2020-05-27 22:56:34 +02:00
|
|
|
|
#include "libstore/store-api.hh"
|
2020-05-19 16:54:39 +02:00
|
|
|
|
|
2016-09-16 18:54:14 +02:00
|
|
|
|
#include <future>
|
2020-05-20 23:58:43 +02:00
|
|
|
|
#include <utility>
|
2020-05-19 16:54:39 +02:00
|
|
|
|
|
2020-05-25 03:19:01 +02:00
|
|
|
|
#include <absl/strings/match.h>
|
2020-05-25 02:19:02 +02:00
|
|
|
|
#include <absl/strings/numbers.h>
|
2020-08-01 21:44:48 +02:00
|
|
|
|
#include <absl/strings/str_cat.h>
|
2020-05-25 16:54:14 +02:00
|
|
|
|
#include <absl/strings/str_split.h>
|
2020-05-19 02:02:44 +02:00
|
|
|
|
#include <glog/logging.h>
|
2020-07-25 19:49:03 +02:00
|
|
|
|
#include <grpcpp/create_channel.h>
|
2020-05-19 16:54:39 +02:00
|
|
|
|
|
2020-08-02 02:23:53 +02:00
|
|
|
|
#include "libproto/worker.pb.h"
|
2020-05-27 22:56:34 +02:00
|
|
|
|
#include "libstore/crypto.hh"
|
|
|
|
|
#include "libstore/derivations.hh"
|
|
|
|
|
#include "libstore/globals.hh"
|
|
|
|
|
#include "libstore/nar-info-disk-cache.hh"
|
2020-07-25 19:49:03 +02:00
|
|
|
|
#include "libstore/rpc-store.hh"
|
2020-05-27 22:56:34 +02:00
|
|
|
|
#include "libutil/json.hh"
|
|
|
|
|
#include "libutil/thread-pool.hh"
|
|
|
|
|
#include "libutil/util.hh"
|
2019-07-10 19:46:15 +02:00
|
|
|
|
|
2006-11-30 18:43:04 +01:00
|
|
|
|
namespace nix {
|
|
|
|
|
|
2020-08-02 02:23:53 +02:00
|
|
|
|
std::optional<BuildMode> BuildModeFrom(nix::proto::BuildMode mode) {
|
2020-07-17 15:30:04 +02:00
|
|
|
|
switch (mode) {
|
|
|
|
|
case nix::proto::BuildMode::Normal:
|
|
|
|
|
return BuildMode::bmNormal;
|
|
|
|
|
case nix::proto::BuildMode::Repair:
|
|
|
|
|
return BuildMode::bmRepair;
|
|
|
|
|
case nix::proto::BuildMode::Check:
|
|
|
|
|
return BuildMode::bmCheck;
|
|
|
|
|
default:
|
|
|
|
|
return {};
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-08-02 02:23:53 +02:00
|
|
|
|
nix::proto::BuildMode BuildModeToProto(BuildMode mode) {
|
|
|
|
|
switch (mode) {
|
|
|
|
|
case BuildMode::bmNormal:
|
|
|
|
|
return nix::proto::BuildMode::Normal;
|
|
|
|
|
case BuildMode::bmRepair:
|
|
|
|
|
return nix::proto::BuildMode::Repair;
|
|
|
|
|
case BuildMode::bmCheck:
|
|
|
|
|
return nix::proto::BuildMode::Check;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 15:30:04 +02:00
|
|
|
|
nix::proto::BuildStatus BuildResult::status_to_proto() {
|
|
|
|
|
switch (status) {
|
|
|
|
|
case BuildResult::Status::Built:
|
|
|
|
|
return proto::BuildStatus::Built;
|
|
|
|
|
case BuildResult::Status::Substituted:
|
|
|
|
|
return proto::BuildStatus::Substituted;
|
|
|
|
|
case BuildResult::Status::AlreadyValid:
|
|
|
|
|
return proto::BuildStatus::AlreadyValid;
|
|
|
|
|
case BuildResult::Status::PermanentFailure:
|
|
|
|
|
return proto::BuildStatus::PermanentFailure;
|
|
|
|
|
case BuildResult::Status::InputRejected:
|
|
|
|
|
return proto::BuildStatus::InputRejected;
|
|
|
|
|
case BuildResult::Status::OutputRejected:
|
|
|
|
|
return proto::BuildStatus::OutputRejected;
|
|
|
|
|
case BuildResult::Status::TransientFailure:
|
|
|
|
|
return proto::BuildStatus::TransientFailure;
|
|
|
|
|
case BuildResult::Status::CachedFailure:
|
|
|
|
|
return proto::BuildStatus::CachedFailure;
|
|
|
|
|
case BuildResult::Status::TimedOut:
|
|
|
|
|
return proto::BuildStatus::TimedOut;
|
|
|
|
|
case BuildResult::Status::MiscFailure:
|
|
|
|
|
return proto::BuildStatus::MiscFailure;
|
|
|
|
|
case BuildResult::Status::DependencyFailed:
|
|
|
|
|
return proto::BuildStatus::DependencyFailed;
|
|
|
|
|
case BuildResult::Status::LogLimitExceeded:
|
|
|
|
|
return proto::BuildStatus::LogLimitExceeded;
|
|
|
|
|
case BuildResult::Status::NotDeterministic:
|
|
|
|
|
return proto::BuildStatus::NotDeterministic;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-08-05 05:06:01 +02:00
|
|
|
|
std::optional<GCOptions::GCAction> GCActionFromProto(
|
|
|
|
|
nix::proto::GCAction gc_action) {
|
|
|
|
|
switch (gc_action) {
|
|
|
|
|
case nix::proto::GCAction::ReturnLive:
|
|
|
|
|
return GCOptions::GCAction::gcReturnLive;
|
|
|
|
|
case nix::proto::GCAction::ReturnDead:
|
|
|
|
|
return GCOptions::GCAction::gcReturnDead;
|
|
|
|
|
case nix::proto::GCAction::DeleteDead:
|
|
|
|
|
return GCOptions::GCAction::gcDeleteDead;
|
|
|
|
|
case nix::proto::GCAction::DeleteSpecific:
|
|
|
|
|
return GCOptions::GCAction::gcDeleteSpecific;
|
|
|
|
|
default:
|
|
|
|
|
return {};
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[[nodiscard]] const proto::GCAction GCOptions::ActionToProto() const {
|
|
|
|
|
switch (action) {
|
|
|
|
|
case GCOptions::GCAction::gcReturnLive:
|
|
|
|
|
return nix::proto::GCAction::ReturnLive;
|
|
|
|
|
case GCOptions::GCAction::gcReturnDead:
|
|
|
|
|
return nix::proto::GCAction::ReturnDead;
|
|
|
|
|
case GCOptions::GCAction::gcDeleteDead:
|
|
|
|
|
return nix::proto::GCAction::DeleteDead;
|
|
|
|
|
case GCOptions::GCAction::gcDeleteSpecific:
|
|
|
|
|
return nix::proto::GCAction::DeleteSpecific;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2016-06-01 14:49:12 +02:00
|
|
|
|
bool Store::isInStore(const Path& path) const {
|
|
|
|
|
return isInDir(path, storeDir);
|
2006-11-30 18:43:04 +01:00
|
|
|
|
}
|
|
|
|
|
|
2016-06-01 14:49:12 +02:00
|
|
|
|
bool Store::isStorePath(const Path& path) const {
|
2006-11-30 18:43:04 +01:00
|
|
|
|
return isInStore(path) &&
|
|
|
|
|
path.size() >= storeDir.size() + 1 + storePathHashLen &&
|
2017-07-30 13:27:57 +02:00
|
|
|
|
path.find('/', storeDir.size() + 1) == Path::npos;
|
2006-11-30 18:43:04 +01:00
|
|
|
|
}
|
|
|
|
|
|
2016-06-01 14:49:12 +02:00
|
|
|
|
void Store::assertStorePath(const Path& path) const {
|
2006-11-30 18:43:04 +01:00
|
|
|
|
if (!isStorePath(path)) {
|
2017-07-30 13:27:57 +02:00
|
|
|
|
throw Error(format("path '%1%' is not in the Nix store") % path);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2006-11-30 18:43:04 +01:00
|
|
|
|
}
|
|
|
|
|
|
2016-06-01 14:49:12 +02:00
|
|
|
|
Path Store::toStorePath(const Path& path) const {
|
2007-11-29 17:18:24 +01:00
|
|
|
|
if (!isInStore(path)) {
|
2017-07-30 13:27:57 +02:00
|
|
|
|
throw Error(format("path '%1%' is not in the Nix store") % path);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2016-06-01 14:49:12 +02:00
|
|
|
|
Path::size_type slash = path.find('/', storeDir.size() + 1);
|
2006-11-30 18:43:04 +01:00
|
|
|
|
if (slash == Path::npos) {
|
2007-11-29 17:18:24 +01:00
|
|
|
|
return path;
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2020-05-20 23:27:37 +02:00
|
|
|
|
return Path(path, 0, slash);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2016-06-01 14:49:12 +02:00
|
|
|
|
Path Store::followLinksToStore(const Path& _path) const {
|
2007-11-29 17:18:24 +01:00
|
|
|
|
Path path = absPath(_path);
|
|
|
|
|
while (!isInStore(path)) {
|
2020-05-19 18:38:04 +02:00
|
|
|
|
if (!isLink(path)) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string target = readLink(path);
|
2007-11-29 17:18:24 +01:00
|
|
|
|
path = absPath(target, dirOf(path));
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2007-11-29 17:18:24 +01:00
|
|
|
|
if (!isInStore(path)) {
|
2017-07-30 13:27:57 +02:00
|
|
|
|
throw Error(format("path '%1%' is not in the Nix store") % path);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2006-11-30 18:43:04 +01:00
|
|
|
|
return path;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2016-06-01 14:49:12 +02:00
|
|
|
|
Path Store::followLinksToStorePath(const Path& path) const {
|
2007-11-29 17:18:24 +01:00
|
|
|
|
return toStorePath(followLinksToStore(path));
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string storePathToName(const Path& path) {
|
2016-06-01 14:49:12 +02:00
|
|
|
|
auto base = baseNameOf(path);
|
2020-06-16 12:34:44 +02:00
|
|
|
|
|
|
|
|
|
// The base name of the store path must be `storePathHashLen` characters long,
|
|
|
|
|
// if it is not `storePathHashLen` long then the next character, following
|
|
|
|
|
// the hash part, MUST be a dash (`-`).
