2019-02-12 17:23:11 +00:00
|
|
|
#include "flake.hh"
|
2019-06-04 18:01:21 +00:00
|
|
|
#include "lockfile.hh"
|
2018-11-29 18:18:36 +00:00
|
|
|
#include "primops.hh"
|
|
|
|
#include "eval-inline.hh"
|
2020-01-21 15:27:53 +00:00
|
|
|
#include "store-api.hh"
|
|
|
|
#include "fetchers/fetchers.hh"
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2019-02-21 05:53:01 +00:00
|
|
|
#include <iostream>
|
2019-05-28 18:34:02 +00:00
|
|
|
#include <ctime>
|
|
|
|
#include <iomanip>
|
2018-11-29 18:18:36 +00:00
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
2019-05-29 13:31:07 +00:00
|
|
|
using namespace flake;
|
|
|
|
|
|
|
|
namespace flake {
|
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
/* If 'allowLookup' is true, then resolve 'flakeRef' using the
|
|
|
|
registries. */
|
|
|
|
static FlakeRef maybeLookupFlake(
|
2019-06-21 17:04:58 +00:00
|
|
|
EvalState & state,
|
|
|
|
const FlakeRef & flakeRef,
|
|
|
|
bool allowLookup)
|
2018-11-29 18:18:36 +00:00
|
|
|
{
|
2019-06-21 17:04:58 +00:00
|
|
|
if (!flakeRef.isDirect()) {
|
|
|
|
if (allowLookup)
|
2020-01-21 15:27:53 +00:00
|
|
|
return flakeRef.resolve(state.store);
|
2019-06-21 17:04:58 +00:00
|
|
|
else
|
|
|
|
throw Error("'%s' is an indirect flake reference, but registry lookups are not allowed", flakeRef);
|
|
|
|
} else
|
|
|
|
return flakeRef;
|
|
|
|
}
|
2019-05-01 09:38:48 +00:00
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
typedef std::vector<std::pair<FlakeRef, FlakeRef>> RefMap;
|
|
|
|
|
|
|
|
static FlakeRef lookupInRefMap(
|
|
|
|
const RefMap & refMap,
|
|
|
|
const FlakeRef & flakeRef)
|
|
|
|
{
|
2020-01-21 15:27:53 +00:00
|
|
|
#if 0
|
2019-09-18 21:59:45 +00:00
|
|
|
// FIXME: inefficient.
|
|
|
|
for (auto & i : refMap) {
|
|
|
|
if (flakeRef.contains(i.first)) {
|
|
|
|
debug("mapping '%s' to previously seen input '%s' -> '%s",
|
|
|
|
flakeRef, i.first, i.second);
|
|
|
|
return i.second;
|
|
|
|
}
|
|
|
|
}
|
2020-01-21 15:27:53 +00:00
|
|
|
#endif
|
2019-09-18 21:59:45 +00:00
|
|
|
|
|
|
|
return flakeRef;
|
|
|
|
}
|
2019-06-21 17:04:58 +00:00
|
|
|
|
2019-09-09 14:34:44 +00:00
|
|
|
static void expectType(EvalState & state, ValueType type,
|
|
|
|
Value & value, const Pos & pos)
|
|
|
|
{
|
2019-09-09 15:34:38 +00:00
|
|
|
if (value.type == tThunk && value.isTrivial())
|
2019-09-09 14:34:44 +00:00
|
|
|
state.forceValue(value, pos);
|
|
|
|
if (value.type != type)
|
|
|
|
throw Error("expected %s but got %s at %s",
|
|
|
|
showType(type), showType(value.type), pos);
|
|
|
|
}
|
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
static Flake getFlake(EvalState & state, const FlakeRef & originalRef,
|
|
|
|
bool allowLookup, RefMap & refMap)
|
2018-11-30 15:11:15 +00:00
|
|
|
{
|
2019-09-18 21:59:45 +00:00
|
|
|
auto flakeRef = lookupInRefMap(refMap,
|
|
|
|
maybeLookupFlake(state,
|
|
|
|
lookupInRefMap(refMap, originalRef), allowLookup));
|
2019-09-18 19:17:27 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
auto [sourceInfo, resolvedInput] = flakeRef.input->fetchTree(state.store);
|
|
|
|
|
|
|
|
FlakeRef resolvedRef(resolvedInput, flakeRef.subdir);
|
2019-05-01 08:34:23 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
debug("got flake source '%s' from flake URL '%s'",
|
|
|
|
state.store->printStorePath(sourceInfo.storePath), resolvedRef);
|
2019-02-25 15:20:50 +00:00
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
refMap.push_back({originalRef, resolvedRef});
|
|
|
|
refMap.push_back({flakeRef, resolvedRef});
|
|
|
|
|
2019-02-12 19:35:03 +00:00
|
|
|
if (state.allowedPaths)
|
2020-01-21 15:27:53 +00:00
|
|
|
state.allowedPaths->insert(sourceInfo.actualPath);
|
2019-02-12 19:35:03 +00:00
|
|
|
|
2019-05-01 18:38:41 +00:00
|
|
|
// Guard against symlink attacks.
