2012-07-18 21:59:03 +03:00
|
|
|
|
#pragma once
|
2023-04-01 06:18:41 +03:00
|
|
|
|
///@file
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2016-03-30 14:27:25 +03:00
|
|
|
|
#include "sqlite.hh"
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2016-03-30 14:27:25 +03:00
|
|
|
|
#include "pathlocks.hh"
|
2006-11-30 19:43:04 +02:00
|
|
|
|
#include "store-api.hh"
|
2023-03-23 16:06:45 +02:00
|
|
|
|
#include "indirect-root-store.hh"
|
2016-04-08 19:07:13 +03:00
|
|
|
|
#include "sync.hh"
|
2010-02-18 15:16:59 +02:00
|
|
|
|
|
2017-09-05 21:43:42 +03:00
|
|
|
|
#include <chrono>
|
|
|
|
|
#include <future>
|
2016-04-08 19:07:13 +03:00
|
|
|
|
#include <string>
|
|
|
|
|
#include <unordered_set>
|
|
|
|
|
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Nix store and database schema version.
|
|
|
|
|
*
|
|
|
|
|
* Version 1 (or 0) was Nix <=
|
|
|
|
|
* 0.7. Version 2 was Nix 0.8 and 0.9. Version 3 is Nix 0.10.
|
|
|
|
|
* Version 4 is Nix 0.11. Version 5 is Nix 0.12-0.16. Version 6 is
|
|
|
|
|
* Nix 1.0. Version 7 is Nix 1.3. Version 10 is 2.0.
|
|
|
|
|
*/
|
2016-08-03 14:17:11 +03:00
|
|
|
|
const int nixSchemaVersion = 10;
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
|
|
|
|
|
2007-10-10 01:14:27 +03:00
|
|
|
|
struct OptimiseStats
|
|
|
|
|
{
|
2017-04-10 12:12:45 +03:00
|
|
|
|
unsigned long filesLinked = 0;
|
2020-07-30 14:10:49 +03:00
|
|
|
|
uint64_t bytesFreed = 0;
|
2007-10-10 01:14:27 +03:00
|
|
|
|
};
|
|
|
|
|
|
2020-09-11 12:06:18 +03:00
|
|
|
|
struct LocalStoreConfig : virtual LocalFSStoreConfig
|
|
|
|
|
{
|
|
|
|
|
using LocalFSStoreConfig::LocalFSStoreConfig;
|
|
|
|
|
|
2024-07-18 06:32:27 +03:00
|
|
|
|
LocalStoreConfig(
|
|
|
|
|
std::string_view scheme,
|
|
|
|
|
std::string_view authority,
|
|
|
|
|
const Params & params);
|
|
|
|
|
|
2023-10-31 00:12:37 +02:00
|
|
|
|
Setting<bool> requireSigs{this,
|
2020-09-11 12:06:18 +03:00
|
|
|
|
settings.requireSigs,
|
2023-03-22 15:23:36 +02:00
|
|
|
|
"require-sigs",
|
|
|
|
|
"Whether store paths copied into this store should have a trusted signature."};
|
2020-09-14 15:04:02 +03:00
|
|
|
|
|
2023-10-31 00:12:37 +02:00
|
|
|
|
Setting<bool> readOnly{this,
|
2023-05-16 15:14:58 +03:00
|
|
|
|
false,
|
|
|
|
|
"read-only",
|
2023-05-17 10:49:51 +03:00
|
|
|
|
R"(
|
2023-06-15 15:32:56 +03:00
|
|
|
|
Allow this store to be opened when its [database](@docroot@/glossary.md#gloss-nix-database) is on a read-only filesystem.
|
2023-05-17 10:49:51 +03:00
|
|
|
|
|
2023-06-19 15:22:41 +03:00
|
|
|
|
Normally Nix will attempt to open the store database in read-write mode, even for querying (when write access is not needed), causing it to fail if the database is on a read-only filesystem.
