2003-11-18 12:22:29 +01:00
|
|
|
#include "storeexpr.hh"
|
2003-06-16 15:33:38 +02:00
|
|
|
#include "globals.hh"
|
2003-07-07 09:43:58 +02:00
|
|
|
#include "store.hh"
|
2003-06-16 15:33:38 +02:00
|
|
|
|
2004-10-29 13:22:49 +02:00
|
|
|
#include "storeexpr-ast.hh"
|
|
|
|
#include "storeexpr-ast.cc"
|
|
|
|
|
2003-06-16 15:33:38 +02:00
|
|
|
|
2003-06-27 15:55:12 +02:00
|
|
|
Hash hashTerm(ATerm t)
|
2003-06-16 15:33:38 +02:00
|
|
|
{
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
return hashString(htSHA256, atPrint(t));
|
2003-06-16 15:33:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
Path writeTerm(ATerm t, const string & suffix)
|
2003-07-04 14:18:06 +02:00
|
|
|
{
|
2005-01-14 14:51:38 +01:00
|
|
|
char * s = ATwriteToString(t);
|
|
|
|
if (!s) throw Error("cannot print aterm");
|
|
|
|
return addTextToStore(suffix + ".store", string(s));
|
2003-07-04 14:18:06 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
static void checkPath(const string & s)
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
{
|
|
|
|
if (s.size() == 0 || s[0] != '/')
|
|
|
|
throw Error(format("bad path `%1%' in store expression") % s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
static void parsePaths(ATermList paths, PathSet & out)
|
2003-07-15 18:28:54 +02:00
|
|
|
{
|
2003-11-16 19:31:29 +01:00
|
|
|
for (ATermIterator i(paths); i; ++i) {
|
2004-10-29 13:22:49 +02:00
|
|
|
if (ATgetType(*i) != AT_APPL)
|
|
|
|
throw badTerm("not a path", *i);
|
|
|
|
string s = aterm2String(*i);
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
checkPath(s);
|
2003-08-20 16:11:40 +02:00
|
|
|
out.insert(s);
|
2003-07-15 18:28:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
void throwBadDrv(ATerm t)
|
2003-07-20 21:29:38 +02:00
|
|
|
{
|
2005-01-19 12:16:11 +01:00
|
|
|
throw badTerm("not a valid derivation", t);
|
2003-07-15 18:28:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
Derivation parseDerivation(ATerm t)
|
2003-07-15 23:24:05 +02:00
|
|
|
{
|
2005-01-19 12:16:11 +01:00
|
|
|
Derivation drv;
|
|
|
|
ATermList outs, inDrvs, inSrcs, args, bnds;
|
2004-10-29 13:22:49 +02:00
|
|
|
ATerm builder, platform;
|
2003-11-16 18:46:31 +01:00
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
if (!matchDerive(t, outs, inDrvs, inSrcs, platform, builder, args, bnds))
|
|
|
|
throwBadDrv(t);
|
2003-07-15 18:28:54 +02:00
|
|
|
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
for (ATermIterator i(outs); i; ++i) {
|
|
|
|
ATerm id, path, hashAlgo, hash;
|
|
|
|
if (!matchDerivationOutput(*i, id, path, hashAlgo, hash))
|
2005-01-19 12:16:11 +01:00
|
|
|
throwBadDrv(t);
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
DerivationOutput out;
|
|
|
|
out.path = aterm2String(path);
|
|
|
|
checkPath(out.path);
|
|
|
|
out.hashAlgo = aterm2String(hashAlgo);
|
|
|
|
out.hash = aterm2String(hash);
|
2005-01-19 12:16:11 +01:00
|
|
|
drv.outputs[aterm2String(id)] = out;
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
}
|
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
parsePaths(inDrvs, drv.inputDrvs);
|
|
|
|
parsePaths(inSrcs, drv.inputSrcs);
|
2003-07-15 18:28:54 +02:00
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