|
2020-01-21 15:27:53 +00:00
|
|
|
auto flakeFile = canonPath(sourceInfo.actualPath + "/" + resolvedRef.subdir + "/flake.nix");
|
|
|
|
if (!isInDir(flakeFile, sourceInfo.actualPath))
|
|
|
|
throw Error("'flake.nix' file of flake '%s' escapes from '%s'",
|
|
|
|
resolvedRef, state.store->printStorePath(sourceInfo.storePath));
|
|
|
|
|
|
|
|
Flake flake {
|
|
|
|
.originalRef = originalRef,
|
|
|
|
.resolvedRef = resolvedRef,
|
|
|
|
.sourceInfo = std::make_shared<fetchers::Tree>(std::move(sourceInfo))
|
|
|
|
};
|
2019-05-01 09:38:48 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
if (!pathExists(flakeFile))
|
2019-05-01 16:07:36 +00:00
|
|
|
throw Error("source tree referenced by '%s' does not contain a '%s/flake.nix' file", resolvedRef, resolvedRef.subdir);
|
2019-04-19 09:43:56 +00:00
|
|
|
|
2018-11-29 18:18:36 +00:00
|
|
|
Value vInfo;
|
2020-01-21 15:27:53 +00:00
|
|
|
state.evalFile(flakeFile, vInfo, true); // FIXME: symlink attack
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
expectType(state, tAttrs, vInfo, Pos(state.symbols.create(flakeFile), 0, 0));
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2019-07-11 11:54:53 +00:00
|
|
|
auto sEdition = state.symbols.create("edition");
|
|
|
|
auto sEpoch = state.symbols.create("epoch"); // FIXME: remove soon
|
|
|
|
|
|
|
|
auto edition = vInfo.attrs->get(sEdition);
|
|
|
|
if (!edition)
|
|
|
|
edition = vInfo.attrs->get(sEpoch);
|
|
|
|
|
|
|
|
if (edition) {
|
2019-09-09 14:34:44 +00:00
|
|
|
expectType(state, tInt, *(**edition).value, *(**edition).pos);
|
|
|
|
flake.edition = (**edition).value->integer;
|
2019-08-30 09:22:34 +00:00
|
|
|
if (flake.edition > 201909)
|
2019-07-11 11:54:53 +00:00
|
|
|
throw Error("flake '%s' requires unsupported edition %d; please upgrade Nix", flakeRef, flake.edition);
|
2019-08-30 09:22:34 +00:00
|
|
|
if (flake.edition < 201909)
|
|
|
|
throw Error("flake '%s' has illegal edition %d", flakeRef, flake.edition);
|
2019-05-22 12:31:40 +00:00
|
|
|
} else
|
2019-07-11 11:54:53 +00:00
|
|
|
throw Error("flake '%s' lacks attribute 'edition'", flakeRef);
|
2019-05-22 12:31:40 +00:00
|
|
|
|
2019-09-09 14:34:44 +00:00
|
|
|
if (auto description = vInfo.attrs->get(state.sDescription)) {
|
|
|
|
expectType(state, tString, *(**description).value, *(**description).pos);
|
|
|
|
flake.description = (**description).value->string.s;
|
|
|
|
}
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2019-05-29 21:09:23 +00:00
|
|
|
auto sInputs = state.symbols.create("inputs");
|
2019-10-08 14:30:04 +00:00
|
|
|
auto sUrl = state.symbols.create("url");
|
|
|
|
auto sUri = state.symbols.create("uri"); // FIXME: remove soon
|
2019-08-30 14:27:51 +00:00
|
|
|
auto sFlake = state.symbols.create("flake");
|
2019-05-29 13:12:22 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
if (std::optional<Attr *> inputs = vInfo.attrs->get(sInputs)) {
|
2019-09-09 14:34:44 +00:00
|
|
|
expectType(state, tAttrs, *(**inputs).value, *(**inputs).pos);
|
2019-08-30 14:27:51 +00:00
|
|
|
|
|
|
|
for (Attr inputAttr : *(*(**inputs).value).attrs) {
|
2019-09-09 14:34:44 +00:00
|
|
|
expectType(state, tAttrs, *inputAttr.value, *inputAttr.pos);
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
FlakeInput input(parseFlakeRef(inputAttr.name));
|
2019-08-30 14:27:51 +00:00
|
|
|
|
|
|
|
for (Attr attr : *(inputAttr.value->attrs)) {
|
2019-10-08 14:30:04 +00:00
|
|
|
if (attr.name == sUrl || attr.name == sUri) {
|
2019-09-09 14:34:44 +00:00
|
|
|
expectType(state, tString, *attr.value, *attr.pos);
|
2020-01-21 15:27:53 +00:00
|
|
|
input.ref = parseFlakeRef(attr.value->string.s);
|
2019-08-30 14:27:51 +00:00
