id
int64
0
755k
file_name
stringlengths
3
109
file_path
stringlengths
13
185
content
stringlengths
31
9.38M
size
int64
31
9.38M
language
stringclasses
1 value
extension
stringclasses
11 values
total_lines
int64
1
340k
avg_line_length
float64
2.18
149k
max_line_length
int64
7
2.22M
alphanum_fraction
float64
0
1
repo_name
stringlengths
6
65
repo_stars
int64
100
47.3k
repo_forks
int64
0
12k
repo_open_issues
int64
0
3.4k
repo_license
stringclasses
9 values
repo_extraction_date
stringclasses
92 values
exact_duplicates_redpajama
bool
2 classes
near_duplicates_redpajama
bool
2 classes
exact_duplicates_githubcode
bool
2 classes
exact_duplicates_stackv2
bool
1 class
exact_duplicates_stackv1
bool
2 classes
near_duplicates_githubcode
bool
2 classes
near_duplicates_stackv1
bool
2 classes
near_duplicates_stackv2
bool
1 class
10,742
why-depends.cc
NixOS_nix/src/nix/why-depends.cc
#include "command.hh" #include "store-api.hh" #include "progress-bar.hh" #include "source-accessor.hh" #include "shared.hh" #include <queue> using namespace nix; static std::string hilite(const std::string & s, size_t pos, size_t len, const std::string & colour = ANSI_RED) { return std::string(s, 0, pos) + colour + std::string(s, pos, len) + ANSI_NORMAL + std::string(s, pos + len); } static std::string filterPrintable(const std::string & s) { std::string res; for (char c : s) res += isprint(c) ? c : '.'; return res; } struct CmdWhyDepends : SourceExprCommand, MixOperateOnOptions { std::string _package, _dependency; bool all = false; bool precise = false; CmdWhyDepends() { expectArgs({ .label = "package", .handler = {&_package}, .completer = getCompleteInstallable(), }); expectArgs({ .label = "dependency", .handler = {&_dependency}, .completer = getCompleteInstallable(), }); addFlag({ .longName = "all", .shortName = 'a', .description = "Show all edges in the dependency graph leading from *package* to *dependency*, rather than just a shortest path.", .handler = {&all, true}, }); addFlag({ .longName = "precise", .description = "For each edge in the dependency graph, show the files in the parent that cause the dependency.", .handler = {&precise, true}, }); } std::string description() override { return "show why a package has another package in its closure"; } std::string doc() override { return #include "why-depends.md" ; } Category category() override { return catSecondary; } void run(ref<Store> store) override { auto package = parseInstallable(store, _package); auto packagePath = Installable::toStorePath(getEvalStore(), store, Realise::Outputs, operateOn, package); /* We don't need to build `dependency`. We try to get the store * path if it's already known, and if not, then it's not a dependency. * * Why? If `package` does depends on `dependency`, then getting the * store path of `package` above necessitated having the store path * of `dependency`. The contrapositive is, if the store path of * `dependency` is not already known at this point (i.e. it's a CA * derivation which hasn't been built), then `package` did not need it * to build. */ auto dependency = parseInstallable(store, _dependency); auto optDependencyPath = [&]() -> std::optional<StorePath> { try { return {Installable::toStorePath(getEvalStore(), store, Realise::Derivation, operateOn, dependency)}; } catch (MissingRealisation &) { return std::nullopt; } }(); StorePathSet closure; store->computeFSClosure({packagePath}, closure, false, false); if (!optDependencyPath.has_value() || !closure.count(*optDependencyPath)) { printError("'%s' does not depend on '%s'", package->what(), dependency->what()); return; } auto dependencyPath = *optDependencyPath; auto dependencyPathHash = dependencyPath.hashPart(); stopProgressBar(); // FIXME auto accessor = store->getFSAccessor(); auto const inf = std::numeric_limits<size_t>::max(); struct Node { StorePath path; StorePathSet refs; StorePathSet rrefs; size_t dist = inf; Node * prev = nullptr; bool queued = false; bool visited = false; }; std::map<StorePath, Node> graph; for (auto & path : closure) graph.emplace(path, Node { .path = path, .refs = store->queryPathInfo(path)->references, .dist = path == dependencyPath ? 0 : inf }); // Transpose the graph. for (auto & node : graph) for (auto & ref : node.second.refs) graph.find(ref)->second.rrefs.insert(node.first); /* Run Dijkstra's shortest path algorithm to get the distance of every path in the closure to 'dependency'. */ std::priority_queue<Node *> queue; queue.push(&graph.at(dependencyPath)); while (!queue.empty()) { auto & node = *queue.top(); queue.pop(); for (auto & rref : node.rrefs) { auto & node2 = graph.at(rref); auto dist = node.dist + 1; if (dist < node2.dist) { node2.dist = dist; node2.prev = &node; if (!node2.queued) { node2.queued = true; queue.push(&node2); } } } } /* Print the subgraph of nodes that have 'dependency' in their closure (i.e., that have a non-infinite distance to 'dependency'). Print every edge on a path between `package` and `dependency`. */ std::function<void(Node &, const std::string &, const std::string &)> printNode; struct BailOut { }; printNode = [&](Node & node, const std::string & firstPad, const std::string & tailPad) { CanonPath pathS(store->printStorePath(node.path)); assert(node.dist != inf); if (precise) { logger->cout("%s%s%s%s" ANSI_NORMAL, firstPad, node.visited ? "\e[38;5;244m" : "", firstPad != "" ? "→ " : "", pathS.abs()); } if (node.path == dependencyPath && !all && packagePath != dependencyPath) throw BailOut(); if (node.visited) return; if (precise) node.visited = true; /* Sort the references by distance to `dependency` to ensure that the shortest path is printed first. */ std::multimap<size_t, Node *> refs; std::set<std::string> hashes; for (auto & ref : node.refs) { if (ref == node.path && packagePath != dependencyPath) continue; auto & node2 = graph.at(ref); if (node2.dist == inf) continue; refs.emplace(node2.dist, &node2); hashes.insert(std::string(node2.path.hashPart())); } /* For each reference, find the files and symlinks that contain the reference. */ std::map<std::string, Strings> hits; std::function<void(const CanonPath &)> visitPath; visitPath = [&](const CanonPath & p) { auto st = accessor->maybeLstat(p); assert(st); auto p2 = p == pathS ? "/" : p.abs().substr(pathS.abs().size() + 1); auto getColour = [&](const std::string & hash) { return hash == dependencyPathHash ? ANSI_GREEN : ANSI_BLUE; }; if (st->type == SourceAccessor::Type::tDirectory) { auto names = accessor->readDirectory(p); for (auto & [name, type] : names) visitPath(p / name); } else if (st->type == SourceAccessor::Type::tRegular) { auto contents = accessor->readFile(p); for (auto & hash : hashes) { auto pos = contents.find(hash); if (pos != std::string::npos) { size_t margin = 32; auto pos2 = pos >= margin ? pos - margin : 0; hits[hash].emplace_back(fmt("%s: …%s…", p2, hilite(filterPrintable( std::string(contents, pos2, pos - pos2 + hash.size() + margin)), pos - pos2, StorePath::HashLen, getColour(hash)))); } } } else if (st->type == SourceAccessor::Type::tSymlink) { auto target = accessor->readLink(p); for (auto & hash : hashes) { auto pos = target.find(hash); if (pos != std::string::npos) hits[hash].emplace_back(fmt("%s -> %s", p2, hilite(target, pos, StorePath::HashLen, getColour(hash)))); } } }; // FIXME: should use scanForReferences(). if (precise) visitPath(pathS); for (auto & ref : refs) { std::string hash(ref.second->path.hashPart()); bool last = all ? ref == *refs.rbegin() : true; for (auto & hit : hits[hash]) { bool first = hit == *hits[hash].begin(); logger->cout("%s%s%s", tailPad, (first ? (last ? treeLast : treeConn) : (last ? treeNull : treeLine)), hit); if (!all) break; } if (!precise) { auto pathS = store->printStorePath(ref.second->path); logger->cout("%s%s%s%s" ANSI_NORMAL, firstPad, ref.second->visited ? "\e[38;5;244m" : "", last ? treeLast : treeConn, pathS); node.visited = true; } printNode(*ref.second, tailPad + (last ? treeNull : treeLine), tailPad + (last ? treeNull : treeLine)); } }; RunPager pager; try { if (!precise) { logger->cout("%s", store->printStorePath(graph.at(packagePath).path)); } printNode(graph.at(packagePath), "", ""); } catch (BailOut & ) { } } }; static auto rCmdWhyDepends = registerCommand<CmdWhyDepends>("why-depends");
10,557
C++
.cc
248
28.725806
142
0.497316
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,743
derivation-add.cc
NixOS_nix/src/nix/derivation-add.cc
// FIXME: rename to 'nix plan add' or 'nix derivation add'? #include "command.hh" #include "common-args.hh" #include "store-api.hh" #include "archive.hh" #include "derivations.hh" #include <nlohmann/json.hpp> using namespace nix; using json = nlohmann::json; struct CmdAddDerivation : MixDryRun, StoreCommand { std::string description() override { return "Add a store derivation"; } std::string doc() override { return #include "derivation-add.md" ; } Category category() override { return catUtility; } void run(ref<Store> store) override { auto json = nlohmann::json::parse(drainFD(STDIN_FILENO)); auto drv = Derivation::fromJSON(*store, json); auto drvPath = writeDerivation(*store, drv, NoRepair, /* read only */ dryRun); drv.checkInvariants(*store, drvPath); writeDerivation(*store, drv, NoRepair, dryRun); logger->cout("%s", store->printStorePath(drvPath)); } }; static auto rCmdAddDerivation = registerCommand2<CmdAddDerivation>({"derivation", "add"});
1,096
C++
.cc
33
28.090909
90
0.675547
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,744
edit.cc
NixOS_nix/src/nix/edit.cc
#include "current-process.hh" #include "command-installable-value.hh" #include "shared.hh" #include "eval.hh" #include "attr-path.hh" #include "progress-bar.hh" #include "editor-for.hh" #include <unistd.h> using namespace nix; struct CmdEdit : InstallableValueCommand { std::string description() override { return "open the Nix expression of a Nix package in $EDITOR"; } std::string doc() override { return #include "edit.md" ; } Category category() override { return catSecondary; } void run(ref<Store> store, ref<InstallableValue> installable) override { auto state = getEvalState(); const auto [file, line] = [&] { auto [v, pos] = installable->toValue(*state); try { return findPackageFilename(*state, *v, installable->what()); } catch (NoPositionInfo &) { throw Error("cannot find position information for '%s", installable->what()); } }(); stopProgressBar(); auto args = editorFor(file, line); restoreProcessContext(); execvp(args.front().c_str(), stringsToCharPtrs(args).data()); std::string command; for (const auto &arg : args) command += " '" + arg + "'"; throw SysError("cannot run command%s", command); } }; static auto rCmdEdit = registerCommand<CmdEdit>("edit");
1,426
C++
.cc
43
26.348837
93
0.617239
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,745
derivation-show.cc
NixOS_nix/src/nix/derivation-show.cc
// FIXME: integrate this with nix path-info? // FIXME: rename to 'nix store derivation show' or 'nix debug derivation show'? #include "command.hh" #include "common-args.hh" #include "store-api.hh" #include "archive.hh" #include "derivations.hh" #include <nlohmann/json.hpp> using namespace nix; using json = nlohmann::json; struct CmdShowDerivation : InstallablesCommand { bool recursive = false; CmdShowDerivation() { addFlag({ .longName = "recursive", .shortName = 'r', .description = "Include the dependencies of the specified derivations.", .handler = {&recursive, true} }); } std::string description() override { return "show the contents of a store derivation"; } std::string doc() override { return #include "derivation-show.md" ; } Category category() override { return catUtility; } void run(ref<Store> store, Installables && installables) override { auto drvPaths = Installable::toDerivations(store, installables, true); if (recursive) { StorePathSet closure; store->computeFSClosure(drvPaths, closure); drvPaths = std::move(closure); } json jsonRoot = json::object(); for (auto & drvPath : drvPaths) { if (!drvPath.isDerivation()) continue; jsonRoot[store->printStorePath(drvPath)] = store->readDerivation(drvPath).toJSON(*store); } logger->cout(jsonRoot.dump(2)); } }; static auto rCmdShowDerivation = registerCommand2<CmdShowDerivation>({"derivation", "show"});
1,676
C++
.cc
51
25.960784
93
0.635236
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,746
path-info.cc
NixOS_nix/src/nix/path-info.cc
#include "command.hh" #include "shared.hh" #include "store-api.hh" #include "common-args.hh" #include "nar-info.hh" #include <algorithm> #include <array> #include <nlohmann/json.hpp> #include "strings.hh" using namespace nix; using nlohmann::json; /** * @return the total size of a set of store objects (specified by path), * that is, the sum of the size of the NAR serialisation of each object * in the set. */ static uint64_t getStoreObjectsTotalSize(Store & store, const StorePathSet & closure) { uint64_t totalNarSize = 0; for (auto & p : closure) { totalNarSize += store.queryPathInfo(p)->narSize; } return totalNarSize; } /** * Write a JSON representation of store object metadata, such as the * hash and the references. * * @param showClosureSize If true, the closure size of each path is * included. */ static json pathInfoToJSON( Store & store, const StorePathSet & storePaths, bool showClosureSize) { json::object_t jsonAllObjects = json::object(); for (auto & storePath : storePaths) { json jsonObject; auto printedStorePath = store.printStorePath(storePath); try { auto info = store.queryPathInfo(storePath); // `storePath` has the representation `<hash>-x` rather than // `<hash>-<name>` in case of binary-cache stores & `--all` because we don't // know the name yet until we've read the NAR info. printedStorePath = store.printStorePath(info->path); jsonObject = info->toJSON(store, true, HashFormat::SRI); if (showClosureSize) { StorePathSet closure; store.computeFSClosure(storePath, closure, false, false); jsonObject["closureSize"] = getStoreObjectsTotalSize(store, closure); if (dynamic_cast<const NarInfo *>(&*info)) { uint64_t totalDownloadSize = 0; for (auto & p : closure) { auto depInfo = store.queryPathInfo(p); if (auto * depNarInfo = dynamic_cast<const NarInfo *>(&*depInfo)) totalDownloadSize += depNarInfo->fileSize; else throw Error("Missing .narinfo for dep %s of %s", store.printStorePath(p), store.printStorePath(storePath)); } jsonObject["closureDownloadSize"] = totalDownloadSize; } } } catch (InvalidPath &) { jsonObject = nullptr; } jsonAllObjects[printedStorePath] = std::move(jsonObject); } return jsonAllObjects; } struct CmdPathInfo : StorePathsCommand, MixJSON { bool showSize = false; bool showClosureSize = false; bool humanReadable = false; bool showSigs = false; CmdPathInfo() { addFlag({ .longName = "size", .shortName = 's', .description = "Print the size of the NAR serialisation of each path.", .handler = {&showSize, true}, }); addFlag({ .longName = "closure-size", .shortName = 'S', .description = "Print the sum of the sizes of the NAR serialisations of the closure of each path.", .handler = {&showClosureSize, true}, }); addFlag({ .longName = "human-readable", .shortName = 'h', .description = "With `-s` and `-S`, print sizes in a human-friendly format such as `5.67G`.", .handler = {&humanReadable, true}, }); addFlag({ .longName = "sigs", .description = "Show signatures.", .handler = {&showSigs, true}, }); } std::string description() override { return "query information about store paths"; } std::string doc() override { return #include "path-info.md" ; } Category category() override { return catSecondary; } void printSize(std::ostream & str, uint64_t value) { if (humanReadable) str << fmt("\t%s", renderSize(value, true)); else str << fmt("\t%11d", value); } void run(ref<Store> store, StorePaths && storePaths) override { size_t pathLen = 0; for (auto & storePath : storePaths) pathLen = std::max(pathLen, store->printStorePath(storePath).size()); if (json) { logger->cout(pathInfoToJSON( *store, // FIXME: preserve order? StorePathSet(storePaths.begin(), storePaths.end()), showClosureSize).dump()); } else { for (auto & storePath : storePaths) { auto info = store->queryPathInfo(storePath); auto storePathS = store->printStorePath(info->path); std::ostringstream str; str << storePathS; if (showSize || showClosureSize || showSigs) str << std::string(std::max(0, (int) pathLen - (int) storePathS.size()), ' '); if (showSize) printSize(str, info->narSize); if (showClosureSize) { StorePathSet closure; store->computeFSClosure(storePath, closure, false, false); printSize(str, getStoreObjectsTotalSize(*store, closure)); } if (showSigs) { str << '\t'; Strings ss; if (info->ultimate) ss.push_back("ultimate"); if (info->ca) ss.push_back("ca:" + renderContentAddress(*info->ca)); for (auto & sig : info->sigs) ss.push_back(sig); str << concatStringsSep(" ", ss); } logger->cout(str.str()); } } } }; static auto rCmdPathInfo = registerCommand<CmdPathInfo>("path-info");
6,099
C++
.cc
163
26.815951
111
0.554011
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,747
config.cc
NixOS_nix/src/nix/config.cc
#include "command.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "config-global.hh" #include <nlohmann/json.hpp> using namespace nix; struct CmdConfig : NixMultiCommand { CmdConfig() : NixMultiCommand("config", RegisterCommand::getCommandsFor({"config"})) { } std::string description() override { return "manipulate the Nix configuration"; } Category category() override { return catUtility; } }; struct CmdConfigShow : Command, MixJSON { std::optional<std::string> name; CmdConfigShow() { expectArgs({ .label = {"name"}, .optional = true, .handler = {&name}, }); } std::string description() override { return "show the Nix configuration or the value of a specific setting"; } Category category() override { return catUtility; } void run() override { if (name) { if (json) { throw UsageError("'--json' is not supported when specifying a setting name"); } std::map<std::string, Config::SettingInfo> settings; globalConfig.getSettings(settings); auto setting = settings.find(*name); if (setting == settings.end()) { throw Error("could not find setting '%1%'", *name); } else { const auto & value = setting->second.value; logger->cout("%s", value); } return; } if (json) { // FIXME: use appropriate JSON types (bool, ints, etc). logger->cout("%s", globalConfig.toJSON().dump()); } else { logger->cout("%s", globalConfig.toKeyValue()); } } }; static auto rCmdConfig = registerCommand<CmdConfig>("config"); static auto rShowConfig = registerCommand2<CmdConfigShow>({"config", "show"});
1,913
C++
.cc
59
24.728814
93
0.588907
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,748
path-from-hash-part.cc
NixOS_nix/src/nix/path-from-hash-part.cc
#include "command.hh" #include "store-api.hh" using namespace nix; struct CmdPathFromHashPart : StoreCommand { std::string hashPart; CmdPathFromHashPart() { expectArgs({ .label = "hash-part", .handler = {&hashPart}, }); } std::string description() override { return "get a store path from its hash part"; } std::string doc() override { return #include "path-from-hash-part.md" ; } void run(ref<Store> store) override { if (auto storePath = store->queryPathFromHashPart(hashPart)) logger->cout(store->printStorePath(*storePath)); else throw Error("there is no store path corresponding to '%s'", hashPart); } }; static auto rCmdPathFromHashPart = registerCommand2<CmdPathFromHashPart>({"store", "path-from-hash-part"});
893
C++
.cc
32
21.4375
107
0.62178
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,749
build.cc
NixOS_nix/src/nix/build.cc
#include "command.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "local-fs-store.hh" #include "progress-bar.hh" #include <nlohmann/json.hpp> using namespace nix; static nlohmann::json derivedPathsToJSON(const DerivedPaths & paths, Store & store) { auto res = nlohmann::json::array(); for (auto & t : paths) { std::visit([&](const auto & t) { res.push_back(t.toJSON(store)); }, t.raw()); } return res; } static nlohmann::json builtPathsWithResultToJSON(const std::vector<BuiltPathWithResult> & buildables, const Store & store) { auto res = nlohmann::json::array(); for (auto & b : buildables) { std::visit([&](const auto & t) { auto j = t.toJSON(store); if (b.result) { if (b.result->startTime) j["startTime"] = b.result->startTime; if (b.result->stopTime) j["stopTime"] = b.result->stopTime; if (b.result->cpuUser) j["cpuUser"] = ((double) b.result->cpuUser->count()) / 1000000; if (b.result->cpuSystem) j["cpuSystem"] = ((double) b.result->cpuSystem->count()) / 1000000; } res.push_back(j); }, b.path.raw()); } return res; } // TODO deduplicate with other code also setting such out links. static void createOutLinks(const std::filesystem::path& outLink, const std::vector<BuiltPathWithResult>& buildables, LocalFSStore& store2) { for (const auto & [_i, buildable] : enumerate(buildables)) { auto i = _i; std::visit(overloaded { [&](const BuiltPath::Opaque & bo) { auto symlink = outLink; if (i) symlink += fmt("-%d", i); store2.addPermRoot(bo.path, absPath(symlink.string())); }, [&](const BuiltPath::Built & bfd) { for (auto & output : bfd.outputs) { auto symlink = outLink; if (i) symlink += fmt("-%d", i); if (output.first != "out") symlink += fmt("-%s", output.first); store2.addPermRoot(output.second, absPath(symlink.string())); } }, }, buildable.path.raw()); } } struct CmdBuild : InstallablesCommand, MixDryRun, MixJSON, MixProfile { Path outLink = "result"; bool printOutputPaths = false; BuildMode buildMode = bmNormal; CmdBuild() { addFlag({ .longName = "out-link", .shortName = 'o', .description = "Use *path* as prefix for the symlinks to the build results. It defaults to `result`.", .labels = {"path"}, .handler = {&outLink}, .completer = completePath }); addFlag({ .longName = "no-link", .description = "Do not create symlinks to the build results.", .handler = {&outLink, Path("")}, }); addFlag({ .longName = "print-out-paths", .description = "Print the resulting output paths", .handler = {&printOutputPaths, true}, }); addFlag({ .longName = "rebuild", .description = "Rebuild an already built package and compare the result to the existing store paths.", .handler = {&buildMode, bmCheck}, }); } std::string description() override { return "build a derivation or fetch a store path"; } std::string doc() override { return #include "build.md" ; } void run(ref<Store> store, Installables && installables) override { if (dryRun) { std::vector<DerivedPath> pathsToBuild; for (auto & i : installables) for (auto & b : i->toDerivedPaths()) pathsToBuild.push_back(b.path); printMissing(store, pathsToBuild, lvlError); if (json) logger->cout("%s", derivedPathsToJSON(pathsToBuild, *store).dump()); return; } auto buildables = Installable::build( getEvalStore(), store, Realise::Outputs, installables, repair ? bmRepair : buildMode); if (json) logger->cout("%s", builtPathsWithResultToJSON(buildables, *store).dump()); if (outLink != "") if (auto store2 = store.dynamic_pointer_cast<LocalFSStore>()) createOutLinks(outLink, buildables, *store2); if (printOutputPaths) { stopProgressBar(); for (auto & buildable : buildables) { std::visit(overloaded { [&](const BuiltPath::Opaque & bo) { logger->cout(store->printStorePath(bo.path)); }, [&](const BuiltPath::Built & bfd) { for (auto & output : bfd.outputs) { logger->cout(store->printStorePath(output.second)); } }, }, buildable.path.raw()); } } BuiltPaths buildables2; for (auto & b : buildables) buildables2.push_back(b.path); updateProfile(buildables2); } }; static auto rCmdBuild = registerCommand<CmdBuild>("build");
5,418
C++
.cc
145
26.717241
138
0.53619
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,750
store.cc
NixOS_nix/src/nix/store.cc
#include "command.hh" using namespace nix; struct CmdStore : NixMultiCommand { CmdStore() : NixMultiCommand("store", RegisterCommand::getCommandsFor({"store"})) { } std::string description() override { return "manipulate a Nix store"; } Category category() override { return catUtility; } }; static auto rCmdStore = registerCommand<CmdStore>("store");
389
C++
.cc
13
26.076923
85
0.71159
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,751
dump-path.cc
NixOS_nix/src/nix/dump-path.cc
#include "command.hh" #include "store-api.hh" #include "archive.hh" using namespace nix; struct CmdDumpPath : StorePathCommand { std::string description() override { return "serialise a store path to stdout in NAR format"; } std::string doc() override { return #include "store-dump-path.md" ; } void run(ref<Store> store, const StorePath & storePath) override { FdSink sink(getStandardOutput()); store->narFromPath(storePath, sink); sink.flush(); } }; static auto rDumpPath = registerCommand2<CmdDumpPath>({"store", "dump-path"}); struct CmdDumpPath2 : Command { Path path; CmdDumpPath2() { expectArgs({ .label = "path", .handler = {&path}, .completer = completePath }); } std::string description() override { return "serialise a path to stdout in NAR format"; } std::string doc() override { return #include "nar-dump-path.md" ; } void run() override { FdSink sink(getStandardOutput()); dumpPath(path, sink); sink.flush(); } }; struct CmdNarDumpPath : CmdDumpPath2 { void run() override { warn("'nix nar dump-path' is a deprecated alias for 'nix nar pack'"); CmdDumpPath2::run(); } }; static auto rCmdNarPack = registerCommand2<CmdDumpPath2>({"nar", "pack"}); static auto rCmdNarDumpPath = registerCommand2<CmdNarDumpPath>({"nar", "dump-path"});
1,542
C++
.cc
60
19.766667
85
0.614286
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,752
sigs.cc
NixOS_nix/src/nix/sigs.cc
#include "signals.hh" #include "command.hh" #include "shared.hh" #include "store-api.hh" #include "thread-pool.hh" #include "progress-bar.hh" #include <atomic> using namespace nix; struct CmdCopySigs : StorePathsCommand { Strings substituterUris; CmdCopySigs() { addFlag({ .longName = "substituter", .shortName = 's', .description = "Copy signatures from the specified store.", .labels = {"store-uri"}, .handler = {[&](std::string s) { substituterUris.push_back(s); }}, }); } std::string description() override { return "copy store path signatures from substituters"; } void run(ref<Store> store, StorePaths && storePaths) override { if (substituterUris.empty()) throw UsageError("you must specify at least one substituter using '-s'"); // FIXME: factor out commonality with MixVerify. std::vector<ref<Store>> substituters; for (auto & s : substituterUris) substituters.push_back(openStore(s)); ThreadPool pool; std::string doneLabel = "done"; std::atomic<size_t> added{0}; //logger->setExpected(doneLabel, storePaths.size()); auto doPath = [&](const Path & storePathS) { //Activity act(*logger, lvlInfo, "getting signatures for '%s'", storePath); checkInterrupt(); auto storePath = store->parseStorePath(storePathS); auto info = store->queryPathInfo(storePath); StringSet newSigs; for (auto & store2 : substituters) { try { auto info2 = store2->queryPathInfo(info->path); /* Don't import signatures that don't match this binary. */ if (info->narHash != info2->narHash || info->narSize != info2->narSize || info->references != info2->references) continue; for (auto & sig : info2->sigs) if (!info->sigs.count(sig)) newSigs.insert(sig); } catch (InvalidPath &) { } } if (!newSigs.empty()) { store->addSignatures(storePath, newSigs); added += newSigs.size(); } //logger->incProgress(doneLabel); }; for (auto & storePath : storePaths) pool.enqueue(std::bind(doPath, store->printStorePath(storePath))); pool.process(); printInfo("imported %d signatures", added); } }; static auto rCmdCopySigs = registerCommand2<CmdCopySigs>({"store", "copy-sigs"}); struct CmdSign : StorePathsCommand { Path secretKeyFile; CmdSign() { addFlag({ .longName = "key-file", .shortName = 'k', .description = "File containing the secret signing key.", .labels = {"file"}, .handler = {&secretKeyFile}, .completer = completePath }); } std::string description() override { return "sign store paths with a local key"; } void run(ref<Store> store, StorePaths && storePaths) override { if (secretKeyFile.empty()) throw UsageError("you must specify a secret key file using '-k'"); SecretKey secretKey(readFile(secretKeyFile)); LocalSigner signer(std::move(secretKey)); size_t added{0}; for (auto & storePath : storePaths) { auto info = store->queryPathInfo(storePath); auto info2(*info); info2.sigs.clear(); info2.sign(*store, signer); assert(!info2.sigs.empty()); if (!info->sigs.count(*info2.sigs.begin())) { store->addSignatures(storePath, info2.sigs); added++; } } printInfo("added %d signatures", added); } }; static auto rCmdSign = registerCommand2<CmdSign>({"store", "sign"}); struct CmdKeyGenerateSecret : Command { std::optional<std::string> keyName; CmdKeyGenerateSecret() { addFlag({ .longName = "key-name", .description = "Identifier of the key (e.g. `cache.example.org-1`).", .labels = {"name"}, .handler = {&keyName}, }); } std::string description() override { return "generate a secret key for signing store paths"; } std::string doc() override { return #include "key-generate-secret.md" ; } void run() override { if (!keyName) throw UsageError("required argument '--key-name' is missing"); stopProgressBar(); writeFull(getStandardOutput(), SecretKey::generate(*keyName).to_string()); } }; struct CmdKeyConvertSecretToPublic : Command { std::string description() override { return "generate a public key for verifying store paths from a secret key read from standard input"; } std::string doc() override { return #include "key-convert-secret-to-public.md" ; } void run() override { SecretKey secretKey(drainFD(STDIN_FILENO)); stopProgressBar(); writeFull(getStandardOutput(), secretKey.toPublicKey().to_string()); } }; struct CmdKey : NixMultiCommand { CmdKey() : NixMultiCommand( "key", { {"generate-secret", []() { return make_ref<CmdKeyGenerateSecret>(); }}, {"convert-secret-to-public", []() { return make_ref<CmdKeyConvertSecretToPublic>(); }}, }) { } std::string description() override { return "generate and convert Nix signing keys"; } Category category() override { return catUtility; } }; static auto rCmdKey = registerCommand<CmdKey>("key");
5,989
C++
.cc
178
24.47191
108
0.56776
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,753
repl.cc
NixOS_nix/src/nix/repl.cc
#include "eval.hh" #include "eval-settings.hh" #include "config-global.hh" #include "globals.hh" #include "command.hh" #include "installable-value.hh" #include "repl.hh" #include "processes.hh" #include "self-exe.hh" namespace nix { void runNix(Path program, const Strings & args, const std::optional<std::string> & input = {}) { auto subprocessEnv = getEnv(); subprocessEnv["NIX_CONFIG"] = globalConfig.toKeyValue(); //isInteractive avoid grabling interactive commands runProgram2(RunOptions { .program = getNixBin(program).string(), .args = args, .environment = subprocessEnv, .input = input, .isInteractive = true, }); return; } struct CmdRepl : RawInstallablesCommand { CmdRepl() { evalSettings.pureEval = false; } /** * This command is stable before the others */ std::optional<ExperimentalFeature> experimentalFeature() override { return std::nullopt; } std::vector<std::string> files; Strings getDefaultFlakeAttrPaths() override { return {""}; } bool forceImpureByDefault() override { return true; } std::string description() override { return "start an interactive environment for evaluating Nix expressions"; } std::string doc() override { return #include "repl.md" ; } void applyDefaultInstallables(std::vector<std::string> & rawInstallables) override { if (rawInstallables.empty() && (file.has_value() || expr.has_value())) { rawInstallables.push_back("."); } } void run(ref<Store> store, std::vector<std::string> && rawInstallables) override { auto state = getEvalState(); auto getValues = [&]()->AbstractNixRepl::AnnotatedValues{ auto installables = parseInstallables(store, rawInstallables); AbstractNixRepl::AnnotatedValues values; for (auto & installable_: installables){ auto & installable = InstallableValue::require(*installable_); auto what = installable.what(); if (file){ auto [val, pos] = installable.toValue(*state); auto what = installable.what(); state->forceValue(*val, pos); auto autoArgs = getAutoArgs(*state); auto valPost = state->allocValue(); state->autoCallFunction(*autoArgs, *val, *valPost); state->forceValue(*valPost, pos); values.push_back( {valPost, what }); } else { auto [val, pos] = installable.toValue(*state); values.push_back( {val, what} ); } } return values; }; auto repl = AbstractNixRepl::create( lookupPath, openStore(), state, getValues, runNix ); repl->autoArgs = getAutoArgs(*repl->state); repl->initEnv(); repl->mainLoop(); } }; static auto rCmdRepl = registerCommand<CmdRepl>("repl"); }
3,195
C++
.cc
101
23.188119
86
0.582792
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,754
realisation.cc
NixOS_nix/src/nix/realisation.cc
#include "command.hh" #include "common-args.hh" #include <nlohmann/json.hpp> using namespace nix; struct CmdRealisation : NixMultiCommand { CmdRealisation() : NixMultiCommand("realisation", RegisterCommand::getCommandsFor({"realisation"})) { } std::string description() override { return "manipulate a Nix realisation"; } Category category() override { return catUtility; } }; static auto rCmdRealisation = registerCommand<CmdRealisation>("realisation"); struct CmdRealisationInfo : BuiltPathsCommand, MixJSON { std::string description() override { return "query information about one or several realisations"; } std::string doc() override { return #include "realisation/info.md" ; } Category category() override { return catSecondary; } void run(ref<Store> store, BuiltPaths && paths) override { experimentalFeatureSettings.require(Xp::CaDerivations); RealisedPath::Set realisations; for (auto & builtPath : paths) { auto theseRealisations = builtPath.toRealisedPaths(*store); realisations.insert(theseRealisations.begin(), theseRealisations.end()); } if (json) { nlohmann::json res = nlohmann::json::array(); for (auto & path : realisations) { nlohmann::json currentPath; if (auto realisation = std::get_if<Realisation>(&path.raw)) currentPath = realisation->toJSON(); else currentPath["opaquePath"] = store->printStorePath(path.path()); res.push_back(currentPath); } logger->cout("%s", res); } else { for (auto & path : realisations) { if (auto realisation = std::get_if<Realisation>(&path.raw)) { logger->cout("%s %s", realisation->id.to_string(), store->printStorePath(realisation->outPath)); } else logger->cout("%s", store->printStorePath(path.path())); } } } }; static auto rCmdRealisationInfo = registerCommand2<CmdRealisationInfo>({"realisation", "info"});
2,277
C++
.cc
61
27.967213
103
0.601726
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,755
add-to-store.cc
NixOS_nix/src/nix/add-to-store.cc
#include "command.hh" #include "common-args.hh" #include "store-api.hh" #include "archive.hh" #include "git.hh" #include "posix-source-accessor.hh" #include "misc-store-flags.hh" using namespace nix; struct CmdAddToStore : MixDryRun, StoreCommand { Path path; std::optional<std::string> namePart; ContentAddressMethod caMethod = ContentAddressMethod::Raw::NixArchive; HashAlgorithm hashAlgo = HashAlgorithm::SHA256; CmdAddToStore() { // FIXME: completion expectArg("path", &path); addFlag({ .longName = "name", .shortName = 'n', .description = "Override the name component of the store path. It defaults to the base name of *path*.", .labels = {"name"}, .handler = {&namePart}, }); addFlag(flag::contentAddressMethod(&caMethod)); addFlag(flag::hashAlgo(&hashAlgo)); } void run(ref<Store> store) override { if (!namePart) namePart = baseNameOf(path); auto [accessor, path2] = PosixSourceAccessor::createAtRoot(path); auto storePath = dryRun ? store->computeStorePath( *namePart, {accessor, path2}, caMethod, hashAlgo, {}).first : store->addToStoreSlow( *namePart, {accessor, path2}, caMethod, hashAlgo, {}).path; logger->cout("%s", store->printStorePath(storePath)); } }; struct CmdAdd : CmdAddToStore { std::string description() override { return "Add a file or directory to the Nix store"; } std::string doc() override { return #include "add.md" ; } }; struct CmdAddFile : CmdAddToStore { CmdAddFile() { caMethod = ContentAddressMethod::Raw::Flat; } std::string description() override { return "Deprecated. Use [`nix store add --mode flat`](@docroot@/command-ref/new-cli/nix3-store-add.md) instead."; } }; struct CmdAddPath : CmdAddToStore { std::string description() override { return "Deprecated alias to [`nix store add`](@docroot@/command-ref/new-cli/nix3-store-add.md)."; } }; static auto rCmdAddFile = registerCommand2<CmdAddFile>({"store", "add-file"}); static auto rCmdAddPath = registerCommand2<CmdAddPath>({"store", "add-path"}); static auto rCmdAdd = registerCommand2<CmdAdd>({"store", "add"});
2,379
C++
.cc
74
26.121622
121
0.640891
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,756
prefetch.cc
NixOS_nix/src/nix/prefetch.cc
