2016-03-24 10:41:00 +00:00
|
|
|
#include "crypto.hh"
|
2006-11-30 17:43:04 +00:00
|
|
|
#include "globals.hh"
|
2016-03-24 10:41:00 +00:00
|
|
|
#include "store-api.hh"
|
2006-11-30 18:35:36 +00:00
|
|
|
#include "util.hh"
|
2016-04-20 12:12:38 +00:00
|
|
|
#include "nar-info-disk-cache.hh"
|
2006-11-30 17:43:04 +00:00
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
#include <future>
|
|
|
|
|
2006-11-30 17:43:04 +00:00
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
bool Store::isInStore(const Path & path) const
|
2006-11-30 17:43:04 +00:00
|
|
|
{
|
2016-06-01 12:49:12 +00:00
|
|
|
return isInDir(path, storeDir);
|
2006-11-30 17:43:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
bool Store::isStorePath(const Path & path) const
|
2006-11-30 17:43:04 +00:00
|
|
|
{
|
|
|
|
return isInStore(path)
|
2016-06-01 12:49:12 +00:00
|
|
|
&& path.size() >= storeDir.size() + 1 + storePathHashLen
|
|
|
|
&& path.find('/', storeDir.size() + 1) == Path::npos;
|
2006-11-30 17:43:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
void Store::assertStorePath(const Path & path) const
|
2006-11-30 17:43:04 +00:00
|
|
|
{
|
|
|
|
if (!isStorePath(path))
|
2016-11-25 14:48:27 +00:00
|
|
|
throw Error(format("path '%1%' is not in the Nix store") % path);
|
2006-11-30 17:43:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
Path Store::toStorePath(const Path & path) const
|
2006-11-30 17:43:04 +00:00
|
|
|
{
|
|
|
|
if (!isInStore(path))
|
2016-11-25 14:48:27 +00:00
|
|
|
throw Error(format("path '%1%' is not in the Nix store") % path);
|
2016-06-01 12:49:12 +00:00
|
|
|
Path::size_type slash = path.find('/', storeDir.size() + 1);
|
2006-11-30 17:43:04 +00:00
|
|
|
if (slash == Path::npos)
|
|
|
|
return path;
|
|
|
|
else
|
|
|
|
return Path(path, 0, slash);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
Path Store::followLinksToStore(const Path & _path) const
|
2007-11-29 16:18:24 +00:00
|
|
|
{
|
|
|
|
Path path = absPath(_path);
|
|
|
|
while (!isInStore(path)) {
|
|
|
|
if (!isLink(path)) break;
|
|
|
|
string target = readLink(path);
|
|
|
|
path = absPath(target, dirOf(path));
|
|
|
|
}
|
|
|
|
if (!isInStore(path))
|
2016-11-25 14:48:27 +00:00
|
|
|
throw Error(format("path '%1%' is not in the Nix store") % path);
|
2007-11-29 16:18:24 +00:00
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
Path Store::followLinksToStorePath(const Path & path) const
|
2007-11-29 16:18:24 +00:00
|
|
|
{
|
|
|
|
return toStorePath(followLinksToStore(path));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-20 18:10:47 +00:00
|
|
|
string storePathToName(const Path & path)
|
|
|
|
{
|
2016-06-01 12:49:12 +00:00
|
|
|
auto base = baseNameOf(path);
|
|
|
|
assert(base.size() == storePathHashLen || (base.size() > storePathHashLen && base[storePathHashLen] == '-'));
|
|
|
|
return base.size() == storePathHashLen ? "" : string(base, storePathHashLen + 1);
|
2016-02-15 11:49:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
string storePathToHash(const Path & path)
|
|
|
|
{
|
2016-06-01 12:49:12 +00:00
|
|
|
auto base = baseNameOf(path);
|
|
|
|
assert(base.size() >= storePathHashLen);
|
|
|
|
return string(base, 0, storePathHashLen);
|
2011-07-20 18:10:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 17:43:04 +00:00
|
|
|
void checkStoreName(const string & name)
|
|
|
|
{
|
|
|
|
string validChars = "+-._?=";
|
|
|
|
/* Disallow names starting with a dot for possible security
|
|
|
|
reasons (e.g., "." and ".."). */
|
|
|
|
if (string(name, 0, 1) == ".")