|
2023-05-17 10:49:51 +03:00
|
|
|
|
|
2023-06-15 15:36:28 +03:00
|
|
|
|
Enable read-only mode to disable locking and open the SQLite database with the [`immutable` parameter](https://www.sqlite.org/c3ref/open.html) set.
|
|
|
|
|
|
2023-06-19 16:07:31 +03:00
|
|
|
|
> **Warning**
|
|
|
|
|
> Do not use this unless the filesystem is read-only.
|
|
|
|
|
>
|
|
|
|
|
> Using it when the filesystem is writable can cause incorrect query results or corruption errors if the database is changed by another process.
|
|
|
|
|
> While the filesystem the database resides on might appear to be read-only, consider whether another user or system might have write access to it.
|
2023-05-17 10:49:51 +03:00
|
|
|
|
)"};
|
2023-05-16 15:14:58 +03:00
|
|
|
|
|
2020-09-14 15:04:02 +03:00
|
|
|
|
const std::string name() override { return "Local Store"; }
|
2007-10-10 01:14:27 +03:00
|
|
|
|
|
2024-07-16 06:26:39 +03:00
|
|
|
|
static std::set<std::string> uriSchemes()
|
|
|
|
|
{ return {"local"}; }
|
|
|
|
|
|
2023-03-21 15:03:05 +02:00
|
|
|
|
std::string doc() override;
|
|
|
|
|
};
|
2007-10-10 01:14:27 +03:00
|
|
|
|
|
2023-03-23 16:06:45 +02:00
|
|
|
|
class LocalStore : public virtual LocalStoreConfig
|
|
|
|
|
, public virtual IndirectRootStore
|
|
|
|
|
, public virtual GcStore
|
2006-11-30 19:43:04 +02:00
|
|
|
|
{
|
2007-08-12 03:29:28 +03:00
|
|
|
|
private:
|
2012-07-23 22:02:52 +03:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Lock file used for upgrading.
|
|
|
|
|
*/
|
2016-04-08 19:07:13 +03:00
|
|
|
|
AutoCloseFD globalLock;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2016-04-08 19:07:13 +03:00
|
|
|
|
struct State
|
|
|
|
|
{
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* The SQLite database object.
|
|
|
|
|
*/
|
2016-04-08 19:07:13 +03:00
|
|
|
|
SQLite db;
|
|
|
|
|
|
2020-12-08 07:57:31 +02:00
|
|
|
|
struct Stmts;
|
|
|
|
|
std::unique_ptr<Stmts> stmts;
|
2016-04-08 19:07:13 +03:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* The last time we checked whether to do an auto-GC, or an
|
|
|
|
|
* auto-GC finished.
|
|
|
|
|
*/
|
2017-09-05 21:43:42 +03:00
|
|
|
|
std::chrono::time_point<std::chrono::steady_clock> lastGCCheck;
|
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Whether auto-GC is running. If so, get gcFuture to wait for
|
|
|
|
|
* the GC to finish.
|
|
|
|
|
*/
|
2017-09-05 21:43:42 +03:00
|
|
|
|
bool gcRunning = false;
|
|
|
|
|
std::shared_future<void> gcFuture;
|
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* How much disk space was available after the previous
|
|
|
|
|
* auto-GC. If the current available disk space is below
|
|
|
|
|
* minFree but not much below availAfterGC, then there is no
|
|
|
|
|
* point in starting a new GC.