#include "command.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "filetransfer.hh" #include "finally.hh" #include "progress-bar.hh" #include "tarfile.hh" #include "attr-path.hh" #include "eval-inline.hh" #include "legacy.hh" #include "posix-source-accessor.hh" #include "misc-store-flags.hh" #include "terminal.hh" #include <nlohmann/json.hpp> using namespace nix; /* If ‘url’ starts with ‘mirror://’, then resolve it using the list of mirrors defined in Nixpkgs. */ std::string resolveMirrorUrl(EvalState & state, const std::string & url) { if (url.substr(0, 9) != "mirror://") return url; std::string s(url, 9); auto p = s.find('/'); if (p == std::string::npos) throw Error("invalid mirror URL '%s'", url); std::string mirrorName(s, 0, p); Value vMirrors; // FIXME: use nixpkgs flake state.eval(state.parseExprFromString( "import <nixpkgs/pkgs/build-support/fetchurl/mirrors.nix>", state.rootPath(CanonPath::root)), vMirrors); state.forceAttrs(vMirrors, noPos, "while evaluating the set of all mirrors"); auto mirrorList = vMirrors.attrs()->get(state.symbols.create(mirrorName)); if (!mirrorList) throw Error("unknown mirror name '%s'", mirrorName); state.forceList(*mirrorList->value, noPos, "while evaluating one mirror configuration"); if (mirrorList->value->listSize() < 1) throw Error("mirror URL '%s' did not expand to anything", url); std::string mirror(state.forceString(*mirrorList->value->listElems()[0], noPos, "while evaluating the first available mirror")); return mirror + (hasSuffix(mirror, "/") ? "" : "/") + s.substr(p + 1); } std::tuple<StorePath, Hash> prefetchFile( ref<Store> store, std::string_view url, std::optional<std::string> name, HashAlgorithm hashAlgo, std::optional<Hash> expectedHash, bool unpack, bool executable) { ContentAddressMethod method = unpack || executable ? ContentAddressMethod::Raw::NixArchive : ContentAddressMethod::Raw::Flat; /* Figure out a name in the Nix store. */ if (!name) { name = baseNameOf(url); if (name->empty()) throw Error("cannot figure out file name for '%s'", url); } std::optional<StorePath> storePath; std::optional<Hash> hash; /* If an expected hash is given, the file may already exist in the store. */ if (expectedHash) { hashAlgo = expectedHash->algo; storePath = store->makeFixedOutputPathFromCA(*name, ContentAddressWithReferences::fromParts( method, *expectedHash, {})); if (store->isValidPath(*storePath)) hash = expectedHash; else storePath.reset(); } if (!storePath) { AutoDelete tmpDir(createTempDir(), true); std::filesystem::path tmpFile = tmpDir.path() / "tmp"; /* Download the file. */ { auto mode = 0600; if (executable) mode = 0700; AutoCloseFD fd = toDescriptor(open(tmpFile.string().c_str(), O_WRONLY | O_CREAT | O_EXCL, mode)); if (!fd) throw SysError("creating temporary file '%s'", tmpFile); FdSink sink(fd.get()); FileTransferRequest req(url); req.decompress = false; getFileTransfer()->download(std::move(req), sink); } /* Optionally unpack the file. */ if (unpack) { Activity act(*logger, lvlChatty, actUnknown, fmt("unpacking '%s'", url)); auto unpacked = (tmpDir.path() / "unpacked").string(); createDirs(unpacked); unpackTarfile(tmpFile.string(), unpacked); auto entries = std::filesystem::directory_iterator{unpacked}; /* If the archive unpacks to a single file/directory, then use that as the top-level. */ tmpFile = entries->path(); auto fileCount = std::distance(entries, std::filesystem::directory_iterator{}); if (fileCount != 1) { /* otherwise, use the directory itself */ tmpFile = unpacked; } } Activity act(*logger, lvlChatty, actUnknown, fmt("adding '%s' to the store", url)); auto info = store->addToStoreSlow( *name, PosixSourceAccessor::createAtRoot(tmpFile), method, hashAlgo, {}, expectedHash); storePath = info.path; assert(info.ca); hash = info.ca->hash; } return {storePath.value(), hash.value()}; } static int main_nix_prefetch_url(int argc, char * * argv) { { HashAlgorithm ha = HashAlgorithm::SHA256; std::vector<std::string> args; bool printPath = getEnv("PRINT_PATH") == "1"; bool fromExpr = false; std::string attrPath; bool unpack = false; bool executable = false; std::optional<std::string> name; struct MyArgs : LegacyArgs, MixEvalArgs { using LegacyArgs::LegacyArgs; }; MyArgs myArgs(std::string(baseNameOf(argv[0])), [&](Strings::iterator & arg, const Strings::iterator & end) { if (*arg == "--help") showManPage("nix-prefetch-url"); else if (*arg == "--version") printVersion("nix-prefetch-url"); else if (*arg == "--type") { auto s = getArg(*arg, arg, end); ha = parseHashAlgo(s); } else if (*arg == "--print-path") printPath = true; else if (*arg == "--attr" || *arg == "-A") { fromExpr = true; attrPath = getArg(*arg, arg, end); } else if (*arg == "--unpack") unpack = true; else if (*arg == "--executable") executable = true; else if (*arg == "--name") name = getArg(*arg, arg, end); else if (*arg != "" && arg->at(0) == '-') return false; else args.push_back(*arg); return true; }); myArgs.parseCmdline(argvToStrings(argc, argv)); if (args.size() > 2) throw UsageError("too many arguments"); Finally f([]() { stopProgressBar(); }); if (isTTY()) startProgressBar(); auto store = openStore(); auto state = std::make_unique<EvalState>(myArgs.lookupPath, store, fetchSettings, evalSettings); Bindings & autoArgs = *myArgs.getAutoArgs(*state); /* If -A is given, get the URL from the specified Nix expression. */ std::string url; if (!fromExpr) { if (args.empty()) throw UsageError("you must specify a URL"); url = args[0]; } else { Value vRoot; state->evalFile( resolveExprPath( lookupFileArg(*state, args.empty() ? "." : args[0])), vRoot); Value & v(*findAlongAttrPath(*state, attrPath, autoArgs, vRoot).first); state->forceAttrs(v, noPos, "while evaluating the source attribute to prefetch"); /* Extract the URL. */ auto * attr = v.attrs()->get(state->symbols.create("urls")); if (!attr) throw Error("attribute 'urls' missing"); state->forceList(*attr->value, noPos, "while evaluating the urls to prefetch"); if (attr->value->listSize() < 1) throw Error("'urls' list is empty"); url = state->forceString(*attr->value->listElems()[0], noPos, "while evaluating the first url from the urls list"); /* Extract the hash mode. */ auto attr2 = v.attrs()->get(state->symbols.create("outputHashMode")); if (!attr2) printInfo("warning: this does not look like a fetchurl call"); else unpack = state->forceString(*attr2->value, noPos, "while evaluating the outputHashMode of the source to prefetch") == "recursive"; /* Extract the name. */ if (!name) { auto attr3 = v.attrs()->get(state->symbols.create("name")); if (!attr3) name = state->forceString(*attr3->value, noPos, "while evaluating the name of the source to prefetch"); } } std::optional<Hash> expectedHash; if (args.size() == 2) expectedHash = Hash::parseAny(args[1], ha); auto [storePath, hash] = prefetchFile( store, resolveMirrorUrl(*state, url), name, ha, expectedHash, unpack, executable); stopProgressBar(); if (!printPath) printInfo("path is '%s'", store->printStorePath(storePath)); logger->cout(printHash16or32(hash)); if (printPath) logger->cout(store->printStorePath(storePath)); return 0; } } static RegisterLegacyCommand r_nix_prefetch_url("nix-prefetch-url", main_nix_prefetch_url); struct CmdStorePrefetchFile : StoreCommand, MixJSON { std::string url; bool executable = false; bool unpack = false; std::optional<std::string> name; HashAlgorithm hashAlgo = HashAlgorithm::SHA256; std::optional<Hash> expectedHash; CmdStorePrefetchFile() { addFlag({ .longName = "name", .description = "Override the name component of the resulting store path. It defaults to the base name of *url*.", .labels = {"name"}, .handler = {&name} }); addFlag({ .longName = "expected-hash", .description = "The expected hash of the file.", .labels = {"hash"}, .handler = {[&](std::string s) { expectedHash = Hash::parseAny(s, hashAlgo); }} }); addFlag(flag::hashAlgo("hash-type", &hashAlgo)); addFlag({ .longName = "executable", .description = "Make the resulting file executable. Note that this causes the " "resulting hash to be a NAR hash rather than a flat file hash.", .handler = {&executable, true}, }); addFlag({ .longName = "unpack", .description = "Unpack the archive (which must be a tarball or zip file) and add " "the result to the Nix store.", .handler = {&unpack, true}, }); expectArg("url", &url); } std::string description() override { return "download a file into the Nix store"; } std::string doc() override { return #include "store-prefetch-file.md" ; } void run(ref<Store> store) override { auto [storePath, hash] = prefetchFile(store, url, name, hashAlgo, expectedHash, unpack, executable); if (json) { auto res = nlohmann::json::object(); res["storePath"] = store->printStorePath(storePath); res["hash"] = hash.to_string(HashFormat::SRI, true); logger->cout(res.dump()); } else { notice("Downloaded '%s' to '%s' (hash '%s').", url, store->printStorePath(storePath), hash.to_string(HashFormat::SRI, true)); } } }; static auto rCmdStorePrefetchFile = registerCommand2<CmdStorePrefetchFile>({"store", "prefetch-file"});
11,613
C++
.cc
287
30.515679
146
0.568182
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,757
copy.cc
NixOS_nix/src/nix/copy.cc
#include "command.hh" #include "shared.hh" #include "store-api.hh" using namespace nix; struct CmdCopy : virtual CopyCommand, virtual BuiltPathsCommand { CheckSigsFlag checkSigs = CheckSigs; SubstituteFlag substitute = NoSubstitute; CmdCopy() : BuiltPathsCommand(true) { addFlag({ .longName = "no-check-sigs", .description = "Do not require that paths are signed by trusted keys.", .handler = {&checkSigs, NoCheckSigs}, }); addFlag({ .longName = "substitute-on-destination", .shortName = 's', .description = "Whether to try substitutes on the destination store (only supported by SSH stores).", .handler = {&substitute, Substitute}, }); realiseMode = Realise::Outputs; } std::string description() override { return "copy paths between Nix stores"; } std::string doc() override { return #include "copy.md" ; } Category category() override { return catSecondary; } void run(ref<Store> srcStore, BuiltPaths && paths) override { auto dstStore = getDstStore(); RealisedPath::Set stuffToCopy; for (auto & builtPath : paths) { auto theseRealisations = builtPath.toRealisedPaths(*srcStore); stuffToCopy.insert(theseRealisations.begin(), theseRealisations.end()); } copyPaths( *srcStore, *dstStore, stuffToCopy, NoRepair, checkSigs, substitute); } }; static auto rCmdCopy = registerCommand<CmdCopy>("copy");
1,617
C++
.cc
48
26.0625
113
0.627653
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,758
verify.cc
NixOS_nix/src/nix/verify.cc
#include "command.hh" #include "shared.hh" #include "store-api.hh" #include "thread-pool.hh" #include "signals.hh" #include "keys.hh" #include <atomic> #include "exit.hh" using namespace nix; struct CmdVerify : StorePathsCommand { bool noContents = false; bool noTrust = false; Strings substituterUris; size_t sigsNeeded = 0; CmdVerify() { addFlag({ .longName = "no-contents", .description = "Do not verify the contents of each store path.", .handler = {&noContents, true}, }); addFlag({ .longName = "no-trust", .description = "Do not verify whether each store path is trusted.", .handler = {&noTrust, true}, }); addFlag({ .longName = "substituter", .shortName = 's', .description = "Use signatures from the specified store.", .labels = {"store-uri"}, .handler = {[&](std::string s) { substituterUris.push_back(s); }} }); addFlag({ .longName = "sigs-needed", .shortName = 'n', .description = "Require that each path is signed by at least *n* different keys.", .labels = {"n"}, .handler = {&sigsNeeded} }); } std::string description() override { return "verify the integrity of store paths"; } std::string doc() override { return #include "verify.md" ; } void run(ref<Store> store, StorePaths && storePaths) override { std::vector<ref<Store>> substituters; for (auto & s : substituterUris) substituters.push_back(openStore(s)); auto publicKeys = getDefaultPublicKeys(); Activity act(*logger, actVerifyPaths); std::atomic<size_t> done{0}; std::atomic<size_t> untrusted{0}; std::atomic<size_t> corrupted{0}; std::atomic<size_t> failed{0}; std::atomic<size_t> active{0}; auto update = [&]() { act.progress(done, storePaths.size(), active, failed); }; ThreadPool pool; auto doPath = [&](const StorePath & storePath) { try { checkInterrupt(); MaintainCount<std::atomic<size_t>> mcActive(active); update(); auto info = store->queryPathInfo(storePath); // Note: info->path can be different from storePath // for binary cache stores when using --all (since we // can't enumerate names efficiently). Activity act2(*logger, lvlInfo, actUnknown, fmt("checking '%s'", store->printStorePath(info->path))); if (!noContents) { auto hashSink = HashSink(info->narHash.algo); store->narFromPath(info->path, hashSink); auto hash = hashSink.finish(); if (hash.first != info->narHash) { corrupted++; act2.result(resCorruptedPath, store->printStorePath(info->path)); printError("path '%s' was modified! expected hash '%s', got '%s'", store->printStorePath(info->path), info->narHash.to_string(HashFormat::Nix32, true), hash.first.to_string(HashFormat::Nix32, true)); } } if (!noTrust) { bool good = false; if (info->ultimate && !sigsNeeded) good = true; else { StringSet sigsSeen; size_t actualSigsNeeded = std::max(sigsNeeded, (size_t) 1); size_t validSigs = 0; auto doSigs = [&](StringSet sigs) { for (auto sig : sigs) { if (!sigsSeen.insert(sig).second) continue; if (validSigs < ValidPathInfo::maxSigs && info->checkSignature(*store, publicKeys, sig)) validSigs++; } }; if (info->isContentAddressed(*store)) validSigs = ValidPathInfo::maxSigs; doSigs(info->sigs); for (auto & store2 : substituters) { if (validSigs >= actualSigsNeeded) break; try { auto info2 = store2->queryPathInfo(info->path); if (info2->isContentAddressed(*store)) validSigs = ValidPathInfo::maxSigs; doSigs(info2->sigs); } catch (InvalidPath &) { } catch (Error & e) { logError(e.info()); } } if (validSigs >= actualSigsNeeded) good = true; } if (!good) { untrusted++; act2.result(resUntrustedPath, store->printStorePath(info->path)); printError("path '%s' is untrusted", store->printStorePath(info->path)); } } done++; } catch (Error & e) { logError(e.info()); failed++; } update(); }; for (auto & storePath : storePaths) pool.enqueue(std::bind(doPath, storePath)); pool.process(); throw Exit( (corrupted ? 1 : 0) | (untrusted ? 2 : 0) | (failed ? 4 : 0)); } }; static auto rCmdVerify = registerCommand2<CmdVerify>({"store", "verify"});
5,951
C++
.cc
145
25.834483
120
0.474141
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,759
develop.cc
NixOS_nix/src/nix/develop.cc
#include "config-global.hh" #include "eval.hh" #include "installable-flake.hh" #include "command-installable-value.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "outputs-spec.hh" #include "derivations.hh" #include "progress-bar.hh" #ifndef _WIN32 // TODO re-enable on Windows # include "run.hh" #endif #include <iterator> #include <memory> #include <sstream> #include <nlohmann/json.hpp> #include <algorithm> #include "strings.hh" namespace nix::fs { using namespace std::filesystem; } using namespace nix; struct DevelopSettings : Config { Setting<std::string> bashPrompt{this, "", "bash-prompt", "The bash prompt (`PS1`) in `nix develop` shells."}; Setting<std::string> bashPromptPrefix{this, "", "bash-prompt-prefix", "Prefix prepended to the `PS1` environment variable in `nix develop` shells."}; Setting<std::string> bashPromptSuffix{this, "", "bash-prompt-suffix", "Suffix appended to the `PS1` environment variable in `nix develop` shells."}; }; static DevelopSettings developSettings; static GlobalConfig::Register rDevelopSettings(&developSettings); struct BuildEnvironment { struct String { bool exported; std::string value; bool operator == (const String & other) const { return exported == other.exported && value == other.value; } }; using Array = std::vector<std::string>; using Associative = std::map<std::string, std::string>; using Value = std::variant<String, Array, Associative>; std::map<std::string, Value> vars; std::map<std::string, std::string> bashFunctions; std::optional<std::pair<std::string, std::string>> structuredAttrs; static BuildEnvironment fromJSON(std::string_view in) { BuildEnvironment res; std::set<std::string> exported; auto json = nlohmann::json::parse(in); for (auto & [name, info] : json["variables"].items()) { std::string type = info["type"]; if (type == "var" || type == "exported") res.vars.insert({name, BuildEnvironment::String { .exported = type == "exported", .value = info["value"] }}); else if (type == "array") res.vars.insert({name, (Array) info["value"]}); else if (type == "associative") res.vars.insert({name, (Associative) info["value"]}); } for (auto & [name, def] : json["bashFunctions"].items()) { res.bashFunctions.insert({name, def}); } if (json.contains("structuredAttrs")) { res.structuredAttrs = {json["structuredAttrs"][".attrs.json"], json["structuredAttrs"][".attrs.sh"]}; } return res; } std::string toJSON() const { auto res = nlohmann::json::object(); auto vars2 = nlohmann::json::object(); for (auto & [name, value] : vars) { auto info = nlohmann::json::object(); if (auto str = std::get_if<String>(&value)) { info["type"] = str->exported ? "exported" : "var"; info["value"] = str->value; } else if (auto arr = std::get_if<Array>(&value)) { info["type"] = "array"; info["value"] = *arr; } else if (auto arr = std::get_if<Associative>(&value)) { info["type"] = "associative"; info["value"] = *arr; } vars2[name] = std::move(info); } res["variables"] = std::move(vars2); res["bashFunctions"] = bashFunctions; if (providesStructuredAttrs()) { auto contents = nlohmann::json::object(); contents[".attrs.sh"] = getAttrsSH(); contents[".attrs.json"] = getAttrsJSON(); res["structuredAttrs"] = std::move(contents); } auto json = res.dump(); assert(BuildEnvironment::fromJSON(json) == *this); return json; } bool providesStructuredAttrs() const { return structuredAttrs.has_value(); } std::string getAttrsJSON() const { assert(providesStructuredAttrs()); return structuredAttrs->first; } std::string getAttrsSH() const { assert(providesStructuredAttrs()); return structuredAttrs->second; } void toBash(std::ostream & out, const std::set<std::string> & ignoreVars) const { for (auto & [name, value] : vars) { if (!ignoreVars.count(name)) { if (auto str = std::get_if<String>(&value)) { out << fmt("%s=%s\n", name, shellEscape(str->value)); if (str->exported) out << fmt("export %s\n", name); } else if (auto arr = std::get_if<Array>(&value)) { out << "declare -a " << name << "=("; for (auto & s : *arr) out << shellEscape(s) << " "; out << ")\n"; } else if (auto arr = std::get_if<Associative>(&value)) { out << "declare -A " << name << "=("; for (auto & [n, v] : *arr) out << "[" << shellEscape(n) << "]=" << shellEscape(v) << " "; out << ")\n"; } } } for (auto & [name, def] : bashFunctions) { out << name << " ()\n{\n" << def << "}\n"; } } static std::string getString(const Value & value) { if (auto str = std::get_if<String>(&value)) return str->value; else throw Error("bash variable is not a string"); } static Associative getAssociative(const Value & value) { if (auto assoc = std::get_if<Associative>(&value)) return *assoc; else throw Error("bash variable is not an associative array"); } static Array getStrings(const Value & value) { if (auto str = std::get_if<String>(&value)) return tokenizeString<Array>(str->value); else if (auto arr = std::get_if<Array>(&value)) { return *arr; } else if (auto assoc = std::get_if<Associative>(&value)) { Array assocKeys; std::for_each(assoc->begin(), assoc->end(), [&](auto & n) { assocKeys.push_back(n.first); }); return assocKeys; } else throw Error("bash variable is not a string or array"); } bool operator == (const BuildEnvironment & other) const { return vars == other.vars && bashFunctions == other.bashFunctions; } std::string getSystem() const { if (auto v = get(vars, "system")) return getString(*v); else return settings.thisSystem; } }; const static std::string getEnvSh = #include "get-env.sh.gen.hh" ; /* Given an existing derivation, return the shell environment as initialised by stdenv's setup script. We do this by building a modified derivation with the same dependencies and nearly the same initial environment variables, that just writes the resulting environment to a file and exits. */ static StorePath getDerivationEnvironment(ref<Store> store, ref<Store> evalStore, const StorePath & drvPath) { auto drv = evalStore->derivationFromPath(drvPath); auto builder = baseNameOf(drv.builder); if (builder != "bash") throw Error("'nix develop' only works on derivations that use 'bash' as their builder"); auto getEnvShPath = ({ StringSource source { getEnvSh }; evalStore->addToStoreFromDump( source, "get-env.sh", FileSerialisationMethod::Flat, ContentAddressMethod::Raw::Text, HashAlgorithm::SHA256, {}); }); drv.args = {store->printStorePath(getEnvShPath)}; /* Remove derivation checks. */ drv.env.erase("allowedReferences"); drv.env.erase("allowedRequisites"); drv.env.erase("disallowedReferences"); drv.env.erase("disallowedRequisites"); drv.env.erase("name"); /* Rehash and write the derivation. FIXME: would be nice to use 'buildDerivation', but that's privileged. */ drv.name += "-env"; drv.env.emplace("name", drv.name); drv.inputSrcs.insert(std::move(getEnvShPath)); if (experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) { for (auto & output : drv.outputs) { output.second = DerivationOutput::Deferred {}, drv.env[output.first] = hashPlaceholder(output.first); } } else { for (auto & output : drv.outputs) { output.second = DerivationOutput::Deferred { }; drv.env[output.first] = ""; } auto hashesModulo = hashDerivationModulo(*evalStore, drv, true); for (auto & output : drv.outputs) { Hash h = hashesModulo.hashes.at(output.first); auto outPath = store->makeOutputPath(output.first, h, drv.name); output.second = DerivationOutput::InputAddressed { .path = outPath, }; drv.env[output.first] = store->printStorePath(outPath); } } auto shellDrvPath = writeDerivation(*evalStore, drv); /* Build the derivation. */ store->buildPaths( { DerivedPath::Built { .drvPath = makeConstantStorePathRef(shellDrvPath), .outputs = OutputsSpec::All { }, }}, bmNormal, evalStore); for (auto & [_0, optPath] : evalStore->queryPartialDerivationOutputMap(shellDrvPath)) { assert(optPath); auto & outPath = *optPath; assert(store->isValidPath(outPath)); auto outPathS = store->toRealPath(outPath); if (lstat(outPathS).st_size) return outPath; } throw Error("get-env.sh failed to produce an environment"); } struct Common : InstallableCommand, MixProfile { std::set<std::string> ignoreVars{ "BASHOPTS", "HOME", // FIXME: don't ignore in pure mode? "NIX_BUILD_TOP", "NIX_ENFORCE_PURITY", "NIX_LOG_FD", "NIX_REMOTE", "PPID", "SHELLOPTS", "SSL_CERT_FILE", // FIXME: only want to ignore /no-cert-file.crt "TEMP", "TEMPDIR", "TERM", "TMP", "TMPDIR", "TZ", "UID", }; std::vector<std::pair<std::string, std::string>> redirects; Common() { addFlag({ .longName = "redirect", .description = "Redirect a store path to a mutable location.", .labels = {"installable", "outputs-dir"}, .handler = {[&](std::string installable, std::string outputsDir) { redirects.push_back({installable, outputsDir}); }} }); } std::string makeRcScript( ref<Store> store, const BuildEnvironment & buildEnvironment, const std::filesystem::path & tmpDir, const std::filesystem::path & outputsDir = fs::path { fs::current_path() } / "outputs") { // A list of colon-separated environment variables that should be // prepended to, rather than overwritten, in order to keep the shell usable. // Please keep this list minimal in order to avoid impurities. static const char * const savedVars[] = { "PATH", // for commands "XDG_DATA_DIRS", // for loadable completion }; std::ostringstream out; out << "unset shellHook\n"; for (auto & var : savedVars) { out << fmt("%s=${%s:-}\n", var, var); out << fmt("nix_saved_%s=\"$%s\"\n", var, var); } buildEnvironment.toBash(out, ignoreVars); for (auto & var : savedVars) out << fmt("%s=\"$%s${nix_saved_%s:+:$nix_saved_%s}\"\n", var, var, var, var); out << "export NIX_BUILD_TOP=\"$(mktemp -d -t nix-shell.XXXXXX)\"\n"; for (auto & i : {"TMP", "TMPDIR", "TEMP", "TEMPDIR"}) out << fmt("export %s=\"$NIX_BUILD_TOP\"\n", i); out << "eval \"${shellHook:-}\"\n"; auto script = out.str(); /* Substitute occurrences of output paths. */ auto outputs = buildEnvironment.vars.find("outputs"); assert(outputs != buildEnvironment.vars.end()); StringMap rewrites; if (buildEnvironment.providesStructuredAttrs()) { for (auto & [outputName, from] : BuildEnvironment::getAssociative(outputs->second)) { rewrites.insert({ from, (outputsDir / outputName).string() }); } } else { for (auto & outputName : BuildEnvironment::getStrings(outputs->second)) { auto from = buildEnvironment.vars.find(outputName); assert(from != buildEnvironment.vars.end()); rewrites.insert({ BuildEnvironment::getString(from->second), (outputsDir / outputName).string(), }); } } /* Substitute redirects. */ for (auto & [installable_, dir_] : redirects) { auto dir = absPath(dir_); auto installable = parseInstallable(store, installable_); auto builtPaths = Installable::toStorePathSet( getEvalStore(), store, Realise::Nothing, OperateOn::Output, {installable}); for (auto & path: builtPaths) { auto from = store->printStorePath(path); if (script.find(from) == std::string::npos) warn("'%s' (path '%s') is not used by this build environment", installable->what(), from); else { printInfo("redirecting '%s' to '%s'", from, dir); rewrites.insert({from, dir}); } } } if (buildEnvironment.providesStructuredAttrs()) { fixupStructuredAttrs( OS_STR("sh"), "NIX_ATTRS_SH_FILE", buildEnvironment.getAttrsSH(), rewrites, buildEnvironment, tmpDir ); fixupStructuredAttrs( OS_STR("json"), "NIX_ATTRS_JSON_FILE", buildEnvironment.getAttrsJSON(), rewrites, buildEnvironment, tmpDir ); } return rewriteStrings(script, rewrites); } /** * Replace the value of NIX_ATTRS_*_FILE (`/build/.attrs.*`) with a tmp file * that's accessible from the interactive shell session. */ void fixupStructuredAttrs( PathViewNG::string_view ext, const std::string & envVar, const std::string & content, StringMap & rewrites, const BuildEnvironment & buildEnvironment, const std::filesystem::path & tmpDir) { auto targetFilePath = tmpDir / OS_STR(".attrs."); targetFilePath += ext; writeFile(targetFilePath, content); auto fileInBuilderEnv = buildEnvironment.vars.find(envVar); assert(fileInBuilderEnv != buildEnvironment.vars.end()); rewrites.insert({BuildEnvironment::getString(fileInBuilderEnv->second), targetFilePath.string()}); } Strings getDefaultFlakeAttrPaths() override { Strings paths{ "devShells." + settings.thisSystem.get() + ".default", "devShell." + settings.thisSystem.get(), }; for (auto & p : SourceExprCommand::getDefaultFlakeAttrPaths()) paths.push_back(p); return paths; } Strings getDefaultFlakeAttrPathPrefixes() override { auto res = SourceExprCommand::getDefaultFlakeAttrPathPrefixes(); res.emplace_front("devShells." + settings.thisSystem.get() + "."); return res; } StorePath getShellOutPath(ref<Store> store, ref<Installable> installable) { auto path = installable->getStorePath(); if (path && hasSuffix(path->to_string(), "-env")) return *path; else { auto drvs = Installable::toDerivations(store, {installable}); if (drvs.size() != 1) throw Error("'%s' needs to evaluate to a single derivation, but it evaluated to %d derivations", installable->what(), drvs.size()); auto & drvPath = *drvs.begin(); return getDerivationEnvironment(store, getEvalStore(), drvPath); } } std::pair<BuildEnvironment, std::string> getBuildEnvironment(ref<Store> store, ref<Installable> installable) { auto shellOutPath = getShellOutPath(store, installable); auto strPath = store->printStorePath(shellOutPath); updateProfile(shellOutPath); debug("reading environment file '%s'", strPath); return {BuildEnvironment::fromJSON(readFile(store->toRealPath(shellOutPath))), strPath}; } }; struct CmdDevelop : Common, MixEnvironment { std::vector<std::string> command; std::optional<std::string> phase; CmdDevelop() { addFlag({ .longName = "command", .shortName = 'c', .description = "Instead of starting an interactive shell, start the specified command and arguments.", .labels = {"command", "args"}, .handler = {[&](std::vector<std::string> ss) { if (ss.empty()) throw UsageError("--command requires at least one argument"); command = ss; }} }); addFlag({ .longName = "phase", .description = "The stdenv phase to run (e.g. `build` or `configure`).", .labels = {"phase-name"}, .handler = {&phase}, }); addFlag({ .longName = "unpack", .description = "Run the `unpack` phase.", .handler = {&phase, {"unpack"}}, }); addFlag({ .longName = "configure", .description = "Run the `configure` phase.", .handler = {&phase, {"configure"}}, }); addFlag({ .longName = "build", .description = "Run the `build` phase.", .handler = {&phase, {"build"}}, }); addFlag({ .longName = "check", .description = "Run the `check` phase.", .handler = {&phase, {"check"}}, }); addFlag({ .longName = "install", .description = "Run the `install` phase.", .handler = {&phase, {"install"}}, }); addFlag({ .longName = "installcheck", .description = "Run the `installcheck` phase.", .handler = {&phase, {"installCheck"}}, }); } std::string description() override { return "run a bash shell that provides the build environment of a derivation"; } std::string doc() override { return #include "develop.md" ; } void run(ref<Store> store, ref<Installable> installable) override { auto [buildEnvironment, gcroot] = getBuildEnvironment(store, installable); auto [rcFileFd, rcFilePath] = createTempFile("nix-shell"); AutoDelete tmpDir(createTempDir("", "nix-develop"), true); auto script = makeRcScript(store, buildEnvironment, tmpDir); if (verbosity >= lvlDebug) script += "set -x\n"; script += fmt("command rm -f '%s'\n", rcFilePath); if (phase) { if (!command.empty()) throw UsageError("you cannot use both '--command' and '--phase'"); // FIXME: foundMakefile is set by buildPhase, need to get // rid of that. script += fmt("foundMakefile=1\n"); script += fmt("runHook %1%Phase\n", *phase); } else if (!command.empty()) { std::vector<std::string> args; args.reserve(command.size()); for (auto s : command) args.push_back(shellEscape(s)); script += fmt("exec %s\n", concatStringsSep(" ", args)); } else { script = "[ -n \"$PS1\" ] && [ -e ~/.bashrc ] && source ~/.bashrc;\nshopt -u expand_aliases\n" + script + "\nshopt -s expand_aliases\n"; if (developSettings.bashPrompt != "") script += fmt("[ -n \"$PS1\" ] && PS1=%s;\n", shellEscape(developSettings.bashPrompt.get())); if (developSettings.bashPromptPrefix != "") script += fmt("[ -n \"$PS1\" ] && PS1=%s\"$PS1\";\n", shellEscape(developSettings.bashPromptPrefix.get())); if (developSettings.bashPromptSuffix != "") script += fmt("[ -n \"$PS1\" ] && PS1+=%s;\n", shellEscape(developSettings.bashPromptSuffix.get())); } writeFull(rcFileFd.get(), script); setEnviron(); // prevent garbage collection until shell exits setEnv("NIX_GCROOT", gcroot.c_str()); Path shell = "bash"; try { auto state = getEvalState(); auto nixpkgsLockFlags = lockFlags; nixpkgsLockFlags.inputOverrides = {}; nixpkgsLockFlags.inputUpdates = {}; auto nixpkgs = defaultNixpkgsFlakeRef(); if (auto * i = dynamic_cast<const InstallableFlake *>(&*installable)) nixpkgs = i->nixpkgsFlakeRef(); auto bashInstallable = make_ref<InstallableFlake>( this, state, std::move(nixpkgs), "bashInteractive", ExtendedOutputsSpec::Default(), Strings{}, Strings{"legacyPackages." + settings.thisSystem.get() + "."}, nixpkgsLockFlags); bool found = false; for (auto & path : Installable::toStorePathSet(getEvalStore(), store, Realise::Outputs, OperateOn::Output, {bashInstallable})) { auto s = store->printStorePath(path) + "/bin/bash"; if (pathExists(s)) { shell = s; found = true; break; } } if (!found) throw Error("package 'nixpkgs#bashInteractive' does not provide a 'bin/bash'"); } catch (Error &) { ignoreExceptionExceptInterrupt(); } // Override SHELL with the one chosen for this environment. // This is to make sure the system shell doesn't leak into the build environment. setEnv("SHELL", shell.c_str()); #ifdef _WIN32 // TODO re-enable on Windows throw UnimplementedError("Cannot yet spawn processes on Windows"); #else // If running a phase or single command, don't want an interactive shell running after // Ctrl-C, so don't pass --rcfile auto args = phase || !command.empty() ? Strings{std::string(baseNameOf(shell)), rcFilePath} : Strings{std::string(baseNameOf(shell)), "--rcfile", rcFilePath}; // Need to chdir since phases assume in flake directory if (phase) { // chdir if installable is a flake of type git+file or path auto installableFlake = installable.dynamic_pointer_cast<InstallableFlake>(); if (installableFlake) { auto sourcePath = installableFlake->getLockedFlake()->flake.resolvedRef.input.getSourcePath(); if (sourcePath) { if (chdir(sourcePath->c_str()) == -1) { throw SysError("chdir to '%s' failed", *sourcePath); } } } } // Release our references to eval caches to ensure they are persisted to disk, because // we are about to exec out of this process without running C++ destructors. getEvalState()->evalCaches.clear(); execProgramInStore(store, UseLookupPath::Use, shell, args, buildEnvironment.getSystem()); #endif } }; struct CmdPrintDevEnv : Common, MixJSON { std::string description() override { return "print shell code that can be sourced by bash to reproduce the build environment of a derivation"; } std::string doc() override { return #include "print-dev-env.md" ; } Category category() override { return catUtility; } void run(ref<Store> store, ref<Installable> installable) override { auto buildEnvironment = getBuildEnvironment(store, installable).first; stopProgressBar(); if (json) { logger->writeToStdout(buildEnvironment.toJSON()); } else { AutoDelete tmpDir(createTempDir("", "nix-dev-env"), true); logger->writeToStdout(makeRcScript(store, buildEnvironment, tmpDir)); } } }; static auto rCmdPrintDevEnv = registerCommand<CmdPrintDevEnv>("print-dev-env"); static auto rCmdDevelop = registerCommand<CmdDevelop>("develop");
25,172
C++
.cc
620
30.535484
148
0.567346
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,760
eval.cc
NixOS_nix/src/nix/eval.cc
#include "command-installable-value.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "eval.hh" #include "eval-inline.hh" #include "value-to-json.hh" #include "progress-bar.hh" #include <nlohmann/json.hpp> using namespace nix; namespace nix::fs { using namespace std::filesystem; } struct CmdEval : MixJSON, InstallableValueCommand, MixReadOnlyOption { bool raw = false; std::optional<std::string> apply; std::optional<fs::path> writeTo; CmdEval() : InstallableValueCommand() { addFlag({ .longName = "raw", .description = "Print strings without quotes or escaping.", .handler = {&raw, true}, }); addFlag({ .longName = "apply", .description = "Apply the function *expr* to each argument.", .labels = {"expr"}, .handler = {&apply}, }); addFlag({ .longName = "write-to", .description = "Write a string or attrset of strings to *path*.", .labels = {"path"}, .handler = {&writeTo}, }); } std::string description() override { return "evaluate a Nix expression"; } std::string doc() override { return #include "eval.md" ; } Category category() override { return catSecondary; } void run(ref<Store> store, ref<InstallableValue> installable) override { if (raw && json) throw UsageError("--raw and --json are mutually exclusive"); auto state = getEvalState(); auto [v, pos] = installable->toValue(*state); NixStringContext context; if (apply) { auto vApply = state->allocValue(); state->eval(state->parseExprFromString(*apply, state->rootPath(".")), *vApply); auto vRes = state->allocValue(); state->callFunction(*vApply, *v, *vRes, noPos); v = vRes; } if (writeTo) { stopProgressBar(); if (fs::symlink_exists(*writeTo)) throw Error("path '%s' already exists", writeTo->string()); std::function<void(Value & v, const PosIdx pos, const fs::path & path)> recurse; recurse = [&](Value & v, const PosIdx pos, const fs::path & path) { state->forceValue(v, pos); if (v.type() == nString) // FIXME: disallow strings with contexts? writeFile(path.string(), v.string_view()); else if (v.type() == nAttrs) { [[maybe_unused]] bool directoryCreated = fs::create_directory(path); // Directory should not already exist assert(directoryCreated); for (auto & attr : *v.attrs()) { std::string_view name = state->symbols[attr.name]; try { if (name == "." || name == "..") throw Error("invalid file name '%s'", name); recurse(*attr.value, attr.pos, path / name); } catch (Error & e) { e.addTrace( state->positions[attr.pos], HintFmt("while evaluating the attribute '%s'", name)); throw; } } } else state->error<TypeError>("value at '%s' is not a string or an attribute set", state->positions[pos]).debugThrow(); }; recurse(*v, pos, *writeTo); } else if (raw) { stopProgressBar(); writeFull(getStandardOutput(), *state->coerceToString(noPos, *v, context, "while generating the eval command output")); } else if (json) { logger->cout("%s", printValueAsJSON(*state, true, *v, pos, context, false)); } else { logger->cout( "%s", ValuePrinter( *state, *v, PrintOptions { .force = true, .derivationPaths = true } ) ); } } }; static auto rCmdEval = registerCommand<CmdEval>("eval");
4,449
C++
.cc
118
25.118644
133
0.49559
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,761
cat.cc
NixOS_nix/src/nix/cat.cc
#include "command.hh" #include "store-api.hh" #include "nar-accessor.hh" #include "progress-bar.hh" using namespace nix; struct MixCat : virtual Args { std::string path; void cat(ref<SourceAccessor> accessor) { auto st = accessor->lstat(CanonPath(path)); if (st.type != SourceAccessor::Type::tRegular) throw Error("path '%1%' is not a regular file", path); stopProgressBar(); writeFull(getStandardOutput(), accessor->readFile(CanonPath(path))); } }; struct CmdCatStore : StoreCommand, MixCat { CmdCatStore() { expectArgs({ .label = "path", .handler = {&path}, .completer = completePath }); } std::string description() override { return "print the contents of a file in the Nix store on stdout"; } std::string doc() override { return #include "store-cat.md" ; } void run(ref<Store> store) override { cat(store->getFSAccessor()); } }; struct CmdCatNar : StoreCommand, MixCat { Path narPath; CmdCatNar() { expectArgs({ .label = "nar", .handler = {&narPath}, .completer = completePath }); expectArg("path", &path); } std::string description() override { return "print the contents of a file inside a NAR file on stdout"; } std::string doc() override { return #include "nar-cat.md" ; } void run(ref<Store> store) override { cat(makeNarAccessor(readFile(narPath))); } }; static auto rCmdCatStore = registerCommand2<CmdCatStore>({"store", "cat"}); static auto rCmdCatNar = registerCommand2<CmdCatNar>({"nar", "cat"});
1,785
C++
.cc
71
18.873239
76
0.593529
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,762
make-content-addressed.cc
NixOS_nix/src/nix/make-content-addressed.cc
#include "command.hh" #include "store-api.hh" #include "make-content-addressed.hh" #include "common-args.hh" #include <nlohmann/json.hpp> using namespace nix; using nlohmann::json; struct CmdMakeContentAddressed : virtual CopyCommand, virtual StorePathsCommand, MixJSON { CmdMakeContentAddressed() { realiseMode = Realise::Outputs; } std::string description() override { return "rewrite a path or closure to content-addressed form"; } std::string doc() override { return #include "make-content-addressed.md" ; } void run(ref<Store> srcStore, StorePaths && storePaths) override { auto dstStore = dstUri.empty() ? openStore() : openStore(dstUri); auto remappings = makeContentAddressed(*srcStore, *dstStore, StorePathSet(storePaths.begin(), storePaths.end())); if (json) { auto jsonRewrites = json::object(); for (auto & path : storePaths) { auto i = remappings.find(path); assert(i != remappings.end()); jsonRewrites[srcStore->printStorePath(path)] = srcStore->printStorePath(i->second); } auto json = json::object(); json["rewrites"] = jsonRewrites; logger->cout("%s", json); } else { for (auto & path : storePaths) { auto i = remappings.find(path); assert(i != remappings.end()); notice("rewrote '%s' to '%s'", srcStore->printStorePath(path), srcStore->printStorePath(i->second)); } } } }; static auto rCmdMakeContentAddressed = registerCommand2<CmdMakeContentAddressed>({"store", "make-content-addressed"});
1,796
C++
.cc
50
27.2
118
0.599654
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,763
flake.cc
NixOS_nix/src/nix/flake.cc
