2006-11-30 19:19:59 +00:00
|
|
|
#include "serialise.hh"
|
|
|
|
#include "util.hh"
|
|
|
|
|
2008-05-21 11:17:31 +00:00
|
|
|
#include <cstring>
|
2011-12-15 12:32:08 +00:00
|
|
|
#include <cerrno>
|
2017-01-16 21:24:29 +00:00
|
|
|
#include <memory>
|
2008-05-21 11:17:31 +00:00
|
|
|
|
2018-03-16 19:22:34 +00:00
|
|
|
#include <boost/coroutine2/coroutine.hpp>
|
|
|
|
|
2006-11-30 19:19:59 +00:00
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
|
2011-12-15 16:19:53 +00:00
|
|
|
void BufferedSink::operator () (const unsigned char * data, size_t len)
|
2006-11-30 19:19:59 +00:00
|
|
|
{
|
2016-07-13 10:03:37 +00:00
|
|
|
if (!buffer) buffer = decltype(buffer)(new unsigned char[bufSize]);
|
2015-07-19 23:16:16 +00:00
|
|
|
|
2011-12-14 23:30:06 +00:00
|
|
|
while (len) {
|
|
|
|
/* Optimisation: bypass the buffer if the data exceeds the
|
2011-12-16 19:44:13 +00:00
|
|
|
buffer size. */
|
|
|
|
if (bufPos + len >= bufSize) {
|
|
|
|
flush();
|
2011-12-15 16:19:53 +00:00
|
|
|
write(data, len);
|
2011-12-14 23:30:06 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* Otherwise, copy the bytes to the buffer. Flush the buffer
|
|
|
|
when it's full. */
|
|
|
|
size_t n = bufPos + len > bufSize ? bufSize - bufPos : len;
|
2016-07-13 10:03:37 +00:00
|
|
|
memcpy(buffer.get() + bufPos, data, n);
|
2011-12-14 23:30:06 +00:00
|
|
|
data += n; bufPos += n; len -= n;
|
|
|
|
if (bufPos == bufSize) flush();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-15 16:19:53 +00:00
|
|
|
void BufferedSink::flush()
|
2011-12-14 23:30:06 +00:00
|
|
|
{
|
2011-12-15 16:19:53 +00:00
|
|
|
if (bufPos == 0) return;
|
2011-12-16 15:45:42 +00:00
|
|
|
size_t n = bufPos;
|
|
|
|
bufPos = 0; // don't trigger the assert() in ~BufferedSink()
|
2016-07-13 10:03:37 +00:00
|
|
|
write(buffer.get(), n);
|
2011-12-16 15:45:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
FdSink::~FdSink()
|
|
|
|
{
|
|
|
|
try { flush(); } catch (...) { ignoreException(); }
|
2006-11-30 19:19:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-06-10 11:30:09 +00:00
|
|
|
size_t threshold = 256 * 1024 * 1024;
|
|
|
|
|
|
|
|
static void warnLargeDump()
|
|
|
|
{
|
2020-06-15 12:06:58 +00:00
|
|
|
logWarning({
|
2020-05-11 19:02:16 +00:00
|
|
|
.name = "Large path",
|
|
|
|
.description = "dumping very large path (> 256 MiB); this may run out of memory"
|
2020-06-15 12:06:58 +00:00
|
|
|
});
|
2014-06-10 11:30:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-15 16:19:53 +00:00
|
|
|
void FdSink::write(const unsigned char * data, size_t len)
|
|
|
|
{
|
2016-02-26 15:16:08 +00:00
|
|
|
written += len;
|
2014-06-10 11:30:09 +00:00
|
|
|
static bool warned = false;
|
|
|
|
if (warn && !warned) {
|
|
|
|
if (written > threshold) {
|
|
|
|
warnLargeDump();
|
|
|
|
warned = true;
|
|
|
|
}
|
|
|
|
}
|
2016-02-24 10:39:56 +00:00
|
|
|
try {
|
|
|
|
writeFull(fd, data, len);
|
|
|
|
} catch (SysError & e) {
|
2018-02-13 11:05:25 +00:00
|
|
|
_good = false;
|
|
|
|
throw;
|
2016-02-24 10:39:56 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool FdSink::good()
|
|
|
|
{
|
|
|
|
return _good;
|
