forked from lix-project/lix
Merge remote-tracking branch 'upstream/master' into libgit2
This commit is contained in:
commit
4ab27e5595
|
@ -17,7 +17,7 @@ indent_style = space
|
||||||
indent_size = 2
|
indent_size = 2
|
||||||
|
|
||||||
# Match c++/shell/perl, set indent to spaces with width of four
|
# Match c++/shell/perl, set indent to spaces with width of four
|
||||||
[*.{hpp,cc,hh,sh,pl}]
|
[*.{hpp,cc,hh,sh,pl,xs}]
|
||||||
indent_style = space
|
indent_style = space
|
||||||
indent_size = 4
|
indent_size = 4
|
||||||
|
|
||||||
|
|
2
.github/workflows/backport.yml
vendored
2
.github/workflows/backport.yml
vendored
|
@ -21,7 +21,7 @@ jobs:
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
- name: Create backport PRs
|
- name: Create backport PRs
|
||||||
# should be kept in sync with `version`
|
# should be kept in sync with `version`
|
||||||
uses: zeebe-io/backport-action@v2.1.0
|
uses: zeebe-io/backport-action@v2.1.1
|
||||||
with:
|
with:
|
||||||
# Config README: https://github.com/zeebe-io/backport-action#backport-action
|
# Config README: https://github.com/zeebe-io/backport-action#backport-action
|
||||||
github_token: ${{ secrets.GITHUB_TOKEN }}
|
github_token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
|
@ -15,6 +15,7 @@ GTEST_LIBS = @GTEST_LIBS@
|
||||||
HAVE_LIBCPUID = @HAVE_LIBCPUID@
|
HAVE_LIBCPUID = @HAVE_LIBCPUID@
|
||||||
HAVE_SECCOMP = @HAVE_SECCOMP@
|
HAVE_SECCOMP = @HAVE_SECCOMP@
|
||||||
HOST_OS = @host_os@
|
HOST_OS = @host_os@
|
||||||
|
INSTALL_UNIT_TESTS = @INSTALL_UNIT_TESTS@
|
||||||
LDFLAGS = @LDFLAGS@
|
LDFLAGS = @LDFLAGS@
|
||||||
LIBARCHIVE_LIBS = @LIBARCHIVE_LIBS@
|
LIBARCHIVE_LIBS = @LIBARCHIVE_LIBS@
|
||||||
LIBBROTLI_LIBS = @LIBBROTLI_LIBS@
|
LIBBROTLI_LIBS = @LIBBROTLI_LIBS@
|
||||||
|
@ -31,6 +32,8 @@ SODIUM_LIBS = @SODIUM_LIBS@
|
||||||
SQLITE3_LIBS = @SQLITE3_LIBS@
|
SQLITE3_LIBS = @SQLITE3_LIBS@
|
||||||
bash = @bash@
|
bash = @bash@
|
||||||
bindir = @bindir@
|
bindir = @bindir@
|
||||||
|
checkbindir = @checkbindir@
|
||||||
|
checklibdir = @checklibdir@
|
||||||
datadir = @datadir@
|
datadir = @datadir@
|
||||||
datarootdir = @datarootdir@
|
datarootdir = @datarootdir@
|
||||||
doc_generate = @doc_generate@
|
doc_generate = @doc_generate@
|
||||||
|
|
12
configure.ac
12
configure.ac
|
@ -167,6 +167,18 @@ AC_ARG_ENABLE(tests, AS_HELP_STRING([--disable-tests],[Do not build the tests]),
|
||||||
ENABLE_TESTS=$enableval, ENABLE_TESTS=yes)
|
ENABLE_TESTS=$enableval, ENABLE_TESTS=yes)
|
||||||
AC_SUBST(ENABLE_TESTS)
|
AC_SUBST(ENABLE_TESTS)
|
||||||
|
|
||||||
|
AC_ARG_ENABLE(install-unit-tests, AS_HELP_STRING([--enable-install-unit-tests],[Install the unit tests for running later (default no)]),
|
||||||
|
INSTALL_UNIT_TESTS=$enableval, INSTALL_UNIT_TESTS=no)
|
||||||
|
AC_SUBST(INSTALL_UNIT_TESTS)
|
||||||
|
|
||||||
|
AC_ARG_WITH(check-bin-dir, AS_HELP_STRING([--with-check-bin-dir=PATH],[path to install unit tests for running later (defaults to $libexecdir/nix)]),
|
||||||
|
checkbindir=$withval, checkbindir=$libexecdir/nix)
|
||||||
|
AC_SUBST(checkbindir)
|
||||||
|
|
||||||
|
AC_ARG_WITH(check-lib-dir, AS_HELP_STRING([--with-check-lib-dir=PATH],[path to install unit tests for running later (defaults to $libdir)]),
|
||||||
|
checklibdir=$withval, checklibdir=$libdir)
|
||||||
|
AC_SUBST(checklibdir)
|
||||||
|
|
||||||
# Building without API docs is the default as Nix' C++ interfaces are internal and unstable.
|
# Building without API docs is the default as Nix' C++ interfaces are internal and unstable.
|
||||||
AC_ARG_ENABLE(internal_api_docs, AS_HELP_STRING([--enable-internal-api-docs],[Build API docs for Nix's internal unstable C++ interfaces]),
|
AC_ARG_ENABLE(internal_api_docs, AS_HELP_STRING([--enable-internal-api-docs],[Build API docs for Nix's internal unstable C++ interfaces]),
|
||||||
internal_api_docs=$enableval, internal_api_docs=no)
|
internal_api_docs=$enableval, internal_api_docs=no)
|
||||||
|
|
|
@ -115,6 +115,7 @@
|
||||||
- [C++ style guide](contributing/cxx.md)
|
- [C++ style guide](contributing/cxx.md)
|
||||||
- [Release Notes](release-notes/release-notes.md)
|
- [Release Notes](release-notes/release-notes.md)
|
||||||
- [Release X.Y (202?-??-??)](release-notes/rl-next.md)
|
- [Release X.Y (202?-??-??)](release-notes/rl-next.md)
|
||||||
|
- [Release 2.19 (2023-11-17)](release-notes/rl-2.19.md)
|
||||||
- [Release 2.18 (2023-09-20)](release-notes/rl-2.18.md)
|
- [Release 2.18 (2023-09-20)](release-notes/rl-2.18.md)
|
||||||
- [Release 2.17 (2023-07-24)](release-notes/rl-2.17.md)
|
- [Release 2.17 (2023-07-24)](release-notes/rl-2.17.md)
|
||||||
- [Release 2.16 (2023-05-31)](release-notes/rl-2.16.md)
|
- [Release 2.16 (2023-05-31)](release-notes/rl-2.16.md)
|
||||||
|
|
|
@ -133,17 +133,17 @@ ran test tests/functional/${testName}.sh... [PASS]
|
||||||
or without `make`:
|
or without `make`:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ ./mk/run-test.sh tests/functional/${testName}.sh
|
$ ./mk/run-test.sh tests/functional/${testName}.sh tests/functional/init.sh
|
||||||
ran test tests/functional/${testName}.sh... [PASS]
|
ran test tests/functional/${testName}.sh... [PASS]
|
||||||
```
|
```
|
||||||
|
|
||||||
To see the complete output, one can also run:
|
To see the complete output, one can also run:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ ./mk/debug-test.sh tests/functional/${testName}.sh
|
$ ./mk/debug-test.sh tests/functional/${testName}.sh tests/functional/init.sh
|
||||||
+ foo
|
+(${testName}.sh:1) foo
|
||||||
output from foo
|
output from foo
|
||||||
+ bar
|
+(${testName}.sh:2) bar
|
||||||
output from bar
|
output from bar
|
||||||
...
|
...
|
||||||
```
|
```
|
||||||
|
@ -175,7 +175,7 @@ edit it like so:
|
||||||
Then, running the test with `./mk/debug-test.sh` will drop you into GDB once the script reaches that point:
|
Then, running the test with `./mk/debug-test.sh` will drop you into GDB once the script reaches that point:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ ./mk/debug-test.sh tests/functional/${testName}.sh
|
$ ./mk/debug-test.sh tests/functional/${testName}.sh tests/functional/init.sh
|
||||||
...
|
...
|
||||||
+ gdb blash blub
|
+ gdb blash blub
|
||||||
GNU gdb (GDB) 12.1
|
GNU gdb (GDB) 12.1
|
||||||
|
|
|
@ -132,6 +132,32 @@ a = src-set.a; b = src-set.b; c = src-set.c;
|
||||||
when used while defining local variables in a let-expression or while
|
when used while defining local variables in a let-expression or while
|
||||||
defining a set.
|
defining a set.
|
||||||
|
|
||||||
|
In a `let` expression, `inherit` can be used to selectively bring specific attributes of a set into scope. For example
|
||||||
|
|
||||||
|
|
||||||
|
```nix
|
||||||
|
let
|
||||||
|
x = { a = 1; b = 2; };
|
||||||
|
inherit (builtins) attrNames;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
names = attrNames x;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
is equivalent to
|
||||||
|
|
||||||
|
```nix
|
||||||
|
let
|
||||||
|
x = { a = 1; b = 2; };
|
||||||
|
in
|
||||||
|
{
|
||||||
|
names = builtins.attrNames x;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
both evaluate to `{ names = [ "a" "b" ]; }`.
|
||||||
|
|
||||||
## Functions
|
## Functions
|
||||||
|
|
||||||
Functions have the following form:
|
Functions have the following form:
|
||||||
|
|
|
@ -25,7 +25,7 @@
|
||||||
| Inequality | *expr* `!=` *expr* | none | 11 |
|
| Inequality | *expr* `!=` *expr* | none | 11 |
|
||||||
| Logical conjunction (`AND`) | *bool* `&&` *bool* | left | 12 |
|
| Logical conjunction (`AND`) | *bool* `&&` *bool* | left | 12 |
|
||||||
| Logical disjunction (`OR`) | *bool* <code>\|\|</code> *bool* | left | 13 |
|
| Logical disjunction (`OR`) | *bool* <code>\|\|</code> *bool* | left | 13 |
|
||||||
| [Logical implication] | *bool* `->` *bool* | none | 14 |
|
| [Logical implication] | *bool* `->` *bool* | right | 14 |
|
||||||
|
|
||||||
[string]: ./values.md#type-string
|
[string]: ./values.md#type-string
|
||||||
[path]: ./values.md#type-path
|
[path]: ./values.md#type-path
|
||||||
|
|
77
doc/manual/src/release-notes/rl-2.19.md
Normal file
77
doc/manual/src/release-notes/rl-2.19.md
Normal file
|
@ -0,0 +1,77 @@
|
||||||
|
# Release 2.19 (2023-11-17)
|
||||||
|
|
||||||
|
- The experimental `nix` command can now act as a [shebang interpreter](@docroot@/command-ref/new-cli/nix.md#shebang-interpreter)
|
||||||
|
by appending the contents of any `#! nix` lines and the script's location into a single call.
|
||||||
|
|
||||||
|
- [URL flake references](@docroot@/command-ref/new-cli/nix3-flake.md#flake-references) now support [percent-encoded](https://datatracker.ietf.org/doc/html/rfc3986#section-2.1) characters.
|
||||||
|
|
||||||
|
- [Path-like flake references](@docroot@/command-ref/new-cli/nix3-flake.md#path-like-syntax) now accept arbitrary unicode characters (except `#` and `?`).
|
||||||
|
|
||||||
|
- The experimental feature `repl-flake` is no longer needed, as its functionality is now part of the `flakes` experimental feature. To get the previous behavior, use the `--file/--expr` flags accordingly.
|
||||||
|
|
||||||
|
- There is a new flake installable syntax `flakeref#.attrPath` where the "." prefix specifies that `attrPath` is interpreted from the root of the flake outputs, with no searching of default attribute prefixes like `packages.<SYSTEM>` or `legacyPackages.<SYSTEM>`.
|
||||||
|
|
||||||
|
- Nix adds `apple-virt` to the default system features on macOS systems that support virtualization. This is similar to what's done for the `kvm` system feature on Linux hosts.
|
||||||
|
|
||||||
|
- Add a new built-in function [`builtins.convertHash`](@docroot@/language/builtins.md#builtins-convertHash).
|
||||||
|
|
||||||
|
- `nix-shell` shebang lines now support single-quoted arguments.
|
||||||
|
|
||||||
|
- `builtins.fetchTree` is now its own experimental feature, [`fetch-tree`](@docroot@/contributing/experimental-features.md#xp-fetch-tree).
|
||||||
|
As described in the documentation for that feature, this is because we anticipate polishing it and then stabilizing it before the rest of flakes.
|
||||||
|
|
||||||
|
- The interface for creating and updating lock files has been overhauled:
|
||||||
|
|
||||||
|
- [`nix flake lock`](@docroot@/command-ref/new-cli/nix3-flake-lock.md) only creates lock files and adds missing inputs now.
|
||||||
|
It will *never* update existing inputs.
|
||||||
|
|
||||||
|
- [`nix flake update`](@docroot@/command-ref/new-cli/nix3-flake-update.md) does the same, but *will* update inputs.
|
||||||
|
- Passing no arguments will update all inputs of the current flake, just like it already did.
|
||||||
|
- Passing input names as arguments will ensure only those are updated. This replaces the functionality of `nix flake lock --update-input`
|
||||||
|
- To operate on a flake outside the current directory, you must now pass `--flake path/to/flake`.
|
||||||
|
|
||||||
|
- The flake-specific flags `--recreate-lock-file` and `--update-input` have been removed from all commands operating on installables.
|
||||||
|
They are superceded by `nix flake update`.
|
||||||
|
|
||||||
|
- Commit signature verification for the [`builtins.fetchGit`](@docroot@/language/builtins.md#builtins-fetchGit) is added as the new [`verified-fetches` experimental feature](@docroot@/contributing/experimental-features.md#xp-feature-verified-fetches).
|
||||||
|
|
||||||
|
- [`nix path-info --json`](@docroot@/command-ref/new-cli/nix3-path-info.md)
|
||||||
|
(experimental) now returns a JSON map rather than JSON list.
|
||||||
|
The `path` field of each object has instead become the key in the outer map, since it is unique.
|
||||||
|
The `valid` field also goes away because we just use `null` instead.
|
||||||
|
|
||||||
|
- Old way:
|
||||||
|
|
||||||
|
```json5
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"path": "/nix/store/8fv91097mbh5049i9rglc73dx6kjg3qk-bash-5.2-p15",
|
||||||
|
"valid": true,
|
||||||
|
// ...
