2006-03-06 12:21:15 +01:00
|
|
|
#include "misc.hh"
|
2004-08-04 12:59:20 +02:00
|
|
|
#include "eval.hh"
|
2003-10-31 18:09:31 +01:00
|
|
|
#include "globals.hh"
|
2006-11-30 18:43:04 +01:00
|
|
|
#include "store-api.hh"
|
2006-09-04 23:06:23 +02:00
|
|
|
#include "util.hh"
|
2006-12-13 00:05:01 +01:00
|
|
|
#include "archive.hh"
|
2010-04-07 15:59:45 +02:00
|
|
|
#include "value-to-xml.hh"
|
2008-01-20 21:44:03 +01:00
|
|
|
#include "parser.hh"
|
2008-07-01 12:10:32 +02:00
|
|
|
#include "names.hh"
|
2006-09-04 23:06:23 +02:00
|
|
|
|
2007-01-15 09:54:51 +01:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2006-09-04 23:06:23 +02:00
|
|
|
#include <algorithm>
|
2010-03-30 11:22:33 +02:00
|
|
|
#include <cstring>
|
2006-09-04 23:06:23 +02:00
|
|
|
|
|
|
|
|
|
|
|
namespace nix {
|
2003-10-31 18:09:31 +01:00
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/*************************************************************
|
|
|
|
* Miscellaneous
|
|
|
|
*************************************************************/
|
|
|
|
|
|
|
|
|
2004-08-04 12:59:20 +02:00
|
|
|
/* Load and evaluate an expression from path specified by the
|
|
|
|
argument. */
|
2010-03-30 11:22:33 +02:00
|
|
|
static void prim_import(EvalState & state, Value * * args, Value & v)
|
2003-10-31 18:09:31 +01:00
|
|
|
{
|
2006-10-16 17:55:34 +02:00
|
|
|
PathSet context;
|
2010-03-30 11:22:33 +02:00
|
|
|
Path path = state.coerceToPath(*args[0], context);
|
2006-11-03 17:17:39 +01:00
|
|
|
|
|
|
|
for (PathSet::iterator i = context.begin(); i != context.end(); ++i) {
|
|
|
|
assert(isStorePath(*i));
|
2006-11-30 18:43:04 +01:00
|
|
|
if (!store->isValidPath(*i))
|
2006-11-03 17:17:39 +01:00
|
|
|
throw EvalError(format("cannot import `%1%', since path `%2%' is not valid")
|
|
|
|
% path % *i);
|
|
|
|
if (isDerivation(*i))
|
2006-11-30 19:02:04 +01:00
|
|
|
store->buildDerivations(singleton<PathSet>(*i));
|
2006-11-03 17:17:39 +01:00
|
|
|
}
|
2006-09-24 19:48:41 +02:00
|
|
|
|
2010-03-30 11:22:33 +02:00
|
|
|
state.evalFile(path, v);
|
2003-10-31 18:09:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/* Determine whether the argument is the null value. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_isNull(EvalState & state, Value * * args, Value & v)
|
2007-01-29 16:11:32 +01:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
state.forceValue(*args[0]);
|
|
|
|
mkBool(v, args[0]->type == tNull);
|
2007-01-29 16:11:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-05-16 18:17:04 +02:00
|
|
|
/* Determine whether the argument is a function. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_isFunction(EvalState & state, Value * * args, Value & v)
|
2007-05-16 18:17:04 +02:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
state.forceValue(*args[0]);
|
|
|
|
mkBool(v, args[0]->type == tLambda);
|
2007-05-16 18:17:04 +02:00
|
|
|
}
|
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
|
2009-02-05 20:35:40 +01:00
|
|
|
/* Determine whether the argument is an Int. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_isInt(EvalState & state, Value * * args, Value & v)
|
2009-02-05 20:35:40 +01:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
state.forceValue(*args[0]);
|
|
|
|
mkBool(v, args[0]->type == tInt);
|
2009-02-05 20:35:40 +01:00
|
|
|
}
|
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
|
2009-02-05 20:35:40 +01:00
|
|
|
/* Determine whether the argument is an String. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_isString(EvalState & state, Value * * args, Value & v)
|
2009-02-05 20:35:40 +01:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
state.forceValue(*args[0]);
|
|
|
|
mkBool(v, args[0]->type == tString);
|
2009-02-05 20:35:40 +01:00
|
|
|
}
|
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
|
2009-02-05 20:35:40 +01:00
|
|
|
/* Determine whether the argument is an Bool. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_isBool(EvalState & state, Value * * args, Value & v)
|
2009-02-05 20:35:40 +01:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
state.forceValue(*args[0]);
|
|
|
|
mkBool(v, args[0]->type == tBool);
|
2009-02-05 20:35:40 +01:00
|
|
|
}
|
2007-05-16 18:17:04 +02:00
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
|
|
|
|
#if 0
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_genericClosure(EvalState & state, Value * * args, Value & v)
|
2007-01-29 16:11:32 +01:00
|
|
|
{
|
|
|
|
startNest(nest, lvlDebug, "finding dependencies");
|
|
|
|
|
|
|
|
Expr attrs = evalExpr(state, args[0]);
|
|
|
|
|
|
|
|
/* Get the start set. */
|
|
|
|
Expr startSet = queryAttr(attrs, "startSet");
|
|
|
|
if (!startSet) throw EvalError("attribute `startSet' required");
|
|
|
|
ATermList startSet2 = evalList(state, startSet);
|
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
set<Expr> workSet; // !!! gc roots
|
|
|
|
for (ATermIterator i(startSet2); i; ++i) workSet.insert(*i);
|
2007-01-29 16:11:32 +01:00
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
/* Get the operator. */
|
|
|
|
Expr op = queryAttr(attrs, "operator");
|
|
|
|
if (!op) throw EvalError("attribute `operator' required");
|
2007-01-29 16:11:32 +01:00
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
/* Construct the closure by applying the operator to element of
|
|
|
|
`workSet', adding the result to `workSet', continuing until
|
|
|
|
no new elements are found. */
|
|
|
|
ATermList res = ATempty;
|
|
|
|
set<Expr> doneKeys; // !!! gc roots
|
2007-01-29 16:11:32 +01:00
|
|
|
while (!workSet.empty()) {
|
2008-07-11 15:29:04 +02:00
|
|
|
Expr e = *(workSet.begin());
|
|
|
|
workSet.erase(e);
|
2007-01-29 16:11:32 +01:00
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
e = strictEvalExpr(state, e);
|
2007-01-29 16:11:32 +01:00
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
Expr key = queryAttr(e, "key");
|
|
|
|
if (!key) throw EvalError("attribute `key' required");
|
2007-01-29 16:11:32 +01:00
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
if (doneKeys.find(key) != doneKeys.end()) continue;
|
|
|
|
doneKeys.insert(key);
|
|
|
|
res = ATinsert(res, e);
|
|
|
|
|
|
|
|
/* Call the `operator' function with `e' as argument. */
|
|
|
|
ATermList res = evalList(state, makeCall(op, e));
|
2007-01-29 16:11:32 +01:00
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
/* Try to find the dependencies relative to the `path'. */
|
|
|
|
for (ATermIterator i(res); i; ++i)
|
|
|
|
workSet.insert(evalExpr(state, *i));
|
2007-01-29 16:11:32 +01:00
|
|
|
}
|
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
return makeList(res);
|
2007-01-29 16:11:32 +01:00
|
|
|
}
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2007-01-29 16:11:32 +01:00
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_abort(EvalState & state, Value * * args, Value & v)
|
2007-01-29 16:11:32 +01:00
|
|
|
{
|
|
|
|
PathSet context;
|
|
|
|
throw Abort(format("evaluation aborted with the following error message: `%1%'") %
|
2010-03-31 00:39:48 +02:00
|
|
|
state.coerceToString(*args[0], context));
|
2007-01-29 16:11:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_throw(EvalState & state, Value * * args, Value & v)
|
2007-04-16 17:03:19 +02:00
|
|
|
{
|
|
|
|
PathSet context;
|
2009-06-30 15:28:29 +02:00
|
|
|
throw ThrownError(format("user-thrown exception: %1%") %
|
2010-03-31 00:39:48 +02:00
|
|
|
state.coerceToString(*args[0], context));
|
2007-04-16 17:03:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
#if 0
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_addErrorContext(EvalState & state, Value * * args, Value & v)
|
2009-01-27 15:36:44 +01:00
|
|
|
{
|
|
|
|
PathSet context;
|
|
|
|
try {
|
|
|
|
return evalExpr(state, args[1]);
|
|
|
|
} catch (Error & e) {
|
|
|
|
e.addPrefix(format("%1%\n") %
|
|
|
|
evalString(state, args[0], context));
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-08-25 18:06:46 +02:00
|
|
|
/* Try evaluating the argument. Success => {success=true; value=something;},
|
|
|
|
* else => {success=false; value=false;} */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_tryEval(EvalState & state, Value * * args, Value & v)
|
2009-08-25 18:06:46 +02:00
|
|
|
{
|
|
|
|
ATermMap res = ATermMap();
|
|
|
|
try {
|
|
|
|
Expr val = evalExpr(state, args[0]);
|
|
|
|
res.set(toATerm("value"), makeAttrRHS(val, makeNoPos()));
|
|
|
|
res.set(toATerm("success"), makeAttrRHS(eTrue, makeNoPos()));
|
2009-09-23 21:19:26 +02:00
|
|
|
} catch (AssertionError & e) {
|
|
|
|
printMsg(lvlDebug, format("tryEval caught an error: %1%: %2%") % e.prefix() % e.msg());
|
2009-08-25 18:06:46 +02:00
|
|
|
res.set(toATerm("value"), makeAttrRHS(eFalse, makeNoPos()));
|
|
|
|
res.set(toATerm("success"), makeAttrRHS(eFalse, makeNoPos()));
|
|
|
|
}
|
|
|
|
return makeAttrs(res);
|
|
|
|
}
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2009-08-25 18:06:46 +02:00
|
|
|
|
2009-01-27 15:36:44 +01:00
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/* Return an environment variable. Use with care. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_getEnv(EvalState & state, Value * * args, Value & v)
|
2007-01-29 16:11:32 +01:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
string name = state.forceStringNoCtx(*args[0]);
|
|
|
|
mkString(v, getEnv(name));
|
2007-01-29 16:11:32 +01:00
|
|
|
}
|
|
|
|
|
2007-10-26 20:25:50 +02:00
|
|
|
|
2010-03-31 22:09:20 +02:00
|
|
|
/* Evaluate the first expression and print it on standard error. Then
|
|
|
|
return the second expression. Useful for debugging. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_trace(EvalState & state, Value * * args, Value & v)
|
2007-08-19 00:12:00 +02:00
|
|
|
{
|
2010-03-31 22:09:20 +02:00
|
|
|
state.forceValue(*args[0]);
|
|
|
|
if (args[0]->type == tString)
|
|
|
|
printMsg(lvlError, format("trace: %1%") % args[0]->string.s);
|
2009-10-22 10:10:12 +02:00
|
|
|
else
|
2010-03-31 22:09:20 +02:00
|
|
|
printMsg(lvlError, format("trace: %1%") % *args[0]);
|
|
|
|
state.forceValue(*args[1]);
|
|
|
|
v = *args[1];
|
2007-08-19 00:12:00 +02:00
|
|
|
}
|
2007-01-29 16:11:32 +01:00
|
|
|
|
2007-10-26 20:25:50 +02:00
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/*************************************************************
|
|
|
|
* Derivations
|
|
|
|
*************************************************************/
|
|
|
|
|
|
|
|
|
2008-12-03 16:06:30 +01:00
|
|
|
static bool isFixedOutput(const Derivation & drv)
|
|
|
|
{
|
|
|
|
return drv.outputs.size() == 1 &&
|
|
|
|
drv.outputs.begin()->first == "out" &&
|
|
|
|
drv.outputs.begin()->second.hash != "";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
/* Returns the hash of a derivation modulo fixed-output
|
|
|
|
subderivations. A fixed-output derivation is a derivation with one
|
|
|
|
output (`out') for which an expected hash and hash algorithm are
|
|
|
|
specified (using the `outputHash' and `outputHashAlgo'
|
|
|
|
attributes). We don't want changes to such derivations to
|
|
|
|
propagate upwards through the dependency graph, changing output
|
|
|
|
paths everywhere.