|
|
|
|
|
const bool hasLengthMismatch = base.size() != storePathHashLen;
|
|
|
|
|
const bool hasInvalidSuffix =
|
|
|
|
|
base.size() > storePathHashLen && base[storePathHashLen] != '-';
|
|
|
|
|
if (hasLengthMismatch && hasInvalidSuffix) {
|
|
|
|
|
throw Error(format("path '%1%' is not a valid store path") % path);
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
return base.size() == storePathHashLen
|
|
|
|
|
? ""
|
|
|
|
|
: std::string(base, storePathHashLen + 1);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string storePathToHash(const Path& path) {
|
2016-06-01 14:49:12 +02:00
|
|
|
|
auto base = baseNameOf(path);
|
|
|
|
|
assert(base.size() >= storePathHashLen);
|
2020-05-24 23:29:21 +02:00
|
|
|
|
return std::string(base, 0, storePathHashLen);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
void checkStoreName(const std::string& name) {
|
|
|
|
|
std::string validChars = "+-._?=";
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2019-06-27 20:21:22 +02:00
|
|
|
|
auto baseError =
|
2020-05-17 17:31:57 +02:00
|
|
|
|
format(
|
2019-06-27 20:21:22 +02:00
|
|
|
|
"The path name '%2%' is invalid: %3%. "
|
|
|
|
|
"Path names are alphanumeric and can include the symbols %1% "
|
|
|
|
|
"and must not begin with a period. "
|
|
|
|
|
"Note: If '%2%' is a source file and you cannot rename it on "
|
|
|
|
|
"disk, builtins.path { name = ... } can be used to give it an "
|
|
|
|
|
"alternative name.") %
|
|
|
|
|
validChars % name;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2006-11-30 18:43:04 +01:00
|
|
|
|
/* Disallow names starting with a dot for possible security
|
|
|
|
|
reasons (e.g., "." and ".."). */
|
2020-05-24 23:29:21 +02:00
|
|
|
|
if (std::string(name, 0, 1) == ".") {
|
2019-06-27 20:21:22 +02:00
|
|
|
|
throw Error(baseError % "it is illegal to start the name with a period");
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2019-08-28 18:26:08 +02:00
|
|
|
|
/* Disallow names longer than 211 characters. ext4’s max is 256,
|
|
|
|
|
but we need extra space for the hash and .chroot extensions. */
|
|
|
|
|
if (name.length() > 211) {
|
|
|
|
|
throw Error(baseError % "name must be less than 212 characters");
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2015-07-17 19:24:28 +02:00
|
|
|
|
for (auto& i : name) {
|
|
|
|
|
if (!((i >= 'A' && i <= 'Z') || (i >= 'a' && i <= 'z') ||
|
2020-05-24 23:29:21 +02:00
|
|
|
|
(i >= '0' && i <= '9') || validChars.find(i) != std::string::npos)) {
|
2019-06-27 20:21:22 +02:00
|
|
|
|
throw Error(baseError % (format("the '%1%' character is invalid") % i));
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2007-11-29 17:18:24 +01:00
|
|
|
|
}
|
|
|
|
|
|
2008-12-03 16:06:30 +01:00
|
|
|
|
/* Store paths have the following form:
|
|
|
|
|
|
|
|
|
|
<store>/<h>-<name>
|
|
|
|
|
|
|
|
|
|
where
|
|
|
|
|
|
|
|
|
|
<store> = the location of the Nix store, usually /nix/store
|
2015-07-17 19:24:28 +02:00
|
|
|
|
|
2008-12-03 16:06:30 +01:00
|
|
|
|
<name> = a human readable name for the path, typically obtained
|
|
|
|
|
from the name attribute of the derivation, or the name of the
|
2011-07-20 20:10:47 +02:00
|
|
|
|
source file from which the store path is created. For derivation
|
|
|
|
|
outputs other than the default "out" output, the string "-<id>"
|
|
|
|
|
is suffixed to <name>.
|
2015-07-17 19:24:28 +02:00
|
|
|
|
|
2008-12-03 16:06:30 +01:00
|
|
|
|
<h> = base-32 representation of the first 160 bits of a SHA-256
|
|
|
|
|
hash of <s>; the hash part of the store name
|
2015-07-17 19:24:28 +02:00
|
|
|
|
|
2008-12-03 16:06:30 +01:00
|
|
|
|
<s> = the string "<type>:sha256:<h2>:<store>:<name>";
|
|
|
|
|
note that it includes the location of the store as well as the
|
|
|
|
|
name to make sure that changes to either of those are reflected
|
|
|
|
|
in the hash (e.g. you won't get /nix/store/<h>-name1 and
|
|
|
|
|
/nix/store/<h>-name2 with equal hash parts).
|
2015-07-17 19:24:28 +02:00
|
|
|
|
|
2008-12-03 16:06:30 +01:00
|
|
|
|
<type> = one of:
|
|
|
|
|
"text:<r1>:<r2>:...<rN>"
|
|
|
|
|
for plain text files written to the store using
|
|
|
|
|
addTextToStore(); <r1> ... <rN> are the references of the
|
|
|
|
|
path.
|
|
|
|
|
"source"
|
|
|
|
|
for paths copied to the store using addToStore() when recursive
|
|
|
|
|
= true and hashAlgo = "sha256"
|
2011-07-20 20:10:47 +02:00
|
|
|
|
"output:<id>"
|
2008-12-03 16:06:30 +01:00
|
|
|
|
for either the outputs created by derivations, OR paths copied
|
|
|
|
|
to the store using addToStore() with recursive != true or
|
|
|
|
|
hashAlgo != "sha256" (in that case "source" is used; it's
|
2011-07-20 20:10:47 +02:00
|
|
|
|
silly, but it's done that way for compatibility). <id> is the
|
|
|
|
|
name of the output (usually, "out").
|
2008-12-03 16:06:30 +01:00
|
|
|
|
|
|
|
|
|
<h2> = base-16 representation of a SHA-256 hash of:
|
|
|
|
|
if <type> = "text:...":
|
|
|
|
|
the string written to the resulting store path
|
|
|
|
|
if <type> = "source":
|
|
|
|
|
the serialisation of the path from which this store path is
|
|
|
|
|
copied, as returned by hashPath()
|
2016-03-24 11:27:58 +01:00
|
|
|
|
if <type> = "output:<id>":
|
2008-12-03 16:06:30 +01:00
|
|
|
|
for non-fixed derivation outputs:
|
|
|
|
|
the derivation (see hashDerivationModulo() in
|
|
|
|
|
primops.cc)
|
|
|
|
|
for paths copied by addToStore() or produced by fixed-output
|
|
|
|
|
derivations:
|
|
|
|
|
the string "fixed:out:<rec><algo>:<hash>:", where
|
2016-03-24 11:27:58 +01:00
|
|
|
|
<rec> = "r:" for recursive (path) hashes, or "" for flat
|
2008-12-03 16:06:30 +01:00
|
|
|
|
(file) hashes
|
|
|
|
|
<algo> = "md5", "sha1" or "sha256"
|
|
|
|
|
<hash> = base-16 representation of the path or flat hash of
|
|
|
|
|
the contents of the path (or expected contents of the
|
|
|
|
|
path for fixed-output derivations)
|
|
|
|
|
|
|
|
|
|
It would have been nicer to handle fixed-output derivations under
|
|
|
|
|
"source", e.g. have something like "source:<rec><algo>", but we're
|
|
|
|
|
stuck with this for now...