|
|
|
|
|
*/
|
2017-09-05 21:43:42 +03:00
|
|
|
|
uint64_t availAfterGC = std::numeric_limits<uint64_t>::max();
|
2018-04-13 16:42:35 +03:00
|
|
|
|
|
|
|
|
|
std::unique_ptr<PublicKeys> publicKeys;
|
2016-04-08 19:07:13 +03:00
|
|
|
|
};
|
|
|
|
|
|
2020-11-03 13:52:57 +02:00
|
|
|
|
Sync<State> _state;
|
2016-04-08 19:07:13 +03:00
|
|
|
|
|
2016-06-02 17:51:43 +03:00
|
|
|
|
public:
|
|
|
|
|
|
2016-06-02 14:33:49 +03:00
|
|
|
|
const Path dbDir;
|
2016-04-08 19:07:13 +03:00
|
|
|
|
const Path linksDir;
|
|
|
|
|
const Path reservedPath;
|
|
|
|
|
const Path schemaPath;
|
2017-09-05 21:39:57 +03:00
|
|
|
|
const Path tempRootsDir;
|
|
|
|
|
const Path fnTempRoots;
|
2016-02-24 18:33:53 +02:00
|
|
|
|
|
2016-06-02 17:51:43 +03:00
|
|
|
|
private:
|
|
|
|
|
|
2018-04-13 16:42:35 +03:00
|
|
|
|
const PublicKeys & getPublicKeys();
|
2016-05-30 14:55:09 +03:00
|
|
|
|
|
2006-11-30 19:43:04 +02:00
|
|
|
|
public:
|
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Hack for build-remote.cc.
|
|
|
|
|
*/
|
2019-11-22 17:06:44 +02:00
|
|
|
|
PathSet locksHeld;
|
2018-02-12 23:48:55 +02:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Initialise the local store, upgrading the schema if
|
|
|
|
|
* necessary.
|
|
|
|
|
*/
|
2016-06-01 15:49:12 +03:00
|
|
|
|
LocalStore(const Params & params);
|
2024-01-25 17:31:52 +02:00
|
|
|
|
LocalStore(
|
|
|
|
|
std::string_view scheme,
|
|
|
|
|
PathView path,
|
|
|
|
|
const Params & params);
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
|
|
|
|
~LocalStore();
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Implementations of abstract store API methods.
|
|
|
|
|
*/
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2016-04-29 17:26:16 +03:00
|
|
|
|
std::string getUri() override;
|
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
bool isValidPathUncached(const StorePath & path) override;
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
StorePathSet queryValidPaths(const StorePathSet & paths,
|
2017-06-28 19:11:01 +03:00
|
|
|
|
SubstituteFlag maybeSubstitute = NoSubstitute) override;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
StorePathSet queryAllValidPaths() override;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
void queryPathInfoUncached(const StorePath & path,
|
2018-09-25 19:54:16 +03:00
|
|
|
|
Callback<std::shared_ptr<const ValidPathInfo>> callback) noexcept override;
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
void queryReferrers(const StorePath & path, StorePathSet & referrers) override;
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
StorePathSet queryValidDerivers(const StorePath & path) override;
|
2010-02-22 14:44:36 +02:00
|
|
|
|
|
2023-07-19 21:52:35 +03:00
|
|
|
|
std::map<std::string, std::optional<StorePath>> queryStaticPartialDerivationOutputMap(const StorePath & path) override;
|
2011-11-06 08:28:20 +02:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
std::optional<StorePath> queryPathFromHashPart(const std::string & hashPart) override;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
StorePathSet querySubstitutablePaths(const StorePathSet & paths) override;
|
2008-08-02 15:54:35 +03:00
|
|
|
|
|
2021-03-08 16:07:33 +02:00
|
|
|
|
bool pathInfoIsUntrusted(const ValidPathInfo &) override;
|
2021-03-08 12:56:33 +02:00
|
|
|
|
bool realisationIsUntrusted(const Realisation & ) override;
|
2021-01-15 18:37:41 +02:00
|
|
|
|
|
2018-03-16 21:22:34 +02:00
|
|
|
|
void addToStore(const ValidPathInfo & info, Source & source,
|
2020-07-13 18:37:44 +03:00
|
|
|
|
RepairFlag repair, CheckSigsFlag checkSigs) override;
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2023-11-04 22:25:41 +02:00
|
|
|
|
StorePath addToStoreFromDump(
|
|
|
|
|
Source & dump,
|
2022-02-25 17:00:00 +02:00
|
|
|
|
std::string_view name,
|
2024-01-19 06:57:26 +02:00
|
|
|
|
FileSerialisationMethod dumpMethod,
|
|
|
|
|
ContentAddressMethod hashMethod,
|
2023-11-04 22:25:41 +02:00
|
|
|
|
HashAlgorithm hashAlgo,
|
2022-02-25 17:00:00 +02:00
|
|
|
|
const StorePathSet & references,
|
|
|
|
|
RepairFlag repair) override;
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
void addTempRoot(const StorePath & path) override;
|
2006-12-02 18:41:36 +02:00
|
|
|
|
|
2023-01-03 15:51:23 +02:00
|
|
|
|
private:
|
|
|
|
|
|
|
|
|
|
void createTempRootsFile();
|
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* The file to which we write our temporary roots.
