forked from lix-project/lix
85f0cdc370
Motivation `PathSet` is not correct because string contexts have other forms (`Built` and `DrvDeep`) that are not rendered as plain store paths. Instead of wrongly using `PathSet`, or "stringly typed" using `StringSet`, use `std::std<StringContextElem>`. ----- In support of this change, `NixStringContext` is now defined as `std::std<StringContextElem>` not `std:vector<StringContextElem>`. The old definition was just used by a `getContext` method which was only used by the eval cache. It can be deleted altogether since the types are now unified and the preexisting `copyContext` function already suffices. Summarizing the previous paragraph: Old: - `value/context.hh`: `NixStringContext = std::vector<StringContextElem>` - `value.hh`: `NixStringContext Value::getContext(...)` - `value.hh`: `copyContext(...)` New: - `value/context.hh`: `NixStringContext = std::set<StringContextElem>` - `value.hh`: `copyContext(...)` ---- The string representation of string context elements no longer contains the store dir. The diff of `src/libexpr/tests/value/context.cc` should make clear what the new representation is, so we recommend reviewing that file first. This was done for two reasons: Less API churn: `Value::mkString` and friends did not take a `Store` before. But if `NixStringContextElem::{parse, to_string}` *do* take a store (as they did before), then we cannot have the `Value` functions use them (in order to work with the fully-structured `NixStringContext`) without adding that argument. That would have been a lot of churn of threading the store, and this diff is already large enough, so the easier and less invasive thing to do was simply make the element `parse` and `to_string` functions not take the `Store` reference, and the easiest way to do that was to simply drop the store dir. Space usage: Dropping the `/nix/store/` (or similar) from the internal representation will safe space in the heap of the Nix programming being interpreted. If the heap contains many strings with non-trivial contexts, the saving could add up to something significant. ---- The eval cache version is bumped. The eval cache serialization uses `NixStringContextElem::{parse, to_string}`, and since those functions are changed per the above, that means the on-disk representation is also changed. This is simply done by changing the name of the used for the eval cache from `eval-cache-v4` to eval-cache-v5`. ---- To avoid some duplication `EvalCache::mkPathString` is added to abstract over the simple case of turning a store path to a string with just that string in the context. Context This PR picks up where #7543 left off. That one introduced the fully structured `NixStringContextElem` data type, but kept `PathSet context` as an awkward middle ground between internal `char[][]` interpreter heap string contexts and `NixStringContext` fully parsed string contexts. The infelicity of `PathSet context` was specifically called out during Nix team group review, but it was agreeing that fixing it could be left as future work. This is that future work. A possible follow-up step would be to get rid of the `char[][]` evaluator heap representation, too, but it is not yet clear how to do that. To use `NixStringContextElem` there we would need to get the STL containers to GC pointers in the GC build, and I am not sure how to do that. ---- PR #7543 effectively is writing the inverse of a `mkPathString`, `mkOutputString`, and one more such function for the `DrvDeep` case. I would like that PR to have property tests ensuring it is actually the inverse as expected. This PR sets things up nicely so that reworking that PR to be in that more elegant and better tested way is possible. Co-authored-by: Théophane Hufschmitt <7226587+thufschmitt@users.noreply.github.com>
166 lines
6.3 KiB
C++
166 lines
6.3 KiB
C++
#include "primops.hh"
|
|
#include "store-api.hh"
|
|
#include "make-content-addressed.hh"
|
|
#include "url.hh"
|
|
|
|
namespace nix {
|
|
|
|
static void prim_fetchClosure(EvalState & state, const PosIdx pos, Value * * args, Value & v)
|
|
{
|
|
state.forceAttrs(*args[0], pos, "while evaluating the argument passed to builtins.fetchClosure");
|
|
|
|
std::optional<std::string> fromStoreUrl;
|
|
std::optional<StorePath> fromPath;
|
|
bool toCA = false;
|
|
std::optional<StorePath> toPath;
|
|
|
|
for (auto & attr : *args[0]->attrs) {
|
|
const auto & attrName = state.symbols[attr.name];
|
|
|
|
if (attrName == "fromPath") {
|
|
NixStringContext context;
|
|
fromPath = state.coerceToStorePath(attr.pos, *attr.value, context,
|
|
"while evaluating the 'fromPath' attribute passed to builtins.fetchClosure");
|
|
}
|
|
|
|
else if (attrName == "toPath") {
|
|
state.forceValue(*attr.value, attr.pos);
|
|
toCA = true;
|
|