#include "command.hh" #include "installable-flake.hh" #include "common-args.hh" #include "shared.hh" #include "eval.hh" #include "eval-inline.hh" #include "eval-settings.hh" #include "flake/flake.hh" #include "get-drvs.hh" #include "signals.hh" #include "store-api.hh" #include "derivations.hh" #include "outputs-spec.hh" #include "attr-path.hh" #include "fetchers.hh" #include "registry.hh" #include "eval-cache.hh" #include "markdown.hh" #include "users.hh" #include <filesystem> #include <nlohmann/json.hpp> #include <iomanip> #include "strings-inline.hh" namespace nix::fs { using namespace std::filesystem; } using namespace nix; using namespace nix::flake; using json = nlohmann::json; struct CmdFlakeUpdate; class FlakeCommand : virtual Args, public MixFlakeOptions { protected: std::string flakeUrl = "."; public: FlakeCommand() { expectArgs({ .label = "flake-url", .optional = true, .handler = {&flakeUrl}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeRef(completions, getStore(), prefix); }} }); } FlakeRef getFlakeRef() { return parseFlakeRef(fetchSettings, flakeUrl, fs::current_path().string()); //FIXME } LockedFlake lockFlake() { return flake::lockFlake(flakeSettings, *getEvalState(), getFlakeRef(), lockFlags); } std::vector<FlakeRef> getFlakeRefsForCompletion() override { return { // Like getFlakeRef but with expandTilde calld first parseFlakeRef(fetchSettings, expandTilde(flakeUrl), fs::current_path().string()) }; } }; struct CmdFlakeUpdate : FlakeCommand { public: std::string description() override { return "update flake lock file"; } CmdFlakeUpdate() { expectedArgs.clear(); addFlag({ .longName="flake", .description="The flake to operate on. Default is the current directory.", .labels={"flake-url"}, .handler={&flakeUrl}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeRef(completions, getStore(), prefix); }} }); expectArgs({ .label="inputs", .optional=true, .handler={[&](std::vector<std::string> inputsToUpdate){ for (auto inputToUpdate : inputsToUpdate) { InputPath inputPath; try { inputPath = flake::parseInputPath(inputToUpdate); } catch (Error & e) { warn("Invalid flake input '%s'. To update a specific flake, use 'nix flake update --flake %s' instead.", inputToUpdate, inputToUpdate); throw e; } if (lockFlags.inputUpdates.contains(inputPath)) warn("Input '%s' was specified multiple times. You may have done this by accident."); lockFlags.inputUpdates.insert(inputPath); } }}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeInputPath(completions, getEvalState(), getFlakeRefsForCompletion(), prefix); }} }); /* Remove flags that don't make sense. */ removeFlag("no-update-lock-file"); removeFlag("no-write-lock-file"); } std::string doc() override { return #include "flake-update.md" ; } void run(nix::ref<nix::Store> store) override { settings.tarballTtl = 0; auto updateAll = lockFlags.inputUpdates.empty(); lockFlags.recreateLockFile = updateAll; lockFlags.writeLockFile = true; lockFlags.applyNixConfig = true; lockFlake(); } }; struct CmdFlakeLock : FlakeCommand { std::string description() override { return "create missing lock file entries"; } CmdFlakeLock() { /* Remove flags that don't make sense. */ removeFlag("no-write-lock-file"); } std::string doc() override { return #include "flake-lock.md" ; } void run(nix::ref<nix::Store> store) override { settings.tarballTtl = 0; lockFlags.writeLockFile = true; lockFlags.applyNixConfig = true; lockFlake(); } }; static void enumerateOutputs(EvalState & state, Value & vFlake, std::function<void(std::string_view name, Value & vProvide, const PosIdx pos)> callback) { auto pos = vFlake.determinePos(noPos); state.forceAttrs(vFlake, pos, "while evaluating a flake to get its outputs"); auto aOutputs = vFlake.attrs()->get(state.symbols.create("outputs")); assert(aOutputs); state.forceAttrs(*aOutputs->value, pos, "while evaluating the outputs of a flake"); auto sHydraJobs = state.symbols.create("hydraJobs"); /* Hack: ensure that hydraJobs is evaluated before anything else. This way we can disable IFD for hydraJobs and then enable it for other outputs. */ if (auto attr = aOutputs->value->attrs()->get(sHydraJobs)) callback(state.symbols[attr->name], *attr->value, attr->pos); for (auto & attr : *aOutputs->value->attrs()) { if (attr.name != sHydraJobs) callback(state.symbols[attr.name], *attr.value, attr.pos); } } struct CmdFlakeMetadata : FlakeCommand, MixJSON { std::string description() override { return "show flake metadata"; } std::string doc() override { return #include "flake-metadata.md" ; } void run(nix::ref<nix::Store> store) override { auto lockedFlake = lockFlake(); auto & flake = lockedFlake.flake; // Currently, all flakes are in the Nix store via the rootFS accessor. auto storePath = store->printStorePath(sourcePathToStorePath(store, flake.path).first); if (json) { nlohmann::json j; if (flake.description) j["description"] = *flake.description; j["originalUrl"] = flake.originalRef.to_string(); j["original"] = fetchers::attrsToJSON(flake.originalRef.toAttrs()); j["resolvedUrl"] = flake.resolvedRef.to_string(); j["resolved"] = fetchers::attrsToJSON(flake.resolvedRef.toAttrs()); j["url"] = flake.lockedRef.to_string(); // FIXME: rename to lockedUrl // "locked" is a misnomer - this is the result of the // attempt to lock. j["locked"] = fetchers::attrsToJSON(flake.lockedRef.toAttrs()); if (auto rev = flake.lockedRef.input.getRev()) j["revision"] = rev->to_string(HashFormat::Base16, false); if (auto dirtyRev = fetchers::maybeGetStrAttr(flake.lockedRef.toAttrs(), "dirtyRev")) j["dirtyRevision"] = *dirtyRev; if (auto revCount = flake.lockedRef.input.getRevCount()) j["revCount"] = *revCount; if (auto lastModified = flake.lockedRef.input.getLastModified()) j["lastModified"] = *lastModified; j["path"] = storePath; j["locks"] = lockedFlake.lockFile.toJSON().first; if (auto fingerprint = lockedFlake.getFingerprint(store)) j["fingerprint"] = fingerprint->to_string(HashFormat::Base16, false); logger->cout("%s", j.dump()); } else { logger->cout( ANSI_BOLD "Resolved URL:" ANSI_NORMAL " %s", flake.resolvedRef.to_string()); if (flake.lockedRef.input.isLocked()) logger->cout( ANSI_BOLD "Locked URL:" ANSI_NORMAL " %s", flake.lockedRef.to_string()); if (flake.description) logger->cout( ANSI_BOLD "Description:" ANSI_NORMAL " %s", *flake.description); logger->cout( ANSI_BOLD "Path:" ANSI_NORMAL " %s", storePath); if (auto rev = flake.lockedRef.input.getRev()) logger->cout( ANSI_BOLD "Revision:" ANSI_NORMAL " %s", rev->to_string(HashFormat::Base16, false)); if (auto dirtyRev = fetchers::maybeGetStrAttr(flake.lockedRef.toAttrs(), "dirtyRev")) logger->cout( ANSI_BOLD "Revision:" ANSI_NORMAL " %s", *dirtyRev); if (auto revCount = flake.lockedRef.input.getRevCount()) logger->cout( ANSI_BOLD "Revisions:" ANSI_NORMAL " %s", *revCount); if (auto lastModified = flake.lockedRef.input.getLastModified()) logger->cout( ANSI_BOLD "Last modified:" ANSI_NORMAL " %s", std::put_time(std::localtime(&*lastModified), "%F %T")); if (auto fingerprint = lockedFlake.getFingerprint(store)) logger->cout( ANSI_BOLD "Fingerprint:" ANSI_NORMAL " %s", fingerprint->to_string(HashFormat::Base16, false)); if (!lockedFlake.lockFile.root->inputs.empty()) logger->cout(ANSI_BOLD "Inputs:" ANSI_NORMAL); std::set<ref<Node>> visited; std::function<void(const Node & node, const std::string & prefix)> recurse; recurse = [&](const Node & node, const std::string & prefix) { for (const auto & [i, input] : enumerate(node.inputs)) { bool last = i + 1 == node.inputs.size(); if (auto lockedNode = std::get_if<0>(&input.second)) { std::string lastModifiedStr = ""; if (auto lastModified = (*lockedNode)->lockedRef.input.getLastModified()) lastModifiedStr = fmt(" (%s)", std::put_time(std::gmtime(&*lastModified), "%F %T")); logger->cout("%s" ANSI_BOLD "%s" ANSI_NORMAL ": %s%s", prefix + (last ? treeLast : treeConn), input.first, (*lockedNode)->lockedRef, lastModifiedStr); bool firstVisit = visited.insert(*lockedNode).second; if (firstVisit) recurse(**lockedNode, prefix + (last ? treeNull : treeLine)); } else if (auto follows = std::get_if<1>(&input.second)) { logger->cout("%s" ANSI_BOLD "%s" ANSI_NORMAL " follows input '%s'", prefix + (last ? treeLast : treeConn), input.first, printInputPath(*follows)); } } }; visited.insert(lockedFlake.lockFile.root); recurse(*lockedFlake.lockFile.root, ""); } } }; struct CmdFlakeInfo : CmdFlakeMetadata { void run(nix::ref<nix::Store> store) override { warn("'nix flake info' is a deprecated alias for 'nix flake metadata'"); CmdFlakeMetadata::run(store); } }; struct CmdFlakeCheck : FlakeCommand { bool build = true; bool checkAllSystems = false; CmdFlakeCheck() { addFlag({ .longName = "no-build", .description = "Do not build checks.", .handler = {&build, false} }); addFlag({ .longName = "all-systems", .description = "Check the outputs for all systems.", .handler = {&checkAllSystems, true} }); } std::string description() override { return "check whether the flake evaluates and run its tests"; } std::string doc() override { return #include "flake-check.md" ; } void run(nix::ref<nix::Store> store) override { if (!build) { settings.readOnlyMode = true; evalSettings.enableImportFromDerivation.setDefault(false); } auto state = getEvalState(); lockFlags.applyNixConfig = true; auto flake = lockFlake(); auto localSystem = std::string(settings.thisSystem.get()); bool hasErrors = false; auto reportError = [&](const Error & e) { try { throw e; } catch (Interrupted & e) { throw; } catch (Error & e) { if (settings.keepGoing) { ignoreExceptionExceptInterrupt(); hasErrors = true; } else throw; } }; std::set<std::string> omittedSystems; // FIXME: rewrite to use EvalCache. auto resolve = [&] (PosIdx p) { return state->positions[p]; }; auto argHasName = [&] (Symbol arg, std::string_view expected) { std::string_view name = state->symbols[arg]; return name == expected || name == "_" || (hasPrefix(name, "_") && name.substr(1) == expected); }; auto checkSystemName = [&](std::string_view system, const PosIdx pos) { // FIXME: what's the format of "system"? if (system.find('-') == std::string::npos) reportError(Error("'%s' is not a valid system type, at %s", system, resolve(pos))); }; auto checkSystemType = [&](std::string_view system, const PosIdx pos) { if (!checkAllSystems && system != localSystem) { omittedSystems.insert(std::string(system)); return false; } else { return true; } }; auto checkDerivation = [&](const std::string & attrPath, Value & v, const PosIdx pos) -> std::optional<StorePath> { try { Activity act(*logger, lvlInfo, actUnknown, fmt("checking derivation %s", attrPath)); auto packageInfo = getDerivation(*state, v, false); if (!packageInfo) throw Error("flake attribute '%s' is not a derivation", attrPath); else { // FIXME: check meta attributes auto storePath = packageInfo->queryDrvPath(); if (storePath) { logger->log(lvlInfo, fmt("derivation evaluated to %s", store->printStorePath(storePath.value()))); } return storePath; } } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking the derivation '%s'", attrPath)); reportError(e); } return std::nullopt; }; std::vector<DerivedPath> drvPaths; auto checkApp = [&](const std::string & attrPath, Value & v, const PosIdx pos) { try { Activity act(*logger, lvlInfo, actUnknown, fmt("checking app '%s'", attrPath)); state->forceAttrs(v, pos, ""); if (auto attr = v.attrs()->get(state->symbols.create("type"))) state->forceStringNoCtx(*attr->value, attr->pos, ""); else throw Error("app '%s' lacks attribute 'type'", attrPath); if (auto attr = v.attrs()->get(state->symbols.create("program"))) { if (attr->name == state->symbols.create("program")) { NixStringContext context; state->forceString(*attr->value, context, attr->pos, ""); } } else throw Error("app '%s' lacks attribute 'program'", attrPath); if (auto attr = v.attrs()->get(state->symbols.create("meta"))) { state->forceAttrs(*attr->value, attr->pos, ""); if (auto dAttr = attr->value->attrs()->get(state->symbols.create("description"))) state->forceStringNoCtx(*dAttr->value, dAttr->pos, ""); else logWarning({ .msg = HintFmt("app '%s' lacks attribute 'meta.description'", attrPath), }); } else logWarning({ .msg = HintFmt("app '%s' lacks attribute 'meta'", attrPath), }); for (auto & attr : *v.attrs()) { std::string_view name(state->symbols[attr.name]); if (name != "type" && name != "program" && name != "meta") throw Error("app '%s' has unsupported attribute '%s'", attrPath, name); } } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking the app definition '%s'", attrPath)); reportError(e); } }; auto checkOverlay = [&](std::string_view attrPath, Value & v, const PosIdx pos) { try { Activity act(*logger, lvlInfo, actUnknown, fmt("checking overlay '%s'", attrPath)); state->forceValue(v, pos); if (!v.isLambda()) { throw Error("overlay is not a function, but %s instead", showType(v)); } if (v.payload.lambda.fun->hasFormals() || !argHasName(v.payload.lambda.fun->arg, "final")) throw Error("overlay does not take an argument named 'final'"); // FIXME: if we have a 'nixpkgs' input, use it to // evaluate the overlay. } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking the overlay '%s'", attrPath)); reportError(e); } }; auto checkModule = [&](std::string_view attrPath, Value & v, const PosIdx pos) { try { Activity act(*logger, lvlInfo, actUnknown, fmt("checking NixOS module '%s'", attrPath)); state->forceValue(v, pos); } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking the NixOS module '%s'", attrPath)); reportError(e); } }; std::function<void(std::string_view attrPath, Value & v, const PosIdx pos)> checkHydraJobs; checkHydraJobs = [&](std::string_view attrPath, Value & v, const PosIdx pos) { try { Activity act(*logger, lvlInfo, actUnknown, fmt("checking Hydra job '%s'", attrPath)); state->forceAttrs(v, pos, ""); if (state->isDerivation(v)) throw Error("jobset should not be a derivation at top-level"); for (auto & attr : *v.attrs()) { state->forceAttrs(*attr.value, attr.pos, ""); auto attrPath2 = concatStrings(attrPath, ".", state->symbols[attr.name]); if (state->isDerivation(*attr.value)) { Activity act(*logger, lvlInfo, actUnknown, fmt("checking Hydra job '%s'", attrPath2)); checkDerivation(attrPath2, *attr.value, attr.pos); } else checkHydraJobs(attrPath2, *attr.value, attr.pos); } } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking the Hydra jobset '%s'", attrPath)); reportError(e); } }; auto checkNixOSConfiguration = [&](const std::string & attrPath, Value & v, const PosIdx pos) { try { Activity act(*logger, lvlInfo, actUnknown, fmt("checking NixOS configuration '%s'", attrPath)); Bindings & bindings(*state->allocBindings(0)); auto vToplevel = findAlongAttrPath(*state, "config.system.build.toplevel", bindings, v).first; state->forceValue(*vToplevel, pos); if (!state->isDerivation(*vToplevel)) throw Error("attribute 'config.system.build.toplevel' is not a derivation"); } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking the NixOS configuration '%s'", attrPath)); reportError(e); } }; auto checkTemplate = [&](std::string_view attrPath, Value & v, const PosIdx pos) { try { Activity act(*logger, lvlInfo, actUnknown, fmt("checking template '%s'", attrPath)); state->forceAttrs(v, pos, ""); if (auto attr = v.attrs()->get(state->symbols.create("path"))) { if (attr->name == state->symbols.create("path")) { NixStringContext context; auto path = state->coerceToPath(attr->pos, *attr->value, context, ""); if (!path.pathExists()) throw Error("template '%s' refers to a non-existent path '%s'", attrPath, path); // TODO: recursively check the flake in 'path'. } } else throw Error("template '%s' lacks attribute 'path'", attrPath); if (auto attr = v.attrs()->get(state->symbols.create("description"))) state->forceStringNoCtx(*attr->value, attr->pos, ""); else throw Error("template '%s' lacks attribute 'description'", attrPath); for (auto & attr : *v.attrs()) { std::string_view name(state->symbols[attr.name]); if (name != "path" && name != "description" && name != "welcomeText") throw Error("template '%s' has unsupported attribute '%s'", attrPath, name); } } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking the template '%s'", attrPath)); reportError(e); } }; auto checkBundler = [&](const std::string & attrPath, Value & v, const PosIdx pos) { try { Activity act(*logger, lvlInfo, actUnknown, fmt("checking bundler '%s'", attrPath)); state->forceValue(v, pos); if (!v.isLambda()) throw Error("bundler must be a function"); // TODO: check types of inputs/outputs? } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking the template '%s'", attrPath)); reportError(e); } }; { Activity act(*logger, lvlInfo, actUnknown, "evaluating flake"); auto vFlake = state->allocValue(); flake::callFlake(*state, flake, *vFlake); enumerateOutputs(*state, *vFlake, [&](std::string_view name, Value & vOutput, const PosIdx pos) { Activity act(*logger, lvlInfo, actUnknown, fmt("checking flake output '%s'", name)); try { evalSettings.enableImportFromDerivation.setDefault(name != "hydraJobs"); state->forceValue(vOutput, pos); std::string_view replacement = name == "defaultPackage" ? "packages.<system>.default" : name == "defaultApp" ? "apps.<system>.default" : name == "defaultTemplate" ? "templates.default" : name == "defaultBundler" ? "bundlers.<system>.default" : name == "overlay" ? "overlays.default" : name == "devShell" ? "devShells.<system>.default" : name == "nixosModule" ? "nixosModules.default" : ""; if (replacement != "") warn("flake output attribute '%s' is deprecated; use '%s' instead", name, replacement); if (name == "checks") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { std::string_view attr_name = state->symbols[attr.name]; checkSystemName(attr_name, attr.pos); if (checkSystemType(attr_name, attr.pos)) { state->forceAttrs(*attr.value, attr.pos, ""); for (auto & attr2 : *attr.value->attrs()) { auto drvPath = checkDerivation( fmt("%s.%s.%s", name, attr_name, state->symbols[attr2.name]), *attr2.value, attr2.pos); if (drvPath && attr_name == settings.thisSystem.get()) { drvPaths.push_back(DerivedPath::Built { .drvPath = makeConstantStorePathRef(*drvPath), .outputs = OutputsSpec::All { }, }); } } } } } else if (name == "formatter") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { const auto & attr_name = state->symbols[attr.name]; checkSystemName(attr_name, attr.pos); if (checkSystemType(attr_name, attr.pos)) { checkDerivation( fmt("%s.%s", name, attr_name), *attr.value, attr.pos); }; } } else if (name == "packages" || name == "devShells") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { const auto & attr_name = state->symbols[attr.name]; checkSystemName(attr_name, attr.pos); if (checkSystemType(attr_name, attr.pos)) { state->forceAttrs(*attr.value, attr.pos, ""); for (auto & attr2 : *attr.value->attrs()) checkDerivation( fmt("%s.%s.%s", name, attr_name, state->symbols[attr2.name]), *attr2.value, attr2.pos); }; } } else if (name == "apps") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { const auto & attr_name = state->symbols[attr.name]; checkSystemName(attr_name, attr.pos); if (checkSystemType(attr_name, attr.pos)) { state->forceAttrs(*attr.value, attr.pos, ""); for (auto & attr2 : *attr.value->attrs()) checkApp( fmt("%s.%s.%s", name, attr_name, state->symbols[attr2.name]), *attr2.value, attr2.pos); }; } } else if (name == "defaultPackage" || name == "devShell") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { const auto & attr_name = state->symbols[attr.name]; checkSystemName(attr_name, attr.pos); if (checkSystemType(attr_name, attr.pos)) { checkDerivation( fmt("%s.%s", name, attr_name), *attr.value, attr.pos); }; } } else if (name == "defaultApp") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { const auto & attr_name = state->symbols[attr.name]; checkSystemName(attr_name, attr.pos); if (checkSystemType(attr_name, attr.pos) ) { checkApp( fmt("%s.%s", name, attr_name), *attr.value, attr.pos); }; } } else if (name == "legacyPackages") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { checkSystemName(state->symbols[attr.name], attr.pos); checkSystemType(state->symbols[attr.name], attr.pos); // FIXME: do getDerivations? } } else if (name == "overlay") checkOverlay(name, vOutput, pos); else if (name == "overlays") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) checkOverlay(fmt("%s.%s", name, state->symbols[attr.name]), *attr.value, attr.pos); } else if (name == "nixosModule") checkModule(name, vOutput, pos); else if (name == "nixosModules") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) checkModule(fmt("%s.%s", name, state->symbols[attr.name]), *attr.value, attr.pos); } else if (name == "nixosConfigurations") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) checkNixOSConfiguration(fmt("%s.%s", name, state->symbols[attr.name]), *attr.value, attr.pos); } else if (name == "hydraJobs") checkHydraJobs(name, vOutput, pos); else if (name == "defaultTemplate") checkTemplate(name, vOutput, pos); else if (name == "templates") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) checkTemplate(fmt("%s.%s", name, state->symbols[attr.name]), *attr.value, attr.pos); } else if (name == "defaultBundler") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { const auto & attr_name = state->symbols[attr.name]; checkSystemName(attr_name, attr.pos); if (checkSystemType(attr_name, attr.pos)) { checkBundler( fmt("%s.%s", name, attr_name), *attr.value, attr.pos); }; } } else if (name == "bundlers") { state->forceAttrs(vOutput, pos, ""); for (auto & attr : *vOutput.attrs()) { const auto & attr_name = state->symbols[attr.name]; checkSystemName(attr_name, attr.pos); if (checkSystemType(attr_name, attr.pos)) { state->forceAttrs(*attr.value, attr.pos, ""); for (auto & attr2 : *attr.value->attrs()) { checkBundler( fmt("%s.%s.%s", name, attr_name, state->symbols[attr2.name]), *attr2.value, attr2.pos); } }; } } else if ( name == "lib" || name == "darwinConfigurations" || name == "darwinModules" || name == "flakeModule" || name == "flakeModules" || name == "herculesCI" || name == "homeConfigurations" || name == "homeModule" || name == "homeModules" || name == "nixopsConfigurations" ) // Known but unchecked community attribute ; else warn("unknown flake output '%s'", name); } catch (Error & e) { e.addTrace(resolve(pos), HintFmt("while checking flake output '%s'", name)); reportError(e); } }); } if (build && !drvPaths.empty()) { Activity act(*logger, lvlInfo, actUnknown, fmt("running %d flake checks", drvPaths.size())); store->buildPaths(drvPaths); } if (hasErrors) throw Error("some errors were encountered during the evaluation"); if (!omittedSystems.empty()) { // TODO: empty system is not visible; render all as nix strings? warn( "The check omitted these incompatible systems: %s\n" "Use '--all-systems' to check all.", concatStringsSep(", ", omittedSystems) ); }; }; }; static Strings defaultTemplateAttrPathsPrefixes{"templates."}; static Strings defaultTemplateAttrPaths = {"templates.default", "defaultTemplate"}; struct CmdFlakeInitCommon : virtual Args, EvalCommand { std::string templateUrl = "templates"; Path destDir; const LockFlags lockFlags{ .writeLockFile = false }; CmdFlakeInitCommon() { addFlag({ .longName = "template", .shortName = 't', .description = "The template to use.", .labels = {"template"}, .handler = {&templateUrl}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeRefWithFragment( completions, getEvalState(), lockFlags, defaultTemplateAttrPathsPrefixes, defaultTemplateAttrPaths, prefix); }} }); } void run(nix::ref<nix::Store> store) override { auto flakeDir = absPath(destDir); auto evalState = getEvalState(); auto [templateFlakeRef, templateName] = parseFlakeRefWithFragment( fetchSettings, templateUrl, fs::current_path().string()); auto installable = InstallableFlake(nullptr, evalState, std::move(templateFlakeRef), templateName, ExtendedOutputsSpec::Default(), defaultTemplateAttrPaths, defaultTemplateAttrPathsPrefixes, lockFlags); auto cursor = installable.getCursor(*evalState); auto templateDirAttr = cursor->getAttr("path"); auto templateDir = templateDirAttr->getString(); if (!store->isInStore(templateDir)) evalState->error<TypeError>( "'%s' was not found in the Nix store\n" "If you've set '%s' to a string, try using a path instead.", templateDir, templateDirAttr->getAttrPathStr()).debugThrow(); std::vector<fs::path> changedFiles; std::vector<fs::path> conflictedFiles; std::function<void(const fs::path & from, const fs::path & to)> copyDir; copyDir = [&](const fs::path & from, const fs::path & to) { fs::create_directories(to); for (auto & entry : fs::directory_iterator{from}) { checkInterrupt(); auto from2 = entry.path(); auto to2 = to / entry.path().filename(); auto st = entry.symlink_status(); auto to_st = fs::symlink_status(to2); if (fs::is_directory(st)) copyDir(from2, to2); else if (fs::is_regular_file(st)) { auto contents = readFile(from2.string()); if (fs::exists(to_st)) { auto contents2 = readFile(to2.string()); if (contents != contents2) { printError("refusing to overwrite existing file '%s'\n please merge it manually with '%s'", to2.string(), from2.string()); conflictedFiles.push_back(to2); } else { notice("skipping identical file: %s", from2); } continue; } else writeFile(to2, contents); } else if (fs::is_symlink(st)) { auto target = fs::read_symlink(from2); if (fs::exists(to_st)) { if (fs::read_symlink(to2) != target) { printError("refusing to overwrite existing file '%s'\n please merge it manually with '%s'", to2.string(), from2.string()); conflictedFiles.push_back(to2); } else { notice("skipping identical file: %s", from2); } continue; } else fs::create_symlink(target, to2); } else throw Error("file '%s' has unsupported type", from2); changedFiles.push_back(to2); notice("wrote: %s", to2); } }; copyDir(templateDir, flakeDir); if (!changedFiles.empty() && fs::exists(std::filesystem::path{flakeDir} / ".git")) { Strings args = { "-C", flakeDir, "add", "--intent-to-add", "--force", "--" }; for (auto & s : changedFiles) args.emplace_back(s.string()); runProgram("git", true, args); } auto welcomeText = cursor->maybeGetAttr("welcomeText"); if (welcomeText) { notice("\n"); notice(renderMarkdownToTerminal(welcomeText->getString())); } if (!conflictedFiles.empty()) throw Error("Encountered %d conflicts - see above", conflictedFiles.size()); } }; struct CmdFlakeInit : CmdFlakeInitCommon { std::string description() override { return "create a flake in the current directory from a template"; } std::string doc() override { return #include "flake-init.md" ; } CmdFlakeInit() { destDir = "."; } }; struct CmdFlakeNew : CmdFlakeInitCommon { std::string description() override { return "create a flake in the specified directory from a template"; } std::string doc() override { return #include "flake-new.md" ; } CmdFlakeNew() { expectArgs({ .label = "dest-dir", .handler = {&destDir}, .completer = completePath }); } }; struct CmdFlakeClone : FlakeCommand { Path destDir; std::string description() override { return "clone flake repository"; } std::string doc() override { return #include "flake-clone.md" ; } CmdFlakeClone() { addFlag({ .longName = "dest", .shortName = 'f', .description = "Clone the flake to path *dest*.", .labels = {"path"}, .handler = {&destDir} }); } void run(nix::ref<nix::Store> store) override { if (destDir.empty()) throw Error("missing flag '--dest'"); getFlakeRef().resolve(store).input.clone(destDir); } }; struct CmdFlakeArchive : FlakeCommand, MixJSON, MixDryRun { std::string dstUri; CmdFlakeArchive() { addFlag({ .longName = "to", .description = "URI of the destination Nix store", .labels = {"store-uri"}, .handler = {&dstUri} }); } std::string description() override { return "copy a flake and all its inputs to a store"; } std::string doc() override { return #include "flake-archive.md" ; } void run(nix::ref<nix::Store> store) override { auto flake = lockFlake(); StorePathSet sources; auto storePath = sourcePathToStorePath(store, flake.flake.path).first; sources.insert(storePath); // FIXME: use graph output, handle cycles. std::function<nlohmann::json(const Node & node)> traverse; traverse = [&](const Node & node) { nlohmann::json jsonObj2 = json ? json::object() : nlohmann::json(nullptr); for (auto & [inputName, input] : node.inputs) { if (auto inputNode = std::get_if<0>(&input)) { auto storePath = dryRun ? (*inputNode)->lockedRef.input.computeStorePath(*store) : (*inputNode)->lockedRef.input.fetchToStore(store).first; if (json) { auto& jsonObj3 = jsonObj2[inputName]; jsonObj3["path"] = store->printStorePath(storePath); sources.insert(std::move(storePath)); jsonObj3["inputs"] = traverse(**inputNode); } else { sources.insert(std::move(storePath)); traverse(**inputNode); } } } return jsonObj2; }; if (json) { nlohmann::json jsonRoot = { {"path", store->printStorePath(storePath)}, {"inputs", traverse(*flake.lockFile.root)}, }; logger->cout("%s", jsonRoot); } else { traverse(*flake.lockFile.root); } if (!dryRun && !dstUri.empty()) { ref<Store> dstStore = dstUri.empty() ? openStore() : openStore(dstUri); copyPaths(*store, *dstStore, sources); } } }; struct CmdFlakeShow : FlakeCommand, MixJSON { bool showLegacy = false; bool showAllSystems = false; CmdFlakeShow() { addFlag({ .longName = "legacy", .description = "Show the contents of the `legacyPackages` output.", .handler = {&showLegacy, true} }); addFlag({ .longName = "all-systems", .description = "Show the contents of outputs for all systems.", .handler = {&showAllSystems, true} }); } std::string description() override { return "show the outputs provided by a flake"; } std::string doc() override { return #include "flake-show.md" ; } void run(nix::ref<nix::Store> store) override { evalSettings.enableImportFromDerivation.setDefault(false); auto state = getEvalState(); auto flake = std::make_shared<LockedFlake>(lockFlake()); auto localSystem = std::string(settings.thisSystem.get()); std::function<bool( eval_cache::AttrCursor & visitor, const std::vector<Symbol> &attrPath, const Symbol &attr)> hasContent; // For frameworks it's important that structures are as lazy as possible // to prevent infinite recursions, performance issues and errors that // aren't related to the thing to evaluate. As a consequence, they have // to emit more attributes than strictly (sic) necessary. // However, these attributes with empty values are not useful to the user // so we omit them. hasContent = [&]( eval_cache::AttrCursor & visitor, const std::vector<Symbol> &attrPath, const Symbol &attr) -> bool { auto attrPath2(attrPath); attrPath2.push_back(attr); auto attrPathS = state->symbols.resolve(attrPath2); const auto & attrName = state->symbols[attr]; auto visitor2 = visitor.getAttr(attrName); try { if ((attrPathS[0] == "apps" || attrPathS[0] == "checks" || attrPathS[0] == "devShells" || attrPathS[0] == "legacyPackages" || attrPathS[0] == "packages") && (attrPathS.size() == 1 || attrPathS.size() == 2)) { for (const auto &subAttr : visitor2->getAttrs()) { if (hasContent(*visitor2, attrPath2, subAttr)) { return true; } } return false; } if ((attrPathS.size() == 1) && (attrPathS[0] == "formatter" || attrPathS[0] == "nixosConfigurations" || attrPathS[0] == "nixosModules" || attrPathS[0] == "overlays" )) { for (const auto &subAttr : visitor2->getAttrs()) { if (hasContent(*visitor2, attrPath2, subAttr)) { return true; } } return false; } // If we don't recognize it, it's probably content return true; } catch (EvalError & e) { // Some attrs may contain errors, e.g. legacyPackages of // nixpkgs. We still want to recurse into it, instead of // skipping it at all. return true; } }; std::function<nlohmann::json( eval_cache::AttrCursor & visitor, const std::vector<Symbol> & attrPath, const std::string & headerPrefix, const std::string & nextPrefix)> visit; visit = [&]( eval_cache::AttrCursor & visitor, const std::vector<Symbol> & attrPath, const std::string & headerPrefix, const std::string & nextPrefix) -> nlohmann::json { auto j = nlohmann::json::object(); auto attrPathS = state->symbols.resolve(attrPath); Activity act(*logger, lvlInfo, actUnknown, fmt("evaluating '%s'", concatStringsSep(".", attrPathS))); try { auto recurse = [&]() { if (!json) logger->cout("%s", headerPrefix); std::vector<Symbol> attrs; for (const auto &attr : visitor.getAttrs()) { if (hasContent(visitor, attrPath, attr)) attrs.push_back(attr); } for (const auto & [i, attr] : enumerate(attrs)) { const auto & attrName = state->symbols[attr]; bool last = i + 1 == attrs.size(); auto visitor2 = visitor.getAttr(attrName); auto attrPath2(attrPath); attrPath2.push_back(attr); auto j2 = visit(*visitor2, attrPath2, fmt(ANSI_GREEN "%s%s" ANSI_NORMAL ANSI_BOLD "%s" ANSI_NORMAL, nextPrefix, last ? treeLast : treeConn, attrName), nextPrefix + (last ? treeNull : treeLine)); if (json) j.emplace(attrName, std::move(j2)); } }; auto showDerivation = [&]() { auto name = visitor.getAttr(state->sName)->getString(); if (json) { std::optional<std::string> description; if (auto aMeta = visitor.maybeGetAttr(state->sMeta)) { if (auto aDescription = aMeta->maybeGetAttr(state->sDescription)) description = aDescription->getString(); } j.emplace("type", "derivation"); j.emplace("name", name); j.emplace("description", description ? *description : ""); } else { logger->cout("%s: %s '%s'", headerPrefix, attrPath.size() == 2 && attrPathS[0] == "devShell" ? "development environment" : attrPath.size() >= 2 && attrPathS[0] == "devShells" ? "development environment" : attrPath.size() == 3 && attrPathS[0] == "checks" ? "derivation" : attrPath.size() >= 1 && attrPathS[0] == "hydraJobs" ? "derivation" : "package", name); } }; if (attrPath.size() == 0 || (attrPath.size() == 1 && ( attrPathS[0] == "defaultPackage" || attrPathS[0] == "devShell" || attrPathS[0] == "formatter" || attrPathS[0] == "nixosConfigurations" || attrPathS[0] == "nixosModules" || attrPathS[0] == "defaultApp" || attrPathS[0] == "templates" || attrPathS[0] == "overlays")) || ((attrPath.size() == 1 || attrPath.size() == 2) && (attrPathS[0] == "checks" || attrPathS[0] == "packages" || attrPathS[0] == "devShells" || attrPathS[0] == "apps")) ) { recurse(); } else if ( (attrPath.size() == 2 && (attrPathS[0] == "defaultPackage" || attrPathS[0] == "devShell" || attrPathS[0] == "formatter")) || (attrPath.size() == 3 && (attrPathS[0] == "checks" || attrPathS[0] == "packages" || attrPathS[0] == "devShells")) ) { if (!showAllSystems && std::string(attrPathS[1]) != localSystem) { if (!json) logger->cout(fmt("%s " ANSI_WARNING "omitted" ANSI_NORMAL " (use '--all-systems' to show)", headerPrefix)); else { logger->warn(fmt("%s omitted (use '--all-systems' to show)", concatStringsSep(".", attrPathS))); } } else { if (visitor.isDerivation()) showDerivation(); else throw Error("expected a derivation"); } } else if (attrPath.size() > 0 && attrPathS[0] == "hydraJobs") { if (visitor.isDerivation()) showDerivation(); else recurse(); } else if (attrPath.size() > 0 && attrPathS[0] == "legacyPackages") { if (attrPath.size() == 1) recurse(); else if (!showLegacy){ if (!json) logger->cout(fmt("%s " ANSI_WARNING "omitted" ANSI_NORMAL " (use '--legacy' to show)", headerPrefix)); else { logger->warn(fmt("%s omitted (use '--legacy' to show)", concatStringsSep(".", attrPathS))); } } else if (!showAllSystems && std::string(attrPathS[1]) != localSystem) { if (!json) logger->cout(fmt("%s " ANSI_WARNING "omitted" ANSI_NORMAL " (use '--all-systems' to show)", headerPrefix)); else { logger->warn(fmt("%s omitted (use '--all-systems' to show)", concatStringsSep(".", attrPathS))); } } else { if (visitor.isDerivation()) showDerivation(); else if (attrPath.size() <= 2) // FIXME: handle recurseIntoAttrs recurse(); } } else if ( (attrPath.size() == 2 && attrPathS[0] == "defaultApp") || (attrPath.size() == 3 && attrPathS[0] == "apps")) { auto aType = visitor.maybeGetAttr("type"); std::optional<std::string> description; if (auto aMeta = visitor.maybeGetAttr(state->sMeta)) { if (auto aDescription = aMeta->maybeGetAttr(state->sDescription)) description = aDescription->getString(); } if (!aType || aType->getString() != "app") state->error<EvalError>("not an app definition").debugThrow(); if (json) { j.emplace("type", "app"); if (description) j.emplace("description", *description); } else { logger->cout("%s: app: " ANSI_BOLD "%s" ANSI_NORMAL, headerPrefix, description ? *description : "no description"); } } else if ( (attrPath.size() == 1 && attrPathS[0] == "defaultTemplate") || (attrPath.size() == 2 && attrPathS[0] == "templates")) { auto description = visitor.getAttr("description")->getString(); if (json) { j.emplace("type", "template"); j.emplace("description", description); } else { logger->cout("%s: template: " ANSI_BOLD "%s" ANSI_NORMAL, headerPrefix, description); } } else { auto [type, description] = (attrPath.size() == 1 && attrPathS[0] == "overlay") || (attrPath.size() == 2 && attrPathS[0] == "overlays") ? std::make_pair("nixpkgs-overlay", "Nixpkgs overlay") : attrPath.size() == 2 && attrPathS[0] == "nixosConfigurations" ? std::make_pair("nixos-configuration", "NixOS configuration") : (attrPath.size() == 1 && attrPathS[0] == "nixosModule") || (attrPath.size() == 2 && attrPathS[0] == "nixosModules") ? std::make_pair("nixos-module", "NixOS module") : std::make_pair("unknown", "unknown"); if (json) { j.emplace("type", type); } else { logger->cout("%s: " ANSI_WARNING "%s" ANSI_NORMAL, headerPrefix, description); } } } catch (EvalError & e) { if (!(attrPath.size() > 0 && attrPathS[0] == "legacyPackages")) throw; } return j; }; auto cache = openEvalCache(*state, flake); auto j = visit(*cache->getRoot(), {}, fmt(ANSI_BOLD "%s" ANSI_NORMAL, flake->flake.lockedRef), ""); if (json) logger->cout("%s", j.dump()); } }; struct CmdFlakePrefetch : FlakeCommand, MixJSON { CmdFlakePrefetch() { } std::string description() override { return "download the source tree denoted by a flake reference into the Nix store"; } std::string doc() override { return #include "flake-prefetch.md" ; } void run(ref<Store> store) override { auto originalRef = getFlakeRef(); auto resolvedRef = originalRef.resolve(store); auto [storePath, lockedRef] = resolvedRef.fetchTree(store); auto hash = store->queryPathInfo(storePath)->narHash; if (json) { auto res = nlohmann::json::object(); res["storePath"] = store->printStorePath(storePath); res["hash"] = hash.to_string(HashFormat::SRI, true); res["original"] = fetchers::attrsToJSON(resolvedRef.toAttrs()); res["locked"] = fetchers::attrsToJSON(lockedRef.toAttrs()); logger->cout(res.dump()); } else { notice("Downloaded '%s' to '%s' (hash '%s').", lockedRef.to_string(), store->printStorePath(storePath), hash.to_string(HashFormat::SRI, true)); } } }; struct CmdFlake : NixMultiCommand { CmdFlake() : NixMultiCommand( "flake", { {"update", []() { return make_ref<CmdFlakeUpdate>(); }}, {"lock", []() { return make_ref<CmdFlakeLock>(); }}, {"metadata", []() { return make_ref<CmdFlakeMetadata>(); }}, {"info", []() { return make_ref<CmdFlakeInfo>(); }}, {"check", []() { return make_ref<CmdFlakeCheck>(); }}, {"init", []() { return make_ref<CmdFlakeInit>(); }}, {"new", []() { return make_ref<CmdFlakeNew>(); }}, {"clone", []() { return make_ref<CmdFlakeClone>(); }}, {"archive", []() { return make_ref<CmdFlakeArchive>(); }}, {"show", []() { return make_ref<CmdFlakeShow>(); }}, {"prefetch", []() { return make_ref<CmdFlakePrefetch>(); }}, }) { } std::string description() override { return "manage Nix flakes"; } std::string doc() override { return #include "flake.md" ; } void run() override { experimentalFeatureSettings.require(Xp::Flakes); NixMultiCommand::run(); } }; static auto rCmdFlake = registerCommand<CmdFlake>("flake");
60,716
C++
.cc
1,328
29.236446
159
0.471504
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,764
fmt.cc
NixOS_nix/src/nix/fmt.cc
#include "command.hh" #include "installable-value.hh" #include "eval.hh" #include "run.hh" using namespace nix; struct CmdFmt : SourceExprCommand { std::vector<std::string> args; CmdFmt() { expectArgs({.label = "args", .handler = {&args}}); } std::string description() override { return "reformat your code in the standard style"; } std::string doc() override { return #include "fmt.md" ; } Category category() override { return catSecondary; } Strings getDefaultFlakeAttrPaths() override { return Strings{"formatter." + settings.thisSystem.get()}; } Strings getDefaultFlakeAttrPathPrefixes() override { return Strings{}; } void run(ref<Store> store) override { auto evalState = getEvalState(); auto evalStore = getEvalStore(); auto installable_ = parseInstallable(store, "."); auto & installable = InstallableValue::require(*installable_); auto app = installable.toApp(*evalState).resolve(evalStore, store); Strings programArgs{app.program}; // Propagate arguments from the CLI for (auto &i : args) { programArgs.push_back(i); } // Release our references to eval caches to ensure they are persisted to disk, because // we are about to exec out of this process without running C++ destructors. evalState->evalCaches.clear(); execProgramInStore(store, UseLookupPath::DontUse, app.program, programArgs); }; }; static auto r2 = registerCommand<CmdFmt>("fmt");
1,584
C++
.cc
40
32.925
94
0.663179
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,765
run.cc
NixOS_nix/src/nix/run.cc
#include "current-process.hh" #include "run.hh" #include "command-installable-value.hh" #include "common-args.hh" #include "shared.hh" #include "signals.hh" #include "store-api.hh" #include "derivations.hh" #include "local-fs-store.hh" #include "finally.hh" #include "source-accessor.hh" #include "progress-bar.hh" #include "eval.hh" #include <filesystem> #if __linux__ # include <sys/mount.h> # include "personality.hh" #endif #include <queue> namespace nix::fs { using namespace std::filesystem; } using namespace nix; std::string chrootHelperName = "__run_in_chroot"; namespace nix { void execProgramInStore(ref<Store> store, UseLookupPath useLookupPath, const std::string & program, const Strings & args, std::optional<std::string_view> system) { stopProgressBar(); restoreProcessContext(); /* If this is a diverted store (i.e. its "logical" location (typically /nix/store) differs from its "physical" location (e.g. /home/eelco/nix/store), then run the command in a chroot. For non-root users, this requires running it in new mount and user namespaces. Unfortunately, unshare(CLONE_NEWUSER) doesn't work in a multithreaded program (which "nix" is), so we exec() a single-threaded helper program (chrootHelper() below) to do the work. */ auto store2 = store.dynamic_pointer_cast<LocalFSStore>(); if (!store2) throw Error("store '%s' is not a local store so it does not support command execution", store->getUri()); if (store->storeDir != store2->getRealStoreDir()) { Strings helperArgs = { chrootHelperName, store->storeDir, store2->getRealStoreDir(), std::string(system.value_or("")), program }; for (auto & arg : args) helperArgs.push_back(arg); execv(getSelfExe().value_or("nix").c_str(), stringsToCharPtrs(helperArgs).data()); throw SysError("could not execute chroot helper"); } #if __linux__ if (system) linux::setPersonality(*system); #endif if (useLookupPath == UseLookupPath::Use) execvp(program.c_str(), stringsToCharPtrs(args).data()); else execv(program.c_str(), stringsToCharPtrs(args).data()); throw SysError("unable to execute '%s'", program); } } struct CmdRun : InstallableValueCommand, MixEnvironment { using InstallableCommand::run; std::vector<std::string> args; CmdRun() { expectArgs({ .label = "args", .handler = {&args}, .completer = completePath }); } std::string description() override { return "run a Nix application"; } std::string doc() override { return #include "run.md" ; } Strings getDefaultFlakeAttrPaths() override { Strings res{ "apps." + settings.thisSystem.get() + ".default", "defaultApp." + settings.thisSystem.get(), }; for (auto & s : SourceExprCommand::getDefaultFlakeAttrPaths()) res.push_back(s); return res; } Strings getDefaultFlakeAttrPathPrefixes() override { Strings res{"apps." + settings.thisSystem.get() + "."}; for (auto & s : SourceExprCommand::getDefaultFlakeAttrPathPrefixes()) res.push_back(s); return res; } void run(ref<Store> store, ref<InstallableValue> installable) override { auto state = getEvalState(); lockFlags.applyNixConfig = true; auto app = installable->toApp(*state).resolve(getEvalStore(), store); Strings allArgs{app.program}; for (auto & i : args) allArgs.push_back(i); // Release our references to eval caches to ensure they are persisted to disk, because // we are about to exec out of this process without running C++ destructors. state->evalCaches.clear(); setEnviron(); execProgramInStore(store, UseLookupPath::DontUse, app.program, allArgs); } }; static auto rCmdRun = registerCommand<CmdRun>("run"); void chrootHelper(int argc, char * * argv) { int p = 1; std::string storeDir = argv[p++]; std::string realStoreDir = argv[p++]; std::string system = argv[p++]; std::string cmd = argv[p++]; Strings args; while (p < argc) args.push_back(argv[p++]); #if __linux__ uid_t uid = getuid(); uid_t gid = getgid(); if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == -1) /* Try with just CLONE_NEWNS in case user namespaces are specifically disabled. */ if (unshare(CLONE_NEWNS) == -1) throw SysError("setting up a private mount namespace"); /* Bind-mount realStoreDir on /nix/store. If the latter mount point doesn't already exists, we have to create a chroot environment containing the mount point and bind mounts for the children of /. Overlayfs for user namespaces is fixed in Linux since ac519625ed (v5.11, 14 February 2021) */ if (!pathExists(storeDir)) { // FIXME: Use overlayfs? fs::path tmpDir = createTempDir(); createDirs(tmpDir + storeDir); if (mount(realStoreDir.c_str(), (tmpDir + storeDir).c_str(), "", MS_BIND, 0) == -1) throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir); for (auto entry : fs::directory_iterator{"/"}) { checkInterrupt(); auto src = entry.path(); fs::path dst = tmpDir / entry.path().filename(); if (pathExists(dst)) continue; auto st = entry.symlink_status(); if (fs::is_directory(st)) { if (mkdir(dst.c_str(), 0700) == -1) throw SysError("creating directory '%s'", dst); if (mount(src.c_str(), dst.c_str(), "", MS_BIND | MS_REC, 0) == -1) throw SysError("mounting '%s' on '%s'", src, dst); } else if (fs::is_symlink(st)) createSymlink(readLink(src), dst); } char * cwd = getcwd(0, 0); if (!cwd) throw SysError("getting current directory"); Finally freeCwd([&]() { free(cwd); }); if (chroot(tmpDir.c_str()) == -1) throw SysError("chrooting into '%s'", tmpDir); if (chdir(cwd) == -1) throw SysError("chdir to '%s' in chroot", cwd); } else if (mount("overlay", storeDir.c_str(), "overlay", MS_MGC_VAL, fmt("lowerdir=%s:%s", storeDir, realStoreDir).c_str()) == -1) if (mount(realStoreDir.c_str(), storeDir.c_str(), "", MS_BIND, 0) == -1) throw SysError("mounting '%s' on '%s'", realStoreDir, storeDir); writeFile(fs::path{"/proc/self/setgroups"}, "deny"); writeFile(fs::path{"/proc/self/uid_map"}, fmt("%d %d %d", uid, uid, 1)); writeFile(fs::path{"/proc/self/gid_map"}, fmt("%d %d %d", gid, gid, 1)); #if __linux__ if (system != "") linux::setPersonality(system); #endif execvp(cmd.c_str(), stringsToCharPtrs(args).data()); throw SysError("unable to exec '%s'", cmd); #else throw Error("mounting the Nix store on '%s' is not supported on this platform", storeDir); #endif }
