2003-06-23 15:27:59 +02:00
|
|
|
#include <iostream>
|
2003-12-22 17:40:46 +01:00
|
|
|
#include <algorithm>
|
2003-06-23 15:27:59 +02:00
|
|
|
|
|
|
|
#include <sys/wait.h>
|
2003-10-15 14:42:39 +02:00
|
|
|
#include <unistd.h>
|
2003-06-23 15:27:59 +02:00
|
|
|
|
2003-07-07 09:43:58 +02:00
|
|
|
#include "store.hh"
|
2003-06-16 15:33:38 +02:00
|
|
|
#include "globals.hh"
|
|
|
|
#include "db.hh"
|
2003-06-23 15:27:59 +02:00
|
|
|
#include "archive.hh"
|
2003-08-04 09:09:36 +02:00
|
|
|
#include "pathlocks.hh"
|
2003-06-23 15:27:59 +02:00
|
|
|
|
|
|
|
|
2003-10-15 14:42:39 +02:00
|
|
|
/* Nix database. */
|
|
|
|
static Database nixDB;
|
|
|
|
|
|
|
|
|
|
|
|
/* Database tables. */
|
|
|
|
|
|
|
|
/* dbValidPaths :: Path -> ()
|
|
|
|
|
|
|
|
The existence of a key $p$ indicates that path $p$ is valid (that
|
|
|
|
is, produced by a succesful build). */
|
|
|
|
static TableId dbValidPaths;
|
|
|
|
|
|
|
|
/* dbSuccessors :: Path -> Path
|
|
|
|
|
|
|
|
Each pair $(p_1, p_2)$ in this mapping records the fact that the
|
|
|
|
Nix expression stored at path $p_1$ has a successor expression
|
|
|
|
stored at path $p_2$.
|
|
|
|
|
|
|
|
Note that a term $y$ is a successor of $x$ iff there exists a
|
|
|
|
sequence of rewrite steps that rewrites $x$ into $y$.
|
|
|
|
*/
|
|
|
|
static TableId dbSuccessors;
|
|
|
|
|
|
|
|
/* dbSuccessorsRev :: Path -> [Path]
|
|
|
|
|
|
|
|
The reverse mapping of dbSuccessors (i.e., it stores the
|
|
|
|
predecessors of a Nix expression).
|
|
|
|
*/
|
|
|
|
static TableId dbSuccessorsRev;
|
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
/* dbSubstitutes :: Path -> [(Path, Path, [string])]
|
2003-10-15 14:42:39 +02:00
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
Each pair $(p, subs)$ tells Nix that it can use any of the
|
|
|
|
substitutes in $subs$ to build path $p$. Each substitute is a
|
|
|
|
tuple $(storeExpr, program, args)$ (see the type `Substitute' in
|
|
|
|
`store.hh').
|
2003-10-15 14:42:39 +02:00
|
|
|
|
|
|
|
The main purpose of this is for distributed caching of derivates.
|
|
|
|
One system can compute a derivate and put it on a website (as a Nix
|
|
|
|
archive), for instance, and then another system can register a
|
|
|
|
substitute for that derivate. The substitute in this case might be
|
|
|
|
a Nix expression that fetches the Nix archive.
|
|
|
|
*/
|
|
|
|
static TableId dbSubstitutes;
|
|
|
|
|
|
|
|
/* dbSubstitutesRev :: Path -> [Path]
|
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
The reverse mapping of dbSubstitutes; it maps store expressions
|
|
|
|
back to the paths for which they are substitutes.