2011-12-15 16:19:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-16 19:44:13 +00:00
|
|
|
void Source::operator () (unsigned char * data, size_t len)
|
|
|
|
{
|
|
|
|
while (len) {
|
|
|
|
size_t n = read(data, len);
|
|
|
|
data += n; len -= n;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-09-13 12:39:11 +00:00
|
|
|
void Source::drainInto(Sink & sink)
|
2018-03-16 19:22:34 +00:00
|
|
|
{
|
|
|
|
std::string s;
|
|
|
|
std::vector<unsigned char> buf(8192);
|
|
|
|
while (true) {
|
|
|
|
size_t n;
|
|
|
|
try {
|
|
|
|
n = read(buf.data(), buf.size());
|
2020-09-13 12:39:11 +00:00
|
|
|
sink(buf.data(), n);
|
2018-03-16 19:22:34 +00:00
|
|
|
} catch (EndOfFile &) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2020-09-13 12:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
std::string Source::drain()
|
|
|
|
{
|
|
|
|
StringSink s;
|
|
|
|
drainInto(s);
|
|
|
|
return *s.s;
|
2018-03-16 19:22:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-16 19:44:13 +00:00
|
|
|
size_t BufferedSource::read(unsigned char * data, size_t len)
|
2006-11-30 19:19:59 +00:00
|
|
|
{
|
2016-07-13 10:03:37 +00:00
|
|
|
if (!buffer) buffer = decltype(buffer)(new unsigned char[bufSize]);
|
2011-12-15 12:32:08 +00:00
|
|
|
|
2016-07-13 10:03:37 +00:00
|
|
|
if (!bufPosIn) bufPosIn = readUnbuffered(buffer.get(), bufSize);
|
2015-07-19 23:16:16 +00:00
|
|
|
|
2011-12-16 19:44:13 +00:00
|
|
|
/* Copy out the data in the buffer. */
|
|
|
|
size_t n = len > bufPosIn - bufPosOut ? bufPosIn - bufPosOut : len;
|
2016-07-13 10:03:37 +00:00
|
|
|
memcpy(data, buffer.get() + bufPosOut, n);
|
2011-12-16 19:44:13 +00:00
|
|
|
bufPosOut += n;
|
|
|
|
if (bufPosIn == bufPosOut) bufPosIn = bufPosOut = 0;
|
|
|
|
return n;
|
2006-11-30 19:19:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-07 13:02:14 +00:00
|
|
|
bool BufferedSource::hasData()
|
|
|
|
{
|
|
|
|
return bufPosOut < bufPosIn;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-16 19:44:13 +00:00
|
|
|
size_t FdSource::readUnbuffered(unsigned char * data, size_t len)
|
2011-12-15 16:19:53 +00:00
|
|
|
{
|
|
|
|
ssize_t n;
|
|
|
|
do {
|
|
|
|
checkInterrupt();
|
2018-05-21 22:26:41 +00:00
|
|
|
n = ::read(fd, (char *) data, len);
|
2011-12-15 16:19:53 +00:00
|
|
|
} while (n == -1 && errno == EINTR);
|
2016-02-24 10:39:56 +00:00
|
|
|
if (n == -1) { _good = false; throw SysError("reading from file"); }
|
|
|
|
if (n == 0) { _good = false; throw EndOfFile("unexpected end-of-file"); }
|
2016-02-26 15:16:08 +00:00
|
|
|
read += n;
|
2011-12-15 16:19:53 +00:00
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-02-24 10:39:56 +00:00
|
|
|
bool FdSource::good()
|
|
|
|
{
|
|
|
|
return _good;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-16 19:44:13 +00:00
|
|
|
size_t StringSource::read(unsigned char * data, size_t len)
|
|
|
|
{
|
|
|
|
if (pos == s.size()) throw EndOfFile("end of string reached");
|
|
|
|
size_t n = s.copy((char *) data, len, pos);
|
|
|
|
pos += n;
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-07-31 14:35:05 +00:00
|
|
|
#if BOOST_VERSION >= 106300 && BOOST_VERSION < 106600
|
|
|
|
#error Coroutines are broken in this version of Boost!
