2003-11-18 11:22:29 +00:00
|
|
|
#include "storeexpr.hh"
|
2003-06-16 13:33:38 +00:00
|
|
|
#include "globals.hh"
|
2003-07-07 07:43:58 +00:00
|
|
|
#include "store.hh"
|
2003-06-16 13:33:38 +00:00
|
|
|
|
2004-10-29 11:22:49 +00:00
|
|
|
#include "storeexpr-ast.hh"
|
|
|
|
#include "storeexpr-ast.cc"
|
|
|
|
|
2003-06-16 13:33:38 +00:00
|
|
|
|
2003-06-27 13:55:12 +00:00
|
|
|
Hash hashTerm(ATerm t)
|
2003-06-16 13:33:38 +00:00
|
|
|
{
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 16:55:19 +00:00
|
|
|
return hashString(htSHA256, atPrint(t));
|
2003-06-16 13:33:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 15:06:59 +00:00
|
|
|
Path writeTerm(ATerm t, const string & suffix)
|
2003-07-04 12:18:06 +00:00
|
|
|
{
|
2005-01-14 13:51:38 +00:00
|
|
|
char * s = ATwriteToString(t);
|
|
|
|
if (!s) throw Error("cannot print aterm");
|
|
|
|
return addTextToStore(suffix + ".store", string(s));
|
2003-07-04 12:18:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 16:55:19 +00:00
|
|
|
void checkPath(const string & s)
|
|
|
|
{
|
|
|
|
if (s.size() == 0 || s[0] != '/')
|
|
|
|
throw Error(format("bad path `%1%' in store expression") % s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 15:06:59 +00:00
|
|
|
static void parsePaths(ATermList paths, PathSet & out)
|
2003-07-15 16:28:54 +00:00
|
|
|
{
|
2003-11-16 18:31:29 +00:00
|
|
|
for (ATermIterator i(paths); i; ++i) {
|
2004-10-29 11:22:49 +00:00
|
|
|
if (ATgetType(*i) != AT_APPL)
|
|
|
|
throw badTerm("not a path", *i);
|
|
|
|
string s = aterm2String(*i);
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 16:55:19 +00:00
|
|
|
checkPath(s);
|
2003-08-20 14:11:40 +00:00
|
|
|
out.insert(s);
|
2003-07-15 16:28:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 12:27:49 +00:00
|
|
|
static void checkClosure(const Closure & closure)
|
2003-07-20 19:29:38 +00:00
|
|
|
{
|
2003-10-07 12:27:49 +00:00
|
|
|
if (closure.elems.size() == 0)
|
|
|
|
throw Error("empty closure");
|
2003-07-20 19:29:38 +00:00
|
|
|
|
2003-10-08 15:06:59 +00:00
|
|
|
PathSet decl;
|
2003-10-07 12:27:49 +00:00
|
|
|
for (ClosureElems::const_iterator i = closure.elems.begin();
|
|
|
|
i != closure.elems.end(); i++)
|
2003-08-20 14:11:40 +00:00
|
|
|
decl.insert(i->first);
|
2003-07-20 19:29:38 +00:00
|
|
|
|
2003-10-08 15:06:59 +00:00
|
|
|
for (PathSet::const_iterator i = closure.roots.begin();
|
2003-10-07 12:27:49 +00:00
|
|
|
i != closure.roots.end(); i++)
|
2003-07-20 19:29:38 +00:00
|
|
|
if (decl.find(*i) == decl.end())
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 12:39:56 +00:00
|
|
|
throw Error(format("undefined root path `%1%'") % *i);
|
2003-07-20 19:29:38 +00:00
|
|
|
|
2003-10-07 12:27:49 +00:00
|
|
|
for (ClosureElems::const_iterator i = closure.elems.begin();
|
|
|
|
i != closure.elems.end(); i++)
|
2003-10-08 15:06:59 +00:00
|
|
|
for (PathSet::const_iterator j = i->second.refs.begin();
|
2003-08-20 14:11:40 +00:00
|
|
|
j != i->second.refs.end(); j++)
|
2003-07-20 19:29:38 +00:00
|
|
|
if (decl.find(*j) == decl.end())
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 12:39:56 +00:00
|
|
|
throw Error(
|
|
|
|
format("undefined path `%1%' referenced by `%2%'")
|
2003-08-20 14:11:40 +00:00
|