|
2016-11-25 14:48:27 +00:00
|
|
|
throw Error(format("illegal name: '%1%'") % name);
|
2015-07-17 17:24:28 +00:00
|
|
|
for (auto & i : name)
|
|
|
|
if (!((i >= 'A' && i <= 'Z') ||
|
|
|
|
(i >= 'a' && i <= 'z') ||
|
|
|
|
(i >= '0' && i <= '9') ||
|
|
|
|
validChars.find(i) != string::npos))
|
2006-11-30 17:43:04 +00:00
|
|
|
{
|
2016-11-25 14:48:27 +00:00
|
|
|
throw Error(format("invalid character '%1%' in name '%2%'")
|
2015-07-17 17:24:28 +00:00
|
|
|
% i % name);
|
2006-11-30 17:43:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-12-03 15:06:30 +00:00
|
|
|
/* Store paths have the following form:
|
|
|
|
|
|
|
|
<store>/<h>-<name>
|
|
|
|
|
|
|
|
where
|
|
|
|
|
|
|
|
<store> = the location of the Nix store, usually /nix/store
|
2015-07-17 17:24:28 +00:00
|
|
|
|
2008-12-03 15:06:30 +00:00
|
|
|
<name> = a human readable name for the path, typically obtained
|
|
|
|
from the name attribute of the derivation, or the name of the
|
2011-07-20 18:10:47 +00:00
|
|
|
source file from which the store path is created. For derivation
|
|
|
|
outputs other than the default "out" output, the string "-<id>"
|
|
|
|
is suffixed to <name>.
|
2015-07-17 17:24:28 +00:00
|
|
|
|
2008-12-03 15:06:30 +00:00
|
|
|
<h> = base-32 representation of the first 160 bits of a SHA-256
|
|
|
|
hash of <s>; the hash part of the store name
|
2015-07-17 17:24:28 +00:00
|
|
|
|
2008-12-03 15:06:30 +00:00
|
|
|
<s> = the string "<type>:sha256:<h2>:<store>:<name>";
|
|
|
|
note that it includes the location of the store as well as the
|
|
|
|
name to make sure that changes to either of those are reflected
|
|
|
|
in the hash (e.g. you won't get /nix/store/<h>-name1 and
|
|
|
|
/nix/store/<h>-name2 with equal hash parts).
|
2015-07-17 17:24:28 +00:00
|
|
|
|
2008-12-03 15:06:30 +00:00
|
|
|
<type> = one of:
|
|
|
|
"text:<r1>:<r2>:...<rN>"
|
|
|
|
for plain text files written to the store using
|
|
|
|
addTextToStore(); <r1> ... <rN> are the references of the
|
|
|
|
path.
|
|
|
|
"source"
|
|
|
|
for paths copied to the store using addToStore() when recursive
|
|
|
|
= true and hashAlgo = "sha256"
|
2011-07-20 18:10:47 +00:00
|
|
|
"output:<id>"
|
2008-12-03 15:06:30 +00:00
|
|
|
for either the outputs created by derivations, OR paths copied
|
|
|
|
to the store using addToStore() with recursive != true or
|
|
|
|
hashAlgo != "sha256" (in that case "source" is used; it's
|
2011-07-20 18:10:47 +00:00
|
|
|
silly, but it's done that way for compatibility). <id> is the
|
|
|
|
name of the output (usually, "out").
|
2008-12-03 15:06:30 +00:00
|
|
|
|
|
|
|
<h2> = base-16 representation of a SHA-256 hash of:
|
|
|
|
if <type> = "text:...":
|
|
|
|
the string written to the resulting store path
|
|
|
|
if <type> = "source":
|
|
|
|
the serialisation of the path from which this store path is
|
|
|
|
copied, as returned by hashPath()
|
2016-03-24 10:27:58 +00:00
|
|
|
if <type> = "output:<id>":
|
2008-12-03 15:06:30 +00:00
|
|
|
for non-fixed derivation outputs:
|
|
|
|
the derivation (see hashDerivationModulo() in
|
|
|
|
primops.cc)
|
|
|
|
for paths copied by addToStore() or produced by fixed-output
|
|
|
|
derivations:
|
|
|
|
the string "fixed:out:<rec><algo>:<hash>:", where
|
2016-03-24 10:27:58 +00:00
|
|
|
<rec> = "r:" for recursive (path) hashes, or "" for flat
|
2008-12-03 15:06:30 +00:00
|
|
|
(file) hashes
|
|
|
|
<algo> = "md5", "sha1" or "sha256"
|
|
|
|
<hash> = base-16 representation of the path or flat hash of
|
|
|
|
the contents of the path (or expected contents of the
|
|
|
|
path for fixed-output derivations)
|
|
|
|
|
|
|
|
It would have been nicer to handle fixed-output derivations under
|
|
|
|
"source", e.g. have something like "source:<rec><algo>", but we're
|
|
|
|
stuck with this for now...
|
|
|
|
|
|
|
|
The main reason for this way of computing names is to prevent name
|
|
|
|
collisions (for security). For instance, it shouldn't be feasible
|
|
|
|
to come up with a derivation whose output path collides with the
|
|
|
|
path for a copied source. The former would have a <s> starting with
|
|
|
|
"output:out:", while the latter would have a <2> starting with
|
|
|
|
"source:".