|
|
|
|
#endif
|
|
|
|
|
2020-10-30 19:55:53 +00:00
|
|
|
/* A concrete datatype allow virtual dispatch of stack allocation methods. */
|
|
|
|
struct VirtualStackAllocator {
|
|
|
|
StackAllocator *allocator = StackAllocator::defaultAllocator;
|
|
|
|
|
|
|
|
boost::context::stack_context allocate() {
|
|
|
|
return allocator->allocate();
|
|
|
|
}
|
|
|
|
|
|
|
|
void deallocate(boost::context::stack_context sctx) {
|
|
|
|
allocator->deallocate(sctx);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* This class reifies the default boost coroutine stack allocation strategy with
|
|
|
|
a virtual interface. */
|
|
|
|
class DefaultStackAllocator : public StackAllocator {
|
|
|
|
boost::coroutines2::default_stack stack;
|
|
|
|
|
|
|
|
boost::context::stack_context allocate() {
|
|
|
|
return stack.allocate();
|
|
|
|
}
|
|
|
|
|
|
|
|
void deallocate(boost::context::stack_context sctx) {
|
2020-11-10 03:24:55 +00:00
|
|
|
stack.deallocate(sctx);
|
2020-10-30 19:55:53 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static DefaultStackAllocator defaultAllocatorSingleton;
|
|
|
|
|
|
|
|
StackAllocator *StackAllocator::defaultAllocator = &defaultAllocatorSingleton;
|
|
|
|
|
|
|
|
|
2018-08-21 13:22:04 +00:00
|
|
|
std::unique_ptr<Source> sinkToSource(
|
2020-07-15 23:19:41 +00:00
|
|
|
std::function<void(Sink &)> fun,
|
2018-08-21 13:22:04 +00:00
|
|
|
std::function<void()> eof)
|
2018-03-16 19:22:34 +00:00
|
|
|
{
|
|
|
|
struct SinkToSource : Source
|
|
|
|
{
|
2020-07-15 23:19:41 +00:00
|
|
|
typedef boost::coroutines2::coroutine<std::string> coro_t;
|
2018-03-16 19:22:34 +00:00
|
|
|
|
2020-07-15 23:19:41 +00:00
|
|
|
std::function<void(Sink &)> fun;
|
2018-08-21 13:22:04 +00:00
|
|
|
std::function<void()> eof;
|
2019-02-12 12:43:32 +00:00
|
|
|
std::optional<coro_t::pull_type> coro;
|
2018-09-26 19:19:34 +00:00
|
|
|
bool started = false;
|
2018-03-16 19:22:34 +00:00
|
|
|
|
2020-07-15 23:19:41 +00:00
|
|
|
SinkToSource(std::function<void(Sink &)> fun, std::function<void()> eof)
|
2018-09-26 19:19:34 +00:00
|
|
|
: fun(fun), eof(eof)
|
2018-03-16 19:22:34 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2020-07-15 23:19:41 +00:00
|
|
|
std::string cur;
|
2018-03-16 19:22:34 +00:00
|
|
|
size_t pos = 0;
|
|
|
|
|
|
|
|
size_t read(unsigned char * data, size_t len) override
|
|
|
|
{
|
2020-07-15 23:19:41 +00:00
|
|
|
if (!coro)
|
2020-10-30 19:55:53 +00:00
|
|
|
coro = coro_t::pull_type(VirtualStackAllocator{}, [&](coro_t::push_type & yield) {
|
2020-07-15 23:19:41 +00:00
|
|
|
LambdaSink sink([&](const unsigned char * data, size_t len) {
|
|
|
|
if (len) yield(std::string((const char *) data, len));
|
2018-09-26 19:19:34 +00:00
|
|
|
});
|
2020-07-15 23:19:41 +00:00
|
|
|
fun(sink);
|
2018-09-26 19:19:34 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
