2003-06-23 15:27:59 +02:00
|
|
|
#include <iostream>
|
2003-12-22 17:40:46 +01:00
|
|
|
#include <algorithm>
|
2003-06-23 15:27:59 +02:00
|
|
|
|
|
|
|
#include <sys/wait.h>
|
2003-10-15 14:42:39 +02:00
|
|
|
#include <unistd.h>
|
2003-06-23 15:27:59 +02:00
|
|
|
|
2003-07-07 09:43:58 +02:00
|
|
|
#include "store.hh"
|
2003-06-16 15:33:38 +02:00
|
|
|
#include "globals.hh"
|
|
|
|
#include "db.hh"
|
2003-06-23 15:27:59 +02:00
|
|
|
#include "archive.hh"
|
2003-08-04 09:09:36 +02:00
|
|
|
#include "pathlocks.hh"
|
2003-06-23 15:27:59 +02:00
|
|
|
|
|
|
|
|
2003-10-15 14:42:39 +02:00
|
|
|
/* Nix database. */
|
|
|
|
static Database nixDB;
|
|
|
|
|
|
|
|
|
|
|
|
/* Database tables. */
|
|
|
|
|
|
|
|
/* dbValidPaths :: Path -> ()
|
|
|
|
|
|
|
|
The existence of a key $p$ indicates that path $p$ is valid (that
|
|
|
|
is, produced by a succesful build). */
|
2004-10-25 16:38:23 +02:00
|
|
|
static TableId dbValidPaths = 0;
|
2003-10-15 14:42:39 +02:00
|
|
|
|
|
|
|
/* dbSuccessors :: Path -> Path
|
|
|
|
|
|
|
|
Each pair $(p_1, p_2)$ in this mapping records the fact that the
|
|
|
|
Nix expression stored at path $p_1$ has a successor expression
|
|
|
|
stored at path $p_2$.
|
|
|
|
|
|
|
|
Note that a term $y$ is a successor of $x$ iff there exists a
|
|
|
|
sequence of rewrite steps that rewrites $x$ into $y$.
|
|
|
|
*/
|
2004-10-25 16:38:23 +02:00
|
|
|
static TableId dbSuccessors = 0;
|
2003-10-15 14:42:39 +02:00
|
|
|
|
|
|
|
/* dbSuccessorsRev :: Path -> [Path]
|
|
|
|
|
|
|
|
The reverse mapping of dbSuccessors (i.e., it stores the
|
|
|
|
predecessors of a Nix expression).
|
|
|
|
*/
|
2004-10-25 16:38:23 +02:00
|
|
|
static TableId dbSuccessorsRev = 0;
|
2003-10-15 14:42:39 +02:00
|
|
|
|
2004-12-20 14:43:32 +01:00
|
|
|
/* dbSubstitutes :: Path -> [[Path]]
|
2003-10-15 14:42:39 +02:00
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
Each pair $(p, subs)$ tells Nix that it can use any of the
|
2004-12-20 14:43:32 +01:00
|
|
|
substitutes in $subs$ to build path $p$. Each substitute defines a
|
|
|
|
command-line invocation of a program (i.e., the first list element
|
|
|
|
is the full path to the program, the remaining elements are
|
|
|
|
arguments).
|
2003-10-15 14:42:39 +02:00
|
|
|
|
|
|
|
The main purpose of this is for distributed caching of derivates.
|
|
|
|
One system can compute a derivate and put it on a website (as a Nix
|
|
|
|
archive), for instance, and then another system can register a
|
|
|
|
substitute for that derivate. The substitute in this case might be
|
|
|
|
a Nix expression that fetches the Nix archive.