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "/nix/store/wffw7l0alvs3iw94cbgi1gmmbmw99sqb-home-manager-path",
|
||||||
|
"valid": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
```
|
||||||
|
|
||||||
|
- New way
|
||||||
|
|
||||||
|
```json5
|
||||||
|
{
|
||||||
|
"/nix/store/8fv91097mbh5049i9rglc73dx6kjg3qk-bash-5.2-p15": {
|
||||||
|
// ...
|
||||||
|
},
|
||||||
|
"/nix/store/wffw7l0alvs3iw94cbgi1gmmbmw99sqb-home-manager-path": null,
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
This makes it match `nix derivation show`, which also maps store paths to information.
|
||||||
|
|
||||||
|
- When Nix is installed using the [binary installer](@docroot@/installation/installing-binary.md), in supported shells (Bash, Zsh, Fish)
|
||||||
|
[`XDG_DATA_DIRS`](https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html#variables) is now populated with the path to the `/share` subdirectory of the current profile.
|
||||||
|
This means that command completion scripts, `.desktop` files, and similar artifacts installed via [`nix-env`](@docroot@/command-ref/nix-env.md) or [`nix profile`](@docroot@/command-ref/new-cli/nix3-profile.md)
|
||||||
|
(experimental) can be found by any program that follows the [XDG Base Directory Specification](https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html).
|
||||||
|
|
||||||
|
- A new command `nix store add` has been added. It replaces `nix store add-file` and `nix store add-path` which are now deprecated.
|
|
@ -1,75 +1,2 @@
|
||||||
# Release X.Y (202?-??-??)
|
# Release X.Y (202?-??-??)
|
||||||
|
|
||||||
- The experimental nix command can now act as a [shebang interpreter](@docroot@/command-ref/new-cli/nix.md#shebang-interpreter)
|
|
||||||
by appending the contents of any `#! nix` lines and the script's location to a single call.
|
|
||||||
|
|
||||||
- [URL flake references](@docroot@/command-ref/new-cli/nix3-flake.md#flake-references) now support [percent-encoded](https://datatracker.ietf.org/doc/html/rfc3986#section-2.1) characters.
|
|
||||||
|
|
||||||
- [Path-like flake references](@docroot@/command-ref/new-cli/nix3-flake.md#path-like-syntax) now accept arbitrary unicode characters (except `#` and `?`).
|
|
||||||
|
|
||||||
- The experimental feature `repl-flake` is no longer needed, as its functionality is now part of the `flakes` experimental feature. To get the previous behavior, use the `--file/--expr` flags accordingly.
|
|
||||||
|
|
||||||
- Introduce new flake installable syntax `flakeref#.attrPath` where the "." prefix denotes no searching of default attribute prefixes like `packages.<SYSTEM>` or `legacyPackages.<SYSTEM>`.
|
|
||||||
|
|
||||||
- Nix adds `apple-virt` to the default system features on macOS systems that support virtualization. This is similar to what's done for the `kvm` system feature on Linux hosts.
|
|
||||||
|
|
||||||
- Introduce a new built-in function [`builtins.convertHash`](@docroot@/language/builtins.md#builtins-convertHash).
|
|
||||||
|
|
||||||
- `nix-shell` shebang lines now support single-quoted arguments.
|
|
||||||
|
|
||||||
- `builtins.fetchTree` is now its own experimental feature, [`fetch-tree`](@docroot@/contributing/experimental-features.md#xp-fetch-tree).
|
|
||||||
As described in the document for that feature, this is because we anticipate polishing it and then stabilizing it before the rest of Flakes.
|
|
||||||
|
|
||||||
- The interface for creating and updating lock files has been overhauled:
|
|
||||||
|
|
||||||
- [`nix flake lock`](@docroot@/command-ref/new-cli/nix3-flake-lock.md) only creates lock files and adds missing inputs now.
|
|
||||||
It will *never* update existing inputs.
|
|
||||||
|
|
||||||
- [`nix flake update`](@docroot@/command-ref/new-cli/nix3-flake-update.md) does the same, but *will* update inputs.
|
|
||||||
- Passing no arguments will update all inputs of the current flake, just like it already did.
|
|
||||||
- Passing input names as arguments will ensure only those are updated. This replaces the functionality of `nix flake lock --update-input`
|
|
||||||
- To operate on a flake outside the current directory, you must now pass `--flake path/to/flake`.
|
|
||||||
|
|
||||||
- The flake-specific flags `--recreate-lock-file` and `--update-input` have been removed from all commands operating on installables.
|
|
||||||
They are superceded by `nix flake update`.
|
|
||||||
|
|
||||||
- Commit signature verification for the [`builtins.fetchGit`](@docroot@/language/builtins.md#builtins-fetchGit) is added as the new [`verified-fetches` experimental feature](@docroot@/contributing/experimental-features.md#xp-feature-verified-fetches).
|
|
||||||
|
|
||||||
- [`nix path-info --json`](@docroot@/command-ref/new-cli/nix3-path-info.md)
|
|
||||||
(experimental) now returns a JSON map rather than JSON list.
|
|
||||||
The `path` field of each object has instead become the key in th outer map, since it is unique.
|
|
||||||
The `valid` field also goes away because we just use null instead.
|
|
||||||
|
|
||||||
- Old way:
|
|
||||||
|
|
||||||
```json5
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"path": "/nix/store/8fv91097mbh5049i9rglc73dx6kjg3qk-bash-5.2-p15",
|
|
||||||
"valid": true,
|
|
||||||
// ...
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"path": "/nix/store/wffw7l0alvs3iw94cbgi1gmmbmw99sqb-home-manager-path",
|
|
||||||
"valid": false
|
|
||||||
}
|
|
||||||
]
|
|
||||||
```
|
|
||||||
|
|
||||||
- New way
|
|
||||||
|
|
||||||
```json5
|
|
||||||
{
|
|
||||||
"/nix/store/8fv91097mbh5049i9rglc73dx6kjg3qk-bash-5.2-p15": {
|
|
||||||
// ...
|
|
||||||
},
|
|
||||||
"/nix/store/wffw7l0alvs3iw94cbgi1gmmbmw99sqb-home-manager-path": null,
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
This makes it match `nix derivation show`, which also maps store paths to information.
|
|
||||||
|
|
||||||
- When Nix is installed using the [binary installer](@docroot@/installation/installing-binary.md), in supported shells (Bash, Zsh, Fish)
|
|
||||||
[`XDG_DATA_DIRS`](https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html#variables) is now populated with the path to the `/share` subdirectory of the current profile.
|
|
||||||
This means that command completion scripts, `.desktop` files, and similar artifacts installed via [`nix-env`](@docroot@/command-ref/nix-env.md) or [`nix profile`](@docroot@/command-ref/new-cli/nix3-profile.md)
|
|
||||||
(experimental) can be found by any program that follows the [XDG Base Directory Specification](https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html).
|
|
||||||
|
|
10
flake.nix
10
flake.nix
|
@ -165,6 +165,10 @@
|
||||||
|
|
||||||
testConfigureFlags = [
|
testConfigureFlags = [
|
||||||
"RAPIDCHECK_HEADERS=${lib.getDev rapidcheck}/extras/gtest/include"
|
"RAPIDCHECK_HEADERS=${lib.getDev rapidcheck}/extras/gtest/include"
|
||||||
|
] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
|
||||||
|
"--enable-install-unit-tests"
|
||||||
|
"--with-check-bin-dir=${builtins.placeholder "check"}/bin"
|
||||||
|
"--with-check-lib-dir=${builtins.placeholder "check"}/lib"
|
||||||
];
|
];
|
||||||
|
|
||||||
internalApiDocsConfigureFlags = [
|
internalApiDocsConfigureFlags = [
|
||||||
|
@ -410,7 +414,8 @@
|
||||||
src = nixSrc;
|
src = nixSrc;
|
||||||
VERSION_SUFFIX = versionSuffix;
|
VERSION_SUFFIX = versionSuffix;
|
||||||
|
|
||||||
outputs = [ "out" "dev" "doc" ];
|
outputs = [ "out" "dev" "doc" ]
|
||||||
|
++ lib.optional (currentStdenv.hostPlatform != currentStdenv.buildPlatform) "check";
|
||||||
|
|
||||||
nativeBuildInputs = nativeBuildDeps;
|
nativeBuildInputs = nativeBuildDeps;
|
||||||
buildInputs = buildDeps
|
buildInputs = buildDeps
|
||||||
|
@ -716,7 +721,8 @@
|
||||||
stdenv.mkDerivation {
|
stdenv.mkDerivation {
|
||||||
name = "nix";
|
name = "nix";
|
||||||
|
|
||||||
outputs = [ "out" "dev" "doc" ];
|
outputs = [ "out" "dev" "doc" ]
|
||||||
|
++ lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) "check";
|
||||||
|
|
||||||
nativeBuildInputs = nativeBuildDeps
|
nativeBuildInputs = nativeBuildDeps
|
||||||
++ lib.optional stdenv.cc.isClang pkgs.buildPackages.bear
|
++ lib.optional stdenv.cc.isClang pkgs.buildPackages.bear
|
||||||
|
|
|
@ -1,15 +1,27 @@
|
||||||
test_dir=tests/functional
|
# Remove overall test dir (at most one of the two should match) and
|
||||||
|
# remove file extension.
|
||||||
|
test_name=$(echo -n "$test" | sed \
|
||||||
|
-e "s|^unit-test-data/||" \
|
||||||
|
-e "s|^tests/functional/||" \
|
||||||
|
-e "s|\.sh$||" \
|
||||||
|
)
|
||||||
|
|
||||||
test=$(echo -n "$test" | sed -e "s|^$test_dir/||")
|
TESTS_ENVIRONMENT=(
|
||||||
|
"TEST_NAME=$test_name"
|
||||||
TESTS_ENVIRONMENT=("TEST_NAME=${test%.*}" 'NIX_REMOTE=')
|
'NIX_REMOTE='
|
||||||
|
'PS4=+(${BASH_SOURCE[0]-$0}:$LINENO) '
|
||||||
|
)
|
||||||
|
|
||||||
: ${BASH:=/usr/bin/env bash}
|
: ${BASH:=/usr/bin/env bash}
|
||||||
|
|
||||||
|
run () {
|
||||||
|
cd "$(dirname $1)" && env "${TESTS_ENVIRONMENT[@]}" $BASH -x -e -u -o pipefail $(basename $1)
|
||||||
|
}
|
||||||
|
|
||||||
init_test () {
|
init_test () {
|
||||||
cd "$test_dir" && env "${TESTS_ENVIRONMENT[@]}" $BASH -e init.sh 2>/dev/null > /dev/null
|
run "$init" 2>/dev/null > /dev/null
|
||||||
}
|
}
|
||||||
|
|
||||||
run_test_proper () {
|
run_test_proper () {
|
||||||
cd "$test_dir/$(dirname $test)" && env "${TESTS_ENVIRONMENT[@]}" $BASH -e $(basename $test)
|
run "$test"
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,9 +3,12 @@
|
||||||
set -eu -o pipefail
|
set -eu -o pipefail
|
||||||
|
|
||||||
test=$1
|
test=$1
|
||||||
|
init=${2-}
|
||||||
|
|
||||||
dir="$(dirname "${BASH_SOURCE[0]}")"
|
dir="$(dirname "${BASH_SOURCE[0]}")"
|
||||||
source "$dir/common-test.sh"
|
source "$dir/common-test.sh"
|
||||||
|
|
||||||
(init_test)
|
if [ -n "$init" ]; then
|
||||||
|
(init_test)
|
||||||
|
fi
|
||||||
run_test_proper
|
run_test_proper
|
||||||
|
|
|
@ -122,14 +122,15 @@ $(foreach script, $(bin-scripts), $(eval $(call install-program-in,$(script),$(b
|
||||||
$(foreach script, $(bin-scripts), $(eval programs-list += $(script)))
|
$(foreach script, $(bin-scripts), $(eval programs-list += $(script)))
|
||||||
$(foreach script, $(noinst-scripts), $(eval programs-list += $(script)))
|
$(foreach script, $(noinst-scripts), $(eval programs-list += $(script)))
|
||||||
$(foreach template, $(template-files), $(eval $(call instantiate-template,$(template))))
|
$(foreach template, $(template-files), $(eval $(call instantiate-template,$(template))))
|
||||||
|
install_test_init=tests/functional/init.sh
|
||||||
$(foreach test, $(install-tests), \
|
$(foreach test, $(install-tests), \
|
||||||
$(eval $(call run-install-test,$(test))) \
|
$(eval $(call run-test,$(test),$(install_test_init))) \
|
||||||
$(eval installcheck: $(test).test))
|
$(eval installcheck: $(test).test))
|
||||||
$(foreach test-group, $(install-tests-groups), \
|
$(foreach test-group, $(install-tests-groups), \
|
||||||
$(eval $(call run-install-test-group,$(test-group))) \
|
$(eval $(call run-test-group,$(test-group),$(install_test_init))) \
|
||||||
$(eval installcheck: $(test-group).test-group) \
|
$(eval installcheck: $(test-group).test-group) \
|
||||||
$(foreach test, $($(test-group)-tests), \
|
$(foreach test, $($(test-group)-tests), \
|
||||||
$(eval $(call run-install-test,$(test))) \
|
$(eval $(call run-test,$(test),$(install_test_init))) \
|
||||||
$(eval $(test-group).test-group: $(test).test)))
|
$(eval $(test-group).test-group: $(test).test)))
|
||||||
|
|
||||||
$(foreach file, $(man-pages), $(eval $(call install-data-in, $(file), $(mandir)/man$(patsubst .%,%,$(suffix $(file))))))
|
$(foreach file, $(man-pages), $(eval $(call install-data-in, $(file), $(mandir)/man$(patsubst .%,%,$(suffix $(file))))))
|
||||||
|
|
|
@ -8,6 +8,7 @@ yellow=""
|
||||||
normal=""
|
normal=""
|
||||||
|
|
||||||
test=$1
|
test=$1
|
||||||
|
init=${2-}
|
||||||
|
|
||||||
dir="$(dirname "${BASH_SOURCE[0]}")"
|
dir="$(dirname "${BASH_SOURCE[0]}")"
|
||||||
source "$dir/common-test.sh"
|
source "$dir/common-test.sh"
|
||||||
|
@ -21,7 +22,9 @@ if [ -t 1 ]; then
|
||||||
fi
|
fi
|
||||||
|
|
||||||
run_test () {
|
run_test () {
|
||||||
|
if [ -n "$init" ]; then
|
||||||
(init_test 2>/dev/null > /dev/null)
|
(init_test 2>/dev/null > /dev/null)
|
||||||
|
fi
|
||||||
log="$(run_test_proper 2>&1)" && status=0 || status=$?
|
log="$(run_test_proper 2>&1)" && status=0 || status=$?
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
21
mk/tests.mk
21
mk/tests.mk
|
@ -2,19 +2,22 @@
|
||||||
|
|
||||||
test-deps =
|
test-deps =
|
||||||
|
|
||||||
define run-install-test
|
define run-bash
|
||||||
|
|
||||||
.PHONY: $1.test
|
.PHONY: $1
|
||||||
$1.test: $1 $(test-deps)
|
$1: $2
|
||||||
@env BASH=$(bash) $(bash) mk/run-test.sh $1 < /dev/null
|
@env BASH=$(bash) $(bash) $3 < /dev/null
|
||||||
|
|
||||||
.PHONY: $1.test-debug
|
|
||||||
$1.test-debug: $1 $(test-deps)
|
|
||||||
@env BASH=$(bash) $(bash) mk/debug-test.sh $1 < /dev/null
|
|
||||||
|
|
||||||
endef
|
endef
|
||||||
|
|
||||||
define run-install-test-group
|
define run-test
|
||||||
|
|
||||||
|
$(eval $(call run-bash,$1.test,$1 $(test-deps),mk/run-test.sh $1 $2))
|
||||||
|
$(eval $(call run-bash,$1.test-debug,$1 $(test-deps),mk/debug-test.sh $1 $2))
|
||||||
|
|
||||||
|
endef
|
||||||
|
|
||||||
|
define run-test-group
|
||||||
|
|
||||||
.PHONY: $1.test-group
|
.PHONY: $1.test-group
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
#include "eval.hh"
|
#include "eval.hh"
|
||||||
#include "eval-settings.hh"
|
#include "eval-settings.hh"
|
||||||
#include "hash.hh"
|
#include "hash.hh"
|
||||||
|
#include "primops.hh"
|
||||||
#include "types.hh"
|
#include "types.hh"
|
||||||
#include "util.hh"
|
#include "util.hh"
|
||||||
#include "store-api.hh"
|
#include "store-api.hh"
|
||||||
|
@ -722,6 +723,23 @@ void EvalState::addConstant(const std::string & name, Value * v, Constant info)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void PrimOp::check()
|
||||||
|
{
|
||||||
|
if (arity > maxPrimOpArity) {
|
||||||
|
throw Error("primop arity must not exceed %1%", maxPrimOpArity);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void Value::mkPrimOp(PrimOp * p)
|
||||||
|
{
|
||||||
|
p->check();
|
||||||
|
clearValue();
|
||||||
|
internalType = tPrimOp;
|
||||||
|
primOp = p;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
Value * EvalState::addPrimOp(PrimOp && primOp)
|
Value * EvalState::addPrimOp(PrimOp && primOp)
|
||||||
{
|
{
|
||||||
/* Hack to make constants lazy: turn them into a application of
|
/* Hack to make constants lazy: turn them into a application of
|
||||||
|
@ -1748,6 +1766,12 @@ void ExprCall::eval(EvalState & state, Env & env, Value & v)
|
||||||
Value vFun;
|
Value vFun;
|
||||||
fun->eval(state, env, vFun);
|
fun->eval(state, env, vFun);
|
||||||
|
|
||||||
|
// Empirical arity of Nixpkgs lambdas by regex e.g. ([a-zA-Z]+:(\s|(/\*.*\/)|(#.*\n))*){5}
|
||||||
|
// 2: over 4000
|
||||||
|
// 3: about 300
|
||||||
|
// 4: about 60
|
||||||
|
// 5: under 10
|
||||||
|
// This excluded attrset lambdas (`{...}:`). Contributions of mixed lambdas appears insignificant at ~150 total.