|
|
|
|
|
*/
|
2023-01-03 15:51:23 +02:00
|
|
|
|
Sync<AutoCloseFD> _fdTempRoots;
|
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* The global GC lock.
|
|
|
|
|
*/
|
2023-01-03 16:15:14 +02:00
|
|
|
|
Sync<AutoCloseFD> _fdGCLock;
|
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Connection to the garbage collector.
|
|
|
|
|
*/
|
2023-01-03 16:15:14 +02:00
|
|
|
|
Sync<AutoCloseFD> _fdRootsSocket;
|
|
|
|
|
|
2023-01-03 15:51:23 +02:00
|
|
|
|
public:
|
|
|
|
|
|
2023-03-23 16:06:45 +02:00
|
|
|
|
/**
|
|
|
|
|
* Implementation of IndirectRootStore::addIndirectRoot().
|
|
|
|
|
*
|
|
|
|
|
* The weak reference merely is a symlink to `path' from
|
|
|
|
|
* /nix/var/nix/gcroots/auto/<hash of `path'>.
|
|
|
|
|
*/
|
2015-09-18 02:22:06 +03:00
|
|
|
|
void addIndirectRoot(const Path & path) override;
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2016-06-02 14:33:49 +03:00
|
|
|
|
private:
|
|
|
|
|
|
2021-08-16 21:03:32 +03:00
|
|
|
|
void findTempRoots(Roots & roots, bool censor);
|
2016-06-02 14:33:49 +03:00
|
|
|
|
|
2021-08-19 23:43:43 +03:00
|
|
|
|
AutoCloseFD openGCLock();
|
2016-06-02 14:33:49 +03:00
|
|
|
|
|
|
|
|
|
public:
|
|
|
|
|
|
2019-03-14 14:50:07 +02:00
|
|
|
|
Roots findRoots(bool censor) override;
|
2006-12-05 04:18:46 +02:00
|
|
|
|
|
2015-09-18 02:22:06 +03:00
|
|
|
|
void collectGarbage(const GCOptions & options, GCResults & results) override;
|
2007-10-10 01:14:27 +03:00
|
|
|
|
|
2023-07-26 00:09:23 +03:00
|
|
|
|
/**
|
|
|
|
|
* Called by `collectGarbage` to trace in reverse.
|
|
|
|
|
*
|
|
|
|
|
* Using this rather than `queryReferrers` directly allows us to
|
|
|
|
|
* fine-tune which referrers we consider for garbage collection;
|
|
|
|
|
* some store implementations take advantage of this.
|
|
|
|
|
*/
|
|
|
|
|
virtual void queryGCReferrers(const StorePath & path, StorePathSet & referrers)
|
|
|
|
|
{
|
|
|
|
|
return queryReferrers(path, referrers);
|
|
|
|
|
}
|
|
|
|
|
|
2023-06-06 14:06:32 +03:00
|
|
|
|
/**
|
|
|
|
|
* Called by `collectGarbage` to recursively delete a path.