if (!*coro) { eof(); abort(); }
|
2018-03-16 19:22:34 +00:00
|
|
|
|
|
|
|
if (pos == cur.size()) {
|
2018-09-26 19:19:34 +00:00
|
|
|
if (!cur.empty()) (*coro)();
|
|
|
|
cur = coro->get();
|
2018-03-16 19:22:34 +00:00
|
|
|
pos = 0;
|
|
|
|
}
|
|
|
|
|
2020-07-15 23:19:41 +00:00
|
|
|
auto n = std::min(cur.size() - pos, len);
|
|
|
|
memcpy(data, (unsigned char *) cur.data() + pos, n);
|
|
|
|
pos += n;
|
2018-03-16 19:22:34 +00:00
|
|
|
|
2020-07-15 23:19:41 +00:00
|
|
|
return n;
|
2018-03-16 19:22:34 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-08-21 13:22:04 +00:00
|
|
|
return std::make_unique<SinkToSource>(fun, eof);
|
2018-03-16 19:22:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-15 16:19:53 +00:00
|
|
|
void writePadding(size_t len, Sink & sink)
|
2006-11-30 19:19:59 +00:00
|
|
|
{
|
|
|
|
if (len % 8) {
|
|
|
|
unsigned char zero[8];
|
|
|
|
memset(zero, 0, sizeof(zero));
|
|
|
|
sink(zero, 8 - (len % 8));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-16 21:29:46 +00:00
|
|
|
void writeString(const unsigned char * buf, size_t len, Sink & sink)
|
2006-11-30 19:19:59 +00:00
|
|
|
{
|
2015-07-19 23:16:16 +00:00
|
|
|
sink << len;
|
2011-12-16 21:29:46 +00:00
|
|
|
sink(buf, len);
|
2006-11-30 19:19:59 +00:00
|
|
|
writePadding(len, sink);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-19 23:16:16 +00:00
|
|
|
Sink & operator << (Sink & sink, const string & s)
|
2011-12-16 21:29:46 +00:00
|
|
|
{
|
2012-02-09 17:27:45 +00:00
|
|
|
writeString((const unsigned char *) s.data(), s.size(), sink);
|
2015-07-19 23:16:16 +00:00
|
|
|
return sink;
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 15:57:40 +00:00
|
|
|
}
|
|
|
|
|
2011-12-16 21:29:46 +00:00
|
|
|
|
2011-12-16 22:31:25 +00:00
|
|
|
template<class T> void writeStrings(const T & ss, Sink & sink)
|
2006-11-30 22:43:55 +00:00
|
|
|
{
|
2015-07-19 23:16:16 +00:00
|
|
|
sink << ss.size();
|
2015-07-17 17:24:28 +00:00
|
|
|
for (auto & i : ss)
|
2015-07-19 23:16:16 +00:00
|
|
|
sink << i;
|
2006-11-30 22:43:55 +00:00
|
|
|
}
|
|
|
|
|
2015-07-19 23:16:16 +00:00
|
|
|
Sink & operator << (Sink & sink, const Strings & s)
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 15:57:40 +00:00
|
|
|
{
|
2015-07-19 23:16:16 +00:00
|
|
|
writeStrings(s, sink);
|
|
|
|
return sink;
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 15:57:40 +00:00
|
|
|
}
|
|
|
|
|
2015-07-19 23:16:16 +00:00
|
|
|
Sink & operator << (Sink & sink, const StringSet & s)
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 15:57:40 +00:00
|
|
|
{
|
2015-07-19 23:16:16 +00:00
|
|
|
writeStrings(s, sink);
|
|
|
|
return sink;
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 15:57:40 +00:00
|
|
|
}
|
|
|
|
|
2020-10-07 14:34:03 +00:00
|
|
|
