2005-01-19 23:55:02 +02:00
|
|
|
#! @perl@ -w -I@libexecdir@/nix
|
2003-07-10 16:41:28 +03:00
|
|
|
|
2003-10-16 16:13:39 +03:00
|
|
|
use strict;
|
|
|
|
use POSIX qw(tmpnam);
|
2004-12-28 23:11:28 +02:00
|
|
|
use readmanifest;
|
2003-10-16 16:13:39 +03:00
|
|
|
|
|
|
|
my $tmpdir;
|
|
|
|
do { $tmpdir = tmpnam(); }
|
|
|
|
until mkdir $tmpdir, 0777;
|
|
|
|
|
2003-11-22 22:39:51 +02:00
|
|
|
my $nixfile = "$tmpdir/create-nars.nix";
|
2003-10-16 16:13:39 +03:00
|
|
|
my $manifest = "$tmpdir/MANIFEST";
|
|
|
|
|
2003-12-01 18:34:35 +02:00
|
|
|
END { unlink $manifest; unlink $nixfile; rmdir $tmpdir; }
|
2003-07-10 16:41:28 +03:00
|
|
|
|
2004-04-21 17:54:05 +03:00
|
|
|
my $curl = "@curl@ --fail --silent";
|
|
|
|
my $extraCurlFlags = ${ENV{'CURL_FLAGS'}};
|
|
|
|
$curl = "$curl $extraCurlFlags" if defined $extraCurlFlags;
|
2003-10-16 16:13:39 +03:00
|
|
|
|
2004-01-14 13:13:08 +02:00
|
|
|
|
|
|
|
# Parse the command line.
|
|
|
|
my $archives_put_url = shift @ARGV;
|
|
|
|
my $archives_get_url = shift @ARGV;
|
|
|
|
my $manifest_put_url = shift @ARGV;
|
|
|
|
|
|
|
|
|
|
|
|
# From the given store expressions, determine the requisite store
|
|
|
|
# paths.
|
2004-12-28 23:11:28 +02:00
|
|
|
my %storePaths;
|
2004-01-14 13:13:08 +02:00
|
|
|
|
|
|
|
foreach my $storeexpr (@ARGV) {
|
|
|
|
die unless $storeexpr =~ /^\//;
|
2003-07-10 16:41:28 +03:00
|
|
|
|
|
|
|
# Get all paths referenced by the normalisation of the given
|
2003-10-07 15:27:49 +03:00
|
|
|
# Nix expression.
|
2004-04-06 11:18:51 +03:00
|
|
|
system "@bindir@/nix-store --realise $storeexpr > /dev/null";
|
2003-11-22 22:39:51 +02:00
|
|
|
die if ($?);
|
2003-07-22 00:34:56 +03:00
|
|
|
|
2004-04-06 11:18:51 +03:00
|
|
|
open PATHS, "@bindir@/nix-store --query --requisites --include-successors $storeexpr 2> /dev/null |" or die;
|
2003-07-10 16:41:28 +03:00
|
|
|
while (<PATHS>) {
|
2003-07-10 22:27:46 +03:00
|
|
|
chomp;
|
2003-07-22 00:34:56 +03:00
|
|
|
die "bad: $_" unless /^\//;
|
2004-12-28 23:11:28 +02:00
|
|
|
$storePaths{$_} = "";
|
2003-07-10 16:41:28 +03:00
|
|
|
}
|
|
|
|
close PATHS;
|
2003-12-01 18:34:35 +02:00
|
|
|
}
|
2003-07-10 16:41:28 +03:00
|
|
|
|
2004-12-28 23:11:28 +02:00
|
|
|
my @storePaths = keys %storePaths;
|
2004-01-14 13:13:08 +02:00
|
|
|
|
|
|
|
|
2003-12-01 18:34:35 +02:00
|
|
|
# For each path, create a Nix expression that turns the path into
|
|
|
|
# a Nix archive.
|
|
|
|
open NIX, ">$nixfile";
|
|
|
|
print NIX "[";
|
2003-07-10 16:41:28 +03:00
|
|
|
|
2004-12-28 23:11:28 +02:00
|
|
|
foreach my $storePath (@storePaths) {
|
|
|
|
die unless ($storePath =~ /\/[0-9a-z]{32}.*$/);
|
2003-12-01 18:34:35 +02:00
|
|
|
|
|
|
|
# Construct a Nix expression that creates a Nix archive.
|
|
|
|
my $nixexpr =
|
|
|
|
"((import @datadir@/nix/corepkgs/nar/nar.nix) " .
