2016-03-29 14:29:50 +02:00
|
|
|
#include "command.hh"
|
|
|
|
#include "shared.hh"
|
|
|
|
#include "store-api.hh"
|
|
|
|
#include "sync.hh"
|
|
|
|
#include "thread-pool.hh"
|
|
|
|
|
|
|
|
#include <atomic>
|
|
|
|
|
|
|
|
using namespace nix;
|
|
|
|
|
2016-04-14 21:14:29 +02:00
|
|
|
struct CmdVerify : StorePathsCommand
|
2016-03-29 14:29:50 +02:00
|
|
|
{
|
|
|
|
bool noContents = false;
|
2016-04-07 15:14:12 +02:00
|
|
|
bool noTrust = false;
|
2016-03-30 11:18:54 +02:00
|
|
|
Strings substituterUris;
|
2016-04-07 15:14:12 +02:00
|
|
|
size_t sigsNeeded;
|
2016-03-29 14:29:50 +02:00
|
|
|
|
2016-04-14 21:14:29 +02:00
|
|
|
CmdVerify()
|
2016-03-29 14:29:50 +02:00
|
|
|
{
|
|
|
|
mkFlag(0, "no-contents", "do not verify the contents of each store path", &noContents);
|
2016-04-07 15:14:12 +02:00
|
|
|
mkFlag(0, "no-trust", "do not verify whether each store path is trusted", &noTrust);
|
2017-06-07 18:41:20 +02:00
|
|
|
mkFlag()
|
|
|
|
.longName("substituter")
|
|
|
|
.shortName('s')
|
|
|
|
.labels({"store-uri"})
|
|
|
|
.description("use signatures from specified store")
|
|
|
|
.arity(1)
|
2017-10-24 12:45:11 +02:00
|
|
|
.handler([&](std::vector<std::string> ss) { substituterUris.push_back(ss[0]); });
|
2016-04-07 15:14:12 +02:00
|
|
|
mkIntFlag('n', "sigs-needed", "require that each path has at least N valid signatures", &sigsNeeded);
|
2016-03-29 14:29:50 +02:00
|
|
|
}
|
|
|
|
|
2016-04-14 21:14:29 +02:00
|
|
|
std::string name() override
|
|
|
|
{
|
|
|
|
return "verify";
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "verify the integrity of store paths";
|
|
|
|
}
|
|
|
|
|
2016-04-21 14:58:32 +02:00
|
|
|
Examples examples() override
|
|
|
|
{
|
|
|
|
return {
|
|
|
|
Example{
|
|
|
|
"To verify the entire Nix store:",
|
|
|
|
"nix verify --all"
|
|
|
|
},
|
|
|
|
Example{
|
|
|
|
"To check whether each path in the closure of Firefox has at least 2 signatures:",
|
|
|
|
"nix verify -r -n2 --no-contents $(type -p firefox)"
|
|
|
|
},
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2016-04-14 21:14:29 +02:00
|
|
|
void run(ref<Store> store, Paths storePaths) override
|
2016-03-29 14:29:50 +02:00
|
|
|
{
|
2016-03-30 11:18:54 +02:00
|
|
|
std::vector<ref<Store>> substituters;
|
|
|
|
for (auto & s : substituterUris)
|
2016-09-02 12:35:48 +02:00
|
|
|
substituters.push_back(openStore(s));
|
2016-03-30 11:18:54 +02:00
|
|
|
|
2016-03-29 14:29:50 +02:00
|
|
|
auto publicKeys = getDefaultPublicKeys();
|
|
|
|
|
2017-08-16 19:23:46 +02:00
|
|
|
Activity act(*logger, actVerifyPaths);
|
|
|
|
|
2016-04-25 15:26:07 +02:00
|
|
|
std::atomic<size_t> done{0};
|
2016-03-29 14:29:50 +02:00
|
|
|
std::atomic<size_t> untrusted{0};
|
|
|
|
std::atomic<size_t> corrupted{0};
|
|
|
|
std::atomic<size_t> failed{0};
|
2017-08-16 19:23:46 +02:00
|
|
|
std::atomic<size_t> active{0};
|
2016-03-29 14:29:50 +02:00
|
|
|
|
2017-08-16 19:23:46 +02:00
|
|
|
auto update = [&]() {
|
|
|
|
act.progress(done, storePaths.size(), active, failed);
|
|
|
|
};
|
2016-03-29 14:29:50 +02:00
|
|
|
|
|
|
|
ThreadPool pool;
|
|
|
|
|
|
|
|
auto doPath = [&](const Path & storePath) {
|
|
|
|
try {
|
2016-03-30 11:18:54 +02:00
|
|
|
checkInterrupt();
|
|
|
|
|
2017-08-28 19:13:24 +02:00
|
|
|
Activity act2(*logger, lvlInfo, actUnknown, fmt("checking '%s'", storePath));
|
2017-08-16 19:23:46 +02:00
|
|
|
|
|
|
|
MaintainCount<std::atomic<size_t>> mcActive(active);
|
|
|
|
update();
|
2016-03-29 14:29:50 +02:00
|
|
|
|
|
|
|
auto info = store->queryPathInfo(storePath);
|
|
|
|
|
|
|
|
if (!noContents) {