|
|
|
|
*/
|
2004-10-25 16:38:23 +02:00
|
|
|
static TableId dbSubstitutes = 0;
|
2003-10-15 14:42:39 +02:00
|
|
|
|
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
bool Substitute::operator == (const Substitute & sub)
|
|
|
|
{
|
2004-12-20 14:43:32 +01:00
|
|
|
return program == sub.program
|
2004-06-20 21:17:54 +02:00
|
|
|
&& args == sub.args;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-15 14:42:39 +02:00
|
|
|
void openDB()
|
|
|
|
{
|
2004-10-25 16:38:23 +02:00
|
|
|
if (readOnlyMode) return;
|
|
|
|
try {
|
|
|
|
nixDB.open(nixDBPath);
|
|
|
|
} catch (DbNoPermission & e) {
|
|
|
|
printMsg(lvlTalkative, "cannot access Nix database; continuing anyway");
|
|
|
|
readOnlyMode = true;
|
|
|
|
return;
|
|
|
|
}
|
2003-10-15 14:42:39 +02:00
|
|
|
dbValidPaths = nixDB.openTable("validpaths");
|
|
|
|
dbSuccessors = nixDB.openTable("successors");
|
|
|
|
dbSuccessorsRev = nixDB.openTable("successors-rev");
|
|
|
|
dbSubstitutes = nixDB.openTable("substitutes");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void initDB()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void createStoreTransaction(Transaction & txn)
|
|
|
|
{
|
|
|
|
Transaction txn2(nixDB);
|
|
|
|
txn2.moveTo(txn);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Path copying. */
|
|
|
|
|
2003-06-23 15:27:59 +02:00
|
|
|
struct CopySink : DumpSink
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
virtual void operator () (const unsigned char * data, unsigned int len)
|
|
|
|
{
|
2003-07-20 23:11:43 +02:00
|
|
|
writeFull(fd, data, len);
|
2003-06-23 15:27:59 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
struct CopySource : RestoreSource
|
|
|
|
{
|
|
|
|
int fd;
|
2003-07-20 23:11:43 +02:00
|
|
|
virtual void operator () (unsigned char * data, unsigned int len)
|
2003-06-23 15:27:59 +02:00
|
|
|
{
|
2003-07-20 23:11:43 +02:00
|
|
|
readFull(fd, data, len);
|
2003-06-23 15:27:59 +02:00
|
|
|
}
|
|
|
|
};
|
2003-06-16 15:33:38 +02:00
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
void copyPath(const Path & src, const Path & dst)
|
2003-06-16 15:33:38 +02:00
|
|
|
{
|
2003-07-31 18:05:35 +02:00
|
|
|
debug(format("copying `%1%' to `%2%'") % src % dst);
|
|
|
|
|
2003-06-23 15:27:59 +02:00
|
|
|
/* Unfortunately C++ doesn't support coprocedures, so we have no
|
|
|
|
nice way to chain CopySink and CopySource together. Instead we
|
|
|
|
fork off a child to run the sink. (Fork-less platforms should
|
|
|
|
use a thread). */
|
|
|
|
|
|
|
|
/* Create a pipe. */
|
2004-06-22 11:51:44 +02:00
|
|
|
Pipe pipe;
|
|
|
|
pipe.create();
|
2003-06-23 15:27:59 +02:00
|
|
|
|
|
|
|
/* Fork. */
|
2004-06-22 11:51:44 +02:00
|
|
|
Pid pid;
|
|
|
|
pid = fork();
|
|
|
|
switch (pid) {
|
2003-06-23 15:27:59 +02:00
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0: /* child */
|
|
|
|
try {
|
2004-06-22 11:51:44 +02:00
|
|
|
pipe.writeSide.close();
|
2003-06-23 15:27:59 +02:00
|
|
|
CopySource source;
|
2004-06-22 11:51:44 +02:00
|
|
|
source.fd = pipe.readSide;
|
2003-06-23 15:27:59 +02:00
|
|
|
restorePath(dst, source);
|
|
|
|
_exit(0);
|
2004-01-15 21:23:55 +01:00
|
|
|
} catch (exception & e) {
|
2003-06-23 15:27:59 +02:00
|
|
|
cerr << "error: " << e.what() << endl;