if (attr.value->type() != nString || attr.value->string.s != std::string("")) {
|
|
NixStringContext context;
|
|
toPath = state.coerceToStorePath(attr.pos, *attr.value, context,
|
|
"while evaluating the 'toPath' attribute passed to builtins.fetchClosure");
|
|
}
|
|
}
|
|
|
|
else if (attrName == "fromStore")
|
|
fromStoreUrl = state.forceStringNoCtx(*attr.value, attr.pos,
|
|
"while evaluating the 'fromStore' attribute passed to builtins.fetchClosure");
|
|
|
|
else
|
|
throw Error({
|
|
.msg = hintfmt("attribute '%s' isn't supported in call to 'fetchClosure'", attrName),
|
|
.errPos = state.positions[pos]
|
|
});
|
|
}
|
|
|
|
if (!fromPath)
|
|
throw Error({
|
|
.msg = hintfmt("attribute '%s' is missing in call to 'fetchClosure'", "fromPath"),
|
|
.errPos = state.positions[pos]
|
|
});
|
|
|
|
if (!fromStoreUrl)
|
|
throw Error({
|
|
.msg = hintfmt("attribute '%s' is missing in call to 'fetchClosure'", "fromStore"),
|
|
.errPos = state.positions[pos]
|
|
});
|
|
|
|
auto parsedURL = parseURL(*fromStoreUrl);
|
|
|
|
if (parsedURL.scheme != "http" &&
|
|
parsedURL.scheme != "https" &&
|
|
!(getEnv("_NIX_IN_TEST").has_value() && parsedURL.scheme == "file"))
|
|
throw Error({
|
|
.msg = hintfmt("'fetchClosure' only supports http:// and https:// stores"),
|
|
.errPos = state.positions[pos]
|
|
});
|
|
|
|
if (!parsedURL.query.empty())
|
|
throw Error({
|
|
.msg = hintfmt("'fetchClosure' does not support URL query parameters (in '%s')", *fromStoreUrl),
|
|
.errPos = state.positions[pos]
|
|
});
|
|
|
|
auto fromStore = openStore(parsedURL.to_string());
|
|
|
|
if (toCA) {
|
|
if (!toPath || !state.store->isValidPath(*toPath)) {
|
|
auto remappings = makeContentAddressed(*fromStore, *state.store, { *fromPath });
|
|
auto i = remappings.find(*fromPath);
|
|
assert(i != remappings.end());
|
|
if (toPath && *toPath != i->second)
|
|
throw Error({
|
|
.msg = hintfmt("rewriting '%s' to content-addressed form yielded '%s', while '%s' was expected",
|
|
state.store->printStorePath(*fromPath),
|
|
state.store->printStorePath(i->second),
|
|
state.store->printStorePath(*toPath)),
|
|
.errPos = state.positions[pos]
|
|
});
|
|
if (!toPath)
|
|
throw Error({
|
|
.msg = hintfmt(
|
|
"rewriting '%s' to content-addressed form yielded '%s'; "
|
|
"please set this in the 'toPath' attribute passed to 'fetchClosure'",
|
|
state.store->printStorePath(*fromPath),
|
|
state.store->printStorePath(i->second)),
|
|
.errPos = state.positions[pos]
|
|
});
|
|
}
|
|
} else {
|
|
if (!state.store->isValidPath(*fromPath))
|
|
copyClosure(*fromStore, *state.store, RealisedPath::Set { *fromPath });
|
|
toPath = fromPath;
|
|
}
|
|
|
|
/* In pure mode, require a CA path. */
|
|
if (evalSettings.pureEval) {
|
|
auto info = state.store->queryPathInfo(*toPath);
|
|
if (!info->isContentAddressed(*state.store))
|
|
throw Error({
|
|
.msg = hintfmt("in pure mode, 'fetchClosure' requires a content-addressed path, which '%s' isn't",
|
|
state.store->printStorePath(*toPath)),
|
|
.errPos = state.positions[pos]
|
|
});
|
|
}
|
|
|
|
state.mkStorePathString(*toPath, v);
|
|
}
|
|
|
|
static RegisterPrimOp primop_fetchClosure({
|
|
.name = "__fetchClosure",
|
|
.args = {"args"},
|
|
.doc = R"(
|
|
Fetch a Nix store closure from a binary cache, rewriting it into
|
|
content-addressed form. For example,
|
|
|
|
```nix
|
|
builtins.fetchClosure {
|
|
fromStore = "https://cache.nixos.org";
|
|
fromPath = /nix/store/r2jd6ygnmirm2g803mksqqjm4y39yi6i-git-2.33.1;
|
|
toPath = /nix/store/ldbhlwhh39wha58rm61bkiiwm6j7211j-git-2.33.1;
|
|
}
|
|
```
|
|
|
|
fetches `/nix/store/r2jd...` from the specified binary cache,
|
|
and rewrites it into the content-addressed store path
|
|
`/nix/store/ldbh...`.
|
|
|
|
If `fromPath` is already content-addressed, or if you are
|
|
allowing impure evaluation (`--impure`), then `toPath` may be
|
|
omitted.
|
|
|
|
To find out the correct value for `toPath` given a `fromPath`,
|
|
you can use `nix store make-content-addressed`:
|
|
|
|
```console
|
|
# nix store make-content-addressed --from https://cache.nixos.org /nix/store/r2jd6ygnmirm2g803mksqqjm4y39yi6i-git-2.33.1
|
|
rewrote '/nix/store/r2jd6ygnmirm2g803mksqqjm4y39yi6i-git-2.33.1' to '/nix/store/ldbhlwhh39wha58rm61bkiiwm6j7211j-git-2.33.1'
|
|
```
|
|
|
|
This function is similar to `builtins.storePath` in that it
|
|
allows you to use a previously built store path in a Nix
|
|
expression. However, it is more reproducible because it requires
|
|
specifying a binary cache from which the path can be fetched.
|
|
Also, requiring a content-addressed final store path avoids the
|
|
need for users to configure binary cache public keys.
|
|
|
|
This function is only available if you enable the experimental
|
|
feature `fetch-closure`.
|
|
)",
|
|
.fun = prim_fetchClosure,
|
|
.experimentalFeature = Xp::FetchClosure,
|
|
});
|
|
|
|
}
|