Sink & operator << (Sink & sink, const Error & ex)
|
|
|
|
{
|
|
|
|
auto info = ex.info();
|
|
|
|
sink
|
|
|
|
<< "Error"
|
|
|
|
<< info.level
|
|
|
|
<< info.name
|
|
|
|
<< info.description
|
|
|
|
<< (info.hint ? info.hint->str() : "")
|
|
|
|
<< 0 // FIXME: info.errPos
|
|
|
|
<< info.traces.size();
|
|
|
|
for (auto & trace : info.traces) {
|
|
|
|
sink << 0; // FIXME: trace.pos
|
|
|
|
sink << trace.hint.str();
|
|
|
|
}
|
|
|
|
return sink;
|
|
|
|
}
|
|
|
|
|
2006-11-30 22:43:55 +00:00
|
|
|
|
2011-12-15 16:19:53 +00:00
|
|
|
void readPadding(size_t len, Source & source)
|
2006-11-30 19:19:59 +00:00
|
|
|
{
|
|
|
|
if (len % 8) {
|
|
|
|
unsigned char zero[8];
|
2011-12-15 16:19:53 +00:00
|
|
|
size_t n = 8 - (len % 8);
|
2006-11-30 19:19:59 +00:00
|
|
|
source(zero, n);
|
|
|
|
for (unsigned int i = 0; i < n; i++)
|
2009-03-22 17:36:43 +00:00
|
|
|
if (zero[i]) throw SerialisationError("non-zero padding");
|
2006-11-30 19:19:59 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-16 21:29:46 +00:00
|
|
|
size_t readString(unsigned char * buf, size_t max, Source & source)
|
|
|
|
{
|
2017-03-01 12:52:54 +00:00
|
|
|
auto len = readNum<size_t>(source);
|
2018-09-26 10:03:58 +00:00
|
|
|
if (len > max) throw SerialisationError("string is too long");
|
2011-12-16 21:29:46 +00:00
|
|
|
source(buf, len);
|
|
|
|
readPadding(len, source);
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2015-07-19 23:16:16 +00:00
|
|
|
|
2018-09-26 10:03:58 +00:00
|
|
|
string readString(Source & source, size_t max)
|
2006-11-30 19:19:59 +00:00
|
|
|
{
|
2017-03-01 12:52:54 +00:00
|
|
|
auto len = readNum<size_t>(source);
|
2018-09-26 10:03:58 +00:00
|
|
|
if (len > max) throw SerialisationError("string is too long");
|
2017-03-01 13:54:11 +00:00
|
|
|
std::string res(len, 0);
|
|
|
|
source((unsigned char*) res.data(), len);
|
2006-11-30 19:19:59 +00:00
|
|
|
readPadding(len, source);
|
2017-03-01 13:54:11 +00:00
|
|
|
return res;
|
2006-11-30 19:19:59 +00:00
|
|
|
}
|
|
|
|
|
Allow remote builds without sending the derivation closure
Previously, to build a derivation remotely, we had to copy the entire
closure of the .drv file to the remote machine, even though we only
need the top-level derivation. This is very wasteful: the closure can
contain thousands of store paths, and in some Hydra use cases, include
source paths that are very large (e.g. Git/Mercurial checkouts).
So now there is a new operation, StoreAPI::buildDerivation(), that
performs a build from an in-memory representation of a derivation
(BasicDerivation) rather than from a on-disk .drv file. The only files
that need to be in the Nix store are the sources of the derivation
(drv.inputSrcs), and the needed output paths of the dependencies (as
described by drv.inputDrvs). "nix-store --serve" exposes this
interface.