|
|
|
|
}
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Parent. */
|
|
|
|
|
2004-06-22 11:51:44 +02:00
|
|
|
pipe.readSide.close();
|
|
|
|
|
2003-06-23 15:27:59 +02:00
|
|
|
CopySink sink;
|
2004-06-22 11:51:44 +02:00
|
|
|
sink.fd = pipe.writeSide;
|
2004-09-09 23:12:53 +02:00
|
|
|
{
|
|
|
|
SwitchToOriginalUser sw;
|
|
|
|
dumpPath(src, sink);
|
|
|
|
}
|
2003-06-23 15:27:59 +02:00
|
|
|
|
|
|
|
/* Wait for the child to finish. */
|
2004-06-22 11:51:44 +02:00
|
|
|
int status = pid.wait(true);
|
2004-06-22 13:03:41 +02:00
|
|
|
if (!statusOk(status))
|
2004-06-22 10:50:25 +02:00
|
|
|
throw Error(format("cannot copy `%1% to `%2%': child %3%")
|
|
|
|
% src % dst % statusToString(status));
|
2003-06-16 15:33:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-02-14 22:44:18 +01:00
|
|
|
static bool isInStore(const Path & path)
|
|
|
|
{
|
|
|
|
return path[0] == '/'
|
2004-04-14 10:08:55 +02:00
|
|
|
&& path.compare(0, nixStore.size(), nixStore) == 0
|
|
|
|
&& path.size() >= nixStore.size() + 2
|
|
|
|
&& path[nixStore.size()] == '/'
|
|
|
|
&& path.find('/', nixStore.size() + 1) == Path::npos;
|
2004-02-14 22:44:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-04-14 10:08:55 +02:00
|
|
|
void assertStorePath(const Path & path)
|
2004-02-14 22:44:18 +01:00
|
|
|
{
|
|
|
|
if (!isInStore(path))
|
|
|
|
throw Error(format("path `%1%' is not in the Nix store") % path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
static bool isValidPathTxn(const Path & path, const Transaction & txn)
|
|
|
|
{
|
|
|
|
string s;
|
|
|
|
return nixDB.queryString(txn, dbValidPaths, path, s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool isValidPath(const Path & path)
|
|
|
|
{
|
|
|
|
return isValidPathTxn(path, noTxn);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static bool isUsablePathTxn(const Path & path, const Transaction & txn)
|
|
|
|
{
|
|
|
|
if (isValidPathTxn(path, txn)) return true;
|
|
|
|
Paths subs;
|
|
|
|
nixDB.queryStrings(txn, dbSubstitutes, path, subs);
|
|
|
|
return subs.size() > 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-10 16:46:28 +02:00
|
|
|
void registerSuccessor(const Transaction & txn,
|
2003-10-10 17:14:29 +02:00
|
|
|
const Path & srcPath, const Path & sucPath)
|
2003-10-10 16:46:28 +02:00
|
|
|
{
|
2004-02-14 22:44:18 +01:00
|
|
|
assertStorePath(srcPath);
|
|
|
|
assertStorePath(sucPath);
|
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
if (!isUsablePathTxn(sucPath, txn)) throw Error(
|
|
|
|
format("path `%1%' cannot be a successor, since it is not usable")
|
|
|
|
% sucPath);
|
|
|
|
|
2003-10-10 16:46:28 +02:00
|
|
|
Path known;
|
2003-10-10 17:14:29 +02:00
|
|
|
if (nixDB.queryString(txn, dbSuccessors, srcPath, known) &&
|
|
|
|
known != sucPath)
|
2003-10-10 16:46:28 +02:00
|
|
|
{
|
|
|
|
throw Error(format(
|
|
|
|
"the `impossible' happened: expression in path "
|
|
|
|
"`%1%' appears to have multiple successors "
|
|
|
|
"(known `%2%', new `%3%'")
|
2003-10-10 17:14:29 +02:00
|
|
|
% srcPath % known % sucPath);
|
2003-10-10 16:46:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Paths revs;
|
2003-10-10 17:14:29 +02:00
|
|
|
nixDB.queryStrings(txn, dbSuccessorsRev, sucPath, revs);