|
2003-10-15 14:42:39 +02:00
|
|
|
*/
|
|
|
|
static TableId dbSubstitutesRev;
|
|
|
|
|
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
bool Substitute::operator == (const Substitute & sub)
|
|
|
|
{
|
|
|
|
return storeExpr == sub.storeExpr
|
|
|
|
&& program == sub.program
|
|
|
|
&& args == sub.args;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-15 14:42:39 +02:00
|
|
|
void openDB()
|
|
|
|
{
|
|
|
|
nixDB.open(nixDBPath);
|
|
|
|
dbValidPaths = nixDB.openTable("validpaths");
|
|
|
|
dbSuccessors = nixDB.openTable("successors");
|
|
|
|
dbSuccessorsRev = nixDB.openTable("successors-rev");
|
|
|
|
dbSubstitutes = nixDB.openTable("substitutes");
|
|
|
|
dbSubstitutesRev = nixDB.openTable("substitutes-rev");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void initDB()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void createStoreTransaction(Transaction & txn)
|
|
|
|
{
|
|
|
|
Transaction txn2(nixDB);
|
|
|
|
txn2.moveTo(txn);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Path copying. */
|
|
|
|
|
2003-06-23 15:27:59 +02:00
|
|
|
struct CopySink : DumpSink
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
virtual void operator () (const unsigned char * data, unsigned int len)
|
|
|
|
{
|
2003-07-20 23:11:43 +02:00
|
|
|
writeFull(fd, data, len);
|
2003-06-23 15:27:59 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
struct CopySource : RestoreSource
|
|
|
|
{
|
|
|
|
int fd;
|
2003-07-20 23:11:43 +02:00
|
|
|
virtual void operator () (unsigned char * data, unsigned int len)
|
2003-06-23 15:27:59 +02:00
|
|
|
{
|
2003-07-20 23:11:43 +02:00
|
|
|
readFull(fd, data, len);
|
2003-06-23 15:27:59 +02:00
|
|
|
}
|
|
|
|
};
|
2003-06-16 15:33:38 +02:00
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
void copyPath(const Path & src, const Path & dst)
|
2003-06-16 15:33:38 +02:00
|
|
|
{
|
2003-07-31 18:05:35 +02:00
|
|
|
debug(format("copying `%1%' to `%2%'") % src % dst);
|
|
|
|
|
2003-06-23 15:27:59 +02:00
|
|
|
/* Unfortunately C++ doesn't support coprocedures, so we have no
|
|
|
|
nice way to chain CopySink and CopySource together. Instead we
|
|
|
|
fork off a child to run the sink. (Fork-less platforms should
|
|
|
|
use a thread). */
|
|
|
|
|
|
|
|
/* Create a pipe. */
|
|
|
|
int fds[2];
|
|
|
|
if (pipe(fds) == -1) throw SysError("creating pipe");
|
|
|
|
|
|
|
|
/* Fork. */
|
|
|
|
pid_t pid;
|
|
|
|
switch (pid = fork()) {
|
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0: /* child */
|
|
|
|
try {
|
|
|
|
close(fds[1]);
|
|
|
|
CopySource source;
|
|
|
|
source.fd = fds[0];
|
|
|
|
restorePath(dst, source);
|
|
|
|
_exit(0);
|
2004-01-15 21:23:55 +01:00
|
|
|
} catch (exception & e) {
|
2003-06-23 15:27:59 +02:00
|
|
|
cerr << "error: " << e.what() << endl;
|
|
|
|
}
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
close(fds[0]);
|
|
|
|
|
|
|
|
/* Parent. */
|
|
|
|
|
|
|
|
CopySink sink;
|
|
|
|
sink.fd = fds[1];
|
|
|
|
dumpPath(src, sink);
|
|
|
|
|
|
|
|
/* Wait for the child to finish. */
|
|
|
|
int status;
|
|
|
|
if (waitpid(pid, &status, 0) != pid)
|
|
|
|
throw SysError("waiting for child");
|
|
|
|
|
|
|
|
if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
|
2004-06-22 10:50:25 +02:00
|
|
|
throw Error(format("cannot copy `%1% to `%2%': child %3%")
|
|
|
|
% src % dst % statusToString(status));
|