|
2004-12-28 23:11:28 +02:00
|
|
|
# !!! $storePath should be represented as a closure
|
|
|
|
"{path = \"$storePath\"; system = \"@system@\";}) ";
|
2003-12-01 18:34:35 +02:00
|
|
|
|
|
|
|
print NIX $nixexpr;
|
2003-08-05 15:30:06 +03:00
|
|
|
}
|
2003-07-10 16:41:28 +03:00
|
|
|
|
2003-11-22 22:39:51 +02:00
|
|
|
print NIX "]";
|
|
|
|
close NIX;
|
2003-08-05 15:30:06 +03:00
|
|
|
|
2003-10-16 16:13:39 +03:00
|
|
|
|
2004-01-14 13:13:08 +02:00
|
|
|
# Instantiate store expressions from the Nix expression.
|
|
|
|
my @storeexprs;
|
|
|
|
print STDERR "instantiating store expressions...\n";
|
2004-04-06 11:18:51 +03:00
|
|
|
open STOREEXPRS, "@bindir@/nix-instantiate $nixfile |" or die "cannot run nix-instantiate";
|
2004-01-14 13:13:08 +02:00
|
|
|
while (<STOREEXPRS>) {
|
2003-08-05 15:30:06 +03:00
|
|
|
chomp;
|
2003-10-16 16:13:39 +03:00
|
|
|
die unless /^\//;
|
2004-01-14 13:13:08 +02:00
|
|
|
push @storeexprs, $_;
|
2003-08-05 15:30:06 +03:00
|
|
|
}
|
2004-01-14 13:13:08 +02:00
|
|
|
close STOREEXPRS;
|
2003-07-10 16:41:28 +03:00
|
|
|
|
|
|
|
|
2004-01-14 13:13:08 +02:00
|
|
|
# Realise the store expressions.
|
2003-08-05 15:30:06 +03:00
|
|
|
print STDERR "creating archives...\n";
|
|
|
|
|
2003-10-16 16:13:39 +03:00
|
|
|
my @narpaths;
|
2004-01-14 13:13:08 +02:00
|
|
|
|
|
|
|
my @tmp = @storeexprs;
|
|
|
|
while (scalar @tmp > 0) {
|
|
|
|
my $n = scalar @tmp;
|
|
|
|
if ($n > 256) { $n = 256 };
|
|
|
|
my @tmp2 = @tmp[0..$n - 1];
|
|
|
|
@tmp = @tmp[$n..scalar @tmp - 1];
|
|
|
|
|
* Setuid support for sharing a Nix installation between multiple
users.
If the configure flag `--enable-setuid' is used, the Nix programs
nix-env, nix-store, etc. are installed with the setuid bit turned on
so that they are executed as the user and group specified by
`--with-nix-user=USER' and `--with-nix-group=GROUP', respectively
(with defaults `nix' and `nix').
The setuid programs drop all special privileges if they are executed
by a user who is not a member of the Nix group.
The setuid feature is a quick hack to enable sharing of a Nix
installation between users who trust each other. It is not
generally secure, since any user in the Nix group can modify (by
building an appropriate derivation) any object in the store, and for
instance inject trojans into binaries used by other users.
The setuid programs are owned by root, not the Nix user. This is
because on Unix normal users cannot change the real uid, only the
effective uid. Many programs don't work properly when the real uid
differs from the effective uid. For instance, Perl will turn on
taint mode. However, the setuid programs drop all root privileges
immediately, changing all uids and gids to the Nix user and group.
2004-08-20 17:49:05 +03:00
|
|
|
system "@bindir@/nix-store --realise @tmp2 > /dev/null";
|
2004-01-14 13:13:08 +02:00
|
|
|
if ($?) { die "`nix-store --realise' failed"; }
|
|
|
|
|
2004-04-06 11:18:51 +03:00
|
|
|
open NARPATHS, "@bindir@/nix-store --query --list @tmp2 |" or die "cannot run nix";
|
2004-01-14 13:13:08 +02:00
|
|
|
while (<NARPATHS>) {
|
|
|
|
chomp;
|
|
|
|
die unless (/^\//);
|
|
|
|
push @narpaths, "$_";
|
|
|
|
}
|
|
|
|
close NARPATHS;