|
2003-10-16 18:29:57 +02:00
|
|
|
if (find(revs.begin(), revs.end(), srcPath) == revs.end())
|
|
|
|
revs.push_back(srcPath);
|
2003-10-10 16:46:28 +02:00
|
|
|
|
2003-10-10 17:14:29 +02:00
|
|
|
nixDB.setString(txn, dbSuccessors, srcPath, sucPath);
|
|
|
|
nixDB.setStrings(txn, dbSuccessorsRev, sucPath, revs);
|
2003-10-10 16:46:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-28 12:42:57 +02:00
|
|
|
void unregisterSuccessor(const Path & srcPath)
|
|
|
|
{
|
|
|
|
assertStorePath(srcPath);
|
|
|
|
|
|
|
|
Transaction txn(nixDB);
|
|
|
|
|
|
|
|
Path sucPath;
|
|
|
|
if (!nixDB.queryString(txn, dbSuccessors, srcPath, sucPath)) {
|
|
|
|
txn.abort();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
nixDB.delPair(txn, dbSuccessors, srcPath);
|
|
|
|
|
|
|
|
Paths revs;
|
|
|
|
nixDB.queryStrings(txn, dbSuccessorsRev, sucPath, revs);
|
|
|
|
Paths::iterator i = find(revs.begin(), revs.end(), srcPath);
|
|
|
|
assert(i != revs.end());
|
|
|
|
revs.erase(i);
|
|
|
|
nixDB.setStrings(txn, dbSuccessorsRev, sucPath, revs);
|
|
|
|
|
|
|
|
txn.commit();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-15 14:42:39 +02:00
|
|
|
bool querySuccessor(const Path & srcPath, Path & sucPath)
|
|
|
|
{
|
|
|
|
return nixDB.queryString(noTxn, dbSuccessors, srcPath, sucPath);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-10 17:25:21 +02:00
|
|
|
Paths queryPredecessors(const Path & sucPath)
|
|
|
|
{
|
|
|
|
Paths revs;
|
|
|
|
nixDB.queryStrings(noTxn, dbSuccessorsRev, sucPath, revs);
|
|
|
|
return revs;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
static Substitutes readSubstitutes(const Transaction & txn,
|
|
|
|
const Path & srcPath)
|
2003-07-10 17:11:48 +02:00
|
|
|
{
|
2004-06-20 21:17:54 +02:00
|
|
|
Strings ss;
|
|
|
|
nixDB.queryStrings(txn, dbSubstitutes, srcPath, ss);
|
|
|
|
|
|
|
|
Substitutes subs;
|
2004-02-14 22:44:18 +01:00
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
for (Strings::iterator i = ss.begin(); i != ss.end(); ++i) {
|
|
|
|
if (i->size() < 4 || (*i)[3] != 0) {
|
|
|
|
/* Old-style substitute. !!! remove this code
|
|
|
|
eventually? */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
Strings ss2 = unpackStrings(*i);
|
2004-12-20 14:43:32 +01:00
|
|
|
if (ss2.size() == 3) {
|
|
|
|
/* Another old-style substitute. */
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (ss2.size() != 2) throw Error("malformed substitute");
|
2004-06-20 21:17:54 +02:00
|
|
|
Strings::iterator j = ss2.begin();
|
|
|
|
Substitute sub;
|
|
|
|
sub.program = *j++;
|
|
|
|
sub.args = unpackStrings(*j++);
|
|
|
|
subs.push_back(sub);
|
|
|
|
}
|
|
|
|
|
|
|
|
return subs;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void writeSubstitutes(const Transaction & txn,
|
|
|
|
const Path & srcPath, const Substitutes & subs)
|
|
|
|
{
|
|
|
|
Strings ss;
|
|
|
|
|
|
|
|
for (Substitutes::const_iterator i = subs.begin();
|
|
|
|
i != subs.end(); ++i)
|
|
|
|
{
|
|
|
|
Strings ss2;
|
|
|
|
ss2.push_back(i->program);
|
|
|
|
ss2.push_back(packStrings(i->args));
|
|
|
|
ss.push_back(packStrings(ss2));
|
|
|
|
}
|
2003-12-05 12:05:19 +01:00
|
|
|
|
2004-06-28 12:42:57 +02:00
|
|
|
nixDB.setStrings(txn, dbSubstitutes, srcPath, ss);