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
Path Store::makeStorePath(const string & type,
|
|
|
|
const Hash & hash, const string & name) const
|
2006-11-30 17:43:04 +00:00
|
|
|
{
|
|
|
|
/* e.g., "source:sha256:1abc...:/nix/store:foo.tar.gz" */
|
|
|
|
string s = type + ":sha256:" + printHash(hash) + ":"
|
2016-06-01 12:49:12 +00:00
|
|
|
+ storeDir + ":" + name;
|
2006-11-30 17:43:04 +00:00
|
|
|
|
2008-12-03 15:06:30 +00:00
|
|
|
checkStoreName(name);
|
2006-11-30 17:43:04 +00:00
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
return storeDir + "/"
|
2006-11-30 17:43:04 +00:00
|
|
|
+ printHash32(compressHash(hashString(htSHA256, s), 20))
|
2008-12-03 15:06:30 +00:00
|
|
|
+ "-" + name;
|
2006-11-30 17:43:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
Path Store::makeOutputPath(const string & id,
|
|
|
|
const Hash & hash, const string & name) const
|
2011-07-20 18:10:47 +00:00
|
|
|
{
|
|
|
|
return makeStorePath("output:" + id, hash,
|
|
|
|
name + (id == "out" ? "" : "-" + id));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
Path Store::makeFixedOutputPath(bool recursive,
|
2016-07-26 19:25:52 +00:00
|
|
|
const Hash & hash, const string & name) const
|
2006-11-30 17:43:04 +00:00
|
|
|
{
|
2016-07-26 19:25:52 +00:00
|
|
|
return hash.type == htSHA256 && recursive
|
2008-12-03 15:06:30 +00:00
|
|
|
? makeStorePath("source", hash, name)
|
|
|
|
: makeStorePath("output:out", hashString(htSHA256,
|
2008-12-03 16:10:17 +00:00
|
|
|
"fixed:out:" + (recursive ? (string) "r:" : "") +
|
2016-07-26 19:25:52 +00:00
|
|
|
printHashType(hash.type) + ":" + printHash(hash) + ":"),
|
2008-12-03 15:06:30 +00:00
|
|
|
name);
|
2006-11-30 17:43:04 +00:00
|
|
|
}
|
|
|
|
|
2006-12-01 18:00:01 +00:00
|
|
|
|
2016-08-03 11:17:11 +00:00
|
|
|
Path Store::makeTextPath(const string & name, const Hash & hash,
|
|
|
|
const PathSet & references) const
|
|
|
|
{
|
|
|
|
assert(hash.type == htSHA256);
|
|
|
|
/* Stuff the references (if any) into the type. This is a bit
|
|
|
|
hacky, but we can't put them in `s' since that would be
|
|
|
|
ambiguous. */
|
|
|
|
string type = "text";
|
|
|
|
for (auto & i : references) {
|
|
|
|
type += ":";
|
|
|
|
type += i;
|
|
|
|
}
|
|
|
|
return makeStorePath(type, hash, name);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
std::pair<Path, Hash> Store::computeStorePathForPath(const Path & srcPath,
|
|
|
|
bool recursive, HashType hashAlgo, PathFilter & filter) const
|
2006-12-01 18:00:01 +00:00
|
|
|
{
|
2016-07-26 19:25:52 +00:00
|
|
|
Hash h = recursive ? hashPath(hashAlgo, srcPath, filter).first : hashFile(hashAlgo, srcPath);
|
2008-12-03 15:06:30 +00:00
|
|
|
string name = baseNameOf(srcPath);
|
2016-07-26 19:25:52 +00:00
|
|
|
Path dstPath = makeFixedOutputPath(recursive, h, name);
|
2006-12-01 18:00:01 +00:00
|
|
|
return std::pair<Path, Hash>(dstPath, h);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
Path Store::computeStorePathForText(const string & name, const string & s,
|
|
|
|
const PathSet & references) const
|
2006-12-01 18:00:01 +00:00
|
|
|
{
|
2016-08-03 11:17:11 +00:00
|
|
|
return makeTextPath(name, hashString(htSHA256, s), references);
|
2006-12-01 18:00:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-01 12:49:12 +00:00
|
|
|
Store::Store(const Params & params)
|
2016-06-02 11:33:49 +00:00
|
|
|
: storeDir(get(params, "store", settings.nixStore))
|
2016-06-01 12:49:12 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-20 12:12:38 +00:00
|
|
|
std::string Store::getUri()