|
|
|
|
|
|
|
|
|
|
The main reason for this way of computing names is to prevent name
|
|
|
|
|
collisions (for security). For instance, it shouldn't be feasible
|
|
|
|
|
to come up with a derivation whose output path collides with the
|
|
|
|
|
path for a copied source. The former would have a <s> starting with
|
2017-05-11 14:02:03 +02:00
|
|
|
|
"output:out:", while the latter would have a <s> starting with
|
2008-12-03 16:06:30 +01:00
|
|
|
|
"source:".
|
|
|
|
|
*/
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
Path Store::makeStorePath(const std::string& type, const Hash& hash,
|
|
|
|
|
const std::string& name) const {
|
2006-11-30 18:43:04 +01:00
|
|
|
|
/* e.g., "source:sha256:1abc...:/nix/store:foo.tar.gz" */
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string s =
|
|
|
|
|
type + ":" + hash.to_string(Base16) + ":" + storeDir + ":" + name;
|
2008-12-03 16:06:30 +01:00
|
|
|
|
|
2017-07-04 14:47:59 +02:00
|
|
|
|
checkStoreName(name);
|
2006-11-30 18:43:04 +01:00
|
|
|
|
|
2016-06-01 14:49:12 +02:00
|
|
|
|
return storeDir + "/" +
|
2017-07-04 14:47:59 +02:00
|
|
|
|
compressHash(hashString(htSHA256, s), 20).to_string(Base32, false) +
|
2008-12-03 16:06:30 +01:00
|
|
|
|
"-" + name;
|
2006-11-30 18:43:04 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
Path Store::makeOutputPath(const std::string& id, const Hash& hash,
|
|
|
|
|
const std::string& name) const {
|
2011-07-20 20:10:47 +02:00
|
|
|
|
return makeStorePath("output:" + id, hash,
|
|
|
|
|
name + (id == "out" ? "" : "-" + id));
|
|
|
|
|
}
|
|
|
|
|
|
2016-06-01 14:49:12 +02:00
|
|
|
|
Path Store::makeFixedOutputPath(bool recursive, const Hash& hash,
|
2020-05-24 23:29:21 +02:00
|
|
|
|
const std::string& name) const {
|
2016-07-26 21:25:52 +02:00
|
|
|
|
return hash.type == htSHA256 && recursive
|
2008-12-03 16:06:30 +01:00
|
|
|
|
? makeStorePath("source", hash, name)
|
|
|
|
|
: makeStorePath(
|
|
|
|
|
"output:out",
|
2020-05-24 23:29:21 +02:00
|
|
|
|
hashString(
|
|
|
|
|
htSHA256,
|
2020-08-02 02:17:44 +02:00
|
|
|
|
absl::StrCat("fixed:out:", (recursive ? "r:" : ""),
|
|
|
|
|
hash.to_string(Base16), ":")),
|
2008-12-03 16:06:30 +01:00
|
|
|
|
name);
|
2006-11-30 18:43:04 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
Path Store::makeTextPath(const std::string& name, const Hash& hash,
|
2016-08-03 13:17:11 +02:00
|
|
|
|
const PathSet& references) const {
|
|
|
|
|
assert(hash.type == htSHA256);
|
|
|
|
|
/* Stuff the references (if any) into the type. This is a bit
|
|
|
|
|
hacky, but we can't put them in `s' since that would be
|
|
|
|
|
ambiguous. */
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string type = "text";
|
2016-08-03 13:17:11 +02:00
|
|
|
|
for (auto& i : references) {
|
|
|
|
|
type += ":";
|
|
|
|
|
type += i;
|
|
|
|
|
}
|
|
|
|
|
return makeStorePath(type, hash, name);
|
2006-12-01 19:00:01 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::pair<Path, Hash> Store::computeStorePathForPath(const std::string& name,
|
2016-06-01 14:49:12 +02:00
|
|
|
|
const Path& srcPath,
|
|
|
|
|
bool recursive,
|
2018-01-25 16:05:57 +01:00
|
|
|
|
HashType hashAlgo,
|
2016-06-01 14:49:12 +02:00
|
|
|
|
PathFilter& filter) const {
|
2016-08-03 13:17:11 +02:00
|
|
|
|
Hash h = recursive ? hashPath(hashAlgo, srcPath, filter).first
|
2016-07-26 21:25:52 +02:00
|
|
|
|
: hashFile(hashAlgo, srcPath);
|
2016-08-03 13:17:11 +02:00
|
|
|
|
Path dstPath = makeFixedOutputPath(recursive, h, name);
|
|
|
|
|
return std::pair<Path, Hash>(dstPath, h);
|
2006-12-01 19:00:01 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
Path Store::computeStorePathForText(const std::string& name,
|
|
|
|
|
const std::string& s,
|
2017-04-13 15:55:38 +02:00
|
|
|
|
const PathSet& references) const {
|
|
|
|
|
return makeTextPath(name, hashString(htSHA256, s), references);
|
2016-06-01 14:49:12 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Store::Store(const Params& params)
|
2016-04-20 14:12:38 +02:00
|
|
|
|
: Config(params), state({(size_t)pathInfoCacheSize}) {}
|
2016-06-01 14:49:12 +02:00
|
|
|
|
|
2016-04-20 14:12:38 +02:00
|
|
|
|
std::string Store::getUri() { return ""; }
|
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
|
bool Store::isValidPath(const Path& storePath) {
|
2018-03-27 16:12:00 +02:00
|
|
|
|
assertStorePath(storePath);
|
|
|
|
|
|
2016-04-21 17:53:47 +02:00
|
|
|
|
auto hashPart = storePathToHash(storePath);
|
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
|
{
|
|
|
|
|
auto state_(state.lock());
|
2016-04-21 17:53:47 +02:00
|
|
|
|
auto res = state_->pathInfoCache.get(hashPart);
|
2016-04-19 18:50:15 +02:00
|
|
|
|
if (res) {
|
|
|
|
|
stats.narInfoReadAverted++;
|
2020-05-20 05:33:07 +02:00
|
|
|
|
return *res != nullptr;
|
2016-04-19 18:50:15 +02:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2016-04-20 14:12:38 +02:00
|
|
|
|
if (diskCache) {
|
2016-04-21 17:53:47 +02:00
|
|
|
|
auto res = diskCache->lookupNarInfo(getUri(), hashPart);
|
2016-04-20 14:12:38 +02:00
|
|
|
|
if (res.first != NarInfoDiskCache::oUnknown) {
|
2016-04-21 17:53:47 +02:00
|
|
|
|
stats.narInfoReadAverted++;
|
2016-04-20 14:12:38 +02:00
|
|
|
|
auto state_(state.lock());
|
2016-04-21 17:53:47 +02:00
|
|
|
|
state_->pathInfoCache.upsert(
|
2020-05-20 05:33:07 +02:00
|
|
|
|
hashPart,
|
|
|
|
|
res.first == NarInfoDiskCache::oInvalid ? nullptr : res.second);
|
2016-04-20 14:12:38 +02:00
|
|
|
|
return res.first == NarInfoDiskCache::oValid;
|
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-04-20 14:12:38 +02:00
|
|
|
|
|
2016-06-20 17:39:05 +02:00
|
|
|
|
bool valid = isValidPathUncached(storePath);
|
2016-04-20 14:12:38 +02:00
|
|
|
|
|
2016-06-20 17:39:05 +02:00
|
|
|
|
if (diskCache && !valid) {
|
|
|
|
|
// FIXME: handle valid = true case.
