2011-12-02 13:09:50 +01:00
|
|
|
|
#! @perl@ -w @perlFlags@
|
|
|
|
|
|
|
|
|
|
use strict;
|
|
|
|
|
use File::Basename;
|
|
|
|
|
use File::Temp qw(tempdir);
|
|
|
|
|
use File::stat;
|
|
|
|
|
use Nix::Store;
|
|
|
|
|
use Nix::Config;
|
|
|
|
|
|
|
|
|
|
my $url = shift;
|
|
|
|
|
my $expHash = shift;
|
|
|
|
|
my $hashType = $ENV{'NIX_HASH_ALGO'} || "sha256";
|
|
|
|
|
my $cacheDir = $ENV{'NIX_DOWNLOAD_CACHE'};
|
|
|
|
|
|
|
|
|
|
if (!defined $url || $url eq "") {
|
|
|
|
|
print STDERR <<EOF
|
|
|
|
|
Usage: nix-prefetch-url URL [EXPECTED-HASH]
|
|
|
|
|
EOF
|
|
|
|
|
;
|
|
|
|
|
exit 1;
|
|
|
|
|
}
|
2011-10-10 23:11:08 +02:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
sub writeFile {
|
|
|
|
|
my ($fn, $s) = @_;
|
|
|
|
|
open TMP, ">$fn" or die;
|
|
|
|
|
print TMP "$s" or die;
|
|
|
|
|
close TMP or die;
|
|
|
|
|
}
|
2006-08-05 02:33:52 +02:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
sub readFile {
|
|
|
|
|
local $/ = undef;
|
|
|
|
|
my ($fn) = @_;
|
|
|
|
|
open TMP, "<$fn" or die;
|
|
|
|
|
my $s = <TMP>;
|
|
|
|
|
close TMP or die;
|
|
|
|
|
return $s;
|
|
|
|
|
}
|
2005-03-14 18:05:20 +01:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
my $tmpDir = tempdir("nix-prefetch-url.XXXXXX", CLEANUP => 1, TMPDIR => 1)
|
|
|
|
|
or die "cannot create a temporary directory";
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 17:55:19 +01:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
# Hack to support the mirror:// scheme from Nixpkgs.
|
|
|
|
|
if ($url =~ /^mirror:\/\//) {
|
|
|
|
|
system("$Nix::Config::binDir/nix-build '<nixpkgs>' -A resolveMirrorURLs --argstr url '$url' -o $tmpDir/urls > /dev/null") == 0
|
|
|
|
|
or die "$0: nix-build failed; maybe \$NIX_PATH is not set properly\n";
|
|
|
|
|
my @expanded = split ' ', readFile("$tmpDir/urls");
|
|
|
|
|
die "$0: cannot resolve ‘$url’" unless scalar @expanded > 0;
|
|
|
|
|
print STDERR "$url expands to $expanded[0]\n";
|
|
|
|
|
$url = $expanded[0];
|
|
|
|
|
}
|
2003-08-15 12:13:41 +02:00
|
|
|
|
|
2010-02-16 01:10:39 +01:00
|
|
|
|
# Handle escaped characters in the URI. `+', `=' and `?' are the only
|
|
|
|
|
# characters that are valid in Nix store path names but have a special
|
|
|
|
|
# meaning in URIs.
|
2011-12-02 13:09:50 +01:00
|
|
|
|
my $name = basename $url;
|
|
|
|
|
die "cannot figure out file name for ‘$url’\n" if $name eq "";
|
|
|
|
|
$name =~ s/%2b/+/g;
|
|
|
|
|
$name =~ s/%3d/=/g;
|
|
|
|
|
$name =~ s/%3f/?/g;
|
2003-08-15 12:13:41 +02:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
my $finalPath;
|
|
|
|
|
my $hash;
|
2004-12-13 14:35:36 +01:00
|
|
|
|
|
2005-04-07 16:01:51 +02:00
|
|
|
|
# If the hash was given, a file with that hash may already be in the
|
|
|
|
|
# store.
|
2011-12-02 13:09:50 +01:00
|
|
|
|
if (defined $expHash) {
|
|
|
|
|
$finalPath = makeFixedOutputPath(0, $hashType, $expHash, $name);
|
|
|
|
|
if (isValidPath($finalPath)) { $hash = $expHash; } else { $finalPath = undef; }
|
2007-11-05 19:12:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2005-04-07 16:01:51 +02:00