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
HashSink sink(info->narHash.type);
|
2016-04-21 17:53:47 +02:00
|
|
|
store->narFromPath(info->path, sink);
|
2016-03-29 14:29:50 +02:00
|
|
|
|
|
|
|
auto hash = sink.finish();
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
if (hash.first != info->narHash) {
|
2017-08-16 19:23:46 +02:00
|
|
|
corrupted++;
|
|
|
|
act2.result(resCorruptedPath, info->path);
|
2016-09-21 16:11:01 +02:00
|
|
|
printError(
|
2017-07-30 13:27:57 +02:00
|
|
|
format("path '%s' was modified! expected hash '%s', got '%s'")
|
2017-07-04 14:47:59 +02:00
|
|
|
% info->path % info->narHash.to_string() % hash.first.to_string());
|
2016-03-29 14:29:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-04-07 15:14:12 +02:00
|
|
|
if (!noTrust) {
|
2016-03-29 14:29:50 +02:00
|
|
|
|
2016-03-30 11:18:54 +02:00
|
|
|
bool good = false;
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
if (info->ultimate && !sigsNeeded)
|
2016-03-30 11:18:54 +02:00
|
|
|
good = true;
|
|
|
|
|
2016-04-07 15:14:12 +02:00
|
|
|
else {
|
|
|
|
|
|
|
|
StringSet sigsSeen;
|
|
|
|
size_t actualSigsNeeded = sigsNeeded ? sigsNeeded : 1;
|
|
|
|
size_t validSigs = 0;
|
|
|
|
|
|
|
|
auto doSigs = [&](StringSet sigs) {
|
|
|
|
for (auto sig : sigs) {
|
|
|
|
if (sigsSeen.count(sig)) continue;
|
|
|
|
sigsSeen.insert(sig);
|
2018-09-26 03:19:24 +02:00
|
|
|
if (validSigs < ValidPathInfo::maxSigs && info->checkSignature(publicKeys, sig))
|
2016-04-07 15:14:12 +02:00
|
|
|
validSigs++;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2016-08-03 13:17:11 +02:00
|
|
|
if (info->isContentAddressed(*store)) validSigs = ValidPathInfo::maxSigs;
|
|
|
|
|
2016-04-19 18:50:15 +02:00
|
|
|
doSigs(info->sigs);
|
2016-03-30 11:18:54 +02:00
|
|
|
|
|
|
|
for (auto & store2 : substituters) {
|
2016-04-07 15:14:12 +02:00
|
|
|
if (validSigs >= actualSigsNeeded) break;
|
|
|
|
try {
|
2016-08-03 13:17:11 +02:00
|
|
|
auto info2 = store2->queryPathInfo(info->path);
|
|
|
|
if (info2->isContentAddressed(*store)) validSigs = ValidPathInfo::maxSigs;
|
|
|
|
doSigs(info2->sigs);
|
2016-04-19 18:50:15 +02:00
|
|
|
} catch (InvalidPath &) {
|
2016-04-07 15:14:12 +02:00
|
|
|
} catch (Error & e) {
|
2016-09-21 16:11:01 +02:00
|
|
|
printError(format(ANSI_RED "error:" ANSI_NORMAL " %s") % e.what());
|
2016-03-30 11:18:54 +02:00
|
|
|
}
|
|
|
|
}
|
2016-04-07 15:14:12 +02:00
|
|
|
|
|
|
|
if (validSigs >= actualSigsNeeded)
|
|
|
|
good = true;
|
2016-03-30 11:18:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!good) {
|
2016-03-29 14:29:50 +02:00
|
|
|
untrusted++;
|
2017-08-16 19:23:46 +02:00
|
|
|
act2.result(resUntrustedPath, info->path);
|
2017-07-30 13:27:57 +02:00
|
|
|
printError(format("path '%s' is untrusted") % info->path);
|
2016-03-29 14:29:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
done++;
|
|
|
|
|
|
|
|
} catch (Error & e) {
|
2016-09-21 16:11:01 +02:00
|
|
|
printError(format(ANSI_RED "error:" ANSI_NORMAL " %s") % e.what());
|
2016-03-29 14:29:50 +02:00
|
|
|
failed++;
|
|
|
|
}
|
2017-08-16 19:23:46 +02:00
|
|
|
|
|
|
|
update();
|
2016-03-29 14:29:50 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
for (auto & storePath : storePaths)
|
|
|
|
pool.enqueue(std::bind(doPath, storePath));
|
|
|
|
|
|
|
|
pool.process();
|
|
|
|
|
|
|
|
throw Exit(
|
|
|
|
(corrupted ? 1 : 0) |
|
|
|
|
(untrusted ? 2 : 0) |
|
|
|
|
(failed ? 4 : 0));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2016-04-14 21:14:29 +02:00
|
|
|
static RegisterCommand r1(make_ref<CmdVerify>());
|