|
|
|
|
|
|
|
|
For instance, if we change the url in a call to the `fetchurl'
|
|
|
|
function, we do not want to rebuild everything depending on it
|
|
|
|
(after all, (the hash of) the file being downloaded is unchanged).
|
|
|
|
So the *output paths* should not change. On the other hand, the
|
2008-12-03 16:06:30 +01:00
|
|
|
*derivation paths* should change to reflect the new dependency
|
|
|
|
graph.
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
|
|
|
|
That's what this function does: it returns a hash which is just the
|
2008-12-03 16:06:30 +01:00
|
|
|
hash of the derivation ATerm, except that any input derivation
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
paths have been replaced by the result of a recursive call to this
|
2008-12-03 16:06:30 +01:00
|
|
|
function, and that for fixed-output derivations we return a hash of
|
|
|
|
its output path. */
|
2005-01-19 12:16:11 +01:00
|
|
|
static Hash hashDerivationModulo(EvalState & state, Derivation drv)
|
2003-10-31 18:09:31 +01:00
|
|
|
{
|
2005-01-19 12:16:11 +01:00
|
|
|
/* Return a fixed hash for fixed-output derivations. */
|
2008-12-03 16:06:30 +01:00
|
|
|
if (isFixedOutput(drv)) {
|
2005-01-19 12:16:11 +01:00
|
|
|
DerivationOutputs::const_iterator i = drv.outputs.begin();
|
2008-12-03 16:06:30 +01:00
|
|
|
return hashString(htSHA256, "fixed:out:"
|
|
|
|
+ i->second.hashAlgo + ":"
|
|
|
|
+ i->second.hash + ":"
|
|
|
|
+ i->second.path);
|
2005-01-19 12:16:11 +01:00
|
|
|
}
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
/* For other derivations, replace the inputs paths with recursive
|
|
|
|
calls to this function.*/
|
2005-01-20 15:10:19 +01:00
|
|
|
DerivationInputs inputs2;
|
2008-12-03 16:51:17 +01:00
|
|
|
foreach (DerivationInputs::const_iterator, i, drv.inputDrvs) {
|
2005-01-20 15:10:19 +01:00
|
|
|
Hash h = state.drvHashes[i->first];
|
2005-01-19 12:16:11 +01:00
|
|
|
if (h.type == htUnknown) {
|
2005-01-20 15:10:19 +01:00
|
|
|
Derivation drv2 = derivationFromPath(i->first);
|
2005-01-19 12:16:11 +01:00
|
|
|
h = hashDerivationModulo(state, drv2);
|
2005-01-20 15:10:19 +01:00
|
|
|
state.drvHashes[i->first] = h;
|
2003-10-31 18:09:31 +01:00
|
|
|
}
|
2005-01-20 15:10:19 +01:00
|
|
|
inputs2[printHash(h)] = i->second;
|
2003-10-31 18:09:31 +01:00
|
|
|
}
|
2005-01-19 12:16:11 +01:00
|
|
|
drv.inputDrvs = inputs2;
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
return hashTerm(unparseDerivation(drv));
|
2003-10-31 18:09:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-08-04 12:59:20 +02:00
|
|
|
/* Construct (as a unobservable side effect) a Nix derivation
|
|
|
|
expression that performs the derivation described by the argument
|
|
|
|
set. Returns the original set extended with the following
|
|
|
|
attributes: `outPath' containing the primary output path of the
|
|
|
|
derivation; `drvPath' containing the path of the Nix expression;
|
|
|
|
and `type' set to `derivation' to indicate that this is a
|
|
|
|
derivation. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_derivationStrict(EvalState & state, Value * * args, Value & v)
|
2003-10-31 18:09:31 +01:00
|
|
|
{
|
2003-11-09 11:35:45 +01:00
|
|
|
startNest(nest, lvlVomit, "evaluating derivation");
|
2003-10-31 18:09:31 +01:00
|
|
|
|
2010-03-31 17:38:03 +02:00
|
|
|
state.forceAttrs(*args[0]);
|
2003-10-31 18:09:31 +01:00
|
|
|
|
2010-03-31 17:38:03 +02:00
|
|
|
/* Figure out the name first (for stack backtraces). */
|
2010-04-13 14:25:42 +02:00
|
|
|
Bindings::iterator attr = args[0]->attrs->find(state.sName);
|
2010-03-31 17:38:03 +02:00
|
|
|
if (attr == args[0]->attrs->end())
|
2006-07-19 17:36:15 +02:00
|
|
|
throw EvalError("required attribute `name' missing");
|
2006-10-23 18:45:19 +02:00
|
|
|
string drvName;
|
|
|
|
try {
|
2010-03-31 17:38:03 +02:00
|
|
|
drvName = state.forceStringNoCtx(attr->second);
|
2006-10-23 18:45:19 +02:00
|
|
|
} catch (Error & e) {
|
2010-03-31 17:38:03 +02:00
|
|
|
e.addPrefix(format("while evaluating the derivation attribute `name' at <SOMEWHERE>:\n"));
|
|
|
|
// !!! % showPos(posDrvName));
|
2006-10-23 18:45:19 +02:00
|
|
|
throw;
|
|
|
|
}
|
2010-03-31 17:38:03 +02:00
|
|
|
|
2003-10-31 18:09:31 +01:00
|
|
|
/* Build the derivation expression by processing the attributes. */
|
2005-01-19 12:16:11 +01:00
|
|
|
Derivation drv;
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
|
2006-10-16 17:55:34 +02:00
|
|
|
PathSet context;
|
|
|
|
|
2008-12-03 16:06:30 +01:00
|
|
|
string outputHash, outputHashAlgo;
|
2005-02-22 22:14:41 +01:00
|
|
|
bool outputHashRecursive = false;
|
2003-10-31 18:09:31 +01:00
|
|
|
|
2010-03-31 17:38:03 +02:00
|
|
|
foreach (Bindings::iterator, i, *args[0]->attrs) {
|
2010-04-12 20:30:11 +02:00
|
|
|
string key = i->first;
|
2003-11-09 11:35:45 +01:00
|
|
|
startNest(nest, lvlVomit, format("processing attribute `%1%'") % key);
|
2003-10-31 18:09:31 +01:00
|
|
|
|
2004-04-02 12:49:37 +02:00
|
|
|
try {
|
2006-08-28 15:31:06 +02:00
|
|
|
|
|
|
|
/* The `args' attribute is special: it supplies the
|
|
|
|
command-line arguments to the builder. */
|
|
|
|
if (key == "args") {
|
2010-03-31 17:38:03 +02:00
|
|
|
state.forceList(i->second);
|
|
|
|
for (unsigned int n = 0; n < i->second.list.length; ++n) {
|
|
|
|
string s = state.coerceToString(i->second.list.elems[n], context, true);
|
2006-08-28 15:31:06 +02:00
|
|
|
drv.args.push_back(s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* All other attributes are passed to the builder through
|
|
|
|
the environment. */
|
|
|
|
else {
|
2010-03-31 17:38:03 +02:00
|
|
|
string s = state.coerceToString(i->second, context, true);
|
2006-08-28 15:31:06 +02:00
|
|
|
drv.env[key] = s;
|
|
|
|
if (key == "builder") drv.builder = s;
|
|
|
|
else if (key == "system") drv.platform = s;
|
|
|
|
else if (key == "name") drvName = s;
|
|
|
|
else if (key == "outputHash") outputHash = s;
|
|
|
|
else if (key == "outputHashAlgo") outputHashAlgo = s;
|
|
|
|
else if (key == "outputHashMode") {
|
|
|
|
if (s == "recursive") outputHashRecursive = true;
|
|
|
|
else if (s == "flat") outputHashRecursive = false;
|
|
|
|
else throw EvalError(format("invalid value `%1%' for `outputHashMode' attribute") % s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-04-02 12:49:37 +02:00
|
|
|
} catch (Error & e) {
|
2010-03-31 17:38:03 +02:00
|
|
|
e.addPrefix(format("while evaluating the derivation attribute `%1%' at <SOMEWHERE>:\n")
|
|
|
|
% key /* !!! % showPos(pos) */);
|
|
|
|
e.addPrefix(format("while instantiating the derivation named `%1%' at <SOMEWHERE>:\n")
|
|
|
|
% drvName /* !!! % showPos(posDrvName) */);
|
2006-03-08 15:11:19 +01:00
|
|
|
throw;
|
2004-04-02 12:49:37 +02:00
|
|
|
}
|
2003-10-31 18:09:31 +01:00
|
|
|
}
|
|
|
|
|
2006-10-16 17:55:34 +02:00
|
|
|
/* Everything in the context of the strings in the derivation
|
|
|
|
attributes should be added as dependencies of the resulting
|
|
|
|
derivation. */
|
2009-03-18 18:36:42 +01:00
|
|
|
foreach (PathSet::iterator, i, context) {
|
2008-12-04 11:40:41 +01:00
|
|
|
Path path = *i;
|
2009-03-18 18:36:42 +01:00
|
|
|
|
|
|
|
/* Paths marked with `=' denote that the path of a derivation
|
|
|
|
is explicitly passed to the builder. Since that allows the
|
|
|
|
builder to gain access to every path in the dependency
|
|
|
|
graph of the derivation (including all outputs), all paths
|
|
|
|
in the graph must be added to this derivation's list of
|
|
|
|
inputs to ensure that they are available when the builder
|
|
|
|
runs. */
|
2008-12-04 11:40:41 +01:00
|
|
|
if (path.at(0) == '=') {
|
|
|
|
path = string(path, 1);
|
2009-03-18 18:36:42 +01:00
|
|
|
PathSet refs; computeFSClosure(path, refs);
|
|
|
|
foreach (PathSet::iterator, j, refs) {
|
|
|
|
drv.inputSrcs.insert(*j);
|
|
|
|
if (isDerivation(*j))
|
|
|
|
drv.inputDrvs[*j] = singleton<StringSet>("out");
|
|
|
|
}
|
2008-12-04 11:40:41 +01:00
|
|
|
}
|
2009-10-21 17:05:30 +02:00
|
|
|
|
|
|
|
/* See prim_unsafeDiscardOutputDependency. */
