2003-06-23 16:27:59 +03:00
|
|
|
#include <iostream>
|
2003-12-22 18:40:46 +02:00
|
|
|
#include <algorithm>
|
2003-06-23 16:27:59 +03:00
|
|
|
|
|
|
|
#include <sys/wait.h>
|
2003-10-15 15:42:39 +03:00
|
|
|
#include <unistd.h>
|
2003-06-23 16:27:59 +03:00
|
|
|
|
2003-07-07 10:43:58 +03:00
|
|
|
#include "store.hh"
|
2003-06-16 16:33:38 +03:00
|
|
|
#include "globals.hh"
|
|
|
|
#include "db.hh"
|
2003-06-23 16:27:59 +03:00
|
|
|
#include "archive.hh"
|
2003-08-04 10:09:36 +03:00
|
|
|
#include "pathlocks.hh"
|
2003-06-23 16:27:59 +03:00
|
|
|
|
|
|
|
|
2003-10-15 15:42:39 +03:00
|
|
|
/* Nix database. */
|
|
|
|
static Database nixDB;
|
|
|
|
|
|
|
|
|
|
|
|
/* Database tables. */
|
|
|
|
|
|
|
|
/* dbValidPaths :: Path -> ()
|
|
|
|
|
|
|
|
The existence of a key $p$ indicates that path $p$ is valid (that
|
|
|
|
is, produced by a succesful build). */
|
2004-10-25 17:38:23 +03:00
|
|
|
static TableId dbValidPaths = 0;
|
2003-10-15 15:42:39 +03:00
|
|
|
|
|
|
|
/* dbSuccessors :: Path -> Path
|
|
|
|
|
|
|
|
Each pair $(p_1, p_2)$ in this mapping records the fact that the
|
|
|
|
Nix expression stored at path $p_1$ has a successor expression
|
|
|
|
stored at path $p_2$.
|
|
|
|
|
|
|
|
Note that a term $y$ is a successor of $x$ iff there exists a
|
|
|
|
sequence of rewrite steps that rewrites $x$ into $y$.
|
|
|
|
*/
|
2004-10-25 17:38:23 +03:00
|
|
|
static TableId dbSuccessors = 0;
|
2003-10-15 15:42:39 +03:00
|
|
|
|
|
|
|
/* dbSuccessorsRev :: Path -> [Path]
|
|
|
|
|
|
|
|
The reverse mapping of dbSuccessors (i.e., it stores the
|
|
|
|
predecessors of a Nix expression).
|
|
|
|
*/
|
2004-10-25 17:38:23 +03:00
|
|
|
static TableId dbSuccessorsRev = 0;
|
2003-10-15 15:42:39 +03:00
|
|
|
|
2004-12-20 15:43:32 +02:00
|
|
|
/* dbSubstitutes :: Path -> [[Path]]
|
2003-10-15 15:42:39 +03:00
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
Each pair $(p, subs)$ tells Nix that it can use any of the
|
2004-12-20 15:43:32 +02:00
|
|
|
substitutes in $subs$ to build path $p$. Each substitute defines a
|
|
|
|
command-line invocation of a program (i.e., the first list element
|
|
|
|
is the full path to the program, the remaining elements are
|
|
|
|
arguments).
|
2003-10-15 15:42:39 +03:00
|
|
|
|
|
|
|
The main purpose of this is for distributed caching of derivates.
|
|
|
|
One system can compute a derivate and put it on a website (as a Nix
|
|
|
|
archive), for instance, and then another system can register a
|
|
|
|
substitute for that derivate. The substitute in this case might be
|
|
|
|
a Nix expression that fetches the Nix archive.