7,162
C++
.cc
181
32.635359
137
0.621719
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,766
nar.cc
NixOS_nix/src/nix/nar.cc
#include "command.hh" using namespace nix; struct CmdNar : NixMultiCommand { CmdNar() : NixMultiCommand("nar", RegisterCommand::getCommandsFor({"nar"})) { } std::string description() override { return "create or inspect NAR files"; } std::string doc() override { return #include "nar.md" ; } Category category() override { return catUtility; } }; static auto rCmdNar = registerCommand<CmdNar>("nar");
479
C++
.cc
19
20.105263
79
0.643172
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,767
env.cc
NixOS_nix/src/nix/env.cc
#include <unordered_set> #include <queue> #include "command.hh" #include "eval.hh" #include "run.hh" #include "strings.hh" #include "executable-path.hh" using namespace nix; struct CmdEnv : NixMultiCommand { CmdEnv() : NixMultiCommand("env", RegisterCommand::getCommandsFor({"env"})) { } std::string description() override { return "manipulate the process environment"; } Category category() override { return catUtility; } }; static auto rCmdEnv = registerCommand<CmdEnv>("env"); struct CmdShell : InstallablesCommand, MixEnvironment { using InstallablesCommand::run; std::vector<std::string> command = {getEnv("SHELL").value_or("bash")}; CmdShell() { addFlag( {.longName = "command", .shortName = 'c', .description = "Command and arguments to be executed, defaulting to `$SHELL`", .labels = {"command", "args"}, .handler = {[&](std::vector<std::string> ss) { if (ss.empty()) throw UsageError("--command requires at least one argument"); command = ss; }}}); } std::string description() override { return "run a shell in which the specified packages are available"; } std::string doc() override { return #include "shell.md" ; } void run(ref<Store> store, Installables && installables) override { auto outPaths = Installable::toStorePaths(getEvalStore(), store, Realise::Outputs, OperateOn::Output, installables); auto accessor = store->getFSAccessor(); std::unordered_set<StorePath> done; std::queue<StorePath> todo; for (auto & path : outPaths) todo.push(path); setEnviron(); std::vector<std::string> pathAdditions; while (!todo.empty()) { auto path = todo.front(); todo.pop(); if (!done.insert(path).second) continue; if (true) pathAdditions.push_back(store->printStorePath(path) + "/bin"); auto propPath = accessor->resolveSymlinks( CanonPath(store->printStorePath(path)) / "nix-support" / "propagated-user-env-packages"); if (auto st = accessor->maybeLstat(propPath); st && st->type == SourceAccessor::tRegular) { for (auto & p : tokenizeString<Paths>(accessor->readFile(propPath))) todo.push(store->parseStorePath(p)); } } // TODO: split losslessly; empty means . auto unixPath = ExecutablePath::load(); unixPath.directories.insert(unixPath.directories.begin(), pathAdditions.begin(), pathAdditions.end()); auto unixPathString = unixPath.render(); setEnvOs(OS_STR("PATH"), unixPathString.c_str()); Strings args; for (auto & arg : command) args.push_back(arg); // Release our references to eval caches to ensure they are persisted to disk, because // we are about to exec out of this process without running C++ destructors. getEvalState()->evalCaches.clear(); execProgramInStore(store, UseLookupPath::Use, *command.begin(), args); } }; static auto rCmdShell = registerCommand2<CmdShell>({"env", "shell"});
3,384
C++
.cc
91
28.791209
112
0.606793
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,768
search.cc
NixOS_nix/src/nix/search.cc
#include "command-installable-value.hh" #include "globals.hh" #include "eval.hh" #include "eval-inline.hh" #include "eval-settings.hh" #include "names.hh" #include "get-drvs.hh" #include "common-args.hh" #include "shared.hh" #include "eval-cache.hh" #include "attr-path.hh" #include "hilite.hh" #include "strings-inline.hh" #include <regex> #include <fstream> #include <nlohmann/json.hpp> #include "strings.hh" using namespace nix; using json = nlohmann::json; std::string wrap(std::string prefix, std::string s) { return concatStrings(prefix, s, ANSI_NORMAL); } struct CmdSearch : InstallableValueCommand, MixJSON { std::vector<std::string> res; std::vector<std::string> excludeRes; CmdSearch() { expectArgs("regex", &res); addFlag(Flag { .longName = "exclude", .shortName = 'e', .description = "Hide packages whose attribute path, name or description contain *regex*.", .labels = {"regex"}, .handler = {[this](std::string s) { excludeRes.push_back(s); }}, }); } std::string description() override { return "search for packages"; } std::string doc() override { return #include "search.md" ; } Strings getDefaultFlakeAttrPaths() override { return { "packages." + settings.thisSystem.get(), "legacyPackages." + settings.thisSystem.get() }; } void run(ref<Store> store, ref<InstallableValue> installable) override { settings.readOnlyMode = true; evalSettings.enableImportFromDerivation.setDefault(false); // Recommend "^" here instead of ".*" due to differences in resulting highlighting if (res.empty()) throw UsageError("Must provide at least one regex! To match all packages, use '%s'.", "nix search <installable> ^"); std::vector<std::regex> regexes; std::vector<std::regex> excludeRegexes; regexes.reserve(res.size()); excludeRegexes.reserve(excludeRes.size()); for (auto & re : res) regexes.push_back(std::regex(re, std::regex::extended | std::regex::icase)); for (auto & re : excludeRes) excludeRegexes.emplace_back(re, std::regex::extended | std::regex::icase); auto state = getEvalState(); std::optional<nlohmann::json> jsonOut; if (json) jsonOut = json::object(); uint64_t results = 0; std::function<void(eval_cache::AttrCursor & cursor, const std::vector<Symbol> & attrPath, bool initialRecurse)> visit; visit = [&](eval_cache::AttrCursor & cursor, const std::vector<Symbol> & attrPath, bool initialRecurse) { auto attrPathS = state->symbols.resolve(attrPath); Activity act(*logger, lvlInfo, actUnknown, fmt("evaluating '%s'", concatStringsSep(".", attrPathS))); try { auto recurse = [&]() { for (const auto & attr : cursor.getAttrs()) { auto cursor2 = cursor.getAttr(state->symbols[attr]); auto attrPath2(attrPath); attrPath2.push_back(attr); visit(*cursor2, attrPath2, false); } }; if (cursor.isDerivation()) { DrvName name(cursor.getAttr(state->sName)->getString()); auto aMeta = cursor.maybeGetAttr(state->sMeta); auto aDescription = aMeta ? aMeta->maybeGetAttr(state->sDescription) : nullptr; auto description = aDescription ? aDescription->getString() : ""; std::replace(description.begin(), description.end(), '\n', ' '); auto attrPath2 = concatStringsSep(".", attrPathS); std::vector<std::smatch> attrPathMatches; std::vector<std::smatch> descriptionMatches; std::vector<std::smatch> nameMatches; bool found = false; for (auto & regex : excludeRegexes) { if ( std::regex_search(attrPath2, regex) || std::regex_search(name.name, regex) || std::regex_search(description, regex)) return; } for (auto & regex : regexes) { found = false; auto addAll = [&found](std::sregex_iterator it, std::vector<std::smatch> & vec) { const auto end = std::sregex_iterator(); while (it != end) { vec.push_back(*it++); found = true; } }; addAll(std::sregex_iterator(attrPath2.begin(), attrPath2.end(), regex), attrPathMatches); addAll(std::sregex_iterator(name.name.begin(), name.name.end(), regex), nameMatches); addAll(std::sregex_iterator(description.begin(), description.end(), regex), descriptionMatches); if (!found) break; } if (found) { results++; if (json) { (*jsonOut)[attrPath2] = { {"pname", name.name}, {"version", name.version}, {"description", description}, }; } else { auto name2 = hiliteMatches(name.name, nameMatches, ANSI_GREEN, "\e[0;2m"); if (results > 1) logger->cout(""); logger->cout( "* %s%s", wrap("\e[0;1m", hiliteMatches(attrPath2, attrPathMatches, ANSI_GREEN, "\e[0;1m")), name.version != "" ? " (" + name.version + ")" : ""); if (description != "") logger->cout( " %s", hiliteMatches(description, descriptionMatches, ANSI_GREEN, ANSI_NORMAL)); } } } else if ( attrPath.size() == 0 || (attrPathS[0] == "legacyPackages" && attrPath.size() <= 2) || (attrPathS[0] == "packages" && attrPath.size() <= 2)) recurse(); else if (initialRecurse) recurse(); else if (attrPathS[0] == "legacyPackages" && attrPath.size() > 2) { auto attr = cursor.maybeGetAttr(state->sRecurseForDerivations); if (attr && attr->getBool()) recurse(); } } catch (EvalError & e) { if (!(attrPath.size() > 0 && attrPathS[0] == "legacyPackages")) throw; } }; for (auto & cursor : installable->getCursors(*state)) visit(*cursor, cursor->getAttrPath(), true); if (json) logger->cout("%s", *jsonOut); if (!json && !results) throw Error("no results for the given search term(s)!"); } }; static auto rCmdSearch = registerCommand<CmdSearch>("search");
7,673
C++
.cc
173
29.271676
128
0.493301
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,769
log.cc
NixOS_nix/src/nix/log.cc
#include "command.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "log-store.hh" #include "progress-bar.hh" using namespace nix; struct CmdLog : InstallableCommand { std::string description() override { return "show the build log of the specified packages or paths, if available"; } std::string doc() override { return #include "log.md" ; } Category category() override { return catSecondary; } void run(ref<Store> store, ref<Installable> installable) override { settings.readOnlyMode = true; auto subs = getDefaultSubstituters(); subs.push_front(store); auto b = installable->toDerivedPath(); // For compat with CLI today, TODO revisit auto oneUp = std::visit(overloaded { [&](const DerivedPath::Opaque & bo) { return make_ref<SingleDerivedPath>(bo); }, [&](const DerivedPath::Built & bfd) { return bfd.drvPath; }, }, b.path.raw()); auto path = resolveDerivedPath(*store, *oneUp); RunPager pager; for (auto & sub : subs) { auto * logSubP = dynamic_cast<LogStore *>(&*sub); if (!logSubP) { printInfo("Skipped '%s' which does not support retrieving build logs", sub->getUri()); continue; } auto & logSub = *logSubP; auto log = logSub.getBuildLog(path); if (!log) continue; stopProgressBar(); printInfo("got build log for '%s' from '%s'", installable->what(), logSub.getUri()); writeFull(getStandardOutput(), *log); return; } throw Error("build log of '%s' is not available", installable->what()); } }; static auto rCmdLog = registerCommand<CmdLog>("log");
1,908
C++
.cc
55
26.109091
102
0.580978
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,770
config-check.cc
NixOS_nix/src/nix/config-check.cc
#include <sstream> #include "command.hh" #include "exit.hh" #include "logging.hh" #include "serve-protocol.hh" #include "shared.hh" #include "store-api.hh" #include "local-fs-store.hh" #include "worker-protocol.hh" #include "executable-path.hh" namespace nix::fs { using namespace std::filesystem; } using namespace nix; namespace { std::string formatProtocol(unsigned int proto) { if (proto) { auto major = GET_PROTOCOL_MAJOR(proto) >> 8; auto minor = GET_PROTOCOL_MINOR(proto); return fmt("%1%.%2%", major, minor); } return "unknown"; } bool checkPass(std::string_view msg) { notice(ANSI_GREEN "[PASS] " ANSI_NORMAL + msg); return true; } bool checkFail(std::string_view msg) { notice(ANSI_RED "[FAIL] " ANSI_NORMAL + msg); return false; } void checkInfo(std::string_view msg) { notice(ANSI_BLUE "[INFO] " ANSI_NORMAL + msg); } } struct CmdConfigCheck : StoreCommand { bool success = true; /** * This command is stable before the others */ std::optional<ExperimentalFeature> experimentalFeature() override { return std::nullopt; } std::string description() override { return "check your system for potential problems and print a PASS or FAIL for each check"; } Category category() override { return catNixInstallation; } void run(ref<Store> store) override { logger->log("Running checks against store uri: " + store->getUri()); if (store.dynamic_pointer_cast<LocalFSStore>()) { success &= checkNixInPath(); success &= checkProfileRoots(store); } success &= checkStoreProtocol(store->getProtocol()); checkTrustedUser(store); if (!success) throw Exit(2); } bool checkNixInPath() { std::set<fs::path> dirs; for (auto & dir : ExecutablePath::load().directories) { auto candidate = dir / "nix-env"; if (fs::exists(candidate)) dirs.insert(fs::canonical(candidate).parent_path() ); } if (dirs.size() != 1) { std::ostringstream ss; ss << "Multiple versions of nix found in PATH:\n"; for (auto & dir : dirs) ss << " " << dir << "\n"; return checkFail(toView(ss)); } return checkPass("PATH contains only one nix version."); } bool checkProfileRoots(ref<Store> store) { std::set<fs::path> dirs; for (auto & dir : ExecutablePath::load().directories) { auto profileDir = dir.parent_path(); try { auto userEnv = fs::weakly_canonical(profileDir); auto noContainsProfiles = [&]{ for (auto && part : profileDir) if (part == "profiles") return false; return true; }; if (store->isStorePath(userEnv.string()) && hasSuffix(userEnv.string(), "user-environment")) { while (noContainsProfiles() && std::filesystem::is_symlink(profileDir)) profileDir = fs::weakly_canonical( profileDir.parent_path() / fs::read_symlink(profileDir)); if (noContainsProfiles()) dirs.insert(dir); } } catch (SystemError &) { } catch (std::filesystem::filesystem_error &) {} } if (!dirs.empty()) { std::ostringstream ss; ss << "Found profiles outside of " << settings.nixStateDir << "/profiles.\n" << "The generation this profile points to might not have a gcroot and could be\n" << "garbage collected, resulting in broken symlinks.\n\n"; for (auto & dir : dirs) ss << " " << dir << "\n"; ss << "\n"; return checkFail(toView(ss)); } return checkPass("All profiles are gcroots."); } bool checkStoreProtocol(unsigned int storeProto) { unsigned int clientProto = GET_PROTOCOL_MAJOR(SERVE_PROTOCOL_VERSION) == GET_PROTOCOL_MAJOR(storeProto) ? SERVE_PROTOCOL_VERSION : PROTOCOL_VERSION; if (clientProto != storeProto) { std::ostringstream ss; ss << "Warning: protocol version of this client does not match the store.\n" << "While this is not necessarily a problem it's recommended to keep the client in\n" << "sync with the daemon.\n\n" << "Client protocol: " << formatProtocol(clientProto) << "\n" << "Store protocol: " << formatProtocol(storeProto) << "\n\n"; return checkFail(toView(ss)); } return checkPass("Client protocol matches store protocol."); } void checkTrustedUser(ref<Store> store) { if (auto trustedMay = store->isTrustedClient()) { std::string_view trusted = trustedMay.value() ? "trusted" : "not trusted"; checkInfo(fmt("You are %s by store uri: %s", trusted, store->getUri())); } else { checkInfo(fmt("Store uri: %s doesn't have a notion of trusted user", store->getUri())); } } }; static auto rCmdConfigCheck = registerCommand2<CmdConfigCheck>({ "config", "check" });
5,394
C++
.cc
141
29.085106
111
0.577284
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,771
main.cc
NixOS_nix/src/nix/main.cc
#include "args/root.hh" #include "current-process.hh" #include "command.hh" #include "common-args.hh" #include "eval.hh" #include "eval-settings.hh" #include "globals.hh" #include "legacy.hh" #include "shared.hh" #include "store-api.hh" #include "filetransfer.hh" #include "finally.hh" #include "loggers.hh" #include "markdown.hh" #include "memory-source-accessor.hh" #include "terminal.hh" #include "users.hh" #include "network-proxy.hh" #include "eval-cache.hh" #include "flake/flake.hh" #include "self-exe.hh" #include "json-utils.hh" #include <sys/types.h> #include <regex> #include <nlohmann/json.hpp> #ifndef _WIN32 # include <sys/socket.h> # include <ifaddrs.h> # include <netdb.h> # include <netinet/in.h> #endif #if __linux__ # include "namespaces.hh" #endif #ifndef _WIN32 extern std::string chrootHelperName; void chrootHelper(int argc, char * * argv); #endif #include "strings.hh" namespace nix { enum struct AliasStatus { /** Aliases that don't go away */ AcceptedShorthand, /** Aliases that will go away */ Deprecated, }; /** An alias, except for the original syntax, which is in the map key. */ struct AliasInfo { AliasStatus status; std::vector<std::string> replacement; }; /* Check if we have a non-loopback/link-local network interface. */ static bool haveInternet() { #ifndef _WIN32 struct ifaddrs * addrs; if (getifaddrs(&addrs)) return true; Finally free([&]() { freeifaddrs(addrs); }); for (auto i = addrs; i; i = i->ifa_next) { if (!i->ifa_addr) continue; if (i->ifa_addr->sa_family == AF_INET) { if (ntohl(((sockaddr_in *) i->ifa_addr)->sin_addr.s_addr) != INADDR_LOOPBACK) { return true; } } else if (i->ifa_addr->sa_family == AF_INET6) { if (!IN6_IS_ADDR_LOOPBACK(&((sockaddr_in6 *) i->ifa_addr)->sin6_addr) && !IN6_IS_ADDR_LINKLOCAL(&((sockaddr_in6 *) i->ifa_addr)->sin6_addr)) return true; } } if (haveNetworkProxyConnection()) return true; return false; #else // TODO implement on Windows return true; #endif } std::string programPath; struct NixArgs : virtual MultiCommand, virtual MixCommonArgs, virtual RootArgs { bool useNet = true; bool refresh = false; bool helpRequested = false; bool showVersion = false; NixArgs() : MultiCommand("", RegisterCommand::getCommandsFor({})), MixCommonArgs("nix") { categories.clear(); categories[catHelp] = "Help commands"; categories[Command::catDefault] = "Main commands"; categories[catSecondary] = "Infrequently used commands"; categories[catUtility] = "Utility/scripting commands"; categories[catNixInstallation] = "Commands for upgrading or troubleshooting your Nix installation"; addFlag({ .longName = "help", .description = "Show usage information.", .category = miscCategory, .handler = {[this]() { this->helpRequested = true; }}, }); addFlag({ .longName = "print-build-logs", .shortName = 'L', .description = "Print full build logs on standard error.", .category = loggingCategory, .handler = {[&]() { logger->setPrintBuildLogs(true); }}, .experimentalFeature = Xp::NixCommand, }); addFlag({ .longName = "version", .description = "Show version information.", .category = miscCategory, .handler = {[&]() { showVersion = true; }}, }); addFlag({ .longName = "offline", .aliases = {"no-net"}, // FIXME: remove .description = "Disable substituters and consider all previously downloaded files up-to-date.", .category = miscCategory, .handler = {[&]() { useNet = false; }}, .experimentalFeature = Xp::NixCommand, }); addFlag({ .longName = "refresh", .description = "Consider all previously downloaded files out-of-date.", .category = miscCategory, .handler = {[&]() { refresh = true; }}, .experimentalFeature = Xp::NixCommand, }); } std::map<std::string, AliasInfo> aliases = { {"add-to-store", { AliasStatus::Deprecated, {"store", "add-path"}}}, {"cat-nar", { AliasStatus::Deprecated, {"nar", "cat"}}}, {"cat-store", { AliasStatus::Deprecated, {"store", "cat"}}}, {"copy-sigs", { AliasStatus::Deprecated, {"store", "copy-sigs"}}}, {"dev-shell", { AliasStatus::Deprecated, {"develop"}}}, {"diff-closures", { AliasStatus::Deprecated, {"store", "diff-closures"}}}, {"dump-path", { AliasStatus::Deprecated, {"store", "dump-path"}}}, {"hash-file", { AliasStatus::Deprecated, {"hash", "file"}}}, {"hash-path", { AliasStatus::Deprecated, {"hash", "path"}}}, {"ls-nar", { AliasStatus::Deprecated, {"nar", "ls"}}}, {"ls-store", { AliasStatus::Deprecated, {"store", "ls"}}}, {"make-content-addressable", { AliasStatus::Deprecated, {"store", "make-content-addressed"}}}, {"optimise-store", { AliasStatus::Deprecated, {"store", "optimise"}}}, {"ping-store", { AliasStatus::Deprecated, {"store", "info"}}}, {"sign-paths", { AliasStatus::Deprecated, {"store", "sign"}}}, {"shell", { AliasStatus::AcceptedShorthand, {"env", "shell"}}}, {"show-derivation", { AliasStatus::Deprecated, {"derivation", "show"}}}, {"show-config", { AliasStatus::Deprecated, {"config", "show"}}}, {"to-base16", { AliasStatus::Deprecated, {"hash", "to-base16"}}}, {"to-base32", { AliasStatus::Deprecated, {"hash", "to-base32"}}}, {"to-base64", { AliasStatus::Deprecated, {"hash", "to-base64"}}}, {"verify", { AliasStatus::Deprecated, {"store", "verify"}}}, {"doctor", { AliasStatus::Deprecated, {"config", "check"}}}, }; bool aliasUsed = false; Strings::iterator rewriteArgs(Strings & args, Strings::iterator pos) override { if (aliasUsed || command || pos == args.end()) return pos; auto arg = *pos; auto i = aliases.find(arg); if (i == aliases.end()) return pos; auto & info = i->second; if (info.status == AliasStatus::Deprecated) { warn("'%s' is a deprecated alias for '%s'", arg, concatStringsSep(" ", info.replacement)); } pos = args.erase(pos); for (auto j = info.replacement.rbegin(); j != info.replacement.rend(); ++j) pos = args.insert(pos, *j); aliasUsed = true; return pos; } std::string description() override { return "a tool for reproducible and declarative configuration management"; } std::string doc() override { return #include "nix.md" ; } // Plugins may add new subcommands. void pluginsInited() override { commands = RegisterCommand::getCommandsFor({}); } std::string dumpCli() { auto res = nlohmann::json::object(); res["args"] = toJSON(); auto stores = nlohmann::json::object(); for (auto & implem : *Implementations::registered) { auto storeConfig = implem.getConfig(); auto storeName = storeConfig->name(); auto & j = stores[storeName]; j["doc"] = storeConfig->doc(); j["settings"] = storeConfig->toJSON(); j["experimentalFeature"] = storeConfig->experimentalFeature(); } res["stores"] = std::move(stores); res["fetchers"] = fetchers::dumpRegisterInputSchemeInfo(); return res.dump(); } }; /* Render the help for the specified subcommand to stdout using lowdown. */ static void showHelp(std::vector<std::string> subcommand, NixArgs & toplevel) { auto mdName = subcommand.empty() ? "nix" : fmt("nix3-%s", concatStringsSep("-", subcommand)); evalSettings.restrictEval = false; evalSettings.pureEval = false; EvalState state({}, openStore("dummy://"), fetchSettings, evalSettings); auto vGenerateManpage = state.allocValue(); state.eval(state.parseExprFromString( #include "generate-manpage.nix.gen.hh" , state.rootPath(CanonPath::root)), *vGenerateManpage); state.corepkgsFS->addFile( CanonPath("utils.nix"), #include "utils.nix.gen.hh" ); state.corepkgsFS->addFile( CanonPath("/generate-settings.nix"), #include "generate-settings.nix.gen.hh" ); state.corepkgsFS->addFile( CanonPath("/generate-store-info.nix"), #include "generate-store-info.nix.gen.hh" ); auto vDump = state.allocValue(); vDump->mkString(toplevel.dumpCli()); auto vRes = state.allocValue(); state.callFunction(*vGenerateManpage, state.getBuiltin("false"), *vRes, noPos); state.callFunction(*vRes, *vDump, *vRes, noPos); auto attr = vRes->attrs()->get(state.symbols.create(mdName + ".md")); if (!attr) throw UsageError("Nix has no subcommand '%s'", concatStringsSep("", subcommand)); auto markdown = state.forceString(*attr->value, noPos, "while evaluating the lowdown help text"); RunPager pager; std::cout << renderMarkdownToTerminal(markdown) << "\n"; } static NixArgs & getNixArgs(Command & cmd) { return dynamic_cast<NixArgs &>(cmd.getRoot()); } struct CmdHelp : Command { std::vector<std::string> subcommand; CmdHelp() { expectArgs({ .label = "subcommand", .handler = {&subcommand}, }); } std::string description() override { return "show help about `nix` or a particular subcommand"; } std::string doc() override { return #include "help.md" ; } Category category() override { return catHelp; } void run() override { assert(parent); MultiCommand * toplevel = parent; while (toplevel->parent) toplevel = toplevel->parent; showHelp(subcommand, getNixArgs(*this)); } }; static auto rCmdHelp = registerCommand<CmdHelp>("help"); struct CmdHelpStores : Command { std::string description() override { return "show help about store types and their settings"; } std::string doc() override { return #include "help-stores.md.gen.hh" ; } Category category() override { return catHelp; } void run() override { showHelp({"help-stores"}, getNixArgs(*this)); } }; static auto rCmdHelpStores = registerCommand<CmdHelpStores>("help-stores"); void mainWrapped(int argc, char * * argv) { savedArgv = argv; /* The chroot helper needs to be run before any threads have been started. */ #ifndef _WIN32 if (argc > 0 && argv[0] == chrootHelperName) { chrootHelper(argc, argv); return; } #endif initNix(); initGC(); flake::initLib(flakeSettings); /* Set the build hook location For builds we perform a self-invocation, so Nix has to be self-aware. That is, it has to know where it is installed. We don't think it's sentient. */ settings.buildHook.setDefault(Strings { getNixBin({}).string(), "__build-remote", }); #if __linux__ if (isRootUser()) { try { saveMountNamespace(); if (unshare(CLONE_NEWNS) == -1) throw SysError("setting up a private mount namespace"); } catch (Error & e) { } } #endif Finally f([] { logger->stop(); }); programPath = argv[0]; auto programName = std::string(baseNameOf(programPath)); auto extensionPos = programName.find_last_of("."); if (extensionPos != std::string::npos) programName.erase(extensionPos); if (argc > 1 && std::string_view(argv[1]) == "__build-remote") { programName = "build-remote"; argv++; argc--; } { auto legacy = (*RegisterLegacyCommand::commands)[programName]; if (legacy) return legacy(argc, argv); } evalSettings.pureEval = true; setLogFormat("bar"); settings.verboseBuild = false; // If on a terminal, progress will be displayed via progress bars etc. (thus verbosity=notice) if (nix::isTTY()) { verbosity = lvlNotice; } else { verbosity = lvlInfo; } NixArgs args; if (argc == 2 && std::string(argv[1]) == "__dump-cli") { logger->cout(args.dumpCli()); return; } if (argc == 2 && std::string(argv[1]) == "__dump-language") { experimentalFeatureSettings.experimentalFeatures = { Xp::Flakes, Xp::FetchClosure, Xp::DynamicDerivations, Xp::FetchTree, }; evalSettings.pureEval = false; EvalState state({}, openStore("dummy://"), fetchSettings, evalSettings); auto builtinsJson = nlohmann::json::object(); for (auto & builtin : *state.baseEnv.values[0]->attrs()) { auto b = nlohmann::json::object(); if (!builtin.value->isPrimOp()) continue; auto primOp = builtin.value->primOp(); if (!primOp->doc) continue; b["args"] = primOp->args; b["doc"] = trim(stripIndentation(primOp->doc)); if (primOp->experimentalFeature) b["experimental-feature"] = primOp->experimentalFeature; builtinsJson.emplace(state.symbols[builtin.name], std::move(b)); } for (auto & [name, info] : state.constantInfos) { auto b = nlohmann::json::object(); if (!info.doc) continue; b["doc"] = trim(stripIndentation(info.doc)); b["type"] = showType(info.type, false); if (info.impureOnly) b["impure-only"] = true; builtinsJson[name] = std::move(b); } logger->cout("%s", builtinsJson); return; } if (argc == 2 && std::string(argv[1]) == "__dump-xp-features") { logger->cout(documentExperimentalFeatures().dump()); return; } Finally printCompletions([&]() { if (args.completions) { switch (args.completions->type) { case Completions::Type::Normal: logger->cout("normal"); break; case Completions::Type::Filenames: logger->cout("filenames"); break; case Completions::Type::Attrs: logger->cout("attrs"); break; } for (auto & s : args.completions->completions) logger->cout(s.completion + "\t" + trim(s.description)); } }); try { auto isNixCommand = std::regex_search(programName, std::regex("nix$")); auto allowShebang = isNixCommand && argc > 1; args.parseCmdline(argvToStrings(argc, argv),allowShebang); } catch (UsageError &) { if (!args.helpRequested && !args.completions) throw; } if (args.helpRequested) { std::vector<std::string> subcommand; MultiCommand * command = &args; while (command) { if (command && command->command) { subcommand.push_back(command->command->first); command = dynamic_cast<MultiCommand *>(&*command->command->second); } else break; } showHelp(subcommand, args); return; } if (args.completions) return; if (args.showVersion) { printVersion(programName); return; } if (!args.command) throw UsageError("no subcommand specified"); experimentalFeatureSettings.require( args.command->second->experimentalFeature()); if (args.useNet && !haveInternet()) { warn("you don't have Internet access; disabling some network-dependent features"); args.useNet = false; } if (!args.useNet) { // FIXME: should check for command line overrides only. if (!settings.useSubstitutes.overridden) settings.useSubstitutes = false; if (!settings.tarballTtl.overridden) settings.tarballTtl = std::numeric_limits<unsigned int>::max(); if (!fileTransferSettings.tries.overridden) fileTransferSettings.tries = 0; if (!fileTransferSettings.connectTimeout.overridden) fileTransferSettings.connectTimeout = 1; } if (args.refresh) { settings.tarballTtl = 0; settings.ttlNegativeNarInfoCache = 0; settings.ttlPositiveNarInfoCache = 0; } if (args.command->second->forceImpureByDefault() && !evalSettings.pureEval.overridden) { evalSettings.pureEval = false; } try { args.command->second->run(); } catch (eval_cache::CachedEvalError & e) { /* Evaluate the original attribute that resulted in this cached error so that we can show the original error to the user. */ e.force(); } } } int main(int argc, char * * argv) { // Increase the default stack size for the evaluator and for // libstdc++'s std::regex. nix::setStackSize(64 * 1024 * 1024); return nix::handleExceptions(argv[0], [&]() { nix::mainWrapped(argc, argv); }); }
17,392
C++
.cc
477
29.048218
107
0.601391
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,772
store-info.cc
NixOS_nix/src/nix/store-info.cc
#include "command.hh" #include "shared.hh" #include "store-api.hh" #include "finally.hh" #include <nlohmann/json.hpp> using namespace nix; struct CmdPingStore : StoreCommand, MixJSON { std::string description() override { return "test whether a store can be accessed"; } std::string doc() override { return #include "store-info.md" ; } void run(ref<Store> store) override { if (!json) { notice("Store URL: %s", store->getUri()); store->connect(); if (auto version = store->getVersion()) notice("Version: %s", *version); if (auto trusted = store->isTrustedClient()) notice("Trusted: %s", *trusted); } else { nlohmann::json res; Finally printRes([&]() { logger->cout("%s", res); }); res["url"] = store->getUri(); store->connect(); if (auto version = store->getVersion()) res["version"] = *version; if (auto trusted = store->isTrustedClient()) res["trusted"] = *trusted; } } }; struct CmdInfoStore : CmdPingStore { void run(nix::ref<nix::Store> store) override { warn("'nix store ping' is a deprecated alias for 'nix store info'"); CmdPingStore::run(store); } }; static auto rCmdPingStore = registerCommand2<CmdPingStore>({"store", "info"}); static auto rCmdInfoStore = registerCommand2<CmdInfoStore>({"store", "ping"});
1,563
C++
.cc
51
22.882353
78
0.564205
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,773
app.cc
NixOS_nix/src/nix/app.cc
#include "installables.hh" #include "installable-derived-path.hh" #include "installable-value.hh" #include "store-api.hh" #include "eval-inline.hh" #include "eval-cache.hh" #include "names.hh" #include "command.hh" #include "derivations.hh" #include "downstream-placeholder.hh" namespace nix { /** * Return the rewrites that are needed to resolve a string whose context is * included in `dependencies`. */ StringPairs resolveRewrites( Store & store, const std::vector<BuiltPathWithResult> & dependencies) { StringPairs res; if (!experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) { return res; } for (auto &dep: dependencies) { auto drvDep = std::get_if<BuiltPathBuilt>(&dep.path); if (!drvDep) { continue; } for (const auto & [ outputName, outputPath ] : drvDep->outputs) { res.emplace( DownstreamPlaceholder::fromSingleDerivedPathBuilt( SingleDerivedPath::Built { .drvPath = make_ref<SingleDerivedPath>(drvDep->drvPath->discardOutputPath()), .output = outputName, }).render(), store.printStorePath(outputPath) ); } } return res; } /** * Resolve the given string assuming the given context. */ std::string resolveString( Store & store, const std::string & toResolve, const std::vector<BuiltPathWithResult> & dependencies) { auto rewrites = resolveRewrites(store, dependencies); return rewriteStrings(toResolve, rewrites); } UnresolvedApp InstallableValue::toApp(EvalState & state) { auto cursor = getCursor(state); auto attrPath = cursor->getAttrPath(); auto type = cursor->getAttr("type")->getString(); std::string expectedType = !attrPath.empty() && (state.symbols[attrPath[0]] == "apps" || state.symbols[attrPath[0]] == "defaultApp") ? "app" : "derivation"; if (type != expectedType) throw Error("attribute '%s' should have type '%s'", cursor->getAttrPathStr(), expectedType); if (type == "app") { auto [program, context] = cursor->getAttr("program")->getStringWithContext(); std::vector<DerivedPath> context2; for (auto & c : context) { context2.emplace_back(std::visit(overloaded { [&](const NixStringContextElem::DrvDeep & d) -> DerivedPath { /* We want all outputs of the drv */ return DerivedPath::Built { .drvPath = makeConstantStorePathRef(d.drvPath), .outputs = OutputsSpec::All {}, }; }, [&](const NixStringContextElem::Built & b) -> DerivedPath { return DerivedPath::Built { .drvPath = b.drvPath, .outputs = OutputsSpec::Names { b.output }, }; }, [&](const NixStringContextElem::Opaque & o) -> DerivedPath { return DerivedPath::Opaque { .path = o.path, }; }, }, c.raw)); } return UnresolvedApp { App { .context = std::move(context2), .program = program, }}; } else if (type == "derivation") { auto drvPath = cursor->forceDerivation(); auto outPath = cursor->getAttr(state.sOutPath)->getString(); auto outputName = cursor->getAttr(state.sOutputName)->getString(); auto name = cursor->getAttr(state.sName)->getString(); auto aPname = cursor->maybeGetAttr("pname"); auto aMeta = cursor->maybeGetAttr(state.sMeta); auto aMainProgram = aMeta ? aMeta->maybeGetAttr("mainProgram") : nullptr; auto mainProgram = aMainProgram ? aMainProgram->getString() : aPname ? aPname->getString() : DrvName(name).name; auto program = outPath + "/bin/" + mainProgram; return UnresolvedApp { App { .context = { DerivedPath::Built { .drvPath = makeConstantStorePathRef(drvPath), .outputs = OutputsSpec::Names { outputName }, } }, .program = program, }}; } else throw Error("attribute '%s' has unsupported type '%s'", cursor->getAttrPathStr(), type); } // FIXME: move to libcmd App UnresolvedApp::resolve(ref<Store> evalStore, ref<Store> store) { auto res = unresolved; Installables installableContext; for (auto & ctxElt : unresolved.context) installableContext.push_back( make_ref<InstallableDerivedPath>(store, DerivedPath { ctxElt })); auto builtContext = Installable::build(evalStore, store, Realise::Outputs, installableContext); res.program = resolveString(*store, unresolved.program, builtContext); if (!store->isInStore(res.program)) throw Error("app program '%s' is not in the Nix store", res.program); return res; } }
5,100
C++
.cc
133
29.263158
101
0.595474
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,774
hash.cc
NixOS_nix/src/nix/hash.cc
