2024-05-28 19:43:04 +03:00
|
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
|
2015-06-01 17:18:23 +03:00
|
|
|
|
source common.sh
|
|
|
|
|
|
2024-06-16 18:56:50 +03:00
|
|
|
|
clearStoreIfPossible
|
2015-06-01 17:18:23 +03:00
|
|
|
|
|
2016-05-30 15:53:57 +03:00
|
|
|
|
rm -rf $TEST_HOME
|
2015-06-02 14:20:43 +03:00
|
|
|
|
|
2015-06-01 17:18:23 +03:00
|
|
|
|
tarroot=$TEST_ROOT/tarball
|
|
|
|
|
rm -rf $tarroot
|
|
|
|
|
mkdir -p $tarroot
|
|
|
|
|
cp dependencies.nix $tarroot/default.nix
|
|
|
|
|
cp config.nix dependencies.builder*.sh $tarroot/
|
2023-08-22 20:29:25 +03:00
|
|
|
|
touch -d '@1000000000' $tarroot $tarroot/*
|
2015-06-01 17:18:23 +03:00
|
|
|
|
|
2020-07-24 19:44:43 +03:00
|
|
|
|
hash=$(nix hash path $tarroot)
|
2020-03-30 17:04:18 +03:00
|
|
|
|
|
2019-12-13 18:26:58 +02:00
|
|
|
|
test_tarball() {
|
|
|
|
|
local ext="$1"
|
|
|
|
|
local compressor="$2"
|
2015-06-01 17:18:23 +03:00
|
|
|
|
|
2019-12-13 18:26:58 +02:00
|
|
|
|
tarball=$TEST_ROOT/tarball.tar$ext
|
2023-10-24 00:46:06 +03:00
|
|
|
|
(cd $TEST_ROOT && GNUTAR_REPRODUCIBLE= tar --mtime=$tarroot/default.nix --owner=0 --group=0 --numeric-owner --sort=name -c -f - tarball) | $compressor > $tarball
|
2015-06-01 17:18:23 +03:00
|
|
|
|
|
2021-12-09 17:26:46 +02:00
|
|
|
|
nix-env -f file://$tarball -qa --out-path | grepQuiet dependencies
|
2015-06-01 17:18:23 +03:00
|
|
|
|
|
2019-12-13 18:26:58 +02:00
|
|
|
|
nix-build -o $TEST_ROOT/result file://$tarball
|
2015-06-01 17:18:23 +03:00
|
|
|
|
|
2019-12-13 18:26:58 +02:00
|
|
|
|
nix-build -o $TEST_ROOT/result '<foo>' -I foo=file://$tarball
|
2016-04-14 16:32:24 +03:00
|
|
|
|
|
2019-12-13 18:26:58 +02:00
|
|
|
|
nix-build -o $TEST_ROOT/result -E "import (fetchTarball file://$tarball)"
|
2022-02-27 16:25:22 +02:00
|
|
|
|
# Do not re-fetch paths already present
|
|
|
|
|
nix-build -o $TEST_ROOT/result -E "import (fetchTarball { url = file:///does-not-exist/must-remain-unused/$tarball; sha256 = \"$hash\"; })"
|
2016-04-14 16:32:24 +03:00
|
|
|
|
|
2020-04-29 23:39:58 +03:00
|
|
|
|
nix-build -o $TEST_ROOT/result -E "import (fetchTree file://$tarball)"
|
|
|
|
|
nix-build -o $TEST_ROOT/result -E "import (fetchTree { type = \"tarball\"; url = file://$tarball; })"
|
|
|
|
|
nix-build -o $TEST_ROOT/result -E "import (fetchTree { type = \"tarball\"; url = file://$tarball; narHash = \"$hash\"; })"
|
2022-02-27 16:25:22 +02:00
|
|
|
|
# Do not re-fetch paths already present
|
|
|
|
|
nix-build -o $TEST_ROOT/result -E "import (fetchTree { type = \"tarball\"; url = file:///does-not-exist/must-remain-unused/$tarball; narHash = \"$hash\"; })"
|
2021-12-09 17:26:46 +02:00
|
|
|
|
expectStderr 102 nix-build -o $TEST_ROOT/result -E "import (fetchTree { type = \"tarball\"; url = file://$tarball; narHash = \"sha256-xdKv2pq/IiwLSnBBJXW8hNowI4MrdZfW+SYqDQs7Tzc=\"; })" | grep 'NAR hash mismatch in input'
|
2020-04-29 23:39:58 +03:00
|
|
|
|
|