|
|
|
|
bool useDrvAsSrc = false;
|
|
|
|
if (path.at(0) == '~') {
|
|
|
|
path = string(path, 1);
|
|
|
|
useDrvAsSrc = true;
|
|
|
|
}
|
|
|
|
|
2008-12-04 11:40:41 +01:00
|
|
|
assert(isStorePath(path));
|
2009-10-21 17:05:30 +02:00
|
|
|
|
|
|
|
debug(format("derivation uses `%1%'") % path);
|
|
|
|
if (!useDrvAsSrc && isDerivation(path))
|
2008-12-04 11:40:41 +01:00
|
|
|
drv.inputDrvs[path] = singleton<StringSet>("out");
|
2006-10-16 17:55:34 +02:00
|
|
|
else
|
2008-12-04 11:40:41 +01:00
|
|
|
drv.inputSrcs.insert(path);
|
2006-10-16 17:55:34 +02:00
|
|
|
}
|
|
|
|
|
2003-10-31 18:09:31 +01:00
|
|
|
/* Do we have all required attributes? */
|
2005-01-19 12:16:11 +01:00
|
|
|
if (drv.builder == "")
|
2006-07-19 17:36:15 +02:00
|
|
|
throw EvalError("required attribute `builder' missing");
|
2005-01-19 12:16:11 +01:00
|
|
|
if (drv.platform == "")
|
2006-07-19 17:36:15 +02:00
|
|
|
throw EvalError("required attribute `system' missing");
|
2004-08-24 13:46:05 +02:00
|
|
|
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
/* If an output hash was given, check it. */
|
2008-12-03 16:06:30 +01:00
|
|
|
Path outPath;
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
if (outputHash == "")
|
|
|
|
outputHashAlgo = "";
|
|
|
|
else {
|
|
|
|
HashType ht = parseHashType(outputHashAlgo);
|
|
|
|
if (ht == htUnknown)
|
2006-07-19 17:36:15 +02:00
|
|
|
throw EvalError(format("unknown hash algorithm `%1%'") % outputHashAlgo);
|
2006-09-20 18:15:32 +02:00
|
|
|
Hash h(ht);
|
|
|
|
if (outputHash.size() == h.hashSize * 2)
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
/* hexadecimal representation */
|
|
|
|
h = parseHash(ht, outputHash);
|
2006-09-20 18:15:32 +02:00
|
|
|
else if (outputHash.size() == hashLength32(h))
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
/* base-32 representation */
|
|
|
|
h = parseHash32(ht, outputHash);
|
2006-09-20 18:15:32 +02:00
|
|
|
else
|
|
|
|
throw Error(format("hash `%1%' has wrong length for hash type `%2%'")
|
|
|
|
% outputHash % outputHashAlgo);
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
string s = outputHash;
|
|
|
|
outputHash = printHash(h);
|
2008-12-03 17:10:17 +01:00
|
|
|
outPath = makeFixedOutputPath(outputHashRecursive, ht, h, drvName);
|
2005-02-22 22:14:41 +01:00
|
|
|
if (outputHashRecursive) outputHashAlgo = "r:" + outputHashAlgo;
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
}
|
|
|
|
|
2006-09-21 20:52:05 +02:00
|
|
|
/* Check whether the derivation name is valid. */
|
2005-04-07 16:01:51 +02:00
|
|
|
checkStoreName(drvName);
|
2005-01-20 16:25:01 +01:00
|
|
|
if (isDerivation(drvName))
|
2006-07-19 17:36:15 +02:00
|
|
|
throw EvalError(format("derivation names are not allowed to end in `%1%'")
|
2005-01-20 16:25:01 +01:00
|
|
|
% drvExtension);
|
|
|
|
|
2005-01-14 14:51:38 +01:00
|
|
|
/* Construct the "masked" derivation store expression, which is
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
the final one except that in the list of outputs, the output
|
|
|
|
paths are empty, and the corresponding environment variables
|
|
|
|
have an empty value. This ensures that changes in the set of
|
|
|
|
output names do get reflected in the hash. */
|
2005-01-19 12:16:11 +01:00
|
|
|
drv.env["out"] = "";
|
2008-12-03 16:06:30 +01:00
|
|
|
drv.outputs["out"] = DerivationOutput("", outputHashAlgo, outputHash);
|
2003-10-31 18:09:31 +01:00
|
|
|
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
/* Use the masked derivation expression to compute the output
|
|
|
|
path. */
|
2008-12-03 16:06:30 +01:00
|
|
|
if (outPath == "")
|
|
|
|
outPath = makeStorePath("output:out", hashDerivationModulo(state, drv), drvName);
|
2005-01-14 14:51:38 +01:00
|
|
|
|
|
|
|
/* Construct the final derivation store expression. */
|
2005-01-19 12:16:11 +01:00
|
|
|
drv.env["out"] = outPath;
|
|
|
|
drv.outputs["out"] =
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
DerivationOutput(outPath, outputHashAlgo, outputHash);
|
2003-10-31 18:09:31 +01:00
|
|
|
|
|
|
|
/* Write the resulting term into the Nix store directory. */
|
2005-01-19 15:36:00 +01:00
|
|
|
Path drvPath = writeDerivation(drv, drvName);
|
2003-10-31 18:09:31 +01:00
|
|
|
|
2003-11-09 11:35:45 +01:00
|
|
|
printMsg(lvlChatty, format("instantiated `%1%' -> `%2%'")
|
2003-10-31 18:09:31 +01:00
|
|
|
% drvName % drvPath);
|
|
|
|
|
2005-01-18 12:15:50 +01:00
|
|
|
/* Optimisation, but required in read-only mode! because in that
|
|
|
|
case we don't actually write store expressions, so we can't
|
|
|
|
read them later. */
|
2005-01-19 12:16:11 +01:00
|
|
|
state.drvHashes[drvPath] = hashDerivationModulo(state, drv);
|
2005-01-18 12:15:50 +01:00
|
|
|
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
/* !!! assumes a single output */
|
2010-04-01 11:55:57 +02:00
|
|
|
state.mkAttrs(v);
|
2010-04-13 14:25:42 +02:00
|
|
|
mkString((*v.attrs)[state.sOutPath], outPath, singleton<PathSet>(drvPath));
|
|
|
|
mkString((*v.attrs)[state.sDrvPath], drvPath, singleton<PathSet>("=" + drvPath));
|
2010-03-31 17:38:03 +02:00
|
|
|
}
|
2003-11-02 17:31:35 +01:00
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/*************************************************************
|
|
|
|
* Paths
|
|
|
|
*************************************************************/
|
|
|
|
|
|
|
|
|
|
|
|
/* Convert the argument to a path. !!! obsolete? */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_toPath(EvalState & state, Value * * args, Value & v)
|
2003-11-02 17:31:35 +01:00
|
|
|
{
|
2006-10-16 17:55:34 +02:00
|
|
|
PathSet context;
|
2010-03-31 00:39:48 +02:00
|
|
|
string path = state.coerceToPath(*args[0], context);
|
|
|
|
mkString(v, canonPath(path), context);
|
2003-11-02 17:31:35 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
#if 0
|
2008-11-20 00:26:19 +01:00
|
|
|
/* Allow a valid store path to be used in an expression. This is
|
|
|
|
useful in some generated expressions such as in nix-push, which
|
|
|
|
generates a call to a function with an already existing store path
|
|
|
|
as argument. You don't want to use `toPath' here because it copies
|
|
|
|
the path to the Nix store, which yields a copy like
|
|
|
|
/nix/store/newhash-oldhash-oldname. In the past, `toPath' had
|
|
|
|
special case behaviour for store paths, but that created weird
|
|
|
|
corner cases. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_storePath(EvalState & state, Value * * args, Value & v)
|
2008-11-20 00:26:19 +01:00
|
|
|
{
|
|
|
|
PathSet context;
|
|
|
|
Path path = canonPath(coerceToPath(state, args[0], context));
|
|
|
|
if (!isInStore(path))
|
|
|
|
throw EvalError(format("path `%1%' is not in the Nix store") % path);
|
2008-12-04 11:40:41 +01:00
|
|
|
Path path2 = toStorePath(path);
|
|
|
|
if (!store->isValidPath(path2))
|
|
|
|
throw EvalError(format("store path `%1%' is not valid") % path2);
|
|
|
|
context.insert(path2);
|
2008-11-20 00:26:19 +01:00
|
|
|
return makeStr(path, context);
|
|
|
|
}
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2008-11-20 00:26:19 +01:00
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_pathExists(EvalState & state, Value * * args, Value & v)
|
2005-08-14 16:00:39 +02:00
|
|
|
{
|
2006-10-16 17:55:34 +02:00
|
|
|
PathSet context;
|
2010-03-31 00:39:48 +02:00
|
|
|
Path path = state.coerceToPath(*args[0], context);
|
2007-01-29 16:11:32 +01:00
|
|
|
if (!context.empty())
|
|
|
|
throw EvalError(format("string `%1%' cannot refer to other paths") % path);
|
2010-03-31 00:39:48 +02:00
|
|
|
mkBool(v, pathExists(path));
|
2006-03-10 17:20:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/* Return the base name of the given string, i.e., everything
|
|
|
|
following the last slash. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_baseNameOf(EvalState & state, Value * * args, Value & v)
|
2003-11-02 17:31:35 +01:00
|
|
|
{
|
2006-10-16 17:55:34 +02:00
|
|
|
PathSet context;
|
2010-03-31 00:39:48 +02:00
|
|
|