|
|
|
|
*/
|
2004-10-25 17:38:23 +03:00
|
|
|
static TableId dbSubstitutes = 0;
|
2003-10-15 15:42:39 +03:00
|
|
|
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
bool Substitute::operator == (const Substitute & sub)
|
|
|
|
{
|
2004-12-20 15:43:32 +02:00
|
|
|
return program == sub.program
|
2004-06-20 22:17:54 +03:00
|
|
|
&& args == sub.args;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-15 15:42:39 +03:00
|
|
|
void openDB()
|
|
|
|
{
|
2004-10-25 17:38:23 +03:00
|
|
|
if (readOnlyMode) return;
|
|
|
|
try {
|
|
|
|
nixDB.open(nixDBPath);
|
|
|
|
} catch (DbNoPermission & e) {
|
|
|
|
printMsg(lvlTalkative, "cannot access Nix database; continuing anyway");
|
|
|
|
readOnlyMode = true;
|
|
|
|
return;
|
|
|
|
}
|
2003-10-15 15:42:39 +03:00
|
|
|
dbValidPaths = nixDB.openTable("validpaths");
|
|
|
|
dbSuccessors = nixDB.openTable("successors");
|
|
|
|
dbSuccessorsRev = nixDB.openTable("successors-rev");
|
|
|
|
dbSubstitutes = nixDB.openTable("substitutes");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void initDB()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void createStoreTransaction(Transaction & txn)
|
|
|
|
{
|
|
|
|
Transaction txn2(nixDB);
|
|
|
|
txn2.moveTo(txn);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Path copying. */
|
|
|
|
|
2003-06-23 16:27:59 +03:00
|
|
|
struct CopySink : DumpSink
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
virtual void operator () (const unsigned char * data, unsigned int len)
|
|
|
|
{
|
2003-07-21 00:11:43 +03:00
|
|
|
writeFull(fd, data, len);
|
2003-06-23 16:27:59 +03:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
struct CopySource : RestoreSource
|
|
|
|
{
|
|
|
|
int fd;
|
2003-07-21 00:11:43 +03:00
|
|
|
virtual void operator () (unsigned char * data, unsigned int len)
|
2003-06-23 16:27:59 +03:00
|
|
|
{
|
2003-07-21 00:11:43 +03:00
|
|
|
readFull(fd, data, len);
|
2003-06-23 16:27:59 +03:00
|
|
|
}
|
|
|
|
};
|
2003-06-16 16:33:38 +03:00
|
|
|
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
void copyPath(const Path & src, const Path & dst)
|
2003-06-16 16:33:38 +03:00
|
|
|
{
|
2003-07-31 19:05:35 +03:00
|
|
|
debug(format("copying `%1%' to `%2%'") % src % dst);
|
|
|
|
|
2003-06-23 16:27:59 +03:00
|
|
|
/* Unfortunately C++ doesn't support coprocedures, so we have no
|
|
|
|
nice way to chain CopySink and CopySource together. Instead we
|
|
|
|
fork off a child to run the sink. (Fork-less platforms should
|
|
|
|
use a thread). */
|
|
|
|
|
|
|
|
/* Create a pipe. */
|
2004-06-22 12:51:44 +03:00
|
|
|
Pipe pipe;
|
|
|
|
pipe.create();
|
2003-06-23 16:27:59 +03:00
|
|
|
|
|
|
|
/* Fork. */
|
2004-06-22 12:51:44 +03:00
|
|
|
Pid pid;
|
|
|
|
pid = fork();
|
|
|
|
switch (pid) {
|
2003-06-23 16:27:59 +03:00
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0: /* child */
|
|
|
|
try {
|
2004-06-22 12:51:44 +03:00
|
|
|
pipe.writeSide.close();
|
2003-06-23 16:27:59 +03:00
|
|
|
CopySource source;
|
2004-06-22 12:51:44 +03:00
|
|
|
source.fd = pipe.readSide;
|
2003-06-23 16:27:59 +03:00
|
|
|
restorePath(dst, source);
|
|
|
|
_exit(0);
|
2004-01-15 22:23:55 +02:00
|
|
|
} catch (exception & e) {
|
2003-06-23 16:27:59 +03:00
|
|
|
cerr << "error: " << e.what() << endl;
|
|
|
|
}