|
|
|
} else if (attr.name == sFlake) {
|
2019-09-09 14:34:44 +00:00
|
|
|
expectType(state, tBool, *attr.value, *attr.pos);
|
|
|
|
input.isFlake = attr.value->boolean;
|
2019-08-30 14:27:51 +00:00
|
|
|
} else
|
|
|
|
throw Error("flake input '%s' has an unsupported attribute '%s', at %s",
|
|
|
|
inputAttr.name, attr.name, *attr.pos);
|
|
|
|
}
|
2019-05-29 13:12:22 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
flake.inputs.emplace(inputAttr.name, input);
|
2019-03-21 08:30:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-29 21:09:23 +00:00
|
|
|
auto sOutputs = state.symbols.create("outputs");
|
2019-05-29 13:12:22 +00:00
|
|
|
|
2019-05-29 21:09:23 +00:00
|
|
|
if (auto outputs = vInfo.attrs->get(sOutputs)) {
|
2019-09-09 14:34:44 +00:00
|
|
|
expectType(state, tLambda, *(**outputs).value, *(**outputs).pos);
|
2019-05-29 21:09:23 +00:00
|
|
|
flake.vOutputs = (**outputs).value;
|
2019-08-30 09:22:34 +00:00
|
|
|
|
|
|
|
if (flake.vOutputs->lambda.fun->matchAttrs) {
|
|
|
|
for (auto & formal : flake.vOutputs->lambda.fun->formals->formals) {
|
2019-08-30 14:27:51 +00:00
|
|
|
if (formal.name != state.sSelf)
|
2020-01-21 15:27:53 +00:00
|
|
|
flake.inputs.emplace(formal.name, FlakeInput(parseFlakeRef(formal.name)));
|
2019-08-30 09:22:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-29 18:18:36 +00:00
|
|
|
} else
|
2019-05-29 21:09:23 +00:00
|
|
|
throw Error("flake '%s' lacks attribute 'outputs'", flakeRef);
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2019-05-29 13:12:22 +00:00
|
|
|
for (auto & attr : *vInfo.attrs) {
|
2019-07-11 11:54:53 +00:00
|
|
|
if (attr.name != sEdition &&
|
|
|
|
attr.name != sEpoch &&
|
2019-05-29 13:12:22 +00:00
|
|
|
attr.name != state.sDescription &&
|
2019-05-29 21:09:23 +00:00
|
|
|
attr.name != sInputs &&
|
|
|
|
attr.name != sOutputs)
|
2019-05-29 13:12:22 +00:00
|
|
|
throw Error("flake '%s' has an unsupported attribute '%s', at %s",
|
|
|
|
flakeRef, attr.name, *attr.pos);
|
|
|
|
}
|
|
|
|
|
2018-11-29 18:18:36 +00:00
|
|
|
return flake;
|
|
|
|
}
|
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
Flake getFlake(EvalState & state, const FlakeRef & originalRef, bool allowLookup)
|
|
|
|
{
|
|
|
|
RefMap refMap;
|
|
|
|
return getFlake(state, originalRef, allowLookup, refMap);
|
|
|
|
}
|
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
static std::pair<fetchers::Tree, FlakeRef> getNonFlake(
|
|
|
|
EvalState & state,
|
|
|
|
const FlakeRef & originalRef,
|
|
|
|
bool allowLookup,
|
|
|
|
RefMap & refMap)
|
2019-03-21 08:30:16 +00:00
|
|
|
{
|
2019-09-18 21:59:45 +00:00
|
|
|
auto flakeRef = lookupInRefMap(refMap,
|
|
|
|
maybeLookupFlake(state,
|
|
|
|
lookupInRefMap(refMap, originalRef), allowLookup));
|
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
auto [sourceInfo, resolvedInput] = flakeRef.input->fetchTree(state.store);
|
2019-03-21 08:30:16 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
FlakeRef resolvedRef(resolvedInput, flakeRef.subdir);
|
|
|
|
|
|
|
|
debug("got non-flake source '%s' with flakeref %s",
|
|
|
|
state.store->printStorePath(sourceInfo.storePath), resolvedRef);
|
2019-03-21 08:30:16 +00:00
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
refMap.push_back({originalRef, resolvedRef});
|
|
|
|
refMap.push_back({flakeRef, resolvedRef});
|
|
|
|
|
2019-05-01 09:38:48 +00:00
|
|
|
if (state.allowedPaths)
|
2020-01-21 15:27:53 +00:00
|
|
|
state.allowedPaths->insert(sourceInfo.actualPath);
|
2019-03-21 08:30:16 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
return std::make_pair(std::move(sourceInfo), resolvedRef);
|
2019-03-21 08:30:16 +00:00
|
|
|
}
|