|
2020-05-20 05:33:07 +02:00
|
|
|
|
diskCache->upsertNarInfo(getUri(), hashPart, nullptr);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2016-06-20 17:39:05 +02:00
|
|
|
|
|
|
|
|
|
return valid;
|
2016-04-19 18:50:15 +02:00
|
|
|
|
}
|
|
|
|
|
|
2017-02-07 19:22:48 +01:00
|
|
|
|
/* Default implementation for stores that only implement
|
|
|
|
|
queryPathInfoUncached(). */
|
|
|
|
|
bool Store::isValidPathUncached(const Path& path) {
|
|
|
|
|
try {
|
|
|
|
|
queryPathInfo(path);
|
|
|
|
|
return true;
|
|
|
|
|
} catch (InvalidPath&) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
|
ref<const ValidPathInfo> Store::queryPathInfo(const Path& storePath) {
|
2016-09-16 18:54:14 +02:00
|
|
|
|
std::promise<ref<ValidPathInfo>> promise;
|
2017-02-07 19:22:48 +01:00
|
|
|
|
|
2018-03-27 22:16:01 +02:00
|
|
|
|
queryPathInfo(storePath, {[&](std::future<ref<ValidPathInfo>> result) {
|
|
|
|
|
try {
|
|
|
|
|
promise.set_value(result.get());
|
|
|
|
|
} catch (...) {
|
|
|
|
|
promise.set_exception(std::current_exception());
|
|
|
|
|
}
|
|
|
|
|
}});
|
2016-09-16 18:54:14 +02:00
|
|
|
|
|
|
|
|
|
return promise.get_future().get();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void Store::queryPathInfo(const Path& storePath,
|
2019-09-03 13:00:55 +02:00
|
|
|
|
Callback<ref<ValidPathInfo>> callback) noexcept {
|
|
|
|
|
std::string hashPart;
|
2016-09-16 18:54:14 +02:00
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
assertStorePath(storePath);
|
2016-04-21 17:53:47 +02:00
|
|
|
|
|
2019-09-03 13:00:55 +02:00
|
|
|
|
hashPart = storePathToHash(storePath);
|
|
|
|
|
|
2020-05-17 17:31:57 +02:00
|
|
|
|
{
|
2019-09-03 13:00:55 +02:00
|
|
|
|
auto res = state.lock()->pathInfoCache.get(hashPart);
|
2016-09-16 18:54:14 +02:00
|
|
|
|
if (res) {
|
|
|
|
|
stats.narInfoReadAverted++;
|
|
|
|
|
if (!*res) {
|
2019-09-03 13:00:55 +02:00
|
|
|
|
throw InvalidPath(format("path '%s' is not valid") % storePath);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2018-03-27 22:16:01 +02:00
|
|
|
|
return callback(ref<ValidPathInfo>(*res));
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
2016-09-16 18:54:14 +02:00
|
|
|
|
|
|
|
|
|
if (diskCache) {
|
|
|
|
|
auto res = diskCache->lookupNarInfo(getUri(), hashPart);
|
|
|
|
|
if (res.first != NarInfoDiskCache::oUnknown) {
|
|
|
|
|
stats.narInfoReadAverted++;
|
|
|
|
|
{
|
|
|
|
|
auto state_(state.lock());
|
|
|
|
|
state_->pathInfoCache.upsert(
|
|
|
|
|
hashPart,
|
2020-05-20 05:33:07 +02:00
|
|
|
|
res.first == NarInfoDiskCache::oInvalid ? nullptr : res.second);
|
2016-09-16 18:54:14 +02:00
|
|
|
|
if (res.first == NarInfoDiskCache::oInvalid ||
|
|
|
|
|
(res.second->path != storePath &&
|
2020-05-20 23:27:37 +02:00
|
|
|
|
!storePathToName(storePath).empty())) {
|
2017-07-30 13:27:57 +02:00
|
|
|
|
throw InvalidPath(format("path '%s' is not valid") % storePath);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2016-04-20 14:12:38 +02:00
|
|
|
|
}
|
2018-03-27 22:16:01 +02:00
|
|
|
|
return callback(ref<ValidPathInfo>(res.second));
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
2016-09-16 18:54:14 +02:00
|
|
|
|
|
2018-03-27 22:16:01 +02:00
|
|
|
|
} catch (...) {
|
2019-09-03 12:51:35 +02:00
|
|
|
|
return callback.rethrow();
|
2018-03-27 22:16:01 +02:00
|
|
|
|
}
|
2016-02-15 14:48:38 +01:00
|
|
|
|
|
2019-09-03 12:51:35 +02:00
|
|
|
|
auto callbackPtr = std::make_shared<decltype(callback)>(std::move(callback));
|
2016-02-15 14:48:38 +01:00
|
|
|
|
|
2017-06-28 18:11:01 +02:00
|
|
|
|
queryPathInfoUncached(
|
|
|
|
|
storePath, {[this, storePath, hashPart, callbackPtr](
|
|
|
|
|
std::future<std::shared_ptr<ValidPathInfo>> fut) {
|
2016-10-07 19:43:36 +02:00
|
|
|
|
try {
|
|
|
|
|
auto info = fut.get();
|
2016-10-07 19:20:47 +02:00
|
|
|
|
|
2016-10-07 19:43:36 +02:00
|
|
|
|
if (diskCache) {
|
|
|
|
|
diskCache->upsertNarInfo(getUri(), hashPart, info);
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2016-10-07 19:43:36 +02:00
|
|
|
|
|
2020-05-17 17:31:57 +02:00
|
|
|
|
{
|
2016-09-16 18:54:14 +02:00
|
|
|
|
auto state_(state.lock());
|
2018-03-27 22:16:01 +02:00
|
|
|
|
state_->pathInfoCache.upsert(hashPart, info);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (!info || (info->path != storePath &&
|
|
|
|
|
!storePathToName(storePath).empty())) {
|
2018-03-27 22:16:01 +02:00
|
|
|
|
stats.narInfoMissing++;
|
|
|
|
|
throw InvalidPath("path '%s' is not valid", storePath);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2019-09-03 12:51:35 +02:00
|
|
|
|
(*callbackPtr)(ref<ValidPathInfo>(info));
|
|
|
|
|
} catch (...) {
|
|
|
|
|
callbackPtr->rethrow();
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
}});
|
|
|
|
|
}
|
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
|
PathSet Store::queryValidPaths(const PathSet& paths,
|
2017-06-28 18:11:01 +02:00
|
|
|
|
SubstituteFlag maybeSubstitute) {
|
2016-10-07 19:43:36 +02:00
|
|
|
|
struct State {
|
|
|
|
|
size_t left;
|
|
|
|
|
PathSet valid;
|
|
|
|
|
std::exception_ptr exc;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
};
|
|
|
|
|
|
2016-10-07 19:43:36 +02:00
|
|
|
|
Sync<State> state_(State{paths.size(), PathSet()});
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2016-10-07 19:43:36 +02:00
|
|
|
|
std::condition_variable wakeup;
|
2017-10-25 17:13:49 +02:00
|
|
|
|
ThreadPool pool;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2017-10-25 17:13:49 +02:00
|
|
|
|
auto doQuery = [&](const Path& path) {
|
2017-10-25 17:51:45 +02:00
|
|
|
|
checkInterrupt();
|
2018-03-27 22:16:01 +02:00
|
|
|
|
queryPathInfo(
|
|
|
|
|
path, {[path, &state_, &wakeup](std::future<ref<ValidPathInfo>> fut) {
|
|
|
|
|
auto state(state_.lock());
|
|
|
|
|
try {
|
|
|
|
|
auto info = fut.get();
|
2016-10-07 19:43:36 +02:00
|
|
|
|
state->valid.insert(path);
|
2018-03-27 22:16:01 +02:00
|
|
|
|
} catch (InvalidPath&) {
|
|
|
|
|
} catch (...) {
|
|
|
|
|
state->exc = std::current_exception();
|
|
|
|
|
}
|
|
|
|
|
assert(state->left);
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (--state->left == 0u) {
|
2018-03-27 22:16:01 +02:00
|
|
|
|
wakeup.notify_one();
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2018-03-27 22:16:01 +02:00
|
|
|
|
}});
|
2017-10-25 17:13:49 +02:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
for (auto& path : paths) {
|
|
|
|
|
pool.enqueue(std::bind(doQuery, path));
|
2020-05-19 20:04:08 +02:00
|
|
|
|
}
|
2017-10-25 17:13:49 +02:00
|
|
|
|
|
|
|
|
|
pool.process();
|
2016-10-07 19:43:36 +02:00
|
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
|
auto state(state_.lock());
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (state->left == 0u) {
|
2016-10-07 19:43:36 +02:00
|
|
|
|
if (state->exc) {
|
|
|
|
|
std::rethrow_exception(state->exc);
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2016-10-07 19:43:36 +02:00
|
|
|
|
return state->valid;
|
|
|
|
|
}
|
|
|
|
|
state.wait(wakeup);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-10-07 19:20:47 +02:00
|
|
|
|
}
|
|
|
|
|
|
2008-01-29 19:17:36 +01:00
|
|
|
|
/* Return a string accepted by decodeValidPathInfo() that
|
|
|
|
|