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Parent. */
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
pipe.readSide.close();
|
|
|
|
|
2003-06-23 16:27:59 +03:00
|
|
|
CopySink sink;
|
2004-06-22 12:51:44 +03:00
|
|
|
sink.fd = pipe.writeSide;
|
2004-09-10 00:12:53 +03:00
|
|
|
{
|
|
|
|
SwitchToOriginalUser sw;
|
|
|
|
dumpPath(src, sink);
|
|
|
|
}
|
2003-06-23 16:27:59 +03:00
|
|
|
|
|
|
|
/* Wait for the child to finish. */
|
2004-06-22 12:51:44 +03:00
|
|
|
int status = pid.wait(true);
|
2004-06-22 14:03:41 +03:00
|
|
|
if (!statusOk(status))
|
2004-06-22 11:50:25 +03:00
|
|
|
throw Error(format("cannot copy `%1% to `%2%': child %3%")
|
|
|
|
% src % dst % statusToString(status));
|
2003-06-16 16:33:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-02-14 23:44:18 +02:00
|
|
|
static bool isInStore(const Path & path)
|
|
|
|
{
|
|
|
|
return path[0] == '/'
|
2004-04-14 11:08:55 +03:00
|
|
|
&& path.compare(0, nixStore.size(), nixStore) == 0
|
|
|
|
&& path.size() >= nixStore.size() + 2
|
|
|
|
&& path[nixStore.size()] == '/'
|
|
|
|
&& path.find('/', nixStore.size() + 1) == Path::npos;
|
2004-02-14 23:44:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-04-14 11:08:55 +03:00
|
|
|
void assertStorePath(const Path & path)
|
2004-02-14 23:44:18 +02:00
|
|
|
{
|
|
|
|
if (!isInStore(path))
|
|
|
|
throw Error(format("path `%1%' is not in the Nix store") % path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-12-05 13:05:19 +02:00
|
|
|
static bool isValidPathTxn(const Path & path, const Transaction & txn)
|
|
|
|
{
|
|
|
|
string s;
|
|
|
|
return nixDB.queryString(txn, dbValidPaths, path, s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool isValidPath(const Path & path)
|
|
|
|
{
|
|
|
|
return isValidPathTxn(path, noTxn);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static bool isUsablePathTxn(const Path & path, const Transaction & txn)
|
|
|
|
{
|
|
|
|
if (isValidPathTxn(path, txn)) return true;
|
|
|
|
Paths subs;
|
|
|
|
nixDB.queryStrings(txn, dbSubstitutes, path, subs);
|
|
|
|
return subs.size() > 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-10 17:46:28 +03:00
|
|
|
void registerSuccessor(const Transaction & txn,
|
2003-10-10 18:14:29 +03:00
|
|
|
const Path & srcPath, const Path & sucPath)
|
2003-10-10 17:46:28 +03:00
|
|
|
{
|
2004-02-14 23:44:18 +02:00
|
|
|
assertStorePath(srcPath);
|
|
|
|
assertStorePath(sucPath);
|
|
|
|
|
2003-12-05 13:05:19 +02:00
|
|
|
if (!isUsablePathTxn(sucPath, txn)) throw Error(
|
|
|
|
format("path `%1%' cannot be a successor, since it is not usable")
|
|
|
|
% sucPath);
|
|
|
|
|
2003-10-10 17:46:28 +03:00
|
|
|
Path known;
|
2003-10-10 18:14:29 +03:00
|
|
|
if (nixDB.queryString(txn, dbSuccessors, srcPath, known) &&
|
|
|
|
known != sucPath)
|
2003-10-10 17:46:28 +03:00
|
|
|
{
|
|
|
|
throw Error(format(
|
|
|
|
"the `impossible' happened: expression in path "
|
|
|
|
"`%1%' appears to have multiple successors "
|
|
|
|
"(known `%2%', new `%3%'")
|
2003-10-10 18:14:29 +03:00
|
|
|
% srcPath % known % sucPath);
|
2003-10-10 17:46:28 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
Paths revs;
|
2003-10-10 18:14:29 +03:00
|
|
|
nixDB.queryStrings(txn, dbSuccessorsRev, sucPath, revs);
|
2003-10-16 19:29:57 +03:00
|
|
|
if (find(revs.begin(), revs.end(), srcPath) == revs.end())