2003-06-16 15:33:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-02-14 22:44:18 +01:00
|
|
|
static bool isInStore(const Path & path)
|
|
|
|
{
|
|
|
|
return path[0] == '/'
|
2004-04-14 10:08:55 +02:00
|
|
|
&& path.compare(0, nixStore.size(), nixStore) == 0
|
|
|
|
&& path.size() >= nixStore.size() + 2
|
|
|
|
&& path[nixStore.size()] == '/'
|
|
|
|
&& path.find('/', nixStore.size() + 1) == Path::npos;
|
2004-02-14 22:44:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-04-14 10:08:55 +02:00
|
|
|
void assertStorePath(const Path & path)
|
2004-02-14 22:44:18 +01:00
|
|
|
{
|
|
|
|
if (!isInStore(path))
|
|
|
|
throw Error(format("path `%1%' is not in the Nix store") % path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
static bool isValidPathTxn(const Path & path, const Transaction & txn)
|
|
|
|
{
|
|
|
|
string s;
|
|
|
|
return nixDB.queryString(txn, dbValidPaths, path, s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool isValidPath(const Path & path)
|
|
|
|
{
|
|
|
|
return isValidPathTxn(path, noTxn);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static bool isUsablePathTxn(const Path & path, const Transaction & txn)
|
|
|
|
{
|
|
|
|
if (isValidPathTxn(path, txn)) return true;
|
|
|
|
Paths subs;
|
|
|
|
nixDB.queryStrings(txn, dbSubstitutes, path, subs);
|
|
|
|
return subs.size() > 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-10 16:46:28 +02:00
|
|
|
void registerSuccessor(const Transaction & txn,
|
2003-10-10 17:14:29 +02:00
|
|
|
const Path & srcPath, const Path & sucPath)
|
2003-10-10 16:46:28 +02:00
|
|
|
{
|
2004-02-14 22:44:18 +01:00
|
|
|
assertStorePath(srcPath);
|
|
|
|
assertStorePath(sucPath);
|
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
if (!isUsablePathTxn(sucPath, txn)) throw Error(
|
|
|
|
format("path `%1%' cannot be a successor, since it is not usable")
|
|
|
|
% sucPath);
|
|
|
|
|
2003-10-10 16:46:28 +02:00
|
|
|
Path known;
|
2003-10-10 17:14:29 +02:00
|
|
|
if (nixDB.queryString(txn, dbSuccessors, srcPath, known) &&
|
|
|
|
known != sucPath)
|
2003-10-10 16:46:28 +02:00
|
|
|
{
|
|
|
|
throw Error(format(
|
|
|
|
"the `impossible' happened: expression in path "
|
|
|
|
"`%1%' appears to have multiple successors "
|
|
|
|
"(known `%2%', new `%3%'")
|
2003-10-10 17:14:29 +02:00
|
|
|
% srcPath % known % sucPath);
|
2003-10-10 16:46:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Paths revs;
|
2003-10-10 17:14:29 +02:00
|
|
|
nixDB.queryStrings(txn, dbSuccessorsRev, sucPath, revs);
|
2003-10-16 18:29:57 +02:00
|
|
|
if (find(revs.begin(), revs.end(), srcPath) == revs.end())
|
|
|
|
revs.push_back(srcPath);
|
2003-10-10 16:46:28 +02:00
|
|
|
|
2003-10-10 17:14:29 +02:00
|
|
|
nixDB.setString(txn, dbSuccessors, srcPath, sucPath);
|
|
|
|
nixDB.setStrings(txn, dbSuccessorsRev, sucPath, revs);
|
2003-10-10 16:46:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-15 14:42:39 +02:00
|
|
|
bool querySuccessor(const Path & srcPath, Path & sucPath)
|
|
|
|
{
|
|
|
|
return nixDB.queryString(noTxn, dbSuccessors, srcPath, sucPath);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-10 17:25:21 +02:00
|
|
|
Paths queryPredecessors(const Path & sucPath)
|
|
|
|
{
|
|
|
|
Paths revs;
|
|
|
|
nixDB.queryStrings(noTxn, dbSuccessorsRev, sucPath, revs);
|
|
|
|
return revs;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