registers the specified paths as valid. Note: it's the
|
|
|
|
|
responsibility of the caller to provide a closure. */
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string Store::makeValidityRegistration(const PathSet& paths,
|
|
|
|
|
bool showDerivers, bool showHash) {
|
2020-07-17 03:19:21 +02:00
|
|
|
|
std::string s;
|
2008-01-29 19:17:36 +01:00
|
|
|
|
|
2015-07-17 19:24:28 +02:00
|
|
|
|
for (auto& i : paths) {
|
|
|
|
|
s += i + "\n";
|
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
|
auto info = queryPathInfo(i);
|
2008-01-29 19:17:36 +01:00
|
|
|
|
|
2010-11-16 18:11:46 +01:00
|
|
|
|
if (showHash) {
|
2017-07-04 14:47:59 +02:00
|
|
|
|
s += info->narHash.to_string(Base16, false) + "\n";
|
2016-04-19 18:50:15 +02:00
|
|
|
|
s += (format("%1%\n") % info->narSize).str();
|
2008-01-29 19:17:36 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Path deriver = showDerivers ? info->deriver : "";
|
|
|
|
|
s += deriver + "\n";
|
|
|
|
|
|
2017-07-14 15:27:21 +02:00
|
|
|
|
s += (format("%1%\n") % info->references.size()).str();
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
|
|
|
|
for (auto& j : info->references) {
|
|
|
|
|
s += j + "\n";
|
2020-05-19 20:04:08 +02:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2017-07-14 15:27:21 +02:00
|
|
|
|
return s;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2017-07-14 15:27:21 +02:00
|
|
|
|
void Store::pathInfoToJSON(JSONPlaceholder& jsonOut, const PathSet& storePaths,
|
|
|
|
|
bool includeImpureInfo, bool showClosureSize,
|
|
|
|
|
AllowInvalidFlag allowInvalid) {
|
|
|
|
|
auto jsonList = jsonOut.list();
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2017-07-14 15:27:21 +02:00
|
|
|
|
for (auto storePath : storePaths) {
|
|
|
|
|
auto jsonPath = jsonList.object();
|
|
|
|
|
jsonPath.attr("path", storePath);
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2020-05-17 17:31:57 +02:00
|
|
|
|
try {
|
2017-07-14 17:36:49 +02:00
|
|
|
|
auto info = queryPathInfo(storePath);
|
|
|
|
|
storePath = info->path;
|
|
|
|
|
|
|
|
|
|
jsonPath.attr("narHash", info->narHash.to_string())
|
|
|
|
|
.attr("narSize", info->narSize);
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2017-07-14 15:27:21 +02:00
|
|
|
|
{
|
|
|
|
|
auto jsonRefs = jsonPath.list("references");
|
|
|
|
|
for (auto& ref : info->references) {
|
|
|
|
|
jsonRefs.elem(ref);
|
2020-05-19 20:04:08 +02:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (!info->ca.empty()) {
|
2017-07-14 15:27:21 +02:00
|
|
|
|
jsonPath.attr("ca", info->ca);
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2017-07-14 15:27:21 +02:00
|
|
|
|
|
|
|
|
|
std::pair<uint64_t, uint64_t> closureSizes;
|
|
|
|
|
|
|
|
|
|
if (showClosureSize) {
|
|
|
|
|
closureSizes = getClosureSize(storePath);
|
|
|
|
|
jsonPath.attr("closureSize", closureSizes.first);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2017-07-14 15:27:21 +02:00
|
|
|
|
|
|
|
|
|
if (includeImpureInfo) {
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (!info->deriver.empty()) {
|
2017-07-14 15:27:21 +02:00
|
|
|
|
jsonPath.attr("deriver", info->deriver);
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2017-05-08 13:36:23 +02:00
|
|
|
|
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (info->registrationTime != 0) {
|
2017-07-14 17:36:49 +02:00
|
|
|
|
jsonPath.attr("registrationTime", info->registrationTime);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2017-07-14 17:36:49 +02:00
|
|
|
|
|
|
|
|
|
if (info->ultimate) {
|
|
|
|
|
jsonPath.attr("ultimate", info->ultimate);
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2017-07-14 15:27:21 +02:00
|
|
|
|
if (!info->sigs.empty()) {
|
|
|
|
|
auto jsonSigs = jsonPath.list("signatures");
|
|
|
|
|
for (auto& sig : info->sigs) {
|
|
|
|
|
jsonSigs.elem(sig);
|
2020-05-19 20:04:08 +02:00
|
|
|
|
}
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
}
|
|
|
|
|
|
2017-07-14 17:36:49 +02:00
|
|
|
|
auto narInfo = std::dynamic_pointer_cast<const NarInfo>(
|
|
|
|
|
std::shared_ptr<const ValidPathInfo>(info));
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2017-07-14 17:36:49 +02:00
|
|
|
|
if (narInfo) {
|
2017-11-24 18:08:50 +01:00
|
|
|
|
if (!narInfo->url.empty()) {
|
|
|
|
|
jsonPath.attr("url", narInfo->url);
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2017-07-14 17:36:49 +02:00
|
|
|
|
if (narInfo->fileHash) {
|
|
|
|
|
jsonPath.attr("downloadHash", narInfo->fileHash.to_string());
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (narInfo->fileSize != 0u) {
|
2017-07-14 17:36:49 +02:00
|
|
|
|
jsonPath.attr("downloadSize", narInfo->fileSize);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2017-07-14 17:36:49 +02:00
|
|
|
|
if (showClosureSize) {
|
|
|
|
|
jsonPath.attr("closureDownloadSize", closureSizes.second);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
exportReferencesGraph: Export more complete info in JSON format
This writes info about every path in the closure in the same format as
‘nix path-info --json’. Thus it also includes NAR hashes and sizes.
Example:
[
{
"path": "/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"narHash": "sha256:0ckdc4z20kkmpqdilx0wl6cricxv90lh85xpv2qljppcmz6vzcxl",
"narSize": 197648,
"references": [
"/nix/store/10h6li26i7g6z3mdpvra09yyf10mmzdr-hello-2.10",
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20939776
},
{
"path": "/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24",
"narHash": "sha256:1nfn3m3p98y1c0kd0brp80dn9n5mycwgrk183j17rajya0h7gax3",
"narSize": 20742128,
"references": [
"/nix/store/27binbdy296qvjycdgr1535v8872vz3z-glibc-2.24"
],
"closureSize": 20742128
}
]
Fixes #1134.
2017-01-26 20:36:20 +01:00
|
|
|
|
|
2016-04-20 14:12:38 +02:00
|
|
|
|
} catch (InvalidPath&) {
|
|
|
|
|
jsonPath.attr("valid", false);
|
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-04-19 18:50:15 +02:00
|
|
|
|
}
|
|
|
|
|
|
2017-05-01 13:43:34 +02:00
|
|
|
|
std::pair<uint64_t, uint64_t> Store::getClosureSize(const Path& storePath) {
|
2020-05-20 23:27:37 +02:00
|
|
|
|
uint64_t totalNarSize = 0;
|
|
|
|
|
uint64_t totalDownloadSize = 0;
|
2017-05-01 13:43:34 +02:00
|
|
|
|
PathSet closure;
|
|
|
|
|
computeFSClosure(storePath, closure, false, false);
|
|
|
|
|
for (auto& p : closure) {
|
|
|
|
|
auto info = queryPathInfo(p);
|
2017-07-14 17:36:49 +02:00
|
|
|
|
totalNarSize += info->narSize;
|
|
|
|
|
auto narInfo = std::dynamic_pointer_cast<const NarInfo>(
|
2017-05-01 13:43:34 +02:00
|
|
|
|
std::shared_ptr<const ValidPathInfo>(info));
|
|
|
|
|
if (narInfo) {
|
|
|
|
|
totalDownloadSize += narInfo->fileSize;
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2019-01-18 13:34:23 +01:00
|
|
|
|
return {totalNarSize, totalDownloadSize};
|
2017-05-01 13:43:34 +02:00
|
|
|
|
}
|
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
|
const Store::Stats& Store::getStats() {
|
2020-05-17 17:31:57 +02:00
|
|
|
|
{
|
2016-04-20 14:12:38 +02:00
|
|
|
|
auto state_(state.lock());
|
|
|
|
|
stats.pathInfoCacheSize = state_->pathInfoCache.size();
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-04-19 18:50:15 +02:00
|
|
|
|