|
2004-06-20 21:17:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-08-31 18:13:10 +02:00
|
|
|
void registerSubstitutes(const Transaction & txn,
|
|
|
|
const SubstitutePairs & subPairs)
|
2004-06-20 21:17:54 +02:00
|
|
|
{
|
2004-08-31 18:13:10 +02:00
|
|
|
for (SubstitutePairs::const_iterator i = subPairs.begin();
|
|
|
|
i != subPairs.end(); ++i)
|
|
|
|
{
|
|
|
|
const Path & srcPath(i->first);
|
|
|
|
const Substitute & sub(i->second);
|
2003-10-10 16:46:28 +02:00
|
|
|
|
2004-08-31 18:13:10 +02:00
|
|
|
assertStorePath(srcPath);
|
2004-06-20 21:17:54 +02:00
|
|
|
|
2004-08-31 18:13:10 +02:00
|
|
|
Substitutes subs = readSubstitutes(txn, srcPath);
|
|
|
|
|
|
|
|
/* New substitutes take precedence over old ones. If the
|
|
|
|
substitute is already present, it's moved to the front. */
|
|
|
|
remove(subs.begin(), subs.end(), sub);
|
|
|
|
subs.push_front(sub);
|
|
|
|
|
|
|
|
writeSubstitutes(txn, srcPath, subs);
|
|
|
|
}
|
2003-07-10 17:11:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-20 21:17:54 +02:00
|
|
|
Substitutes querySubstitutes(const Path & srcPath)
|
2003-10-16 18:29:57 +02:00
|
|
|
{
|
2004-06-20 21:17:54 +02:00
|
|
|
return readSubstitutes(noTxn, srcPath);
|
2003-10-16 18:29:57 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-12-20 15:16:55 +01:00
|
|
|
static void unregisterPredecessors(const Path & path, Transaction & txn)
|
|
|
|
{
|
|
|
|
/* Remove any successor mappings to this path (but not *from*
|
|
|
|
it). */
|
|
|
|
Paths revs;
|
|
|
|
nixDB.queryStrings(txn, dbSuccessorsRev, path, revs);
|
|
|
|
for (Paths::iterator i = revs.begin(); i != revs.end(); ++i)
|
|
|
|
nixDB.delPair(txn, dbSuccessors, *i);
|
|
|
|
nixDB.delPair(txn, dbSuccessorsRev, path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-12-20 14:43:32 +01:00
|
|
|
void clearSubstitutes()
|
|
|
|
{
|
2004-12-20 15:16:55 +01:00
|
|
|
Transaction txn(nixDB);
|
2004-12-20 14:43:32 +01:00
|
|
|
|
2004-12-20 15:16:55 +01:00
|
|
|
/* Iterate over all paths for which there are substitutes. */
|
|
|
|
Paths subKeys;
|
|
|
|
nixDB.enumTable(txn, dbSubstitutes, subKeys);
|
|
|
|
for (Paths::iterator i = subKeys.begin(); i != subKeys.end(); ++i) {
|
|
|
|
|
|
|
|
/* If this path has not become valid in the mean-while, delete
|
|
|
|
any successor mappings *to* it. This is to preserve the
|
|
|
|
invariant the all successors are `usable' as opposed to
|
|
|
|
`valid' (i.e., the successor must be valid *or* have at
|
|
|
|
least one substitute). */
|
|
|
|
if (!isValidPath(*i)) {
|
|
|
|
unregisterPredecessors(*i, txn);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Delete all substitutes for path *i. */
|
|
|
|
nixDB.delPair(txn, dbSubstitutes, *i);
|
|
|
|
}
|
|
|
|
|
|
|
|
txn.commit();
|
2004-12-20 14:43:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
void registerValidPath(const Transaction & txn, const Path & _path)
|
2003-07-07 11:25:26 +02:00
|
|
|
{
|
2003-10-08 17:06:59 +02:00
|
|
|
Path path(canonPath(_path));
|
2004-02-14 22:44:18 +01:00
|
|
|
assertStorePath(path);
|
2003-10-08 17:06:59 +02:00
|
|
|
debug(format("registering path `%1%'") % path);
|
|
|
|
nixDB.setString(txn, dbValidPaths, path, "");
|
|