#include "command.hh" #include "hash.hh" #include "content-address.hh" #include "legacy.hh" #include "shared.hh" #include "references.hh" #include "archive.hh" #include "git.hh" #include "posix-source-accessor.hh" #include "misc-store-flags.hh" using namespace nix; /** * Base for `nix hash path`, `nix hash file` (deprecated), and `nix-hash` (legacy). * * Deprecation Issue: https://github.com/NixOS/nix/issues/8876 */ struct CmdHashBase : Command { FileIngestionMethod mode; HashFormat hashFormat = HashFormat::SRI; bool truncate = false; HashAlgorithm hashAlgo = HashAlgorithm::SHA256; std::vector<std::string> paths; std::optional<std::string> modulus; explicit CmdHashBase(FileIngestionMethod mode) : mode(mode) { expectArgs({ .label = "paths", .handler = {&paths}, .completer = completePath }); // FIXME The following flags should be deprecated, but we don't // yet have a mechanism for that. addFlag({ .longName = "sri", .description = "Print the hash in SRI format.", .handler = {&hashFormat, HashFormat::SRI}, }); addFlag({ .longName = "base64", .description = "Print the hash in base-64 format.", .handler = {&hashFormat, HashFormat::Base64}, }); addFlag({ .longName = "base32", .description = "Print the hash in base-32 (Nix-specific) format.", .handler = {&hashFormat, HashFormat::Nix32}, }); addFlag({ .longName = "base16", .description = "Print the hash in base-16 format.", .handler = {&hashFormat, HashFormat::Base16}, }); addFlag(flag::hashAlgo("type", &hashAlgo)); } std::string description() override { switch (mode) { case FileIngestionMethod::Flat: return "print cryptographic hash of a regular file"; case FileIngestionMethod::NixArchive: return "print cryptographic hash of the NAR serialisation of a path"; case FileIngestionMethod::Git: return "print cryptographic hash of the Git serialisation of a path"; default: assert(false); }; } void run() override { for (auto path : paths) { auto makeSink = [&]() -> std::unique_ptr<AbstractHashSink> { if (modulus) return std::make_unique<HashModuloSink>(hashAlgo, *modulus); else return std::make_unique<HashSink>(hashAlgo); }; auto path2 = PosixSourceAccessor::createAtRoot(path); Hash h { HashAlgorithm::SHA256 }; // throwaway def to appease C++ switch (mode) { case FileIngestionMethod::Flat: case FileIngestionMethod::NixArchive: { auto hashSink = makeSink(); dumpPath(path2, *hashSink, (FileSerialisationMethod) mode); h = hashSink->finish().first; break; } case FileIngestionMethod::Git: { std::function<git::DumpHook> hook; hook = [&](const SourcePath & path) -> git::TreeEntry { auto hashSink = makeSink(); auto mode = dump(path, *hashSink, hook); auto hash = hashSink->finish().first; return { .mode = mode, .hash = hash, }; }; h = hook(path2).hash; break; } } if (truncate && h.hashSize > 20) h = compressHash(h, 20); logger->cout(h.to_string(hashFormat, hashFormat == HashFormat::SRI)); } } }; /** * `nix hash path` */ struct CmdHashPath : CmdHashBase { CmdHashPath() : CmdHashBase(FileIngestionMethod::NixArchive) { addFlag(flag::hashAlgo("algo", &hashAlgo)); addFlag(flag::fileIngestionMethod(&mode)); addFlag(flag::hashFormatWithDefault("format", &hashFormat)); #if 0 addFlag({ .longName = "modulo", .description = "Compute the hash modulo the specified string.", .labels = {"modulus"}, .handler = {&modulus}, }); #endif } }; /** * For deprecated `nix hash file` * * Deprecation Issue: https://github.com/NixOS/nix/issues/8876 */ struct CmdHashFile : CmdHashBase { CmdHashFile() : CmdHashBase(FileIngestionMethod::Flat) { } }; /** * For deprecated `nix hash to-*` */ struct CmdToBase : Command { HashFormat hashFormat; std::optional<HashAlgorithm> hashAlgo; std::vector<std::string> args; CmdToBase(HashFormat hashFormat) : hashFormat(hashFormat) { addFlag(flag::hashAlgoOpt("type", &hashAlgo)); expectArgs("strings", &args); } std::string description() override { return fmt("convert a hash to %s representation (deprecated, use `nix hash convert` instead)", hashFormat == HashFormat::Base16 ? "base-16" : hashFormat == HashFormat::Nix32 ? "base-32" : hashFormat == HashFormat::Base64 ? "base-64" : "SRI"); } void run() override { warn("The old format conversion sub commands of `nix hash` were deprecated in favor of `nix hash convert`."); for (auto s : args) logger->cout(Hash::parseAny(s, hashAlgo).to_string(hashFormat, hashFormat == HashFormat::SRI)); } }; /** * `nix hash convert` */ struct CmdHashConvert : Command { std::optional<HashFormat> from; HashFormat to; std::optional<HashAlgorithm> algo; std::vector<std::string> hashStrings; CmdHashConvert(): to(HashFormat::SRI) { addFlag(flag::hashFormatOpt("from", &from)); addFlag(flag::hashFormatWithDefault("to", &to)); addFlag(flag::hashAlgoOpt(&algo)); expectArgs({ .label = "hashes", .handler = {&hashStrings}, }); } std::string description() override { return "convert between hash formats"; } std::string doc() override { return #include "hash-convert.md" ; } Category category() override { return catUtility; } void run() override { for (const auto& s: hashStrings) { Hash h = Hash::parseAny(s, algo); if (from && h.to_string(*from, from == HashFormat::SRI) != s) { auto from_as_string = printHashFormat(*from); throw BadHash("input hash '%s' does not have the expected format '--from %s'", s, from_as_string); } logger->cout(h.to_string(to, to == HashFormat::SRI)); } } }; struct CmdHash : NixMultiCommand { CmdHash() : NixMultiCommand( "hash", { {"convert", []() { return make_ref<CmdHashConvert>();}}, {"path", []() { return make_ref<CmdHashPath>(); }}, {"file", []() { return make_ref<CmdHashFile>(); }}, {"to-base16", []() { return make_ref<CmdToBase>(HashFormat::Base16); }}, {"to-base32", []() { return make_ref<CmdToBase>(HashFormat::Nix32); }}, {"to-base64", []() { return make_ref<CmdToBase>(HashFormat::Base64); }}, {"to-sri", []() { return make_ref<CmdToBase>(HashFormat::SRI); }}, }) { } std::string description() override { return "compute and convert cryptographic hashes"; } Category category() override { return catUtility; } }; static auto rCmdHash = registerCommand<CmdHash>("hash"); /* Legacy nix-hash command. */ static int compatNixHash(int argc, char * * argv) { // Wait until `nix hash convert` is not hidden behind experimental flags anymore. // warn("`nix-hash` has been deprecated in favor of `nix hash convert`."); std::optional<HashAlgorithm> hashAlgo; bool flat = false; HashFormat hashFormat = HashFormat::Base16; bool truncate = false; enum { opHash, opTo } op = opHash; std::vector<std::string> ss; parseCmdLine(argc, argv, [&](Strings::iterator & arg, const Strings::iterator & end) { if (*arg == "--help") showManPage("nix-hash"); else if (*arg == "--version") printVersion("nix-hash"); else if (*arg == "--flat") flat = true; else if (*arg == "--base16") hashFormat = HashFormat::Base16; else if (*arg == "--base32") hashFormat = HashFormat::Nix32; else if (*arg == "--base64") hashFormat = HashFormat::Base64; else if (*arg == "--sri") hashFormat = HashFormat::SRI; else if (*arg == "--truncate") truncate = true; else if (*arg == "--type") { std::string s = getArg(*arg, arg, end); hashAlgo = parseHashAlgo(s); } else if (*arg == "--to-base16") { op = opTo; hashFormat = HashFormat::Base16; } else if (*arg == "--to-base32") { op = opTo; hashFormat = HashFormat::Nix32; } else if (*arg == "--to-base64") { op = opTo; hashFormat = HashFormat::Base64; } else if (*arg == "--to-sri") { op = opTo; hashFormat = HashFormat::SRI; } else if (*arg != "" && arg->at(0) == '-') return false; else ss.push_back(*arg); return true; }); if (op == opHash) { CmdHashBase cmd(flat ? FileIngestionMethod::Flat : FileIngestionMethod::NixArchive); if (!hashAlgo.has_value()) hashAlgo = HashAlgorithm::MD5; cmd.hashAlgo = hashAlgo.value(); cmd.hashFormat = hashFormat; cmd.truncate = truncate; cmd.paths = ss; cmd.run(); } else { CmdToBase cmd(hashFormat); cmd.args = ss; if (hashAlgo.has_value()) cmd.hashAlgo = hashAlgo; cmd.run(); } return 0; } static RegisterLegacyCommand r_nix_hash("nix-hash", compatNixHash);
10,236
C++
.cc
297
25.875421
117
0.56185
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,775
store-gc.cc
NixOS_nix/src/nix/store-gc.cc
#include "command.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "store-cast.hh" #include "gc-store.hh" using namespace nix; struct CmdStoreGC : StoreCommand, MixDryRun { GCOptions options; CmdStoreGC() { addFlag({ .longName = "max", .description = "Stop after freeing *n* bytes of disk space.", .labels = {"n"}, .handler = {&options.maxFreed} }); } std::string description() override { return "perform garbage collection on a Nix store"; } std::string doc() override { return #include "store-gc.md" ; } void run(ref<Store> store) override { auto & gcStore = require<GcStore>(*store); options.action = dryRun ? GCOptions::gcReturnDead : GCOptions::gcDeleteDead; GCResults results; PrintFreed freed(options.action == GCOptions::gcDeleteDead, results); gcStore.collectGarbage(options, results); } }; static auto rCmdStoreGC = registerCommand2<CmdStoreGC>({"store", "gc"});
1,108
C++
.cc
39
22.282051
84
0.624882
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,776
self-exe.cc
NixOS_nix/src/nix/self-exe.cc
#include "current-process.hh" #include "file-system.hh" #include "globals.hh" #include "self-exe.hh" namespace nix { namespace fs { using namespace std::filesystem; } fs::path getNixBin(std::optional<std::string_view> binaryNameOpt) { auto getBinaryName = [&] { return binaryNameOpt ? *binaryNameOpt : "nix"; }; // If the environment variable is set, use it unconditionally. if (auto envOpt = getEnvNonEmpty("NIX_BIN_DIR")) return fs::path{*envOpt} / std::string{getBinaryName()}; // Try OS tricks, if available, to get to the path of this Nix, and // see if we can find the right executable next to that. if (auto selfOpt = getSelfExe()) { fs::path path{*selfOpt}; if (binaryNameOpt) path = path.parent_path() / std::string{*binaryNameOpt}; if (fs::exists(path)) return path; } // If `nix` exists at the hardcoded fallback path, use it. { auto path = fs::path{NIX_BIN_DIR} / std::string{getBinaryName()}; if (fs::exists(path)) return path; } // return just the name, hoping the exe is on the `PATH` return getBinaryName(); } }
1,168
C++
.cc
33
30.151515
80
0.648625
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,777
optimise-store.cc
NixOS_nix/src/nix/optimise-store.cc
#include "command.hh" #include "shared.hh" #include "store-api.hh" #include <atomic> using namespace nix; struct CmdOptimiseStore : StoreCommand { std::string description() override { return "replace identical files in the store by hard links"; } std::string doc() override { return #include "optimise-store.md" ; } void run(ref<Store> store) override { store->optimiseStore(); } }; static auto rCmdOptimiseStore = registerCommand2<CmdOptimiseStore>({"store", "optimise"});
560
C++
.cc
23
19.608696
90
0.666667
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
true
false
false
true
false
false
10,778
profile.cc
NixOS_nix/src/nix/profile.cc
#include "command.hh" #include "installable-flake.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "derivations.hh" #include "archive.hh" #include "builtins/buildenv.hh" #include "flake/flakeref.hh" #include "../nix-env/user-env.hh" #include "profiles.hh" #include "names.hh" #include "url.hh" #include "flake/url-name.hh" #include <nlohmann/json.hpp> #include <regex> #include <iomanip> #include "strings.hh" using namespace nix; struct ProfileElementSource { FlakeRef originalRef; // FIXME: record original attrpath. FlakeRef lockedRef; std::string attrPath; ExtendedOutputsSpec outputs; // TODO libc++ 16 (used by darwin) missing `std::set::operator <=>`, can't do yet. //auto operator <=> (const ProfileElementSource & other) const auto operator < (const ProfileElementSource & other) const { return std::tuple(originalRef.to_string(), attrPath, outputs) < std::tuple(other.originalRef.to_string(), other.attrPath, other.outputs); } std::string to_string() const { return fmt("%s#%s%s", originalRef, attrPath, outputs.to_string()); } }; const int defaultPriority = 5; struct ProfileElement { StorePathSet storePaths; std::optional<ProfileElementSource> source; bool active = true; int priority = defaultPriority; std::string identifier() const { if (source) return source->to_string(); StringSet names; for (auto & path : storePaths) names.insert(DrvName(path.name()).name); return dropEmptyInitThenConcatStringsSep(", ", names); } /** * Return a string representing an installable corresponding to the current * element, either a flakeref or a plain store path */ std::set<std::string> toInstallables(Store & store) { if (source) return {source->to_string()}; StringSet rawPaths; for (auto & path : storePaths) rawPaths.insert(store.printStorePath(path)); return rawPaths; } std::string versions() const { StringSet versions; for (auto & path : storePaths) versions.insert(DrvName(path.name()).version); return showVersions(versions); } void updateStorePaths( ref<Store> evalStore, ref<Store> store, const BuiltPaths & builtPaths) { storePaths.clear(); for (auto & buildable : builtPaths) { std::visit(overloaded { [&](const BuiltPath::Opaque & bo) { storePaths.insert(bo.path); }, [&](const BuiltPath::Built & bfd) { for (auto & output : bfd.outputs) storePaths.insert(output.second); }, }, buildable.raw()); } } }; std::string getNameFromElement(const ProfileElement & element) { std::optional<std::string> result = std::nullopt; if (element.source) { result = getNameFromURL(parseURL(element.source->to_string())); } return result.value_or(element.identifier()); } struct ProfileManifest { using ProfileElementName = std::string; std::map<ProfileElementName, ProfileElement> elements; ProfileManifest() { } ProfileManifest(EvalState & state, const std::filesystem::path & profile) { auto manifestPath = profile / "manifest.json"; if (std::filesystem::exists(manifestPath)) { auto json = nlohmann::json::parse(readFile(manifestPath.string())); auto version = json.value("version", 0); std::string sUrl; std::string sOriginalUrl; switch (version) { case 1: sUrl = "uri"; sOriginalUrl = "originalUri"; break; case 2: case 3: sUrl = "url"; sOriginalUrl = "originalUrl"; break; default: throw Error("profile manifest '%s' has unsupported version %d", manifestPath, version); } auto elems = json["elements"]; for (auto & elem : elems.items()) { auto & e = elem.value(); ProfileElement element; for (auto & p : e["storePaths"]) element.storePaths.insert(state.store->parseStorePath((std::string) p)); element.active = e["active"]; if(e.contains("priority")) { element.priority = e["priority"]; } if (e.value(sUrl, "") != "") { element.source = ProfileElementSource { parseFlakeRef(fetchSettings, e[sOriginalUrl]), parseFlakeRef(fetchSettings, e[sUrl]), e["attrPath"], e["outputs"].get<ExtendedOutputsSpec>() }; } std::string name = elems.is_object() ? elem.key() : element.source ? getNameFromURL(parseURL(element.source->to_string())).value_or(element.identifier()) : element.identifier(); addElement(name, std::move(element)); } } else if (std::filesystem::exists(profile / "manifest.nix")) { // FIXME: needed because of pure mode; ugly. state.allowPath(state.store->followLinksToStore(profile.string())); state.allowPath(state.store->followLinksToStore((profile / "manifest.nix").string())); auto packageInfos = queryInstalled(state, state.store->followLinksToStore(profile.string())); for (auto & packageInfo : packageInfos) { ProfileElement element; element.storePaths = {packageInfo.queryOutPath()}; addElement(std::move(element)); } } } void addElement(std::string_view nameCandidate, ProfileElement element) { std::string finalName(nameCandidate); for (int i = 1; elements.contains(finalName); ++i) finalName = nameCandidate + "-" + std::to_string(i); elements.insert_or_assign(finalName, std::move(element)); } void addElement(ProfileElement element) { auto name = getNameFromElement(element); addElement(name, std::move(element)); } nlohmann::json toJSON(Store & store) const { auto es = nlohmann::json::object(); for (auto & [name, element] : elements) { auto paths = nlohmann::json::array(); for (auto & path : element.storePaths) paths.push_back(store.printStorePath(path)); nlohmann::json obj; obj["storePaths"] = paths; obj["active"] = element.active; obj["priority"] = element.priority; if (element.source) { obj["originalUrl"] = element.source->originalRef.to_string(); obj["url"] = element.source->lockedRef.to_string(); obj["attrPath"] = element.source->attrPath; obj["outputs"] = element.source->outputs; } es[name] = obj; } nlohmann::json json; // Only upgrade with great care as changing it can break fresh installs // like in https://github.com/NixOS/nix/issues/10109 json["version"] = 3; json["elements"] = es; return json; } StorePath build(ref<Store> store) { auto tempDir = createTempDir(); StorePathSet references; Packages pkgs; for (auto & [name, element] : elements) { for (auto & path : element.storePaths) { if (element.active) pkgs.emplace_back(store->printStorePath(path), true, element.priority); references.insert(path); } } buildProfile(tempDir, std::move(pkgs)); writeFile(tempDir + "/manifest.json", toJSON(*store).dump()); /* Add the symlink tree to the store. */ StringSink sink; dumpPath(tempDir, sink); auto narHash = hashString(HashAlgorithm::SHA256, sink.s); ValidPathInfo info { *store, "profile", FixedOutputInfo { .method = FileIngestionMethod::NixArchive, .hash = narHash, .references = { .others = std::move(references), // profiles never refer to themselves .self = false, }, }, narHash, }; info.narSize = sink.s.size(); StringSource source(sink.s); store->addToStore(info, source); return std::move(info.path); } static void printDiff(const ProfileManifest & prev, const ProfileManifest & cur, std::string_view indent) { auto i = prev.elements.begin(); auto j = cur.elements.begin(); bool changes = false; while (i != prev.elements.end() || j != cur.elements.end()) { if (j != cur.elements.end() && (i == prev.elements.end() || i->first > j->first)) { logger->cout("%s%s: ∅ -> %s", indent, j->second.identifier(), j->second.versions()); changes = true; ++j; } else if (i != prev.elements.end() && (j == cur.elements.end() || i->first < j->first)) { logger->cout("%s%s: %s -> ∅", indent, i->second.identifier(), i->second.versions()); changes = true; ++i; } else { auto v1 = i->second.versions(); auto v2 = j->second.versions(); if (v1 != v2) { logger->cout("%s%s: %s -> %s", indent, i->second.identifier(), v1, v2); changes = true; } ++i; ++j; } } if (!changes) logger->cout("%sNo changes.", indent); } }; static std::map<Installable *, std::pair<BuiltPaths, ref<ExtraPathInfo>>> builtPathsPerInstallable( const std::vector<std::pair<ref<Installable>, BuiltPathWithResult>> & builtPaths) { std::map<Installable *, std::pair<BuiltPaths, ref<ExtraPathInfo>>> res; for (auto & [installable, builtPath] : builtPaths) { auto & r = res.insert({ &*installable, { {}, make_ref<ExtraPathInfo>(), } }).first->second; /* Note that there could be conflicting info (e.g. meta.priority fields) if the installable returned multiple derivations. So pick one arbitrarily. FIXME: print a warning? */ r.first.push_back(builtPath.path); r.second = builtPath.info; } return res; } struct CmdProfileInstall : InstallablesCommand, MixDefaultProfile { std::optional<int64_t> priority; CmdProfileInstall() { addFlag({ .longName = "priority", .description = "The priority of the package to install.", .labels = {"priority"}, .handler = {&priority}, }); }; std::string description() override { return "install a package into a profile"; } std::string doc() override { return #include "profile-install.md" ; } void run(ref<Store> store, Installables && installables) override { ProfileManifest manifest(*getEvalState(), *profile); auto builtPaths = builtPathsPerInstallable( Installable::build2( getEvalStore(), store, Realise::Outputs, installables, bmNormal)); for (auto & installable : installables) { ProfileElement element; auto iter = builtPaths.find(&*installable); if (iter == builtPaths.end()) continue; auto & [res, info] = iter->second; if (auto * info2 = dynamic_cast<ExtraPathInfoFlake *>(&*info)) { element.source = ProfileElementSource { .originalRef = info2->flake.originalRef, .lockedRef = info2->flake.lockedRef, .attrPath = info2->value.attrPath, .outputs = info2->value.extendedOutputsSpec, }; } // If --priority was specified we want to override the // priority of the installable. element.priority = priority ? *priority : ({ auto * info2 = dynamic_cast<ExtraPathInfoValue *>(&*info); info2 ? info2->value.priority.value_or(defaultPriority) : defaultPriority; }); element.updateStorePaths(getEvalStore(), store, res); auto elementName = getNameFromElement(element); // Check if the element already exists. auto existingPair = manifest.elements.find(elementName); if (existingPair != manifest.elements.end()) { auto existingElement = existingPair->second; auto existingSource = existingElement.source; auto elementSource = element.source; if (existingSource && elementSource && existingElement.priority == element.priority && existingSource->originalRef == elementSource->originalRef && existingSource->attrPath == elementSource->attrPath ) { warn("'%s' is already installed", elementName); continue; } } manifest.addElement(elementName, std::move(element)); } try { updateProfile(manifest.build(store)); } catch (BuildEnvFileConflictError & conflictError) { // FIXME use C++20 std::ranges once macOS has it // See https://github.com/NixOS/nix/compare/3efa476c5439f8f6c1968a6ba20a31d1239c2f04..1fe5d172ece51a619e879c4b86f603d9495cc102 auto findRefByFilePath = [&]<typename Iterator>(Iterator begin, Iterator end) { for (auto it = begin; it != end; it++) { auto & [name, profileElement] = *it; for (auto & storePath : profileElement.storePaths) { if (conflictError.fileA.starts_with(store->printStorePath(storePath))) { return std::tuple(conflictError.fileA, name, profileElement.toInstallables(*store)); } if (conflictError.fileB.starts_with(store->printStorePath(storePath))) { return std::tuple(conflictError.fileB, name, profileElement.toInstallables(*store)); } } } throw conflictError; }; // There are 2 conflicting files. We need to find out which one is from the already installed package and // which one is the package that is the new package that is being installed. // The first matching package is the one that was already installed (original). auto [originalConflictingFilePath, originalEntryName, originalConflictingRefs] = findRefByFilePath(manifest.elements.begin(), manifest.elements.end()); // The last matching package is the one that was going to be installed (new). auto [newConflictingFilePath, newEntryName, newConflictingRefs] = findRefByFilePath(manifest.elements.rbegin(), manifest.elements.rend()); throw Error( "An existing package already provides the following file:\n" "\n" " %1%\n" "\n" "This is the conflicting file from the new package:\n" "\n" " %2%\n" "\n" "To remove the existing package:\n" "\n" " nix profile remove %3%\n" "\n" "The new package can also be installed next to the existing one by assigning a different priority.\n" "The conflicting packages have a priority of %5%.\n" "To prioritise the new package:\n" "\n" " nix profile install %4% --priority %6%\n" "\n" "To prioritise the existing package:\n" "\n" " nix profile install %4% --priority %7%\n", originalConflictingFilePath, newConflictingFilePath, originalEntryName, concatStringsSep(" ", newConflictingRefs), conflictError.priority, conflictError.priority - 1, conflictError.priority + 1 ); } } }; struct Matcher { virtual ~Matcher() { } virtual std::string getTitle() = 0; virtual bool matches(const std::string & name, const ProfileElement & element) = 0; }; struct RegexMatcher final : public Matcher { std::regex regex; std::string pattern; RegexMatcher(const std::string & pattern) : regex(pattern, std::regex::extended | std::regex::icase), pattern(pattern) { } std::string getTitle() override { return fmt("Regex '%s'", pattern); } bool matches(const std::string & name, const ProfileElement & element) override { return std::regex_match(element.identifier(), regex); } }; struct StorePathMatcher final : public Matcher { nix::StorePath storePath; StorePathMatcher(const nix::StorePath & storePath) : storePath(storePath) { } std::string getTitle() override { return fmt("Store path '%s'", storePath.to_string()); } bool matches(const std::string & name, const ProfileElement & element) override { return element.storePaths.count(storePath); } }; struct NameMatcher final : public Matcher { std::string name; NameMatcher(const std::string & name) : name(name) { } std::string getTitle() override { return fmt("Package name '%s'", name); } bool matches(const std::string & name, const ProfileElement & element) override { return name == this->name; } }; struct AllMatcher final : public Matcher { std::string getTitle() override { return "--all"; } bool matches(const std::string & name, const ProfileElement & element) override { return true; } }; AllMatcher all; class MixProfileElementMatchers : virtual Args, virtual StoreCommand { std::vector<ref<Matcher>> _matchers; public: MixProfileElementMatchers() { addFlag({ .longName = "all", .description = "Match all packages in the profile.", .handler = {[this]() { _matchers.push_back(ref<AllMatcher>(std::shared_ptr<AllMatcher>(&all, [](AllMatcher*) {}))); }}, }); addFlag({ .longName = "regex", .description = "A regular expression to match one or more packages in the profile.", .labels = {"pattern"}, .handler = {[this](std::string arg) { _matchers.push_back(make_ref<RegexMatcher>(arg)); }}, }); expectArgs({ .label = "elements", .optional = true, .handler = {[this](std::vector<std::string> args) { for (auto & arg : args) { if (auto n = string2Int<size_t>(arg)) { throw Error("'nix profile' no longer supports indices ('%d')", *n); } else if (getStore()->isStorePath(arg)) { _matchers.push_back(make_ref<StorePathMatcher>(getStore()->parseStorePath(arg))); } else { _matchers.push_back(make_ref<NameMatcher>(arg)); } } }} }); } std::set<std::string> getMatchingElementNames(ProfileManifest & manifest) { if (_matchers.empty()) { throw UsageError("No packages specified."); } if (std::find_if(_matchers.begin(), _matchers.end(), [](const ref<Matcher> & m) { return m.dynamic_pointer_cast<AllMatcher>(); }) != _matchers.end() && _matchers.size() > 1) { throw UsageError("--all cannot be used with package names or regular expressions."); } if (manifest.elements.empty()) { warn("There are no packages in the profile."); return {}; } std::set<std::string> result; for (auto & matcher : _matchers) { bool foundMatch = false; for (auto & [name, element] : manifest.elements) { if (matcher->matches(name, element)) { result.insert(name); foundMatch = true; } } if (!foundMatch) { warn("%s does not match any packages in the profile.", matcher->getTitle()); } } return result; } }; struct CmdProfileRemove : virtual EvalCommand, MixDefaultProfile, MixProfileElementMatchers { std::string description() override { return "remove packages from a profile"; } std::string doc() override { return #include "profile-remove.md" ; } void run(ref<Store> store) override { ProfileManifest oldManifest(*getEvalState(), *profile); ProfileManifest newManifest = oldManifest; auto matchingElementNames = getMatchingElementNames(oldManifest); if (matchingElementNames.empty()) { warn ("No packages to remove. Use 'nix profile list' to see the current profile."); return; } for (auto & name : matchingElementNames) { auto & element = oldManifest.elements[name]; notice("removing '%s'", element.identifier()); newManifest.elements.erase(name); } auto removedCount = oldManifest.elements.size() - newManifest.elements.size(); printInfo("removed %d packages, kept %d packages", removedCount, newManifest.elements.size()); updateProfile(newManifest.build(store)); } }; struct CmdProfileUpgrade : virtual SourceExprCommand, MixDefaultProfile, MixProfileElementMatchers { std::string description() override { return "upgrade packages using their most recent flake"; } std::string doc() override { return #include "profile-upgrade.md" ; } void run(ref<Store> store) override { ProfileManifest manifest(*getEvalState(), *profile); Installables installables; std::vector<ProfileElement *> elems; auto upgradedCount = 0; auto matchingElementNames = getMatchingElementNames(manifest); if (matchingElementNames.empty()) { warn("No packages to upgrade. Use 'nix profile list' to see the current profile."); return; } for (auto & name : matchingElementNames) { auto & element = manifest.elements[name]; if (!element.source) { warn( "Found package '%s', but it was not installed from a flake, so it can't be checked for upgrades!", element.identifier() ); continue; } if (element.source->originalRef.input.isLocked()) { warn( "Found package '%s', but it was installed from a locked flake reference so it can't be upgraded!", element.identifier() ); continue; } upgradedCount++; Activity act(*logger, lvlChatty, actUnknown, fmt("checking '%s' for updates", element.source->attrPath)); auto installable = make_ref<InstallableFlake>( this, getEvalState(), FlakeRef(element.source->originalRef), "", element.source->outputs, Strings{element.source->attrPath}, Strings{}, lockFlags); auto derivedPaths = installable->toDerivedPaths(); if (derivedPaths.empty()) continue; auto * infop = dynamic_cast<ExtraPathInfoFlake *>(&*derivedPaths[0].info); // `InstallableFlake` should use `ExtraPathInfoFlake`. assert(infop); auto & info = *infop; if (info.flake.lockedRef.input.isLocked() && element.source->lockedRef == info.flake.lockedRef) continue; printInfo("upgrading '%s' from flake '%s' to '%s'", element.source->attrPath, element.source->lockedRef, info.flake.lockedRef); element.source = ProfileElementSource { .originalRef = installable->flakeRef, .lockedRef = info.flake.lockedRef, .attrPath = info.value.attrPath, .outputs = installable->extendedOutputsSpec, }; installables.push_back(installable); elems.push_back(&element); } if (upgradedCount == 0) { warn("Found some packages but none of them could be upgraded."); return; } auto builtPaths = builtPathsPerInstallable( Installable::build2( getEvalStore(), store, Realise::Outputs, installables, bmNormal)); for (size_t i = 0; i < installables.size(); ++i) { auto & installable = installables.at(i); auto & element = *elems.at(i); element.updateStorePaths( getEvalStore(), store, builtPaths.find(&*installable)->second.first); } updateProfile(manifest.build(store)); } }; struct CmdProfileList : virtual EvalCommand, virtual StoreCommand, MixDefaultProfile, MixJSON { std::string description() override { return "list installed packages"; } std::string doc() override { return #include "profile-list.md" ; } void run(ref<Store> store) override { ProfileManifest manifest(*getEvalState(), *profile); if (json) { std::cout << manifest.toJSON(*store).dump() << "\n"; } else { for (const auto & [i, e] : enumerate(manifest.elements)) { auto & [name, element] = e; if (i) logger->cout(""); logger->cout("Name: " ANSI_BOLD "%s" ANSI_NORMAL "%s", name, element.active ? "" : " " ANSI_RED "(inactive)" ANSI_NORMAL); if (element.source) { logger->cout("Flake attribute: %s%s", element.source->attrPath, element.source->outputs.to_string()); logger->cout("Original flake URL: %s", element.source->originalRef.to_string()); logger->cout("Locked flake URL: %s", element.source->lockedRef.to_string()); } logger->cout("Store paths: %s", concatStringsSep(" ", store->printStorePathSet(element.storePaths))); } } } }; struct CmdProfileDiffClosures : virtual StoreCommand, MixDefaultProfile { std::string description() override { return "show the closure difference between each version of a profile"; } std::string doc() override { return #include "profile-diff-closures.md" ; } void run(ref<Store> store) override { auto [gens, curGen] = findGenerations(*profile); std::optional<Generation> prevGen; bool first = true; for (auto & gen : gens) { if (prevGen) { if (!first) logger->cout(""); first = false; logger->cout("Version %d -> %d:", prevGen->number, gen.number); printClosureDiff(store, store->followLinksToStorePath(prevGen->path), store->followLinksToStorePath(gen.path), " "); } prevGen = gen; } } }; struct CmdProfileHistory : virtual StoreCommand, EvalCommand, MixDefaultProfile { std::string description() override { return "show all versions of a profile"; } std::string doc() override { return #include "profile-history.md" ; } void run(ref<Store> store) override { auto [gens, curGen] = findGenerations(*profile); std::optional<std::pair<Generation, ProfileManifest>> prevGen; bool first = true; for (auto & gen : gens) { ProfileManifest manifest(*getEvalState(), gen.path); if (!first) logger->cout(""); first = false; logger->cout("Version %s%d" ANSI_NORMAL " (%s)%s:", gen.number == curGen ? ANSI_GREEN : ANSI_BOLD, gen.number, std::put_time(std::gmtime(&gen.creationTime), "%Y-%m-%d"), prevGen ? fmt(" <- %d", prevGen->first.number) : ""); ProfileManifest::printDiff( prevGen ? prevGen->second : ProfileManifest(), manifest, " "); prevGen = {gen, std::move(manifest)}; } } }; struct CmdProfileRollback : virtual StoreCommand, MixDefaultProfile, MixDryRun { std::optional<GenerationNumber> version; CmdProfileRollback() { addFlag({ .longName = "to", .description = "The profile version to roll back to.", .labels = {"version"}, .handler = {&version}, }); } std::string description() override { return "roll back to the previous version or a specified version of a profile"; } std::string doc() override { return #include "profile-rollback.md" ; } void run(ref<Store> store) override { switchGeneration(*profile, version, dryRun); } }; struct CmdProfileWipeHistory : virtual StoreCommand, MixDefaultProfile, MixDryRun { std::optional<std::string> minAge; CmdProfileWipeHistory() { addFlag({ .longName = "older-than", .description = "Delete versions older than the specified age. *age* " "must be in the format *N*`d`, where *N* denotes a number " "of days.", .labels = {"age"}, .handler = {&minAge}, }); } std::string description() override { return "delete non-current versions of a profile"; } std::string doc() override { return #include "profile-wipe-history.md" ; } void run(ref<Store> store) override { if (minAge) { auto t = parseOlderThanTimeSpec(*minAge); deleteGenerationsOlderThan(*profile, t, dryRun); } else deleteOldGenerations(*profile, dryRun); } }; struct CmdProfile : NixMultiCommand { CmdProfile() : NixMultiCommand( "profile", { {"install", []() { return make_ref<CmdProfileInstall>(); }}, {"remove", []() { return make_ref<CmdProfileRemove>(); }}, {"upgrade", []() { return make_ref<CmdProfileUpgrade>(); }}, {"list", []() { return make_ref<CmdProfileList>(); }}, {"diff-closures", []() { return make_ref<CmdProfileDiffClosures>(); }}, {"history", []() { return make_ref<CmdProfileHistory>(); }}, {"rollback", []() { return make_ref<CmdProfileRollback>(); }}, {"wipe-history", []() { return make_ref<CmdProfileWipeHistory>(); }}, }) { } std::string description() override { return "manage Nix profiles"; } std::string doc() override { return #include "profile.md" ; } }; static auto rCmdProfile = registerCommand<CmdProfile>("profile");
32,691
C++
.cc
859
27.250291
183
0.55511
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,779
upgrade-nix.cc
NixOS_nix/src/nix/upgrade-nix.cc
#include "processes.hh" #include "command.hh" #include "common-args.hh" #include "store-api.hh" #include "filetransfer.hh" #include "eval.hh" #include "eval-settings.hh" #include "attr-path.hh" #include "names.hh" #include "progress-bar.hh" #include "executable-path.hh" #include "self-exe.hh" using namespace nix; struct CmdUpgradeNix : MixDryRun, StoreCommand { Path profileDir; CmdUpgradeNix() { addFlag({ .longName = "profile", .shortName = 'p', .description = "The path to the Nix profile to upgrade.", .labels = {"profile-dir"}, .handler = {&profileDir} }); addFlag({ .longName = "nix-store-paths-url", .description = "The URL of the file that contains the store paths of the latest Nix release.", .labels = {"url"}, .handler = {&(std::string&) settings.upgradeNixStorePathUrl} }); } /** * This command is stable before the others */ std::optional<ExperimentalFeature> experimentalFeature() override { return std::nullopt; } std::string description() override { return "upgrade Nix to the latest stable version"; } std::string doc() override { return #include "upgrade-nix.md" ; } Category category() override { return catNixInstallation; } void run(ref<Store> store) override { evalSettings.pureEval = true; if (profileDir == "") profileDir = getProfileDir(store); printInfo("upgrading Nix in profile '%s'", profileDir); auto storePath = getLatestNix(store); auto version = DrvName(storePath.name()).version; if (dryRun) { stopProgressBar(); warn("would upgrade to version %s", version); return; } { Activity act(*logger, lvlInfo, actUnknown, fmt("downloading '%s'...", store->printStorePath(storePath))); store->ensurePath(storePath); } { Activity act(*logger, lvlInfo, actUnknown, fmt("verifying that '%s' works...", store->printStorePath(storePath))); auto program = store->printStorePath(storePath) + "/bin/nix-env"; auto s = runProgram(program, false, {"--version"}); if (s.find("Nix") == std::string::npos) throw Error("could not verify that '%s' works", program); } stopProgressBar(); { Activity act(*logger, lvlInfo, actUnknown, fmt("installing '%s' into profile '%s'...", store->printStorePath(storePath), profileDir)); runProgram(getNixBin("nix-env").string(), false, {"--profile", profileDir, "-i", store->printStorePath(storePath), "--no-sandbox"}); } printInfo(ANSI_GREEN "upgrade to version %s done" ANSI_NORMAL, version); } /* Return the profile in which Nix is installed. */ Path getProfileDir(ref<Store> store) { auto whereOpt = ExecutablePath::load().findName(OS_STR("nix-env")); if (!whereOpt) throw Error("couldn't figure out how Nix is installed, so I can't upgrade it"); auto & where = *whereOpt; printInfo("found Nix in '%s'", where); if (hasPrefix(where.string(), "/run/current-system")) throw Error("Nix on NixOS must be upgraded via 'nixos-rebuild'"); Path profileDir = where.parent_path().string(); // Resolve profile to /nix/var/nix/profiles/<name> link. while (canonPath(profileDir).find("/profiles/") == std::string::npos && std::filesystem::is_symlink(profileDir)) profileDir = readLink(profileDir); printInfo("found profile '%s'", profileDir); Path userEnv = canonPath(profileDir, true); if (where.filename() != "bin" || !hasSuffix(userEnv, "user-environment")) throw Error("directory '%s' does not appear to be part of a Nix profile", where); if (!store->isValidPath(store->parseStorePath(userEnv))) throw Error("directory '%s' is not in the Nix store", userEnv); return profileDir; } /* Return the store path of the latest stable Nix. */ StorePath getLatestNix(ref<Store> store) { Activity act(*logger, lvlInfo, actUnknown, "querying latest Nix version"); // FIXME: use nixos.org? auto req = FileTransferRequest((std::string&) settings.upgradeNixStorePathUrl); auto res = getFileTransfer()->download(req); auto state = std::make_unique<EvalState>(LookupPath{}, store, fetchSettings, evalSettings); auto v = state->allocValue(); state->eval(state->parseExprFromString(res.data, state->rootPath(CanonPath("/no-such-path"))), *v); Bindings & bindings(*state->allocBindings(0)); auto v2 = findAlongAttrPath(*state, settings.thisSystem, bindings, *v).first; return store->parseStorePath(state->forceString(*v2, noPos, "while evaluating the path tho latest nix version")); } }; static auto rCmdUpgradeNix = registerCommand<CmdUpgradeNix>("upgrade-nix");
5,189
C++
.cc
122
34.155738
126
0.619511
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,780
registry.cc
NixOS_nix/src/nix/registry.cc
#include "command.hh" #include "common-args.hh" #include "shared.hh" #include "eval.hh" #include "flake/flake.hh" #include "store-api.hh" #include "fetchers.hh" #include "registry.hh" using namespace nix; using namespace nix::flake; class RegistryCommand : virtual Args { std::string registry_path; std::shared_ptr<fetchers::Registry> registry; public: RegistryCommand() { addFlag({ .longName = "registry", .description = "The registry to operate on.", .labels = {"registry"}, .handler = {&registry_path}, }); } std::shared_ptr<fetchers::Registry> getRegistry() { if (registry) return registry; if (registry_path.empty()) { registry = fetchers::getUserRegistry(fetchSettings); } else { registry = fetchers::getCustomRegistry(fetchSettings, registry_path); } return registry; } Path getRegistryPath() { if (registry_path.empty()) { return fetchers::getUserRegistryPath(); } else { return registry_path; } } }; struct CmdRegistryList : StoreCommand { std::string description() override { return "list available Nix flakes"; } std::string doc() override { return #include "registry-list.md" ; } void run(nix::ref<nix::Store> store) override { using namespace fetchers; auto registries = getRegistries(fetchSettings, store); for (auto & registry : registries) { for (auto & entry : registry->entries) { // FIXME: format nicely logger->cout("%s %s %s", registry->type == Registry::Flag ? "flags " : registry->type == Registry::User ? "user " : registry->type == Registry::System ? "system" : "global", entry.from.toURLString(), entry.to.toURLString(attrsToQuery(entry.extraAttrs))); } } } }; struct CmdRegistryAdd : MixEvalArgs, Command, RegistryCommand { std::string fromUrl, toUrl; std::string description() override { return "add/replace flake in user flake registry"; } std::string doc() override { return #include "registry-add.md" ; } CmdRegistryAdd() { expectArg("from-url", &fromUrl); expectArg("to-url", &toUrl); } void run() override { auto fromRef = parseFlakeRef(fetchSettings, fromUrl); auto toRef = parseFlakeRef(fetchSettings, toUrl); auto registry = getRegistry(); fetchers::Attrs extraAttrs; if (toRef.subdir != "") extraAttrs["dir"] = toRef.subdir; registry->remove(fromRef.input); registry->add(fromRef.input, toRef.input, extraAttrs); registry->write(getRegistryPath()); } }; struct CmdRegistryRemove : RegistryCommand, Command { std::string url; std::string description() override { return "remove flake from user flake registry"; } std::string doc() override { return #include "registry-remove.md" ; } CmdRegistryRemove() { expectArg("url", &url); } void run() override { auto registry = getRegistry(); registry->remove(parseFlakeRef(fetchSettings, url).input); registry->write(getRegistryPath()); } }; struct CmdRegistryPin : RegistryCommand, EvalCommand { std::string url; std::string locked; std::string description() override { return "pin a flake to its current version or to the current version of a flake URL"; } std::string doc() override { return #include "registry-pin.md" ; } CmdRegistryPin() { expectArg("url", &url); expectArgs({ .label = "locked", .optional = true, .handler = {&locked}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeRef(completions, getStore(), prefix); }} }); } void run(nix::ref<nix::Store> store) override { if (locked.empty()) locked = url; auto registry = getRegistry(); auto ref = parseFlakeRef(fetchSettings, url); auto lockedRef = parseFlakeRef(fetchSettings, locked); registry->remove(ref.input); auto resolved = lockedRef.resolve(store).input.getAccessor(store).second; if (!resolved.isLocked()) warn("flake '%s' is not locked", resolved.to_string()); fetchers::Attrs extraAttrs; if (ref.subdir != "") extraAttrs["dir"] = ref.subdir; registry->add(ref.input, resolved, extraAttrs); registry->write(getRegistryPath()); } }; struct CmdRegistry : NixMultiCommand { CmdRegistry() : NixMultiCommand( "registry", { {"list", []() { return make_ref<CmdRegistryList>(); }}, {"add", []() { return make_ref<CmdRegistryAdd>(); }}, {"remove", []() { return make_ref<CmdRegistryRemove>(); }}, {"pin", []() { return make_ref<CmdRegistryPin>(); }}, }) { } std::string description() override { return "manage the flake registry"; } std::string doc() override { return #include "registry.md" ; } Category category() override { return catSecondary; } }; static auto rCmdRegistry = registerCommand<CmdRegistry>("registry");
5,717
C++
.cc
195
21.65641
94
0.579734
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,781
store-copy-log.cc
NixOS_nix/src/nix/store-copy-log.cc