|
|
|
|
2020-01-24 12:07:03 +00:00
|
|
|
bool allowedToUseRegistries(LockFileMode handle, bool isTopRef)
|
2019-05-14 09:34:45 +00:00
|
|
|
{
|
|
|
|
if (handle == AllPure) return false;
|
|
|
|
else if (handle == TopRefUsesRegistries) return isTopRef;
|
|
|
|
else if (handle == UpdateLockFile) return true;
|
|
|
|
else if (handle == UseUpdatedLockFile) return true;
|
|
|
|
else if (handle == RecreateLockFile) return true;
|
|
|
|
else if (handle == UseNewLockFile) return true;
|
|
|
|
else assert(false);
|
|
|
|
}
|
|
|
|
|
2019-06-04 19:07:55 +00:00
|
|
|
/* Given a flakeref and its subtree of the lockfile, return an updated
|
|
|
|
subtree of the lockfile. That is, if the 'flake.nix' of the
|
|
|
|
referenced flake has inputs that don't have a corresponding entry
|
|
|
|
in the lockfile, they're added to the lockfile; conversely, any
|
|
|
|
lockfile entries that don't have a corresponding entry in flake.nix
|
|
|
|
are removed.
|
|
|
|
|
|
|
|
Note that this is lazy: we only recursively fetch inputs that are
|
|
|
|
not in the lockfile yet. */
|
2019-08-30 14:27:51 +00:00
|
|
|
static std::pair<Flake, LockedInput> updateLocks(
|
2019-09-18 21:59:45 +00:00
|
|
|
RefMap & refMap,
|
2019-09-18 19:17:27 +00:00
|
|
|
const std::string & inputPath,
|
2019-06-04 17:10:35 +00:00
|
|
|
EvalState & state,
|
2019-06-04 19:10:53 +00:00
|
|
|
const Flake & flake,
|
2020-01-24 12:07:03 +00:00
|
|
|
LockFileMode lockFileMode,
|
2019-08-30 14:27:51 +00:00
|
|
|
const LockedInputs & oldEntry,
|
2019-06-04 17:10:35 +00:00
|
|
|
bool topRef)
|
2019-05-01 09:38:48 +00:00
|
|
|
{
|
2019-08-30 14:27:51 +00:00
|
|
|
LockedInput newEntry(
|
2020-01-21 15:27:53 +00:00
|
|
|
flake.resolvedRef,
|
2019-09-18 19:17:27 +00:00
|
|
|
flake.originalRef,
|
2020-01-21 15:27:53 +00:00
|
|
|
flake.sourceInfo->narHash);
|
2019-06-04 17:10:35 +00:00
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
std::vector<std::function<void()>> postponed;
|
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
for (auto & [id, input] : flake.inputs) {
|
2019-09-18 19:17:27 +00:00
|
|
|
auto inputPath2 = (inputPath.empty() ? "" : inputPath + "/") + id;
|
2019-08-30 14:27:51 +00:00
|
|
|
auto i = oldEntry.inputs.find(id);
|
2019-09-18 19:17:27 +00:00
|
|
|
if (i != oldEntry.inputs.end() && i->second.originalRef == input.ref) {
|
2019-08-30 14:27:51 +00:00
|
|
|
newEntry.inputs.insert_or_assign(id, i->second);
|
2019-05-01 09:38:48 +00:00
|
|
|
} else {
|
2020-01-24 12:07:03 +00:00
|
|
|
if (lockFileMode == AllPure || lockFileMode == TopRefUsesRegistries)
|
2019-08-30 14:27:51 +00:00
|
|
|
throw Error("cannot update flake input '%s' in pure mode", id);
|
2019-09-18 21:59:45 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
auto warn = [&](const FlakeRef & resolvedRef, const fetchers::Tree & sourceInfo) {
|
2019-09-18 19:17:27 +00:00
|
|
|
if (i == oldEntry.inputs.end())
|
2019-09-18 21:59:45 +00:00
|
|
|
printInfo("mapped flake input '%s' to '%s'",
|
2020-01-21 15:27:53 +00:00
|
|
|
inputPath2, resolvedRef);
|
2019-09-18 19:17:27 +00:00
|
|
|
else
|
|
|
|
printMsg(lvlWarn, "updated flake input '%s' from '%s' to '%s'",
|
2020-01-21 15:27:53 +00:00
|
|
|
inputPath2, i->second.originalRef, resolvedRef);
|
2019-09-18 21:59:45 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
if (input.isFlake) {
|
|
|
|
auto actualInput = getFlake(state, input.ref,
|
2020-01-24 12:07:03 +00:00
|
|
|
allowedToUseRegistries(lockFileMode, false), refMap);
|
2020-01-21 15:27:53 +00:00
|
|
|
warn(actualInput.resolvedRef, *actualInput.sourceInfo);
|
2019-09-18 21:59:45 +00:00
|
|
|
postponed.push_back([&, id{id}, inputPath2, actualInput]() {