drv.builder = aterm2String(builder);
|
|
|
|
drv.platform = aterm2String(platform);
|
2003-07-20 21:29:38 +02:00
|
|
|
|
2003-11-16 19:31:29 +01:00
|
|
|
for (ATermIterator i(args); i; ++i) {
|
2004-10-29 13:22:49 +02:00
|
|
|
if (ATgetType(*i) != AT_APPL)
|
2003-11-16 19:31:29 +01:00
|
|
|
throw badTerm("string expected", *i);
|
2005-01-19 12:16:11 +01:00
|
|
|
drv.args.push_back(aterm2String(*i));
|
2003-08-15 14:32:37 +02:00
|
|
|
}
|
|
|
|
|
2003-11-16 19:31:29 +01:00
|
|
|
for (ATermIterator i(bnds); i; ++i) {
|
2004-10-29 13:22:49 +02:00
|
|
|
ATerm s1, s2;
|
|
|
|
if (!matchEnvBinding(*i, s1, s2))
|
2003-11-16 19:31:29 +01:00
|
|
|
throw badTerm("tuple of strings expected", *i);
|
2005-01-19 12:16:11 +01:00
|
|
|
drv.env[aterm2String(s1)] = aterm2String(s2);
|
2003-07-15 18:28:54 +02:00
|
|
|
}
|
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
return drv;
|
2003-07-16 13:05:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
static ATermList unparsePaths(const PathSet & paths)
|
2003-07-15 23:24:05 +02:00
|
|
|
{
|
2003-07-20 21:29:38 +02:00
|
|
|
ATermList l = ATempty;
|
2003-10-08 17:06:59 +02:00
|
|
|
for (PathSet::const_iterator i = paths.begin();
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 14:39:56 +02:00
|
|
|
i != paths.end(); i++)
|
2004-11-03 19:12:03 +01:00
|
|
|
l = ATinsert(l, toATerm(*i));
|
2003-07-20 21:29:38 +02:00
|
|
|
return ATreverse(l);
|
2003-07-15 23:24:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-19 12:16:11 +01:00
|
|
|
ATerm unparseDerivation(const Derivation & drv)
|
2003-07-16 00:28:27 +02:00
|
|
|
{
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
ATermList outputs = ATempty;
|
2005-01-19 12:16:11 +01:00
|
|
|
for (DerivationOutputs::const_iterator i = drv.outputs.begin();
|
|
|
|
i != drv.outputs.end(); i++)
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
outputs = ATinsert(outputs,
|
|
|
|
makeDerivationOutput(
|
|
|
|
toATerm(i->first),
|
|
|
|
toATerm(i->second.path),
|
|
|
|
toATerm(i->second.hashAlgo),
|
|
|
|
toATerm(i->second.hash)));
|
|
|
|
|
2003-08-15 14:32:37 +02:00
|
|
|
ATermList args = ATempty;
|
2005-01-19 12:16:11 +01:00
|
|
|
for (Strings::const_iterator i = drv.args.begin();
|
|
|
|
i != drv.args.end(); i++)
|
2004-11-03 19:12:03 +01:00
|
|
|
args = ATinsert(args, toATerm(*i));
|
2003-08-15 14:32:37 +02:00
|
|
|
|
2003-07-20 21:29:38 +02:00
|
|
|
ATermList env = ATempty;
|
2005-01-19 12:16:11 +01:00
|
|
|
for (StringPairs::const_iterator i = drv.env.begin();
|
|
|
|
i != drv.env.end(); i++)
|
2003-07-20 21:29:38 +02:00
|
|
|
env = ATinsert(env,
|
2004-10-29 13:22:49 +02:00
|
|
|
makeEnvBinding(
|
2004-11-03 19:12:03 +01:00
|
|
|
toATerm(i->first),
|
|
|
|
toATerm(i->second)));
|
2003-07-16 00:28:27 +02:00
|
|
|
|
2004-10-29 13:22:49 +02:00
|
|
|
return makeDerive(
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
ATreverse(outputs),
|
2005-01-19 12:16:11 +01:00
|
|
|
unparsePaths(drv.inputDrvs),
|
|
|
|
unparsePaths(drv.inputSrcs),
|
|
|
|
toATerm(drv.platform),
|
|
|
|
toATerm(drv.builder),
|
2003-08-15 14:32:37 +02:00
|
|
|
ATreverse(args),
|
2003-07-20 21:29:38 +02:00
|
|
|
ATreverse(env));
|
2003-07-16 00:28:27 +02:00
|
|
|
}
|