#include "command.hh" #include "shared.hh" #include "store-api.hh" #include "store-cast.hh" #include "log-store.hh" #include "sync.hh" #include "thread-pool.hh" #include <atomic> using namespace nix; struct CmdCopyLog : virtual CopyCommand, virtual InstallablesCommand { std::string description() override { return "copy build logs between Nix stores"; } std::string doc() override { return #include "store-copy-log.md" ; } void run(ref<Store> srcStore, Installables && installables) override { auto & srcLogStore = require<LogStore>(*srcStore); auto dstStore = getDstStore(); auto & dstLogStore = require<LogStore>(*dstStore); for (auto & drvPath : Installable::toDerivations(getEvalStore(), installables, true)) { if (auto log = srcLogStore.getBuildLog(drvPath)) dstLogStore.addBuildLog(drvPath, *log); else throw Error("build log for '%s' is not available", srcStore->printStorePath(drvPath)); } } }; static auto rCmdCopyLog = registerCommand2<CmdCopyLog>({"store", "copy-log"});
1,159
C++
.cc
35
27.085714
102
0.65681
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,782
store-delete.cc
NixOS_nix/src/nix/store-delete.cc
#include "command.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "store-cast.hh" #include "gc-store.hh" using namespace nix; struct CmdStoreDelete : StorePathsCommand { GCOptions options { .action = GCOptions::gcDeleteSpecific }; CmdStoreDelete() { addFlag({ .longName = "ignore-liveness", .description = "Do not check whether the paths are reachable from a root.", .handler = {&options.ignoreLiveness, true} }); } std::string description() override { return "delete paths from the Nix store"; } std::string doc() override { return #include "store-delete.md" ; } void run(ref<Store> store, StorePaths && storePaths) override { auto & gcStore = require<GcStore>(*store); for (auto & path : storePaths) options.pathsToDelete.insert(path); GCResults results; PrintFreed freed(true, results); gcStore.collectGarbage(options, results); } }; static auto rCmdStoreDelete = registerCommand2<CmdStoreDelete>({"store", "delete"});
1,159
C++
.cc
39
23.564103
87
0.640864
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,783
derivation.cc
NixOS_nix/src/nix/derivation.cc
#include "command.hh" using namespace nix; struct CmdDerivation : NixMultiCommand { CmdDerivation() : NixMultiCommand("derivation", RegisterCommand::getCommandsFor({"derivation"})) { } std::string description() override { return "Work with derivations, Nix's notion of a build plan."; } Category category() override { return catUtility; } }; static auto rCmdDerivation = registerCommand<CmdDerivation>("derivation");
454
C++
.cc
13
31.076923
100
0.736239
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,784
bundle.cc
NixOS_nix/src/nix/bundle.cc
#include "installable-flake.hh" #include "command-installable-value.hh" #include "common-args.hh" #include "shared.hh" #include "store-api.hh" #include "local-fs-store.hh" #include "eval-inline.hh" namespace nix::fs { using namespace std::filesystem; } using namespace nix; struct CmdBundle : InstallableValueCommand { std::string bundler = "github:NixOS/bundlers"; std::optional<Path> outLink; CmdBundle() { addFlag({ .longName = "bundler", .description = fmt("Use a custom bundler instead of the default (`%s`).", bundler), .labels = {"flake-url"}, .handler = {&bundler}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeRef(completions, getStore(), prefix); }} }); addFlag({ .longName = "out-link", .shortName = 'o', .description = "Override the name of the symlink to the build result. It defaults to the base name of the app.", .labels = {"path"}, .handler = {&outLink}, .completer = completePath }); } std::string description() override { return "bundle an application so that it works outside of the Nix store"; } std::string doc() override { return #include "bundle.md" ; } Category category() override { return catSecondary; } // FIXME: cut&paste from CmdRun. Strings getDefaultFlakeAttrPaths() override { Strings res{ "apps." + settings.thisSystem.get() + ".default", "defaultApp." + settings.thisSystem.get() }; for (auto & s : SourceExprCommand::getDefaultFlakeAttrPaths()) res.push_back(s); return res; } Strings getDefaultFlakeAttrPathPrefixes() override { Strings res{"apps." + settings.thisSystem.get() + "."}; for (auto & s : SourceExprCommand::getDefaultFlakeAttrPathPrefixes()) res.push_back(s); return res; } void run(ref<Store> store, ref<InstallableValue> installable) override { auto evalState = getEvalState(); auto val = installable->toValue(*evalState).first; auto [bundlerFlakeRef, bundlerName, extendedOutputsSpec] = parseFlakeRefWithFragmentAndExtendedOutputsSpec( fetchSettings, bundler, fs::current_path().string()); const flake::LockFlags lockFlags{ .writeLockFile = false }; InstallableFlake bundler{this, evalState, std::move(bundlerFlakeRef), bundlerName, std::move(extendedOutputsSpec), {"bundlers." + settings.thisSystem.get() + ".default", "defaultBundler." + settings.thisSystem.get() }, {"bundlers." + settings.thisSystem.get() + "."}, lockFlags }; auto vRes = evalState->allocValue(); evalState->callFunction(*bundler.toValue(*evalState).first, *val, *vRes, noPos); if (!evalState->isDerivation(*vRes)) throw Error("the bundler '%s' does not produce a derivation", bundler.what()); auto attr1 = vRes->attrs()->get(evalState->sDrvPath); if (!attr1) throw Error("the bundler '%s' does not produce a derivation", bundler.what()); NixStringContext context2; auto drvPath = evalState->coerceToStorePath(attr1->pos, *attr1->value, context2, ""); drvPath.requireDerivation(); auto attr2 = vRes->attrs()->get(evalState->sOutPath); if (!attr2) throw Error("the bundler '%s' does not produce a derivation", bundler.what()); auto outPath = evalState->coerceToStorePath(attr2->pos, *attr2->value, context2, ""); store->buildPaths({ DerivedPath::Built { .drvPath = makeConstantStorePathRef(drvPath), .outputs = OutputsSpec::All { }, }, }); if (!outLink) { auto * attr = vRes->attrs()->get(evalState->sName); if (!attr) throw Error("attribute 'name' missing"); outLink = evalState->forceStringNoCtx(*attr->value, attr->pos, ""); } // TODO: will crash if not a localFSStore? store.dynamic_pointer_cast<LocalFSStore>()->addPermRoot(outPath, absPath(*outLink)); } }; static auto r2 = registerCommand<CmdBundle>("bundle");
4,467
C++
.cc
109
31.963303
124
0.605816
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,785
store-repair.cc
NixOS_nix/src/nix/store-repair.cc
#include "command.hh" #include "store-api.hh" using namespace nix; struct CmdStoreRepair : StorePathsCommand { std::string description() override { return "repair store paths"; } std::string doc() override { return #include "store-repair.md" ; } void run(ref<Store> store, StorePaths && storePaths) override { for (auto & path : storePaths) store->repairPath(path); } }; static auto rStoreRepair = registerCommand2<CmdStoreRepair>({"store", "repair"});
550
C++
.cc
22
19.590909
81
0.638623
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,786
daemon.cc
NixOS_nix/src/nix/unix/daemon.cc
///@file #include "signals.hh" #include "unix-domain-socket.hh" #include "command.hh" #include "shared.hh" #include "local-store.hh" #include "remote-store.hh" #include "remote-store-connection.hh" #include "serialise.hh" #include "archive.hh" #include "globals.hh" #include "config-global.hh" #include "derivations.hh" #include "finally.hh" #include "legacy.hh" #include "daemon.hh" #include <algorithm> #include <climits> #include <cstring> #include <unistd.h> #include <signal.h> #include <sys/types.h> #include <sys/wait.h> #include <sys/stat.h> #include <sys/socket.h> #include <sys/un.h> #include <sys/select.h> #include <errno.h> #include <pwd.h> #include <grp.h> #include <fcntl.h> #if __linux__ #include "cgroup.hh" #endif #if __APPLE__ || __FreeBSD__ #include <sys/ucred.h> #endif using namespace nix; using namespace nix::daemon; /** * Settings related to authenticating clients for the Nix daemon. * * For pipes we have little good information about the client side, but * for Unix domain sockets we do. So currently these options implemented * mandatory access control based on user names and group names (looked * up and translated to UID/GIDs in the CLI process that runs the code * in this file). * * No code outside of this file knows about these settings (this is not * exposed in a header); all authentication and authorization happens in * `daemon.cc`. */ struct AuthorizationSettings : Config { Setting<Strings> trustedUsers{ this, {"root"}, "trusted-users", R"( A list of user names, separated by whitespace. These users will have additional rights when connecting to the Nix daemon, such as the ability to specify additional [substituters](#conf-substituters), or to import unsigned realisations or unsigned input-addressed store objects. You can also specify groups by prefixing names with `@`. For instance, `@wheel` means all users in the `wheel` group. > **Warning** > > Adding a user to `trusted-users` is essentially equivalent to giving that user root access to the system. > For example, the user can access or replace store path contents that are critical for system security. )"}; /** * Who we trust to use the daemon in safe ways */ Setting<Strings> allowedUsers{ this, {"*"}, "allowed-users", R"( A list user names, separated by whitespace. These users are allowed to connect to the Nix daemon. You can specify groups by prefixing names with `@`. For instance, `@wheel` means all users in the `wheel` group. Also, you can allow all users by specifying `*`. > **Note** > > Trusted users (set in [`trusted-users`](#conf-trusted-users)) can always connect to the Nix daemon. )"}; }; AuthorizationSettings authorizationSettings; static GlobalConfig::Register rSettings(&authorizationSettings); #ifndef __linux__ #define SPLICE_F_MOVE 0 static ssize_t splice(int fd_in, void *off_in, int fd_out, void *off_out, size_t len, unsigned int flags) { // We ignore most parameters, we just have them for conformance with the linux syscall std::vector<char> buf(8192); auto read_count = read(fd_in, buf.data(), buf.size()); if (read_count == -1) return read_count; auto write_count = decltype(read_count)(0); while (write_count < read_count) { auto res = write(fd_out, buf.data() + write_count, read_count - write_count); if (res == -1) return res; write_count += res; } return read_count; } #endif static void sigChldHandler(int sigNo) { // Ensure we don't modify errno of whatever we've interrupted auto saved_errno = errno; // Reap all dead children. while (waitpid(-1, 0, WNOHANG) > 0) ; errno = saved_errno; } static void setSigChldAction(bool autoReap) { struct sigaction act, oact; act.sa_handler = autoReap ? sigChldHandler : SIG_DFL; sigfillset(&act.sa_mask); act.sa_flags = 0; if (sigaction(SIGCHLD, &act, &oact)) throw SysError("setting SIGCHLD handler"); } /** * @return Is the given user a member of this group? * * @param user User specified by username. * * @param group Group the user might be a member of. */ static bool matchUser(std::string_view user, const struct group & gr) { for (char * * mem = gr.gr_mem; *mem; mem++) if (user == std::string_view(*mem)) return true; return false; } /** * Does the given user (specified by user name and primary group name) * match the given user/group whitelist? * * If the list allows all users: Yes. * * If the username is in the set: Yes. * * If the groupname is in the set: Yes. * * If the user is in another group which is in the set: yes. * * Otherwise: No. */ static bool matchUser(const std::string & user, const std::string & group, const Strings & users) { if (find(users.begin(), users.end(), "*") != users.end()) return true; if (find(users.begin(), users.end(), user) != users.end()) return true; for (auto & i : users) if (i.substr(0, 1) == "@") { if (group == i.substr(1)) return true; struct group * gr = getgrnam(i.c_str() + 1); if (!gr) continue; if (matchUser(user, *gr)) return true; } return false; } struct PeerInfo { bool pidKnown; pid_t pid; bool uidKnown; uid_t uid; bool gidKnown; gid_t gid; }; /** * Get the identity of the caller, if possible. */ static PeerInfo getPeerInfo(int remote) { PeerInfo peer = { false, 0, false, 0, false, 0 }; #if defined(SO_PEERCRED) # if defined(__OpenBSD__) struct sockpeercred cred; # else ucred cred; # endif socklen_t credLen = sizeof(cred); if (getsockopt(remote, SOL_SOCKET, SO_PEERCRED, &cred, &credLen) == -1) throw SysError("getting peer credentials"); peer = { true, cred.pid, true, cred.uid, true, cred.gid }; #elif defined(LOCAL_PEERCRED) # if !defined(SOL_LOCAL) # define SOL_LOCAL 0 # endif xucred cred; socklen_t credLen = sizeof(cred); if (getsockopt(remote, SOL_LOCAL, LOCAL_PEERCRED, &cred, &credLen) == -1) throw SysError("getting peer credentials"); peer = { false, 0, true, cred.cr_uid, false, 0 }; #endif return peer; } #define SD_LISTEN_FDS_START 3 /** * Open a store without a path info cache. */ static ref<Store> openUncachedStore() { Store::Params params; // FIXME: get params from somewhere // Disable caching since the client already does that. params["path-info-cache-size"] = "0"; return openStore(settings.storeUri, params); } /** * Authenticate a potential client * * @param peer Information about other end of the connection, the client which * wants to communicate with us. * * @return A pair of a `TrustedFlag`, whether the potential client is trusted, * and the name of the user (useful for printing messages). * * If the potential client is not allowed to talk to us, we throw an `Error`. */ static std::pair<TrustedFlag, std::string> authPeer(const PeerInfo & peer) { TrustedFlag trusted = NotTrusted; struct passwd * pw = peer.uidKnown ? getpwuid(peer.uid) : 0; std::string user = pw ? pw->pw_name : std::to_string(peer.uid); struct group * gr = peer.gidKnown ? getgrgid(peer.gid) : 0; std::string group = gr ? gr->gr_name : std::to_string(peer.gid); const Strings & trustedUsers = authorizationSettings.trustedUsers; const Strings & allowedUsers = authorizationSettings.allowedUsers; if (matchUser(user, group, trustedUsers)) trusted = Trusted; if ((!trusted && !matchUser(user, group, allowedUsers)) || group == settings.buildUsersGroup) throw Error("user '%1%' is not allowed to connect to the Nix daemon", user); return { trusted, std::move(user) }; } /** * Run a server. The loop opens a socket and accepts new connections from that * socket. * * @param forceTrustClientOpt If present, force trusting or not trusted * the client. Otherwise, decide based on the authentication settings * and user credentials (from the unix domain socket). */ static void daemonLoop(std::optional<TrustedFlag> forceTrustClientOpt) { if (chdir("/") == -1) throw SysError("cannot change current directory"); AutoCloseFD fdSocket; // Handle socket-based activation by systemd. auto listenFds = getEnv("LISTEN_FDS"); if (listenFds) { if (getEnv("LISTEN_PID") != std::to_string(getpid()) || listenFds != "1") throw Error("unexpected systemd environment variables"); fdSocket = SD_LISTEN_FDS_START; unix::closeOnExec(fdSocket.get()); } // Otherwise, create and bind to a Unix domain socket. else { createDirs(dirOf(settings.nixDaemonSocketFile)); fdSocket = createUnixDomainSocket(settings.nixDaemonSocketFile, 0666); } // Get rid of children automatically; don't let them become zombies. setSigChldAction(true); #if __linux__ if (settings.useCgroups) { experimentalFeatureSettings.require(Xp::Cgroups); // This also sets the root cgroup to the current one. auto rootCgroup = getRootCgroup(); auto cgroupFS = getCgroupFS(); if (!cgroupFS) throw Error("cannot determine the cgroups file system"); auto rootCgroupPath = canonPath(*cgroupFS + "/" + rootCgroup); if (!pathExists(rootCgroupPath)) throw Error("expected cgroup directory '%s'", rootCgroupPath); auto daemonCgroupPath = rootCgroupPath + "/nix-daemon"; // Create new sub-cgroup for the daemon. if (mkdir(daemonCgroupPath.c_str(), 0755) != 0 && errno != EEXIST) throw SysError("creating cgroup '%s'", daemonCgroupPath); // Move daemon into the new cgroup. writeFile(daemonCgroupPath + "/cgroup.procs", fmt("%d", getpid())); } #endif // Loop accepting connections. while (1) { try { // Accept a connection. struct sockaddr_un remoteAddr; socklen_t remoteAddrLen = sizeof(remoteAddr); AutoCloseFD remote = accept(fdSocket.get(), (struct sockaddr *) &remoteAddr, &remoteAddrLen); checkInterrupt(); if (!remote) { if (errno == EINTR) continue; throw SysError("accepting connection"); } unix::closeOnExec(remote.get()); PeerInfo peer { .pidKnown = false }; TrustedFlag trusted; std::string user; if (forceTrustClientOpt) trusted = *forceTrustClientOpt; else { peer = getPeerInfo(remote.get()); auto [_trusted, _user] = authPeer(peer); trusted = _trusted; user = _user; }; printInfo((std::string) "accepted connection from pid %1%, user %2%" + (trusted ? " (trusted)" : ""), peer.pidKnown ? std::to_string(peer.pid) : "<unknown>", peer.uidKnown ? user : "<unknown>"); // Fork a child to handle the connection. ProcessOptions options; options.errorPrefix = "unexpected Nix daemon error: "; options.dieWithParent = false; options.runExitHandlers = true; options.allowVfork = false; startProcess([&]() { fdSocket = -1; // Background the daemon. if (setsid() == -1) throw SysError("creating a new session"); // Restore normal handling of SIGCHLD. setSigChldAction(false); // For debugging, stuff the pid into argv[1]. if (peer.pidKnown && savedArgv[1]) { auto processName = std::to_string(peer.pid); strncpy(savedArgv[1], processName.c_str(), strlen(savedArgv[1])); } // Handle the connection. processConnection( openUncachedStore(), FdSource(remote.get()), FdSink(remote.get()), trusted, NotRecursive); exit(0); }, options); } catch (Interrupted & e) { return; } catch (Error & error) { auto ei = error.info(); // FIXME: add to trace? ei.msg = HintFmt("error processing connection: %1%", ei.msg.str()); logError(ei); } } } /** * Forward a standard IO connection to the given remote store. * * We just act as a middleman blindly ferry output between the standard * input/output and the remote store connection, not processing anything. * * Loops until standard input disconnects, or an error is encountered. */ static void forwardStdioConnection(RemoteStore & store) { auto conn = store.openConnectionWrapper(); int from = conn->from.fd; int to = conn->to.fd; auto nfds = std::max(from, STDIN_FILENO) + 1; while (true) { fd_set fds; FD_ZERO(&fds); FD_SET(from, &fds); FD_SET(STDIN_FILENO, &fds); if (select(nfds, &fds, nullptr, nullptr, nullptr) == -1) throw SysError("waiting for data from client or server"); if (FD_ISSET(from, &fds)) { auto res = splice(from, nullptr, STDOUT_FILENO, nullptr, SSIZE_MAX, SPLICE_F_MOVE); if (res == -1) throw SysError("splicing data from daemon socket to stdout"); else if (res == 0) throw EndOfFile("unexpected EOF from daemon socket"); } if (FD_ISSET(STDIN_FILENO, &fds)) { auto res = splice(STDIN_FILENO, nullptr, to, nullptr, SSIZE_MAX, SPLICE_F_MOVE); if (res == -1) throw SysError("splicing data from stdin to daemon socket"); else if (res == 0) return; } } } /** * Process a client connecting to us via standard input/output * * Unlike `forwardStdioConnection()` we do process commands ourselves in * this case, not delegating to another daemon. * * @param trustClient Whether to trust the client. Forwarded directly to * `processConnection()`. */ static void processStdioConnection(ref<Store> store, TrustedFlag trustClient) { processConnection( store, FdSource(STDIN_FILENO), FdSink(STDOUT_FILENO), trustClient, NotRecursive); } /** * Entry point shared between the new CLI `nix daemon` and old CLI * `nix-daemon`. * * @param forceTrustClientOpt See `daemonLoop()` and the parameter with * the same name over there for details. * * @param procesOps Whether to force processing ops even if the next * store also is a remote store and could process it directly. */ static void runDaemon(bool stdio, std::optional<TrustedFlag> forceTrustClientOpt, bool processOps) { if (stdio) { auto store = openUncachedStore(); std::shared_ptr<RemoteStore> remoteStore; // If --force-untrusted is passed, we cannot forward the connection and // must process it ourselves (before delegating to the next store) to // force untrusting the client. processOps |= !forceTrustClientOpt || *forceTrustClientOpt != NotTrusted; if (!processOps && (remoteStore = store.dynamic_pointer_cast<RemoteStore>())) forwardStdioConnection(*remoteStore); else // `Trusted` is passed in the auto (no override case) because we // cannot see who is on the other side of a plain pipe. Limiting // access to those is explicitly not `nix-daemon`'s responsibility. processStdioConnection(store, forceTrustClientOpt.value_or(Trusted)); } else daemonLoop(forceTrustClientOpt); } static int main_nix_daemon(int argc, char * * argv) { { auto stdio = false; std::optional<TrustedFlag> isTrustedOpt = std::nullopt; auto processOps = false; parseCmdLine(argc, argv, [&](Strings::iterator & arg, const Strings::iterator & end) { if (*arg == "--daemon") ; // ignored for backwards compatibility else if (*arg == "--help") showManPage("nix-daemon"); else if (*arg == "--version") printVersion("nix-daemon"); else if (*arg == "--stdio") stdio = true; else if (*arg == "--force-trusted") { experimentalFeatureSettings.require(Xp::DaemonTrustOverride); isTrustedOpt = Trusted; } else if (*arg == "--force-untrusted") { experimentalFeatureSettings.require(Xp::DaemonTrustOverride); isTrustedOpt = NotTrusted; } else if (*arg == "--default-trust") { experimentalFeatureSettings.require(Xp::DaemonTrustOverride); isTrustedOpt = std::nullopt; } else if (*arg == "--process-ops") { experimentalFeatureSettings.require(Xp::MountedSSHStore); processOps = true; } else return false; return true; }); runDaemon(stdio, isTrustedOpt, processOps); return 0; } } static RegisterLegacyCommand r_nix_daemon("nix-daemon", main_nix_daemon); struct CmdDaemon : StoreCommand { bool stdio = false; std::optional<TrustedFlag> isTrustedOpt = std::nullopt; bool processOps = false; CmdDaemon() { addFlag({ .longName = "stdio", .description = "Attach to standard I/O, instead of trying to bind to a UNIX socket.", .handler = {&stdio, true}, }); addFlag({ .longName = "force-trusted", .description = "Force the daemon to trust connecting clients.", .handler = {[&]() { isTrustedOpt = Trusted; }}, .experimentalFeature = Xp::DaemonTrustOverride, }); addFlag({ .longName = "force-untrusted", .description = "Force the daemon to not trust connecting clients. The connection will be processed by the receiving daemon before forwarding commands.", .handler = {[&]() { isTrustedOpt = NotTrusted; }}, .experimentalFeature = Xp::DaemonTrustOverride, }); addFlag({ .longName = "default-trust", .description = "Use Nix's default trust.", .handler = {[&]() { isTrustedOpt = std::nullopt; }}, .experimentalFeature = Xp::DaemonTrustOverride, }); addFlag({ .longName = "process-ops", .description = R"( Forces the daemon to process received commands itself rather than forwarding the commands straight to the remote store. This is useful for the `mounted-ssh://` store where some actions need to be performed on the remote end but as connected user, and not as the user of the underlying daemon on the remote end. )", .handler = {[&]() { processOps = true; }}, .experimentalFeature = Xp::MountedSSHStore, }); } std::string description() override { return "daemon to perform store operations on behalf of non-root clients"; } Category category() override { return catUtility; } std::string doc() override { return #include "daemon.md" ; } void run(ref<Store> store) override { runDaemon(stdio, isTrustedOpt, processOps); } }; static auto rCmdDaemon = registerCommand2<CmdDaemon>({"daemon"});
19,942
C++
.cc
529
30.493384
240
0.625861
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,787
nix-build.cc
NixOS_nix/src/nix-build/nix-build.cc
#include <cstring> #include <fstream> #include <iostream> #include <filesystem> #include <regex> #include <sstream> #include <vector> #include <map> #include <nlohmann/json.hpp> #include "current-process.hh" #include "parsed-derivations.hh" #include "store-api.hh" #include "local-fs-store.hh" #include "globals.hh" #include "realisation.hh" #include "derivations.hh" #include "shared.hh" #include "path-with-outputs.hh" #include "eval.hh" #include "eval-inline.hh" #include "get-drvs.hh" #include "common-eval-args.hh" #include "attr-path.hh" #include "legacy.hh" #include "users.hh" #include "network-proxy.hh" #include "compatibility-settings.hh" using namespace nix; using namespace std::string_literals; extern char * * environ __attribute__((weak)); /* Recreate the effect of the perl shellwords function, breaking up a * string into arguments like a shell word, including escapes */ static std::vector<std::string> shellwords(std::string_view s) { std::regex whitespace("^\\s+"); auto begin = s.cbegin(); std::vector<std::string> res; std::string cur; enum state { sBegin, sSingleQuote, sDoubleQuote }; state st = sBegin; auto it = begin; for (; it != s.cend(); ++it) { if (st == sBegin) { std::cmatch match; if (regex_search(it, s.cend(), match, whitespace)) { cur.append(begin, it); res.push_back(cur); it = match[0].second; if (it == s.cend()) return res; begin = it; cur.clear(); } } switch (*it) { case '\'': if (st != sDoubleQuote) { cur.append(begin, it); begin = it + 1; st = st == sBegin ? sSingleQuote : sBegin; } break; case '"': if (st != sSingleQuote) { cur.append(begin, it); begin = it + 1; st = st == sBegin ? sDoubleQuote : sBegin; } break; case '\\': if (st != sSingleQuote) { /* perl shellwords mostly just treats the next char as part of the string with no special processing */ cur.append(begin, it); begin = ++it; } break; } } if (st != sBegin) throw Error("unterminated quote in shebang line"); cur.append(begin, it); res.push_back(cur); return res; } /** * Like `resolveExprPath`, but prefers `shell.nix` instead of `default.nix`, * and if `path` was a directory, it checks eagerly whether `shell.nix` or * `default.nix` exist, throwing an error if they don't. */ static SourcePath resolveShellExprPath(SourcePath path) { auto resolvedOrDir = resolveExprPath(path, false); if (resolvedOrDir.resolveSymlinks().lstat().type == SourceAccessor::tDirectory) { if ((resolvedOrDir / "shell.nix").pathExists()) { if (compatibilitySettings.nixShellAlwaysLooksForShellNix) { return resolvedOrDir / "shell.nix"; } else { warn("Skipping '%1%', because the setting '%2%' is disabled. This is a deprecated behavior. Consider enabling '%2%'.", resolvedOrDir / "shell.nix", "nix-shell-always-looks-for-shell-nix"); } } if ((resolvedOrDir / "default.nix").pathExists()) { return resolvedOrDir / "default.nix"; } throw Error("neither '%s' nor '%s' found in '%s'", "shell.nix", "default.nix", resolvedOrDir); } return resolvedOrDir; } static void main_nix_build(int argc, char * * argv) { auto dryRun = false; auto isNixShell = std::regex_search(argv[0], std::regex("nix-shell$")); auto pure = false; auto fromArgs = false; auto packages = false; // Same condition as bash uses for interactive shells auto interactive = isatty(STDIN_FILENO) && isatty(STDERR_FILENO); Strings attrPaths; Strings remainingArgs; BuildMode buildMode = bmNormal; bool readStdin = false; std::string envCommand; // interactive shell Strings envExclude; auto myName = isNixShell ? "nix-shell" : "nix-build"; auto inShebang = false; std::string script; std::vector<std::string> savedArgs; AutoDelete tmpDir(createTempDir("", myName)); std::string outLink = "./result"; // List of environment variables kept for --pure std::set<std::string> keepVars{ "HOME", "XDG_RUNTIME_DIR", "USER", "LOGNAME", "DISPLAY", "WAYLAND_DISPLAY", "WAYLAND_SOCKET", "PATH", "TERM", "IN_NIX_SHELL", "NIX_SHELL_PRESERVE_PROMPT", "TZ", "PAGER", "NIX_BUILD_SHELL", "SHLVL", }; keepVars.insert(networkProxyVariables.begin(), networkProxyVariables.end()); Strings args; for (int i = 1; i < argc; ++i) args.push_back(argv[i]); // Heuristic to see if we're invoked as a shebang script, namely, // if we have at least one argument, it's the name of an // executable file, and it starts with "#!". if (isNixShell && argc > 1) { script = argv[1]; try { auto lines = tokenizeString<Strings>(readFile(script), "\n"); if (!lines.empty() && std::regex_search(lines.front(), std::regex("^#!"))) { lines.pop_front(); inShebang = true; for (int i = 2; i < argc; ++i) savedArgs.push_back(argv[i]); args.clear(); for (auto line : lines) { line = chomp(line); std::smatch match; if (std::regex_match(line, match, std::regex("^#!\\s*nix-shell\\s+(.*)$"))) for (const auto & word : shellwords({match[1].first, match[1].second})) args.push_back(word); } } } catch (SystemError &) { } } struct MyArgs : LegacyArgs, MixEvalArgs { using LegacyArgs::LegacyArgs; void setBaseDir(Path baseDir) { commandBaseDir = baseDir; } }; MyArgs myArgs(myName, [&](Strings::iterator & arg, const Strings::iterator & end) { if (*arg == "--help") { deletePath(tmpDir); showManPage(myName); } else if (*arg == "--version") printVersion(myName); else if (*arg == "--add-drv-link" || *arg == "--indirect") ; // obsolete else if (*arg == "--no-out-link" || *arg == "--no-link") outLink = (tmpDir.path() / "result").string(); else if (*arg == "--attr" || *arg == "-A") attrPaths.push_back(getArg(*arg, arg, end)); else if (*arg == "--drv-link") getArg(*arg, arg, end); // obsolete else if (*arg == "--out-link" || *arg == "-o") outLink = getArg(*arg, arg, end); else if (*arg == "--dry-run") dryRun = true; else if (*arg == "--run-env") // obsolete isNixShell = true; else if (isNixShell && (*arg == "--command" || *arg == "--run")) { if (*arg == "--run") interactive = false; envCommand = getArg(*arg, arg, end) + "\nexit"; } else if (*arg == "--check") buildMode = bmCheck; else if (*arg == "--exclude") envExclude.push_back(getArg(*arg, arg, end)); else if (*arg == "--expr" || *arg == "-E") fromArgs = true; else if (*arg == "--pure") pure = true; else if (*arg == "--impure") pure = false; else if (isNixShell && (*arg == "--packages" || *arg == "-p")) packages = true; else if (inShebang && *arg == "-i") { auto interpreter = getArg(*arg, arg, end); interactive = false; auto execArgs = ""; // Überhack to support Perl. Perl examines the shebang and // executes it unless it contains the string "perl" or "indir", // or (undocumented) argv[0] does not contain "perl". Exploit // the latter by doing "exec -a". if (std::regex_search(interpreter, std::regex("perl"))) execArgs = "-a PERL"; std::ostringstream joined; for (const auto & i : savedArgs) joined << shellEscape(i) << ' '; if (std::regex_search(interpreter, std::regex("ruby"))) { // Hack for Ruby. Ruby also examines the shebang. It tries to // read the shebang to understand which packages to read from. Since // this is handled via nix-shell -p, we wrap our ruby script execution // in ruby -e 'load' which ignores the shebangs. envCommand = fmt("exec %1% %2% -e 'load(ARGV.shift)' -- %3% %4%", execArgs, interpreter, shellEscape(script), toView(joined)); } else { envCommand = fmt("exec %1% %2% %3% %4%", execArgs, interpreter, shellEscape(script), toView(joined)); } } else if (*arg == "--keep") keepVars.insert(getArg(*arg, arg, end)); else if (*arg == "-") readStdin = true; else if (*arg != "" && arg->at(0) == '-') return false; else remainingArgs.push_back(*arg); return true; }); myArgs.parseCmdline(args); if (packages && fromArgs) throw UsageError("'-p' and '-E' are mutually exclusive"); auto store = openStore(); auto evalStore = myArgs.evalStoreUrl ? openStore(*myArgs.evalStoreUrl) : store; auto state = std::make_unique<EvalState>(myArgs.lookupPath, evalStore, fetchSettings, evalSettings, store); state->repair = myArgs.repair; if (myArgs.repair) buildMode = bmRepair; if (inShebang && compatibilitySettings.nixShellShebangArgumentsRelativeToScript) { myArgs.setBaseDir(absPath(dirOf(script))); } auto autoArgs = myArgs.getAutoArgs(*state); auto autoArgsWithInNixShell = autoArgs; if (isNixShell) { auto newArgs = state->buildBindings(autoArgsWithInNixShell->size() + 1); newArgs.alloc("inNixShell").mkBool(true); for (auto & i : *autoArgs) newArgs.insert(i); autoArgsWithInNixShell = newArgs.finish(); } if (packages) { std::ostringstream joined; joined << "{...}@args: with import <nixpkgs> args; (pkgs.runCommandCC or pkgs.runCommand) \"shell\" { buildInputs = [ "; for (const auto & i : remainingArgs) joined << '(' << i << ") "; joined << "]; } \"\""; fromArgs = true; remainingArgs = {joined.str()}; } else if (!fromArgs && remainingArgs.empty()) { if (isNixShell && !compatibilitySettings.nixShellAlwaysLooksForShellNix && std::filesystem::exists("shell.nix")) { // If we're in 2.3 compatibility mode, we need to look for shell.nix // now, because it won't be done later. remainingArgs = {"shell.nix"}; } else { remainingArgs = {"."}; // Instead of letting it throw later, we throw here to give a more relevant error message if (isNixShell && !std::filesystem::exists("shell.nix") && !std::filesystem::exists("default.nix")) throw Error("no argument specified and no '%s' or '%s' file found in the working directory", "shell.nix", "default.nix"); } } if (isNixShell) setEnv("IN_NIX_SHELL", pure ? "pure" : "impure"); PackageInfos drvs; /* Parse the expressions. */ std::vector<Expr *> exprs; if (readStdin) exprs = {state->parseStdin()}; else for (auto i : remainingArgs) { auto baseDir = inShebang && !packages ? absPath(dirOf(script)) : i; if (fromArgs) exprs.push_back(state->parseExprFromString( std::move(i), (inShebang && compatibilitySettings.nixShellShebangArgumentsRelativeToScript) ? lookupFileArg(*state, baseDir) : state->rootPath(".") )); else { auto absolute = i; try { absolute = canonPath(absPath(i), true); } catch (Error & e) {}; auto [path, outputNames] = parsePathWithOutputs(absolute); if (evalStore->isStorePath(path) && hasSuffix(path, ".drv")) drvs.push_back(PackageInfo(*state, evalStore, absolute)); else { /* If we're in a #! script, interpret filenames relative to the script. */ auto baseDir = inShebang && !packages ? absPath(i, absPath(dirOf(script))) : i; auto sourcePath = lookupFileArg(*state, baseDir); auto resolvedPath = isNixShell ? resolveShellExprPath(sourcePath) : resolveExprPath(sourcePath); exprs.push_back(state->parseExprFromFile(resolvedPath)); } } } /* Evaluate them into derivations. */ if (attrPaths.empty()) attrPaths = {""}; for (auto e : exprs) { Value vRoot; state->eval(e, vRoot); std::function<bool(const Value & v)> takesNixShellAttr; takesNixShellAttr = [&](const Value & v) { if (!isNixShell) { return false; } bool add = false; if (v.type() == nFunction && v.payload.lambda.fun->hasFormals()) { for (auto & i : v.payload.lambda.fun->formals->formals) { if (state->symbols[i.name] == "inNixShell") { add = true; break; } } } return add; }; for (auto & i : attrPaths) { Value & v(*findAlongAttrPath( *state, i, takesNixShellAttr(vRoot) ? *autoArgsWithInNixShell : *autoArgs, vRoot ).first); state->forceValue(v, v.determinePos(noPos)); getDerivations( *state, v, "", takesNixShellAttr(v) ? *autoArgsWithInNixShell : *autoArgs, drvs, false ); } } state->maybePrintStats(); auto buildPaths = [&](const std::vector<DerivedPath> & paths) { /* Note: we do this even when !printMissing to efficiently fetch binary cache data. */ uint64_t downloadSize, narSize; StorePathSet willBuild, willSubstitute, unknown; store->queryMissing(paths, willBuild, willSubstitute, unknown, downloadSize, narSize); if (settings.printMissing) printMissing(ref<Store>(store), willBuild, willSubstitute, unknown, downloadSize, narSize); if (!dryRun) store->buildPaths(paths, buildMode, evalStore); }; if (isNixShell) { if (drvs.size() != 1) throw UsageError("nix-shell requires a single derivation"); auto & packageInfo = drvs.front(); auto drv = evalStore->derivationFromPath(packageInfo.requireDrvPath()); std::vector<DerivedPath> pathsToBuild; RealisedPath::Set pathsToCopy; /* Figure out what bash shell to use. If $NIX_BUILD_SHELL is not set, then build bashInteractive from <nixpkgs>. */ auto shell = getEnv("NIX_BUILD_SHELL"); std::optional<StorePath> shellDrv; if (!shell) { try { auto expr = state->parseExprFromString( "(import <nixpkgs> {}).bashInteractive", state->rootPath(".")); Value v; state->eval(expr, v); auto drv = getDerivation(*state, v, false); if (!drv) throw Error("the 'bashInteractive' attribute in <nixpkgs> did not evaluate to a derivation"); auto bashDrv = drv->requireDrvPath(); pathsToBuild.push_back(DerivedPath::Built { .drvPath = makeConstantStorePathRef(bashDrv), .outputs = OutputsSpec::Names {"out"}, }); pathsToCopy.insert(bashDrv); shellDrv = bashDrv; } catch (Error & e) { logError(e.info()); notice("will use bash from your environment"); shell = "bash"; } } std::function<void(ref<SingleDerivedPath>, const DerivedPathMap<StringSet>::ChildNode &)> accumDerivedPath; accumDerivedPath = [&](ref<SingleDerivedPath> inputDrv, const DerivedPathMap<StringSet>::ChildNode & inputNode) { if (!inputNode.value.empty()) pathsToBuild.push_back(DerivedPath::Built { .drvPath = inputDrv, .outputs = OutputsSpec::Names { inputNode.value }, }); for (const auto & [outputName, childNode] : inputNode.childMap) accumDerivedPath( make_ref<SingleDerivedPath>(SingleDerivedPath::Built { inputDrv, outputName }), childNode); }; // Build or fetch all dependencies of the derivation. for (const auto & [inputDrv0, inputNode] : drv.inputDrvs.map) { // To get around lambda capturing restrictions in the // standard. const auto & inputDrv = inputDrv0; if (std::all_of(envExclude.cbegin(), envExclude.cend(), [&](const std::string & exclude) { return !std::regex_search(store->printStorePath(inputDrv), std::regex(exclude)); })) { accumDerivedPath(makeConstantStorePathRef(inputDrv), inputNode); pathsToCopy.insert(inputDrv); } } for (const auto & src : drv.inputSrcs) { pathsToBuild.emplace_back(DerivedPath::Opaque{src}); pathsToCopy.insert(src); } buildPaths(pathsToBuild); if (dryRun) return; if (shellDrv) { auto shellDrvOutputs = store->queryPartialDerivationOutputMap(shellDrv.value(), &*evalStore); shell = store->printStorePath(shellDrvOutputs.at("out").value()) + "/bin/bash"; } if (experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) { auto resolvedDrv = drv.tryResolve(*store); assert(resolvedDrv && "Successfully resolved the derivation"); drv = *resolvedDrv; } // Set the environment. auto env = getEnv(); if (pure) { decltype(env) newEnv; for (auto & i : env) if (keepVars.count(i.first)) newEnv.emplace(i); env = newEnv; // NixOS hack: prevent /etc/bashrc from sourcing /etc/profile. env["__ETC_PROFILE_SOURCED"] = "1"; } env["NIX_BUILD_TOP"] = env["TMPDIR"] = env["TEMPDIR"] = env["TMP"] = env["TEMP"] = tmpDir.path().string(); env["NIX_STORE"] = store->storeDir; env["NIX_BUILD_CORES"] = std::to_string(settings.buildCores); auto passAsFile = tokenizeString<StringSet>(getOr(drv.env, "passAsFile", "")); int fileNr = 0; for (auto & var : drv.env) if (passAsFile.count(var.first)) { auto fn = ".attr-" + std::to_string(fileNr++); Path p = (tmpDir.path() / fn).string(); writeFile(p, var.second); env[var.first + "Path"] = p; } else env[var.first] = var.second; std::string structuredAttrsRC; if (env.count("__json")) { StorePathSet inputs; std::function<void(const StorePath &, const DerivedPathMap<StringSet>::ChildNode &)> accumInputClosure; accumInputClosure = [&](const StorePath & inputDrv, const DerivedPathMap<StringSet>::ChildNode & inputNode) { auto outputs = store->queryPartialDerivationOutputMap(inputDrv, &*evalStore); for (auto & i : inputNode.value) { auto o = outputs.at(i); store->computeFSClosure(*o, inputs); } for (const auto & [outputName, childNode] : inputNode.childMap) accumInputClosure(*outputs.at(outputName), childNode); }; for (const auto & [inputDrv, inputNode] : drv.inputDrvs.map) accumInputClosure(inputDrv, inputNode); ParsedDerivation parsedDrv(packageInfo.requireDrvPath(), drv); if (auto structAttrs = parsedDrv.prepareStructuredAttrs(*store, inputs)) { auto json = structAttrs.value(); structuredAttrsRC = writeStructuredAttrsShell(json); auto attrsJSON = (tmpDir.path() / ".attrs.json").string(); writeFile(attrsJSON, json.dump()); auto attrsSH = (tmpDir.path() / ".attrs.sh").string(); writeFile(attrsSH, structuredAttrsRC); env["NIX_ATTRS_SH_FILE"] = attrsSH; env["NIX_ATTRS_JSON_FILE"] = attrsJSON; } } /* Run a shell using the derivation's environment. For convenience, source $stdenv/setup to setup additional environment variables and shell functions. Also don't lose the current $PATH directories. */ auto rcfile = (tmpDir.path() / "rc").string(); std::string rc = fmt( (R"(_nix_shell_clean_tmpdir() { command rm -rf %1%; };)"s "trap _nix_shell_clean_tmpdir EXIT; " "exitHooks+=(_nix_shell_clean_tmpdir); " "failureHooks+=(_nix_shell_clean_tmpdir); ") + (pure ? "" : "[ -n \"$PS1\" ] && [ -e ~/.bashrc ] && source ~/.bashrc;") + "%2%" // always clear PATH. // when nix-shell is run impure, we rehydrate it with the `p=$PATH` above "unset PATH;" "dontAddDisableDepTrack=1;\n" + structuredAttrsRC + "\n[ -e $stdenv/setup ] && source $stdenv/setup; " "%3%" "PATH=%4%:\"$PATH\"; " "SHELL=%5%; " "BASH=%5%; " "set +e; " R"s([ -n "$PS1" -a -z "$NIX_SHELL_PRESERVE_PROMPT" ] && )s" + (isRootUser() ? R"s(PS1='\n\[\033[1;31m\][nix-shell:\w]\$\[\033[0m\] '; )s" : R"s(PS1='\n\[\033[1;32m\][nix-shell:\w]\$\[\033[0m\] '; )s") + "if [ \"$(type -t runHook)\" = function ]; then runHook shellHook; fi; " "unset NIX_ENFORCE_PURITY; " "shopt -u nullglob; " "unset TZ; %6%" "shopt -s execfail;" "%7%", shellEscape(tmpDir.path().string()), (pure ? "" : "p=$PATH; "), (pure ? "" : "PATH=$PATH:$p; unset p; "), shellEscape(dirOf(*shell)), shellEscape(*shell), (getenv("TZ") ? (std::string("export TZ=") + shellEscape(getenv("TZ")) + "; ") : ""), envCommand); vomit("Sourcing nix-shell with file %s and contents:\n%s", rcfile, rc); writeFile(rcfile, rc); Strings envStrs; for (auto & i : env) envStrs.push_back(i.first + "=" + i.second); auto args = interactive ? Strings{"bash", "--rcfile", rcfile} : Strings{"bash", rcfile}; auto envPtrs = stringsToCharPtrs(envStrs); environ = envPtrs.data(); auto argPtrs = stringsToCharPtrs(args); restoreProcessContext(); logger->stop(); execvp(shell->c_str(), argPtrs.data()); throw SysError("executing shell '%s'", *shell); } else { std::vector<DerivedPath> pathsToBuild; std::vector<std::pair<StorePath, std::string>> pathsToBuildOrdered; RealisedPath::Set drvsToCopy; std::map<StorePath, std::pair<size_t, StringSet>> drvMap; for (auto & packageInfo : drvs) { auto drvPath = packageInfo.requireDrvPath(); auto outputName = packageInfo.queryOutputName(); if (outputName == "") throw Error("derivation '%s' lacks an 'outputName' attribute", store->printStorePath(drvPath)); pathsToBuild.push_back(DerivedPath::Built{ .drvPath = makeConstantStorePathRef(drvPath), .outputs = OutputsSpec::Names{outputName}, }); pathsToBuildOrdered.push_back({drvPath, {outputName}}); drvsToCopy.insert(drvPath); auto i = drvMap.find(drvPath); if (i != drvMap.end()) i->second.second.insert(outputName); else drvMap[drvPath] = {drvMap.size(), {outputName}}; } buildPaths(pathsToBuild); if (dryRun) return; std::vector<StorePath> outPaths; for (auto & [drvPath, outputName] : pathsToBuildOrdered) { auto & [counter, _wantedOutputs] = drvMap.at({drvPath}); std::string drvPrefix = outLink; if (counter) drvPrefix += fmt("-%d", counter + 1); auto builtOutputs = store->queryPartialDerivationOutputMap(drvPath, &*evalStore); auto maybeOutputPath = builtOutputs.at(outputName); assert(maybeOutputPath); auto outputPath = *maybeOutputPath; if (auto store2 = store.dynamic_pointer_cast<LocalFSStore>()) { std::string symlink = drvPrefix; if (outputName != "out") symlink += "-" + outputName; store2->addPermRoot(outputPath, absPath(symlink)); } outPaths.push_back(outputPath); } logger->stop(); for (auto & path : outPaths) std::cout << store->printStorePath(path) << '\n'; } } static RegisterLegacyCommand r_nix_build("nix-build", main_nix_build); static RegisterLegacyCommand r_nix_shell("nix-shell", main_nix_build);