|
|
|
|
newEntry.inputs.insert_or_assign(id,
|
2020-01-24 12:07:03 +00:00
|
|
|
updateLocks(refMap, inputPath2, state, actualInput, lockFileMode, {}, false).second);
|
2019-09-18 21:59:45 +00:00
|
|
|
});
|
2019-09-18 19:17:27 +00:00
|
|
|
} else {
|
2020-01-21 15:27:53 +00:00
|
|
|
auto [sourceInfo, resolvedRef] = getNonFlake(state, input.ref,
|
2020-01-24 12:07:03 +00:00
|
|
|
allowedToUseRegistries(lockFileMode, false), refMap);
|
2020-01-21 15:27:53 +00:00
|
|
|
warn(resolvedRef, sourceInfo);
|
2019-08-30 14:27:51 +00:00
|
|
|
newEntry.inputs.insert_or_assign(id,
|
2020-01-21 15:27:53 +00:00
|
|
|
LockedInput(resolvedRef, input.ref, sourceInfo.narHash));
|
2019-08-30 14:27:51 +00:00
|
|
|
}
|
2019-05-01 09:38:48 +00:00
|
|
|
}
|
2019-04-16 14:18:47 +00:00
|
|
|
}
|
2019-02-12 20:05:44 +00:00
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
for (auto & f : postponed) f();
|
|
|
|
|
2019-06-04 17:10:35 +00:00
|
|
|
return {flake, newEntry};
|
2019-03-29 15:18:25 +00:00
|
|
|
}
|
2019-02-12 20:55:43 +00:00
|
|
|
|
2019-06-04 19:07:55 +00:00
|
|
|
/* Compute an in-memory lockfile for the specified top-level flake,
|
|
|
|
and optionally write it to file, it the flake is writable. */
|
2020-01-22 19:59:59 +00:00
|
|
|
LockedFlake lockFlake(
|
|
|
|
EvalState & state,
|
|
|
|
const FlakeRef & topRef,
|
2020-01-24 12:07:03 +00:00
|
|
|
LockFileMode lockFileMode)
|
2019-05-01 09:38:48 +00:00
|
|
|
{
|
2019-10-16 15:45:09 +00:00
|
|
|
settings.requireExperimentalFeature("flakes");
|
|
|
|
|
2019-09-18 19:17:27 +00:00
|
|
|
auto flake = getFlake(state, topRef,
|
2020-01-24 12:07:03 +00:00
|
|
|
allowedToUseRegistries(lockFileMode, true));
|
2019-06-04 17:10:35 +00:00
|
|
|
|
2019-05-21 12:55:43 +00:00
|
|
|
LockFile oldLockFile;
|
2019-05-01 09:38:48 +00:00
|
|
|
|
2020-01-24 12:07:03 +00:00
|
|
|
if (lockFileMode != RecreateLockFile && lockFileMode != UseNewLockFile) {
|
2019-05-01 09:38:48 +00:00
|
|
|
// If recreateLockFile, start with an empty lockfile
|
2019-05-31 18:12:59 +00:00
|
|
|
// FIXME: symlink attack
|
2019-06-04 18:01:21 +00:00
|
|
|
oldLockFile = LockFile::read(
|
2020-01-21 15:27:53 +00:00
|
|
|
flake.sourceInfo->actualPath + "/" + flake.resolvedRef.subdir + "/flake.lock");
|
2019-05-01 09:38:48 +00:00
|
|
|
}
|
2019-05-01 09:38:48 +00:00
|
|
|
|
2019-10-21 12:57:01 +00:00
|
|
|
debug("old lock file: %s", oldLockFile);
|
|
|
|
|
2019-09-18 21:59:45 +00:00
|
|
|
RefMap refMap;
|
|
|
|
|
2020-01-24 12:07:03 +00:00
|
|
|
LockFile newLockFile(updateLocks(
|
|
|
|
refMap, "", state, flake, lockFileMode, oldLockFile, true).second);
|
2019-02-12 21:43:22 +00:00
|
|
|
|
2020-01-24 12:07:03 +00:00
|
|
|
debug("new lock file: %s", newLockFile);
|
2019-10-21 12:57:01 +00:00
|
|
|
|
2020-01-24 12:07:03 +00:00
|
|
|
if (!(newLockFile == oldLockFile)) {
|
|
|
|
if (lockFileMode == UpdateLockFile || lockFileMode == RecreateLockFile) {
|
2020-01-21 15:27:53 +00:00
|
|
|
if (auto sourcePath = topRef.input->getSourcePath()) {
|
2020-01-24 12:07:03 +00:00
|
|
|
if (!newLockFile.isImmutable()) {
|
2020-01-21 15:27:53 +00:00
|
|
|
if (settings.warnDirty)
|
|
|
|
warn("will not write lock file of flake '%s' because it has a mutable input", topRef);
|
2019-09-20 12:29:49 +00:00
|
|
|
} else {
|
2020-01-21 15:27:53 +00:00
|
|
|
warn("updated lock file of flake '%s'", topRef);
|
2019-07-12 11:29:54 +00:00
|
|
|
|
2020-01-24 12:07:03 +00:00
|
|
|
newLockFile.write(*sourcePath + (topRef.subdir == "" ? "" : "/" + topRef.subdir) + "/flake.lock");
|
2020-01-21 15:27:53 +00:00
|
|
|
|
|
|
|
// FIXME: rewriting the lockfile changed the
|
|
|
|
// top-level repo, so we should re-read it.