return stats;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2017-05-01 13:43:34 +02:00
|
|
|
|
|
2017-06-28 18:11:01 +02:00
|
|
|
|
void Store::buildPaths(const PathSet& paths, BuildMode buildMode) {
|
2019-07-10 19:46:15 +02:00
|
|
|
|
for (auto& path : paths) {
|
|
|
|
|
if (isDerivation(path)) {
|
|
|
|
|
unsupported("buildPaths");
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2017-02-07 19:23:16 +01:00
|
|
|
|
|
2019-07-10 19:46:15 +02:00
|
|
|
|
if (queryValidPaths(paths).size() != paths.size()) {
|
|
|
|
|
unsupported("buildPaths");
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2019-07-10 19:46:15 +02:00
|
|
|
|
}
|
2017-05-01 20:03:25 +02:00
|
|
|
|
|
2020-05-20 23:58:43 +02:00
|
|
|
|
void copyStorePath(ref<Store> srcStore, const ref<Store>& dstStore,
|
2019-07-10 19:46:15 +02:00
|
|
|
|
const Path& storePath, RepairFlag repair,
|
|
|
|
|
CheckSigsFlag checkSigs) {
|
|
|
|
|
auto srcUri = srcStore->getUri();
|
|
|
|
|
auto dstUri = dstStore->getUri();
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2020-05-19 02:02:44 +02:00
|
|
|
|
if (srcUri == "local" || srcUri == "daemon") {
|
|
|
|
|
LOG(INFO) << "copying path '" << storePath << "' to '" << dstUri << "'";
|
|
|
|
|
} else {
|
|
|
|
|
if (dstUri == "local" || dstUri == "daemon") {
|
|
|
|
|
LOG(INFO) << "copying path '" << storePath << "' from '" << srcUri << "'";
|
|
|
|
|
} else {
|
|
|
|
|
LOG(INFO) << "copying path '" << storePath << "' from '" << srcUri
|
|
|
|
|
<< "' to '" << dstUri << "'";
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2019-07-10 19:46:15 +02:00
|
|
|
|
auto info = srcStore->queryPathInfo(storePath);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2019-07-10 19:46:15 +02:00
|
|
|
|
uint64_t total = 0;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2019-07-10 19:46:15 +02:00
|
|
|
|
if (!info->narHash) {
|
|
|
|
|
StringSink sink;
|
|
|
|
|
srcStore->narFromPath({storePath}, sink);
|
|
|
|
|
auto info2 = make_ref<ValidPathInfo>(*info);
|
|
|
|
|
info2->narHash = hashString(htSHA256, *sink.s);
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (info->narSize == 0u) {
|
2019-07-10 19:46:15 +02:00
|
|
|
|
info2->narSize = sink.s->size();
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2019-07-10 19:46:15 +02:00
|
|
|
|
if (info->ultimate) {
|
|
|
|
|
info2->ultimate = false;
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2019-07-10 19:46:15 +02:00
|
|
|
|
info = info2;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2019-07-10 19:46:15 +02:00
|
|
|
|
StringSource source(*sink.s);
|
|
|
|
|
dstStore->addToStore(*info, source, repair, checkSigs);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-07-10 19:46:15 +02:00
|
|
|
|
if (info->ultimate) {
|
|
|
|
|
auto info2 = make_ref<ValidPathInfo>(*info);
|
|
|
|
|
info2->ultimate = false;
|
|
|
|
|
info = info2;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2019-07-10 19:46:15 +02:00
|
|
|
|
auto source = sinkToSource(
|
|
|
|
|
[&](Sink& sink) {
|
|
|
|
|
LambdaSink wrapperSink([&](const unsigned char* data, size_t len) {
|
|
|
|
|
sink(data, len);
|
|
|
|
|
total += len;
|
2018-03-16 20:22:34 +01:00
|
|
|
|
});
|
2019-07-10 19:46:15 +02:00
|
|
|
|
srcStore->narFromPath({storePath}, wrapperSink);
|
|
|
|
|
},
|
|
|
|
|
[&]() {
|
|
|
|
|
throw EndOfFile("NAR for '%s' fetched from '%s' is incomplete",
|
|
|
|
|
storePath, srcStore->getUri());
|
2019-06-24 21:48:52 +02:00
|
|
|
|
});
|
2019-07-10 19:46:15 +02:00
|
|
|
|
|
|
|
|
|
dstStore->addToStore(*info, *source, repair, checkSigs);
|
2016-05-03 14:45:50 +02:00
|
|
|
|
}
|
|
|
|
|
|
2017-06-28 18:11:01 +02:00
|
|
|
|
void copyPaths(ref<Store> srcStore, ref<Store> dstStore,
|
|
|
|
|
const PathSet& storePaths, RepairFlag repair,
|
|
|
|
|
CheckSigsFlag checkSigs, SubstituteFlag substitute) {
|
|
|
|
|
PathSet valid = dstStore->queryValidPaths(storePaths, substitute);
|
2016-05-03 14:45:50 +02:00
|
|
|
|
|
2017-06-28 18:11:01 +02:00
|
|
|
|
PathSet missing;
|
|
|
|
|
for (auto& path : storePaths) {
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (valid.count(path) == 0u) {
|
2017-06-28 18:11:01 +02:00
|
|
|
|
missing.insert(path);
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2017-06-28 18:11:01 +02:00
|
|
|
|
|
|
|
|
|
if (missing.empty()) {
|
|
|
|
|
return;
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2016-10-07 19:15:25 +02:00
|
|
|
|
|
2020-05-19 02:02:44 +02:00
|
|
|
|
LOG(INFO) << "copying " << missing.size() << " paths";
|
2017-10-18 15:02:58 +02:00
|
|
|
|
|
2017-08-28 19:13:24 +02:00
|
|
|
|
std::atomic<size_t> nrDone{0};
|
|
|
|
|
std::atomic<size_t> nrFailed{0};
|
|
|
|
|
std::atomic<uint64_t> bytesExpected{0};
|
|
|
|
|
std::atomic<uint64_t> nrRunning{0};
|
2017-08-14 15:28:16 +02:00
|
|
|
|
|
2018-07-24 17:03:54 +02:00
|
|
|
|
ThreadPool pool;
|
2017-08-14 15:28:16 +02:00
|
|
|
|
|
2017-06-28 18:11:01 +02:00
|
|
|
|
processGraph<Path>(
|
|
|
|
|
pool, PathSet(missing.begin(), missing.end()),
|
2017-03-16 13:50:01 +01:00
|
|
|
|
|
2017-06-28 18:11:01 +02:00
|
|
|
|
[&](const Path& storePath) {
|
2017-08-14 15:28:16 +02:00
|
|
|
|
if (dstStore->isValidPath(storePath)) {
|
|
|
|
|
nrDone++;
|
2017-06-28 18:11:01 +02:00
|
|
|
|
return PathSet();
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-10-07 19:15:25 +02:00
|
|
|
|
|
2017-08-14 15:28:16 +02:00
|
|
|
|
auto info = srcStore->queryPathInfo(storePath);
|
2017-08-14 19:00:03 +02:00
|
|
|
|
|
|
|
|
|
bytesExpected += info->narSize;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2017-08-14 19:00:03 +02:00
|
|
|
|
return info->references;
|
2017-06-28 18:11:01 +02:00
|
|
|
|
},
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2017-06-28 18:11:01 +02:00
|
|
|
|
[&](const Path& storePath) {
|
2018-07-24 17:03:54 +02:00
|
|
|
|
checkInterrupt();
|
2017-08-14 15:28:16 +02:00
|
|
|
|
|
2017-06-28 18:11:01 +02:00
|
|
|
|
if (!dstStore->isValidPath(storePath)) {
|
2017-08-14 22:42:17 +02:00
|
|
|
|
MaintainCount<decltype(nrRunning)> mc(nrRunning);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
try {
|
2018-07-24 17:03:54 +02:00
|
|
|
|
copyStorePath(srcStore, dstStore, storePath, repair, checkSigs);
|
2018-02-09 14:36:38 +01:00
|
|
|
|
} catch (Error& e) {
|
2017-08-14 15:28:16 +02:00
|
|
|
|
nrFailed++;
|
2018-07-24 17:03:54 +02:00
|
|
|
|
if (!settings.keepGoing) {
|
|
|
|
|
throw e;
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2020-05-19 02:02:44 +02:00
|
|
|
|
LOG(ERROR) << "could not copy " << storePath << ": " << e.what();
|
2017-06-28 18:11:01 +02:00
|
|
|
|
return;
|
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-10-07 19:15:25 +02:00
|
|
|
|
|
2017-08-14 15:28:16 +02:00
|
|
|
|
nrDone++;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
});
|
|
|
|
|
}
|
2016-10-07 19:15:25 +02:00
|
|
|
|
|
2020-05-20 23:58:43 +02:00
|
|
|
|
void copyClosure(const ref<Store>& srcStore, const ref<Store>& dstStore,
|
2017-06-28 18:11:01 +02:00
|
|
|
|
const PathSet& storePaths, RepairFlag repair,
|
|
|
|
|
CheckSigsFlag checkSigs, SubstituteFlag substitute) {
|
|
|
|
|
PathSet closure;
|
|
|
|
|
srcStore->computeFSClosure({storePaths}, closure);
|
|
|
|
|