|
||||||
Value * vArgs[args.size()];
|
Value * vArgs[args.size()];
|
||||||
for (size_t i = 0; i < args.size(); ++i)
|
for (size_t i = 0; i < args.size(); ++i)
|
||||||
vArgs[i] = args[i]->maybeThunk(state, env);
|
vArgs[i] = args[i]->maybeThunk(state, env);
|
||||||
|
|
|
@ -18,6 +18,12 @@
|
||||||
|
|
||||||
namespace nix {
|
namespace nix {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* We put a limit on primop arity because it lets us use a fixed size array on
|
||||||
|
* the stack. 8 is already an impractical number of arguments. Use an attrset
|
||||||
|
* argument for such overly complicated functions.
|
||||||
|
*/
|
||||||
|
constexpr size_t maxPrimOpArity = 8;
|
||||||
|
|
||||||
class Store;
|
class Store;
|
||||||
class EvalState;
|
class EvalState;
|
||||||
|
@ -71,6 +77,12 @@ struct PrimOp
|
||||||
* Optional experimental for this to be gated on.
|
* Optional experimental for this to be gated on.
|
||||||
*/
|
*/
|
||||||
std::optional<ExperimentalFeature> experimentalFeature;
|
std::optional<ExperimentalFeature> experimentalFeature;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Validity check to be performed by functions that introduce primops,
|
||||||
|
* such as RegisterPrimOp() and Value::mkPrimOp().
|
||||||
|
*/
|
||||||
|
void check();
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -827,7 +839,7 @@ std::string showType(const Value & v);
|
||||||
/**
|
/**
|
||||||
* If `path` refers to a directory, then append "/default.nix".
|
* If `path` refers to a directory, then append "/default.nix".
|
||||||
*/
|
*/
|
||||||
SourcePath resolveExprPath(const SourcePath & path);
|
SourcePath resolveExprPath(SourcePath path);
|
||||||
|
|
||||||
struct InvalidPathError : EvalError
|
struct InvalidPathError : EvalError
|
||||||
{
|
{
|
||||||
|
|
|
@ -43,7 +43,9 @@ $(foreach i, $(wildcard src/libexpr/value/*.hh), \
|
||||||
$(foreach i, $(wildcard src/libexpr/flake/*.hh), \
|
$(foreach i, $(wildcard src/libexpr/flake/*.hh), \
|
||||||
$(eval $(call install-file-in, $(i), $(includedir)/nix/flake, 0644)))
|
$(eval $(call install-file-in, $(i), $(includedir)/nix/flake, 0644)))
|
||||||
|
|
||||||
$(d)/primops.cc: $(d)/imported-drv-to-derivation.nix.gen.hh $(d)/primops/derivation.nix.gen.hh $(d)/fetchurl.nix.gen.hh
|
$(d)/primops.cc: $(d)/imported-drv-to-derivation.nix.gen.hh
|
||||||
|
|
||||||
|
$(d)/eval.cc: $(d)/primops/derivation.nix.gen.hh $(d)/fetchurl.nix.gen.hh
|
||||||
|
|
||||||
$(d)/flake/flake.cc: $(d)/flake/call-flake.nix.gen.hh
|
$(d)/flake/flake.cc: $(d)/flake/call-flake.nix.gen.hh
|
||||||
|
|
||||||
|
|
|
@ -686,17 +686,25 @@ Expr * EvalState::parse(
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
SourcePath resolveExprPath(const SourcePath & path)
|
SourcePath resolveExprPath(SourcePath path)
|
||||||
{
|
{
|
||||||
|
unsigned int followCount = 0, maxFollow = 1024;
|
||||||
|
|
||||||
/* If `path' is a symlink, follow it. This is so that relative
|
/* If `path' is a symlink, follow it. This is so that relative
|
||||||
path references work. */
|
path references work. */
|
||||||
auto path2 = path.resolveSymlinks();
|
while (true) {
|
||||||
|
// Basic cycle/depth limit to avoid infinite loops.
|
||||||
|
if (++followCount >= maxFollow)
|
||||||
|
throw Error("too many symbolic links encountered while traversing the path '%s'", path);
|
||||||
|
if (path.lstat().type != InputAccessor::tSymlink) break;
|
||||||
|
path = {path.accessor, CanonPath(path.readLink(), path.path.parent().value_or(CanonPath::root))};
|
||||||
|
}
|
||||||
|
|
||||||
/* If `path' refers to a directory, append `/default.nix'. */
|
/* If `path' refers to a directory, append `/default.nix'. */
|
||||||
if (path2.lstat().type == InputAccessor::tDirectory)
|
if (path.lstat().type == InputAccessor::tDirectory)
|
||||||
return path2 + "default.nix";
|
return path + "default.nix";
|
||||||
|
|
||||||
return path2;
|
return path;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -29,7 +29,6 @@
|
||||||
|
|
||||||
#include <cmath>
|
#include <cmath>
|
||||||
|
|
||||||
|
|
||||||
namespace nix {
|
namespace nix {
|
||||||
|
|
||||||
|
|
||||||
|
@ -2375,7 +2374,7 @@ static RegisterPrimOp primop_path({
|
||||||
like `@`.
|
like `@`.
|
||||||
|
|
||||||
- filter\
|
- filter\
|
||||||
A function of the type expected by `builtins.filterSource`,
|
A function of the type expected by [`builtins.filterSource`](#builtins-filterSource),
|
||||||
with the same semantics.
|
with the same semantics.
|
||||||
|
|
||||||
- recursive\
|
- recursive\
|
||||||
|
@ -2550,6 +2549,7 @@ static void prim_removeAttrs(EvalState & state, const PosIdx pos, Value * * args
|
||||||
/* Get the attribute names to be removed.
|
/* Get the attribute names to be removed.
|
||||||
We keep them as Attrs instead of Symbols so std::set_difference
|
We keep them as Attrs instead of Symbols so std::set_difference
|
||||||
can be used to remove them from attrs[0]. */
|
can be used to remove them from attrs[0]. */
|
||||||
|
// 64: large enough to fit the attributes of a derivation
|
||||||
boost::container::small_vector<Attr, 64> names;
|
boost::container::small_vector<Attr, 64> names;
|
||||||
names.reserve(args[1]->listSize());
|
names.reserve(args[1]->listSize());
|
||||||
for (auto elem : args[1]->listItems()) {
|
for (auto elem : args[1]->listItems()) {
|
||||||
|
@ -2730,7 +2730,7 @@ static void prim_catAttrs(EvalState & state, const PosIdx pos, Value * * args, V
|
||||||
state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.catAttrs");
|
state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.catAttrs");
|
||||||
|
|
||||||
Value * res[args[1]->listSize()];
|
Value * res[args[1]->listSize()];
|
||||||
unsigned int found = 0;
|
size_t found = 0;
|
||||||
|
|
||||||
for (auto v2 : args[1]->listItems()) {
|
for (auto v2 : args[1]->listItems()) {
|
||||||
state.forceAttrs(*v2, pos, "while evaluating an element in the list passed as second argument to builtins.catAttrs");
|
state.forceAttrs(*v2, pos, "while evaluating an element in the list passed as second argument to builtins.catAttrs");
|
||||||
|
@ -3066,7 +3066,7 @@ static void prim_filter(EvalState & state, const PosIdx pos, Value * * args, Val
|
||||||
|
|
||||||
// FIXME: putting this on the stack is risky.
|
// FIXME: putting this on the stack is risky.
|
||||||
Value * vs[args[1]->listSize()];
|
Value * vs[args[1]->listSize()];
|
||||||
unsigned int k = 0;
|
size_t k = 0;
|
||||||
|
|
||||||
bool same = true;
|
bool same = true;
|
||||||
for (unsigned int n = 0; n < args[1]->listSize(); ++n) {
|
for (unsigned int n = 0; n < args[1]->listSize(); ++n) {
|
||||||
|
@ -3191,10 +3191,14 @@ static void anyOrAll(bool any, EvalState & state, const PosIdx pos, Value * * ar
|
||||||
state.forceFunction(*args[0], pos, std::string("while evaluating the first argument passed to builtins.") + (any ? "any" : "all"));
|
state.forceFunction(*args[0], pos, std::string("while evaluating the first argument passed to builtins.") + (any ? "any" : "all"));
|
||||||
state.forceList(*args[1], pos, std::string("while evaluating the second argument passed to builtins.") + (any ? "any" : "all"));
|
state.forceList(*args[1], pos, std::string("while evaluating the second argument passed to builtins.") + (any ? "any" : "all"));
|
||||||
|
|
||||||
|
std::string_view errorCtx = any
|
||||||
|
? "while evaluating the return value of the function passed to builtins.any"
|
||||||
|
: "while evaluating the return value of the function passed to builtins.all";
|
||||||
|
|
||||||
Value vTmp;
|
Value vTmp;
|
||||||
for (auto elem : args[1]->listItems()) {
|
for (auto elem : args[1]->listItems()) {
|
||||||
state.callFunction(*args[0], *elem, vTmp, pos);
|
state.callFunction(*args[0], *elem, vTmp, pos);
|
||||||
bool res = state.forceBool(vTmp, pos, std::string("while evaluating the return value of the function passed to builtins.") + (any ? "any" : "all"));
|
bool res = state.forceBool(vTmp, pos, errorCtx);
|
||||||
if (res == any) {
|
if (res == any) {
|
||||||
v.mkBool(any);
|
v.mkBool(any);
|
||||||
return;
|
return;
|
||||||
|
@ -3456,7 +3460,7 @@ static void prim_concatMap(EvalState & state, const PosIdx pos, Value * * args,
|
||||||
for (unsigned int n = 0; n < nrLists; ++n) {
|
for (unsigned int n = 0; n < nrLists; ++n) {
|
||||||
Value * vElem = args[1]->listElems()[n];
|
Value * vElem = args[1]->listElems()[n];
|
||||||
state.callFunction(*args[0], *vElem, lists[n], pos);
|
state.callFunction(*args[0], *vElem, lists[n], pos);
|
||||||
state.forceList(lists[n], lists[n].determinePos(args[0]->determinePos(pos)), "while evaluating the return value of the function passed to buitlins.concatMap");
|
state.forceList(lists[n], lists[n].determinePos(args[0]->determinePos(pos)), "while evaluating the return value of the function passed to builtins.concatMap");
|
||||||
len += lists[n].listSize();
|
len += lists[n].listSize();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -8,6 +8,22 @@
|
||||||
|
|
||||||
namespace nix {
|
namespace nix {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* For functions where we do not expect deep recursion, we can use a sizable
|
||||||
|
* part of the stack a free allocation space.
|
||||||
|
*
|
||||||
|
* Note: this is expected to be multiplied by sizeof(Value), or about 24 bytes.
|
||||||
|
*/
|
||||||
|
constexpr size_t nonRecursiveStackReservation = 128;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Functions that maybe applied to self-similar inputs, such as concatMap on a
|
||||||
|
* tree, should reserve a smaller part of the stack for allocation.
|
||||||
|
*
|
||||||
|
* Note: this is expected to be multiplied by sizeof(Value), or about 24 bytes.
|
||||||
|
*/
|
||||||
|
constexpr size_t conservativeStackReservation = 16;
|
||||||
|
|
||||||
struct RegisterPrimOp
|
struct RegisterPrimOp
|
||||||
{
|
{
|
||||||
typedef std::vector<PrimOp> PrimOps;
|
typedef std::vector<PrimOp> PrimOps;
|
||||||
|
|
|
@ -906,12 +906,12 @@ namespace nix {
|
||||||
ASSERT_TRACE2("concatMap (x: 1) [ \"foo\" ] # TODO",
|
ASSERT_TRACE2("concatMap (x: 1) [ \"foo\" ] # TODO",
|
||||||
TypeError,
|
TypeError,
|
||||||
hintfmt("value is %s while a list was expected", "an integer"),
|
hintfmt("value is %s while a list was expected", "an integer"),
|
||||||
hintfmt("while evaluating the return value of the function passed to buitlins.concatMap"));
|
hintfmt("while evaluating the return value of the function passed to builtins.concatMap"));
|
||||||
|
|
||||||
ASSERT_TRACE2("concatMap (x: \"foo\") [ 1 2 ] # TODO",
|
ASSERT_TRACE2("concatMap (x: \"foo\") [ 1 2 ] # TODO",
|
||||||
TypeError,
|
TypeError,
|
||||||
hintfmt("value is %s while a list was expected", "a string"),
|
hintfmt("value is %s while a list was expected", "a string"),
|
||||||
hintfmt("while evaluating the return value of the function passed to buitlins.concatMap"));
|
hintfmt("while evaluating the return value of the function passed to builtins.concatMap"));
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,11 @@ libexpr-tests_NAME := libnixexpr-tests
|
||||||
|
|
||||||
libexpr-tests_DIR := $(d)
|
libexpr-tests_DIR := $(d)
|
||||||
|
|
||||||
libexpr-tests_INSTALL_DIR :=
|
ifeq ($(INSTALL_UNIT_TESTS), yes)
|
||||||
|
libexpr-tests_INSTALL_DIR := $(checkbindir)
|
||||||
|
else
|
||||||
|
libexpr-tests_INSTALL_DIR :=
|
||||||
|
endif
|
||||||
|
|
||||||
libexpr-tests_SOURCES := \
|
libexpr-tests_SOURCES := \
|
||||||
$(wildcard $(d)/*.cc) \
|
$(wildcard $(d)/*.cc) \
|
||||||
|
|
|
@ -114,7 +114,8 @@ TEST_F(ValuePrintingTests, vLambda)
|
||||||
TEST_F(ValuePrintingTests, vPrimOp)
|
TEST_F(ValuePrintingTests, vPrimOp)
|
||||||
{
|
{
|
||||||
Value vPrimOp;
|
Value vPrimOp;
|
||||||
vPrimOp.mkPrimOp(nullptr);
|
PrimOp primOp{};
|
||||||
|
vPrimOp.mkPrimOp(&primOp);
|
||||||
|
|
||||||
test(vPrimOp, "<PRIMOP>");
|
test(vPrimOp, "<PRIMOP>");
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
|
|
||||||
#include <cassert>
|
#include <cassert>
|
||||||
#include <climits>
|
#include <climits>
|
||||||
|
#include <span>
|
||||||
|
|
||||||
#include "symbol-table.hh"
|
#include "symbol-table.hh"
|
||||||
#include "value/context.hh"
|
#include "value/context.hh"
|
||||||
|
@ -158,18 +159,13 @@ public:
|
||||||
inline bool isPrimOp() const { return internalType == tPrimOp; };
|
inline bool isPrimOp() const { return internalType == tPrimOp; };
|
||||||
inline bool isPrimOpApp() const { return internalType == tPrimOpApp; };
|
inline bool isPrimOpApp() const { return internalType == tPrimOpApp; };
|
||||||
|
|
||||||
union
|
|
||||||
{
|
|
||||||
NixInt integer;
|
|
||||||
bool boolean;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Strings in the evaluator carry a so-called `context` which
|
* Strings in the evaluator carry a so-called `context` which
|
||||||
* is a list of strings representing store paths. This is to
|
* is a list of strings representing store paths. This is to
|
||||||
* allow users to write things like
|
* allow users to write things like
|
||||||
|
*
|
||||||
* "--with-freetype2-library=" + freetype + "/lib"
|
* "--with-freetype2-library=" + freetype + "/lib"
|
||||||
|
*
|
||||||
* where `freetype` is a derivation (or a source to be copied
|
* where `freetype` is a derivation (or a source to be copied
|
||||||
* to the store). If we just concatenated the strings without
|
* to the store). If we just concatenated the strings without
|
||||||
* keeping track of the referenced store paths, then if the
|
* keeping track of the referenced store paths, then if the
|
||||||
|
@ -185,15 +181,38 @@ public:
|
||||||
|
|
||||||
* For canonicity, the store paths should be in sorted order.