|
|
|
|
|
|
|
|
#if 0
|
2019-07-12 11:29:54 +00:00
|
|
|
// Hack: Make sure that flake.lock is visible to Git, so it ends up in the Nix store.
|
|
|
|
runProgram("git", true,
|
2020-01-21 15:27:53 +00:00
|
|
|
{ "-C", *sourcePath, "add",
|
2019-07-12 11:29:54 +00:00
|
|
|
"--force",
|
|
|
|
"--intent-to-add",
|
|
|
|
(topRef.subdir == "" ? "" : topRef.subdir + "/") + "flake.lock" });
|
2020-01-21 15:27:53 +00:00
|
|
|
#endif
|
2019-07-12 11:29:54 +00:00
|
|
|
}
|
2019-05-21 13:03:54 +00:00
|
|
|
} else
|
2019-07-12 11:29:54 +00:00
|
|
|
warn("cannot write lock file of remote flake '%s'", topRef);
|
2020-01-24 12:07:03 +00:00
|
|
|
} else if (lockFileMode != AllPure && lockFileMode != TopRefUsesRegistries)
|
2019-07-12 11:29:54 +00:00
|
|
|
warn("using updated lock file without writing it to file");
|
2019-05-21 12:55:43 +00:00
|
|
|
}
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2020-01-24 12:07:03 +00:00
|
|
|
return LockedFlake { .flake = std::move(flake), .lockFile = std::move(newLockFile) };
|
2019-02-21 05:53:01 +00:00
|
|
|
}
|
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
static void emitSourceInfoAttrs(EvalState & state, const fetchers::Tree & sourceInfo, Value & vAttrs)
|
2019-05-28 12:01:08 +00:00
|
|
|
{
|
2020-01-21 15:27:53 +00:00
|
|
|
assert(state.store->isValidPath(sourceInfo.storePath));
|
|
|
|
auto pathS = state.store->printStorePath(sourceInfo.storePath);
|
|
|
|
mkString(*state.allocAttr(vAttrs, state.sOutPath), pathS, {pathS});
|
2019-05-28 12:01:08 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
if (sourceInfo.rev) {
|
2019-05-28 12:01:08 +00:00
|
|
|
mkString(*state.allocAttr(vAttrs, state.symbols.create("rev")),
|
2020-01-21 15:27:53 +00:00
|
|
|
sourceInfo.rev->gitRev());
|
2019-05-28 12:01:08 +00:00
|
|
|
mkString(*state.allocAttr(vAttrs, state.symbols.create("shortRev")),
|
2020-01-21 15:27:53 +00:00
|
|
|
sourceInfo.rev->gitShortRev());
|
2019-05-28 12:01:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (sourceInfo.revCount)
|
|
|
|
mkInt(*state.allocAttr(vAttrs, state.symbols.create("revCount")), *sourceInfo.revCount);
|
2019-05-28 18:34:02 +00:00
|
|
|
|
|
|
|
if (sourceInfo.lastModified)
|
|
|
|
mkString(*state.allocAttr(vAttrs, state.symbols.create("lastModified")),
|
2020-01-21 15:27:53 +00:00
|
|
|
fmt("%s", std::put_time(std::gmtime(&*sourceInfo.lastModified), "%Y%m%d%H%M%S")));
|
2019-05-28 12:01:08 +00:00
|
|
|
}
|
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
struct LazyInput
|
|
|
|
{
|
|
|
|
bool isFlake;
|
|
|
|
LockedInput lockedInput;
|
|
|
|
};
|
|
|
|
|
2019-06-04 17:10:35 +00:00
|
|
|
/* Helper primop to make callFlake (below) fetch/call its inputs
|
|
|
|
lazily. Note that this primop cannot be called by user code since
|
|
|
|
it doesn't appear in 'builtins'. */
|
|
|
|
static void prim_callFlake(EvalState & state, const Pos & pos, Value * * args, Value & v)
|
|
|
|
{
|
2019-08-30 14:27:51 +00:00
|
|
|
auto lazyInput = (LazyInput *) args[0]->attrs;
|
2019-06-21 17:04:58 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
if (lazyInput->isFlake) {
|
2019-09-18 19:17:27 +00:00
|
|
|
auto flake = getFlake(state, lazyInput->lockedInput.ref, false);