copyPaths(srcStore, dstStore, closure, repair, checkSigs, substitute);
|
2016-10-07 19:15:25 +02:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2008-01-29 19:17:36 +01:00
|
|
|
|
ValidPathInfo decodeValidPathInfo(std::istream& str, bool hashGiven) {
|
2007-08-12 02:29:28 +02:00
|
|
|
|
ValidPathInfo info;
|
|
|
|
|
getline(str, info.path);
|
|
|
|
|
if (str.eof()) {
|
|
|
|
|
info.path = "";
|
|
|
|
|
return info;
|
|
|
|
|
}
|
2008-06-09 15:52:45 +02:00
|
|
|
|
if (hashGiven) {
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string s;
|
2015-07-17 19:24:28 +02:00
|
|
|
|
getline(str, s);
|
2020-07-28 04:57:04 +02:00
|
|
|
|
auto hash_ = Hash::deserialize(s, htSHA256);
|
|
|
|
|
info.narHash = Hash::unwrap_throw(hash_);
|
2008-06-09 15:52:45 +02:00
|
|
|
|
getline(str, s);
|
2020-05-25 02:19:02 +02:00
|
|
|
|
if (!absl::SimpleAtoi(s, &info.narSize)) {
|
2008-06-09 15:52:45 +02:00
|
|
|
|
throw Error("number expected");
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2007-08-12 02:29:28 +02:00
|
|
|
|
getline(str, info.deriver);
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string s;
|
2020-08-02 00:32:00 +02:00
|
|
|
|
int n;
|
2008-01-29 19:17:36 +01:00
|
|
|
|
getline(str, s);
|
2020-05-25 02:19:02 +02:00
|
|
|
|
if (!absl::SimpleAtoi(s, &n)) {
|
2007-08-12 02:29:28 +02:00
|
|
|
|
throw Error("number expected");
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2020-05-20 23:27:37 +02:00
|
|
|
|
while ((n--) != 0) {
|
2008-01-29 19:17:36 +01:00
|
|
|
|
getline(str, s);
|
2007-08-12 02:29:28 +02:00
|
|
|
|
info.references.insert(s);
|
2008-06-09 15:52:45 +02:00
|
|
|
|
}
|
|
|
|
|
if (!str || str.eof()) {
|
|
|
|
|
throw Error("missing input");
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2008-06-09 15:52:45 +02:00
|
|
|
|
return info;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-24 23:29:21 +02:00
|
|
|
|
std::string showPaths(const PathSet& paths) {
|
|
|
|
|
std::string s;
|
2017-07-30 13:27:57 +02:00
|
|
|
|
for (auto& i : paths) {
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (!s.empty()) {
|
2017-07-30 13:27:57 +02:00
|
|
|
|
s += ", ";
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2016-04-05 16:39:29 +02:00
|
|
|
|
s += "'" + i + "'";
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-03-24 11:41:00 +01:00
|
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::string ValidPathInfo::fingerprint() const {
|
|
|
|
|
if (narSize == 0 || !narHash) {
|
|
|
|
|
throw Error(format("cannot calculate fingerprint of path '%s' because its "
|
|
|
|
|
"size/hash is not known") %
|
2020-05-17 17:31:57 +02:00
|
|
|
|
path);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2016-03-24 11:41:00 +01:00
|
|
|
|
return "1;" + path + ";" + narHash.to_string(Base32) + ";" +
|
|
|
|
|
std::to_string(narSize) + ";" + concatStringsSep(",", references);
|
|
|
|
|
}
|
|
|
|
|
|
2016-08-03 13:17:11 +02:00
|
|
|
|
void ValidPathInfo::sign(const SecretKey& secretKey) {
|
2017-07-04 14:47:59 +02:00
|
|
|
|
sigs.insert(secretKey.signDetached(fingerprint()));
|
2016-08-03 13:17:11 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool ValidPathInfo::isContentAddressed(const Store& store) const {
|
|
|
|
|
auto warn = [&]() {
|
2020-05-19 02:02:44 +02:00
|
|
|
|
LOG(ERROR) << "warning: path '" << path
|
|
|
|
|
<< "' claims to be content-addressed but isn't";
|
2020-05-17 17:31:57 +02:00
|
|
|
|
};
|
2016-08-03 13:17:11 +02:00
|
|
|
|
|
2020-05-25 03:19:01 +02:00
|
|
|
|
if (absl::StartsWith(ca, "text:")) {
|
2020-07-28 04:57:04 +02:00
|
|
|
|
auto hash_ = Hash::deserialize(std::string_view(ca).substr(5));
|
|
|
|
|
Hash hash = Hash::unwrap_throw(hash_);
|
2016-08-03 13:17:11 +02:00
|
|
|
|
if (store.makeTextPath(storePathToName(path), hash, references) == path) {
|
|
|
|
|
return true;
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2020-05-20 23:27:37 +02:00
|
|
|
|
warn();
|
|
|
|
|
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-25 03:19:01 +02:00
|
|
|
|
else if (absl::StartsWith(ca, "fixed:")) {
|
2016-08-03 13:17:11 +02:00
|
|
|
|
bool recursive = ca.compare(6, 2, "r:") == 0;
|
2020-07-28 04:57:04 +02:00
|
|
|
|
auto hash_ =
|
|
|
|
|
Hash::deserialize(std::string_view(ca).substr(recursive ? 8 : 6));
|
|
|
|
|
Hash hash = Hash::unwrap_throw(hash_);
|
2016-08-03 13:17:11 +02:00
|
|
|
|
if (references.empty() &&
|
|
|
|
|
store.makeFixedOutputPath(recursive, hash, storePathToName(path)) ==
|
|
|
|
|
path) {
|
|
|
|
|
return true;
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2020-05-20 23:27:37 +02:00
|
|
|
|
warn();
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-08-03 13:17:11 +02:00
|
|
|
|
|
2016-03-24 11:41:00 +01:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2016-04-07 15:14:12 +02:00
|
|
|
|
size_t ValidPathInfo::checkSignatures(const Store& store,
|
|
|
|
|
const PublicKeys& publicKeys) const {
|
2016-08-03 13:17:11 +02:00
|
|
|
|
if (isContentAddressed(store)) {
|
|
|
|
|
return maxSigs;
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2016-03-24 11:41:00 +01:00
|
|
|
|
|
2016-04-07 15:14:12 +02:00
|
|
|
|
size_t good = 0;
|
|
|
|
|
for (auto& sig : sigs) {
|
|
|
|
|
if (checkSignature(publicKeys, sig)) {
|
|
|
|
|
good++;
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2016-04-07 15:14:12 +02:00
|
|
|
|
return good;
|
|
|
|
|
}
|
|
|
|
|
|
2016-04-20 14:12:38 +02:00
|
|
|
|
bool ValidPathInfo::checkSignature(const PublicKeys& publicKeys,
|
|
|
|
|
const std::string& sig) const {
|
|
|
|
|
return verifyDetached(fingerprint(), sig, publicKeys);
|
|
|
|
|
}
|
|
|
|
|
|
2017-02-22 16:31:04 +01:00
|
|
|
|
Strings ValidPathInfo::shortRefs() const {
|
|
|
|
|
Strings refs;
|
|
|
|
|
for (auto& r : references) {
|
|
|
|
|
refs.push_back(baseNameOf(r));
|
2020-05-19 20:04:08 +02:00
|
|
|
|
}
|
2017-02-22 16:31:04 +01:00
|
|
|
|
return refs;
|
|
|
|
|
}
|
|
|
|
|
|
2018-03-16 20:22:34 +01:00
|
|
|
|
std::string makeFixedOutputCA(bool recursive, const Hash& hash) {
|
2020-08-02 02:17:44 +02:00
|
|
|
|
return "fixed:" + (recursive ? std::string("r:") : "") + hash.to_string();
|
2018-03-16 20:22:34 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void Store::addToStore(const ValidPathInfo& info, Source& narSource,
|
|
|
|
|
RepairFlag repair, CheckSigsFlag checkSigs,
|
|
|
|
|
std::shared_ptr<FSAccessor> accessor) {
|
|
|
|
|
addToStore(info, make_ref<std::string>(narSource.drain()), repair, checkSigs,
|
2020-05-20 23:58:43 +02:00
|
|
|
|
std::move(accessor));
|
2018-03-16 20:22:34 +01:00
|
|
|
|
}
|
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
|
void Store::addToStore(const ValidPathInfo& info, const ref<std::string>& nar,
|
2018-03-16 20:22:34 +01:00
|
|
|
|
RepairFlag repair, CheckSigsFlag checkSigs,
|
|
|
|
|
std::shared_ptr<FSAccessor> accessor) {
|
|
|
|
|
StringSource source(*nar);
|
2020-05-20 23:58:43 +02:00
|
|
|
|
addToStore(info, source, repair, checkSigs, std::move(accessor));
|
2006-11-30 18:43:04 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
} // namespace nix
|
|
|
|
|
|
2020-05-27 22:56:34 +02:00
|
|
|
|
#include "libstore/local-store.hh"
|
|
|
|
|
#include "libstore/remote-store.hh"
|