|
|
|
|
{
|
|
|
|
return "";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-19 16:50:15 +00:00
|
|
|
bool Store::isValidPath(const Path & storePath)
|
2016-02-15 13:48:38 +00:00
|
|
|
{
|
2016-04-21 15:53:47 +00:00
|
|
|
auto hashPart = storePathToHash(storePath);
|
|
|
|
|
2016-04-19 16:50:15 +00:00
|
|
|
{
|
|
|
|
auto state_(state.lock());
|
2016-04-21 15:53:47 +00:00
|
|
|
auto res = state_->pathInfoCache.get(hashPart);
|
2016-04-19 16:50:15 +00:00
|
|
|
if (res) {
|
|
|
|
stats.narInfoReadAverted++;
|
|
|
|
return *res != 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-20 12:12:38 +00:00
|
|
|
if (diskCache) {
|
2016-04-21 15:53:47 +00:00
|
|
|
auto res = diskCache->lookupNarInfo(getUri(), hashPart);
|
2016-04-20 12:12:38 +00:00
|
|
|
if (res.first != NarInfoDiskCache::oUnknown) {
|
2016-04-21 15:53:47 +00:00
|
|
|
stats.narInfoReadAverted++;
|
2016-04-20 12:12:38 +00:00
|
|
|
auto state_(state.lock());
|
2016-04-21 15:53:47 +00:00
|
|
|
state_->pathInfoCache.upsert(hashPart,
|
2016-04-20 12:12:38 +00:00
|
|
|
res.first == NarInfoDiskCache::oInvalid ? 0 : res.second);
|
|
|
|
return res.first == NarInfoDiskCache::oValid;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-20 15:39:05 +00:00
|
|
|
bool valid = isValidPathUncached(storePath);
|
2016-04-20 12:12:38 +00:00
|
|
|
|
2016-06-20 15:39:05 +00:00
|
|
|
if (diskCache && !valid)
|
|
|
|
// FIXME: handle valid = true case.
|
|
|
|
diskCache->upsertNarInfo(getUri(), hashPart, 0);
|
|
|
|
|
|
|
|
return valid;
|
2016-04-19 16:50:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
ref<const ValidPathInfo> Store::queryPathInfo(const Path & storePath)
|
2016-09-16 16:54:14 +00:00
|
|
|
{
|
|
|
|
std::promise<ref<ValidPathInfo>> promise;
|
|
|
|
|
|
|
|
queryPathInfo(storePath,
|
|
|
|
[&](ref<ValidPathInfo> info) {
|
|
|
|
promise.set_value(info);
|
|
|
|
},
|
|
|
|
[&](std::exception_ptr exc) {
|
|
|
|
promise.set_exception(exc);
|
|
|
|
});
|
|
|
|
|
|
|
|
return promise.get_future().get();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Store::queryPathInfo(const Path & storePath,
|
|
|
|
std::function<void(ref<ValidPathInfo>)> success,
|
|
|
|
std::function<void(std::exception_ptr exc)> failure)
|
2016-04-19 16:50:15 +00:00
|
|
|
{
|
2016-04-21 15:53:47 +00:00
|
|
|
auto hashPart = storePathToHash(storePath);
|
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
try {
|
|
|
|
|
|
|
|
{
|
|
|
|
auto res = state.lock()->pathInfoCache.get(hashPart);
|
|
|
|
if (res) {
|
|
|
|
stats.narInfoReadAverted++;
|
|
|
|
if (!*res)
|
2016-11-25 14:48:27 +00:00
|
|
|
throw InvalidPath(format("path '%s' is not valid") % storePath);
|
2016-09-16 16:54:14 +00:00
|
|
|
return success(ref<ValidPathInfo>(*res));
|
|
|
|
}
|
2016-04-19 16:50:15 +00:00
|
|
|
}
|
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
if (diskCache) {
|
|
|
|
auto res = diskCache->lookupNarInfo(getUri(), hashPart);
|
|
|
|
if (res.first != NarInfoDiskCache::oUnknown) {
|
|
|
|
stats.narInfoReadAverted++;
|
|
|
|
{
|
|
|
|
auto state_(state.lock());
|
|
|
|
state_->pathInfoCache.upsert(hashPart,
|
|
|
|
res.first == NarInfoDiskCache::oInvalid ? 0 : res.second);
|
|
|
|
if (res.first == NarInfoDiskCache::oInvalid ||
|
|
|
|
(res.second->path != storePath && storePathToName(storePath) != ""))
|
2016-11-25 14:48:27 +00:00
|
|
|
throw InvalidPath(format("path '%s' is not valid") % storePath);
|
2016-09-16 16:54:14 +00:00
|
|
|
}
|
|
|
|
return success(ref<ValidPathInfo>(res.second));
|
|
|
|
}
|