|
|
|
|
revs.push_back(srcPath);
|
2003-10-10 17:46:28 +03:00
|
|
|
|
2003-10-10 18:14:29 +03:00
|
|
|
nixDB.setString(txn, dbSuccessors, srcPath, sucPath);
|
|
|
|
nixDB.setStrings(txn, dbSuccessorsRev, sucPath, revs);
|
2003-10-10 17:46:28 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
void unregisterSuccessor(const Path & srcPath)
|
|
|
|
{
|
|
|
|
assertStorePath(srcPath);
|
|
|
|
|
|
|
|
Transaction txn(nixDB);
|
|
|
|
|
|
|
|
Path sucPath;
|
|
|
|
if (!nixDB.queryString(txn, dbSuccessors, srcPath, sucPath)) {
|
|
|
|
txn.abort();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
nixDB.delPair(txn, dbSuccessors, srcPath);
|
|
|
|
|
|
|
|
Paths revs;
|
|
|
|
nixDB.queryStrings(txn, dbSuccessorsRev, sucPath, revs);
|
|
|
|
Paths::iterator i = find(revs.begin(), revs.end(), srcPath);
|
|
|
|
assert(i != revs.end());
|
|
|
|
revs.erase(i);
|
|
|
|
nixDB.setStrings(txn, dbSuccessorsRev, sucPath, revs);
|
|
|
|
|
|
|
|
txn.commit();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-15 15:42:39 +03:00
|
|
|
bool querySuccessor(const Path & srcPath, Path & sucPath)
|
|
|
|
{
|
|
|
|
return nixDB.queryString(noTxn, dbSuccessors, srcPath, sucPath);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-10 18:25:21 +03:00
|
|
|
Paths queryPredecessors(const Path & sucPath)
|
|
|
|
{
|
|
|
|
Paths revs;
|
|
|
|
nixDB.queryStrings(noTxn, dbSuccessorsRev, sucPath, revs);
|
|
|
|
return revs;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
static Substitutes readSubstitutes(const Transaction & txn,
|
|
|
|
const Path & srcPath)
|
2003-07-10 18:11:48 +03:00
|
|
|
{
|
2004-06-20 22:17:54 +03:00
|
|
|
Strings ss;
|
|
|
|
nixDB.queryStrings(txn, dbSubstitutes, srcPath, ss);
|
|
|
|
|
|
|
|
Substitutes subs;
|
2004-02-14 23:44:18 +02:00
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
for (Strings::iterator i = ss.begin(); i != ss.end(); ++i) {
|
|
|
|
if (i->size() < 4 || (*i)[3] != 0) {
|
|
|
|
/* Old-style substitute. !!! remove this code
|
|
|
|
eventually? */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
Strings ss2 = unpackStrings(*i);
|
2004-12-20 15:43:32 +02:00
|
|
|
if (ss2.size() == 3) {
|
|
|
|
/* Another old-style substitute. */
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (ss2.size() != 2) throw Error("malformed substitute");
|
2004-06-20 22:17:54 +03:00
|
|
|
Strings::iterator j = ss2.begin();
|
|
|
|
Substitute sub;
|
|
|
|
sub.program = *j++;
|
|
|
|
sub.args = unpackStrings(*j++);
|
|
|
|
subs.push_back(sub);
|
|
|
|
}
|
|
|
|
|
|
|
|
return subs;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void writeSubstitutes(const Transaction & txn,
|
|
|
|
const Path & srcPath, const Substitutes & subs)
|
|
|
|
{
|
|
|
|
Strings ss;
|
|
|
|
|
|
|
|
for (Substitutes::const_iterator i = subs.begin();
|
|
|
|
i != subs.end(); ++i)
|
|
|
|
{
|
|
|
|
Strings ss2;
|
|
|
|
ss2.push_back(i->program);
|
|
|
|
ss2.push_back(packStrings(i->args));
|
|
|
|
ss.push_back(packStrings(ss2));
|
|
|
|
}
|
2003-12-05 13:05:19 +02:00
|
|
|
|
2004-06-28 13:42:57 +03:00
|
|
|
nixDB.setStrings(txn, dbSubstitutes, srcPath, ss);
|
2004-06-20 22:17:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-08-31 19:13:10 +03:00
|
|
|
void registerSubstitutes(const Transaction & txn,
|