Note that this is a privileged operation, because you can construct a
derivation that builds any store path whatsoever. Fixing this will
require changing the hashing scheme (i.e., the output paths should be
computed from the other fields in BasicDerivation, allowing them to be
verified without access to other derivations). However, this would be
quite nice because it would allow .drv-free building (e.g. "nix-env
-i" wouldn't have to write any .drv files to disk).
Fixes #173.
2015-07-17 15:57:40 +00:00
|
|
|
Source & operator >> (Source & in, string & s)
|
|
|
|
{
|
|
|
|
s = readString(in);
|
|
|
|
return in;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-16 22:31:25 +00:00
|
|
|
template<class T> T readStrings(Source & source)
|
2006-11-30 22:43:55 +00:00
|
|
|
{
|
2017-03-01 12:52:54 +00:00
|
|
|
auto count = readNum<size_t>(source);
|
2011-12-16 22:31:25 +00:00
|
|
|
T ss;
|
2006-11-30 22:43:55 +00:00
|
|
|
while (count--)
|
2011-12-16 22:31:25 +00:00
|
|
|
ss.insert(ss.end(), readString(source));
|
2006-11-30 22:43:55 +00:00
|
|
|
return ss;
|
|
|
|
}
|
|
|
|
|
2011-12-16 22:31:25 +00:00
|
|
|
template Paths readStrings(Source & source);
|
|
|
|
template PathSet readStrings(Source & source);
|
|
|
|
|
2006-11-30 22:43:55 +00:00
|
|
|
|
2020-10-07 14:34:03 +00:00
|
|
|
Error readError(Source & source)
|
|
|
|
{
|
|
|
|
auto type = readString(source);
|
|
|
|
assert(type == "Error");
|
|
|
|
ErrorInfo info;
|
|
|
|
info.level = (Verbosity) readInt(source);
|
|
|
|
info.name = readString(source);
|
|
|
|
info.description = readString(source);
|
|
|
|
auto hint = readString(source);
|
|
|
|
if (hint != "") info.hint = hintformat(std::move(format("%s") % hint));
|
|
|
|
auto havePos = readNum<size_t>(source);
|
|
|
|
assert(havePos == 0);
|
|
|
|
auto nrTraces = readNum<size_t>(source);
|
|
|
|
for (size_t i = 0; i < nrTraces; ++i) {
|
|
|
|
havePos = readNum<size_t>(source);
|
|
|
|
assert(havePos == 0);
|
|
|
|
info.traces.push_back(Trace {
|
|
|
|
.hint = hintformat(std::move(format("%s") % readString(source)))
|
|
|
|
});
|
|
|
|
}
|
|
|
|
return Error(std::move(info));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-06-10 11:30:09 +00:00
|
|
|
void StringSink::operator () (const unsigned char * data, size_t len)
|
|
|
|
{
|
|
|
|
static bool warned = false;
|
2016-03-04 15:49:56 +00:00
|
|
|
if (!warned && s->size() > threshold) {
|
2014-06-10 11:30:09 +00:00
|
|
|
warnLargeDump();
|
|
|
|
warned = true;
|
|
|
|
}
|
2016-03-04 15:49:56 +00:00
|
|
|
s->append((const char *) data, len);
|
2014-06-10 11:30:09 +00:00
|
|
|
}
|
|
|
|
|
2020-07-15 23:14:30 +00:00
|
|
|
size_t ChainSource::read(unsigned char * data, size_t len)
|
|
|
|
{
|
|
|
|
if (useSecond) {
|
|
|
|
return source2.read(data, len);
|
|
|
|
} else {
|
|
|
|
try {
|
|
|
|
return source1.read(data, len);
|
|
|
|
} catch (EndOfFile &) {
|
|
|
|
useSecond = true;
|
|
|
|
return this->read(data, len);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-06-10 11:30:09 +00:00
|
|
|
|
2006-11-30 19:19:59 +00:00
|
|
|
}
|