2016-04-20 12:12:38 +00:00
|
|
|
}
|
2016-09-16 16:54:14 +00:00
|
|
|
|
|
|
|
} catch (std::exception & e) {
|
|
|
|
return callFailure(failure);
|
2016-04-20 12:12:38 +00:00
|
|
|
}
|
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
queryPathInfoUncached(storePath,
|
|
|
|
[this, storePath, hashPart, success, failure](std::shared_ptr<ValidPathInfo> info) {
|
2016-04-19 16:50:15 +00:00
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
if (diskCache)
|
|
|
|
diskCache->upsertNarInfo(getUri(), hashPart, info);
|
2016-04-20 12:12:38 +00:00
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
{
|
|
|
|
auto state_(state.lock());
|
|
|
|
state_->pathInfoCache.upsert(hashPart, info);
|
|
|
|
}
|
2016-04-19 16:50:15 +00:00
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
if (!info
|
|
|
|
|| (info->path != storePath && storePathToName(storePath) != ""))
|
|
|
|
{
|
|
|
|
stats.narInfoMissing++;
|
2016-11-25 14:48:27 +00:00
|
|
|
return failure(std::make_exception_ptr(InvalidPath(format("path '%s' is not valid") % storePath)));
|
2016-09-16 16:54:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
callSuccess(success, failure, ref<ValidPathInfo>(info));
|
2016-04-19 16:50:15 +00:00
|
|
|
|
2016-09-16 16:54:14 +00:00
|
|
|
}, failure);
|
2016-02-15 13:48:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-10-07 17:20:47 +00:00
|
|
|
PathSet Store::queryValidPaths(const PathSet & paths)
|
|
|
|
{
|
2016-10-07 17:43:36 +00:00
|
|
|
struct State
|
|
|
|
{
|
|
|
|
size_t left;
|
|
|
|
PathSet valid;
|
|
|
|
std::exception_ptr exc;
|
|
|
|
};
|
2016-10-07 17:20:47 +00:00
|
|
|
|
2016-10-07 17:43:36 +00:00
|
|
|
Sync<State> state_(State{paths.size(), PathSet()});
|
2016-10-07 17:20:47 +00:00
|
|
|
|
2016-10-07 17:43:36 +00:00
|
|
|
std::condition_variable wakeup;
|
|
|
|
|
|
|
|
for (auto & path : paths)
|
|
|
|
queryPathInfo(path,
|
|
|
|
[path, &state_, &wakeup](ref<ValidPathInfo> info) {
|
|
|
|
auto state(state_.lock());
|
|
|
|
state->valid.insert(path);
|
|
|
|
assert(state->left);
|
|
|
|
if (!--state->left)
|
|
|
|
wakeup.notify_one();
|
|
|
|
},
|
|
|
|
[path, &state_, &wakeup](std::exception_ptr exc) {
|
|
|
|
auto state(state_.lock());
|
|
|
|
try {
|
|
|
|
std::rethrow_exception(exc);
|
|
|
|
} catch (InvalidPath &) {
|
|
|
|
} catch (...) {
|
|
|
|
state->exc = exc;
|
|
|
|
}
|
|
|
|
assert(state->left);
|
|
|
|
if (!--state->left)
|
|
|
|
wakeup.notify_one();
|
|
|
|
});
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
auto state(state_.lock());
|
|
|
|
if (!state->left) {
|
|
|
|
if (state->exc) std::rethrow_exception(state->exc);
|
|
|
|
return state->valid;
|
|
|
|
}
|
|
|
|
state.wait(wakeup);
|
|
|
|
}
|
2016-10-07 17:20:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-01-29 18:17:36 +00:00
|
|
|
/* Return a string accepted by decodeValidPathInfo() that
|
|
|
|
registers the specified paths as valid. Note: it's the
|
|
|
|
responsibility of the caller to provide a closure. */
|
2016-02-04 13:48:42 +00:00
|
|
|
string Store::makeValidityRegistration(const PathSet & paths,
|
2008-01-29 18:17:36 +00:00
|
|
|
bool showDerivers, bool showHash)
|
|
|
|
{
|
|
|
|
string s = "";
|
|
|
|
|
2015-07-17 17:24:28 +00:00
|
|
|
for (auto & i : paths) {
|
|
|
|
s += i + "\n";
|
|
|
|
|
2016-04-19 16:50:15 +00:00
|
|
|
auto info = queryPathInfo(i);
|
2008-01-29 18:17:36 +00:00
|
|
|
|
2010-11-16 17:11:46 +00:00
|
|
|
if (showHash) {
|
2016-04-19 16:50:15 +00:00
|
|
|
s += printHash(info->narHash) + "\n";
|
|
|
|
s += (format("%1%\n") % info->narSize).str();