|
* For canonicity, the store paths should be in sorted order.
|
||||||
*/
|
*/
|
||||||
struct {
|
struct StringWithContext {
|
||||||
const char * c_str;
|
const char * c_str;
|
||||||
const char * * context; // must be in sorted order
|
const char * * context; // must be in sorted order
|
||||||
} string;
|
};
|
||||||
|
|
||||||
struct {
|
struct Path {
|
||||||
InputAccessor * accessor;
|
InputAccessor * accessor;
|
||||||
const char * path;
|
const char * path;
|
||||||
} _path;
|
};
|
||||||
|
|
||||||
|
struct ClosureThunk {
|
||||||
|
Env * env;
|
||||||
|
Expr * expr;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct FunctionApplicationThunk {
|
||||||
|
Value * left, * right;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct Lambda {
|
||||||
|
Env * env;
|
||||||
|
ExprLambda * fun;
|
||||||
|
};
|
||||||
|
|
||||||
|
union
|
||||||
|
{
|
||||||
|
NixInt integer;
|
||||||
|
bool boolean;
|
||||||
|
|
||||||
|
StringWithContext string;
|
||||||
|
|
||||||
|
Path _path;
|
||||||
|
|
||||||
Bindings * attrs;
|
Bindings * attrs;
|
||||||
struct {
|
struct {
|
||||||
|
@ -201,21 +220,11 @@ public:
|
||||||
Value * * elems;
|
Value * * elems;
|
||||||
} bigList;
|
} bigList;
|
||||||
Value * smallList[2];
|
Value * smallList[2];
|
||||||
struct {
|
ClosureThunk thunk;
|
||||||
Env * env;
|
FunctionApplicationThunk app;
|
||||||
Expr * expr;
|
Lambda lambda;
|
||||||
} thunk;
|
|
||||||
struct {
|
|
||||||
Value * left, * right;
|
|
||||||
} app;
|
|
||||||
struct {
|
|
||||||
Env * env;
|
|
||||||
ExprLambda * fun;
|
|
||||||
} lambda;
|
|
||||||
PrimOp * primOp;
|
PrimOp * primOp;
|
||||||
struct {
|
FunctionApplicationThunk primOpApp;
|
||||||
Value * left, * right;
|
|
||||||
} primOpApp;
|
|
||||||
ExternalValueBase * external;
|
ExternalValueBase * external;
|
||||||
NixFloat fpoint;
|
NixFloat fpoint;
|
||||||
};
|
};
|
||||||
|
@ -354,13 +363,7 @@ public:
|
||||||
// Value will be overridden anyways
|
// Value will be overridden anyways
|
||||||
}
|
}
|
||||||
|
|
||||||
inline void mkPrimOp(PrimOp * p)
|
void mkPrimOp(PrimOp * p);
|
||||||
{
|
|
||||||
clearValue();
|
|
||||||
internalType = tPrimOp;
|
|
||||||
primOp = p;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
inline void mkPrimOpApp(Value * l, Value * r)
|
inline void mkPrimOpApp(Value * l, Value * r)
|
||||||
{
|
{
|
||||||
|
@ -393,7 +396,13 @@ public:
|
||||||
return internalType == tList1 || internalType == tList2 ? smallList : bigList.elems;
|
return internalType == tList1 || internalType == tList2 ? smallList : bigList.elems;
|
||||||
}
|
}
|
||||||
|
|
||||||
const Value * const * listElems() const
|
std::span<Value * const> listItems() const
|
||||||
|
{
|
||||||
|
assert(isList());
|
||||||
|
return std::span<Value * const>(listElems(), listSize());
|
||||||
|
}
|
||||||
|
|
||||||
|
Value * const * listElems() const
|
||||||
{
|
{
|
||||||
return internalType == tList1 || internalType == tList2 ? smallList : bigList.elems;
|
return internalType == tList1 || internalType == tList2 ? smallList : bigList.elems;
|
||||||
}
|
}
|
||||||
|
@ -412,34 +421,6 @@ public:
|
||||||
*/
|
*/
|
||||||
bool isTrivial() const;
|
bool isTrivial() const;
|
||||||
|
|
||||||
auto listItems()
|
|
||||||
{
|
|
||||||
struct ListIterable
|
|
||||||
{
|
|
||||||
typedef Value * const * iterator;
|
|
||||||
iterator _begin, _end;
|
|
||||||
iterator begin() const { return _begin; }
|
|
||||||
iterator end() const { return _end; }
|
|
||||||
};
|
|
||||||
assert(isList());
|
|
||||||
auto begin = listElems();
|
|
||||||
return ListIterable { begin, begin + listSize() };
|
|
||||||
}
|
|
||||||
|
|
||||||
auto listItems() const
|
|
||||||
{
|
|
||||||
struct ConstListIterable
|
|
||||||
{
|
|
||||||
typedef const Value * const * iterator;
|
|
||||||
iterator _begin, _end;
|
|
||||||
iterator begin() const { return _begin; }
|
|
||||||
iterator end() const { return _end; }
|
|
||||||
};
|
|
||||||
assert(isList());
|
|
||||||
auto begin = listElems();
|
|
||||||
return ConstListIterable { begin, begin + listSize() };
|
|
||||||
}
|
|
||||||
|
|
||||||
SourcePath path() const
|
SourcePath path() const
|
||||||
{
|
{
|
||||||
assert(internalType == tPath);
|
assert(internalType == tPath);
|
||||||
|
|
|
@ -1317,9 +1317,26 @@ void DerivationGoal::handleChildOutput(int fd, std::string_view data)
|
||||||
auto s = handleJSONLogMessage(*json, worker.act, hook->activities, true);
|
auto s = handleJSONLogMessage(*json, worker.act, hook->activities, true);
|
||||||
// ensure that logs from a builder using `ssh-ng://` as protocol
|
// ensure that logs from a builder using `ssh-ng://` as protocol
|
||||||
// are also available to `nix log`.
|
// are also available to `nix log`.
|
||||||
if (s && !isWrittenToLog && logSink && (*json)["type"] == resBuildLogLine) {
|
if (s && !isWrittenToLog && logSink) {
|
||||||
auto f = (*json)["fields"];
|
const auto type = (*json)["type"];
|
||||||
(*logSink)((f.size() > 0 ? f.at(0).get<std::string>() : "") + "\n");
|
const auto fields = (*json)["fields"];
|
||||||
|
if (type == resBuildLogLine) {
|
||||||
|
(*logSink)((fields.size() > 0 ? fields[0].get<std::string>() : "") + "\n");
|
||||||
|
} else if (type == resSetPhase && ! fields.is_null()) {
|
||||||
|
const auto phase = fields[0];
|
||||||
|
if (! phase.is_null()) {
|
||||||
|
// nixpkgs' stdenv produces lines in the log to signal
|
||||||
|
// phase changes.
|
||||||
|
// We want to get the same lines in case of remote builds.
|
||||||
|
// The format is:
|
||||||
|
// @nix { "action": "setPhase", "phase": "$curPhase" }
|
||||||
|
const auto logLine = nlohmann::json::object({
|
||||||
|
{"action", "setPhase"},
|
||||||
|
{"phase", phase}
|
||||||
|
});
|
||||||
|
(*logSink)("@nix " + logLine.dump(-1, ' ', false, nlohmann::json::error_handler_t::replace) + "\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
currentHookLine.clear();
|
currentHookLine.clear();
|
||||||
|
@ -1474,6 +1491,7 @@ void DerivationGoal::done(
|
||||||
SingleDrvOutputs builtOutputs,
|
SingleDrvOutputs builtOutputs,
|
||||||
std::optional<Error> ex)
|
std::optional<Error> ex)
|
||||||
{
|
{
|
||||||
|
outputLocks.unlock();
|
||||||
buildResult.status = status;
|
buildResult.status = status;
|
||||||
if (ex)
|
if (ex)
|
||||||
buildResult.errorMsg = fmt("%s", normaltxt(ex->info().msg));
|
buildResult.errorMsg = fmt("%s", normaltxt(ex->info().msg));
|
||||||
|
|
|
@ -652,8 +652,8 @@ void LocalDerivationGoal::startBuilder()
|
||||||
#if __linux__
|
#if __linux__
|
||||||
/* Create a temporary directory in which we set up the chroot
|
/* Create a temporary directory in which we set up the chroot
|
||||||
environment using bind-mounts. We put it in the Nix store
|
environment using bind-mounts. We put it in the Nix store
|
||||||
to ensure that we can create hard-links to non-directory
|
so that the build outputs can be moved efficiently from the
|
||||||
inputs in the fake Nix store in the chroot (see below). */
|
chroot to their final location. */
|
||||||
chrootRootDir = worker.store.Store::toRealPath(drvPath) + ".chroot";
|
chrootRootDir = worker.store.Store::toRealPath(drvPath) + ".chroot";
|
||||||
deletePath(chrootRootDir);
|
deletePath(chrootRootDir);
|
||||||
|
|
||||||
|
|
|
@ -151,11 +151,10 @@ StorePath writeDerivation(Store & store,
|
||||||
/* Read string `s' from stream `str'. */
|
/* Read string `s' from stream `str'. */
|
||||||
static void expect(std::istream & str, std::string_view s)
|
static void expect(std::istream & str, std::string_view s)
|
||||||
{
|
{
|
||||||
char s2[s.size()];
|
for (auto & c : s) {
|
||||||
str.read(s2, s.size());
|
if (str.get() != c)
|
||||||
std::string_view s2View { s2, s.size() };
|
throw FormatError("expected string '%1%'", s);
|
||||||
if (s2View != s)
|
}
|
||||||
throw FormatError("expected string '%s', got '%s'", s, s2View);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -330,9 +330,7 @@ typedef std::unordered_map<Path, std::unordered_set<std::string>> UncheckedRoots
|
||||||
|
|
||||||
static void readProcLink(const std::string & file, UncheckedRoots & roots)
|
static void readProcLink(const std::string & file, UncheckedRoots & roots)
|
||||||
{
|
{
|
||||||
/* 64 is the starting buffer size gnu readlink uses... */
|
constexpr auto bufsiz = PATH_MAX;
|
||||||
auto bufsiz = ssize_t{64};
|
|
||||||
try_again:
|
|
||||||
char buf[bufsiz];
|
char buf[bufsiz];
|
||||||
auto res = readlink(file.c_str(), buf, bufsiz);
|
auto res = readlink(file.c_str(), buf, bufsiz);
|
||||||
if (res == -1) {
|
if (res == -1) {
|
||||||
|
@ -341,10 +339,7 @@ try_again:
|
||||||
throw SysError("reading symlink");
|
throw SysError("reading symlink");
|
||||||
}
|
}
|
||||||
if (res == bufsiz) {
|
if (res == bufsiz) {
|
||||||
if (SSIZE_MAX / 2 < bufsiz)
|
throw Error("overly long symlink starting with '%1%'", std::string_view(buf, bufsiz));
|
||||||
throw Error("stupidly long symlink");
|
|
||||||
bufsiz *= 2;
|
|
||||||
goto try_again;
|
|
||||||
}
|
}
|
||||||
if (res > 0 && buf[0] == '/')
|
if (res > 0 && buf[0] == '/')
|
||||||
roots[std::string(static_cast<char *>(buf), res)]
|
roots[std::string(static_cast<char *>(buf), res)]
|
||||||
|
|
|
@ -1084,6 +1084,16 @@ public:
|
||||||
true, // document default
|
true, // document default
|
||||||
Xp::ConfigurableImpureEnv
|
Xp::ConfigurableImpureEnv
|
||||||
};
|
};
|
||||||
|
|
||||||
|
Setting<std::string> upgradeNixStorePathUrl{
|
||||||
|
this,
|
||||||
|
"https://github.com/NixOS/nixpkgs/raw/master/nixos/modules/installer/tools/nix-fallback-paths.nix",
|
||||||
|
"upgrade-nix-store-path-url",
|
||||||
|
R"(
|
||||||
|
Used by `nix upgrade-nix`, the URL of the file that contains the
|
||||||
|
store paths of the latest Nix release.
|
||||||
|
)"
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,11 @@ libstore-tests-exe_NAME = libnixstore-tests
|
||||||
|
|
||||||
libstore-tests-exe_DIR := $(d)
|
libstore-tests-exe_DIR := $(d)
|
||||||
|
|
||||||
libstore-tests-exe_INSTALL_DIR :=
|
ifeq ($(INSTALL_UNIT_TESTS), yes)
|
||||||
|
libstore-tests-exe_INSTALL_DIR := $(checkbindir)
|
||||||
|
else
|
||||||
|
libstore-tests-exe_INSTALL_DIR :=
|
||||||
|
endif
|
||||||
|
|
||||||
libstore-tests-exe_LIBS = libstore-tests
|
libstore-tests-exe_LIBS = libstore-tests
|
||||||
|
|
||||||
|
@ -18,7 +22,11 @@ libstore-tests_NAME = libnixstore-tests
|
||||||
|
|
||||||
libstore-tests_DIR := $(d)
|
libstore-tests_DIR := $(d)
|
||||||
|
|
||||||
libstore-tests_INSTALL_DIR :=
|
ifeq ($(INSTALL_UNIT_TESTS), yes)
|
||||||
|
libstore-tests_INSTALL_DIR := $(checklibdir)
|
||||||
|
else
|
||||||
|
libstore-tests_INSTALL_DIR :=
|
||||||
|
endif
|
||||||
|
|
||||||
libstore-tests_SOURCES := $(wildcard $(d)/*.cc)
|
libstore-tests_SOURCES := $(wildcard $(d)/*.cc)
|
||||||
|
|
||||||
|
|
|
@ -97,6 +97,8 @@ struct Parser {
|
||||||
virtual void operator()(std::shared_ptr<Parser> & state, Strings & r) = 0;
|
virtual void operator()(std::shared_ptr<Parser> & state, Strings & r) = 0;
|
||||||
|
|
||||||
Parser(std::string_view s) : remaining(s) {};
|
Parser(std::string_view s) : remaining(s) {};
|
||||||
|
|
||||||
|
virtual ~Parser() { };
|
||||||
};
|
};
|
||||||
|
|
||||||
struct ParseQuoted : public Parser {
|
struct ParseQuoted : public Parser {
|
||||||
|
|
|
@ -96,6 +96,14 @@ constexpr std::array<ExperimentalFeatureDetails, numXpFeatures> xpFeatureDetails
|
||||||
[`nix`](@docroot@/command-ref/new-cli/nix.md) for details.
|
[`nix`](@docroot@/command-ref/new-cli/nix.md) for details.
|
||||||
)",
|
)",
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
.tag = Xp::GitHashing,
|
||||||
|
.name = "git-hashing",
|
||||||
|
.description = R"(
|
||||||
|
Allow creating (content-addressed) store objects which are hashed via Git's hashing algorithm.
|
||||||
|
These store objects will not be understandable by older versions of Nix.