2023-08-22 20:29:25 +03:00
|
|
|
|
[[ $(nix eval --impure --expr "(fetchTree file://$tarball).lastModified") = 1000000000 ]]
|
|
|
|
|
|
2020-04-29 23:39:58 +03:00
|
|
|
|
nix-instantiate --strict --eval -E "!((import (fetchTree { type = \"tarball\"; url = file://$tarball; narHash = \"$hash\"; })) ? submodules)" >&2
|
|
|
|
|
nix-instantiate --strict --eval -E "!((import (fetchTree { type = \"tarball\"; url = file://$tarball; narHash = \"$hash\"; })) ? submodules)" 2>&1 | grep 'true'
|
2020-03-30 17:04:18 +03:00
|
|
|
|
|
2024-02-19 14:15:49 +02:00
|
|
|
|
nix-instantiate --eval -E '1 + 2' -I fnord=file:///no-such-tarball.tar$ext
|
|
|
|
|
nix-instantiate --eval -E 'with <fnord/xyzzy>; 1 + 2' -I fnord=file:///no-such-tarball$ext
|
|
|
|
|
(! nix-instantiate --eval -E '<fnord/xyzzy> 1' -I fnord=file:///no-such-tarball$ext)
|
2019-12-13 10:29:33 +02:00
|
|
|
|
|
2024-02-19 14:15:49 +02:00
|
|
|
|
nix-instantiate --eval -E '<fnord/config.nix>' -I fnord=file:///no-such-tarball$ext -I fnord=.
|
2021-07-08 14:29:58 +03:00
|
|
|
|
|
|
|
|
|
# Ensure that the `name` attribute isn’t accepted as that would mess
|
|
|
|
|
# with the content-addressing
|
|
|
|
|
(! nix-instantiate --eval -E "fetchTree { type = \"tarball\"; url = file://$tarball; narHash = \"$hash\"; name = \"foo\"; }")
|
|
|
|
|
|
2024-07-05 18:26:58 +03:00
|
|
|
|
store_path=$(nix store prefetch-file --json "file://$tarball" | jq -r .storePath)
|
|
|
|
|
if ! cmp -s "$store_path" "$tarball"; then
|
|
|
|
|
echo "prefetched tarball differs from original: $store_path vs $tarball" >&2
|
|
|
|
|
exit 1
|
|
|
|
|
fi
|
|
|
|
|
store_path2=$(nix store prefetch-file --json --unpack "file://$tarball" | jq -r .storePath)
|
|
|
|
|
diff_output=$(diff -r "$store_path2" "$tarroot")
|
|
|
|
|
if [ -n "$diff_output" ]; then
|
|
|
|
|
echo "prefetched tarball differs from original: $store_path2 vs $tarroot" >&2
|
|
|
|
|
echo "$diff_output"
|
|
|
|
|
exit 1
|
|
|
|
|
fi
|
2019-12-13 18:26:58 +02:00
|
|
|
|
}
|
2019-12-13 10:29:33 +02:00
|
|
|
|
|
2019-12-13 18:26:58 +02:00
|
|
|
|
test_tarball '' cat
|
|
|
|
|
test_tarball .xz xz
|
|
|
|
|
test_tarball .gz gzip
|
2024-06-11 17:05:57 +03:00
|
|
|
|
|
|
|
|
|
# Test hard links.
|
2024-06-11 20:39:42 +03:00
|
|
|
|
# All entries in tree.tar.gz refer to the same file, and all have the same inode when unpacked by GNU tar.
|
|
|
|
|
# We don't preserve the hard links, because that's an optimization we think is not worth the complexity,
|
|
|
|
|
# so we only make sure that the contents are copied correctly.
|
2024-06-11 17:05:57 +03:00
|
|
|
|
path="$(nix flake prefetch --json "tarball+file://$(pwd)/tree.tar.gz" | jq -r .storePath)"
|
|
|
|
|
[[ $(cat "$path/a/b/foo") = bar ]]
|
|
|
|
|
[[ $(cat "$path/a/b/xyzzy") = bar ]]
|
|
|
|
|
[[ $(cat "$path/a/yyy") = bar ]]
|
|
|
|
|
[[ $(cat "$path/a/zzz") = bar ]]
|
|
|
|
|
[[ $(cat "$path/c/aap") = bar ]]
|
|
|
|
|
[[ $(cat "$path/fnord") = bar ]]
|