|
|
|
const SubstitutePairs & subPairs)
|
2004-06-20 22:17:54 +03:00
|
|
|
{
|
2004-08-31 19:13:10 +03:00
|
|
|
for (SubstitutePairs::const_iterator i = subPairs.begin();
|
|
|
|
i != subPairs.end(); ++i)
|
|
|
|
{
|
|
|
|
const Path & srcPath(i->first);
|
|
|
|
const Substitute & sub(i->second);
|
2003-10-10 17:46:28 +03:00
|
|
|
|
2004-08-31 19:13:10 +03:00
|
|
|
assertStorePath(srcPath);
|
2004-06-20 22:17:54 +03:00
|
|
|
|
2004-08-31 19:13:10 +03:00
|
|
|
Substitutes subs = readSubstitutes(txn, srcPath);
|
|
|
|
|
|
|
|
/* New substitutes take precedence over old ones. If the
|
|
|
|
substitute is already present, it's moved to the front. */
|
|
|
|
remove(subs.begin(), subs.end(), sub);
|
|
|
|
subs.push_front(sub);
|
|
|
|
|
|
|
|
writeSubstitutes(txn, srcPath, subs);
|
|
|
|
}
|
2003-07-10 18:11:48 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-20 22:17:54 +03:00
|
|
|
Substitutes querySubstitutes(const Path & srcPath)
|
2003-10-16 19:29:57 +03:00
|
|
|
{
|
2004-06-20 22:17:54 +03:00
|
|
|
return readSubstitutes(noTxn, srcPath);
|
2003-10-16 19:29:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-12-20 16:16:55 +02:00
|
|
|
static void unregisterPredecessors(const Path & path, Transaction & txn)
|
|
|
|
{
|
|
|
|
/* Remove any successor mappings to this path (but not *from*
|
|
|
|
it). */
|
|
|
|
Paths revs;
|
|
|
|
nixDB.queryStrings(txn, dbSuccessorsRev, path, revs);
|
|
|
|
for (Paths::iterator i = revs.begin(); i != revs.end(); ++i)
|
|
|
|
nixDB.delPair(txn, dbSuccessors, *i);
|
|
|
|
nixDB.delPair(txn, dbSuccessorsRev, path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-12-20 15:43:32 +02:00
|
|
|
void clearSubstitutes()
|
|
|
|
{
|
2004-12-20 16:16:55 +02:00
|
|
|
Transaction txn(nixDB);
|
2004-12-20 15:43:32 +02:00
|
|
|
|
2004-12-20 16:16:55 +02:00
|
|
|
/* Iterate over all paths for which there are substitutes. */
|
|
|
|
Paths subKeys;
|
|
|
|
nixDB.enumTable(txn, dbSubstitutes, subKeys);
|
|
|
|
for (Paths::iterator i = subKeys.begin(); i != subKeys.end(); ++i) {
|
|
|
|
|
|
|
|
/* If this path has not become valid in the mean-while, delete
|
|
|
|
any successor mappings *to* it. This is to preserve the
|
|
|
|
invariant the all successors are `usable' as opposed to
|
|
|
|
`valid' (i.e., the successor must be valid *or* have at
|
|
|
|
least one substitute). */
|
|
|
|
if (!isValidPath(*i)) {
|
|
|
|
unregisterPredecessors(*i, txn);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Delete all substitutes for path *i. */
|
|
|
|
nixDB.delPair(txn, dbSubstitutes, *i);
|
|
|
|
}
|
|
|
|
|
|
|
|
txn.commit();
|
2004-12-20 15:43:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
void registerValidPath(const Transaction & txn, const Path & _path)
|
2003-07-07 12:25:26 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
Path path(canonPath(_path));
|
2004-02-14 23:44:18 +02:00
|
|
|
assertStorePath(path);
|
2003-10-08 18:06:59 +03:00
|
|
|
debug(format("registering path `%1%'") % path);
|
|
|
|
nixDB.setString(txn, dbValidPaths, path, "");
|
|
|
|
}
|
2003-07-07 12:25:26 +03:00
|
|
|
|
2003-07-31 19:05:35 +03:00
|
|
|
|
2003-11-22 20:45:56 +02:00
|
|
|
static void invalidatePath(const Path & path, Transaction & txn)
|
2003-07-08 12:54:47 +03:00
|
|
|
{
|
2003-07-31 19:05:35 +03:00