|
|
}
|
2003-07-07 11:25:26 +02:00
|
|
|
|
2003-07-31 18:05:35 +02:00
|
|
|
|
2003-11-22 19:45:56 +01:00
|
|
|
static void invalidatePath(const Path & path, Transaction & txn)
|
2003-07-08 11:54:47 +02:00
|
|
|
{
|
2003-07-31 18:05:35 +02:00
|
|
|
debug(format("unregistering path `%1%'") % path);
|
2003-07-08 11:54:47 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
nixDB.delPair(txn, dbValidPaths, path);
|
2004-12-20 15:16:55 +01:00
|
|
|
unregisterPredecessors(path, txn);
|
2003-07-08 11:54:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-14 14:51:38 +01:00
|
|
|
Path makeStorePath(const string & type,
|
|
|
|
Hash & hash, const string & suffix)
|
|
|
|
{
|
|
|
|
/* e.g., "source:sha256:1abc...:/nix/store:foo.tar.gz" */
|
2005-01-14 17:04:03 +01:00
|
|
|
string s = type + ":sha256:" + printHash(hash) + ":"
|
2005-01-14 14:51:38 +01:00
|
|
|
+ nixStore + ":" + suffix;
|
|
|
|
|
2005-01-14 17:04:03 +01:00
|
|
|
return nixStore + "/"
|
|
|
|
+ printHash32(compressHash(hashString(s, htSHA256), 20))
|
|
|
|
+ "-" + suffix;
|
2005-01-14 14:51:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
Path addToStore(const Path & _srcPath)
|
2003-07-07 11:25:26 +02:00
|
|
|
{
|
2003-10-08 17:06:59 +02:00
|
|
|
Path srcPath(absPath(_srcPath));
|
|
|
|
debug(format("adding `%1%' to the store") % srcPath);
|
2003-07-07 11:25:26 +02:00
|
|
|
|
2005-01-14 14:51:38 +01:00
|
|
|
Hash h(htSHA256);
|
2004-09-09 23:12:53 +02:00
|
|
|
{
|
|
|
|
SwitchToOriginalUser sw;
|
2005-01-14 14:51:38 +01:00
|
|
|
h = hashPath(srcPath, htSHA256);
|
2004-09-09 23:12:53 +02:00
|
|
|
}
|
2003-07-10 17:11:48 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
string baseName = baseNameOf(srcPath);
|
2005-01-14 14:51:38 +01:00
|
|
|
Path dstPath = makeStorePath("source", h, baseName);
|
2003-07-10 17:11:48 +02:00
|
|
|
|
2004-10-25 16:38:23 +02:00
|
|
|
if (!readOnlyMode && !isValidPath(dstPath)) {
|
2003-07-10 17:11:48 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
/* The first check above is an optimisation to prevent
|
|
|
|
unnecessary lock acquisition. */
|
2003-07-22 17:15:15 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
PathSet lockPaths;
|
|
|
|
lockPaths.insert(dstPath);
|
|
|
|
PathLocks outputLock(lockPaths);
|
2003-07-22 17:15:15 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
if (!isValidPath(dstPath)) {
|
2004-06-21 09:46:02 +02:00
|
|
|
|
|
|
|
if (pathExists(dstPath)) deletePath(dstPath);
|
2004-10-25 16:38:23 +02:00
|
|
|
|
|
|
|
/* !!! race: srcPath might change between hashPath() and
|
|
|
|
here! */
|
2004-06-21 09:46:02 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
copyPath(srcPath, dstPath);
|
2003-08-01 11:01:51 +02:00
|
|
|
|
2005-01-14 14:51:38 +01:00
|
|
|
Hash h2 = hashPath(dstPath, htSHA256);
|
|
|
|
if (h != h2)
|
|
|
|
throw Error(format("contents of `%1%' changed while copying it to `%2%' (%3% -> %4%)")
|
2005-01-14 17:04:03 +01:00
|
|
|
% srcPath % dstPath % printHash(h) % printHash(h2));
|
2005-01-14 14:51:38 +01:00
|
|
|
|
2004-09-09 23:19:20 +02:00
|
|
|
makePathReadOnly(dstPath);
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
registerValidPath(txn, dstPath);
|
|
|
|
txn.commit();
|
2003-08-01 11:01:51 +02:00