|
|
% *j % i->first);
|
2003-07-20 19:29:38 +00:00
|
|
|
}
|
2003-07-16 20:33:29 +00:00
|
|
|
|
|
|
|
|
2003-10-07 12:27:49 +00:00
|
|
|
/* Parse a closure. */
|
|
|
|
static bool parseClosure(ATerm t, Closure & closure)
|
2003-07-15 16:28:54 +00:00
|
|
|
{
|
|
|
|
ATermList roots, elems;
|
2003-11-16 17:46:31 +00:00
|
|
|
|
2004-10-29 11:22:49 +00:00
|
|
|
if (!matchClosure(t, roots, elems))
|
2003-07-20 19:29:38 +00:00
|
|
|
return false;
|
2003-07-15 16:28:54 +00:00
|
|
|
|
2003-10-07 12:27:49 +00:00
|
|
|
parsePaths(roots, closure.roots);
|
2003-07-15 16:28:54 +00:00
|
|
|
|
2003-11-16 18:31:29 +00:00
|
|
|
for (ATermIterator i(elems); i; ++i) {
|
2004-10-29 11:22:49 +00:00
|
|
|
ATerm path;
|
2003-07-15 16:28:54 +00:00
|
|
|
ATermList refs;
|
2004-10-29 11:22:49 +00:00
|
|
|
if (!matchClosureElem(*i, path, refs))
|
2003-11-16 18:31:29 +00:00
|
|
|
throw badTerm("not a closure element", *i);
|
2003-10-07 12:27:49 +00:00
|
|
|
ClosureElem elem;
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 12:39:56 +00:00
|
|
|
parsePaths(refs, elem.refs);
|
2004-10-29 11:22:49 +00:00
|
|
|
closure.elems[aterm2String(path)] = elem;
|
2003-07-15 16:28:54 +00:00
|
|
|
}
|
|
|
|
|
2003-10-07 12:27:49 +00:00
|
|
|
checkClosure(closure);
|
2003-07-20 19:29:38 +00:00
|
|
|
return true;
|
2003-07-15 16:28:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 12:27:49 +00:00
|
|
|
static bool parseDerivation(ATerm t, Derivation & derivation)
|
2003-07-15 21:24:05 +00:00
|
|
|
{
|
2003-08-15 12:32:37 +00:00
|
|
|
ATermList outs, ins, args, bnds;
|
2004-10-29 11:22:49 +00:00
|
|
|
ATerm builder, platform;
|
2003-11-16 17:46:31 +00:00
|
|
|
|
2004-10-29 11:22:49 +00:00
|
|
|
if (!matchDerive(t, outs, ins, platform, builder, args, bnds))
|
2003-11-16 17:46:31 +00:00
|
|
|
return false;
|
2003-07-15 16:28:54 +00:00
|
|
|
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 16:55:19 +00:00
|
|
|
for (ATermIterator i(outs); i; ++i) {
|
|
|
|
ATerm id, path, hashAlgo, hash;
|
|
|
|
if (!matchDerivationOutput(*i, id, path, hashAlgo, hash))
|
|
|
|
return false;
|
|
|
|
DerivationOutput out;
|
|
|
|
out.path = aterm2String(path);
|
|
|
|
checkPath(out.path);
|
|
|
|
out.hashAlgo = aterm2String(hashAlgo);
|
|
|
|
out.hash = aterm2String(hash);
|
|
|
|
derivation.outputs[aterm2String(id)] = out;
|
|
|
|
}
|
|
|
|
|
2003-10-08 15:06:59 +00:00
|
|
|
parsePaths(ins, derivation.inputs);
|
2003-07-15 16:28:54 +00:00
|
|
|
|
2004-10-29 11:22:49 +00:00
|
|
|
derivation.builder = aterm2String(builder);
|
|
|
|
derivation.platform = aterm2String(platform);
|
2003-07-20 19:29:38 +00:00
|
|
|
|
2003-11-16 18:31:29 +00:00
|
|
|
for (ATermIterator i(args); i; ++i) {
|
2004-10-29 11:22:49 +00:00
|
|
|
if (ATgetType(*i) != AT_APPL)
|
2003-11-16 18:31:29 +00:00
|
|
|
throw badTerm("string expected", *i);
|
2004-10-29 11:22:49 +00:00
|
|
|
derivation.args.push_back(aterm2String(*i));
|
2003-08-15 12:32:37 +00:00
|
|
|
}
|
|
|
|
|
2003-11-16 18:31:29 +00:00
|
|
|
for (ATermIterator i(bnds); i; ++i) {
|
2004-10-29 11:22:49 +00:00
|
|
|
ATerm s1, s2;
|
|
|
|
if (!matchEnvBinding(*i, s1, s2))
|
2003-11-16 18:31:29 +00:00
|
|
|
throw badTerm("tuple of strings expected", *i);
|
2004-10-29 11:22:49 +00:00
|
|