static Substitutes readSubstitutes(const Transaction & txn,
|
|
|
|
const Path & srcPath)
|
2003-07-10 17:11:48 +02:00
|
|
|
{
|
2004-06-20 21:17:54 +02:00
|
|
|
Strings ss;
|
|
|
|
nixDB.queryStrings(txn, dbSubstitutes, srcPath, ss);
|
|
|
|
|
|
|
|
Substitutes subs;
|
2004-02-14 22:44:18 +01:00
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
for (Strings::iterator i = ss.begin(); i != ss.end(); ++i) {
|
|
|
|
if (i->size() < 4 || (*i)[3] != 0) {
|
|
|
|
/* Old-style substitute. !!! remove this code
|
|
|
|
eventually? */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
Strings ss2 = unpackStrings(*i);
|
|
|
|
if (ss2.size() != 3) throw Error("malformed substitute");
|
|
|
|
Strings::iterator j = ss2.begin();
|
|
|
|
Substitute sub;
|
|
|
|
sub.storeExpr = *j++;
|
|
|
|
sub.program = *j++;
|
|
|
|
sub.args = unpackStrings(*j++);
|
|
|
|
subs.push_back(sub);
|
|
|
|
}
|
|
|
|
|
|
|
|
return subs;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void writeSubstitutes(const Transaction & txn,
|
|
|
|
const Path & srcPath, const Substitutes & subs)
|
|
|
|
{
|
|
|
|
Strings ss;
|
|
|
|
|
|
|
|
for (Substitutes::const_iterator i = subs.begin();
|
|
|
|
i != subs.end(); ++i)
|
|
|
|
{
|
|
|
|
Strings ss2;
|
|
|
|
ss2.push_back(i->storeExpr);
|
|
|
|
ss2.push_back(i->program);
|
|
|
|
ss2.push_back(packStrings(i->args));
|
|
|
|
ss.push_back(packStrings(ss2));
|
|
|
|
}
|
2003-12-05 12:05:19 +01:00
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
if (ss.size() == 0)
|
|
|
|
nixDB.delPair(txn, dbSubstitutes, srcPath);
|
|
|
|
else
|
|
|
|
nixDB.setStrings(txn, dbSubstitutes, srcPath, ss);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-21 09:38:17 +02:00
|
|
|
void registerSubstitute(const Transaction & txn,
|
|
|
|
const Path & srcPath, const Substitute & sub)
|
2004-06-20 21:17:54 +02:00
|
|
|
{
|
|
|
|
assertStorePath(srcPath);
|
|
|
|
assertStorePath(sub.storeExpr);
|
|
|
|
|
|
|
|
Substitutes subs = readSubstitutes(txn, srcPath);
|
2003-07-16 22:00:51 +02:00
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
if (find(subs.begin(), subs.end(), sub) != subs.end()) {
|
2003-10-10 16:46:28 +02:00
|
|
|
/* Nothing to do if the substitute is already known. */
|
|
|
|
return;
|
|
|
|
}
|
2004-06-20 21:17:54 +02:00
|
|
|
subs.push_front(sub); /* new substitutes take precedence */
|
2003-10-10 16:46:28 +02:00
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
writeSubstitutes(txn, srcPath, subs);
|
|
|
|
|
2003-10-10 16:46:28 +02:00
|
|
|
Paths revs;
|
2004-06-20 21:17:54 +02:00
|
|
|
nixDB.queryStrings(txn, dbSubstitutesRev, sub.storeExpr, revs);
|
2003-10-16 18:29:57 +02:00
|
|
|
if (find(revs.begin(), revs.end(), srcPath) == revs.end())
|
|
|
|
revs.push_back(srcPath);
|
2003-10-10 16:46:28 +02:00
|
|
|
|
2004-06-21 09:38:17 +02:00
|
|
|
// !!! O(n^2) complexity in building this
|
|
|
|
// nixDB.setStrings(txn, dbSubstitutesRev, sub.storeExpr, revs);
|
2003-07-10 17:11:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
Substitutes querySubstitutes(const Path & srcPath)
|
2003-10-16 18:29:57 +02:00
|
|
|
{
|
2004-06-20 21:17:54 +02:00
|
|
|
return readSubstitutes(noTxn, srcPath);
|
2003-10-16 18:29:57 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
void registerValidPath(const Transaction & txn, const Path & _path)
|
2003-07-07 11:25:26 +02:00
|
|
|