|
2010-11-16 17:11:46 +00:00
|
|
|
}
|
|
|
|
|
2016-04-19 16:50:15 +00:00
|
|
|
Path deriver = showDerivers ? info->deriver : "";
|
2008-01-29 18:17:36 +00:00
|
|
|
s += deriver + "\n";
|
|
|
|
|
2016-04-19 16:50:15 +00:00
|
|
|
s += (format("%1%\n") % info->references.size()).str();
|
2008-01-29 18:17:36 +00:00
|
|
|
|
2016-04-19 16:50:15 +00:00
|
|
|
for (auto & j : info->references)
|
2015-07-17 17:24:28 +00:00
|
|
|
s += j + "\n";
|
2008-01-29 18:17:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-19 16:50:15 +00:00
|
|
|
const Store::Stats & Store::getStats()
|
|
|
|
{
|
2016-04-20 12:12:38 +00:00
|
|
|
{
|
|
|
|
auto state_(state.lock());
|
|
|
|
stats.pathInfoCacheSize = state_->pathInfoCache.size();
|
|
|
|
}
|
2016-04-19 16:50:15 +00:00
|
|
|
return stats;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-05-03 12:45:50 +00:00
|
|
|
void copyStorePath(ref<Store> srcStore, ref<Store> dstStore,
|
2016-11-09 18:08:20 +00:00
|
|
|
const Path & storePath, bool repair, bool dontCheckSigs)
|
2016-05-03 12:45:50 +00:00
|
|
|
{
|
|
|
|
auto info = srcStore->queryPathInfo(storePath);
|
|
|
|
|
|
|
|
StringSink sink;
|
2016-05-04 11:36:54 +00:00
|
|
|
srcStore->narFromPath({storePath}, sink);
|
2016-05-03 12:45:50 +00:00
|
|
|
|
2016-11-09 18:08:20 +00:00
|
|
|
dstStore->addToStore(*info, sink.s, repair, dontCheckSigs);
|
2016-05-03 12:45:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-10-07 17:15:25 +00:00
|
|
|
void copyClosure(ref<Store> srcStore, ref<Store> dstStore,
|
2016-11-09 18:08:20 +00:00
|
|
|
const PathSet & storePaths, bool repair, bool dontCheckSigs)
|
2016-10-07 17:15:25 +00:00
|
|
|
{
|
|
|
|
PathSet closure;
|
|
|
|
for (auto & path : storePaths)
|
|
|
|
srcStore->computeFSClosure(path, closure);
|
|
|
|
|
|
|
|
PathSet valid = dstStore->queryValidPaths(closure);
|
|
|
|
|
|
|
|
if (valid.size() == closure.size()) return;
|
|
|
|
|
|
|
|
Paths sorted = srcStore->topoSortPaths(closure);
|
|
|
|
|
|
|
|
Paths missing;
|
|
|
|
for (auto i = sorted.rbegin(); i != sorted.rend(); ++i)
|
|
|
|
if (!valid.count(*i)) missing.push_back(*i);
|
|
|
|
|
|
|
|
printMsg(lvlDebug, format("copying %1% missing paths") % missing.size());
|
|
|
|
|
|
|
|
for (auto & i : missing)
|
2016-11-09 18:08:20 +00:00
|
|
|
copyStorePath(srcStore, dstStore, i, repair, dontCheckSigs);
|
2016-10-07 17:15:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-01-29 18:17:36 +00:00
|
|
|
ValidPathInfo decodeValidPathInfo(std::istream & str, bool hashGiven)
|
2007-08-12 00:29:28 +00:00
|
|
|
{
|
|
|
|
ValidPathInfo info;
|
|
|
|
getline(str, info.path);
|
|
|
|
if (str.eof()) { info.path = ""; return info; }
|
2008-01-29 18:17:36 +00:00
|
|
|
if (hashGiven) {
|
|
|
|
string s;
|
|
|
|
getline(str, s);
|
2016-02-16 10:49:12 +00:00
|
|
|
info.narHash = parseHash(htSHA256, s);
|
2010-11-16 17:11:46 +00:00
|
|
|
getline(str, s);
|
|
|
|
if (!string2Int(s, info.narSize)) throw Error("number expected");
|
2008-01-29 18:17:36 +00:00
|
|
|
}
|
2007-08-12 00:29:28 +00:00
|
|
|
getline(str, info.deriver);
|
|
|
|
string s; int n;
|
|
|
|
getline(str, s);
|
|
|
|
if (!string2Int(s, n)) throw Error("number expected");
|
|
|
|
while (n--) {
|
|
|
|
getline(str, s);
|
|
|
|
info.references.insert(s);
|
|
|
|
}
|
|
|
|
if (!str || str.eof()) throw Error("missing input");
|
|
|
|
return info;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-06-09 13:52:45 +00:00
|
|
|
string showPaths(const PathSet & paths)
|
|
|
|
{
|
|
|
|
string s;
|