|
||||||
|
)",
|
||||||
|
},
|
||||||
{
|
{
|
||||||
.tag = Xp::RecursiveNix,
|
.tag = Xp::RecursiveNix,
|
||||||
.name = "recursive-nix",
|
.name = "recursive-nix",
|
||||||
|
|
|
@ -22,6 +22,7 @@ enum struct ExperimentalFeature
|
||||||
Flakes,
|
Flakes,
|
||||||
FetchTree,
|
FetchTree,
|
||||||
NixCommand,
|
NixCommand,
|
||||||
|
GitHashing,
|
||||||
RecursiveNix,
|
RecursiveNix,
|
||||||
NoUrlLiterals,
|
NoUrlLiterals,
|
||||||
FetchClosure,
|
FetchClosure,
|
||||||
|
|
|
@ -1,9 +1,263 @@
|
||||||
#include "git.hh"
|
#include <cerrno>
|
||||||
|
#include <algorithm>
|
||||||
|
#include <vector>
|
||||||
|
#include <map>
|
||||||
#include <regex>
|
#include <regex>
|
||||||
|
#include <strings.h> // for strcasecmp
|
||||||
|
|
||||||
|
#include "signals.hh"
|
||||||
|
#include "config.hh"
|
||||||
|
#include "hash.hh"
|
||||||
|
#include "posix-source-accessor.hh"
|
||||||
|
|
||||||
|
#include "git.hh"
|
||||||
|
#include "serialise.hh"
|
||||||
|
|
||||||
|
namespace nix::git {
|
||||||
|
|
||||||
|
using namespace nix;
|
||||||
|
using namespace std::string_literals;
|
||||||
|
|
||||||
|
std::optional<Mode> decodeMode(RawMode m) {
|
||||||
|
switch (m) {
|
||||||
|
case (RawMode) Mode::Directory:
|
||||||
|
case (RawMode) Mode::Executable:
|
||||||
|
case (RawMode) Mode::Regular:
|
||||||
|
case (RawMode) Mode::Symlink:
|
||||||
|
return (Mode) m;
|
||||||
|
default:
|
||||||
|
return std::nullopt;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
static std::string getStringUntil(Source & source, char byte)
|
||||||
|
{
|
||||||
|
std::string s;
|
||||||
|
char n[1];
|
||||||
|
source(std::string_view { n, 1 });
|
||||||
|
while (*n != byte) {
|
||||||
|
s += *n;
|
||||||
|
source(std::string_view { n, 1 });
|
||||||
|
}
|
||||||
|
return s;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
static std::string getString(Source & source, int n)
|
||||||
|
{
|
||||||
|
std::string v;
|
||||||
|
v.resize(n);
|
||||||
|
source(v);
|
||||||
|
return v;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void parse(
|
||||||
|
ParseSink & sink,
|
||||||
|
const Path & sinkPath,
|
||||||
|
Source & source,
|
||||||
|
std::function<SinkHook> hook,
|
||||||
|
const ExperimentalFeatureSettings & xpSettings)
|
||||||
|
{
|
||||||
|
xpSettings.require(Xp::GitHashing);
|
||||||
|
|
||||||
|
auto type = getString(source, 5);
|
||||||
|
|
||||||
|
if (type == "blob ") {
|
||||||
|
sink.createRegularFile(sinkPath);
|
||||||
|
|
||||||
|
unsigned long long size = std::stoi(getStringUntil(source, 0));
|
||||||
|
|
||||||
|
sink.preallocateContents(size);
|
||||||
|
|
||||||
|
unsigned long long left = size;
|
||||||
|
std::string buf;
|
||||||
|
buf.reserve(65536);
|
||||||
|
|
||||||
|
while (left) {
|
||||||
|
checkInterrupt();
|
||||||
|
buf.resize(std::min((unsigned long long)buf.capacity(), left));
|
||||||
|
source(buf);
|
||||||
|
sink.receiveContents(buf);
|
||||||
|
left -= buf.size();
|
||||||
|
}
|
||||||
|
} else if (type == "tree ") {
|
||||||
|
unsigned long long size = std::stoi(getStringUntil(source, 0));
|
||||||
|
unsigned long long left = size;
|
||||||
|
|
||||||
|
sink.createDirectory(sinkPath);
|
||||||
|
|
||||||
|
while (left) {
|
||||||
|
std::string perms = getStringUntil(source, ' ');
|
||||||
|
left -= perms.size();
|
||||||
|
left -= 1;
|
||||||
|
|
||||||
|
RawMode rawMode = std::stoi(perms, 0, 8);
|
||||||
|
auto modeOpt = decodeMode(rawMode);
|
||||||
|
if (!modeOpt)
|
||||||
|
throw Error("Unknown Git permission: %o", perms);
|
||||||
|
auto mode = std::move(*modeOpt);
|
||||||
|
|
||||||
|
std::string name = getStringUntil(source, '\0');
|
||||||
|
left -= name.size();
|
||||||
|
left -= 1;
|
||||||
|
|
||||||
|
std::string hashs = getString(source, 20);
|
||||||
|
left -= 20;
|
||||||
|
|
||||||
|
Hash hash(htSHA1);
|
||||||
|
std::copy(hashs.begin(), hashs.end(), hash.hash);
|
||||||
|
|
||||||
|
hook(name, TreeEntry {
|
||||||
|
.mode = mode,
|
||||||
|
.hash = hash,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (mode == Mode::Executable)
|
||||||
|
sink.isExecutable();
|
||||||
|
}
|
||||||
|
} else throw Error("input doesn't look like a Git object");
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
std::optional<Mode> convertMode(SourceAccessor::Type type)
|
||||||
|
{
|
||||||
|
switch (type) {
|
||||||
|
case SourceAccessor::tSymlink: return Mode::Symlink;
|
||||||
|
case SourceAccessor::tRegular: return Mode::Regular;
|
||||||
|
case SourceAccessor::tDirectory: return Mode::Directory;
|
||||||
|
case SourceAccessor::tMisc: return std::nullopt;
|
||||||
|
default: abort();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void restore(ParseSink & sink, Source & source, std::function<RestoreHook> hook)
|
||||||
|
{
|
||||||
|
parse(sink, "", source, [&](Path name, TreeEntry entry) {
|
||||||
|
auto [accessor, from] = hook(entry.hash);
|
||||||
|
auto stat = accessor->lstat(from);
|
||||||
|
auto gotOpt = convertMode(stat.type);
|
||||||
|
if (!gotOpt)
|
||||||
|
throw Error("file '%s' (git hash %s) has an unsupported type",
|
||||||
|
from,
|
||||||
|
entry.hash.to_string(HashFormat::Base16, false));
|
||||||
|
auto & got = *gotOpt;
|
||||||
|
if (got != entry.mode)
|
||||||
|
throw Error("git mode of file '%s' (git hash %s) is %o but expected %o",
|
||||||
|
from,
|
||||||
|
entry.hash.to_string(HashFormat::Base16, false),
|
||||||
|
(RawMode) got,
|
||||||
|
(RawMode) entry.mode);
|
||||||
|
copyRecursive(
|
||||||
|
*accessor, from,
|
||||||
|
sink, name);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void dumpBlobPrefix(
|
||||||
|
uint64_t size, Sink & sink,
|
||||||
|
const ExperimentalFeatureSettings & xpSettings)
|
||||||
|
{
|
||||||
|
xpSettings.require(Xp::GitHashing);
|
||||||
|
auto s = fmt("blob %d\0"s, std::to_string(size));
|
||||||
|
sink(s);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void dumpTree(const Tree & entries, Sink & sink,
|
||||||
|
const ExperimentalFeatureSettings & xpSettings)
|
||||||
|
{
|
||||||
|
xpSettings.require(Xp::GitHashing);
|
||||||
|
|
||||||
|
std::string v1;
|
||||||
|
|
||||||
|
for (auto & [name, entry] : entries) {
|
||||||
|
auto name2 = name;
|
||||||
|
if (entry.mode == Mode::Directory) {
|
||||||
|
assert(name2.back() == '/');
|
||||||
|
name2.pop_back();
|
||||||
|
}
|
||||||
|
v1 += fmt("%o %s\0"s, static_cast<RawMode>(entry.mode), name2);
|
||||||
|
std::copy(entry.hash.hash, entry.hash.hash + entry.hash.hashSize, std::back_inserter(v1));
|
||||||
|
}
|
||||||
|
|
||||||
|
{
|
||||||
|
auto s = fmt("tree %d\0"s, v1.size());
|
||||||
|
sink(s);
|
||||||
|
}
|
||||||
|
|
||||||
|
sink(v1);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
Mode dump(
|
||||||
|
SourceAccessor & accessor, const CanonPath & path,
|
||||||
|
Sink & sink,
|
||||||
|
std::function<DumpHook> hook,
|
||||||
|
PathFilter & filter,
|
||||||
|
const ExperimentalFeatureSettings & xpSettings)
|
||||||
|
{
|
||||||
|
auto st = accessor.lstat(path);
|
||||||
|
|
||||||
|
switch (st.type) {
|
||||||
|
case SourceAccessor::tRegular:
|
||||||
|
{
|
||||||
|
accessor.readFile(path, sink, [&](uint64_t size) {
|
||||||
|
dumpBlobPrefix(size, sink, xpSettings);
|
||||||
|
});
|
||||||
|
return st.isExecutable
|
||||||
|
? Mode::Executable
|
||||||
|
: Mode::Regular;
|
||||||
|
}
|
||||||
|
|
||||||
|
case SourceAccessor::tDirectory:
|
||||||
|
{
|
||||||
|
Tree entries;
|
||||||
|
for (auto & [name, _] : accessor.readDirectory(path)) {
|
||||||
|
auto child = path + name;
|
||||||
|
if (!filter(child.abs())) continue;
|
||||||
|
|
||||||
|
auto entry = hook(child);
|
||||||
|
|
||||||
|
auto name2 = name;
|
||||||
|
if (entry.mode == Mode::Directory)
|
||||||
|
name2 += "/";
|
||||||
|
|
||||||
|
entries.insert_or_assign(std::move(name2), std::move(entry));
|
||||||
|
}
|
||||||
|
dumpTree(entries, sink, xpSettings);
|
||||||
|
return Mode::Directory;
|
||||||
|
}
|
||||||
|
|
||||||
|
case SourceAccessor::tSymlink:
|
||||||
|
case SourceAccessor::tMisc:
|
||||||
|
default:
|
||||||
|
throw Error("file '%1%' has an unsupported type", path);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
TreeEntry dumpHash(
|
||||||
|
HashType ht,
|
||||||
|
SourceAccessor & accessor, const CanonPath & path, PathFilter & filter)
|
||||||
|
{
|
||||||
|
std::function<DumpHook> hook;
|
||||||
|
hook = [&](const CanonPath & path) -> TreeEntry {
|
||||||
|
auto hashSink = HashSink(ht);
|
||||||
|
auto mode = dump(accessor, path, hashSink, hook, filter);
|
||||||
|
auto hash = hashSink.finish().first;
|
||||||
|
return {
|
||||||
|
.mode = mode,
|
||||||
|
.hash = hash,
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
return hook(path);
|
||||||
|
}
|
||||||
|
|
||||||
namespace nix {
|
|
||||||
namespace git {
|
|
||||||
|
|
||||||
std::optional<LsRemoteRefLine> parseLsRemoteLine(std::string_view line)
|
std::optional<LsRemoteRefLine> parseLsRemoteLine(std::string_view line)
|
||||||
{
|
{
|
||||||
|
@ -22,4 +276,3 @@ std::optional<LsRemoteRefLine> parseLsRemoteLine(std::string_view line)
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
|
@ -5,9 +5,127 @@
|
||||||
#include <string_view>
|
#include <string_view>
|
||||||
#include <optional>
|
#include <optional>
|
||||||
|
|
||||||
namespace nix {
|
#include "types.hh"
|
||||||
|
#include "serialise.hh"
|
||||||
|
#include "hash.hh"
|
||||||
|
#include "source-accessor.hh"
|
||||||
|
#include "fs-sink.hh"
|
||||||
|
|
||||||
namespace git {
|
namespace nix::git {
|
||||||
|
|
||||||
|
using RawMode = uint32_t;
|
||||||
|
|
||||||
|
enum struct Mode : RawMode {
|
||||||
|
Directory = 0040000,
|
||||||
|
Executable = 0100755,
|
||||||
|
Regular = 0100644,
|
||||||
|
Symlink = 0120000,
|
||||||
|
};
|
||||||
|
|
||||||
|
std::optional<Mode> decodeMode(RawMode m);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* An anonymous Git tree object entry (no name part).
|
||||||
|
*/
|
||||||
|
struct TreeEntry
|
||||||
|
{
|
||||||
|
Mode mode;
|
||||||
|
Hash hash;
|
||||||
|
|
||||||
|
GENERATE_CMP(TreeEntry, me->mode, me->hash);
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A Git tree object, fully decoded and stored in memory.
|
||||||
|
*
|
||||||
|
* Directory names must end in a `/` for sake of sorting. See
|
||||||
|
* https://github.com/mirage/irmin/issues/352
|
||||||
|
*/
|
||||||
|
using Tree = std::map<std::string, TreeEntry>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Callback for processing a child hash with `parse`
|
||||||
|
*
|
||||||
|
* The function should
|
||||||
|
*
|
||||||
|
* 1. Obtain the file system objects denoted by `gitHash`
|
||||||
|
*
|
||||||
|
* 2. Ensure they match `mode`
|
||||||
|
*
|
||||||
|
* 3. Feed them into the same sink `parse` was called with
|
||||||
|
*
|
||||||
|
* Implementations may seek to memoize resources (bandwidth, storage,
|
||||||
|
* etc.) for the same Git hash.
|
||||||
|
*/
|
||||||
|
using SinkHook = void(const Path & name, TreeEntry entry);
|
||||||
|
|
||||||
|
void parse(
|
||||||
|
ParseSink & sink, const Path & sinkPath,
|
||||||
|
Source & source,
|
||||||
|
std::function<SinkHook> hook,
|
||||||
|
const ExperimentalFeatureSettings & xpSettings = experimentalFeatureSettings);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Assists with writing a `SinkHook` step (2).
|
||||||
|
*/
|
||||||
|
std::optional<Mode> convertMode(SourceAccessor::Type type);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Simplified version of `SinkHook` for `restore`.
|
||||||
|
*
|
||||||
|
* Given a `Hash`, return a `SourceAccessor` and `CanonPath` pointing to
|
||||||
|
* the file system object with that path.
|
||||||
|
*/
|
||||||
|
using RestoreHook = std::pair<SourceAccessor *, CanonPath>(Hash);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Wrapper around `parse` and `RestoreSink`
|
||||||
|
*/
|
||||||
|
void restore(ParseSink & sink, Source & source, std::function<RestoreHook> hook);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Dumps a single file to a sink
|
||||||
|
*
|
||||||
|
* @param xpSettings for testing purposes
|
||||||
|
*/
|
||||||
|
void dumpBlobPrefix(
|
||||||
|
uint64_t size, Sink & sink,
|
||||||
|
const ExperimentalFeatureSettings & xpSettings = experimentalFeatureSettings);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Dumps a representation of a git tree to a sink
|
||||||
|
*/
|
||||||
|
void dumpTree(
|
||||||
|
const Tree & entries, Sink & sink,
|
||||||
|
const ExperimentalFeatureSettings & xpSettings = experimentalFeatureSettings);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Callback for processing a child with `dump`
|
||||||
|
*
|
||||||
|
* The function should return the Git hash and mode of the file at the
|
||||||
|
* given path in the accessor passed to `dump`.
|
||||||
|
*
|
||||||
|
* Note that if the child is a directory, its child in must also be so
|
||||||
|
* processed in order to compute this information.