{
|
2003-10-08 17:06:59 +02:00
|
|
|
Path path(canonPath(_path));
|
2004-02-14 22:44:18 +01:00
|
|
|
assertStorePath(path);
|
2003-10-08 17:06:59 +02:00
|
|
|
debug(format("registering path `%1%'") % path);
|
|
|
|
nixDB.setString(txn, dbValidPaths, path, "");
|
|
|
|
}
|
2003-07-07 11:25:26 +02:00
|
|
|
|
2003-07-31 18:05:35 +02:00
|
|
|
|
2003-11-22 19:45:56 +01:00
|
|
|
static void invalidatePath(const Path & path, Transaction & txn)
|
2003-07-08 11:54:47 +02:00
|
|
|
{
|
2003-07-31 18:05:35 +02:00
|
|
|
debug(format("unregistering path `%1%'") % path);
|
2003-07-08 11:54:47 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
nixDB.delPair(txn, dbValidPaths, path);
|
2003-07-16 22:00:51 +02:00
|
|
|
|
2003-11-22 19:45:56 +01:00
|
|
|
/* Remove any successor mappings to this path (but not *from*
|
|
|
|
it). */
|
|
|
|
Paths revs;
|
|
|
|
nixDB.queryStrings(txn, dbSuccessorsRev, path, revs);
|
|
|
|
for (Paths::iterator i = revs.begin(); i != revs.end(); ++i)
|
|
|
|
nixDB.delPair(txn, dbSuccessors, *i);
|
|
|
|
nixDB.delPair(txn, dbSuccessorsRev, path);
|
|
|
|
|
|
|
|
/* Remove any substitute mappings to this path. */
|
|
|
|
revs.clear();
|
|
|
|
nixDB.queryStrings(txn, dbSubstitutesRev, path, revs);
|
|
|
|
for (Paths::iterator i = revs.begin(); i != revs.end(); ++i) {
|
2004-06-20 21:17:54 +02:00
|
|
|
Substitutes subs = readSubstitutes(txn, *i), subs2;
|
|
|
|
bool found = false;
|
|
|
|
for (Substitutes::iterator j = subs.begin(); j != subs.end(); ++j)
|
|
|
|
if (j->storeExpr != path)
|
|
|
|
subs2.push_back(*j);
|
|
|
|
else
|
|
|
|
found = true;
|
|
|
|
if (!found) throw Error("integrity error in substitutes mapping");
|
|
|
|
writeSubstitutes(txn, *i, subs);
|
2003-12-05 12:05:19 +01:00
|
|
|
|
|
|
|
/* If path *i now has no substitutes left, and is not valid,
|
|
|
|
then it too should be invalidated. This is because it may
|
|
|
|
be a substitute or successor. */
|
|
|
|
if (subs.size() == 0 && !isValidPathTxn(*i, txn))
|
|
|
|
invalidatePath(*i, txn);
|
2003-11-22 19:45:56 +01:00
|
|
|
}
|
|
|
|
nixDB.delPair(txn, dbSubstitutesRev, path);
|
2003-07-08 11:54:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
Path addToStore(const Path & _srcPath)
|
2003-07-07 11:25:26 +02:00
|
|
|
{
|
2003-10-08 17:06:59 +02:00
|
|
|
Path srcPath(absPath(_srcPath));
|
|
|
|
debug(format("adding `%1%' to the store") % srcPath);
|
2003-07-07 11:25:26 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
Hash h = hashPath(srcPath);
|
2003-07-10 17:11:48 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
string baseName = baseNameOf(srcPath);
|
|
|
|
Path dstPath = canonPath(nixStore + "/" + (string) h + "-" + baseName);
|
2003-07-10 17:11:48 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
if (!isValidPath(dstPath)) {
|
2003-07-10 17:11:48 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
/* The first check above is an optimisation to prevent
|
|
|
|
unnecessary lock acquisition. */
|
2003-07-22 17:15:15 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
PathSet lockPaths;
|
|
|
|
lockPaths.insert(dstPath);
|
|
|
|
PathLocks outputLock(lockPaths);
|
2003-07-22 17:15:15 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
if (!isValidPath(dstPath)) {
|
2004-06-21 09:46:02 +02:00
|
|
|
|
|
|
|
if (pathExists(dstPath)) deletePath(dstPath);
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