|
|
|
}
|
2003-11-22 19:45:56 +01:00
|
|
|
|
|
|
|
outputLock.setDeletion(true);
|
2003-06-16 15:33:38 +02:00
|
|
|
}
|
2003-08-04 09:09:36 +02:00
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
return dstPath;
|
2003-06-16 15:33:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-14 14:51:38 +01:00
|
|
|
Path addTextToStore(const string & suffix, const string & s)
|
2003-10-15 14:42:39 +02:00
|
|
|
{
|
2005-01-14 14:51:38 +01:00
|
|
|
Hash hash = hashString(s, htSHA256);
|
|
|
|
|
|
|
|
Path dstPath = makeStorePath("text", hash, suffix);
|
2004-02-14 22:44:18 +01:00
|
|
|
|
2005-01-14 14:51:38 +01:00
|
|
|
if (!readOnlyMode && !isValidPath(dstPath)) {
|
2003-10-15 14:42:39 +02:00
|
|
|
|
2003-10-23 12:51:55 +02:00
|
|
|
PathSet lockPaths;
|
|
|
|
lockPaths.insert(dstPath);
|
|
|
|
PathLocks outputLock(lockPaths);
|
|
|
|
|
|
|
|
if (!isValidPath(dstPath)) {
|
2004-06-21 09:46:02 +02:00
|
|
|
|
|
|
|
if (pathExists(dstPath)) deletePath(dstPath);
|
|
|
|
|
2003-11-22 16:58:34 +01:00
|
|
|
writeStringToFile(dstPath, s);
|
2003-10-15 14:42:39 +02:00
|
|
|
|
2004-09-09 23:19:20 +02:00
|
|
|
makePathReadOnly(dstPath);
|
|
|
|
|
2003-10-23 12:51:55 +02:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
registerValidPath(txn, dstPath);
|
|
|
|
txn.commit();
|
|
|
|
}
|
2003-11-22 19:45:56 +01:00
|
|
|
|
|
|
|
outputLock.setDeletion(true);
|
2003-10-15 14:42:39 +02:00
|
|
|
}
|
2005-01-14 14:51:38 +01:00
|
|
|
|
|
|
|
return dstPath;
|
2003-10-15 14:42:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 17:06:59 +02:00
|
|
|
void deleteFromStore(const Path & _path)
|
2003-06-23 16:40:49 +02:00
|
|
|
{
|
2003-10-08 17:06:59 +02:00
|
|
|
Path path(canonPath(_path));
|
|
|
|
|
2004-02-14 22:44:18 +01:00
|
|
|
assertStorePath(path);
|
2003-07-08 11:54:47 +02:00
|
|
|
|
2003-11-22 19:45:56 +01:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
invalidatePath(path, txn);
|
|
|
|
txn.commit();
|
2003-07-08 11:54:47 +02:00
|
|
|
|
2003-06-27 16:56:12 +02:00
|
|
|
deletePath(path);
|
2003-06-23 16:40:49 +02:00
|
|
|
}
|
2003-07-17 14:27:55 +02:00
|
|
|
|
|
|
|
|
|
|
|
void verifyStore()
|
|
|
|
{
|
2003-07-31 21:49:11 +02:00
|
|
|
Transaction txn(nixDB);
|
|
|
|
|
2003-10-10 17:14:29 +02:00
|
|
|
Paths paths;
|
2003-11-22 19:45:56 +01:00
|
|
|
PathSet validPaths;
|
2003-10-10 17:14:29 +02:00
|
|
|
nixDB.enumTable(txn, dbValidPaths, paths);
|
2003-07-17 14:27:55 +02:00
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
for (Paths::iterator i = paths.begin(); i != paths.end(); ++i) {
|
2003-10-10 17:14:29 +02:00
|
|
|
Path path = *i;
|
2003-07-17 14:27:55 +02:00
|
|
|
if (!pathExists(path)) {
|
2004-01-13 12:53:12 +01:00
|
|
|
printMsg(lvlError, format("path `%1%' disappeared") % path);
|
2003-11-22 19:45:56 +01:00
|
|
|
invalidatePath(path, txn);
|
2004-02-14 22:44:18 +01:00
|
|
|
} else if (!isInStore(path)) {
|
|
|
|
printMsg(lvlError, format("path `%1%' is not in the Nix store") % path);
|
|
|
|
invalidatePath(path, txn);
|
2003-11-22 19:45:56 +01:00
|
|
|
} else
|
|
|
|
validPaths.insert(path);
|
2003-07-17 14:27:55 +02:00
|
|
|
}
|
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
/* !!! the code below does not allow transitive substitutes.