mkString(v, baseNameOf(state.coerceToString(*args[0], context)), context);
|
2003-11-02 17:31:35 +01:00
|
|
|
}
|
2003-11-05 17:27:40 +01:00
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/* Return the directory of the given path, i.e., everything before the
|
|
|
|
last slash. Return either a path or a string depending on the type
|
|
|
|
of the argument. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_dirOf(EvalState & state, Value * * args, Value & v)
|
2006-09-24 20:23:32 +02:00
|
|
|
{
|
2006-10-16 17:55:34 +02:00
|
|
|
PathSet context;
|
2010-03-31 00:39:48 +02:00
|
|
|
Path dir = dirOf(state.coerceToPath(*args[0], context));
|
|
|
|
if (args[0]->type == tPath) mkPath(v, dir.c_str()); else mkString(v, dir, context);
|
2006-09-24 20:23:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-11-21 14:49:59 +01:00
|
|
|
/* Return the contents of a file as a string. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_readFile(EvalState & state, Value * * args, Value & v)
|
2007-11-21 14:49:59 +01:00
|
|
|
{
|
|
|
|
PathSet context;
|
2010-03-31 00:39:48 +02:00
|
|
|
Path path = state.coerceToPath(*args[0], context);
|
2007-11-21 14:49:59 +01:00
|
|
|
if (!context.empty())
|
|
|
|
throw EvalError(format("string `%1%' cannot refer to other paths") % path);
|
2010-03-31 00:39:48 +02:00
|
|
|
mkString(v, readFile(path).c_str());
|
2007-11-21 14:49:59 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/*************************************************************
|
|
|
|
* Creating files
|
|
|
|
*************************************************************/
|
|
|
|
|
|
|
|
|
2006-09-01 14:07:31 +02:00
|
|
|
/* Convert the argument (which can be any Nix expression) to an XML
|
|
|
|
representation returned in a string. Not all Nix expressions can
|
|
|
|
be sensibly or completely represented (e.g., functions). */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_toXML(EvalState & state, Value * * args, Value & v)
|
2006-08-24 16:34:29 +02:00
|
|
|
{
|
2006-09-04 23:06:23 +02:00
|
|
|
std::ostringstream out;
|
2006-10-16 17:55:34 +02:00
|
|
|
PathSet context;
|
2010-04-07 15:55:46 +02:00
|
|
|
printValueAsXML(state, true, *args[0], out, context);
|
|
|
|
mkString(v, out.str(), context);
|
2006-08-24 16:34:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-09-01 14:07:31 +02:00
|
|
|
/* Store a string in the Nix store as a source file that can be used
|
|
|
|
as an input by derivations. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_toFile(EvalState & state, Value * * args, Value & v)
|
2006-09-01 14:07:31 +02:00
|
|
|
{
|
2006-10-16 17:55:34 +02:00
|
|
|
PathSet context;
|
2010-03-31 17:38:03 +02:00
|
|
|
string name = state.forceStringNoCtx(*args[0]);
|
2010-03-31 21:52:29 +02:00
|
|
|
string contents = state.forceString(*args[1], context);
|
2006-10-03 16:55:54 +02:00
|
|
|
|
|
|
|
PathSet refs;
|
|
|
|
|
2010-03-31 17:38:03 +02:00
|
|
|
foreach (PathSet::iterator, i, context) {
|
2008-12-04 11:45:47 +01:00
|
|
|
Path path = *i;
|
|
|
|
if (path.at(0) == '=') path = string(path, 1);
|
|
|
|
if (isDerivation(path))
|
2006-10-19 19:43:58 +02:00
|
|
|
throw EvalError(format("in `toFile': the file `%1%' cannot refer to derivation outputs") % name);
|
2008-12-04 11:45:47 +01:00
|
|
|
refs.insert(path);
|
2006-10-03 16:55:54 +02:00
|
|
|
}
|
|
|
|
|
2006-12-01 22:00:39 +01:00
|
|
|
Path storePath = readOnlyMode
|
2007-01-29 16:51:37 +01:00
|
|
|
? computeStorePathForText(name, contents, refs)
|
2006-12-01 22:00:39 +01:00
|
|
|
: store->addTextToStore(name, contents, refs);
|
2006-10-03 16:55:54 +02:00
|
|
|
|
2006-10-16 17:55:34 +02:00
|
|
|
/* Note: we don't need to add `context' to the context of the
|
|
|
|
result, since `storePath' itself has references to the paths
|
|
|
|
used in args[1]. */
|
2010-03-31 17:38:03 +02:00
|
|
|
|
|
|
|
mkString(v, storePath, singleton<PathSet>(storePath));
|
2006-09-01 14:07:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
struct FilterFromExpr : PathFilter
|
2004-02-04 17:03:29 +01:00
|
|
|
{
|
2007-01-29 16:11:32 +01:00
|
|
|
EvalState & state;
|
2010-04-07 15:55:46 +02:00
|
|
|
Value & filter;
|
2007-01-29 16:11:32 +01:00
|
|
|
|
2010-04-07 15:55:46 +02:00
|
|
|
FilterFromExpr(EvalState & state, Value & filter)
|
2007-01-29 16:11:32 +01:00
|
|
|
: state(state), filter(filter)
|
|
|
|
{
|
|
|
|
}
|
2004-02-04 17:03:29 +01:00
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
bool operator () (const Path & path)
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
if (lstat(path.c_str(), &st))
|
|
|
|
throw SysError(format("getting attributes of path `%1%'") % path);
|
2004-02-04 17:03:29 +01:00
|
|
|
|
2010-04-07 15:55:46 +02:00
|
|
|
/* Call the filter function. The first argument is the path,
|
|
|
|
the second is a string indicating the type of the file. */
|
|
|
|
Value arg1;
|
|
|
|
mkString(arg1, path);
|
|
|
|
|
|
|
|
Value fun2;
|
|
|
|
state.callFunction(filter, arg1, fun2);
|
|
|
|
|
|
|
|
Value arg2;
|
|
|
|
mkString(arg2,
|
|
|
|
S_ISREG(st.st_mode) ? "regular" :
|
|
|
|
S_ISDIR(st.st_mode) ? "directory" :
|
|
|
|
S_ISLNK(st.st_mode) ? "symlink" :
|
|
|
|
"unknown" /* not supported, will fail! */);
|
|
|
|
|
|
|
|
Value res;
|
|
|
|
state.callFunction(fun2, arg2, res);
|
|
|
|
|
|
|
|
return state.forceBool(res);
|
2007-01-29 16:11:32 +01:00
|
|
|
}
|
|
|
|
};
|
2004-02-04 17:03:29 +01:00
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_filterSource(EvalState & state, Value * * args, Value & v)
|
2003-11-05 17:27:40 +01:00
|
|
|
{
|
2007-01-29 16:11:32 +01:00
|
|
|
PathSet context;
|
2010-04-07 15:55:46 +02:00
|
|
|
Path path = state.coerceToPath(*args[1], context);
|
2007-01-29 16:11:32 +01:00
|
|
|
if (!context.empty())
|
|
|
|
throw EvalError(format("string `%1%' cannot refer to other paths") % path);
|
2003-11-05 17:27:40 +01:00
|
|
|
|
2010-04-07 15:55:46 +02:00
|
|
|
state.forceValue(*args[0]);
|
|
|
|
if (args[0]->type != tLambda)
|
|
|
|
throw TypeError(format("first argument in call to `filterSource' is not a function but %1%") % showType(*args[0]));
|
|
|
|
|
|
|
|
FilterFromExpr filter(state, *args[0]);
|
2004-08-04 12:59:20 +02:00
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
Path dstPath = readOnlyMode
|
2008-12-03 17:10:17 +01:00
|
|
|
? computeStorePathForPath(path, true, htSHA256, filter).first
|
|
|
|
: store->addToStore(path, true, htSHA256, filter);
|
2004-08-04 12:59:20 +02:00
|
|
|
|
2010-04-07 15:55:46 +02:00
|
|
|
mkString(v, dstPath, singleton<PathSet>(dstPath));
|
2006-09-22 16:55:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/*************************************************************
|
|
|
|
* Attribute sets
|
|
|
|
*************************************************************/
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/* Return the names of the attributes in an attribute set as a sorted
|
|
|
|
list of strings. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_attrNames(EvalState & state, Value * * args, Value & v)
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
state.forceAttrs(*args[0]);
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
state.mkList(v, args[0]->attrs->size());
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
StringSet names;
|
|
|
|
foreach (Bindings::iterator, i, *args[0]->attrs)
|
2010-04-12 20:30:11 +02:00
|
|
|
names.insert(i->first);
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
unsigned int n = 0;
|
|
|
|
foreach (StringSet::iterator, i, names)
|
|
|
|
mkString(v.list.elems[n++], *i);
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/* Dynamic version of the `.' operator. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_getAttr(EvalState & state, Value * * args, Value & v)
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
{
|
2010-03-30 20:05:54 +02:00
|
|
|
string attr = state.forceStringNoCtx(*args[0]);
|
|
|
|
state.forceAttrs(*args[1]);
|
2010-04-13 14:25:42 +02:00
|
|
|
// !!! Should we create a symbol here or just do a lookup?