|
||||||
|
*/
|
||||||
|
using DumpHook = TreeEntry(const CanonPath & path);
|
||||||
|
|
||||||
|
Mode dump(
|
||||||
|
SourceAccessor & accessor, const CanonPath & path,
|
||||||
|
Sink & sink,
|
||||||
|
std::function<DumpHook> hook,
|
||||||
|
PathFilter & filter = defaultPathFilter,
|
||||||
|
const ExperimentalFeatureSettings & xpSettings = experimentalFeatureSettings);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Recursively dumps path, hashing as we go.
|
||||||
|
*
|
||||||
|
* A smaller wrapper around `dump`.
|
||||||
|
*/
|
||||||
|
TreeEntry dumpHash(
|
||||||
|
HashType ht,
|
||||||
|
SourceAccessor & accessor, const CanonPath & path,
|
||||||
|
PathFilter & filter = defaultPathFilter);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A line from the output of `git ls-remote --symref`.
|
* A line from the output of `git ls-remote --symref`.
|
||||||
|
@ -16,14 +134,16 @@ namespace git {
|
||||||
*
|
*
|
||||||
* - Symbolic references of the form
|
* - Symbolic references of the form
|
||||||
*
|
*
|
||||||
|
* ```
|
||||||
* ref: {target} {reference}
|
* ref: {target} {reference}
|
||||||
*
|
* ```
|
||||||
* where {target} is itself a reference and {reference} is optional
|
* where {target} is itself a reference and {reference} is optional
|
||||||
*
|
*
|
||||||
* - Object references of the form
|
* - Object references of the form
|
||||||
*
|
*
|
||||||
|
* ```
|
||||||
* {target} {reference}
|
* {target} {reference}
|
||||||
*
|
* ```
|
||||||
* where {target} is a commit id and {reference} is mandatory
|
* where {target} is a commit id and {reference} is mandatory
|
||||||
*/
|
*/
|
||||||
struct LsRemoteRefLine {
|
struct LsRemoteRefLine {
|
||||||
|
@ -36,8 +156,9 @@ struct LsRemoteRefLine {
|
||||||
std::optional<std::string> reference;
|
std::optional<std::string> reference;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Parse an `LsRemoteRefLine`
|
||||||
|
*/
|
||||||
std::optional<LsRemoteRefLine> parseLsRemoteLine(std::string_view line);
|
std::optional<LsRemoteRefLine> parseLsRemoteLine(std::string_view line);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
|
||||||
|
|
|
@ -121,4 +121,60 @@ CanonPath MemorySourceAccessor::addFile(CanonPath path, std::string && contents)
|
||||||
return path;
|
return path;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
using File = MemorySourceAccessor::File;
|
||||||
|
|
||||||
|
void MemorySink::createDirectory(const Path & path)
|
||||||
|
{
|
||||||
|
auto * f = dst.open(CanonPath{path}, File { File::Directory { } });
|
||||||
|
if (!f)
|
||||||
|
throw Error("file '%s' cannot be made because some parent file is not a directory", path);
|
||||||
|
|
||||||
|
if (!std::holds_alternative<File::Directory>(f->raw))
|
||||||
|
throw Error("file '%s' is not a directory", path);
|
||||||
|
};
|
||||||
|
|
||||||
|
void MemorySink::createRegularFile(const Path & path)
|
||||||
|
{
|
||||||
|
auto * f = dst.open(CanonPath{path}, File { File::Regular {} });
|
||||||
|
if (!f)
|
||||||
|
throw Error("file '%s' cannot be made because some parent file is not a directory", path);
|
||||||
|
if (!(r = std::get_if<File::Regular>(&f->raw)))
|
||||||
|
throw Error("file '%s' is not a regular file", path);
|
||||||
|
}
|
||||||
|
|
||||||
|
void MemorySink::closeRegularFile()
|
||||||
|
{
|
||||||
|
r = nullptr;
|
||||||
|
}
|
||||||
|
|
||||||
|
void MemorySink::isExecutable()
|
||||||
|
{
|
||||||
|
assert(r);
|
||||||
|
r->executable = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
void MemorySink::preallocateContents(uint64_t len)
|
||||||
|
{
|
||||||
|
assert(r);
|
||||||
|
r->contents.reserve(len);
|
||||||
|
}
|
||||||
|
|
||||||
|
void MemorySink::receiveContents(std::string_view data)
|
||||||
|
{
|
||||||
|
assert(r);
|
||||||
|
r->contents += data;
|
||||||
|
}
|
||||||
|
|
||||||
|
void MemorySink::createSymlink(const Path & path, const std::string & target)
|
||||||
|
{
|
||||||
|
auto * f = dst.open(CanonPath{path}, File { File::Symlink { } });
|
||||||
|
if (!f)
|
||||||
|
throw Error("file '%s' cannot be made because some parent file is not a directory", path);
|
||||||
|
if (auto * s = std::get_if<File::Symlink>(&f->raw))
|
||||||
|
s->target = target;
|
||||||
|
else
|
||||||
|
throw Error("file '%s' is not a symbolic link", path);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
#include "source-accessor.hh"
|
#include "source-accessor.hh"
|
||||||
|
#include "fs-sink.hh"
|
||||||
#include "variant-wrapper.hh"
|
#include "variant-wrapper.hh"
|
||||||
|
|
||||||
namespace nix {
|
namespace nix {
|
||||||
|
@ -71,4 +72,28 @@ struct MemorySourceAccessor : virtual SourceAccessor
|
||||||
CanonPath addFile(CanonPath path, std::string && contents);
|
CanonPath addFile(CanonPath path, std::string && contents);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Write to a `MemorySourceAccessor` at the given path
|
||||||
|
*/
|
||||||
|
struct MemorySink : ParseSink
|
||||||
|
{
|
||||||
|
MemorySourceAccessor & dst;
|
||||||
|
|
||||||
|
MemorySink(MemorySourceAccessor & dst) : dst(dst) { }
|
||||||
|
|
||||||
|
void createDirectory(const Path & path) override;
|
||||||
|
|
||||||
|
void createRegularFile(const Path & path) override;
|
||||||
|
void receiveContents(std::string_view data) override;
|
||||||
|
void isExecutable() override;
|
||||||
|
void closeRegularFile() override;
|
||||||
|
|
||||||
|
void createSymlink(const Path & path, const std::string & target) override;
|
||||||
|
|
||||||
|
void preallocateContents(uint64_t size) override;
|
||||||
|
|
||||||
|
private:
|
||||||
|
MemorySourceAccessor::File::Regular * r;
|
||||||
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -74,6 +74,10 @@ void Source::operator () (char * data, size_t len)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void Source::operator () (std::string_view data)
|
||||||
|
{
|
||||||
|
(*this)((char *)data.data(), data.size());
|
||||||
|
}
|
||||||
|
|
||||||
void Source::drainInto(Sink & sink)
|
void Source::drainInto(Sink & sink)
|
||||||
{
|
{
|
||||||
|
|
|
@ -73,6 +73,7 @@ struct Source
|
||||||
* an error if it is not going to be available.
|
* an error if it is not going to be available.
|
||||||
*/
|
*/
|
||||||
void operator () (char * data, size_t len);
|
void operator () (char * data, size_t len);
|
||||||
|
void operator () (std::string_view data);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Store up to ‘len’ in the buffer pointed to by ‘data’, and
|
* Store up to ‘len’ in the buffer pointed to by ‘data’, and
|
||||||
|
|
|
@ -1,33 +1,236 @@
|
||||||
#include "git.hh"
|
|
||||||
#include <gtest/gtest.h>
|
#include <gtest/gtest.h>
|
||||||
|
|
||||||
|
#include "git.hh"
|
||||||
|
#include "memory-source-accessor.hh"
|
||||||
|
|
||||||
|
#include "tests/characterization.hh"
|
||||||
|
|
||||||
namespace nix {
|
namespace nix {
|
||||||
|
|
||||||
TEST(GitLsRemote, parseSymrefLineWithReference) {
|
using namespace git;
|
||||||
auto line = "ref: refs/head/main HEAD";
|
|
||||||
auto res = git::parseLsRemoteLine(line);
|
class GitTest : public CharacterizationTest
|
||||||
ASSERT_TRUE(res.has_value());
|
{
|
||||||
ASSERT_EQ(res->kind, git::LsRemoteRefLine::Kind::Symbolic);
|
Path unitTestData = getUnitTestData() + "/libutil/git";
|
||||||
ASSERT_EQ(res->target, "refs/head/main");
|
|
||||||
ASSERT_EQ(res->reference, "HEAD");
|
public:
|
||||||
|
|
||||||
|
Path goldenMaster(std::string_view testStem) const override {
|
||||||
|
return unitTestData + "/" + testStem;
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(GitLsRemote, parseSymrefLineWithNoReference) {
|
/**
|
||||||
auto line = "ref: refs/head/main";
|
* We set these in tests rather than the regular globals so we don't have
|
||||||
auto res = git::parseLsRemoteLine(line);
|
* to worry about race conditions if the tests run concurrently.
|
||||||
ASSERT_TRUE(res.has_value());
|
*/
|
||||||
ASSERT_EQ(res->kind, git::LsRemoteRefLine::Kind::Symbolic);
|
ExperimentalFeatureSettings mockXpSettings;
|
||||||
ASSERT_EQ(res->target, "refs/head/main");
|
|
||||||
ASSERT_EQ(res->reference, std::nullopt);
|
|
||||||
}
|
|
||||||
|
|
||||||
TEST(GitLsRemote, parseObjectRefLine) {
|
private:
|
||||||
auto line = "abc123 refs/head/main";
|
|
||||||
auto res = git::parseLsRemoteLine(line);
|
void SetUp() override
|
||||||
ASSERT_TRUE(res.has_value());
|
{
|
||||||
ASSERT_EQ(res->kind, git::LsRemoteRefLine::Kind::Object);
|
mockXpSettings.set("experimental-features", "git-hashing");
|
||||||
ASSERT_EQ(res->target, "abc123");
|
|
||||||
ASSERT_EQ(res->reference, "refs/head/main");
|
|
||||||
}
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
TEST(GitMode, gitMode_directory) {
|
||||||
|
Mode m = Mode::Directory;
|
||||||
|
RawMode r = 0040000;
|
||||||
|
ASSERT_EQ(static_cast<RawMode>(m), r);
|
||||||
|
ASSERT_EQ(decodeMode(r), std::optional { m });
|
||||||
|
};
|
||||||
|
|
||||||
|
TEST(GitMode, gitMode_executable) {
|
||||||
|
Mode m = Mode::Executable;
|
||||||
|
RawMode r = 0100755;
|
||||||
|
ASSERT_EQ(static_cast<RawMode>(m), r);
|
||||||
|
ASSERT_EQ(decodeMode(r), std::optional { m });
|
||||||
|
};
|
||||||
|
|
||||||
|
TEST(GitMode, gitMode_regular) {
|
||||||
|
Mode m = Mode::Regular;
|
||||||
|
RawMode r = 0100644;
|
||||||
|
ASSERT_EQ(static_cast<RawMode>(m), r);
|
||||||
|
ASSERT_EQ(decodeMode(r), std::optional { m });
|
||||||
|
};
|
||||||
|
|
||||||
|
TEST(GitMode, gitMode_symlink) {
|
||||||
|
Mode m = Mode::Symlink;
|
||||||
|
RawMode r = 0120000;
|
||||||
|
ASSERT_EQ(static_cast<RawMode>(m), r);
|
||||||
|
ASSERT_EQ(decodeMode(r), std::optional { m });
|
||||||
|
};
|
||||||
|
|
||||||
|
TEST_F(GitTest, blob_read) {
|
||||||
|
readTest("hello-world-blob.bin", [&](const auto & encoded) {
|
||||||
|
StringSource in { encoded };
|
||||||
|
StringSink out;
|
||||||
|
RegularFileSink out2 { out };
|
||||||
|
parse(out2, "", in, [](auto &, auto) {}, mockXpSettings);
|
||||||
|
|
||||||
|
auto expected = readFile(goldenMaster("hello-world.bin"));
|
||||||
|
|
||||||
|
ASSERT_EQ(out.s, expected);
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TEST_F(GitTest, blob_write) {
|
||||||
|
writeTest("hello-world-blob.bin", [&]() {
|
||||||
|
auto decoded = readFile(goldenMaster("hello-world.bin"));
|
||||||
|
StringSink s;
|
||||||
|
dumpBlobPrefix(decoded.size(), s, mockXpSettings);
|
||||||
|
s(decoded);
|
||||||
|
return s.s;
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This data is for "shallow" tree tests. However, we use "real" hashes
|
||||||
|
* so that we can check our test data in the corresponding functional
|
||||||
|
* test (`git-hashing/unit-test-data`).