26,594
C++
.cc
599
32.624374
153
0.543929
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,788
common-protocol.cc
NixOS_nix/src/libstore/common-protocol.cc
#include "serialise.hh" #include "path-with-outputs.hh" #include "store-api.hh" #include "build-result.hh" #include "common-protocol.hh" #include "common-protocol-impl.hh" #include "archive.hh" #include "derivations.hh" #include <nlohmann/json.hpp> namespace nix { /* protocol-agnostic definitions */ std::string CommonProto::Serialise<std::string>::read(const StoreDirConfig & store, CommonProto::ReadConn conn) { return readString(conn.from); } void CommonProto::Serialise<std::string>::write(const StoreDirConfig & store, CommonProto::WriteConn conn, const std::string & str) { conn.to << str; } StorePath CommonProto::Serialise<StorePath>::read(const StoreDirConfig & store, CommonProto::ReadConn conn) { return store.parseStorePath(readString(conn.from)); } void CommonProto::Serialise<StorePath>::write(const StoreDirConfig & store, CommonProto::WriteConn conn, const StorePath & storePath) { conn.to << store.printStorePath(storePath); } ContentAddress CommonProto::Serialise<ContentAddress>::read(const StoreDirConfig & store, CommonProto::ReadConn conn) { return ContentAddress::parse(readString(conn.from)); } void CommonProto::Serialise<ContentAddress>::write(const StoreDirConfig & store, CommonProto::WriteConn conn, const ContentAddress & ca) { conn.to << renderContentAddress(ca); } Realisation CommonProto::Serialise<Realisation>::read(const StoreDirConfig & store, CommonProto::ReadConn conn) { std::string rawInput = readString(conn.from); return Realisation::fromJSON( nlohmann::json::parse(rawInput), "remote-protocol" ); } void CommonProto::Serialise<Realisation>::write(const StoreDirConfig & store, CommonProto::WriteConn conn, const Realisation & realisation) { conn.to << realisation.toJSON().dump(); } DrvOutput CommonProto::Serialise<DrvOutput>::read(const StoreDirConfig & store, CommonProto::ReadConn conn) { return DrvOutput::parse(readString(conn.from)); } void CommonProto::Serialise<DrvOutput>::write(const StoreDirConfig & store, CommonProto::WriteConn conn, const DrvOutput & drvOutput) { conn.to << drvOutput.to_string(); } std::optional<StorePath> CommonProto::Serialise<std::optional<StorePath>>::read(const StoreDirConfig & store, CommonProto::ReadConn conn) { auto s = readString(conn.from); return s == "" ? std::optional<StorePath> {} : store.parseStorePath(s); } void CommonProto::Serialise<std::optional<StorePath>>::write(const StoreDirConfig & store, CommonProto::WriteConn conn, const std::optional<StorePath> & storePathOpt) { conn.to << (storePathOpt ? store.printStorePath(*storePathOpt) : ""); } std::optional<ContentAddress> CommonProto::Serialise<std::optional<ContentAddress>>::read(const StoreDirConfig & store, CommonProto::ReadConn conn) { return ContentAddress::parseOpt(readString(conn.from)); } void CommonProto::Serialise<std::optional<ContentAddress>>::write(const StoreDirConfig & store, CommonProto::WriteConn conn, const std::optional<ContentAddress> & caOpt) { conn.to << (caOpt ? renderContentAddress(*caOpt) : ""); } }
3,095
C++
.cc
73
39.917808
169
0.768846
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,789
path-references.cc
NixOS_nix/src/libstore/path-references.cc
#include "path-references.hh" #include "hash.hh" #include "archive.hh" #include <map> #include <cstdlib> #include <mutex> #include <algorithm> namespace nix { PathRefScanSink::PathRefScanSink(StringSet && hashes, std::map<std::string, StorePath> && backMap) : RefScanSink(std::move(hashes)) , backMap(std::move(backMap)) { } PathRefScanSink PathRefScanSink::fromPaths(const StorePathSet & refs) { StringSet hashes; std::map<std::string, StorePath> backMap; for (auto & i : refs) { std::string hashPart(i.hashPart()); auto inserted = backMap.emplace(hashPart, i).second; assert(inserted); hashes.insert(hashPart); } return PathRefScanSink(std::move(hashes), std::move(backMap)); } StorePathSet PathRefScanSink::getResultPaths() { /* Map the hashes found back to their store paths. */ StorePathSet found; for (auto & i : getResult()) { auto j = backMap.find(i); assert(j != backMap.end()); found.insert(j->second); } return found; } std::pair<StorePathSet, HashResult> scanForReferences( const std::string & path, const StorePathSet & refs) { HashSink hashSink { HashAlgorithm::SHA256 }; auto found = scanForReferences(hashSink, path, refs); auto hash = hashSink.finish(); return std::pair<StorePathSet, HashResult>(found, hash); } StorePathSet scanForReferences( Sink & toTee, const Path & path, const StorePathSet & refs) { PathRefScanSink refsSink = PathRefScanSink::fromPaths(refs); TeeSink sink { refsSink, toTee }; /* Look for the hashes in the NAR dump of the path. */ dumpPath(path, sink); return refsSink.getResultPaths(); } }
1,710
C++
.cc
56
26.392857
98
0.693529
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,790
path-with-outputs.cc
NixOS_nix/src/libstore/path-with-outputs.cc
#include <regex> #include "path-with-outputs.hh" #include "store-api.hh" #include "strings.hh" namespace nix { std::string StorePathWithOutputs::to_string(const StoreDirConfig & store) const { return outputs.empty() ? store.printStorePath(path) : store.printStorePath(path) + "!" + concatStringsSep(",", outputs); } DerivedPath StorePathWithOutputs::toDerivedPath() const { if (!outputs.empty()) { return DerivedPath::Built { .drvPath = makeConstantStorePathRef(path), .outputs = OutputsSpec::Names { outputs }, }; } else if (path.isDerivation()) { assert(outputs.empty()); return DerivedPath::Built { .drvPath = makeConstantStorePathRef(path), .outputs = OutputsSpec::All { }, }; } else { return DerivedPath::Opaque { path }; } } std::vector<DerivedPath> toDerivedPaths(const std::vector<StorePathWithOutputs> ss) { std::vector<DerivedPath> reqs; reqs.reserve(ss.size()); for (auto & s : ss) reqs.push_back(s.toDerivedPath()); return reqs; } StorePathWithOutputs::ParseResult StorePathWithOutputs::tryFromDerivedPath(const DerivedPath & p) { return std::visit(overloaded { [&](const DerivedPath::Opaque & bo) -> StorePathWithOutputs::ParseResult { if (bo.path.isDerivation()) { // drv path gets interpreted as "build", not "get drv file itself" return bo.path; } return StorePathWithOutputs { bo.path }; }, [&](const DerivedPath::Built & bfd) -> StorePathWithOutputs::ParseResult { return std::visit(overloaded { [&](const SingleDerivedPath::Opaque & bo) -> StorePathWithOutputs::ParseResult { return StorePathWithOutputs { .path = bo.path, // Use legacy encoding of wildcard as empty set .outputs = std::visit(overloaded { [&](const OutputsSpec::All &) -> StringSet { return {}; }, [&](const OutputsSpec::Names & outputs) { return static_cast<StringSet>(outputs); }, }, bfd.outputs.raw), }; }, [&](const SingleDerivedPath::Built &) -> StorePathWithOutputs::ParseResult { return std::monostate {}; }, }, bfd.drvPath->raw()); }, }, p.raw()); } std::pair<std::string_view, StringSet> parsePathWithOutputs(std::string_view s) { size_t n = s.find("!"); return n == s.npos ? std::make_pair(s, std::set<std::string>()) : std::make_pair(s.substr(0, n), tokenizeString<std::set<std::string>>(s.substr(n + 1), ",")); } StorePathWithOutputs parsePathWithOutputs(const StoreDirConfig & store, std::string_view pathWithOutputs) { auto [path, outputs] = parsePathWithOutputs(pathWithOutputs); return StorePathWithOutputs { store.parseStorePath(path), std::move(outputs) }; } StorePathWithOutputs followLinksToStorePathWithOutputs(const Store & store, std::string_view pathWithOutputs) { auto [path, outputs] = parsePathWithOutputs(pathWithOutputs); return StorePathWithOutputs { store.followLinksToStorePath(path), std::move(outputs) }; } }
3,474
C++
.cc
87
30.367816
109
0.592878
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,791
binary-cache-store.cc
NixOS_nix/src/libstore/binary-cache-store.cc
#include "archive.hh" #include "binary-cache-store.hh" #include "compression.hh" #include "derivations.hh" #include "source-accessor.hh" #include "globals.hh" #include "nar-info.hh" #include "sync.hh" #include "remote-fs-accessor.hh" #include "nar-info-disk-cache.hh" #include "nar-accessor.hh" #include "thread-pool.hh" #include "callback.hh" #include "signals.hh" #include "archive.hh" #include <chrono> #include <future> #include <regex> #include <fstream> #include <sstream> #include <nlohmann/json.hpp> namespace nix { BinaryCacheStore::BinaryCacheStore(const Params & params) : BinaryCacheStoreConfig(params) , Store(params) { if (secretKeyFile != "") signer = std::make_unique<LocalSigner>( SecretKey { readFile(secretKeyFile) }); StringSink sink; sink << narVersionMagic1; narMagic = sink.s; } void BinaryCacheStore::init() { std::string cacheInfoFile = "nix-cache-info"; auto cacheInfo = getFile(cacheInfoFile); if (!cacheInfo) { upsertFile(cacheInfoFile, "StoreDir: " + storeDir + "\n", "text/x-nix-cache-info"); } else { for (auto & line : tokenizeString<Strings>(*cacheInfo, "\n")) { size_t colon= line.find(':'); if (colon ==std::string::npos) continue; auto name = line.substr(0, colon); auto value = trim(line.substr(colon + 1, std::string::npos)); if (name == "StoreDir") { if (value != storeDir) throw Error("binary cache '%s' is for Nix stores with prefix '%s', not '%s'", getUri(), value, storeDir); } else if (name == "WantMassQuery") { wantMassQuery.setDefault(value == "1"); } else if (name == "Priority") { priority.setDefault(std::stoi(value)); } } } } void BinaryCacheStore::upsertFile(const std::string & path, std::string && data, const std::string & mimeType) { upsertFile(path, std::make_shared<std::stringstream>(std::move(data)), mimeType); } void BinaryCacheStore::getFile(const std::string & path, Callback<std::optional<std::string>> callback) noexcept { try { callback(getFile(path)); } catch (...) { callback.rethrow(); } } void BinaryCacheStore::getFile(const std::string & path, Sink & sink) { std::promise<std::optional<std::string>> promise; getFile(path, {[&](std::future<std::optional<std::string>> result) { try { promise.set_value(result.get()); } catch (...) { promise.set_exception(std::current_exception()); } }}); sink(*promise.get_future().get()); } std::optional<std::string> BinaryCacheStore::getFile(const std::string & path) { StringSink sink; try { getFile(path, sink); } catch (NoSuchBinaryCacheFile &) { return std::nullopt; } return std::move(sink.s); } std::string BinaryCacheStore::narInfoFileFor(const StorePath & storePath) { return std::string(storePath.hashPart()) + ".narinfo"; } void BinaryCacheStore::writeNarInfo(ref<NarInfo> narInfo) { auto narInfoFile = narInfoFileFor(narInfo->path); upsertFile(narInfoFile, narInfo->to_string(*this), "text/x-nix-narinfo"); { auto state_(state.lock()); state_->pathInfoCache.upsert( std::string(narInfo->path.to_string()), PathInfoCacheValue { .value = std::shared_ptr<NarInfo>(narInfo) }); } if (diskCache) diskCache->upsertNarInfo(getUri(), std::string(narInfo->path.hashPart()), std::shared_ptr<NarInfo>(narInfo)); } ref<const ValidPathInfo> BinaryCacheStore::addToStoreCommon( Source & narSource, RepairFlag repair, CheckSigsFlag checkSigs, std::function<ValidPathInfo(HashResult)> mkInfo) { auto [fdTemp, fnTemp] = createTempFile(); AutoDelete autoDelete(fnTemp); auto now1 = std::chrono::steady_clock::now(); /* Read the NAR simultaneously into a CompressionSink+FileSink (to write the compressed NAR to disk), into a HashSink (to get the NAR hash), and into a NarAccessor (to get the NAR listing). */ HashSink fileHashSink { HashAlgorithm::SHA256 }; std::shared_ptr<SourceAccessor> narAccessor; HashSink narHashSink { HashAlgorithm::SHA256 }; { FdSink fileSink(fdTemp.get()); TeeSink teeSinkCompressed { fileSink, fileHashSink }; auto compressionSink = makeCompressionSink(compression, teeSinkCompressed, parallelCompression, compressionLevel); TeeSink teeSinkUncompressed { *compressionSink, narHashSink }; TeeSource teeSource { narSource, teeSinkUncompressed }; narAccessor = makeNarAccessor(teeSource); compressionSink->finish(); fileSink.flush(); } auto now2 = std::chrono::steady_clock::now(); auto info = mkInfo(narHashSink.finish()); auto narInfo = make_ref<NarInfo>(info); narInfo->compression = compression; auto [fileHash, fileSize] = fileHashSink.finish(); narInfo->fileHash = fileHash; narInfo->fileSize = fileSize; narInfo->url = "nar/" + narInfo->fileHash->to_string(HashFormat::Nix32, false) + ".nar" + (compression == "xz" ? ".xz" : compression == "bzip2" ? ".bz2" : compression == "zstd" ? ".zst" : compression == "lzip" ? ".lzip" : compression == "lz4" ? ".lz4" : compression == "br" ? ".br" : ""); auto duration = std::chrono::duration_cast<std::chrono::milliseconds>(now2 - now1).count(); printMsg(lvlTalkative, "copying path '%1%' (%2% bytes, compressed %3$.1f%% in %4% ms) to binary cache", printStorePath(narInfo->path), info.narSize, ((1.0 - (double) fileSize / info.narSize) * 100.0), duration); /* Verify that all references are valid. This may do some .narinfo reads, but typically they'll already be cached. */ for (auto & ref : info.references) try { if (ref != info.path) queryPathInfo(ref); } catch (InvalidPath &) { throw Error("cannot add '%s' to the binary cache because the reference '%s' is not valid", printStorePath(info.path), printStorePath(ref)); } /* Optionally write a JSON file containing a listing of the contents of the NAR. */ if (writeNARListing) { nlohmann::json j = { {"version", 1}, {"root", listNar(ref<SourceAccessor>(narAccessor), CanonPath::root, true)}, }; upsertFile(std::string(info.path.hashPart()) + ".ls", j.dump(), "application/json"); } /* Optionally maintain an index of DWARF debug info files consisting of JSON files named 'debuginfo/<build-id>' that specify the NAR file and member containing the debug info. */ if (writeDebugInfo) { CanonPath buildIdDir("lib/debug/.build-id"); if (auto st = narAccessor->maybeLstat(buildIdDir); st && st->type == SourceAccessor::tDirectory) { ThreadPool threadPool(25); auto doFile = [&](std::string member, std::string key, std::string target) { checkInterrupt(); nlohmann::json json; json["archive"] = target; json["member"] = member; // FIXME: or should we overwrite? The previous link may point // to a GC'ed file, so overwriting might be useful... if (fileExists(key)) return; printMsg(lvlTalkative, "creating debuginfo link from '%s' to '%s'", key, target); upsertFile(key, json.dump(), "application/json"); }; std::regex regex1("^[0-9a-f]{2}$"); std::regex regex2("^[0-9a-f]{38}\\.debug$"); for (auto & [s1, _type] : narAccessor->readDirectory(buildIdDir)) { auto dir = buildIdDir / s1; if (narAccessor->lstat(dir).type != SourceAccessor::tDirectory || !std::regex_match(s1, regex1)) continue; for (auto & [s2, _type] : narAccessor->readDirectory(dir)) { auto debugPath = dir / s2; if (narAccessor->lstat(debugPath).type != SourceAccessor::tRegular || !std::regex_match(s2, regex2)) continue; auto buildId = s1 + s2; std::string key = "debuginfo/" + buildId; std::string target = "../" + narInfo->url; threadPool.enqueue(std::bind(doFile, std::string(debugPath.rel()), key, target)); } } threadPool.process(); } } /* Atomically write the NAR file. */ if (repair || !fileExists(narInfo->url)) { stats.narWrite++; upsertFile(narInfo->url, std::make_shared<std::fstream>(fnTemp, std::ios_base::in | std::ios_base::binary), "application/x-nix-nar"); } else stats.narWriteAverted++; stats.narWriteBytes += info.narSize; stats.narWriteCompressedBytes += fileSize; stats.narWriteCompressionTimeMs += duration; /* Atomically write the NAR info file.*/ if (signer) narInfo->sign(*this, *signer); writeNarInfo(narInfo); stats.narInfoWrite++; return narInfo; } void BinaryCacheStore::addToStore(const ValidPathInfo & info, Source & narSource, RepairFlag repair, CheckSigsFlag checkSigs) { if (!repair && isValidPath(info.path)) { // FIXME: copyNAR -> null sink narSource.drain(); return; } addToStoreCommon(narSource, repair, checkSigs, {[&](HashResult nar) { /* FIXME reinstate these, once we can correctly do hash modulo sink as needed. We need to throw here in case we uploaded a corrupted store path. */ // assert(info.narHash == nar.first); // assert(info.narSize == nar.second); return info; }}); } StorePath BinaryCacheStore::addToStoreFromDump( Source & dump, std::string_view name, FileSerialisationMethod dumpMethod, ContentAddressMethod hashMethod, HashAlgorithm hashAlgo, const StorePathSet & references, RepairFlag repair) { std::optional<Hash> caHash; std::string nar; // Calculating Git hash from NAR stream not yet implemented. May not // be possible to implement in single-pass if the NAR is in an // inconvenient order. Could fetch after uploading, however. if (hashMethod.getFileIngestionMethod() == FileIngestionMethod::Git) unsupported("addToStoreFromDump"); if (auto * dump2p = dynamic_cast<StringSource *>(&dump)) { auto & dump2 = *dump2p; // Hack, this gives us a "replayable" source so we can compute // multiple hashes more easily. // // Only calculate if the dump is in the right format, however. if (static_cast<FileIngestionMethod>(dumpMethod) == hashMethod.getFileIngestionMethod()) caHash = hashString(HashAlgorithm::SHA256, dump2.s); switch (dumpMethod) { case FileSerialisationMethod::NixArchive: // The dump is already NAR in this case, just use it. nar = dump2.s; break; case FileSerialisationMethod::Flat: { // The dump is Flat, so we need to convert it to NAR with a // single file. StringSink s; dumpString(dump2.s, s); nar = std::move(s.s); break; } } } else { // Otherwise, we have to do th same hashing as NAR so our single // hash will suffice for both purposes. if (dumpMethod != FileSerialisationMethod::NixArchive || hashAlgo != HashAlgorithm::SHA256) unsupported("addToStoreFromDump"); } StringSource narDump { nar }; // Use `narDump` if we wrote to `nar`. Source & narDump2 = nar.size() > 0 ? static_cast<Source &>(narDump) : dump; return addToStoreCommon(narDump2, repair, CheckSigs, [&](HashResult nar) { ValidPathInfo info { *this, name, ContentAddressWithReferences::fromParts( hashMethod, caHash ? *caHash : nar.first, { .others = references, // caller is not capable of creating a self-reference, because this is content-addressed without modulus .self = false, }), nar.first, }; info.narSize = nar.second; return info; })->path; } bool BinaryCacheStore::isValidPathUncached(const StorePath & storePath) { // FIXME: this only checks whether a .narinfo with a matching hash // part exists. So ‘f4kb...-foo’ matches ‘f4kb...-bar’, even // though they shouldn't. Not easily fixed. return fileExists(narInfoFileFor(storePath)); } std::optional<StorePath> BinaryCacheStore::queryPathFromHashPart(const std::string & hashPart) { auto pseudoPath = StorePath(hashPart + "-" + MissingName); try { auto info = queryPathInfo(pseudoPath); return info->path; } catch (InvalidPath &) { return std::nullopt; } } void BinaryCacheStore::narFromPath(const StorePath & storePath, Sink & sink) { auto info = queryPathInfo(storePath).cast<const NarInfo>(); LengthSink narSize; TeeSink tee { sink, narSize }; auto decompressor = makeDecompressionSink(info->compression, tee); try { getFile(info->url, *decompressor); } catch (NoSuchBinaryCacheFile & e) { throw SubstituteGone(std::move(e.info())); } decompressor->finish(); stats.narRead++; //stats.narReadCompressedBytes += nar->size(); // FIXME stats.narReadBytes += narSize.length; } void BinaryCacheStore::queryPathInfoUncached(const StorePath & storePath, Callback<std::shared_ptr<const ValidPathInfo>> callback) noexcept { auto uri = getUri(); auto storePathS = printStorePath(storePath); auto act = std::make_shared<Activity>(*logger, lvlTalkative, actQueryPathInfo, fmt("querying info about '%s' on '%s'", storePathS, uri), Logger::Fields{storePathS, uri}); PushActivity pact(act->id); auto narInfoFile = narInfoFileFor(storePath); auto callbackPtr = std::make_shared<decltype(callback)>(std::move(callback)); getFile(narInfoFile, {[=,this](std::future<std::optional<std::string>> fut) { try { auto data = fut.get(); if (!data) return (*callbackPtr)({}); stats.narInfoRead++; (*callbackPtr)((std::shared_ptr<ValidPathInfo>) std::make_shared<NarInfo>(*this, *data, narInfoFile)); (void) act; // force Activity into this lambda to ensure it stays alive } catch (...) { callbackPtr->rethrow(); } }}); } StorePath BinaryCacheStore::addToStore( std::string_view name, const SourcePath & path, ContentAddressMethod method, HashAlgorithm hashAlgo, const StorePathSet & references, PathFilter & filter, RepairFlag repair) { /* FIXME: Make BinaryCacheStore::addToStoreCommon support non-recursive+sha256 so we can just use the default implementation of this method in terms of addToStoreFromDump. */ auto h = hashPath(path, method.getFileIngestionMethod(), hashAlgo, filter).first; auto source = sinkToSource([&](Sink & sink) { path.dumpPath(sink, filter); }); return addToStoreCommon(*source, repair, CheckSigs, [&](HashResult nar) { ValidPathInfo info { *this, name, ContentAddressWithReferences::fromParts( method, h, { .others = references, // caller is not capable of creating a self-reference, because this is content-addressed without modulus .self = false, }), nar.first, }; info.narSize = nar.second; return info; })->path; } void BinaryCacheStore::queryRealisationUncached(const DrvOutput & id, Callback<std::shared_ptr<const Realisation>> callback) noexcept { auto outputInfoFilePath = realisationsPrefix + "/" + id.to_string() + ".doi"; auto callbackPtr = std::make_shared<decltype(callback)>(std::move(callback)); Callback<std::optional<std::string>> newCallback = { [=](std::future<std::optional<std::string>> fut) { try { auto data = fut.get(); if (!data) return (*callbackPtr)({}); auto realisation = Realisation::fromJSON( nlohmann::json::parse(*data), outputInfoFilePath); return (*callbackPtr)(std::make_shared<const Realisation>(realisation)); } catch (...) { callbackPtr->rethrow(); } } }; getFile(outputInfoFilePath, std::move(newCallback)); } void BinaryCacheStore::registerDrvOutput(const Realisation& info) { if (diskCache) diskCache->upsertRealisation(getUri(), info); auto filePath = realisationsPrefix + "/" + info.id.to_string() + ".doi"; upsertFile(filePath, info.toJSON().dump(), "application/json"); } ref<SourceAccessor> BinaryCacheStore::getFSAccessor(bool requireValidPath) { return make_ref<RemoteFSAccessor>(ref<Store>(shared_from_this()), requireValidPath, localNarCache); } void BinaryCacheStore::addSignatures(const StorePath & storePath, const StringSet & sigs) { /* Note: this is inherently racy since there is no locking on binary caches. In particular, with S3 this unreliable, even when addSignatures() is called sequentially on a path, because S3 might return an outdated cached version. */ auto narInfo = make_ref<NarInfo>((NarInfo &) *queryPathInfo(storePath)); narInfo->sigs.insert(sigs.begin(), sigs.end()); writeNarInfo(narInfo); } std::optional<std::string> BinaryCacheStore::getBuildLogExact(const StorePath & path) { auto logPath = "log/" + std::string(baseNameOf(printStorePath(path))); debug("fetching build log from binary cache '%s/%s'", getUri(), logPath); return getFile(logPath); } void BinaryCacheStore::addBuildLog(const StorePath & drvPath, std::string_view log) { assert(drvPath.isDerivation()); upsertFile( "log/" + std::string(drvPath.to_string()), (std::string) log, // FIXME: don't copy "text/plain; charset=utf-8"); } }
18,681
C++
.cc
458
32.796943
124
0.625538
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,792
ssh-store.cc
NixOS_nix/src/libstore/ssh-store.cc
#include "ssh-store.hh" #include "local-fs-store.hh" #include "remote-store-connection.hh" #include "source-accessor.hh" #include "archive.hh" #include "worker-protocol.hh" #include "worker-protocol-impl.hh" #include "pool.hh" #include "ssh.hh" namespace nix { SSHStoreConfig::SSHStoreConfig( std::string_view scheme, std::string_view authority, const Params & params) : StoreConfig(params) , RemoteStoreConfig(params) , CommonSSHStoreConfig(scheme, authority, params) { } std::string SSHStoreConfig::doc() { return #include "ssh-store.md" ; } class SSHStore : public virtual SSHStoreConfig, public virtual RemoteStore { public: SSHStore( std::string_view scheme, std::string_view host, const Params & params) : StoreConfig(params) , RemoteStoreConfig(params) , CommonSSHStoreConfig(scheme, host, params) , SSHStoreConfig(scheme, host, params) , Store(params) , RemoteStore(params) , master(createSSHMaster( // Use SSH master only if using more than 1 connection. connections->capacity() > 1)) { } std::string getUri() override { return *uriSchemes().begin() + "://" + host; } // FIXME extend daemon protocol, move implementation to RemoteStore std::optional<std::string> getBuildLogExact(const StorePath & path) override { unsupported("getBuildLogExact"); } protected: struct Connection : RemoteStore::Connection { std::unique_ptr<SSHMaster::Connection> sshConn; void closeWrite() override { sshConn->in.close(); } }; ref<RemoteStore::Connection> openConnection() override; std::string host; std::vector<std::string> extraRemoteProgramArgs; SSHMaster master; void setOptions(RemoteStore::Connection & conn) override { /* TODO Add a way to explicitly ask for some options to be forwarded. One option: A way to query the daemon for its settings, and then a series of params to SSHStore like forward-cores or forward-overridden-cores that only override the requested settings. */ }; }; MountedSSHStoreConfig::MountedSSHStoreConfig(StringMap params) : StoreConfig(params) , RemoteStoreConfig(params) , CommonSSHStoreConfig(params) , SSHStoreConfig(params) , LocalFSStoreConfig(params) { } MountedSSHStoreConfig::MountedSSHStoreConfig(std::string_view scheme, std::string_view host, StringMap params) : StoreConfig(params) , RemoteStoreConfig(params) , CommonSSHStoreConfig(scheme, host, params) , SSHStoreConfig(params) , LocalFSStoreConfig(params) { } std::string MountedSSHStoreConfig::doc() { return #include "mounted-ssh-store.md" ; } /** * The mounted ssh store assumes that filesystems on the remote host are * shared with the local host. This means that the remote nix store is * available locally and is therefore treated as a local filesystem * store. * * MountedSSHStore is very similar to UDSRemoteStore --- ignoring the * superficial differnce of SSH vs Unix domain sockets, they both are * accessing remote stores, and they both assume the store will be * mounted in the local filesystem. * * The difference lies in how they manage GC roots. See addPermRoot * below for details. */ class MountedSSHStore : public virtual MountedSSHStoreConfig, public virtual SSHStore, public virtual LocalFSStore { public: MountedSSHStore( std::string_view scheme, std::string_view host, const Params & params) : StoreConfig(params) , RemoteStoreConfig(params) , CommonSSHStoreConfig(scheme, host, params) , SSHStoreConfig(params) , LocalFSStoreConfig(params) , MountedSSHStoreConfig(params) , Store(params) , RemoteStore(params) , SSHStore(scheme, host, params) , LocalFSStore(params) { extraRemoteProgramArgs = { "--process-ops", }; } std::string getUri() override { return *uriSchemes().begin() + "://" + host; } void narFromPath(const StorePath & path, Sink & sink) override { return LocalFSStore::narFromPath(path, sink); } ref<SourceAccessor> getFSAccessor(bool requireValidPath) override { return LocalFSStore::getFSAccessor(requireValidPath); } std::optional<std::string> getBuildLogExact(const StorePath & path) override { return LocalFSStore::getBuildLogExact(path); } /** * This is the key difference from UDSRemoteStore: UDSRemote store * has the client create the direct root, and the remote side create * the indirect root. * * We could also do that, but the race conditions (will the remote * side see the direct root the client made?) seems bigger. * * In addition, the remote-side will have a process associated with * the authenticating user handling the connection (even if there * is a system-wide daemon or similar). This process can safely make * the direct and indirect roots without there being such a risk of * privilege escalation / symlinks in directories owned by the * originating requester that they cannot delete. */ Path addPermRoot(const StorePath & path, const Path & gcRoot) override { auto conn(getConnection()); conn->to << WorkerProto::Op::AddPermRoot; WorkerProto::write(*this, *conn, path); WorkerProto::write(*this, *conn, gcRoot); conn.processStderr(); return readString(conn->from); } }; ref<RemoteStore::Connection> SSHStore::openConnection() { auto conn = make_ref<Connection>(); Strings command = remoteProgram.get(); command.push_back("--stdio"); if (remoteStore.get() != "") { command.push_back("--store"); command.push_back(remoteStore.get()); } command.insert(command.end(), extraRemoteProgramArgs.begin(), extraRemoteProgramArgs.end()); conn->sshConn = master.startCommand(std::move(command)); conn->to = FdSink(conn->sshConn->in.get()); conn->from = FdSource(conn->sshConn->out.get()); return conn; } static RegisterStoreImplementation<SSHStore, SSHStoreConfig> regSSHStore; static RegisterStoreImplementation<MountedSSHStore, MountedSSHStoreConfig> regMountedSSHStore; }
6,471
C++
.cc
191
28.413613
114
0.69136
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,793
path-info.cc
NixOS_nix/src/libstore/path-info.cc
#include <nlohmann/json.hpp> #include "path-info.hh" #include "store-api.hh" #include "json-utils.hh" #include "comparator.hh" #include "strings.hh" namespace nix { GENERATE_CMP_EXT( , std::weak_ordering, UnkeyedValidPathInfo, me->deriver, me->narHash, me->references, me->registrationTime, me->narSize, //me->id, me->ultimate, me->sigs, me->ca); std::string ValidPathInfo::fingerprint(const Store & store) const { if (narSize == 0) throw Error("cannot calculate fingerprint of path '%s' because its size is not known", store.printStorePath(path)); return "1;" + store.printStorePath(path) + ";" + narHash.to_string(HashFormat::Nix32, true) + ";" + std::to_string(narSize) + ";" + concatStringsSep(",", store.printStorePathSet(references)); } void ValidPathInfo::sign(const Store & store, const Signer & signer) { sigs.insert(signer.signDetached(fingerprint(store))); } std::optional<ContentAddressWithReferences> ValidPathInfo::contentAddressWithReferences() const { if (! ca) return std::nullopt; switch (ca->method.raw) { case ContentAddressMethod::Raw::Text: { assert(references.count(path) == 0); return TextInfo { .hash = ca->hash, .references = references, }; } case ContentAddressMethod::Raw::Flat: case ContentAddressMethod::Raw::NixArchive: case ContentAddressMethod::Raw::Git: default: { auto refs = references; bool hasSelfReference = false; if (refs.count(path)) { hasSelfReference = true; refs.erase(path); } return FixedOutputInfo { .method = ca->method.getFileIngestionMethod(), .hash = ca->hash, .references = { .others = std::move(refs), .self = hasSelfReference, }, }; } } } bool ValidPathInfo::isContentAddressed(const Store & store) const { auto fullCaOpt = contentAddressWithReferences(); if (! fullCaOpt) return false; auto caPath = store.makeFixedOutputPathFromCA(path.name(), *fullCaOpt); bool res = caPath == path; if (!res) printError("warning: path '%s' claims to be content-addressed but isn't", store.printStorePath(path)); return res; } size_t ValidPathInfo::checkSignatures(const Store & store, const PublicKeys & publicKeys) const { if (isContentAddressed(store)) return maxSigs; size_t good = 0; for (auto & sig : sigs) if (checkSignature(store, publicKeys, sig)) good++; return good; } bool ValidPathInfo::checkSignature(const Store & store, const PublicKeys & publicKeys, const std::string & sig) const { return verifyDetached(fingerprint(store), sig, publicKeys); } Strings ValidPathInfo::shortRefs() const { Strings refs; for (auto & r : references) refs.push_back(std::string(r.to_string())); return refs; } ValidPathInfo::ValidPathInfo( const Store & store, std::string_view name, ContentAddressWithReferences && ca, Hash narHash) : UnkeyedValidPathInfo(narHash) , path(store.makeFixedOutputPathFromCA(name, ca)) { this->ca = ContentAddress { .method = ca.getMethod(), .hash = ca.getHash(), }; std::visit(overloaded { [this](TextInfo && ti) { this->references = std::move(ti.references); }, [this](FixedOutputInfo && foi) { this->references = std::move(foi.references.others); if (foi.references.self) this->references.insert(path); }, }, std::move(ca).raw); } nlohmann::json UnkeyedValidPathInfo::toJSON( const Store & store, bool includeImpureInfo, HashFormat hashFormat) const { using nlohmann::json; auto jsonObject = json::object(); jsonObject["narHash"] = narHash.to_string(hashFormat, true); jsonObject["narSize"] = narSize; { auto & jsonRefs = jsonObject["references"] = json::array(); for (auto & ref : references) jsonRefs.emplace_back(store.printStorePath(ref)); } jsonObject["ca"] = ca ? (std::optional { renderContentAddress(*ca) }) : std::nullopt; if (includeImpureInfo) { jsonObject["deriver"] = deriver ? (std::optional { store.printStorePath(*deriver) }) : std::nullopt; jsonObject["registrationTime"] = registrationTime ? (std::optional { registrationTime }) : std::nullopt; jsonObject["ultimate"] = ultimate; auto & sigsObj = jsonObject["signatures"] = json::array(); for (auto & sig : sigs) sigsObj.push_back(sig); } return jsonObject; } UnkeyedValidPathInfo UnkeyedValidPathInfo::fromJSON( const Store & store, const nlohmann::json & _json) { UnkeyedValidPathInfo res { Hash(Hash::dummy), }; auto & json = getObject(_json); res.narHash = Hash::parseAny(getString(valueAt(json, "narHash")), std::nullopt); res.narSize = getInteger(valueAt(json, "narSize")); try { auto references = getStringList(valueAt(json, "references")); for (auto & input : references) res.references.insert(store.parseStorePath(static_cast<const std::string &> (input))); } catch (Error & e) { e.addTrace({}, "while reading key 'references'"); throw; } // New format as this as nullable but mandatory field; handling // missing is for back-compat. if (json.contains("ca")) if (auto * rawCa = getNullable(valueAt(json, "ca"))) res.ca = ContentAddress::parse(getString(*rawCa)); if (json.contains("deriver")) if (auto * rawDeriver = getNullable(valueAt(json, "deriver"))) res.deriver = store.parseStorePath(getString(*rawDeriver)); if (json.contains("registrationTime")) if (auto * rawRegistrationTime = getNullable(valueAt(json, "registrationTime"))) res.registrationTime = getInteger(*rawRegistrationTime); if (json.contains("ultimate")) res.ultimate = getBoolean(valueAt(json, "ultimate")); if (json.contains("signatures")) res.sigs = getStringSet(valueAt(json, "signatures")); return res; } }
6,440
C++
.cc
186
27.645161
117
0.62963
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,794
remote-store.cc
NixOS_nix/src/libstore/remote-store.cc