|
|
|
|
Bindings::iterator i = args[1]->attrs->find(state.symbols.create(attr));
|
2010-03-30 20:05:54 +02:00
|
|
|
if (i == args[1]->attrs->end())
|
|
|
|
throw EvalError(format("attribute `%1%' missing") % attr);
|
|
|
|
state.forceValue(i->second);
|
|
|
|
v = i->second;
|
2007-01-29 16:11:32 +01:00
|
|
|
}
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/* Dynamic version of the `?' operator. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_hasAttr(EvalState & state, Value * * args, Value & v)
|
2007-01-29 16:11:32 +01:00
|
|
|
{
|
2010-03-30 20:05:54 +02:00
|
|
|
string attr = state.forceStringNoCtx(*args[0]);
|
|
|
|
state.forceAttrs(*args[1]);
|
2010-04-13 14:25:42 +02:00
|
|
|
mkBool(v, args[1]->attrs->find(state.symbols.create(attr)) != args[1]->attrs->end());
|
2007-01-29 16:11:32 +01:00
|
|
|
}
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
|
2005-08-14 16:00:39 +02:00
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
/* Determine whether the argument is an attribute set. */
|
|
|
|
static void prim_isAttrs(EvalState & state, Value * * args, Value & v)
|
|
|
|
{
|
|
|
|
state.forceValue(*args[0]);
|
|
|
|
mkBool(v, args[0]->type == tAttrs);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void prim_removeAttrs(EvalState & state, Value * * args, Value & v)
|
|
|
|
{
|
|
|
|
state.forceAttrs(*args[0]);
|
|
|
|
state.forceList(*args[1]);
|
|
|
|
|
2010-03-31 17:38:03 +02:00
|
|
|
state.cloneAttrs(*args[0], v);
|
2010-03-31 00:39:48 +02:00
|
|
|
|
|
|
|
for (unsigned int i = 0; i < args[1]->list.length; ++i) {
|
|
|
|
state.forceStringNoCtx(args[1]->list.elems[i]);
|
2010-04-13 14:25:42 +02:00
|
|
|
v.attrs->erase(state.symbols.create(args[1]->list.elems[i].string.s));
|
2010-03-31 00:39:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-10-09 14:51:25 +02:00
|
|
|
/* Builds an attribute set from a list specifying (name, value)
|
|
|
|
pairs. To be precise, a list [{name = "name1"; value = value1;}
|
|
|
|
... {name = "nameN"; value = valueN;}] is transformed to {name1 =
|
|
|
|
value1; ... nameN = valueN;}. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_listToAttrs(EvalState & state, Value * * args, Value & v)
|
2007-08-19 00:12:00 +02:00
|
|
|
{
|
2010-03-31 17:38:03 +02:00
|
|
|
state.forceList(*args[0]);
|
|
|
|
|
|
|
|
state.mkAttrs(v);
|
|
|
|
|
|
|
|
for (unsigned int i = 0; i < args[0]->list.length; ++i) {
|
|
|
|
Value & v2(args[0]->list.elems[i]);
|
|
|
|
state.forceAttrs(v2);
|
|
|
|
|
2010-04-13 14:25:42 +02:00
|
|
|
Bindings::iterator j = v2.attrs->find(state.sName);
|
2010-03-31 17:38:03 +02:00
|
|
|
if (j == v2.attrs->end())
|
|
|
|
throw TypeError("`name' attribute missing in a call to `listToAttrs'");
|
|
|
|
string name = state.forceStringNoCtx(j->second);
|
|
|
|
|
2010-04-13 14:25:42 +02:00
|
|
|
j = v2.attrs->find(state.symbols.create("value"));
|
2010-03-31 17:38:03 +02:00
|
|
|
if (j == v2.attrs->end())
|
|
|
|
throw TypeError("`value' attribute missing in a call to `listToAttrs'");
|
|
|
|
|
2010-04-13 14:25:42 +02:00
|
|
|
(*v.attrs)[state.symbols.create(name)] = j->second; // !!! sharing?
|
2007-10-09 14:51:25 +02:00
|
|
|
}
|
2007-08-19 00:12:00 +02:00
|
|
|
}
|
|
|
|
|
2007-10-31 19:01:56 +01:00
|
|
|
|
2010-03-31 00:39:48 +02:00
|
|
|
#if 0
|
* Two primops: builtins.intersectAttrs and builtins.functionArgs.
intersectAttrs returns the (right-biased) intersection between two
attribute sets, e.g. every attribute from the second set that also
exists in the first. functionArgs returns the set of attributes
expected by a function.
The main goal of these is to allow the elimination of most of
all-packages.nix. Most package instantiations in all-packages.nix
have this form:
foo = import ./foo.nix {
inherit a b c;
};
With intersectAttrs and functionArgs, this can be written as:
foo = callPackage (import ./foo.nix) { };
where
callPackage = f: args:
f ((builtins.intersectAttrs (builtins.functionArgs f) pkgs) // args);
I.e., foo.nix is called with all attributes from "pkgs" that it
actually needs (e.g., pkgs.a, pkgs.b and pkgs.c). (callPackage can
do any other generic package-level stuff we might want, such as
applying makeOverridable.) Of course, the automatically supplied
arguments can be overriden if needed, e.g.
foo = callPackage (import ./foo.nix) {
c = c_version_2;
};
but for the vast majority of packages, this won't be needed.
The advantages are to reduce the amount of typing needed to add a
dependency (from three sites to two), and to reduce the number of
trivial commits to all-packages.nix. For the former, there have
been two previous attempts:
- Use "args: with args;" in the package's function definition.
This however obscures the actual expected arguments of a
function, which is very bad.
- Use "{ arg1, arg2, ... }:" in the package's function definition
(i.e. use the ellipis "..." to allow arbitrary additional
arguments), and then call the function with all of "pkgs" as an
argument. But this inhibits error detection if you call it with
an misspelled (or obsolete) argument.
2009-09-15 15:01:46 +02:00
|
|
|
/* Return the right-biased intersection of two attribute sets as1 and
|
|
|
|
as2, i.e. a set that contains every attribute from as2 that is also
|
|
|
|
a member of as1. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_intersectAttrs(EvalState & state, Value * * args, Value & v)
|
* Two primops: builtins.intersectAttrs and builtins.functionArgs.
intersectAttrs returns the (right-biased) intersection between two
attribute sets, e.g. every attribute from the second set that also
exists in the first. functionArgs returns the set of attributes
expected by a function.
The main goal of these is to allow the elimination of most of
all-packages.nix. Most package instantiations in all-packages.nix
have this form:
foo = import ./foo.nix {
inherit a b c;
};
With intersectAttrs and functionArgs, this can be written as:
foo = callPackage (import ./foo.nix) { };
where
callPackage = f: args:
f ((builtins.intersectAttrs (builtins.functionArgs f) pkgs) // args);
I.e., foo.nix is called with all attributes from "pkgs" that it
actually needs (e.g., pkgs.a, pkgs.b and pkgs.c). (callPackage can
do any other generic package-level stuff we might want, such as
applying makeOverridable.) Of course, the automatically supplied
arguments can be overriden if needed, e.g.
foo = callPackage (import ./foo.nix) {
c = c_version_2;
};
but for the vast majority of packages, this won't be needed.
The advantages are to reduce the amount of typing needed to add a
dependency (from three sites to two), and to reduce the number of
trivial commits to all-packages.nix. For the former, there have
been two previous attempts:
- Use "args: with args;" in the package's function definition.
This however obscures the actual expected arguments of a
function, which is very bad.
- Use "{ arg1, arg2, ... }:" in the package's function definition
(i.e. use the ellipis "..." to allow arbitrary additional
arguments), and then call the function with all of "pkgs" as an
argument. But this inhibits error detection if you call it with
an misspelled (or obsolete) argument.