|
|
|
|
I.e., if B is a substitute of A, then B must be a valid path.
|
|
|
|
B cannot itself be invalid but have a substitute. */
|
2003-07-17 14:27:55 +02:00
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
/* "Usable" paths are those that are valid or have a substitute.
|
|
|
|
These are the paths that are allowed to appear in the
|
|
|
|
right-hand side of a sute mapping. */
|
|
|
|
PathSet usablePaths(validPaths);
|
2003-07-17 14:27:55 +02:00
|
|
|
|
2003-11-24 10:24:52 +01:00
|
|
|
/* Check that the values of the substitute mappings are valid
|
|
|
|
paths. */
|
2004-06-20 21:17:54 +02:00
|
|
|
Paths subKeys;
|
|
|
|
nixDB.enumTable(txn, dbSubstitutes, subKeys);
|
|
|
|
for (Paths::iterator i = subKeys.begin(); i != subKeys.end(); ++i) {
|
2004-12-20 14:43:32 +01:00
|
|
|
Substitutes subs = readSubstitutes(txn, *i);
|
|
|
|
if (subs.size() > 0)
|
2003-12-05 12:05:19 +01:00
|
|
|
usablePaths.insert(*i);
|
2004-12-20 15:16:55 +01:00
|
|
|
else
|
|
|
|
nixDB.delPair(txn, dbSubstitutes, *i);
|
2003-11-24 10:24:52 +01:00
|
|
|
}
|
2003-10-10 17:14:29 +02:00
|
|
|
|
2003-12-05 12:05:19 +01:00
|
|
|
/* Check that the values of the successor mappings are usable
|
|
|
|
paths. */
|
2004-06-20 21:17:54 +02:00
|
|
|
Paths sucKeys;
|
|
|
|
nixDB.enumTable(txn, dbSuccessors, sucKeys);
|
|
|
|
for (Paths::iterator i = sucKeys.begin(); i != sucKeys.end(); ++i) {
|
2003-12-05 12:05:19 +01:00
|
|
|
/* Note that *i itself does not have to be valid, just its
|
|
|
|
successor. */
|
|
|
|
Path sucPath;
|
|
|
|
if (nixDB.queryString(txn, dbSuccessors, *i, sucPath) &&
|
|
|
|
usablePaths.find(sucPath) == usablePaths.end())
|
|
|
|
{
|
2004-01-13 12:53:12 +01:00
|
|
|
printMsg(lvlError,
|
|
|
|
format("found successor mapping to non-existent path `%1%'") % sucPath);
|
2003-12-05 12:05:19 +01:00
|
|
|
nixDB.delPair(txn, dbSuccessors, *i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that the keys of the reverse successor mappings are valid
|
|
|
|
paths. */
|
2004-06-20 21:17:54 +02:00
|
|
|
Paths rsucKeys;
|
|
|
|
nixDB.enumTable(txn, dbSuccessorsRev, rsucKeys);
|
|
|
|
for (Paths::iterator i = rsucKeys.begin(); i != rsucKeys.end(); ++i) {
|
2003-12-05 12:05:19 +01:00
|
|
|
if (usablePaths.find(*i) == usablePaths.end()) {
|
2004-01-13 12:53:12 +01:00
|
|
|
printMsg(lvlError,
|
|
|
|
format("found reverse successor mapping for non-existent path `%1%'") % *i);
|
2003-12-05 12:05:19 +01:00
|
|
|
nixDB.delPair(txn, dbSuccessorsRev, *i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-07-31 21:49:11 +02:00
|
|
|
txn.commit();
|
2003-07-17 14:27:55 +02:00
|
|
|
}
|