|
derivation.env[aterm2String(s1)] = aterm2String(s2);
|
2003-07-15 16:28:54 +00:00
|
|
|
}
|
|
|
|
|
2003-07-20 19:29:38 +00:00
|
|
|
return true;
|
2003-07-15 16:28:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-11-18 11:22:29 +00:00
|
|
|
StoreExpr parseStoreExpr(ATerm t)
|
2003-07-16 11:05:59 +00:00
|
|
|
{
|
2003-11-18 11:22:29 +00:00
|
|
|
StoreExpr ne;
|
2003-10-07 12:27:49 +00:00
|
|
|
if (parseClosure(t, ne.closure))
|
2003-11-18 11:22:29 +00:00
|
|
|
ne.type = StoreExpr::neClosure;
|
2003-10-07 12:27:49 +00:00
|
|
|
else if (parseDerivation(t, ne.derivation))
|
2003-11-18 11:22:29 +00:00
|
|
|
ne.type = StoreExpr::neDerivation;
|
|
|
|
else throw badTerm("not a store expression", t);
|
2003-10-07 12:27:49 +00:00
|
|
|
return ne;
|
2003-07-16 11:05:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-08 15:06:59 +00:00
|
|
|
static ATermList unparsePaths(const PathSet & paths)
|
2003-07-15 21:24:05 +00:00
|
|
|
{
|
2003-07-20 19:29:38 +00:00
|
|
|
ATermList l = ATempty;
|
2003-10-08 15:06:59 +00:00
|
|
|
for (PathSet::const_iterator i = paths.begin();
|
* Change the abstract syntax of slices. It used to be that ids were used as
keys to reference slice elements, e.g.,
Slice(["1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["8c99..."]), ...])
This was wrong, since ids represent contents, not locations. Therefore we
now have:
Slice(["/nix/store/1ef7..."], [("/nix/store/1ef7...-foo", "1ef7", ["/nix/store/8c99-..."]), ...])
* Fix a bug in the computation of slice closures that could cause slice
elements to be duplicated.
2003-08-20 12:39:56 +00:00
|
|
|
i != paths.end(); i++)
|
2004-11-03 18:12:03 +00:00
|
|
|
l = ATinsert(l, toATerm(*i));
|
2003-07-20 19:29:38 +00:00
|
|
|
return ATreverse(l);
|
2003-07-15 21:24:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 12:27:49 +00:00
|
|
|
static ATerm unparseClosure(const Closure & closure)
|
2003-07-15 16:28:54 +00:00
|
|
|
{
|
2003-10-07 12:27:49 +00:00
|
|
|
ATermList roots = unparsePaths(closure.roots);
|
2003-07-20 19:29:38 +00:00
|
|
|
|
|
|
|
ATermList elems = ATempty;
|
2003-10-07 12:27:49 +00:00
|
|
|
for (ClosureElems::const_iterator i = closure.elems.begin();
|
|
|
|
i != closure.elems.end(); i++)
|
2003-07-20 19:29:38 +00:00
|
|
|
elems = ATinsert(elems,
|
2004-10-29 11:22:49 +00:00
|
|
|
makeClosureElem(
|
2004-11-03 18:12:03 +00:00
|
|
|
toATerm(i->first),
|
2003-08-20 14:11:40 +00:00
|
|
|
unparsePaths(i->second.refs)));
|
2003-07-15 16:28:54 +00:00
|
|
|
|
2004-10-29 11:22:49 +00:00
|
|
|
return makeClosure(roots, elems);
|
2003-07-15 16:28:54 +00:00
|
|
|
}
|
2003-07-15 22:28:27 +00:00
|
|
|
|
|
|
|
|
2003-10-07 12:27:49 +00:00
|
|
|
static ATerm unparseDerivation(const Derivation & derivation)
|
2003-07-15 22:28:27 +00:00
|
|
|
{
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 16:55:19 +00:00
|
|
|
ATermList outputs = ATempty;
|
|
|
|
for (DerivationOutputs::const_iterator i = derivation.outputs.begin();
|
|
|
|
i != derivation.outputs.end(); i++)
|
|
|
|
outputs = ATinsert(outputs,
|
|
|
|
makeDerivationOutput(
|
|
|
|
toATerm(i->first),
|
|
|
|
toATerm(i->second.path),
|
|
|
|
toATerm(i->second.hashAlgo),
|
|
|
|
toATerm(i->second.hash)));
|
|
|
|
|
2003-08-15 12:32:37 +00:00