2009-09-15 15:01:46 +02:00
|
|
|
{
|
|
|
|
ATermMap as1, as2;
|
|
|
|
queryAllAttrs(evalExpr(state, args[0]), as1, true);
|
|
|
|
queryAllAttrs(evalExpr(state, args[1]), as2, true);
|
|
|
|
|
|
|
|
ATermMap res;
|
|
|
|
foreach (ATermMap::const_iterator, i, as2)
|
|
|
|
if (as1[i->key]) res.set(i->key, i->value);
|
|
|
|
|
|
|
|
return makeAttrs(res);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void attrsInPattern(ATermMap & map, Pattern pat)
|
|
|
|
{
|
|
|
|
ATerm name;
|
|
|
|
ATermList formals;
|
|
|
|
ATermBool ellipsis;
|
2010-03-25 13:19:41 +01:00
|
|
|
if (matchAttrsPat(pat, formals, ellipsis, name)) {
|
* Two primops: builtins.intersectAttrs and builtins.functionArgs.
intersectAttrs returns the (right-biased) intersection between two
attribute sets, e.g. every attribute from the second set that also
exists in the first. functionArgs returns the set of attributes
expected by a function.
The main goal of these is to allow the elimination of most of
all-packages.nix. Most package instantiations in all-packages.nix
have this form:
foo = import ./foo.nix {
inherit a b c;
};
With intersectAttrs and functionArgs, this can be written as:
foo = callPackage (import ./foo.nix) { };
where
callPackage = f: args:
f ((builtins.intersectAttrs (builtins.functionArgs f) pkgs) // args);
I.e., foo.nix is called with all attributes from "pkgs" that it
actually needs (e.g., pkgs.a, pkgs.b and pkgs.c). (callPackage can
do any other generic package-level stuff we might want, such as
applying makeOverridable.) Of course, the automatically supplied
arguments can be overriden if needed, e.g.
foo = callPackage (import ./foo.nix) {
c = c_version_2;
};
but for the vast majority of packages, this won't be needed.
The advantages are to reduce the amount of typing needed to add a
dependency (from three sites to two), and to reduce the number of
trivial commits to all-packages.nix. For the former, there have
been two previous attempts:
- Use "args: with args;" in the package's function definition.
This however obscures the actual expected arguments of a
function, which is very bad.
- Use "{ arg1, arg2, ... }:" in the package's function definition
(i.e. use the ellipis "..." to allow arbitrary additional
arguments), and then call the function with all of "pkgs" as an
argument. But this inhibits error detection if you call it with
an misspelled (or obsolete) argument.
2009-09-15 15:01:46 +02:00
|
|
|
for (ATermIterator i(formals); i; ++i) {
|
|
|
|
ATerm def;
|
|
|
|
if (!matchFormal(*i, name, def)) abort();
|
|
|
|
map.set(name, makeAttrRHS(makeBool(def != constNoDefaultValue), makeNoPos()));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Return a set containing the names of the formal arguments expected
|
|
|
|
by the function `f'. The value of each attribute is a Boolean
|
|
|
|
denoting whether has a default value. For instance,
|
|
|
|
|
|
|
|
functionArgs ({ x, y ? 123}: ...)
|
|
|
|
=> { x = false; y = true; }
|
|
|
|
|
|
|
|
"Formal argument" here refers to the attributes pattern-matched by
|
|
|
|
the function. Plain lambdas are not included, e.g.
|
|
|
|
|
|
|
|
functionArgs (x: ...)
|
|
|
|
=> { }
|
|
|
|
*/
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_functionArgs(EvalState & state, Value * * args, Value & v)
|
* Two primops: builtins.intersectAttrs and builtins.functionArgs.
intersectAttrs returns the (right-biased) intersection between two
attribute sets, e.g. every attribute from the second set that also
exists in the first. functionArgs returns the set of attributes
expected by a function.
The main goal of these is to allow the elimination of most of
all-packages.nix. Most package instantiations in all-packages.nix
have this form:
foo = import ./foo.nix {
inherit a b c;
};
With intersectAttrs and functionArgs, this can be written as:
foo = callPackage (import ./foo.nix) { };
where
callPackage = f: args:
f ((builtins.intersectAttrs (builtins.functionArgs f) pkgs) // args);
I.e., foo.nix is called with all attributes from "pkgs" that it
actually needs (e.g., pkgs.a, pkgs.b and pkgs.c). (callPackage can
do any other generic package-level stuff we might want, such as
applying makeOverridable.) Of course, the automatically supplied
arguments can be overriden if needed, e.g.
foo = callPackage (import ./foo.nix) {
c = c_version_2;
};
but for the vast majority of packages, this won't be needed.
The advantages are to reduce the amount of typing needed to add a
dependency (from three sites to two), and to reduce the number of
trivial commits to all-packages.nix. For the former, there have
been two previous attempts:
- Use "args: with args;" in the package's function definition.
This however obscures the actual expected arguments of a
function, which is very bad.
- Use "{ arg1, arg2, ... }:" in the package's function definition
(i.e. use the ellipis "..." to allow arbitrary additional
arguments), and then call the function with all of "pkgs" as an
argument. But this inhibits error detection if you call it with
an misspelled (or obsolete) argument.
2009-09-15 15:01:46 +02:00
|
|
|
{
|
|
|
|
Expr f = evalExpr(state, args[0]);
|
|
|
|
ATerm pat, body, pos;
|
|
|
|
if (!matchFunction(f, pat, body, pos))
|
|
|
|
throw TypeError("`functionArgs' required a function");
|
|
|
|
|
|
|
|
ATermMap as;
|
|
|
|
attrsInPattern(as, pat);
|
|
|
|
|
|
|
|
return makeAttrs(as);
|
|
|
|
}
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
* Two primops: builtins.intersectAttrs and builtins.functionArgs.
intersectAttrs returns the (right-biased) intersection between two
attribute sets, e.g. every attribute from the second set that also
exists in the first. functionArgs returns the set of attributes
expected by a function.
The main goal of these is to allow the elimination of most of
all-packages.nix. Most package instantiations in all-packages.nix
have this form:
foo = import ./foo.nix {
inherit a b c;
};
With intersectAttrs and functionArgs, this can be written as:
foo = callPackage (import ./foo.nix) { };
where
callPackage = f: args:
f ((builtins.intersectAttrs (builtins.functionArgs f) pkgs) // args);
I.e., foo.nix is called with all attributes from "pkgs" that it
actually needs (e.g., pkgs.a, pkgs.b and pkgs.c). (callPackage can
do any other generic package-level stuff we might want, such as
applying makeOverridable.) Of course, the automatically supplied
arguments can be overriden if needed, e.g.
foo = callPackage (import ./foo.nix) {
c = c_version_2;
};
but for the vast majority of packages, this won't be needed.
The advantages are to reduce the amount of typing needed to add a
dependency (from three sites to two), and to reduce the number of
trivial commits to all-packages.nix. For the former, there have
been two previous attempts:
- Use "args: with args;" in the package's function definition.
This however obscures the actual expected arguments of a
function, which is very bad.
- Use "{ arg1, arg2, ... }:" in the package's function definition
(i.e. use the ellipis "..." to allow arbitrary additional
arguments), and then call the function with all of "pkgs" as an
argument. But this inhibits error detection if you call it with
an misspelled (or obsolete) argument.
2009-09-15 15:01:46 +02:00
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/*************************************************************
|
|
|
|
* Lists
|
|
|
|
*************************************************************/
|
* A primitive operation `dependencyClosure' to do automatic dependency
determination (e.g., finding the header files dependencies of a C
file) in Nix low-level builds automatically.
For instance, in the function `compileC' in make/lib/default.nix, we
find the header file dependencies of C file `main' as follows:
localIncludes =
dependencyClosure {
scanner = file:
import (findIncludes {
inherit file;
});
startSet = [main];
};
The function works by "growing" the set of dependencies, starting
with the set `startSet', and calling the function `scanner' for each
file to get its dependencies (which should yield a list of strings
representing relative paths). For instance, when `scanner' is
called on a file `foo.c' that includes the line
#include "../bar/fnord.h"
then `scanner' should yield ["../bar/fnord.h"]. This list of
dependencies is absolutised relative to the including file and added
to the set of dependencies. The process continues until no more
dependencies are found (hence its a closure).
`dependencyClosure' yields a list that contains in alternation a
dependency, and its relative path to the directory of the start
file, e.g.,
[ /bla/bla/foo.c
"foo.c"
/bla/bar/fnord.h
"../bar/fnord.h"
]
These relative paths are necessary for the builder that compiles
foo.c to reconstruct the relative directory structure expected by
foo.c.
The advantage of `dependencyClosure' over the old approach (using
the impure `__currentTime') is that it's completely pure, and more
efficient because it only rescans for dependencies (i.e., by
building the derivations yielded by `scanner') if sources have
actually changed. The old approach rescanned every time.