|
2019-06-04 18:34:44 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
if (flake.sourceInfo->narHash != lazyInput->lockedInput.narHash)
|
2019-10-21 12:57:01 +00:00
|
|
|
throw Error("the content hash of flake '%s' doesn't match the hash recorded in the referring lockfile",
|
|
|
|
lazyInput->lockedInput.ref);
|
2019-06-04 18:34:44 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
callFlake(state, flake, lazyInput->lockedInput, v);
|
|
|
|
} else {
|
2019-09-18 21:59:45 +00:00
|
|
|
RefMap refMap;
|
2020-01-21 15:27:53 +00:00
|
|
|
auto [sourceInfo, resolvedRef] = getNonFlake(state, lazyInput->lockedInput.ref, false, refMap);
|
2019-06-21 17:04:58 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
if (sourceInfo.narHash != lazyInput->lockedInput.narHash)
|
2019-10-21 12:57:01 +00:00
|
|
|
throw Error("the content hash of repository '%s' doesn't match the hash recorded in the referring lockfile",
|
|
|
|
lazyInput->lockedInput.ref);
|
2019-06-04 18:56:13 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
state.mkAttrs(v, 8);
|
2019-06-04 18:56:13 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
assert(state.store->isValidPath(sourceInfo.storePath));
|
2019-06-04 18:56:13 +00:00
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
auto pathS = state.store->printStorePath(sourceInfo.storePath);
|
|
|
|
|
|
|
|
mkString(*state.allocAttr(v, state.sOutPath), pathS, {pathS});
|
2019-06-04 18:56:13 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
emitSourceInfoAttrs(state, sourceInfo, v);
|
2019-09-26 15:51:51 +00:00
|
|
|
|
|
|
|
v.attrs->sort();
|
2019-08-30 14:27:51 +00:00
|
|
|
}
|
2019-06-04 18:56:13 +00:00
|
|
|
}
|
|
|
|
|
2019-06-04 17:10:35 +00:00
|
|
|
void callFlake(EvalState & state,
|
|
|
|
const Flake & flake,
|
2019-08-30 14:27:51 +00:00
|
|
|
const LockedInputs & lockedInputs,
|
2019-10-02 20:08:19 +00:00
|
|
|
Value & vResFinal)
|
2018-11-29 18:18:36 +00:00
|
|
|
{
|
2019-10-02 20:08:19 +00:00
|
|
|
auto & vRes = *state.allocValue();
|
2019-08-30 11:06:23 +00:00
|
|
|
auto & vInputs = *state.allocValue();
|
2019-06-04 20:35:43 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
state.mkAttrs(vInputs, flake.inputs.size() + 1);
|
2019-06-04 17:10:35 +00:00
|
|
|
|
2019-08-30 14:27:51 +00:00
|
|
|
for (auto & [inputId, input] : flake.inputs) {
|
|
|
|
auto vFlake = state.allocAttr(vInputs, inputId);
|
2019-06-04 17:10:35 +00:00
|
|
|
auto vPrimOp = state.allocValue();
|
|
|
|
static auto primOp = new PrimOp(prim_callFlake, 1, state.symbols.create("callFlake"));
|
|
|
|
vPrimOp->type = tPrimOp;
|
|
|
|
vPrimOp->primOp = primOp;
|
|
|
|
auto vArg = state.allocValue();
|
|
|
|
vArg->type = tNull;
|
2019-08-30 14:27:51 +00:00
|
|
|
auto lockedInput = lockedInputs.inputs.find(inputId);
|
|
|
|
assert(lockedInput != lockedInputs.inputs.end());
|
2019-06-04 17:10:35 +00:00
|
|
|
// FIXME: leak
|
2019-08-30 14:27:51 +00:00
|
|
|
vArg->attrs = (Bindings *) new LazyInput{input.isFlake, lockedInput->second};
|
2019-06-04 17:10:35 +00:00
|
|
|
mkApp(*vFlake, *vPrimOp, *vArg);
|
2019-04-16 11:56:08 +00:00
|
|
|
}
|
2019-04-08 20:46:25 +00:00
|
|
|
|
2019-08-30 11:06:23 +00:00
|
|
|
auto & vSourceInfo = *state.allocValue();