|
|
|
debug(format("unregistering path `%1%'") % path);
|
2003-07-08 12:54:47 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
nixDB.delPair(txn, dbValidPaths, path);
|
2004-12-20 16:16:55 +02:00
|
|
|
unregisterPredecessors(path, txn);
|
2003-07-08 12:54:47 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-14 15:51:38 +02:00
|
|
|
Path makeStorePath(const string & type,
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 18:55:19 +02:00
|
|
|
const Hash & hash, const string & suffix)
|
2005-01-14 15:51:38 +02:00
|
|
|
{
|
|
|
|
/* e.g., "source:sha256:1abc...:/nix/store:foo.tar.gz" */
|
2005-01-14 18:04:03 +02:00
|
|
|
string s = type + ":sha256:" + printHash(hash) + ":"
|
2005-01-14 15:51:38 +02:00
|
|
|
+ nixStore + ":" + suffix;
|
|
|
|
|
2005-01-14 18:04:03 +02:00
|
|
|
return nixStore + "/"
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 18:55:19 +02:00
|
|
|
+ printHash32(compressHash(hashString(htSHA256, s), 20))
|
2005-01-14 18:04:03 +02:00
|
|
|
+ "-" + suffix;
|
2005-01-14 15:51:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
Path addToStore(const Path & _srcPath)
|
2003-07-07 12:25:26 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
Path srcPath(absPath(_srcPath));
|
|
|
|
debug(format("adding `%1%' to the store") % srcPath);
|
2003-07-07 12:25:26 +03:00
|
|
|
|
2005-01-14 15:51:38 +02:00
|
|
|
Hash h(htSHA256);
|
2004-09-10 00:12:53 +03:00
|
|
|
{
|
|
|
|
SwitchToOriginalUser sw;
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 18:55:19 +02:00
|
|
|
h = hashPath(htSHA256, srcPath);
|
2004-09-10 00:12:53 +03:00
|
|
|
}
|
2003-07-10 18:11:48 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
string baseName = baseNameOf(srcPath);
|
2005-01-14 15:51:38 +02:00
|
|
|
Path dstPath = makeStorePath("source", h, baseName);
|
2003-07-10 18:11:48 +03:00
|
|
|
|
2004-10-25 17:38:23 +03:00
|
|
|
if (!readOnlyMode && !isValidPath(dstPath)) {
|
2003-07-10 18:11:48 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
/* The first check above is an optimisation to prevent
|
|
|
|
unnecessary lock acquisition. */
|
2003-07-22 18:15:15 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
PathSet lockPaths;
|
|
|
|
lockPaths.insert(dstPath);
|
|
|
|
PathLocks outputLock(lockPaths);
|
2003-07-22 18:15:15 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
if (!isValidPath(dstPath)) {
|
2004-06-21 10:46:02 +03:00
|
|
|
|
|
|
|
if (pathExists(dstPath)) deletePath(dstPath);
|
2004-10-25 17:38:23 +03:00
|
|
|
|
|
|
|
/* !!! race: srcPath might change between hashPath() and
|
|
|
|
here! */
|
2004-06-21 10:46:02 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
copyPath(srcPath, dstPath);
|
2003-08-01 12:01:51 +03:00
|
|
|
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 18:55:19 +02:00
|
|
|
Hash h2 = hashPath(htSHA256, dstPath);
|
2005-01-14 15:51:38 +02:00
|
|
|
if (h != h2)
|
|
|
|
throw Error(format("contents of `%1%' changed while copying it to `%2%' (%3% -> %4%)")
|
2005-01-14 18:04:03 +02:00
|
|
|
% srcPath % dstPath % printHash(h) % printHash(h2));
|
2005-01-14 15:51:38 +02:00
|
|
|
|
2004-09-10 00:19:20 +03:00
|
|
|
makePathReadOnly(dstPath);
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
registerValidPath(txn, dstPath);
|
|
|
|
txn.commit();
|
2003-08-01 12:01:51 +03:00