2005-08-14 14:38:47 +02:00
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/* Determine whether the argument is a list. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_isList(EvalState & state, Value * * args, Value & v)
|
2006-08-23 17:46:00 +02:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
state.forceValue(*args[0]);
|
|
|
|
mkBool(v, args[0]->type == tList);
|
2006-08-23 17:46:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-09-22 16:46:36 +02:00
|
|
|
/* Return the first element of a list. */
|
2010-03-29 16:37:56 +02:00
|
|
|
static void prim_head(EvalState & state, Value * * args, Value & v)
|
2006-09-22 16:46:36 +02:00
|
|
|
{
|
2010-03-29 16:37:56 +02:00
|
|
|
state.forceList(*args[0]);
|
|
|
|
if (args[0]->list.length == 0)
|
2006-09-22 16:46:36 +02:00
|
|
|
throw Error("`head' called on an empty list");
|
2010-03-29 16:37:56 +02:00
|
|
|
state.forceValue(args[0]->list.elems[0]);
|
|
|
|
v = args[0]->list.elems[0];
|
2006-09-22 16:46:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Return a list consisting of everything but the the first element of
|
|
|
|
a list. */
|
2010-03-30 16:39:27 +02:00
|
|
|
static void prim_tail(EvalState & state, Value * * args, Value & v)
|
2006-09-22 16:46:36 +02:00
|
|
|
{
|
2010-03-30 16:39:27 +02:00
|
|
|
state.forceList(*args[0]);
|
|
|
|
if (args[0]->list.length == 0)
|
2006-09-22 16:46:36 +02:00
|
|
|
throw Error("`tail' called on an empty list");
|
2010-03-30 16:39:27 +02:00
|
|
|
state.mkList(v, args[0]->list.length - 1);
|
|
|
|
for (unsigned int n = 0; n < v.list.length; ++n)
|
|
|
|
v.list.elems[n] = args[0]->list.elems[n + 1];
|
2006-09-22 16:46:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-08-04 12:59:20 +02:00
|
|
|
/* Apply a function to every element of a list. */
|
2010-03-30 15:47:59 +02:00
|
|
|
static void prim_map(EvalState & state, Value * * args, Value & v)
|
2004-08-04 12:59:20 +02:00
|
|
|
{
|
2010-03-30 15:47:59 +02:00
|
|
|
state.forceFunction(*args[0]);
|
|
|
|
state.forceList(*args[1]);
|
2004-08-04 13:27:53 +02:00
|
|
|
|
2010-03-30 16:39:27 +02:00
|
|
|
state.mkList(v, args[1]->list.length);
|
2004-08-04 13:27:53 +02:00
|
|
|
|
2010-03-30 15:47:59 +02:00
|
|
|
for (unsigned int n = 0; n < v.list.length; ++n) {
|
|
|
|
v.list.elems[n].type = tApp;
|
|
|
|
v.list.elems[n].app.left = args[0];
|
|
|
|
v.list.elems[n].app.right = &args[1]->list.elems[n];
|
|
|
|
}
|
2004-08-04 12:59:20 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-11 15:29:04 +02:00
|
|
|
/* Return the length of a list. This is an O(1) time operation. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_length(EvalState & state, Value * * args, Value & v)
|
2008-07-11 15:29:04 +02:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
state.forceList(*args[0]);
|
2010-03-31 17:38:03 +02:00
|
|
|
mkInt(v, args[0]->list.length);
|
2008-07-11 15:29:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
/*************************************************************
|
|
|
|
* Integer arithmetic
|
|
|
|
*************************************************************/
|
2005-08-14 16:00:39 +02:00
|
|
|
|
|
|
|
|
2010-03-29 16:37:56 +02:00
|
|
|
static void prim_add(EvalState & state, Value * * args, Value & v)
|
2006-09-22 17:29:21 +02:00
|
|
|
{
|
2010-03-29 16:37:56 +02:00
|
|
|
mkInt(v, state.forceInt(*args[0]) + state.forceInt(*args[1]));
|
2006-09-22 17:29:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_sub(EvalState & state, Value * * args, Value & v)
|
2007-01-29 15:23:09 +01:00
|
|
|
{
|
2010-03-30 20:05:54 +02:00
|
|
|
mkInt(v, state.forceInt(*args[0]) - state.forceInt(*args[1]));
|
2007-01-29 15:23:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_mul(EvalState & state, Value * * args, Value & v)
|
2008-07-11 15:29:04 +02:00
|
|
|
{
|
2010-03-30 20:05:54 +02:00
|
|
|
mkInt(v, state.forceInt(*args[0]) * state.forceInt(*args[1]));
|
2008-07-11 15:29:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_div(EvalState & state, Value * * args, Value & v)
|
2008-07-11 15:29:04 +02:00
|
|
|
{
|
2010-03-30 20:05:54 +02:00
|
|
|
int i2 = state.forceInt(*args[1]);
|
2008-07-11 15:29:04 +02:00
|
|
|
if (i2 == 0) throw EvalError("division by zero");
|
2010-03-30 20:05:54 +02:00
|
|
|
mkInt(v, state.forceInt(*args[0]) / i2);
|
2008-07-11 15:29:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_lessThan(EvalState & state, Value * * args, Value & v)
|
2006-09-24 17:21:48 +02:00
|
|
|
{
|
2010-03-30 17:18:20 +02:00
|
|
|
mkBool(v, state.forceInt(*args[0]) < state.forceInt(*args[1]));
|
2006-09-24 17:21:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 15:23:09 +01:00
|
|
|
/*************************************************************
|
|
|
|
* String manipulation
|
|
|
|
*************************************************************/
|
|
|
|
|
|
|
|
|
2007-01-29 16:15:37 +01:00
|
|
|
/* Convert the argument to a string. Paths are *not* copied to the
|
|
|
|
store, so `toString /foo/bar' yields `"/foo/bar"', not
|
|
|
|
`"/nix/store/whatever..."'. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_toString(EvalState & state, Value * * args, Value & v)
|
2007-01-29 16:15:37 +01:00
|
|
|
{
|
|
|
|
PathSet context;
|
2010-03-30 17:18:20 +02:00
|
|
|
string s = state.coerceToString(*args[0], context, true, false);
|
2010-03-31 21:52:29 +02:00
|
|
|
mkString(v, s, context);
|
2007-01-29 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-12-31 01:08:09 +01:00
|
|
|
/* `substring start len str' returns the substring of `str' starting
|
|
|
|
at character position `min(start, stringLength str)' inclusive and
|
2007-01-29 15:23:09 +01:00
|
|
|
ending at `min(start + len, stringLength str)'. `start' must be
|
|
|
|
non-negative. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_substring(EvalState & state, Value * * args, Value & v)
|
2007-01-29 15:23:09 +01:00
|
|
|
{
|
2010-03-30 20:05:54 +02:00
|
|
|
int start = state.forceInt(*args[0]);
|
|
|
|
int len = state.forceInt(*args[1]);
|
2007-01-29 15:23:09 +01:00
|
|
|
PathSet context;
|
2010-03-30 20:05:54 +02:00
|
|
|
string s = state.coerceToString(*args[2], context);
|
2007-01-29 15:23:09 +01:00
|
|
|
|
|
|
|
if (start < 0) throw EvalError("negative start position in `substring'");
|
|
|
|
|
2010-03-30 20:05:54 +02:00
|
|
|
mkString(v, string(s, start, len), context);
|
2007-01-29 15:23:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_stringLength(EvalState & state, Value * * args, Value & v)
|
2007-01-29 15:23:09 +01:00
|
|
|
{
|
|
|
|
PathSet context;
|
2010-03-30 20:05:54 +02:00
|
|
|
string s = state.coerceToString(*args[0], context);
|
|
|
|
mkInt(v, s.size());
|
2007-01-29 15:23:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_unsafeDiscardStringContext(EvalState & state, Value * * args, Value & v)
|
2008-01-04 15:22:49 +01:00
|
|
|
{
|
|
|
|
PathSet context;
|
2010-04-07 15:55:46 +02:00
|
|
|
string s = state.coerceToString(*args[0], context);
|
|
|
|
mkString(v, s, PathSet());
|
2008-01-04 15:22:49 +01:00
|
|
|
}
|
|
|
|
|
2008-01-20 21:44:03 +01:00
|
|
|
|
2010-04-07 15:55:46 +02:00
|
|
|
#if 0
|
2009-10-21 17:05:30 +02:00
|
|
|
/* Sometimes we want to pass a derivation path (i.e. pkg.drvPath) to a
|
|
|
|
builder without causing the derivation to be built (for instance,
|
|
|
|
in the derivation that builds NARs in nix-push, when doing
|
|
|
|
source-only deployment). This primop marks the string context so
|
|
|
|
that builtins.derivation adds the path to drv.inputSrcs rather than
|
|
|
|
drv.inputDrvs. */
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_unsafeDiscardOutputDependency(EvalState & state, Value * * args, Value & v)
|
2009-10-21 17:05:30 +02:00
|
|
|
{
|
|
|
|
PathSet context;
|
|
|
|
string s = coerceToString(state, args[0], context);
|
|
|
|
|
|
|
|
PathSet context2;
|
|
|
|
foreach (PathSet::iterator, i, context) {
|
|
|
|
Path p = *i;
|
|
|
|
if (p.at(0) == '=') p = "~" + string(p, 1);
|
|
|
|
context2.insert(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
return makeStr(s, context2);
|
|
|
|
}
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2008-01-04 15:22:49 +01:00
|
|
|
|
2008-07-01 12:10:32 +02:00
|
|
|
|
|
|
|
/*************************************************************
|
|
|
|
* Versions
|
|
|
|
*************************************************************/
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_parseDrvName(EvalState & state, Value * * args, Value & v)
|
2008-07-01 12:10:32 +02:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
string name = state.forceStringNoCtx(*args[0]);
|
2008-07-01 12:10:32 +02:00
|
|
|
DrvName parsed(name);
|
2010-03-31 00:39:48 +02:00
|
|
|