|
|
|
|
state.mkAttrs(vSourceInfo, 8);
|
2020-01-21 15:27:53 +00:00
|
|
|
emitSourceInfoAttrs(state, *flake.sourceInfo, vSourceInfo);
|
2019-08-30 15:27:51 +00:00
|
|
|
vSourceInfo.attrs->sort();
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2019-08-30 11:06:23 +00:00
|
|
|
vInputs.attrs->push_back(Attr(state.sSelf, &vRes));
|
2018-11-29 18:18:36 +00:00
|
|
|
|
2019-08-30 11:06:23 +00:00
|
|
|
vInputs.attrs->sort();
|
2019-06-04 20:35:43 +00:00
|
|
|
|
|
|
|
/* For convenience, put the outputs directly in the result, so you
|
|
|
|
can refer to an output of an input as 'inputs.foo.bar' rather
|
|
|
|
than 'inputs.foo.outputs.bar'. */
|
2019-08-30 11:06:23 +00:00
|
|
|
auto vCall = *state.allocValue();
|
|
|
|
state.eval(state.parseExprFromString(
|
|
|
|
"outputsFun: inputs: sourceInfo: let outputs = outputsFun inputs; in "
|
|
|
|
"outputs // sourceInfo // { inherit inputs; inherit outputs; inherit sourceInfo; }", "/"), vCall);
|
|
|
|
|
|
|
|
auto vCall2 = *state.allocValue();
|
|
|
|
auto vCall3 = *state.allocValue();
|
|
|
|
state.callFunction(vCall, *flake.vOutputs, vCall2, noPos);
|
|
|
|
state.callFunction(vCall2, vInputs, vCall3, noPos);
|
|
|
|
state.callFunction(vCall3, vSourceInfo, vRes, noPos);
|
2019-10-02 20:08:19 +00:00
|
|
|
|
|
|
|
vResFinal = vRes;
|
2019-04-16 11:56:08 +00:00
|
|
|
}
|
2019-02-12 20:55:43 +00:00
|
|
|
|
2019-06-04 17:10:35 +00:00
|
|
|
void callFlake(EvalState & state,
|
2020-01-22 19:59:59 +00:00
|
|
|
const LockedFlake & lockedFlake,
|
2019-06-04 17:10:35 +00:00
|
|
|
Value & v)
|
|
|
|
{
|
2020-01-22 19:59:59 +00:00
|
|
|
callFlake(state, lockedFlake.flake, lockedFlake.lockFile, v);
|
2019-06-04 17:10:35 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 15:18:25 +00:00
|
|
|
// This function is exposed to be used in nix files.
|
2019-02-12 20:55:43 +00:00
|
|
|
static void prim_getFlake(EvalState & state, const Pos & pos, Value * * args, Value & v)
|
|
|
|
{
|
2020-01-22 19:59:59 +00:00
|
|
|
callFlake(state, lockFlake(state, parseFlakeRef(state.forceStringNoCtx(*args[0], pos)),
|
2019-05-29 13:44:48 +00:00
|
|
|
evalSettings.pureEval ? AllPure : UseUpdatedLockFile), v);
|
2018-11-29 18:18:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static RegisterPrimOp r2("getFlake", 1, prim_getFlake);
|
|
|
|
|
2019-05-29 13:31:07 +00:00
|
|
|
}
|
|
|
|
|
2020-01-22 19:59:59 +00:00
|
|
|
Fingerprint LockedFlake::getFingerprint() const
|
2019-06-07 20:25:48 +00:00
|
|
|
{
|
2019-07-12 11:29:54 +00:00
|
|
|
// FIXME: as an optimization, if the flake contains a lock file
|
|
|
|
// and we haven't changed it, then it's sufficient to use
|
2019-06-07 20:25:48 +00:00
|
|
|
// flake.sourceInfo.storePath for the fingerprint.
|
|
|
|
return hashString(htSHA256,
|
2019-11-06 11:01:37 +00:00
|
|
|
fmt("%s;%d;%d;%s",
|
2020-01-21 15:27:53 +00:00
|
|
|
flake.sourceInfo->storePath.to_string(),
|
|
|
|
flake.sourceInfo->revCount.value_or(0),
|
|
|
|
flake.sourceInfo->lastModified.value_or(0),
|
2019-11-06 11:01:37 +00:00
|
|
|
lockFile));
|
2019-06-07 20:25:48 +00:00
|
|
|
}
|
|
|
|
|
2020-01-21 15:27:53 +00:00
|
|
|
Flake::~Flake() { }
|
|
|
|
|
2019-05-29 13:31:07 +00:00
|
|
|
}
|