|
|
|
|
|
* The default implementation simply calls `deletePath`, but it can be
|
|
|
|
|
* overridden by stores that wish to provide their own deletion behaviour.
|
|
|
|
|
*/
|
2023-07-26 15:29:31 +03:00
|
|
|
|
virtual void deleteStorePath(const Path & path, uint64_t & bytesFreed);
|
2023-06-06 14:06:32 +03:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Optimise the disk space usage of the Nix store by hard-linking
|
|
|
|
|
* files with the same contents.
|
|
|
|
|
*/
|
2012-07-23 19:08:34 +03:00
|
|
|
|
void optimiseStore(OptimiseStats & stats);
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2015-09-18 02:22:06 +03:00
|
|
|
|
void optimiseStore() override;
|
2014-09-01 23:21:42 +03:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Optimise a single store path. Optionally, test the encountered
|
|
|
|
|
* symlinks for corruption.
|
|
|
|
|
*/
|
2022-01-11 14:34:57 +02:00
|
|
|
|
void optimisePath(const Path & path, RepairFlag repair);
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2017-06-28 19:11:01 +03:00
|
|
|
|
bool verifyStore(bool checkContents, RepairFlag repair) override;
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2023-12-11 20:28:40 +02:00
|
|
|
|
protected:
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Result of `verifyAllValidPaths`
|
|
|
|
|
*/
|
|
|
|
|
struct VerificationResult {
|
|
|
|
|
/**
|
|
|
|
|
* Whether any errors were encountered
|
|
|
|
|
*/
|
|
|
|
|
bool errors;
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* A set of so-far valid paths. The store objects pointed to by
|
|
|
|
|
* those paths are suitable for further validation checking.
|
|
|
|
|
*/
|
|
|
|
|
StorePathSet validPaths;
|
|
|
|
|
};
|
|
|
|
|
|
2023-08-02 21:38:22 +03:00
|
|
|
|
/**
|
2023-12-11 20:28:40 +02:00
|
|
|
|
* First, unconditional step of `verifyStore`
|
2023-08-02 21:38:22 +03:00
|
|
|
|
*/
|
2023-12-11 20:28:40 +02:00
|
|
|
|
virtual VerificationResult verifyAllValidPaths(RepairFlag repair);
|
|
|
|
|
|
|
|
|
|
public:
|
2023-07-28 12:11:45 +03:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Register the validity of a path, i.e., that `path` exists, that
|
|
|
|
|
* the paths referenced by it exists, and in the case of an output
|
|
|
|
|
* path of a derivation, that it has been produced by a successful
|
|
|
|
|
* execution of the derivation (or something equivalent). Also
|
|
|
|
|
* register the hash of the file system contents of the path. The
|
|
|
|
|
* hash must be a SHA-256 hash.
|
|
|
|
|
*/
|
2010-11-16 19:11:46 +02:00
|
|
|
|
void registerValidPath(const ValidPathInfo & info);
|
2006-11-30 19:43:04 +02:00
|
|
|
|
|
2023-05-09 17:22:38 +03:00
|
|
|
|
virtual void registerValidPaths(const ValidPathInfos & infos);
|
2008-06-09 16:52:45 +03:00
|
|
|
|
|
2018-08-31 00:28:47 +03:00
|
|
|
|
unsigned int getProtocol() override;
|
|
|
|
|
|
2022-12-26 22:21:08 +02:00
|
|
|
|
std::optional<TrustedFlag> isTrustedClient() override;
|
|
|
|
|
|
2012-09-13 21:33:41 +03:00
|
|
|
|
void vacuumDB();
|
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
void addSignatures(const StorePath & storePath, const StringSet & sigs) override;
|
2016-04-05 16:30:22 +03:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* If free disk space in /nix/store if below minFree, delete
|
|
|
|
|
* garbage until it exceeds maxFree.