state.mkAttrs(v);
|
2010-04-13 14:25:42 +02:00
|
|
|
mkString((*v.attrs)[state.sName], parsed.name);
|
|
|
|
mkString((*v.attrs)[state.symbols.create("version")], parsed.version);
|
2008-07-01 12:10:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-30 17:18:20 +02:00
|
|
|
static void prim_compareVersions(EvalState & state, Value * * args, Value & v)
|
2008-07-01 12:10:32 +02:00
|
|
|
{
|
2010-03-31 00:39:48 +02:00
|
|
|
string version1 = state.forceStringNoCtx(*args[0]);
|
|
|
|
string version2 = state.forceStringNoCtx(*args[1]);
|
|
|
|
mkInt(v, compareVersions(version1, version2));
|
2008-07-01 12:10:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-29 16:15:37 +01:00
|
|
|
/*************************************************************
|
|
|
|
* Primop registration
|
|
|
|
*************************************************************/
|
|
|
|
|
|
|
|
|
2010-03-29 16:37:56 +02:00
|
|
|
void EvalState::createBaseEnv()
|
2004-08-04 12:59:20 +02:00
|
|
|
{
|
2010-03-29 16:37:56 +02:00
|
|
|
baseEnv.up = 0;
|
|
|
|
|
2010-04-13 14:25:42 +02:00
|
|
|
Value & builtins = baseEnv.bindings[symbols.create("builtins")];
|
2010-04-12 20:30:11 +02:00
|
|
|
builtins.type = tAttrs;
|
|
|
|
builtins.attrs = new Bindings;
|
2010-03-30 16:39:27 +02:00
|
|
|
|
2010-03-29 16:37:56 +02:00
|
|
|
/* Add global constants such as `true' to the base environment. */
|
2010-03-30 16:39:27 +02:00
|
|
|
Value v;
|
|
|
|
|
|
|
|
mkBool(v, true);
|
|
|
|
addConstant("true", v);
|
|
|
|
|
|
|
|
mkBool(v, false);
|
|
|
|
addConstant("false", v);
|
|
|
|
|
|
|
|
v.type = tNull;
|
|
|
|
addConstant("null", v);
|
|
|
|
|
|
|
|
mkInt(v, time(0));
|
|
|
|
addConstant("__currentTime", v);
|
2010-03-29 16:37:56 +02:00
|
|
|
|
2010-03-30 20:05:54 +02:00
|
|
|
mkString(v, thisSystem.c_str());
|
2010-03-30 16:39:27 +02:00
|
|
|
addConstant("__currentSystem", v);
|
2004-08-04 12:59:20 +02:00
|
|
|
|
2010-04-01 11:55:57 +02:00
|
|
|
/* Add a wrapper around the derivation primop that computes the
|
|
|
|
`drvPath' and `outPath' attributes lazily. */
|
|
|
|
string s = "attrs: let res = derivationStrict attrs; in attrs // { drvPath = res.drvPath; outPath = res.outPath; type = \"derivation\"; }";
|
2010-04-13 14:25:42 +02:00
|
|
|
mkThunk(v, baseEnv, parseExprFromString(*this, s, "/"));
|
2010-04-13 01:33:23 +02:00
|
|
|
addConstant("derivation", v);
|
2010-04-01 11:55:57 +02:00
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
// Miscellaneous
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("import", 1, prim_import);
|
|
|
|
addPrimOp("isNull", 1, prim_isNull);
|
2007-05-16 18:17:04 +02:00
|
|
|
addPrimOp("__isFunction", 1, prim_isFunction);
|
2009-02-05 20:35:40 +01:00
|
|
|
addPrimOp("__isString", 1, prim_isString);
|
|
|
|
addPrimOp("__isInt", 1, prim_isInt);
|
|
|
|
addPrimOp("__isBool", 1, prim_isBool);
|
2010-03-31 00:39:48 +02:00
|
|
|
#if 0
|
2008-07-11 15:29:04 +02:00
|
|
|
addPrimOp("__genericClosure", 1, prim_genericClosure);
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("abort", 1, prim_abort);
|
2007-04-16 17:03:19 +02:00
|
|
|
addPrimOp("throw", 1, prim_throw);
|
2010-03-31 00:39:48 +02:00
|
|
|
#if 0
|
2009-01-27 15:36:44 +01:00
|
|
|
addPrimOp("__addErrorContext", 2, prim_addErrorContext);
|
2009-08-25 18:06:46 +02:00
|
|
|
addPrimOp("__tryEval", 1, prim_tryEval);
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("__getEnv", 1, prim_getEnv);
|
2007-08-19 00:12:00 +02:00
|
|
|
addPrimOp("__trace", 2, prim_trace);
|
2004-08-04 13:27:53 +02:00
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
// Derivations
|
2010-04-01 11:55:57 +02:00
|
|
|
addPrimOp("derivationStrict", 1, prim_derivationStrict);
|
2007-01-29 16:11:32 +01:00
|
|
|
|
|
|
|
// Paths
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("__toPath", 1, prim_toPath);
|
2010-03-31 00:39:48 +02:00
|
|
|
#if 0
|
2008-11-20 00:26:19 +01:00
|
|
|
addPrimOp("__storePath", 1, prim_storePath);
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("__pathExists", 1, prim_pathExists);
|
|
|
|
addPrimOp("baseNameOf", 1, prim_baseNameOf);
|
|
|
|
addPrimOp("dirOf", 1, prim_dirOf);
|
2007-11-21 14:49:59 +01:00
|
|
|
addPrimOp("__readFile", 1, prim_readFile);
|
2007-01-29 16:11:32 +01:00
|
|
|
|
|
|
|
// Creating files
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("__toXML", 1, prim_toXML);
|
|
|
|
addPrimOp("__toFile", 2, prim_toFile);
|
|
|
|
addPrimOp("__filterSource", 2, prim_filterSource);
|
2007-01-29 16:11:32 +01:00
|
|
|
|
|
|
|
// Attribute sets
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("__attrNames", 1, prim_attrNames);
|
|
|
|
addPrimOp("__getAttr", 2, prim_getAttr);
|
|
|
|
addPrimOp("__hasAttr", 2, prim_hasAttr);
|
2007-08-19 00:12:00 +02:00
|
|
|
addPrimOp("__isAttrs", 1, prim_isAttrs);
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("removeAttrs", 2, prim_removeAttrs);
|
2007-08-19 00:12:00 +02:00
|
|
|
addPrimOp("__listToAttrs", 1, prim_listToAttrs);
|
2010-03-31 17:38:03 +02:00
|
|
|
#if 0
|
* Two primops: builtins.intersectAttrs and builtins.functionArgs.
intersectAttrs returns the (right-biased) intersection between two
attribute sets, e.g. every attribute from the second set that also
exists in the first. functionArgs returns the set of attributes
expected by a function.
The main goal of these is to allow the elimination of most of
all-packages.nix. Most package instantiations in all-packages.nix
have this form:
foo = import ./foo.nix {
inherit a b c;
};
With intersectAttrs and functionArgs, this can be written as:
foo = callPackage (import ./foo.nix) { };
where
callPackage = f: args:
f ((builtins.intersectAttrs (builtins.functionArgs f) pkgs) // args);
I.e., foo.nix is called with all attributes from "pkgs" that it
actually needs (e.g., pkgs.a, pkgs.b and pkgs.c). (callPackage can
do any other generic package-level stuff we might want, such as
applying makeOverridable.) Of course, the automatically supplied
arguments can be overriden if needed, e.g.
foo = callPackage (import ./foo.nix) {
c = c_version_2;
};
but for the vast majority of packages, this won't be needed.
The advantages are to reduce the amount of typing needed to add a
dependency (from three sites to two), and to reduce the number of
trivial commits to all-packages.nix. For the former, there have
been two previous attempts:
- Use "args: with args;" in the package's function definition.
This however obscures the actual expected arguments of a
function, which is very bad.
- Use "{ arg1, arg2, ... }:" in the package's function definition
(i.e. use the ellipis "..." to allow arbitrary additional
arguments), and then call the function with all of "pkgs" as an
argument. But this inhibits error detection if you call it with
an misspelled (or obsolete) argument.
2009-09-15 15:01:46 +02:00
|
|
|
addPrimOp("__intersectAttrs", 2, prim_intersectAttrs);
|
|
|
|
addPrimOp("__functionArgs", 1, prim_functionArgs);
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2007-01-29 16:11:32 +01:00
|
|
|
|
|
|
|
// Lists
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("__isList", 1, prim_isList);
|
|
|
|
addPrimOp("__head", 1, prim_head);
|
|
|
|
addPrimOp("__tail", 1, prim_tail);
|
|
|
|
addPrimOp("map", 2, prim_map);
|
2008-07-11 15:29:04 +02:00
|
|
|
addPrimOp("__length", 1, prim_length);
|
2010-03-29 16:37:56 +02:00
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
// Integer arithmetic
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("__add", 2, prim_add);
|
|
|
|
addPrimOp("__sub", 2, prim_sub);
|
2008-07-11 15:29:04 +02:00
|
|
|
addPrimOp("__mul", 2, prim_mul);
|
|
|
|
addPrimOp("__div", 2, prim_div);
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("__lessThan", 2, prim_lessThan);
|
2007-01-29 15:23:09 +01:00
|
|
|
|
2007-01-29 16:11:32 +01:00
|
|
|
// String manipulation
|
2007-01-29 16:15:37 +01:00
|
|
|
addPrimOp("toString", 1, prim_toString);
|
2007-01-29 15:23:09 +01:00
|
|
|
addPrimOp("__substring", 3, prim_substring);
|
|
|
|
addPrimOp("__stringLength", 1, prim_stringLength);
|
2008-01-04 15:22:49 +01:00
|
|
|
addPrimOp("__unsafeDiscardStringContext", 1, prim_unsafeDiscardStringContext);
|
2010-04-07 15:55:46 +02:00
|
|
|
#if 0
|
2009-10-21 17:05:30 +02:00
|
|
|
addPrimOp("__unsafeDiscardOutputDependency", 1, prim_unsafeDiscardOutputDependency);
|
2010-03-31 00:39:48 +02:00
|
|
|
#endif
|
2008-07-01 12:10:32 +02:00
|
|
|
|
|
|
|
// Versions
|
|
|
|
addPrimOp("__parseDrvName", 1, prim_parseDrvName);
|
|
|
|
addPrimOp("__compareVersions", 2, prim_compareVersions);
|
2004-08-04 12:59:20 +02:00
|
|
|
}
|
2006-09-04 23:06:23 +02:00
|
|
|
|
2007-01-29 15:23:09 +01:00
|
|
|
|
2006-09-04 23:06:23 +02:00
|
|
|
}
|