2015-07-17 17:24:28 +00:00
|
|
|
for (auto & i : paths) {
|
2008-06-09 13:52:45 +00:00
|
|
|
if (s.size() != 0) s += ", ";
|
2016-11-25 14:48:27 +00:00
|
|
|
s += "'" + i + "'";
|
2008-06-09 13:52:45 +00:00
|
|
|
}
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-03-24 10:41:00 +00:00
|
|
|
std::string ValidPathInfo::fingerprint() const
|
|
|
|
{
|
2016-04-20 12:12:38 +00:00
|
|
|
if (narSize == 0 || !narHash)
|
2016-11-25 14:48:27 +00:00
|
|
|
throw Error(format("cannot calculate fingerprint of path '%s' because its size/hash is not known")
|
2016-04-05 14:39:29 +00:00
|
|
|
% path);
|
2016-03-24 10:41:00 +00:00
|
|
|
return
|
|
|
|
"1;" + path + ";"
|
|
|
|
+ printHashType(narHash.type) + ":" + printHash32(narHash) + ";"
|
|
|
|
+ std::to_string(narSize) + ";"
|
|
|
|
+ concatStringsSep(",", references);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void ValidPathInfo::sign(const SecretKey & secretKey)
|
|
|
|
{
|
|
|
|
sigs.insert(secretKey.signDetached(fingerprint()));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-08-03 11:17:11 +00:00
|
|
|
bool ValidPathInfo::isContentAddressed(const Store & store) const
|
|
|
|
{
|
|
|
|
auto warn = [&]() {
|
2016-11-25 14:48:27 +00:00
|
|
|
printError(format("warning: path '%s' claims to be content-addressed but isn't") % path);
|
2016-08-03 11:17:11 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
if (hasPrefix(ca, "text:")) {
|
|
|
|
auto hash = parseHash(std::string(ca, 5));
|
|
|
|
if (store.makeTextPath(storePathToName(path), hash, references) == path)
|
|
|
|
return true;
|
|
|
|
else
|
|
|
|
warn();
|
|
|
|
}
|
|
|
|
|
|
|
|
else if (hasPrefix(ca, "fixed:")) {
|
|
|
|
bool recursive = ca.compare(6, 2, "r:") == 0;
|
|
|
|
auto hash = parseHash(std::string(ca, recursive ? 8 : 6));
|
|
|
|
if (store.makeFixedOutputPath(recursive, hash, storePathToName(path)) == path)
|
|
|
|
return true;
|
|
|
|
else
|
|
|
|
warn();
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
size_t ValidPathInfo::checkSignatures(const Store & store, const PublicKeys & publicKeys) const
|
2016-03-24 10:41:00 +00:00
|
|
|
{
|
2016-08-03 11:17:11 +00:00
|
|
|
if (isContentAddressed(store)) return maxSigs;
|
|
|
|
|
|
|
|
size_t good = 0;
|
2016-03-24 10:41:00 +00:00
|
|
|
for (auto & sig : sigs)
|
2016-04-07 13:14:12 +00:00
|
|
|
if (checkSignature(publicKeys, sig))
|
2016-03-24 10:41:00 +00:00
|
|
|
good++;
|
|
|
|
return good;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-07 13:14:12 +00:00
|
|
|
bool ValidPathInfo::checkSignature(const PublicKeys & publicKeys, const std::string & sig) const
|
|
|
|
{
|
|
|
|
return verifyDetached(fingerprint(), sig, publicKeys);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-20 12:12:38 +00:00
|
|
|
Strings ValidPathInfo::shortRefs() const
|
|
|
|
{
|
|
|
|
Strings refs;
|
|
|
|
for (auto & r : references)
|
|
|
|
refs.push_back(baseNameOf(r));
|
|
|
|
return refs;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 17:43:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#include "local-store.hh"
|
2006-11-30 18:35:36 +00:00
|
|
|
#include "remote-store.hh"
|
2006-11-30 17:43:04 +00:00
|
|
|
|
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
|
2016-02-29 15:11:11 +00:00
|
|
|
RegisterStoreImplementation::Implementations * RegisterStoreImplementation::implementations = 0;
|
|
|
|
|
|
|
|
|
2016-09-02 10:35:48 +00:00
|
|
|
ref<Store> openStore(const std::string & uri_)
|
2006-11-30 17:43:04 +00:00
|
|
|
{
|
2016-04-29 14:26:16 +00:00
|
|
|
auto uri(uri_);
|
