2019-12-05 20:11:09 +02:00
|
|
|
info.references = readStorePaths<StorePathSet>(*store, in);
|
2018-08-03 22:10:03 +03:00
|
|
|
in >> info.registrationTime >> info.narSize >> info.ultimate;
|
|
|
|
info.sigs = readStrings<StringSet>(in);
|
|
|
|
in >> info.ca;
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
if (info.narSize == 0)
|
2019-08-12 18:19:43 +03:00
|
|
|
throw Error("narInfo is too old and missing the narSize field");
|
|
|
|
|
|
|
|
SizedSource sizedSource(in, info.narSize);
|
|
|
|
|
|
|
|
store->addToStore(info, sizedSource, NoRepair, NoCheckSigs);
|
|
|
|
|
|
|
|
// consume all the data that has been sent before continuing.
|
|
|
|
sizedSource.drainAll();
|
2018-08-03 22:10:03 +03:00
|
|
|
|
|
|
|
out << 1; // indicate success
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2014-07-10 12:51:22 +03:00
|
|
|
default:
|
|
|
|
throw Error(format("unknown serve command %1%") % cmd);
|
|
|
|
}
|
2014-07-11 17:02:19 +03:00
|
|
|
|
|
|
|
out.flush();
|
2014-02-10 14:43:13 +02:00
|
|
|
}
|
2014-02-06 18:52:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-02-04 17:43:32 +02:00
|
|
|
static void opGenerateBinaryCacheKey(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
2015-07-17 20:24:28 +03:00
|
|
|
for (auto & i : opFlags)
|
2017-07-30 14:27:57 +03:00
|
|
|
throw UsageError(format("unknown flag '%1%'") % i);
|
2015-02-04 17:43:32 +02:00
|
|
|
|
2015-02-18 12:19:44 +02:00
|
|
|
if (opArgs.size() != 3) throw UsageError("three arguments expected");
|
|
|
|
auto i = opArgs.begin();
|
|
|
|
string keyName = *i++;
|
|
|
|
string secretKeyFile = *i++;
|
|
|
|
string publicKeyFile = *i++;
|
2015-02-04 17:43:32 +02:00
|
|
|
|
2015-02-10 12:54:06 +02:00
|
|
|
#if HAVE_SODIUM
|
2015-12-22 18:14:04 +02:00
|
|
|
if (sodium_init() == -1)
|
|
|
|
throw Error("could not initialise libsodium");
|
2015-02-04 17:43:32 +02:00
|
|
|
|
|
|
|
unsigned char pk[crypto_sign_PUBLICKEYBYTES];
|
|
|
|
unsigned char sk[crypto_sign_SECRETKEYBYTES];
|
|
|
|
if (crypto_sign_keypair(pk, sk) != 0)
|
|
|
|
throw Error("key generation failed");
|
|
|
|
|
2015-02-18 12:19:44 +02:00
|
|
|
writeFile(publicKeyFile, keyName + ":" + base64Encode(string((char *) pk, crypto_sign_PUBLICKEYBYTES)));
|
|
|
|
umask(0077);
|
|
|
|
writeFile(secretKeyFile, keyName + ":" + base64Encode(string((char *) sk, crypto_sign_SECRETKEYBYTES)));
|
2015-02-10 12:54:06 +02:00
|
|
|
#else
|
|
|
|
throw Error("Nix was not compiled with libsodium, required for signed binary cache support");
|
|
|
|
#endif
|
2015-02-04 17:43:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-23 15:19:49 +03:00
|
|
|
static void opVersion(Strings opFlags, Strings opArgs)
|
|
|
|
{
|
|
|
|
printVersion("nix-store");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-07-04 18:42:03 +03:00
|
|
|
/* Scan the arguments; find the operation, set global flags, put all
|
|
|
|
other flags in a list, and put all other arguments in another
|
|
|
|
list. */
|
2018-10-26 12:35:46 +03:00
|
|
|
static int _main(int argc, char * * argv)
|
2003-03-24 19:49:56 +02:00
|
|
|
{
|
2018-10-26 12:35:46 +03:00
|
|
|
{
|
2014-08-13 04:50:44 +03:00
|
|
|
Strings opFlags, opArgs;
|
|
|
|
Operation op = 0;
|
|
|
|
|
|
|
|
parseCmdLine(argc, argv, [&](Strings::iterator & arg, const Strings::iterator & end) {
|
|
|
|
Operation oldOp = op;
|
|
|
|
|
|
|
|
if (*arg == "--help")
