mirror of
https://github.com/privatevoid-net/nix-super.git
synced 2024-11-13 09:46:16 +02:00
96de272b48
`derivations.cc', etc. * Store the SHA-256 content hash of store paths in the database after they have been built/added. This is so that we can check whether the store has been messed with (a la `rpm --verify'). * When registering path validity, verify that the closure property holds.
64 lines
1.6 KiB
C++
64 lines
1.6 KiB
C++
#include "build.hh"
|
|
|
|
|
|
Derivation derivationFromPath(const Path & drvPath)
|
|
{
|
|
assertStorePath(drvPath);
|
|
ensurePath(drvPath);
|
|
ATerm t = ATreadFromNamedFile(drvPath.c_str());
|
|
if (!t) throw Error(format("cannot read aterm from `%1%'") % drvPath);
|
|
return parseDerivation(t);
|
|
}
|
|
|
|
|
|
void computeFSClosure(const Path & storePath,
|
|
PathSet & paths)
|
|
{
|
|
if (paths.find(storePath) != paths.end()) return;
|
|
paths.insert(storePath);
|
|
|
|
PathSet references;
|
|
queryReferences(storePath, references);
|
|
|
|
for (PathSet::iterator i = references.begin();
|
|
i != references.end(); ++i)
|
|
computeFSClosure(*i, paths);
|
|
}
|
|
|
|
|
|
void storePathRequisites(const Path & storePath,
|
|
bool includeOutputs, PathSet & paths)
|
|
{
|
|
checkInterrupt();
|
|
|
|
if (paths.find(storePath) != paths.end()) return;
|
|
|
|
if (isDerivation(storePath)) {
|
|
|
|
paths.insert(storePath);
|
|
|
|
Derivation drv = derivationFromPath(storePath);
|
|
|
|
for (PathSet::iterator i = drv.inputDrvs.begin();
|
|
i != drv.inputDrvs.end(); ++i)
|
|
storePathRequisites(*i, includeOutputs, paths);
|
|
|
|
for (PathSet::iterator i = drv.inputSrcs.begin();
|
|
i != drv.inputSrcs.end(); ++i)
|
|
storePathRequisites(*i, includeOutputs, paths);
|
|
|
|
if (includeOutputs) {
|
|
|
|
for (DerivationOutputs::iterator i = drv.outputs.begin();
|
|
i != drv.outputs.end(); ++i)
|
|
if (isValidPath(i->second.path))
|
|
storePathRequisites(i->second.path, includeOutputs, paths);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
computeFSClosure(storePath, paths);
|
|
}
|
|
}
|