|
|
|
ATermList args = ATempty;
|
2003-10-07 12:27:49 +00:00
|
|
|
for (Strings::const_iterator i = derivation.args.begin();
|
|
|
|
i != derivation.args.end(); i++)
|
2004-11-03 18:12:03 +00:00
|
|
|
args = ATinsert(args, toATerm(*i));
|
2003-08-15 12:32:37 +00:00
|
|
|
|
2003-07-20 19:29:38 +00:00
|
|
|
ATermList env = ATempty;
|
2003-10-07 12:27:49 +00:00
|
|
|
for (StringPairs::const_iterator i = derivation.env.begin();
|
|
|
|
i != derivation.env.end(); i++)
|
2003-07-20 19:29:38 +00:00
|
|
|
env = ATinsert(env,
|
2004-10-29 11:22:49 +00:00
|
|
|
makeEnvBinding(
|
2004-11-03 18:12:03 +00:00
|
|
|
toATerm(i->first),
|
|
|
|
toATerm(i->second)));
|
2003-07-15 22:28:27 +00:00
|
|
|
|
2004-10-29 11:22:49 +00:00
|
|
|
return makeDerive(
|
* Removed the `id' attribute hack.
* Formalise the notion of fixed-output derivations, i.e., derivations
for which a cryptographic hash of the output is known in advance.
Changes to such derivations should not propagate upwards through the
dependency graph. Previously this was done by specifying the hash
component of the output path through the `id' attribute, but this is
insecure since you can lie about it (i.e., you can specify any hash
and then produce a completely different output). Now the
responsibility for checking the output is moved from the builder to
Nix itself.
A fixed-output derivation can be created by specifying the
`outputHash' and `outputHashAlgo' attributes, the latter taking
values `md5', `sha1', and `sha256', and the former specifying the
actual hash in hexadecimal or in base-32 (auto-detected by looking
at the length of the attribute value). MD5 is included for
compatibility but should be considered deprecated.
* Removed the `drvPath' pseudo-attribute in derivation results. It's
no longer necessary.
* Cleaned up the support for multiple output paths in derivation store
expressions. Each output now has a unique identifier (e.g., `out',
`devel', `docs'). Previously there was no way to tell output paths
apart at the store expression level.
* `nix-hash' now has a flag `--base32' to specify that the hash should
be printed in base-32 notation.
* `fetchurl' accepts parameters `sha256' and `sha1' in addition to
`md5'.
* `nix-prefetch-url' now prints out a SHA-1 hash in base-32. (TODO: a
flag to specify the hash.)
2005-01-17 16:55:19 +00:00
|
|
|
ATreverse(outputs),
|
2003-10-08 15:06:59 +00:00
|
|
|
unparsePaths(derivation.inputs),
|
2004-11-03 18:12:03 +00:00
|
|
|
toATerm(derivation.platform),
|
|
|
|
toATerm(derivation.builder),
|
2003-08-15 12:32:37 +00:00
|
|
|
ATreverse(args),
|
2003-07-20 19:29:38 +00:00
|
|
|
ATreverse(env));
|
2003-07-15 22:28:27 +00:00
|
|
|
}
|
2003-07-16 11:05:59 +00:00
|
|
|
|
|
|
|
|
2003-11-18 11:22:29 +00:00
|
|
|
ATerm unparseStoreExpr(const StoreExpr & ne)
|
2003-07-16 11:05:59 +00:00
|
|
|
{
|
2003-11-18 11:22:29 +00:00
|
|
|
if (ne.type == StoreExpr::neClosure)
|
2003-10-07 12:27:49 +00:00
|
|
|
return unparseClosure(ne.closure);
|
2003-11-18 11:22:29 +00:00
|
|
|
else if (ne.type == StoreExpr::neDerivation)
|
2003-10-07 12:27:49 +00:00
|
|
|
return unparseDerivation(ne.derivation);
|
2003-07-20 19:29:38 +00:00
|
|
|
else abort();
|
2003-07-16 11:05:59 +00:00
|
|
|
}
|