copyPath(srcPath, dstPath);
|
2003-08-01 11:01:51 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
registerValidPath(txn, dstPath);
|
|
|
|
txn.commit();
|
2003-08-01 11:01:51 +02:00
|
|
|
}
|
2003-11-22 19:45:56 +01:00
|
|
|
|
|
|
|
outputLock.setDeletion(true);
|
2003-06-16 15:33:38 +02:00
|
|
|
}
|
2003-08-04 09:09:36 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
return dstPath;
|
2003-06-16 15:33:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-15 14:42:39 +02:00
|
|
|
void addTextToStore(const Path & dstPath, const string & s)
|
|
|
|
{
|
2004-02-14 22:44:18 +01:00
|
|
|
assertStorePath(dstPath);
|
|
|
|
|
2003-10-15 14:42:39 +02:00
|
|
|
if (!isValidPath(dstPath)) {
|
|
|
|
|
2003-10-23 12:51:55 +02:00
|
|
|
PathSet lockPaths;
|
|
|
|
lockPaths.insert(dstPath);
|
|
|
|
PathLocks outputLock(lockPaths);
|
|
|
|
|
|
|
|
if (!isValidPath(dstPath)) {
|
2004-06-21 09:46:02 +02:00
|
|
|
|
|
|
|
if (pathExists(dstPath)) deletePath(dstPath);
|
|
|
|
|
2003-11-22 16:58:34 +01:00
|
|
|
writeStringToFile(dstPath, s);
|
2003-10-15 14:42:39 +02:00
|
|
|
|
2003-10-23 12:51:55 +02:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
registerValidPath(txn, dstPath);
|
|
|
|
txn.commit();
|
|
|
|
}
|
2003-11-22 19:45:56 +01:00
|
|
|
|
|
|
|
outputLock.setDeletion(true);
|
2003-10-15 14:42:39 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
void deleteFromStore(const Path & _path)
|
2003-06-23 16:40:49 +02:00
|
|
|
{
|
2003-10-08 17:06:59 +02:00
|
|
|
Path path(canonPath(_path));
|
|
|
|
|
2004-02-14 22:44:18 +01:00
|
|
|
assertStorePath(path);
|
2003-07-08 11:54:47 +02:00
|
|
|
|
2003-11-22 19:45:56 +01:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
invalidatePath(path, txn);
|
|
|
|
txn.commit();
|
2003-07-08 11:54:47 +02:00
|
|
|
|
2003-06-27 16:56:12 +02:00
|
|
|
deletePath(path);
|
2003-06-23 16:40:49 +02:00
|
|
|
}
|
2003-07-17 14:27:55 +02:00
|
|
|
|
|
|
|
|
|
|
|
void verifyStore()
|
|
|
|
{
|
2003-07-31 21:49:11 +02:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
|
2003-10-10 17:14:29 +02:00
|
|
|
Paths paths;
|
2003-11-22 19:45:56 +01:00
|
|
|
PathSet validPaths;
|
2003-10-10 17:14:29 +02:00
|
|
|
nixDB.enumTable(txn, dbValidPaths, paths);
|
2003-07-17 14:27:55 +02:00
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
for (Paths::iterator i = paths.begin(); i != paths.end(); ++i) {
|
2003-10-10 17:14:29 +02:00
|
|
|
Path path = *i;
|
2003-07-17 14:27:55 +02:00
|
|
|
if (!pathExists(path)) {
|
2004-01-13 12:53:12 +01:00
|
|
|
printMsg(lvlError, format("path `%1%' disappeared") % path);
|
2003-11-22 19:45:56 +01:00
|
|
|
invalidatePath(path, txn);
|
2004-02-14 22:44:18 +01:00
|
|
|
} else if (!isInStore(path)) {
|
|
|
|
printMsg(lvlError, format("path `%1%' is not in the Nix store") % path);
|
|
|
|
invalidatePath(path, txn);
|
2003-11-22 19:45:56 +01:00
|
|
|
} else
|
|
|
|
validPaths.insert(path);
|
2003-07-17 14:27:55 +02:00
|
|
|
}
|
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
/* !!! the code below does not allow transitive substitutes.
|
|
|
|
I.e., if B is a substitute of A, then B must be a valid path.
|
|
|
|
B cannot itself be invalid but have a substitute. */
|
2003-07-17 14:27:55 +02:00
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
/* "Usable" paths are those that are valid or have a substitute.