|
|
|
|
showManPage("nix-store");
|
|
|
|
else if (*arg == "--version")
|
2015-07-23 15:19:49 +03:00
|
|
|
op = opVersion;
|
2014-08-13 04:50:44 +03:00
|
|
|
else if (*arg == "--realise" || *arg == "--realize" || *arg == "-r")
|
|
|
|
op = opRealise;
|
|
|
|
else if (*arg == "--add" || *arg == "-A")
|
|
|
|
op = opAdd;
|
|
|
|
else if (*arg == "--add-fixed")
|
|
|
|
op = opAddFixed;
|
|
|
|
else if (*arg == "--print-fixed-path")
|
|
|
|
op = opPrintFixedPath;
|
|
|
|
else if (*arg == "--delete")
|
|
|
|
op = opDelete;
|
|
|
|
else if (*arg == "--query" || *arg == "-q")
|
|
|
|
op = opQuery;
|
|
|
|
else if (*arg == "--print-env")
|
|
|
|
op = opPrintEnv;
|
|
|
|
else if (*arg == "--read-log" || *arg == "-l")
|
|
|
|
op = opReadLog;
|
|
|
|
else if (*arg == "--dump-db")
|
|
|
|
op = opDumpDB;
|
|
|
|
else if (*arg == "--load-db")
|
|
|
|
op = opLoadDB;
|
|
|
|
else if (*arg == "--register-validity")
|
|
|
|
op = opRegisterValidity;
|
|
|
|
else if (*arg == "--check-validity")
|
|
|
|
op = opCheckValidity;
|
|
|
|
else if (*arg == "--gc")
|
|
|
|
op = opGC;
|
|
|
|
else if (*arg == "--dump")
|
|
|
|
op = opDump;
|
|
|
|
else if (*arg == "--restore")
|
|
|
|
op = opRestore;
|
|
|
|
else if (*arg == "--export")
|
|
|
|
op = opExport;
|
|
|
|
else if (*arg == "--import")
|
|
|
|
op = opImport;
|
|
|
|
else if (*arg == "--init")
|
|
|
|
op = opInit;
|
|
|
|
else if (*arg == "--verify")
|
|
|
|
op = opVerify;
|
|
|
|
else if (*arg == "--verify-path")
|
|
|
|
op = opVerifyPath;
|
|
|
|
else if (*arg == "--repair-path")
|
|
|
|
op = opRepairPath;
|
|
|
|
else if (*arg == "--optimise" || *arg == "--optimize")
|
|
|
|
op = opOptimise;
|
2015-02-04 17:43:32 +02:00
|
|
|
else if (*arg == "--serve")
|
|
|
|
op = opServe;
|
|
|
|
else if (*arg == "--generate-binary-cache-key")
|
|
|
|
op = opGenerateBinaryCacheKey;
|
2014-08-13 04:50:44 +03:00
|
|
|
else if (*arg == "--add-root")
|
|
|
|
gcRoot = absPath(getArg(*arg, arg, end));
|
|
|
|
else if (*arg == "--indirect")
|
|
|
|
indirectRoot = true;
|
|
|
|
else if (*arg == "--no-output")
|
|
|
|
noOutput = true;
|
|
|
|
else if (*arg != "" && arg->at(0) == '-') {
|
|
|
|
opFlags.push_back(*arg);
|
|
|
|
if (*arg == "--max-freed" || *arg == "--max-links" || *arg == "--max-atime") /* !!! hack */
|
|
|
|
opFlags.push_back(getArg(*arg, arg, end));
|
2008-06-18 17:20:16 +03:00
|
|
|
}
|
2014-08-13 04:50:44 +03:00
|
|
|
else
|
|
|
|
opArgs.push_back(*arg);
|
2003-05-26 01:42:19 +03:00
|
|
|
|
2014-08-13 04:50:44 +03:00
|
|
|
if (oldOp && oldOp != op)
|
|
|
|
throw UsageError("only one operation may be specified");
|
2003-03-20 18:53:00 +02:00
|
|
|
|
2014-08-13 04:50:44 +03:00
|
|
|
return true;
|
|
|
|
});
|
2003-10-14 18:33:00 +03:00
|
|
|
|
2018-02-08 18:26:18 +02:00
|
|
|
initPlugins();
|
|
|
|
|
2014-08-13 04:50:44 +03:00
|
|
|
if (!op) throw UsageError("no operation specified");
|
2003-03-14 18:43:14 +02:00
|
|
|
|
2014-08-13 04:50:44 +03:00
|
|
|
if (op != opDump && op != opRestore) /* !!! hack */
|
2016-02-24 18:33:53 +02:00
|
|
|
store = openStore();
|
2003-03-24 19:49:56 +02:00
|
|
|
|
2014-08-13 04:50:44 +03:00
|
|
|
op(opFlags, opArgs);
|
2018-10-26 12:35:46 +03:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2014-08-13 04:50:44 +03:00
|
|
|
}
|
2018-10-26 12:35:46 +03:00
|
|
|
|
|
|
|
static RegisterLegacyCommand s1("nix-store", _main);
|