|
|
|
|
|
*/
|
2017-09-05 21:43:42 +03:00
|
|
|
|
void autoGC(bool sync = true);
|
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Register the store path 'output' as the output named 'outputName' of
|
|
|
|
|
* derivation 'deriver'.
|
|
|
|
|
*/
|
2020-10-20 16:14:02 +03:00
|
|
|
|
void registerDrvOutput(const Realisation & info) override;
|
2021-03-08 17:43:11 +02:00
|
|
|
|
void registerDrvOutput(const Realisation & info, CheckSigsFlag checkSigs) override;
|
2022-02-25 17:00:00 +02:00
|
|
|
|
void cacheDrvOutputMapping(
|
|
|
|
|
State & state,
|
|
|
|
|
const uint64_t deriver,
|
|
|
|
|
const std::string & outputName,
|
|
|
|
|
const StorePath & output);
|
2020-10-08 18:36:51 +03:00
|
|
|
|
|
2021-05-19 17:19:46 +03:00
|
|
|
|
std::optional<const Realisation> queryRealisation_(State & state, const DrvOutput & id);
|
|
|
|
|
std::optional<std::pair<int64_t, Realisation>> queryRealisationCore_(State & state, const DrvOutput & id);
|
2021-10-27 12:36:51 +03:00
|
|
|
|
void queryRealisationUncached(const DrvOutput&,
|
|
|
|
|
Callback<std::shared_ptr<const Realisation>> callback) noexcept override;
|
2020-10-08 18:36:51 +03:00
|
|
|
|
|
2022-01-25 22:14:27 +02:00
|
|
|
|
std::optional<std::string> getVersion() override;
|
2020-10-08 18:36:51 +03:00
|
|
|
|
|
2023-07-28 12:59:16 +03:00
|
|
|
|
protected:
|
|
|
|
|
|
|
|
|
|
void verifyPath(const StorePath & path, std::function<bool(const StorePath &)> existsInStoreDir,
|
|
|
|
|
StorePathSet & done, StorePathSet & validPaths, RepairFlag repair, bool & errors);
|
|
|
|
|
|
2016-01-31 11:19:14 +02:00
|
|
|
|
private:
|
|
|
|
|
|
2023-06-15 15:31:37 +03:00
|
|
|
|
/**
|
|
|
|
|
* Retrieve the current version of the database schema.
|
|
|
|
|
* If the database does not exist yet, the version returned will be 0.
|
|
|
|
|
*/
|
2016-04-08 19:07:13 +03:00
|
|
|
|
int getSchema();
|
2010-02-24 17:07:23 +02:00
|
|
|
|
|
2016-04-08 19:07:13 +03:00
|
|
|
|
void openDB(State & state, bool create);
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2016-04-08 19:07:13 +03:00
|
|
|
|
void makeStoreWritable();
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
uint64_t queryValidPathId(State & state, const StorePath & path);
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2016-04-08 19:07:13 +03:00
|
|
|
|
uint64_t addValidPath(State & state, const ValidPathInfo & info, bool checkOutputs = true);
|
2008-06-09 16:52:45 +03:00
|
|
|
|
|
2019-12-05 20:11:09 +02:00
|
|
|
|
void invalidatePath(State & state, const StorePath & path);
|
2010-02-18 17:11:08 +02:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Delete a path from the Nix store.