|
||||||
|
*/
|
||||||
|
const static Tree tree = {
|
||||||
|
{
|
||||||
|
"Foo",
|
||||||
|
{
|
||||||
|
.mode = Mode::Regular,
|
||||||
|
// hello world with special chars from above
|
||||||
|
.hash = Hash::parseAny("63ddb340119baf8492d2da53af47e8c7cfcd5eb2", htSHA1),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"bAr",
|
||||||
|
{
|
||||||
|
.mode = Mode::Executable,
|
||||||
|
// ditto
|
||||||
|
.hash = Hash::parseAny("63ddb340119baf8492d2da53af47e8c7cfcd5eb2", htSHA1),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"baZ/",
|
||||||
|
{
|
||||||
|
.mode = Mode::Directory,
|
||||||
|
// Empty directory hash
|
||||||
|
.hash = Hash::parseAny("4b825dc642cb6eb9a060e54bf8d69288fbee4904", htSHA1),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
TEST_F(GitTest, tree_read) {
|
||||||
|
readTest("tree.bin", [&](const auto & encoded) {
|
||||||
|
StringSource in { encoded };
|
||||||
|
NullParseSink out;
|
||||||
|
Tree got;
|
||||||
|
parse(out, "", in, [&](auto & name, auto entry) {
|
||||||
|
auto name2 = name;
|
||||||
|
if (entry.mode == Mode::Directory)
|
||||||
|
name2 += '/';
|
||||||
|
got.insert_or_assign(name2, std::move(entry));
|
||||||
|
}, mockXpSettings);
|
||||||
|
|
||||||
|
ASSERT_EQ(got, tree);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST_F(GitTest, tree_write) {
|
||||||
|
writeTest("tree.bin", [&]() {
|
||||||
|
StringSink s;
|
||||||
|
dumpTree(tree, s, mockXpSettings);
|
||||||
|
return s.s;
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST_F(GitTest, both_roundrip) {
|
||||||
|
using File = MemorySourceAccessor::File;
|
||||||
|
|
||||||
|
MemorySourceAccessor files;
|
||||||
|
files.root = File::Directory {
|
||||||
|
.contents {
|
||||||
|
{
|
||||||
|
"foo",
|
||||||
|
File::Regular {
|
||||||
|
.contents = "hello\n\0\n\tworld!",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"bar",
|
||||||
|
File::Directory {
|
||||||
|
.contents = {
|
||||||
|
{
|
||||||
|
"baz",
|
||||||
|
File::Regular {
|
||||||
|
.executable = true,
|
||||||
|
.contents = "good day,\n\0\n\tworld!",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
std::map<Hash, std::string> cas;
|
||||||
|
|
||||||
|
std::function<DumpHook> dumpHook;
|
||||||
|
dumpHook = [&](const CanonPath & path) {
|
||||||
|
StringSink s;
|
||||||
|
HashSink hashSink { htSHA1 };
|
||||||
|
TeeSink s2 { s, hashSink };
|
||||||
|
auto mode = dump(
|
||||||
|
files, path, s2, dumpHook,
|
||||||
|
defaultPathFilter, mockXpSettings);
|
||||||
|
auto hash = hashSink.finish().first;
|
||||||
|
cas.insert_or_assign(hash, std::move(s.s));
|
||||||
|
return TreeEntry {
|
||||||
|
.mode = mode,
|
||||||
|
.hash = hash,
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
auto root = dumpHook(CanonPath::root);
|
||||||
|
|
||||||
|
MemorySourceAccessor files2;
|
||||||
|
|
||||||
|
MemorySink sinkFiles2 { files2 };
|
||||||
|
|
||||||
|
std::function<void(const Path, const Hash &)> mkSinkHook;
|
||||||
|
mkSinkHook = [&](const Path prefix, const Hash & hash) {
|
||||||
|
StringSource in { cas[hash] };
|
||||||
|
parse(sinkFiles2, prefix, in, [&](const Path & name, const auto & entry) {
|
||||||
|
mkSinkHook(prefix + "/" + name, entry.hash);
|
||||||
|
}, mockXpSettings);
|
||||||
|
};
|
||||||
|
|
||||||
|
mkSinkHook("", root.hash);
|
||||||
|
|
||||||
|
ASSERT_EQ(files, files2);
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(GitLsRemote, parseSymrefLineWithReference) {
|
||||||
|
auto line = "ref: refs/head/main HEAD";
|
||||||
|
auto res = parseLsRemoteLine(line);
|
||||||
|
ASSERT_TRUE(res.has_value());
|
||||||
|
ASSERT_EQ(res->kind, LsRemoteRefLine::Kind::Symbolic);
|
||||||
|
ASSERT_EQ(res->target, "refs/head/main");
|
||||||
|
ASSERT_EQ(res->reference, "HEAD");
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(GitLsRemote, parseSymrefLineWithNoReference) {
|
||||||
|
auto line = "ref: refs/head/main";
|
||||||
|
auto res = parseLsRemoteLine(line);
|
||||||
|
ASSERT_TRUE(res.has_value());
|
||||||
|
ASSERT_EQ(res->kind, LsRemoteRefLine::Kind::Symbolic);
|
||||||
|
ASSERT_EQ(res->target, "refs/head/main");
|
||||||
|
ASSERT_EQ(res->reference, std::nullopt);
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(GitLsRemote, parseObjectRefLine) {
|
||||||
|
auto line = "abc123 refs/head/main";
|
||||||
|
auto res = parseLsRemoteLine(line);
|
||||||
|
ASSERT_TRUE(res.has_value());
|
||||||
|
ASSERT_EQ(res->kind, LsRemoteRefLine::Kind::Object);
|
||||||
|
ASSERT_EQ(res->target, "abc123");
|
||||||
|
ASSERT_EQ(res->reference, "refs/head/main");
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
|
@ -1,12 +1,16 @@
|
||||||
check: libutil-tests_RUN
|
check: libutil-tests-exe_RUN
|
||||||
|
|
||||||
programs += libutil-tests
|
programs += libutil-tests-exe
|
||||||
|
|
||||||
libutil-tests-exe_NAME = libnixutil-tests
|
libutil-tests-exe_NAME = libnixutil-tests
|
||||||
|
|
||||||
libutil-tests-exe_DIR := $(d)
|
libutil-tests-exe_DIR := $(d)
|
||||||
|
|
||||||
libutil-tests-exe_INSTALL_DIR :=
|
ifeq ($(INSTALL_UNIT_TESTS), yes)
|
||||||
|
libutil-tests-exe_INSTALL_DIR := $(checkbindir)
|
||||||
|
else
|
||||||
|
libutil-tests-exe_INSTALL_DIR :=
|
||||||
|
endif
|
||||||
|
|
||||||
libutil-tests-exe_LIBS = libutil-tests
|
libutil-tests-exe_LIBS = libutil-tests
|
||||||
|
|
||||||
|
@ -18,7 +22,11 @@ libutil-tests_NAME = libnixutil-tests
|
||||||
|
|
||||||
libutil-tests_DIR := $(d)
|
libutil-tests_DIR := $(d)
|
||||||
|
|
||||||
libutil-tests_INSTALL_DIR :=
|
ifeq ($(INSTALL_UNIT_TESTS), yes)
|
||||||
|
libutil-tests_INSTALL_DIR := $(checklibdir)
|
||||||
|
else
|
||||||
|
libutil-tests_INSTALL_DIR :=
|
||||||
|
endif
|
||||||
|
|
||||||
libutil-tests_SOURCES := $(wildcard $(d)/*.cc)
|
libutil-tests_SOURCES := $(wildcard $(d)/*.cc)
|
||||||
|
|
||||||
|
@ -27,3 +35,7 @@ libutil-tests_CXXFLAGS += -I src/libutil
|
||||||
libutil-tests_LIBS = libutil
|
libutil-tests_LIBS = libutil
|
||||||
|
|
||||||
libutil-tests_LDFLAGS := -lrapidcheck $(GTEST_LIBS)
|
libutil-tests_LDFLAGS := -lrapidcheck $(GTEST_LIBS)
|
||||||
|
|
||||||
|
check: unit-test-data/libutil/git/check-data.sh.test
|
||||||
|
|
||||||
|
$(eval $(call run-test,unit-test-data/libutil/git/check-data.sh))
|
||||||
|
|
|
@ -172,7 +172,7 @@ static void loadSourceExpr(EvalState & state, const SourcePath & path, Value & v
|
||||||
directory). */
|
directory). */
|
||||||
else if (st.type == InputAccessor::tDirectory) {
|
else if (st.type == InputAccessor::tDirectory) {
|
||||||
auto attrs = state.buildBindings(maxAttrs);
|
auto attrs = state.buildBindings(maxAttrs);
|
||||||
attrs.alloc("_combineChannels").mkList(0);
|
state.mkList(attrs.alloc("_combineChannels"), 0);
|
||||||
StringSet seen;
|
StringSet seen;
|
||||||
getAllExprs(state, path, seen, attrs);
|
getAllExprs(state, path, seen, attrs);
|
||||||
v.mkAttrs(attrs);
|
v.mkAttrs(attrs);
|
||||||
|
|
|
@ -1,28 +0,0 @@
|
||||||
R""(
|
|
||||||
|
|
||||||
# Description
|
|
||||||
|
|
||||||
Copy the regular file *path* to the Nix store, and print the resulting
|
|
||||||
store path on standard output.
|
|
||||||
|
|
||||||
> **Warning**
|
|
||||||
>
|
|
||||||
> The resulting store path is not registered as a garbage
|
|
||||||
> collector root, so it could be deleted before you have a
|
|
||||||
> chance to register it.
|
|
||||||
|
|
||||||
# Examples
|
|
||||||
|
|
||||||
Add a regular file to the store:
|
|
||||||
|
|
||||||
```console
|
|
||||||
# echo foo > bar
|
|
||||||
|
|
||||||
# nix store add-file ./bar
|
|
||||||
/nix/store/cbv2s4bsvzjri77s2gb8g8bpcb6dpa8w-bar
|
|
||||||
|
|
||||||
# cat /nix/store/cbv2s4bsvzjri77s2gb8g8bpcb6dpa8w-bar
|
|
||||||
foo
|
|
||||||
```
|
|
||||||
|
|
||||||
)""
|
|
|
@ -5,11 +5,22 @@
|
||||||
|
|
||||||
using namespace nix;
|
using namespace nix;
|
||||||
|
|
||||||
|
static FileIngestionMethod parseIngestionMethod(std::string_view input)
|
||||||
|
{
|
||||||
|
if (input == "flat") {
|
||||||
|
return FileIngestionMethod::Flat;
|
||||||
|
} else if (input == "nar") {
|
||||||
|
return FileIngestionMethod::Recursive;
|
||||||
|
} else {
|
||||||
|
throw UsageError("Unknown hash mode '%s', expect `flat` or `nar`");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
struct CmdAddToStore : MixDryRun, StoreCommand
|
struct CmdAddToStore : MixDryRun, StoreCommand
|
||||||
{
|
{
|
||||||
Path path;
|
Path path;
|
||||||
std::optional<std::string> namePart;
|
std::optional<std::string> namePart;
|
||||||
FileIngestionMethod ingestionMethod;
|
FileIngestionMethod ingestionMethod = FileIngestionMethod::Recursive;
|
||||||
|
|
||||||
CmdAddToStore()
|
CmdAddToStore()
|
||||||
{
|
{
|
||||||
|
@ -23,6 +34,23 @@ struct CmdAddToStore : MixDryRun, StoreCommand
|
||||||
.labels = {"name"},
|
.labels = {"name"},
|
||||||
.handler = {&namePart},
|
.handler = {&namePart},
|
||||||
});
|
});
|
||||||
|
|
||||||
|
addFlag({
|
||||||
|
.longName = "mode",
|
||||||
|
.shortName = 'n',
|
||||||
|
.description = R"(
|
||||||
|
How to compute the hash of the input.
|
||||||
|
One of:
|
||||||
|
|
||||||
|
- `nar` (the default): Serialises the input as an archive (following the [_Nix Archive Format_](https://edolstra.github.io/pubs/phd-thesis.pdf#page=101)) and passes that to the hash function.
|
||||||
|
|
||||||
|
- `flat`: Assumes that the input is a single file and directly passes it to the hash function;
|
||||||
|
)",
|
||||||
|
.labels = {"hash-mode"},
|
||||||
|
.handler = {[this](std::string s) {
|
||||||
|
this->ingestionMethod = parseIngestionMethod(s);
|
||||||
|
}},
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
void run(ref<Store> store) override
|
void run(ref<Store> store) override
|
||||||
|
@ -62,6 +90,22 @@ struct CmdAddToStore : MixDryRun, StoreCommand
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct CmdAdd : CmdAddToStore
|
||||||
|
{
|
||||||
|
|
||||||
|
std::string description() override
|
||||||
|
{
|
||||||
|
return "Add a file or directory to the Nix store";
|
||||||
|
}
|
||||||
|
|
||||||
|
std::string doc() override
|
||||||
|
{
|
||||||
|
return
|
||||||
|
#include "add.md"
|
||||||
|
;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
struct CmdAddFile : CmdAddToStore
|
struct CmdAddFile : CmdAddToStore
|
||||||
{
|
{
|
||||||
CmdAddFile()
|
CmdAddFile()
|
||||||
|
@ -71,36 +115,18 @@ struct CmdAddFile : CmdAddToStore
|
||||||
|
|
||||||
std::string description() override
|
std::string description() override
|
||||||
{
|
{
|
||||||
return "add a regular file to the Nix store";
|
return "Deprecated. Use [`nix store add --mode flat`](@docroot@/command-ref/new-cli/nix3-store-add.md) instead.";
|
||||||
}
|
|
||||||
|
|
||||||
std::string doc() override
|
|
||||||
{
|
|
||||||
return
|
|
||||||
#include "add-file.md"
|
|
||||||
;
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
struct CmdAddPath : CmdAddToStore
|
struct CmdAddPath : CmdAddToStore
|
||||||
{
|
{
|
||||||
CmdAddPath()
|
|
||||||
{
|
|
||||||
ingestionMethod = FileIngestionMethod::Recursive;
|
|
||||||
}
|
|
||||||
|
|
||||||
std::string description() override
|
std::string description() override
|
||||||
{
|
{
|
||||||
return "add a path to the Nix store";
|
return "Deprecated alias to [`nix store add`](@docroot@/command-ref/new-cli/nix3-store-add.md).";
|
||||||
}
|
|
||||||
|
|
||||||
std::string doc() override
|
|
||||||
{
|
|
||||||
return
|
|
||||||
#include "add-path.md"
|
|
||||||
;
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
static auto rCmdAddFile = registerCommand2<CmdAddFile>({"store", "add-file"});
|
static auto rCmdAddFile = registerCommand2<CmdAddFile>({"store", "add-file"});
|
||||||
static auto rCmdAddPath = registerCommand2<CmdAddPath>({"store", "add-path"});
|
static auto rCmdAddPath = registerCommand2<CmdAddPath>({"store", "add-path"});
|
||||||
|
static auto rCmdAdd = registerCommand2<CmdAdd>({"store", "add"});
|
||||||
|
|
|
@ -19,7 +19,7 @@ Add a directory to the store:
|
||||||
# mkdir dir
|
# mkdir dir
|
||||||
# echo foo > dir/bar
|
# echo foo > dir/bar
|
||||||
|
|
||||||
# nix store add-path ./dir
|
# nix store add ./dir
|
||||||
/nix/store/6pmjx56pm94n66n4qw1nff0y1crm8nqg-dir
|
/nix/store/6pmjx56pm94n66n4qw1nff0y1crm8nqg-dir
|
||||||
|
|
||||||
# cat /nix/store/6pmjx56pm94n66n4qw1nff0y1crm8nqg-dir/bar
|
# cat /nix/store/6pmjx56pm94n66n4qw1nff0y1crm8nqg-dir/bar
|
|
@ -1,6 +1,7 @@
|
||||||
#include "command.hh"
|
#include "command.hh"
|
||||||
#include "store-api.hh"
|
#include "store-api.hh"
|
||||||
#include "nar-accessor.hh"
|
#include "nar-accessor.hh"
|
||||||
|
#include "progress-bar.hh"
|
||||||
|
|
||||||
using namespace nix;
|
using namespace nix;
|
||||||
|
|
||||||
|
@ -13,6 +14,7 @@ struct MixCat : virtual Args
|
||||||
auto st = accessor->lstat(CanonPath(path));
|
auto st = accessor->lstat(CanonPath(path));
|
||||||
if (st.type != SourceAccessor::Type::tRegular)
|
if (st.type != SourceAccessor::Type::tRegular)
|
||||||
throw Error("path '%1%' is not a regular file", path);
|
throw Error("path '%1%' is not a regular file", path);
|
||||||
|
stopProgressBar();
|
||||||
writeFull(STDOUT_FILENO, accessor->readFile(CanonPath(path)));
|
writeFull(STDOUT_FILENO, accessor->readFile(CanonPath(path)));
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
|
@ -61,4 +61,12 @@ struct CmdDumpPath2 : Command
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
static auto rDumpPath2 = registerCommand2<CmdDumpPath2>({"nar", "dump-path"});
|
struct CmdNarDumpPath : CmdDumpPath2 {
|
||||||
|
void run() override {
|
||||||
|
warn("'nix nar dump-path' is a deprecated alias for 'nix nar pack'");
|
||||||
|
CmdDumpPath2::run();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
static auto rCmdNarPack = registerCommand2<CmdDumpPath2>({"nar", "pack"});
|
||||||
|
static auto rCmdNarDumpPath = registerCommand2<CmdNarDumpPath>({"nar", "dump-path"});
|
||||||
|
|
|
@ -5,7 +5,7 @@ R""(
|
||||||
* To serialise directory `foo` as a NAR:
|
* To serialise directory `foo` as a NAR:
|
||||||
|
|
||||||
```console
|
```console
|
||||||
# nix nar dump-path ./foo > foo.nar
|
# nix nar pack ./foo > foo.nar
|
||||||
```
|
```
|
||||||
|
|
||||||
# Description
|
# Description
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
#include "shared.hh"
|
#include "shared.hh"
|
||||||
#include "store-api.hh"
|
#include "store-api.hh"
|
||||||
#include "thread-pool.hh"
|
#include "thread-pool.hh"
|
||||||
|
#include "progress-bar.hh"
|
||||||
|
|
||||||
#include <atomic>
|
#include <atomic>
|
||||||
|
|
||||||
|
@ -174,6 +175,7 @@ struct CmdKeyGenerateSecret : Command
|
||||||
if (!keyName)
|
if (!keyName)
|
||||||
throw UsageError("required argument '--key-name' is missing");
|
throw UsageError("required argument '--key-name' is missing");
|
||||||
|
|
||||||
|
stopProgressBar();
|
||||||
writeFull(STDOUT_FILENO, SecretKey::generate(*keyName).to_string());
|
writeFull(STDOUT_FILENO, SecretKey::generate(*keyName).to_string());
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -195,6 +197,7 @@ struct CmdKeyConvertSecretToPublic : Command
|
||||||
void run() override
|
void run() override
|
||||||
{
|
{
|
||||||
SecretKey secretKey(drainFD(STDIN_FILENO));
|
SecretKey secretKey(drainFD(STDIN_FILENO));
|
||||||
|
stopProgressBar();
|
||||||
writeFull(STDOUT_FILENO, secretKey.toPublicKey().to_string());
|
writeFull(STDOUT_FILENO, secretKey.toPublicKey().to_string());
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
|
@ -14,7 +14,6 @@ using namespace nix;
|
||||||
struct CmdUpgradeNix : MixDryRun, StoreCommand
|
struct CmdUpgradeNix : MixDryRun, StoreCommand
|
||||||
{
|
{
|
||||||
Path profileDir;
|
Path profileDir;
|
||||||
std::string storePathsUrl = "https://github.com/NixOS/nixpkgs/raw/master/nixos/modules/installer/tools/nix-fallback-paths.nix";
|
|
||||||
|
|
||||||
CmdUpgradeNix()
|
CmdUpgradeNix()
|
||||||
{
|
{
|
||||||
|
@ -30,7 +29,7 @@ struct CmdUpgradeNix : MixDryRun, StoreCommand
|
||||||
.longName = "nix-store-paths-url",
|
.longName = "nix-store-paths-url",
|
||||||
.description = "The URL of the file that contains the store paths of the latest Nix release.",
|
.description = "The URL of the file that contains the store paths of the latest Nix release.",
|
||||||
.labels = {"url"},
|
.labels = {"url"},
|
||||||
.handler = {&storePathsUrl}
|
.handler = {&(std::string&) settings.upgradeNixStorePathUrl}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -44,7 +43,7 @@ struct CmdUpgradeNix : MixDryRun, StoreCommand
|
||||||
|
|
||||||
std::string description() override
|
std::string description() override
|
||||||
{
|
{
|
||||||
return "upgrade Nix to the stable version declared in Nixpkgs";
|
return "upgrade Nix to the latest stable version";
|
||||||
}
|
}
|
||||||
|
|
||||||
std::string doc() override
|
std::string doc() override
|
||||||
|
@ -145,7 +144,7 @@ struct CmdUpgradeNix : MixDryRun, StoreCommand
|
||||||
Activity act(*logger, lvlInfo, actUnknown, "querying latest Nix version");
|
Activity act(*logger, lvlInfo, actUnknown, "querying latest Nix version");
|
||||||
|
|
||||||
// FIXME: use nixos.org?