|
|
|
|
# If we don't know the hash or a file with that hash doesn't exist,
|
|
|
|
|
# download the file and add it to the store.
|
2011-12-02 13:09:50 +01:00
|
|
|
|
if (!defined $finalPath) {
|
2004-12-13 14:35:36 +01:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
my $tmpFile = "$tmpDir/$name";
|
|
|
|
|
|
2007-08-10 01:16:44 +02:00
|
|
|
|
# Optionally do timestamp-based caching of the download.
|
|
|
|
|
# Actually, the only thing that we cache in $NIX_DOWNLOAD_CACHE is
|
|
|
|
|
# the hash and the timestamp of the file at $url. The caching of
|
|
|
|
|
# the file *contents* is done in Nix store, where it can be
|
|
|
|
|
# garbage-collected independently.
|
2011-12-02 13:09:50 +01:00
|
|
|
|
my ($cachedTimestampFN, $cachedHashFN, @cacheFlags);
|
|
|
|
|
if (defined $cacheDir) {
|
|
|
|
|
my $urlHash = hashString("sha256", 1, $url);
|
|
|
|
|
writeFile "$cacheDir/$urlHash.url", $url;
|
|
|
|
|
$cachedHashFN = "$cacheDir/$urlHash.$hashType";
|
|
|
|
|
$cachedTimestampFN = "$cacheDir/$urlHash.stamp";
|
|
|
|
|
@cacheFlags = ("--time-cond", $cachedTimestampFN) if -f $cachedHashFN && -f $cachedTimestampFN;
|
|
|
|
|
}
|
|
|
|
|
|
2005-02-22 22:14:41 +01:00
|
|
|
|
# Perform the download.
|
2011-12-02 13:09:50 +01:00
|
|
|
|
my @curlFlags = ("curl", $url, "-o", $tmpFile, "--fail", "--location", "--max-redirs", "20", "--disable-epsv", "--cookie-jar", "$tmpDir/cookies", "--remote-time", (split " ", ($ENV{NIX_CURL_FLAGS} || "")));
|
|
|
|
|
(system $Nix::Config::curl @curlFlags, @cacheFlags) == 0 or die "$0: download of ‘$url’ failed\n";
|
2007-08-10 01:16:44 +02:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
if (defined $cacheDir && ! -e $tmpFile) {
|
2007-08-10 01:16:44 +02:00
|
|
|
|
# Curl didn't create $tmpFile, so apparently there's no newer
|
|
|
|
|
# file on the server.
|
2011-12-02 13:09:50 +01:00
|
|
|
|
$hash = readFile $cachedHashFN or die;
|
|
|
|
|
$finalPath = makeFixedOutputPath(0, $hashType, $hash, $name);
|
|
|
|
|
unless (isValidPath $finalPath) {
|
|
|
|
|
print STDERR "cached contents of ‘$url’ disappeared, redownloading...\n";
|
|
|
|
|
$finalPath = undef;
|
|
|
|
|
(system $Nix::Config::curl @curlFlags) == 0 or die "$0: download of ‘$url’ failed\n";
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!defined $finalPath) {
|
|
|
|
|
|
2007-08-10 01:16:44 +02:00
|
|
|
|
# Compute the hash.
|
2011-12-02 13:09:50 +01:00
|
|
|
|
$hash = hashFile($hashType, $hashType ne "md5", $tmpFile);
|
|
|
|
|
|
|
|
|
|
if (defined $cacheDir) {
|
|
|
|
|
writeFile $cachedHashFN, $hash;
|
|
|
|
|
my $st = stat($tmpFile) or die;
|
|
|
|
|
open STAMP, ">$cachedTimestampFN" or die; close STAMP;
|
|
|
|
|
utime($st->atime, $st->mtime, $cachedTimestampFN) or die;
|
|
|
|
|
}
|
|
|
|
|
|
2007-08-10 01:16:44 +02:00
|
|
|
|
# Add the downloaded file to the Nix store.
|
2011-12-02 13:09:50 +01:00
|
|
|
|
$finalPath = addToStore($tmpFile, 0, $hashType);
|
|
|
|
|
}
|
2003-08-15 12:13:41 +02:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
die "$0: hash mismatch for ‘$url’\n" if defined $expHash && $expHash ne $hash;
|
|
|
|
|
}
|
2003-08-15 12:13:41 +02:00
|
|
|
|
|
2011-12-02 13:09:50 +01:00
|
|
|
|
print STDERR "path is ‘$finalPath’\n" unless $ENV{'QUIET'};
|
|
|
|
|
print "$hash\n";
|
|
|
|
|
print "$finalPath\n" if $ENV{'PRINT_PATH'};
|