|
|
|
}
|
2003-11-22 20:45:56 +02:00
|
|
|
|
|
|
|
outputLock.setDeletion(true);
|
2003-06-16 16:33:38 +03:00
|
|
|
}
|
2003-08-04 10:09:36 +03:00
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
return dstPath;
|
2003-06-16 16:33:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-14 15:51:38 +02:00
|
|
|
Path addTextToStore(const string & suffix, const string & s)
|
2003-10-15 15:42:39 +03:00
|
|
|
{
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 18:55:19 +02:00
|
|
|
Hash hash = hashString(htSHA256, s);
|
2005-01-14 15:51:38 +02:00
|
|
|
|
|
|
|
Path dstPath = makeStorePath("text", hash, suffix);
|
2004-02-14 23:44:18 +02:00
|
|
|
|
2005-01-14 15:51:38 +02:00
|
|
|
if (!readOnlyMode && !isValidPath(dstPath)) {
|
2003-10-15 15:42:39 +03:00
|
|
|
|
2003-10-23 13:51:55 +03:00
|
|
|
PathSet lockPaths;
|
|
|
|
lockPaths.insert(dstPath);
|
|
|
|
PathLocks outputLock(lockPaths);
|
|
|
|
|
|
|
|
if (!isValidPath(dstPath)) {
|
2004-06-21 10:46:02 +03:00
|
|
|
|
|
|
|
if (pathExists(dstPath)) deletePath(dstPath);
|
|
|
|
|
2003-11-22 17:58:34 +02:00
|
|
|
writeStringToFile(dstPath, s);
|
2003-10-15 15:42:39 +03:00
|
|
|
|
2004-09-10 00:19:20 +03:00
|
|
|
makePathReadOnly(dstPath);
|
|
|
|
|
2003-10-23 13:51:55 +03:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
registerValidPath(txn, dstPath);
|
|
|
|
txn.commit();
|
|
|
|
}
|
2003-11-22 20:45:56 +02:00
|
|
|
|
|
|
|
outputLock.setDeletion(true);
|
2003-10-15 15:42:39 +03:00
|
|
|
}
|
2005-01-14 15:51:38 +02:00
|
|
|
|
|
|
|
return dstPath;
|
2003-10-15 15:42:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 18:06:59 +03:00
|
|
|
void deleteFromStore(const Path & _path)
|
2003-06-23 17:40:49 +03:00
|
|
|
{
|
2003-10-08 18:06:59 +03:00
|
|
|
Path path(canonPath(_path));
|
|
|
|
|
2004-02-14 23:44:18 +02:00
|
|
|
assertStorePath(path);
|
2003-07-08 12:54:47 +03:00
|
|
|
|
2003-11-22 20:45:56 +02:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
invalidatePath(path, txn);
|
|
|
|
txn.commit();
|
2003-07-08 12:54:47 +03:00
|
|
|
|
2003-06-27 17:56:12 +03:00
|
|
|
deletePath(path);
|
2003-06-23 17:40:49 +03:00
|
|
|
}
|
2003-07-17 15:27:55 +03:00
|
|
|
|
|
|
|
|
|
|
|
void verifyStore()
|
|
|
|
{
|
2003-07-31 22:49:11 +03:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
|
2003-10-10 18:14:29 +03:00
|
|
|
Paths paths;
|
2003-11-22 20:45:56 +02:00
|
|
|
PathSet validPaths;
|
2003-10-10 18:14:29 +03:00
|
|
|
nixDB.enumTable(txn, dbValidPaths, paths);
|
2003-07-17 15:27:55 +03:00
|
|
|
|
2003-12-05 13:05:19 +02:00
|
|
|
for (Paths::iterator i = paths.begin(); i != paths.end(); ++i) {
|
2003-10-10 18:14:29 +03:00
|
|
|
Path path = *i;
|
2003-07-17 15:27:55 +03:00
|
|
|
if (!pathExists(path)) {
|
2004-01-13 13:53:12 +02:00
|
|
|
printMsg(lvlError, format("path `%1%' disappeared") % path);
|
2003-11-22 20:45:56 +02:00
|
|
|
invalidatePath(path, txn);
|
2004-02-14 23:44:18 +02:00
|
|
|
} else if (!isInStore(path)) {
|
|
|
|
printMsg(lvlError, format("path `%1%' is not in the Nix store") % path);
|
|
|
|
invalidatePath(path, txn);
|
2003-11-22 20:45:56 +02:00
|
|
|
} else
|
|
|
|
validPaths.insert(path);
|
2003-07-17 15:27:55 +03:00
|
|
|
}
|
|
|
|
|
2003-12-05 13:05:19 +02:00
|
|
|
/* !!! the code below does not allow transitive substitutes.