|
// FIXME: use nixos.org?
|
||||||
auto req = FileTransferRequest(storePathsUrl);
|
auto req = FileTransferRequest((std::string&) settings.upgradeNixStorePathUrl);
|
||||||
auto res = getFileTransfer()->download(req);
|
auto res = getFileTransfer()->download(req);
|
||||||
|
|
||||||
auto state = std::make_unique<EvalState>(SearchPath{}, store);
|
auto state = std::make_unique<EvalState>(SearchPath{}, store);
|
||||||
|
|
|
@ -16,8 +16,10 @@ R""(
|
||||||
|
|
||||||
# Description
|
# Description
|
||||||
|
|
||||||
This command upgrades Nix to the stable version declared in Nixpkgs.
|
This command upgrades Nix to the stable version.
|
||||||
This stable version is defined in [nix-fallback-paths.nix](https://github.com/NixOS/nixpkgs/raw/master/nixos/modules/installer/tools/nix-fallback-paths.nix)
|
|
||||||
|
By default, the latest stable version is defined by Nixpkgs, in
|
||||||
|
[nix-fallback-paths.nix](https://github.com/NixOS/nixpkgs/raw/master/nixos/modules/installer/tools/nix-fallback-paths.nix)
|
||||||
and updated manually. It may not always be the latest tagged release.
|
and updated manually. It may not always be the latest tagged release.
|
||||||
|
|
||||||
By default, it locates the directory containing the `nix` binary in the `$PATH`
|
By default, it locates the directory containing the `nix` binary in the `$PATH`
|
||||||
|
|
|
@ -26,3 +26,20 @@ hash2=$(nix-hash --type sha256 --base32 ./dummy)
|
||||||
echo $hash2
|
echo $hash2
|
||||||
|
|
||||||
test "$hash1" = "sha256:$hash2"
|
test "$hash1" = "sha256:$hash2"
|
||||||
|
|
||||||
|
#### New style commands
|
||||||
|
|
||||||
|
clearStore
|
||||||
|
|
||||||
|
(
|
||||||
|
path1=$(nix store add ./dummy)
|
||||||
|
path2=$(nix store add --mode nar ./dummy)
|
||||||
|
path3=$(nix store add-path ./dummy)
|
||||||
|
[[ "$path1" == "$path2" ]]
|
||||||
|
[[ "$path1" == "$path3" ]]
|
||||||
|
)
|
||||||
|
(
|
||||||
|
path1=$(nix store add --mode flat ./dummy)
|
||||||
|
path2=$(nix store add-file ./dummy)
|
||||||
|
[[ "$path1" == "$path2" ]]
|
||||||
|
)
|
||||||
|
|
|
@ -4,7 +4,7 @@ if [[ -z "${COMMON_VARS_AND_FUNCTIONS_SH_SOURCED-}" ]]; then
|
||||||
|
|
||||||
COMMON_VARS_AND_FUNCTIONS_SH_SOURCED=1
|
COMMON_VARS_AND_FUNCTIONS_SH_SOURCED=1
|
||||||
|
|
||||||
export PS4='+(${BASH_SOURCE[0]-$0}:$LINENO) '
|
set +x
|
||||||
|
|
||||||
export TEST_ROOT=$(realpath ${TMPDIR:-/tmp}/nix-test)/${TEST_NAME:-default/tests\/functional//}
|
export TEST_ROOT=$(realpath ${TMPDIR:-/tmp}/nix-test)/${TEST_NAME:-default/tests\/functional//}
|
||||||
export NIX_STORE_DIR
|
export NIX_STORE_DIR
|
||||||
|
|
1
tests/functional/lang/eval-okay-symlink-resolution.exp
Normal file
1
tests/functional/lang/eval-okay-symlink-resolution.exp
Normal file
|
@ -0,0 +1 @@
|
||||||
|
"test"
|
1
tests/functional/lang/eval-okay-symlink-resolution.nix
Normal file
1
tests/functional/lang/eval-okay-symlink-resolution.nix
Normal file
|
@ -0,0 +1 @@
|
||||||
|
import symlink-resolution/foo/overlays/overlay.nix
|
|
@ -0,0 +1 @@
|
||||||
|
"test"
|
1
tests/functional/lang/symlink-resolution/foo/overlays
Symbolic link
1
tests/functional/lang/symlink-resolution/foo/overlays
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
../overlays
|
|
@ -0,0 +1 @@
|
||||||
|
import ../lib
|
|
@ -21,6 +21,8 @@ in
|
||||||
|
|
||||||
remoteBuilds = runNixOSTestFor "x86_64-linux" ./remote-builds.nix;
|
remoteBuilds = runNixOSTestFor "x86_64-linux" ./remote-builds.nix;
|
||||||
|
|
||||||
|
remoteBuildsSshNg = runNixOSTestFor "x86_64-linux" ./remote-builds-ssh-ng.nix;
|
||||||
|
|
||||||
nix-copy-closure = runNixOSTestFor "x86_64-linux" ./nix-copy-closure.nix;
|
nix-copy-closure = runNixOSTestFor "x86_64-linux" ./nix-copy-closure.nix;
|
||||||
|
|
||||||
nix-copy = runNixOSTestFor "x86_64-linux" ./nix-copy.nix;
|
nix-copy = runNixOSTestFor "x86_64-linux" ./nix-copy.nix;
|
||||||
|
|
108
tests/nixos/remote-builds-ssh-ng.nix
Normal file
108
tests/nixos/remote-builds-ssh-ng.nix
Normal file
|
@ -0,0 +1,108 @@
|
||||||
|
{ config, lib, hostPkgs, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
pkgs = config.nodes.client.nixpkgs.pkgs;
|
||||||
|
|
||||||
|
# Trivial Nix expression to build remotely.
|
||||||
|
expr = config: nr: pkgs.writeText "expr.nix"
|
||||||
|
''
|
||||||
|
let utils = builtins.storePath ${config.system.build.extraUtils}; in
|
||||||
|
derivation {
|
||||||
|
name = "hello-${toString nr}";
|
||||||
|
system = "i686-linux";
|
||||||
|
PATH = "''${utils}/bin";
|
||||||
|
builder = "''${utils}/bin/sh";
|
||||||
|
args = [ "-c" "${
|
||||||
|
lib.concatStringsSep "; " [
|
||||||
|
''if [[ -n $NIX_LOG_FD ]]''
|
||||||
|
''then echo '@nix {\"action\":\"setPhase\",\"phase\":\"buildPhase\"}' >&''$NIX_LOG_FD''
|
||||||
|
"fi"
|
||||||
|
"echo Hello"
|
||||||
|
"mkdir $out"
|
||||||
|
"cat /proc/sys/kernel/hostname > $out/host"
|
||||||
|
]
|
||||||
|
}" ];
|
||||||
|
outputs = [ "out" ];
|
||||||
|
}
|
||||||
|
'';
|
||||||
|
in
|
||||||
|
|
||||||
|
{
|
||||||
|
name = "remote-builds-ssh-ng";
|
||||||
|
|
||||||
|
nodes =
|
||||||
|
{ builder =
|
||||||
|
{ config, pkgs, ... }:
|
||||||
|
{ services.openssh.enable = true;
|
||||||
|
virtualisation.writableStore = true;
|
||||||
|
nix.settings.sandbox = true;
|
||||||
|
nix.settings.substituters = lib.mkForce [ ];
|
||||||
|
};
|
||||||
|
|
||||||
|
client =
|
||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
{ nix.settings.max-jobs = 0; # force remote building
|
||||||
|
nix.distributedBuilds = true;
|
||||||
|
nix.buildMachines =
|
||||||
|
[ { hostName = "builder";
|
||||||
|
sshUser = "root";
|
||||||
|
sshKey = "/root/.ssh/id_ed25519";
|
||||||
|
system = "i686-linux";
|
||||||
|
maxJobs = 1;
|
||||||
|
protocol = "ssh-ng";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
virtualisation.writableStore = true;
|
||||||
|
virtualisation.additionalPaths = [ config.system.build.extraUtils ];
|
||||||
|
nix.settings.substituters = lib.mkForce [ ];
|
||||||
|
programs.ssh.extraConfig = "ConnectTimeout 30";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = { nodes }: ''
|
||||||
|
# fmt: off
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
start_all()
|
||||||
|
|
||||||
|
# Create an SSH key on the client.
|
||||||
|
subprocess.run([
|
||||||
|
"${hostPkgs.openssh}/bin/ssh-keygen", "-t", "ed25519", "-f", "key", "-N", ""
|
||||||
|
], capture_output=True, check=True)
|
||||||
|
client.succeed("mkdir -p -m 700 /root/.ssh")
|
||||||
|
client.copy_from_host("key", "/root/.ssh/id_ed25519")
|
||||||
|
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
||||||
|
|
||||||
|
# Install the SSH key on the builder.
|
||||||
|
client.wait_for_unit("network.target")
|
||||||
|
builder.succeed("mkdir -p -m 700 /root/.ssh")
|
||||||
|
builder.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
||||||
|
builder.wait_for_unit("sshd")
|
||||||
|
client.succeed(f"ssh -o StrictHostKeyChecking=no {builder.name} 'echo hello world'")
|
||||||
|
|
||||||
|
# Perform a build
|
||||||
|
out = client.succeed("nix-build ${expr nodes.client.config 1} 2> build-output")
|
||||||
|
|
||||||
|
# Verify that the build was done on the builder
|
||||||
|
builder.succeed(f"test -e {out.strip()}")
|
||||||
|
|
||||||
|
# Print the build log, prefix the log lines to avoid nix intercepting lines starting with @nix
|
||||||
|
buildOutput = client.succeed("sed -e 's/^/build-output:/' build-output")
|
||||||
|
print(buildOutput)
|
||||||
|
|
||||||
|
# Make sure that we get the expected build output
|
||||||
|
client.succeed("grep -qF Hello build-output")
|
||||||
|
|
||||||
|
# We don't want phase reporting in the build output
|
||||||
|
client.fail("grep -qF '@nix' build-output")
|
||||||
|
|
||||||
|
# Get the log file
|
||||||
|
client.succeed(f"nix-store --read-log {out.strip()} > log-output")
|
||||||
|
# Prefix the log lines to avoid nix intercepting lines starting with @nix
|
||||||
|
logOutput = client.succeed("sed -e 's/^/log-file:/' log-output")
|
||||||
|
print(logOutput)
|
||||||
|
|
||||||
|
# Check that we get phase reporting in the log file
|
||||||
|
client.succeed("grep -q '@nix {\"action\":\"setPhase\",\"phase\":\"buildPhase\"}' log-output")
|
||||||
|
'';
|
||||||
|
}
|
31
unit-test-data/libutil/git/check-data.sh
Normal file
31
unit-test-data/libutil/git/check-data.sh
Normal file
|
@ -0,0 +1,31 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
set -eu -o pipefail
|
||||||
|
|
||||||
|
export TEST_ROOT=$(realpath ${TMPDIR:-/tmp}/nix-test)/git-hashing/unit-test-data
|
||||||
|
mkdir -p $TEST_ROOT
|
||||||
|
|
||||||
|
repo="$TEST_ROOT/scratch"
|
||||||
|
git init "$repo"
|
||||||
|
|
||||||
|
git -C "$repo" config user.email "you@example.com"
|
||||||
|
git -C "$repo" config user.name "Your Name"
|
||||||
|
|
||||||
|
# `-w` to write for tree test
|
||||||
|
freshlyAddedHash=$(git -C "$repo" hash-object -w -t blob --stdin < "./hello-world.bin")
|
||||||
|
encodingHash=$(sha1sum -b < "./hello-world-blob.bin" | head -c 40)
|
||||||
|
|
||||||
|
# If the hashes match, then `hello-world-blob.bin` must be the encoding
|
||||||
|
# of `hello-world.bin`.
|
||||||
|
[[ "$encodingHash" == "$freshlyAddedHash" ]]
|
||||||
|
|
||||||
|
# Create empty directory object for tree test
|
||||||
|
echo -n | git -C "$repo" hash-object -w -t tree --stdin
|
||||||
|
|
||||||
|
# Relies on both child hashes already existing in the git store
|
||||||
|
freshlyAddedHash=$(git -C "$repo" mktree < "./tree.txt")
|
||||||
|
encodingHash=$(sha1sum -b < "./tree.bin" | head -c 40)
|
||||||
|
|
||||||
|
# If the hashes match, then `tree.bin` must be the encoding of the
|
||||||
|
# directory denoted by `tree.txt` interpreted as git directory listing.
|
||||||
|
[[ "$encodingHash" == "$freshlyAddedHash" ]]
|
BIN
unit-test-data/libutil/git/hello-world-blob.bin
Normal file
BIN
unit-test-data/libutil/git/hello-world-blob.bin
Normal file
Binary file not shown.
BIN
unit-test-data/libutil/git/hello-world.bin
Normal file
BIN
unit-test-data/libutil/git/hello-world.bin
Normal file
Binary file not shown.
BIN
unit-test-data/libutil/git/tree.bin
Normal file
BIN
unit-test-data/libutil/git/tree.bin
Normal file
Binary file not shown.
3
unit-test-data/libutil/git/tree.txt
Normal file
3
unit-test-data/libutil/git/tree.txt
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
100644 blob 63ddb340119baf8492d2da53af47e8c7cfcd5eb2 Foo
|
||||||
|
100755 blob 63ddb340119baf8492d2da53af47e8c7cfcd5eb2 bAr
|
||||||
|
040000 tree 4b825dc642cb6eb9a060e54bf8d69288fbee4904 baZ
|
Loading…
Reference in a new issue