|
|
|
|
|
*/
|
2019-12-05 20:11:09 +02:00
|
|
|
|
void invalidatePathChecked(const StorePath & path);
|
2012-07-31 02:55:41 +03:00
|
|
|
|
|
2021-01-05 12:47:29 +02:00
|
|
|
|
std::shared_ptr<const ValidPathInfo> queryPathInfoInternal(State & state, const StorePath & path);
|
|
|
|
|
|
2016-04-08 19:07:13 +03:00
|
|
|
|
void updatePathInfo(State & state, const ValidPathInfo & info);
|
2010-12-06 17:29:38 +02:00
|
|
|
|
|
2010-02-18 17:11:08 +02:00
|
|
|
|
PathSet queryValidPathsOld();
|
|
|
|
|
ValidPathInfo queryPathInfoOld(const Path & path);
|
2008-06-09 16:52:45 +03:00
|
|
|
|
|
2024-05-07 07:14:49 +03:00
|
|
|
|
void findRoots(const Path & path, std::filesystem::file_type type, Roots & roots);
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
|
|
2019-03-14 14:50:07 +02:00
|
|
|
|
void findRootsNoTemp(Roots & roots, bool censor);
|
2017-09-14 15:38:36 +03:00
|
|
|
|
|
2019-03-14 14:50:07 +02:00
|
|
|
|
void findRuntimeRoots(Roots & roots, bool censor);
|
Eliminate the "store" global variable
Also, move a few free-standing functions into StoreAPI and Derivation.
Also, introduce a non-nullable smart pointer, ref<T>, which is just a
wrapper around std::shared_ptr ensuring that the pointer is never
null. (For reference-counted values, this is better than passing a
"T&", because the latter doesn't maintain the refcount. Usually, the
caller will have a shared_ptr keeping the value alive, but that's not
always the case, e.g., when passing a reference to a std::thread via
std::bind.)
2016-02-04 15:28:26 +02:00
|
|
|
|
|
2024-05-08 01:28:50 +03:00
|
|
|
|
std::pair<std::filesystem::path, AutoCloseFD> createTempDirInStore();
|
2011-07-20 21:10:47 +03:00
|
|
|
|
|
2014-05-26 18:53:17 +03:00
|
|
|
|
typedef std::unordered_set<ino_t> InodeHash;
|
2014-05-14 00:10:06 +03:00
|
|
|
|
|
2014-05-14 23:52:10 +03:00
|
|
|
|
InodeHash loadInodeHash();
|
2014-05-15 12:33:46 +03:00
|
|
|
|
Strings readDirectoryIgnoringInodes(const Path & path, const InodeHash & inodeHash);
|
2022-01-11 14:34:57 +02:00
|
|
|
|
void optimisePath_(Activity * act, OptimiseStats & stats, const Path & path, InodeHash & inodeHash, RepairFlag repair);
|
2013-10-16 16:58:20 +03:00
|
|
|
|
|
|
|
|
|
// Internal versions that are not wrapped in retry_sqlite.
|
2019-12-05 20:11:09 +02:00
|
|
|
|
bool isValidPath_(State & state, const StorePath & path);
|
|
|
|
|
void queryReferrers(State & state, const StorePath & path, StorePathSet & referrers);
|
2016-04-07 15:14:06 +03:00
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
|
/**
|
|
|
|
|
* Add signatures to a ValidPathInfo or Realisation using the secret keys
|
|
|
|
|
* specified by the ‘secret-key-files’ option.
|
|
|
|
|
*/
|
2016-04-07 15:14:06 +03:00
|
|
|
|
void signPathInfo(ValidPathInfo & info);
|
2021-03-08 12:56:33 +02:00
|
|
|
|
void signRealisation(Realisation &);
|
2020-08-07 22:09:26 +03:00
|
|
|
|
|
2022-01-17 20:45:21 +02:00
|
|
|
|
void addBuildLog(const StorePath & drvPath, std::string_view log) override;
|
|
|
|
|
|
2021-02-26 17:20:33 +02:00
|
|
|
|
friend struct LocalDerivationGoal;
|
2020-11-09 14:47:06 +02:00
|
|
|
|
friend struct PathSubstitutionGoal;
|
2020-12-01 15:57:56 +02:00
|
|
|
|
friend struct SubstitutionGoal;
|
2020-11-09 14:47:06 +02:00
|
|
|
|
friend struct DerivationGoal;
|
2008-06-09 16:52:45 +03:00
|
|
|
|
};
|
|
|
|
|
|
2006-11-30 19:43:04 +02:00
|
|
|
|
}
|