|
2003-07-10 16:41:28 +03:00
|
|
|
}
|
2003-10-16 16:13:39 +03:00
|
|
|
|
2004-01-14 13:13:08 +02:00
|
|
|
|
2003-10-16 16:13:39 +03:00
|
|
|
# Create the manifest.
|
|
|
|
print STDERR "creating manifest...\n";
|
|
|
|
|
2004-12-28 23:11:28 +02:00
|
|
|
my %narFiles;
|
|
|
|
my %patches;
|
|
|
|
my %successors;
|
2003-10-16 16:13:39 +03:00
|
|
|
|
2004-01-14 13:13:08 +02:00
|
|
|
my @nararchives;
|
2004-12-28 23:11:28 +02:00
|
|
|
for (my $n = 0; $n < scalar @storePaths; $n++) {
|
|
|
|
my $storePath = $storePaths[$n];
|
2003-10-16 16:13:39 +03:00
|
|
|
my $nardir = $narpaths[$n];
|
|
|
|
|
2004-12-28 23:11:28 +02:00
|
|
|
$storePath =~ /\/([^\/]*)$/;
|
2003-10-16 16:13:39 +03:00
|
|
|
my $basename = $1;
|
|
|
|
defined $basename or die;
|
|
|
|
|
|
|
|
my $narname = "$basename.nar.bz2";
|
|
|
|
|
|
|
|
my $narfile = "$nardir/$narname";
|
2004-12-28 23:11:28 +02:00
|
|
|
(-f $narfile) or die "narfile for $storePath not found";
|
2004-01-14 13:13:08 +02:00
|
|
|
push @nararchives, $narfile;
|
2003-10-16 16:13:39 +03:00
|
|
|
|
2004-12-13 18:56:18 +02:00
|
|
|
open MD5, "$nardir/narbz2-hash" or die "cannot open narbz2-hash";
|
|
|
|
my $narbz2Hash = <MD5>;
|
|
|
|
chomp $narbz2Hash;
|
|
|
|
$narbz2Hash =~ /^[0-9a-z]{32}$/ or die "invalid hash";
|
2003-10-16 16:13:39 +03:00
|
|
|
close MD5;
|
|
|
|
|
2004-12-13 18:56:18 +02:00
|
|
|
open MD5, "$nardir/nar-hash" or die "cannot open nar-hash";
|
|
|
|
my $narHash = <MD5>;
|
|
|
|
chomp $narHash;
|
|
|
|
$narHash =~ /^[0-9a-z]{32}$/ or die "invalid hash";
|
|
|
|
close MD5;
|
|
|
|
|
2004-12-28 23:11:28 +02:00
|
|
|
my $narbz2Size = (stat $narfile)[7];
|
2004-12-13 18:56:18 +02:00
|
|
|
|
2004-12-28 23:11:28 +02:00
|
|
|
$narFiles{$storePath} = [
|
|
|
|
{ url => $archives_get_url/$narname
|
|
|
|
, hash => $narbz2Hash
|
|
|
|
, size => $narbz2Size
|
|
|
|
, narHash => $narHash
|
|
|
|
}
|
|
|
|
];
|
|
|
|
|
|
|
|
if ($storePath =~ /\.store$/) {
|
|
|
|
open PREDS, "@bindir@/nix-store --query --predecessors $storePath |" or die "cannot run nix";
|
2003-11-22 22:39:51 +02:00
|
|
|
while (<PREDS>) {
|
|
|
|
chomp;
|
|
|
|
die unless (/^\//);
|
2004-02-13 12:43:31 +02:00
|
|
|
my $pred = $_;
|
|
|
|
# Only include predecessors that are themselves being
|
|
|
|
# pushed.
|
2004-12-28 23:11:28 +02:00
|
|
|
if (defined $storePaths{$pred}) {
|
|
|
|
$successors{$pred} = $storePath;
|
2004-02-13 12:43:31 +02:00
|
|
|
}
|
2003-11-22 22:39:51 +02:00
|
|
|
}
|
|
|
|
close PREDS;
|
2003-10-16 16:13:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2004-12-28 23:11:28 +02:00
|
|
|
writeManifest $manifest, \%narFiles, \%patches, \%successors;
|
2003-10-16 16:13:39 +03:00
|
|
|
|
2003-07-10 16:41:28 +03:00
|
|
|
|
2004-01-14 13:13:08 +02:00
|
|
|
# Upload the archives.
|
|
|
|
print STDERR "uploading archives...\n";
|
|
|
|
foreach my $nararchive (@nararchives) {
|
|
|
|
|
|
|
|
$nararchive =~ /\/([^\/]*)$/;
|
|
|
|
my $basename = $1;
|
|
|
|
|
|
|
|
if (system("$curl --head $archives_get_url/$basename > /dev/null") != 0) {
|
|
|
|
print STDERR " $nararchive\n";
|
2004-01-14 16:20:33 +02:00
|
|
|
system("$curl --show-error --upload-file " .
|
2004-01-14 13:13:08 +02:00
|
|
|
"'$nararchive' '$archives_put_url/$basename' > /dev/null") == 0 or
|
|
|
|
die "curl failed on $nararchive: $?";
|
|
|
|
}
|
2003-07-10 23:34:29 +03:00
|
|
|
}
|
2004-01-14 13:13:08 +02:00
|
|
|
|
|
|
|
|
|
|
|
# Upload the manifest.
|
|
|
|
print STDERR "uploading manifest...\n";
|
|
|
|
system("$curl --show-error --upload-file " .
|
2004-02-10 18:14:47 +02:00
|
|
|
"'$manifest' '$manifest_put_url' > /dev/null") == 0 or
|
2004-01-14 13:13:08 +02:00
|
|
|
die "curl failed on $manifest: $?";
|