2006-11-30 18:43:04 +01:00
|
|
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
|
2016-02-29 16:11:11 +01:00
|
|
|
|
RegisterStoreImplementation::Implementations*
|
2020-05-20 05:33:07 +02:00
|
|
|
|
RegisterStoreImplementation::implementations = nullptr;
|
2016-02-29 16:11:11 +01:00
|
|
|
|
|
2019-02-21 11:44:25 +01:00
|
|
|
|
/* Split URI into protocol+hierarchy part and its parameter set. */
|
|
|
|
|
std::pair<std::string, Store::Params> splitUriAndParams(
|
|
|
|
|
const std::string& uri_) {
|
2016-04-29 16:26:16 +02:00
|
|
|
|
auto uri(uri_);
|
2019-02-21 11:44:25 +01:00
|
|
|
|
Store::Params params;
|
2016-04-29 16:26:16 +02:00
|
|
|
|
auto q = uri.find('?');
|
|
|
|
|
if (q != std::string::npos) {
|
2020-08-06 10:28:00 +02:00
|
|
|
|
Strings parts =
|
|
|
|
|
absl::StrSplit(uri.substr(q + 1), absl::ByChar('&'), absl::SkipEmpty());
|
2020-05-25 16:54:14 +02:00
|
|
|
|
for (const auto& s : parts) {
|
2016-04-29 16:26:16 +02:00
|
|
|
|
auto e = s.find('=');
|
2018-08-03 20:36:25 +02:00
|
|
|
|
if (e != std::string::npos) {
|
|
|
|
|
auto value = s.substr(e + 1);
|
|
|
|
|
std::string decoded;
|
|
|
|
|
for (size_t i = 0; i < value.size();) {
|
|
|
|
|
if (value[i] == '%') {
|
|
|
|
|
if (i + 2 >= value.size()) {
|
|
|
|
|
throw Error("invalid URI parameter '%s'", value);
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2018-08-03 20:36:25 +02:00
|
|
|
|
try {
|
2020-08-02 00:32:00 +02:00
|
|
|
|
decoded += std::stoul(std::string(value, i + 1, 2), nullptr, 16);
|
2018-08-03 20:36:25 +02:00
|
|
|
|
i += 3;
|
|
|
|
|
} catch (...) {
|
|
|
|
|
throw Error("invalid URI parameter '%s'", value);
|
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
} else {
|
2018-08-03 20:36:25 +02:00
|
|
|
|
decoded += value[i++];
|
2020-05-19 21:47:23 +02:00
|
|
|
|
}
|
2016-04-29 16:26:16 +02:00
|
|
|
|
}
|
|
|
|
|
params[s.substr(0, e)] = decoded;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-04-29 16:26:16 +02:00
|
|
|
|
}
|
2018-08-03 20:36:25 +02:00
|
|
|
|
uri = uri_.substr(0, q);
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2019-02-21 11:44:25 +01:00
|
|
|
|
return {uri, params};
|
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2019-02-21 11:44:25 +01:00
|
|
|
|
ref<Store> openStore(const std::string& uri_,
|
|
|
|
|
const Store::Params& extraParams) {
|
|
|
|
|
auto [uri, uriParams] = splitUriAndParams(uri_);
|
|
|
|
|
auto params = extraParams;
|
|
|
|
|
params.insert(uriParams.begin(), uriParams.end());
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2020-05-20 23:58:43 +02:00
|
|
|
|
for (const auto& fun : *RegisterStoreImplementation::implementations) {
|
2016-04-29 16:26:16 +02:00
|
|
|
|
auto store = fun(uri, params);
|
2017-04-13 15:55:38 +02:00
|
|
|
|
if (store) {
|
2018-03-27 18:41:31 +02:00
|
|
|
|
store->warnUnknownSettings();
|
2017-04-13 15:55:38 +02:00
|
|
|
|
return ref<Store>(store);
|
2016-02-24 14:48:16 +01:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
2016-02-24 14:48:16 +01:00
|
|
|
|
|
2017-07-30 13:27:57 +02:00
|
|
|
|
throw Error("don't know how to open Nix store '%s'", uri);
|
2016-02-29 16:11:11 +01:00
|
|
|
|
}
|
|
|
|
|
|
2016-09-02 12:39:29 +02:00
|
|
|
|
StoreType getStoreType(const std::string& uri, const std::string& stateDir) {
|
|
|
|
|
if (uri == "daemon") {
|
|
|
|
|
return tDaemon;
|
2020-05-20 23:27:37 +02:00
|
|
|
|
}
|
2020-05-25 03:19:01 +02:00
|
|
|
|
if (uri == "local" || absl::StartsWith(uri, "/")) {
|
2016-09-02 12:39:29 +02:00
|
|
|
|
return tLocal;
|
2020-05-20 23:27:37 +02:00
|
|
|
|
} else if (uri.empty() || uri == "auto") {
|
2016-06-02 13:33:49 +02:00
|
|
|
|
if (access(stateDir.c_str(), R_OK | W_OK) == 0) {
|
2016-09-02 12:39:29 +02:00
|
|
|
|
return tLocal;
|
2020-05-20 23:27:37 +02:00
|
|
|
|
}
|
|
|
|
|
if (pathExists(settings.nixDaemonSocketFile)) {
|
2016-09-02 12:39:29 +02:00
|
|
|
|
return tDaemon;
|
2020-05-19 18:38:04 +02:00
|
|
|
|
} else {
|
2016-09-02 12:39:29 +02:00
|
|
|
|
return tLocal;
|
2020-05-19 18:38:04 +02:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
} else {
|
2016-09-02 12:39:29 +02:00
|
|
|
|
return tOther;
|
2020-05-17 17:31:57 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-08-01 21:44:48 +02:00
|
|
|
|
static RegisterStoreImplementation regStore([](const std::string& uri,
|
|
|
|
|
const Store::Params& params)
|
|
|
|
|
-> std::shared_ptr<Store> {
|
|
|
|
|
switch (getStoreType(uri, get(params, "state", settings.nixStateDir))) {
|
|
|
|
|
case tDaemon: {
|
|
|
|
|
auto daemon_socket_uri =
|
|
|
|
|
absl::StrCat("unix://", settings.nixDaemonSocketFile);
|
|
|
|
|
auto channel = grpc::CreateChannel(daemon_socket_uri,
|
|
|
|
|
grpc::InsecureChannelCredentials());
|
|
|
|
|
return std::shared_ptr<Store>(std::make_shared<nix::store::RpcStore>(
|
|
|
|
|
daemon_socket_uri, params, proto::WorkerService::NewStub(channel)));
|
|
|
|
|
}
|
|
|
|
|
case tLocal: {
|
|
|
|
|
Store::Params params2 = params;
|
|
|
|
|
if (absl::StartsWith(uri, "/")) {
|
|
|
|
|
params2["root"] = uri;
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2020-08-01 21:44:48 +02:00
|
|
|
|
return std::shared_ptr<Store>(std::make_shared<LocalStore>(params2));
|
|
|
|
|
}
|
|
|
|
|
default:
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
});
|
2016-02-24 14:48:16 +01:00
|
|
|
|
|
2016-04-29 13:57:08 +02:00
|
|
|
|
std::list<ref<Store>> getDefaultSubstituters() {
|
2017-07-04 16:26:48 +02:00
|
|
|
|
static auto stores([]() {
|
2016-04-29 13:57:08 +02:00
|
|
|
|
std::list<ref<Store>> stores;
|
2016-02-24 14:48:16 +01:00
|
|
|
|
|
2017-07-04 16:26:48 +02:00
|
|
|
|
StringSet done;
|
2016-04-29 13:57:08 +02:00
|
|
|
|
|
2017-07-04 16:26:48 +02:00
|
|
|
|
auto addStore = [&](const std::string& uri) {
|
2020-05-20 23:27:37 +02:00
|
|
|
|
if (done.count(uri) != 0u) {
|
2017-07-04 16:26:48 +02:00
|
|
|
|
return;
|
2020-05-19 19:55:58 +02:00
|
|
|
|
}
|
2017-07-04 16:26:48 +02:00
|
|
|
|
done.insert(uri);
|
2018-02-09 14:36:38 +01:00
|
|
|
|
try {
|
|
|
|
|
stores.push_back(openStore(uri));
|
|
|
|
|
} catch (Error& e) {
|
2020-05-19 02:02:44 +02:00
|
|
|
|
LOG(WARNING) << e.what();
|
2018-02-09 14:36:38 +01:00
|
|
|
|
}
|
2017-07-04 16:26:48 +02:00
|
|
|
|
};
|
2016-04-29 13:57:08 +02:00
|
|
|
|
|
2020-05-20 23:58:43 +02:00
|
|
|
|
for (const auto& uri : settings.substituters.get()) {
|
2017-07-04 16:26:48 +02:00
|
|
|
|
addStore(uri);
|
2020-05-19 20:04:08 +02:00
|
|
|
|
}
|
2017-03-21 17:59:18 +01:00
|
|
|
|
|
2020-05-20 23:58:43 +02:00
|
|
|
|
for (const auto& uri : settings.extraSubstituters.get()) {
|
2017-07-04 16:26:48 +02:00
|
|
|
|
addStore(uri);
|
2020-05-19 20:04:08 +02:00
|
|
|
|
}
|
2016-04-29 13:57:08 +02:00
|
|
|
|
|
2017-07-04 16:34:53 +02:00
|
|
|
|
stores.sort([](ref<Store>& a, ref<Store>& b) {
|
|
|
|
|
return a->getPriority() < b->getPriority();
|
|
|
|
|
});
|
2016-04-29 13:57:08 +02:00
|
|
|
|
|
2017-07-04 16:26:48 +02:00
|
|
|
|
return stores;
|
2016-04-29 13:57:08 +02:00
|
|
|
|
}());
|
|
|
|
|
|
2017-07-04 16:26:48 +02:00
|
|
|
|
return stores;
|
2006-11-30 18:43:04 +01:00
|
|
|
|
}
|
2020-05-17 17:31:57 +02:00
|
|
|
|
|
2006-11-30 18:43:04 +01:00
|
|
|
|
} // namespace nix
|