|
|
|
|
These are the paths that are allowed to appear in the
|
|
|
|
right-hand side of a sute mapping. */
|
|
|
|
PathSet usablePaths(validPaths);
|
2003-07-17 14:27:55 +02:00
|
|
|
|
2003-11-24 10:24:52 +01:00
|
|
|
/* Check that the values of the substitute mappings are valid
|
|
|
|
paths. */
|
2004-06-20 21:17:54 +02:00
|
|
|
Paths subKeys;
|
|
|
|
nixDB.enumTable(txn, dbSubstitutes, subKeys);
|
|
|
|
for (Paths::iterator i = subKeys.begin(); i != subKeys.end(); ++i) {
|
|
|
|
Substitutes subs = readSubstitutes(txn, *i), subs2;
|
|
|
|
for (Substitutes::iterator j = subs.begin(); j != subs.end(); ++j)
|
|
|
|
if (validPaths.find(j->storeExpr) == validPaths.end())
|
2004-01-13 12:53:12 +01:00
|
|
|
printMsg(lvlError,
|
2004-06-20 21:17:54 +02:00
|
|
|
format("found substitute mapping to non-existent path `%1%'")
|
|
|
|
% j->storeExpr);
|
2003-11-24 10:24:52 +01:00
|
|
|
else
|
2004-06-20 21:17:54 +02:00
|
|
|
subs2.push_back(*j);
|
|
|
|
if (subs.size() != subs2.size())
|
|
|
|
writeSubstitutes(txn, *i, subs2);
|
|
|
|
if (subs2.size() > 0)
|
2003-12-05 12:05:19 +01:00
|
|
|
usablePaths.insert(*i);
|
2003-11-24 10:24:52 +01:00
|
|
|
}
|
2003-10-10 17:14:29 +02:00
|
|
|
|
2003-11-24 10:24:52 +01:00
|
|
|
/* Check that the keys of the reverse substitute mappings are
|
|
|
|
valid paths. */
|
2004-06-20 21:17:54 +02:00
|
|
|
Paths rsubKeys;
|
|
|
|
nixDB.enumTable(txn, dbSubstitutesRev, rsubKeys);
|
|
|
|
for (Paths::iterator i = rsubKeys.begin(); i != rsubKeys.end(); ++i) {
|
2003-11-24 10:24:52 +01:00
|
|
|
if (validPaths.find(*i) == validPaths.end()) {
|
2004-01-13 12:53:12 +01:00
|
|
|
printMsg(lvlError,
|
|
|
|
format("found reverse substitute mapping for non-existent path `%1%'") % *i);
|
2003-11-24 10:24:52 +01:00
|
|
|
nixDB.delPair(txn, dbSubstitutesRev, *i);
|
2003-07-17 14:27:55 +02:00
|
|
|
}
|
|
|
|
}
|
2003-07-31 21:49:11 +02:00
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
/* Check that the values of the successor mappings are usable
|
|
|
|
paths. */
|
2004-06-20 21:17:54 +02:00
|
|
|
Paths sucKeys;
|
|
|
|
nixDB.enumTable(txn, dbSuccessors, sucKeys);
|
|
|
|
for (Paths::iterator i = sucKeys.begin(); i != sucKeys.end(); ++i) {
|
2003-12-05 12:05:19 +01:00
|
|
|
/* Note that *i itself does not have to be valid, just its
|
|
|
|
successor. */
|
|
|
|
Path sucPath;
|
|
|
|
if (nixDB.queryString(txn, dbSuccessors, *i, sucPath) &&
|
|
|
|
usablePaths.find(sucPath) == usablePaths.end())
|
|
|
|
{
|
2004-01-13 12:53:12 +01:00
|
|
|
printMsg(lvlError,
|
|
|
|
format("found successor mapping to non-existent path `%1%'") % sucPath);
|
2003-12-05 12:05:19 +01:00
|
|
|
nixDB.delPair(txn, dbSuccessors, *i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that the keys of the reverse successor mappings are valid
|
|
|
|
paths. */
|
2004-06-20 21:17:54 +02:00
|
|
|
Paths rsucKeys;
|
|
|
|
nixDB.enumTable(txn, dbSuccessorsRev, rsucKeys);
|
|
|
|
for (Paths::iterator i = rsucKeys.begin(); i != rsucKeys.end(); ++i) {
|
2003-12-05 12:05:19 +01:00
|
|
|
if (usablePaths.find(*i) == usablePaths.end()) {
|
2004-01-13 12:53:12 +01:00
|
|
|
printMsg(lvlError,
|
|
|
|
format("found reverse successor mapping for non-existent path `%1%'") % *i);
|
2003-12-05 12:05:19 +01:00
|
|
|
nixDB.delPair(txn, dbSuccessorsRev, *i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-07-31 21:49:11 +02:00
|
|
|
txn.commit();
|
2003-07-17 14:27:55 +02:00
|
|
|
}
|