2016-06-01 12:49:12 +00:00
|
|
|
Store::Params params;
|
2016-04-29 14:26:16 +00:00
|
|
|
auto q = uri.find('?');
|
|
|
|
if (q != std::string::npos) {
|
|
|
|
for (auto s : tokenizeString<Strings>(uri.substr(q + 1), "&")) {
|
|
|
|
auto e = s.find('=');
|
|
|
|
if (e != std::string::npos)
|
|
|
|
params[s.substr(0, e)] = s.substr(e + 1);
|
|
|
|
}
|
|
|
|
uri = uri_.substr(0, q);
|
|
|
|
}
|
|
|
|
|
2016-02-29 15:11:11 +00:00
|
|
|
for (auto fun : *RegisterStoreImplementation::implementations) {
|
2016-04-29 14:26:16 +00:00
|
|
|
auto store = fun(uri, params);
|
2016-02-29 15:11:11 +00:00
|
|
|
if (store) return ref<Store>(store);
|
2016-02-24 13:48:16 +00:00
|
|
|
}
|
|
|
|
|
2016-11-25 14:48:27 +00:00
|
|
|
throw Error(format("don't know how to open Nix store '%s'") % uri);
|
2016-02-29 15:11:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-09-02 10:39:29 +00:00
|
|
|
StoreType getStoreType(const std::string & uri, const std::string & stateDir)
|
2016-02-29 15:11:11 +00:00
|
|
|
{
|
2016-09-02 10:39:29 +00:00
|
|
|
if (uri == "daemon") {
|
|
|
|
return tDaemon;
|
|
|
|
} else if (uri == "local") {
|
|
|
|
return tLocal;
|
|
|
|
} else if (uri == "") {
|
2016-06-02 11:33:49 +00:00
|
|
|
if (access(stateDir.c_str(), R_OK | W_OK) == 0)
|
2016-09-02 10:39:29 +00:00
|
|
|
return tLocal;
|
2016-01-31 09:19:14 +00:00
|
|
|
else if (pathExists(settings.nixDaemonSocketFile))
|
2016-09-02 10:39:29 +00:00
|
|
|
return tDaemon;
|
2016-01-31 09:19:14 +00:00
|
|
|
else
|
2016-09-02 10:39:29 +00:00
|
|
|
return tLocal;
|
|
|
|
} else {
|
|
|
|
return tOther;
|
2016-01-31 09:19:14 +00:00
|
|
|
}
|
2016-02-29 15:11:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-29 14:26:16 +00:00
|
|
|
static RegisterStoreImplementation regStore([](
|
2016-06-01 12:49:12 +00:00
|
|
|
const std::string & uri, const Store::Params & params)
|
2016-04-29 14:26:16 +00:00
|
|
|
-> std::shared_ptr<Store>
|
|
|
|
{
|
2016-09-02 10:39:29 +00:00
|
|
|
switch (getStoreType(uri, get(params, "state", settings.nixStateDir))) {
|
|
|
|
case tDaemon:
|
2016-09-02 18:15:04 +00:00
|
|
|
return std::shared_ptr<Store>(std::make_shared<UDSRemoteStore>(params));
|
2016-09-02 10:39:29 +00:00
|
|
|
case tLocal:
|
|
|
|
return std::shared_ptr<Store>(std::make_shared<LocalStore>(params));
|
|
|
|
default:
|
|
|
|
return nullptr;
|
2016-01-31 09:19:14 +00:00
|
|
|
}
|
2016-02-29 15:11:11 +00:00
|
|
|
});
|
2016-02-24 13:48:16 +00:00
|
|
|
|
|
|
|
|
2016-04-29 11:57:08 +00:00
|
|
|
std::list<ref<Store>> getDefaultSubstituters()
|
|
|
|
{
|
|
|
|
struct State {
|
|
|
|
bool done = false;
|
|
|
|
std::list<ref<Store>> stores;
|
|
|
|
};
|
|
|
|
static Sync<State> state_;
|
|
|
|
|
|
|
|
auto state(state_.lock());
|
|
|
|
|
|
|
|
if (state->done) return state->stores;
|
|
|
|
|
|
|
|
StringSet done;
|
|
|
|
|
|
|
|
auto addStore = [&](const std::string & uri) {
|
|
|
|
if (done.count(uri)) return;
|
|
|
|
done.insert(uri);
|
2016-09-02 10:35:48 +00:00
|
|
|
state->stores.push_back(openStore(uri));
|
2016-04-29 11:57:08 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
for (auto uri : settings.get("substituters", Strings()))
|
|
|
|
addStore(uri);
|
|
|
|
|
|
|
|
for (auto uri : settings.get("binary-caches", Strings()))
|
|
|
|
addStore(uri);
|
|
|
|
|
|
|
|
for (auto uri : settings.get("extra-binary-caches", Strings()))
|
|
|
|
addStore(uri);
|
|
|
|
|
|
|
|
state->done = true;
|
|
|
|
|
|
|
|
return state->stores;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-30 17:43:04 +00:00
|
|
|
}
|