|
|
|
|
I.e., if B is a substitute of A, then B must be a valid path.
|
|
|
|
B cannot itself be invalid but have a substitute. */
|
2003-07-17 15:27:55 +03:00
|
|
|
|
2003-12-05 13:05:19 +02:00
|
|
|
/* "Usable" paths are those that are valid or have a substitute.
|
|
|
|
These are the paths that are allowed to appear in the
|
|
|
|
right-hand side of a sute mapping. */
|
|
|
|
PathSet usablePaths(validPaths);
|
2003-07-17 15:27:55 +03:00
|
|
|
|
2003-11-24 11:24:52 +02:00
|
|
|
/* Check that the values of the substitute mappings are valid
|
|
|
|
paths. */
|
2004-06-20 22:17:54 +03:00
|
|
|
Paths subKeys;
|
|
|
|
nixDB.enumTable(txn, dbSubstitutes, subKeys);
|
|
|
|
for (Paths::iterator i = subKeys.begin(); i != subKeys.end(); ++i) {
|
2004-12-20 15:43:32 +02:00
|
|
|
Substitutes subs = readSubstitutes(txn, *i);
|
|
|
|
if (subs.size() > 0)
|
2003-12-05 13:05:19 +02:00
|
|
|
usablePaths.insert(*i);
|
2004-12-20 16:16:55 +02:00
|
|
|
else
|
|
|
|
nixDB.delPair(txn, dbSubstitutes, *i);
|
2003-11-24 11:24:52 +02:00
|
|
|
}
|
2003-10-10 18:14:29 +03:00
|
|
|
|
2003-12-05 13:05:19 +02:00
|
|
|
/* Check that the values of the successor mappings are usable
|
|
|
|
paths. */
|
2004-06-20 22:17:54 +03:00
|
|
|
Paths sucKeys;
|
|
|
|
nixDB.enumTable(txn, dbSuccessors, sucKeys);
|
|
|
|
for (Paths::iterator i = sucKeys.begin(); i != sucKeys.end(); ++i) {
|
2003-12-05 13:05:19 +02:00
|
|
|
/* Note that *i itself does not have to be valid, just its
|
|
|
|
successor. */
|
|
|
|
Path sucPath;
|
|
|
|
if (nixDB.queryString(txn, dbSuccessors, *i, sucPath) &&
|
|
|
|
usablePaths.find(sucPath) == usablePaths.end())
|
|
|
|
{
|
2004-01-13 13:53:12 +02:00
|
|
|
printMsg(lvlError,
|
|
|
|
format("found successor mapping to non-existent path `%1%'") % sucPath);
|
2003-12-05 13:05:19 +02:00
|
|
|
nixDB.delPair(txn, dbSuccessors, *i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that the keys of the reverse successor mappings are valid
|
|
|
|
paths. */
|
2004-06-20 22:17:54 +03:00
|
|
|
Paths rsucKeys;
|
|
|
|
nixDB.enumTable(txn, dbSuccessorsRev, rsucKeys);
|
|
|
|
for (Paths::iterator i = rsucKeys.begin(); i != rsucKeys.end(); ++i) {
|
2003-12-05 13:05:19 +02:00
|
|
|
if (usablePaths.find(*i) == usablePaths.end()) {
|
2004-01-13 13:53:12 +02:00
|
|
|
printMsg(lvlError,
|
|
|
|
format("found reverse successor mapping for non-existent path `%1%'") % *i);
|
2003-12-05 13:05:19 +02:00
|
|
|
nixDB.delPair(txn, dbSuccessorsRev, *i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-07-31 22:49:11 +03:00
|
|
|
txn.commit();
|
2003-07-17 15:27:55 +03:00
|
|
|
}
|