#include "serialise.hh" #include "util.hh" #include "path-with-outputs.hh" #include "gc-store.hh" #include "remote-fs-accessor.hh" #include "build-result.hh" #include "remote-store.hh" #include "remote-store-connection.hh" #include "worker-protocol.hh" #include "worker-protocol-impl.hh" #include "archive.hh" #include "globals.hh" #include "derivations.hh" #include "pool.hh" #include "finally.hh" #include "git.hh" #include "logging.hh" #include "callback.hh" #include "filetransfer.hh" #include "signals.hh" #include <nlohmann/json.hpp> namespace nix { /* TODO: Separate these store types into different files, give them better names */ RemoteStore::RemoteStore(const Params & params) : RemoteStoreConfig(params) , Store(params) , connections(make_ref<Pool<Connection>>( std::max(1, (int) maxConnections), [this]() { auto conn = openConnectionWrapper(); try { initConnection(*conn); } catch (...) { failed = true; throw; } return conn; }, [this](const ref<Connection> & r) { return r->to.good() && r->from.good() && std::chrono::duration_cast<std::chrono::seconds>( std::chrono::steady_clock::now() - r->startTime).count() < maxConnectionAge; } )) { } ref<RemoteStore::Connection> RemoteStore::openConnectionWrapper() { if (failed) throw Error("opening a connection to remote store '%s' previously failed", getUri()); try { return openConnection(); } catch (...) { failed = true; throw; } } void RemoteStore::initConnection(Connection & conn) { /* Send the magic greeting, check for the reply. */ try { conn.from.endOfFileError = "Nix daemon disconnected unexpectedly (maybe it crashed?)"; StringSink saved; TeeSource tee(conn.from, saved); try { auto [protoVersion, features] = WorkerProto::BasicClientConnection::handshake( conn.to, tee, PROTOCOL_VERSION, WorkerProto::allFeatures); conn.protoVersion = protoVersion; conn.features = features; } catch (SerialisationError & e) { /* In case the other side is waiting for our input, close it. */ conn.closeWrite(); { NullSink nullSink; tee.drainInto(nullSink); } throw Error("protocol mismatch, got '%s'", chomp(saved.s)); } static_cast<WorkerProto::ClientHandshakeInfo &>(conn) = conn.postHandshake(*this); for (auto & feature : conn.features) debug("negotiated feature '%s'", feature); auto ex = conn.processStderrReturn(); if (ex) std::rethrow_exception(ex); } catch (Error & e) { throw Error("cannot open connection to remote store '%s': %s", getUri(), e.what()); } setOptions(conn); } void RemoteStore::setOptions(Connection & conn) { conn.to << WorkerProto::Op::SetOptions << settings.keepFailed << settings.keepGoing << settings.tryFallback << verbosity << settings.maxBuildJobs << settings.maxSilentTime << true << (settings.verboseBuild ? lvlError : lvlVomit) << 0 // obsolete log type << 0 /* obsolete print build trace */ << settings.buildCores << settings.useSubstitutes; if (GET_PROTOCOL_MINOR(conn.protoVersion) >= 12) { std::map<std::string, Config::SettingInfo> overrides; settings.getSettings(overrides, true); // libstore settings fileTransferSettings.getSettings(overrides, true); overrides.erase(settings.keepFailed.name); overrides.erase(settings.keepGoing.name); overrides.erase(settings.tryFallback.name); overrides.erase(settings.maxBuildJobs.name); overrides.erase(settings.maxSilentTime.name); overrides.erase(settings.buildCores.name); overrides.erase(settings.useSubstitutes.name); overrides.erase(loggerSettings.showTrace.name); overrides.erase(experimentalFeatureSettings.experimentalFeatures.name); overrides.erase("plugin-files"); conn.to << overrides.size(); for (auto & i : overrides) conn.to << i.first << i.second.value; } auto ex = conn.processStderrReturn(); if (ex) std::rethrow_exception(ex); } RemoteStore::ConnectionHandle::~ConnectionHandle() { if (!daemonException && std::uncaught_exceptions()) { handle.markBad(); debug("closing daemon connection because of an exception"); } } void RemoteStore::ConnectionHandle::processStderr(Sink * sink, Source * source, bool flush, bool block) { handle->processStderr(&daemonException, sink, source, flush, block); } RemoteStore::ConnectionHandle RemoteStore::getConnection() { return ConnectionHandle(connections->get()); } void RemoteStore::setOptions() { setOptions(*(getConnection().handle)); } bool RemoteStore::isValidPathUncached(const StorePath & path) { auto conn(getConnection()); conn->to << WorkerProto::Op::IsValidPath << printStorePath(path); conn.processStderr(); return readInt(conn->from); } StorePathSet RemoteStore::queryValidPaths(const StorePathSet & paths, SubstituteFlag maybeSubstitute) { auto conn(getConnection()); if (GET_PROTOCOL_MINOR(conn->protoVersion) < 12) { StorePathSet res; for (auto & i : paths) if (isValidPath(i)) res.insert(i); return res; } else { return conn->queryValidPaths(*this, &conn.daemonException, paths, maybeSubstitute); } } StorePathSet RemoteStore::queryAllValidPaths() { auto conn(getConnection()); conn->to << WorkerProto::Op::QueryAllValidPaths; conn.processStderr(); return WorkerProto::Serialise<StorePathSet>::read(*this, *conn); } StorePathSet RemoteStore::querySubstitutablePaths(const StorePathSet & paths) { auto conn(getConnection()); if (GET_PROTOCOL_MINOR(conn->protoVersion) < 12) { StorePathSet res; for (auto & i : paths) { conn->to << WorkerProto::Op::HasSubstitutes << printStorePath(i); conn.processStderr(); if (readInt(conn->from)) res.insert(i); } return res; } else { conn->to << WorkerProto::Op::QuerySubstitutablePaths; WorkerProto::write(*this, *conn, paths); conn.processStderr(); return WorkerProto::Serialise<StorePathSet>::read(*this, *conn); } } void RemoteStore::querySubstitutablePathInfos(const StorePathCAMap & pathsMap, SubstitutablePathInfos & infos) { if (pathsMap.empty()) return; auto conn(getConnection()); if (GET_PROTOCOL_MINOR(conn->protoVersion) < 12) { for (auto & i : pathsMap) { SubstitutablePathInfo info; conn->to << WorkerProto::Op::QuerySubstitutablePathInfo << printStorePath(i.first); conn.processStderr(); unsigned int reply = readInt(conn->from); if (reply == 0) continue; auto deriver = readString(conn->from); if (deriver != "") info.deriver = parseStorePath(deriver); info.references = WorkerProto::Serialise<StorePathSet>::read(*this, *conn); info.downloadSize = readLongLong(conn->from); info.narSize = readLongLong(conn->from); infos.insert_or_assign(i.first, std::move(info)); } } else { conn->to << WorkerProto::Op::QuerySubstitutablePathInfos; if (GET_PROTOCOL_MINOR(conn->protoVersion) < 22) { StorePathSet paths; for (auto & path : pathsMap) paths.insert(path.first); WorkerProto::write(*this, *conn, paths); } else WorkerProto::write(*this, *conn, pathsMap); conn.processStderr(); size_t count = readNum<size_t>(conn->from); for (size_t n = 0; n < count; n++) { SubstitutablePathInfo & info(infos[parseStorePath(readString(conn->from))]); auto deriver = readString(conn->from); if (deriver != "") info.deriver = parseStorePath(deriver); info.references = WorkerProto::Serialise<StorePathSet>::read(*this, *conn); info.downloadSize = readLongLong(conn->from); info.narSize = readLongLong(conn->from); } } } void RemoteStore::queryPathInfoUncached(const StorePath & path, Callback<std::shared_ptr<const ValidPathInfo>> callback) noexcept { try { std::shared_ptr<const ValidPathInfo> info; { auto conn(getConnection()); info = std::make_shared<ValidPathInfo>( StorePath{path}, conn->queryPathInfo(*this, &conn.daemonException, path)); } callback(std::move(info)); } catch (...) { callback.rethrow(); } } void RemoteStore::queryReferrers(const StorePath & path, StorePathSet & referrers) { auto conn(getConnection()); conn->to << WorkerProto::Op::QueryReferrers << printStorePath(path); conn.processStderr(); for (auto & i : WorkerProto::Serialise<StorePathSet>::read(*this, *conn)) referrers.insert(i); } StorePathSet RemoteStore::queryValidDerivers(const StorePath & path) { auto conn(getConnection()); conn->to << WorkerProto::Op::QueryValidDerivers << printStorePath(path); conn.processStderr(); return WorkerProto::Serialise<StorePathSet>::read(*this, *conn); } StorePathSet RemoteStore::queryDerivationOutputs(const StorePath & path) { if (GET_PROTOCOL_MINOR(getProtocol()) >= 0x16) { return Store::queryDerivationOutputs(path); } auto conn(getConnection()); conn->to << WorkerProto::Op::QueryDerivationOutputs << printStorePath(path); conn.processStderr(); return WorkerProto::Serialise<StorePathSet>::read(*this, *conn); } std::map<std::string, std::optional<StorePath>> RemoteStore::queryPartialDerivationOutputMap(const StorePath & path, Store * evalStore_) { if (GET_PROTOCOL_MINOR(getProtocol()) >= 0x16) { if (!evalStore_) { auto conn(getConnection()); conn->to << WorkerProto::Op::QueryDerivationOutputMap << printStorePath(path); conn.processStderr(); return WorkerProto::Serialise<std::map<std::string, std::optional<StorePath>>>::read(*this, *conn); } else { auto & evalStore = *evalStore_; auto outputs = evalStore.queryStaticPartialDerivationOutputMap(path); // union with the first branch overriding the statically-known ones // when non-`std::nullopt`. for (auto && [outputName, optPath] : queryPartialDerivationOutputMap(path, nullptr)) { if (optPath) outputs.insert_or_assign(std::move(outputName), std::move(optPath)); else outputs.insert({std::move(outputName), std::nullopt}); } return outputs; } } else { auto & evalStore = evalStore_ ? *evalStore_ : *this; // Fallback for old daemon versions. // For floating-CA derivations (and their co-dependencies) this is an // under-approximation as it only returns the paths that can be inferred // from the derivation itself (and not the ones that are known because // the have been built), but as old stores don't handle floating-CA // derivations this shouldn't matter return evalStore.queryStaticPartialDerivationOutputMap(path); } } std::optional<StorePath> RemoteStore::queryPathFromHashPart(const std::string & hashPart) { auto conn(getConnection()); conn->to << WorkerProto::Op::QueryPathFromHashPart << hashPart; conn.processStderr(); Path path = readString(conn->from); if (path.empty()) return {}; return parseStorePath(path); } ref<const ValidPathInfo> RemoteStore::addCAToStore( Source & dump, std::string_view name, ContentAddressMethod caMethod, HashAlgorithm hashAlgo, const StorePathSet & references, RepairFlag repair) { std::optional<ConnectionHandle> conn_(getConnection()); auto & conn = *conn_; if (GET_PROTOCOL_MINOR(conn->protoVersion) >= 25) { conn->to << WorkerProto::Op::AddToStore << name << caMethod.renderWithAlgo(hashAlgo); WorkerProto::write(*this, *conn, references); conn->to << repair; // The dump source may invoke the store, so we need to make some room. connections->incCapacity(); { Finally cleanup([&]() { connections->decCapacity(); }); conn.withFramedSink([&](Sink & sink) { dump.drainInto(sink); }); } return make_ref<ValidPathInfo>( WorkerProto::Serialise<ValidPathInfo>::read(*this, *conn)); } else { if (repair) throw Error("repairing is not supported when building through the Nix daemon protocol < 1.25"); switch (caMethod.raw) { case ContentAddressMethod::Raw::Text: { if (hashAlgo != HashAlgorithm::SHA256) throw UnimplementedError("When adding text-hashed data called '%s', only SHA-256 is supported but '%s' was given", name, printHashAlgo(hashAlgo)); std::string s = dump.drain(); conn->to << WorkerProto::Op::AddTextToStore << name << s; WorkerProto::write(*this, *conn, references); conn.processStderr(); break; } case ContentAddressMethod::Raw::Flat: case ContentAddressMethod::Raw::NixArchive: case ContentAddressMethod::Raw::Git: default: { auto fim = caMethod.getFileIngestionMethod(); conn->to << WorkerProto::Op::AddToStore << name << ((hashAlgo == HashAlgorithm::SHA256 && fim == FileIngestionMethod::NixArchive) ? 0 : 1) /* backwards compatibility hack */ << (fim == FileIngestionMethod::NixArchive ? 1 : 0) << printHashAlgo(hashAlgo); try { conn->to.written = 0; connections->incCapacity(); { Finally cleanup([&]() { connections->decCapacity(); }); if (fim == FileIngestionMethod::NixArchive) { dump.drainInto(conn->to); } else { std::string contents = dump.drain(); dumpString(contents, conn->to); } } conn.processStderr(); } catch (SysError & e) { /* Daemon closed while we were sending the path. Probably OOM or I/O error. */ if (e.errNo == EPIPE) try { conn.processStderr(); } catch (EndOfFile & e) { } throw; } break; } } auto path = parseStorePath(readString(conn->from)); // Release our connection to prevent a deadlock in queryPathInfo(). conn_.reset(); return queryPathInfo(path); } } StorePath RemoteStore::addToStoreFromDump( Source & dump, std::string_view name, FileSerialisationMethod dumpMethod, ContentAddressMethod hashMethod, HashAlgorithm hashAlgo, const StorePathSet & references, RepairFlag repair) { FileSerialisationMethod fsm; switch (hashMethod.getFileIngestionMethod()) { case FileIngestionMethod::Flat: fsm = FileSerialisationMethod::Flat; break; case FileIngestionMethod::NixArchive: fsm = FileSerialisationMethod::NixArchive; break; case FileIngestionMethod::Git: // Use NAR; Git is not a serialization method fsm = FileSerialisationMethod::NixArchive; break; default: assert(false); } if (fsm != dumpMethod) unsupported("RemoteStore::addToStoreFromDump doesn't support this `dumpMethod` `hashMethod` combination"); return addCAToStore(dump, name, hashMethod, hashAlgo, references, repair)->path; } void RemoteStore::addToStore(const ValidPathInfo & info, Source & source, RepairFlag repair, CheckSigsFlag checkSigs) { auto conn(getConnection()); if (GET_PROTOCOL_MINOR(conn->protoVersion) < 18) { auto source2 = sinkToSource([&](Sink & sink) { sink << 1 // == path follows ; copyNAR(source, sink); sink << exportMagic << printStorePath(info.path); WorkerProto::write(*this, *conn, info.references); sink << (info.deriver ? printStorePath(*info.deriver) : "") << 0 // == no legacy signature << 0 // == no path follows ; }); conn->importPaths(*this, &conn.daemonException, *source2); } else { conn->to << WorkerProto::Op::AddToStoreNar << printStorePath(info.path) << (info.deriver ? printStorePath(*info.deriver) : "") << info.narHash.to_string(HashFormat::Base16, false); WorkerProto::write(*this, *conn, info.references); conn->to << info.registrationTime << info.narSize << info.ultimate << info.sigs << renderContentAddress(info.ca) << repair << !checkSigs; if (GET_PROTOCOL_MINOR(conn->protoVersion) >= 23) { conn.withFramedSink([&](Sink & sink) { copyNAR(source, sink); }); } else if (GET_PROTOCOL_MINOR(conn->protoVersion) >= 21) { conn.processStderr(0, &source); } else { copyNAR(source, conn->to); conn.processStderr(0, nullptr); } } } void RemoteStore::addMultipleToStore( PathsSource & pathsToCopy, Activity & act, RepairFlag repair, CheckSigsFlag checkSigs) { auto source = sinkToSource([&](Sink & sink) { sink << pathsToCopy.size(); for (auto & [pathInfo, pathSource] : pathsToCopy) { WorkerProto::Serialise<ValidPathInfo>::write(*this, WorkerProto::WriteConn { .to = sink, .version = 16, }, pathInfo); pathSource->drainInto(sink); } }); addMultipleToStore(*source, repair, checkSigs); } void RemoteStore::addMultipleToStore( Source & source, RepairFlag repair, CheckSigsFlag checkSigs) { if (GET_PROTOCOL_MINOR(getConnection()->protoVersion) >= 32) { auto conn(getConnection()); conn->to << WorkerProto::Op::AddMultipleToStore << repair << !checkSigs; conn.withFramedSink([&](Sink & sink) { source.drainInto(sink); }); } else Store::addMultipleToStore(source, repair, checkSigs); } void RemoteStore::registerDrvOutput(const Realisation & info) { auto conn(getConnection()); conn->to << WorkerProto::Op::RegisterDrvOutput; if (GET_PROTOCOL_MINOR(conn->protoVersion) < 31) { conn->to << info.id.to_string(); conn->to << std::string(info.outPath.to_string()); } else { WorkerProto::write(*this, *conn, info); } conn.processStderr(); } void RemoteStore::queryRealisationUncached(const DrvOutput & id, Callback<std::shared_ptr<const Realisation>> callback) noexcept { try { auto conn(getConnection()); if (GET_PROTOCOL_MINOR(conn->protoVersion) < 27) { warn("the daemon is too old to support content-addressed derivations, please upgrade it to 2.4"); return callback(nullptr); } conn->to << WorkerProto::Op::QueryRealisation; conn->to << id.to_string(); conn.processStderr(); auto real = [&]() -> std::shared_ptr<const Realisation> { if (GET_PROTOCOL_MINOR(conn->protoVersion) < 31) { auto outPaths = WorkerProto::Serialise<std::set<StorePath>>::read( *this, *conn); if (outPaths.empty()) return nullptr; return std::make_shared<const Realisation>(Realisation { .id = id, .outPath = *outPaths.begin() }); } else { auto realisations = WorkerProto::Serialise<std::set<Realisation>>::read( *this, *conn); if (realisations.empty()) return nullptr; return std::make_shared<const Realisation>(*realisations.begin()); } }(); callback(std::shared_ptr<const Realisation>(real)); } catch (...) { return callback.rethrow(); } } void RemoteStore::copyDrvsFromEvalStore( const std::vector<DerivedPath> & paths, std::shared_ptr<Store> evalStore) { if (evalStore && evalStore.get() != this) { /* The remote doesn't have a way to access evalStore, so copy the .drvs. */ RealisedPath::Set drvPaths2; for (const auto & i : paths) { std::visit(overloaded { [&](const DerivedPath::Opaque & bp) { // Do nothing, path is hopefully there already }, [&](const DerivedPath::Built & bp) { drvPaths2.insert(bp.drvPath->getBaseStorePath()); }, }, i.raw()); } copyClosure(*evalStore, *this, drvPaths2); } } void RemoteStore::buildPaths(const std::vector<DerivedPath> & drvPaths, BuildMode buildMode, std::shared_ptr<Store> evalStore) { copyDrvsFromEvalStore(drvPaths, evalStore); auto conn(getConnection()); conn->to << WorkerProto::Op::BuildPaths; assert(GET_PROTOCOL_MINOR(conn->protoVersion) >= 13); WorkerProto::write(*this, *conn, drvPaths); if (GET_PROTOCOL_MINOR(conn->protoVersion) >= 15) conn->to << buildMode; else /* Old daemons did not take a 'buildMode' parameter, so we need to validate it here on the client side. */ if (buildMode != bmNormal) throw Error("repairing or checking is not supported when building through the Nix daemon"); conn.processStderr(); readInt(conn->from); } std::vector<KeyedBuildResult> RemoteStore::buildPathsWithResults( const std::vector<DerivedPath> & paths, BuildMode buildMode, std::shared_ptr<Store> evalStore) { copyDrvsFromEvalStore(paths, evalStore); std::optional<ConnectionHandle> conn_(getConnection()); auto & conn = *conn_; if (GET_PROTOCOL_MINOR(conn->protoVersion) >= 34) { conn->to << WorkerProto::Op::BuildPathsWithResults; WorkerProto::write(*this, *conn, paths); conn->to << buildMode; conn.processStderr(); return WorkerProto::Serialise<std::vector<KeyedBuildResult>>::read(*this, *conn); } else { // Avoid deadlock. conn_.reset(); // Note: this throws an exception if a build/substitution // fails, but meh. buildPaths(paths, buildMode, evalStore); std::vector<KeyedBuildResult> results; for (auto & path : paths) { std::visit( overloaded { [&](const DerivedPath::Opaque & bo) { results.push_back(KeyedBuildResult { { .status = BuildResult::Substituted, }, /* .path = */ bo, }); }, [&](const DerivedPath::Built & bfd) { KeyedBuildResult res { { .status = BuildResult::Built }, /* .path = */ bfd, }; OutputPathMap outputs; auto drvPath = resolveDerivedPath(*evalStore, *bfd.drvPath); auto drv = evalStore->readDerivation(drvPath); const auto outputHashes = staticOutputHashes(*evalStore, drv); // FIXME: expensive auto built = resolveDerivedPath(*this, bfd, &*evalStore); for (auto & [output, outputPath] : built) { auto outputHash = get(outputHashes, output); if (!outputHash) throw Error( "the derivation '%s' doesn't have an output named '%s'", printStorePath(drvPath), output); auto outputId = DrvOutput{ *outputHash, output }; if (experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) { auto realisation = queryRealisation(outputId); if (!realisation) throw MissingRealisation(outputId); res.builtOutputs.emplace(output, *realisation); } else { res.builtOutputs.emplace( output, Realisation { .id = outputId, .outPath = outputPath, }); } } results.push_back(res); } }, path.raw()); } return results; } } BuildResult RemoteStore::buildDerivation(const StorePath & drvPath, const BasicDerivation & drv, BuildMode buildMode) { auto conn(getConnection()); conn->putBuildDerivationRequest(*this, &conn.daemonException, drvPath, drv, buildMode); conn.processStderr(); return WorkerProto::Serialise<BuildResult>::read(*this, *conn); } void RemoteStore::ensurePath(const StorePath & path) { auto conn(getConnection()); conn->to << WorkerProto::Op::EnsurePath << printStorePath(path); conn.processStderr(); readInt(conn->from); } void RemoteStore::addTempRoot(const StorePath & path) { auto conn(getConnection()); conn->addTempRoot(*this, &conn.daemonException, path); } Roots RemoteStore::findRoots(bool censor) { auto conn(getConnection()); conn->to << WorkerProto::Op::FindRoots; conn.processStderr(); size_t count = readNum<size_t>(conn->from); Roots result; while (count--) { Path link = readString(conn->from); auto target = parseStorePath(readString(conn->from)); result[std::move(target)].emplace(link); } return result; } void RemoteStore::collectGarbage(const GCOptions & options, GCResults & results) { auto conn(getConnection()); conn->to << WorkerProto::Op::CollectGarbage << options.action; WorkerProto::write(*this, *conn, options.pathsToDelete); conn->to << options.ignoreLiveness << options.maxFreed /* removed options */ << 0 << 0 << 0; conn.processStderr(); results.paths = readStrings<PathSet>(conn->from); results.bytesFreed = readLongLong(conn->from); readLongLong(conn->from); // obsolete { auto state_(Store::state.lock()); state_->pathInfoCache.clear(); } } void RemoteStore::optimiseStore() { auto conn(getConnection()); conn->to << WorkerProto::Op::OptimiseStore; conn.processStderr(); readInt(conn->from); } bool RemoteStore::verifyStore(bool checkContents, RepairFlag repair) { auto conn(getConnection()); conn->to << WorkerProto::Op::VerifyStore << checkContents << repair; conn.processStderr(); return readInt(conn->from); } void RemoteStore::addSignatures(const StorePath & storePath, const StringSet & sigs) { auto conn(getConnection()); conn->to << WorkerProto::Op::AddSignatures << printStorePath(storePath) << sigs; conn.processStderr(); readInt(conn->from); } void RemoteStore::queryMissing(const std::vector<DerivedPath> & targets, StorePathSet & willBuild, StorePathSet & willSubstitute, StorePathSet & unknown, uint64_t & downloadSize, uint64_t & narSize) { { auto conn(getConnection()); if (GET_PROTOCOL_MINOR(conn->protoVersion) < 19) // Don't hold the connection handle in the fallback case // to prevent a deadlock. goto fallback; conn->to << WorkerProto::Op::QueryMissing; WorkerProto::write(*this, *conn, targets); conn.processStderr(); willBuild = WorkerProto::Serialise<StorePathSet>::read(*this, *conn); willSubstitute = WorkerProto::Serialise<StorePathSet>::read(*this, *conn); unknown = WorkerProto::Serialise<StorePathSet>::read(*this, *conn); conn->from >> downloadSize >> narSize; return; } fallback: return Store::queryMissing(targets, willBuild, willSubstitute, unknown, downloadSize, narSize); } void RemoteStore::addBuildLog(const StorePath & drvPath, std::string_view log) { auto conn(getConnection()); conn->to << WorkerProto::Op::AddBuildLog << drvPath.to_string(); StringSource source(log); conn.withFramedSink([&](Sink & sink) { source.drainInto(sink); }); readInt(conn->from); } std::optional<std::string> RemoteStore::getVersion() { auto conn(getConnection()); return conn->daemonNixVersion; } void RemoteStore::connect() { auto conn(getConnection()); } unsigned int RemoteStore::getProtocol() { auto conn(connections->get()); return conn->protoVersion; } std::optional<TrustedFlag> RemoteStore::isTrustedClient() { auto conn(getConnection()); return conn->remoteTrustsUs; } void RemoteStore::flushBadConnections() { connections->flushBad(); } void RemoteStore::narFromPath(const StorePath & path, Sink & sink) { auto conn(getConnection()); conn->narFromPath(*this, &conn.daemonException, path, [&](Source & source) { copyNAR(conn->from, sink); }); } ref<SourceAccessor> RemoteStore::getFSAccessor(bool requireValidPath) { return make_ref<RemoteFSAccessor>(ref<Store>(shared_from_this())); } void RemoteStore::ConnectionHandle::withFramedSink(std::function<void(Sink & sink)> fun) { (*this)->to.flush(); { FramedSink sink((*this)->to, [&]() { /* Periodically process stderr messages and exceptions from the daemon. */ processStderr(nullptr, nullptr, false, false); }); fun(sink); sink.flush(); } processStderr(nullptr, nullptr, false); } }
31,430
C++
.cc
816
29.101716
145
0.596333
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,795
legacy-ssh-store.cc
NixOS_nix/src/libstore/legacy-ssh-store.cc
#include "legacy-ssh-store.hh" #include "common-ssh-store-config.hh" #include "archive.hh" #include "pool.hh" #include "remote-store.hh" #include "serve-protocol.hh" #include "serve-protocol-connection.hh" #include "serve-protocol-impl.hh" #include "build-result.hh" #include "store-api.hh" #include "path-with-outputs.hh" #include "ssh.hh" #include "derivations.hh" #include "callback.hh" namespace nix { LegacySSHStoreConfig::LegacySSHStoreConfig( std::string_view scheme, std::string_view authority, const Params & params) : StoreConfig(params) , CommonSSHStoreConfig(scheme, authority, params) { } std::string LegacySSHStoreConfig::doc() { return #include "legacy-ssh-store.md" ; } struct LegacySSHStore::Connection : public ServeProto::BasicClientConnection { std::unique_ptr<SSHMaster::Connection> sshConn; bool good = true; }; LegacySSHStore::LegacySSHStore( std::string_view scheme, std::string_view host, const Params & params) : StoreConfig(params) , CommonSSHStoreConfig(scheme, host, params) , LegacySSHStoreConfig(scheme, host, params) , Store(params) , connections(make_ref<Pool<Connection>>( std::max(1, (int) maxConnections), [this]() { return openConnection(); }, [](const ref<Connection> & r) { return r->good; } )) , master(createSSHMaster( // Use SSH master only if using more than 1 connection. connections->capacity() > 1, logFD)) { } ref<LegacySSHStore::Connection> LegacySSHStore::openConnection() { auto conn = make_ref<Connection>(); Strings command = remoteProgram.get(); command.push_back("--serve"); command.push_back("--write"); if (remoteStore.get() != "") { command.push_back("--store"); command.push_back(remoteStore.get()); } conn->sshConn = master.startCommand(std::move(command)); conn->to = FdSink(conn->sshConn->in.get()); conn->from = FdSource(conn->sshConn->out.get()); StringSink saved; TeeSource tee(conn->from, saved); try { conn->remoteVersion = ServeProto::BasicClientConnection::handshake( conn->to, tee, SERVE_PROTOCOL_VERSION, host); } catch (SerialisationError & e) { // in.close(): Don't let the remote block on us not writing. conn->sshConn->in.close(); { NullSink nullSink; tee.drainInto(nullSink); } throw Error("'nix-store --serve' protocol mismatch from '%s', got '%s'", host, chomp(saved.s)); } catch (EndOfFile & e) { throw Error("cannot connect to '%1%'", host); } return conn; }; std::string LegacySSHStore::getUri() { return *uriSchemes().begin() + "://" + host; } void LegacySSHStore::queryPathInfoUncached(const StorePath & path, Callback<std::shared_ptr<const ValidPathInfo>> callback) noexcept { try { auto conn(connections->get()); /* No longer support missing NAR hash */ assert(GET_PROTOCOL_MINOR(conn->remoteVersion) >= 4); debug("querying remote host '%s' for info on '%s'", host, printStorePath(path)); auto infos = conn->queryPathInfos(*this, {path}); switch (infos.size()) { case 0: return callback(nullptr); case 1: { auto & [path2, info] = *infos.begin(); if (info.narHash == Hash::dummy) throw Error("NAR hash is now mandatory"); assert(path == path2); return callback(std::make_shared<ValidPathInfo>( std::move(path), std::move(info) )); } default: throw Error("More path infos returned than queried"); } } catch (...) { callback.rethrow(); } } void LegacySSHStore::addToStore(const ValidPathInfo & info, Source & source, RepairFlag repair, CheckSigsFlag checkSigs) { debug("adding path '%s' to remote host '%s'", printStorePath(info.path), host); auto conn(connections->get()); if (GET_PROTOCOL_MINOR(conn->remoteVersion) >= 5) { conn->to << ServeProto::Command::AddToStoreNar << printStorePath(info.path) << (info.deriver ? printStorePath(*info.deriver) : "") << info.narHash.to_string(HashFormat::Base16, false); ServeProto::write(*this, *conn, info.references); conn->to << info.registrationTime << info.narSize << info.ultimate << info.sigs << renderContentAddress(info.ca); try { copyNAR(source, conn->to); } catch (...) { conn->good = false; throw; } conn->to.flush(); if (readInt(conn->from) != 1) throw Error("failed to add path '%s' to remote host '%s'", printStorePath(info.path), host); } else { conn->importPaths(*this, [&](Sink & sink) { try { copyNAR(source, sink); } catch (...) { conn->good = false; throw; } sink << exportMagic << printStorePath(info.path); ServeProto::write(*this, *conn, info.references); sink << (info.deriver ? printStorePath(*info.deriver) : "") << 0 << 0; }); } } void LegacySSHStore::narFromPath(const StorePath & path, Sink & sink) { auto conn(connections->get()); conn->narFromPath(*this, path, [&](auto & source) { copyNAR(source, sink); }); } static ServeProto::BuildOptions buildSettings() { return { .maxSilentTime = settings.maxSilentTime, .buildTimeout = settings.buildTimeout, .maxLogSize = settings.maxLogSize, .nrRepeats = 0, // buildRepeat hasn't worked for ages anyway .enforceDeterminism = 0, .keepFailed = settings.keepFailed, }; } BuildResult LegacySSHStore::buildDerivation(const StorePath & drvPath, const BasicDerivation & drv, BuildMode buildMode) { auto conn(connections->get()); conn->putBuildDerivationRequest(*this, drvPath, drv, buildSettings()); return conn->getBuildDerivationResponse(*this); } void LegacySSHStore::buildPaths(const std::vector<DerivedPath> & drvPaths, BuildMode buildMode, std::shared_ptr<Store> evalStore) { if (evalStore && evalStore.get() != this) throw Error("building on an SSH store is incompatible with '--eval-store'"); auto conn(connections->get()); conn->to << ServeProto::Command::BuildPaths; Strings ss; for (auto & p : drvPaths) { auto sOrDrvPath = StorePathWithOutputs::tryFromDerivedPath(p); std::visit(overloaded { [&](const StorePathWithOutputs & s) { ss.push_back(s.to_string(*this)); }, [&](const StorePath & drvPath) { throw Error("wanted to fetch '%s' but the legacy ssh protocol doesn't support merely substituting drv files via the build paths command. It would build them instead. Try using ssh-ng://", printStorePath(drvPath)); }, [&](std::monostate) { throw Error("wanted build derivation that is itself a build product, but the legacy ssh protocol doesn't support that. Try using ssh-ng://"); }, }, sOrDrvPath); } conn->to << ss; ServeProto::write(*this, *conn, buildSettings()); conn->to.flush(); BuildResult result; result.status = (BuildResult::Status) readInt(conn->from); if (!result.success()) { conn->from >> result.errorMsg; throw Error(result.status, result.errorMsg); } } void LegacySSHStore::computeFSClosure(const StorePathSet & paths, StorePathSet & out, bool flipDirection, bool includeOutputs, bool includeDerivers) { if (flipDirection || includeDerivers) { Store::computeFSClosure(paths, out, flipDirection, includeOutputs, includeDerivers); return; } auto conn(connections->get()); conn->to << ServeProto::Command::QueryClosure << includeOutputs; ServeProto::write(*this, *conn, paths); conn->to.flush(); for (auto & i : ServeProto::Serialise<StorePathSet>::read(*this, *conn)) out.insert(i); } StorePathSet LegacySSHStore::queryValidPaths(const StorePathSet & paths, SubstituteFlag maybeSubstitute) { auto conn(connections->get()); return conn->queryValidPaths(*this, false, paths, maybeSubstitute); } void LegacySSHStore::connect() { auto conn(connections->get()); } unsigned int LegacySSHStore::getProtocol() { auto conn(connections->get()); return conn->remoteVersion; } /** * The legacy ssh protocol doesn't support checking for trusted-user. * Try using ssh-ng:// instead if you want to know. */ std::optional<TrustedFlag> isTrustedClient() { return std::nullopt; } static RegisterStoreImplementation<LegacySSHStore, LegacySSHStoreConfig> regLegacySSHStore; }
9,077
C++
.cc
261
28.015326
229
0.630725
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,796
serve-protocol.cc
NixOS_nix/src/libstore/serve-protocol.cc
#include "serialise.hh" #include "path-with-outputs.hh" #include "store-api.hh" #include "build-result.hh" #include "serve-protocol.hh" #include "serve-protocol-impl.hh" #include "archive.hh" #include "path-info.hh" #include <nlohmann/json.hpp> namespace nix { /* protocol-specific definitions */ BuildResult ServeProto::Serialise<BuildResult>::read(const StoreDirConfig & store, ServeProto::ReadConn conn) { BuildResult status; status.status = (BuildResult::Status) readInt(conn.from); conn.from >> status.errorMsg; if (GET_PROTOCOL_MINOR(conn.version) >= 3) conn.from >> status.timesBuilt >> status.isNonDeterministic >> status.startTime >> status.stopTime; if (GET_PROTOCOL_MINOR(conn.version) >= 6) { auto builtOutputs = ServeProto::Serialise<DrvOutputs>::read(store, conn); for (auto && [output, realisation] : builtOutputs) status.builtOutputs.insert_or_assign( std::move(output.outputName), std::move(realisation)); } return status; } void ServeProto::Serialise<BuildResult>::write(const StoreDirConfig & store, ServeProto::WriteConn conn, const BuildResult & status) { conn.to << status.status << status.errorMsg; if (GET_PROTOCOL_MINOR(conn.version) >= 3) conn.to << status.timesBuilt << status.isNonDeterministic << status.startTime << status.stopTime; if (GET_PROTOCOL_MINOR(conn.version) >= 6) { DrvOutputs builtOutputs; for (auto & [output, realisation] : status.builtOutputs) builtOutputs.insert_or_assign(realisation.id, realisation); ServeProto::write(store, conn, builtOutputs); } } UnkeyedValidPathInfo ServeProto::Serialise<UnkeyedValidPathInfo>::read(const StoreDirConfig & store, ReadConn conn) { /* Hash should be set below unless very old `nix-store --serve`. Caller should assert that it did set it. */ UnkeyedValidPathInfo info { Hash::dummy }; auto deriver = readString(conn.from); if (deriver != "") info.deriver = store.parseStorePath(deriver); info.references = ServeProto::Serialise<StorePathSet>::read(store, conn); readLongLong(conn.from); // download size, unused info.narSize = readLongLong(conn.from); if (GET_PROTOCOL_MINOR(conn.version) >= 4) { auto s = readString(conn.from); if (!s.empty()) info.narHash = Hash::parseAnyPrefixed(s); info.ca = ContentAddress::parseOpt(readString(conn.from)); info.sigs = readStrings<StringSet>(conn.from); } return info; } void ServeProto::Serialise<UnkeyedValidPathInfo>::write(const StoreDirConfig & store, WriteConn conn, const UnkeyedValidPathInfo & info) { conn.to << (info.deriver ? store.printStorePath(*info.deriver) : ""); ServeProto::write(store, conn, info.references); // !!! Maybe we want compression? conn.to << info.narSize // downloadSize, lie a little << info.narSize; if (GET_PROTOCOL_MINOR(conn.version) >= 4) conn.to << info.narHash.to_string(HashFormat::Nix32, true) << renderContentAddress(info.ca) << info.sigs; } ServeProto::BuildOptions ServeProto::Serialise<ServeProto::BuildOptions>::read(const StoreDirConfig & store, ReadConn conn) { BuildOptions options; options.maxSilentTime = readInt(conn.from); options.buildTimeout = readInt(conn.from); if (GET_PROTOCOL_MINOR(conn.version) >= 2) options.maxLogSize = readNum<unsigned long>(conn.from); if (GET_PROTOCOL_MINOR(conn.version) >= 3) { options.nrRepeats = readInt(conn.from); options.enforceDeterminism = readInt(conn.from); } if (GET_PROTOCOL_MINOR(conn.version) >= 7) { options.keepFailed = (bool) readInt(conn.from); } return options; } void ServeProto::Serialise<ServeProto::BuildOptions>::write(const StoreDirConfig & store, WriteConn conn, const ServeProto::BuildOptions & options) { conn.to << options.maxSilentTime << options.buildTimeout; if (GET_PROTOCOL_MINOR(conn.version) >= 2) conn.to << options.maxLogSize; if (GET_PROTOCOL_MINOR(conn.version) >= 3) conn.to << options.nrRepeats << options.enforceDeterminism; if (GET_PROTOCOL_MINOR(conn.version) >= 7) { conn.to << ((int) options.keepFailed); } } }
4,506
C++
.cc
117
32.051282
147
0.665827
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,797
path.cc
NixOS_nix/src/libstore/path.cc
#include "store-dir-config.hh" namespace nix { void checkName(std::string_view name) { if (name.empty()) throw BadStorePathName("name must not be empty"); if (name.size() > StorePath::MaxPathLen) throw BadStorePathName("name '%s' must be no longer than %d characters", name, StorePath::MaxPathLen); // See nameRegexStr for the definition if (name[0] == '.') { // check against "." and "..", followed by end or dash if (name.size() == 1) throw BadStorePathName("name '%s' is not valid", name); if (name[1] == '-') throw BadStorePathName("name '%s' is not valid: first dash-separated component must not be '%s'", name, "."); if (name[1] == '.') { if (name.size() == 2) throw BadStorePathName("name '%s' is not valid", name); if (name[2] == '-') throw BadStorePathName("name '%s' is not valid: first dash-separated component must not be '%s'", name, ".."); } } for (auto c : name) if (!((c >= '0' && c <= '9') || (c >= 'a' && c <= 'z') || (c >= 'A' && c <= 'Z') || c == '+' || c == '-' || c == '.' || c == '_' || c == '?' || c == '=')) throw BadStorePathName("name '%s' contains illegal character '%s'", name, c); } static void checkPathName(std::string_view path, std::string_view name) { try { checkName(name); } catch (BadStorePathName & e) { throw BadStorePath("path '%s' is not a valid store path: %s", path, Uncolored(e.message())); } } StorePath::StorePath(std::string_view _baseName) : baseName(_baseName) { if (baseName.size() < HashLen + 1) throw BadStorePath("'%s' is too short to be a valid store path", baseName); for (auto c : hashPart()) if (c == 'e' || c == 'o' || c == 'u' || c == 't' || !((c >= '0' && c <= '9') || (c >= 'a' && c <= 'z'))) throw BadStorePath("store path '%s' contains illegal base-32 character '%s'", baseName, c); checkPathName(baseName, name()); } StorePath::StorePath(const Hash & hash, std::string_view _name) : baseName((hash.to_string(HashFormat::Nix32, false) + "-").append(std::string(_name))) { checkPathName(baseName, name()); } bool StorePath::isDerivation() const noexcept { return hasSuffix(name(), drvExtension); } void StorePath::requireDerivation() const { if (!isDerivation()) throw FormatError("store path '%s' is not a valid derivation path", to_string()); } StorePath StorePath::dummy("ffffffffffffffffffffffffffffffff-x"); StorePath StorePath::random(std::string_view name) { return StorePath(Hash::random(HashAlgorithm::SHA1), name); } StorePath StoreDirConfig::parseStorePath(std::string_view path) const { // On Windows, `/nix/store` is not a canonical path. More broadly it // is unclear whether this function should be using the native // notion of a canonical path at all. For example, it makes to // support remote stores whose store dir is a non-native path (e.g. // Windows <-> Unix ssh-ing). auto p = #ifdef _WIN32 path #else canonPath(std::string(path)) #endif ; if (dirOf(p) != storeDir) throw BadStorePath("path '%s' is not in the Nix store", p); return StorePath(baseNameOf(p)); } std::optional<StorePath> StoreDirConfig::maybeParseStorePath(std::string_view path) const { try { return parseStorePath(path); } catch (Error &) { return {}; } } bool StoreDirConfig::isStorePath(std::string_view path) const { return (bool) maybeParseStorePath(path); } StorePathSet StoreDirConfig::parseStorePathSet(const PathSet & paths) const { StorePathSet res; for (auto & i : paths) res.insert(parseStorePath(i)); return res; } std::string StoreDirConfig::printStorePath(const StorePath & path) const { return (storeDir + "/").append(path.to_string()); } PathSet StoreDirConfig::printStorePathSet(const StorePathSet & paths) const { PathSet res; for (auto & i : paths) res.insert(printStorePath(i)); return res; } }
4,149
C++
.cc
114
31.184211
126
0.615327
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,798
realisation.cc
NixOS_nix/src/libstore/realisation.cc
#include "realisation.hh" #include "store-api.hh" #include "closure.hh" #include "signature/local-keys.hh" #include <nlohmann/json.hpp> namespace nix { MakeError(InvalidDerivationOutputId, Error); DrvOutput DrvOutput::parse(const std::string &strRep) { size_t n = strRep.find("!"); if (n == strRep.npos) throw InvalidDerivationOutputId("Invalid derivation output id %s", strRep); return DrvOutput{ .drvHash = Hash::parseAnyPrefixed(strRep.substr(0, n)), .outputName = strRep.substr(n+1), }; } std::string DrvOutput::to_string() const { return strHash() + "!" + outputName; } std::set<Realisation> Realisation::closure(Store & store, const std::set<Realisation> & startOutputs) { std::set<Realisation> res; Realisation::closure(store, startOutputs, res); return res; } void Realisation::closure(Store & store, const std::set<Realisation> & startOutputs, std::set<Realisation> & res) { auto getDeps = [&](const Realisation& current) -> std::set<Realisation> { std::set<Realisation> res; for (auto& [currentDep, _] : current.dependentRealisations) { if (auto currentRealisation = store.queryRealisation(currentDep)) res.insert(*currentRealisation); else throw Error( "Unrealised derivation '%s'", currentDep.to_string()); } return res; }; computeClosure<Realisation>( startOutputs, res, [&](const Realisation& current, std::function<void(std::promise<std::set<Realisation>>&)> processEdges) { std::promise<std::set<Realisation>> promise; try { auto res = getDeps(current); promise.set_value(res); } catch (...) { promise.set_exception(std::current_exception()); } return processEdges(promise); }); } nlohmann::json Realisation::toJSON() const { auto jsonDependentRealisations = nlohmann::json::object(); for (auto & [depId, depOutPath] : dependentRealisations) jsonDependentRealisations.emplace(depId.to_string(), depOutPath.to_string()); return nlohmann::json{ {"id", id.to_string()}, {"outPath", outPath.to_string()}, {"signatures", signatures}, {"dependentRealisations", jsonDependentRealisations}, }; } Realisation Realisation::fromJSON( const nlohmann::json& json, const std::string& whence) { auto getOptionalField = [&](std::string fieldName) -> std::optional<std::string> { auto fieldIterator = json.find(fieldName); if (fieldIterator == json.end()) return std::nullopt; return {*fieldIterator}; }; auto getField = [&](std::string fieldName) -> std::string { if (auto field = getOptionalField(fieldName)) return *field; else throw Error( "Drv output info file '%1%' is corrupt, missing field %2%", whence, fieldName); }; StringSet signatures; if (auto signaturesIterator = json.find("signatures"); signaturesIterator != json.end()) signatures.insert(signaturesIterator->begin(), signaturesIterator->end()); std::map <DrvOutput, StorePath> dependentRealisations; if (auto jsonDependencies = json.find("dependentRealisations"); jsonDependencies != json.end()) for (auto & [jsonDepId, jsonDepOutPath] : jsonDependencies->get<std::map<std::string, std::string>>()) dependentRealisations.insert({DrvOutput::parse(jsonDepId), StorePath(jsonDepOutPath)}); return Realisation{ .id = DrvOutput::parse(getField("id")), .outPath = StorePath(getField("outPath")), .signatures = signatures, .dependentRealisations = dependentRealisations, }; } std::string Realisation::fingerprint() const { auto serialized = toJSON(); serialized.erase("signatures"); return serialized.dump(); } void Realisation::sign(const Signer &signer) { signatures.insert(signer.signDetached(fingerprint())); } bool Realisation::checkSignature(const PublicKeys & publicKeys, const std::string & sig) const { return verifyDetached(fingerprint(), sig, publicKeys); } size_t Realisation::checkSignatures(const PublicKeys & publicKeys) const { // FIXME: Maybe we should return `maxSigs` if the realisation corresponds to // an input-addressed one − because in that case the drv is enough to check // it − but we can't know that here. size_t good = 0; for (auto & sig : signatures) if (checkSignature(publicKeys, sig)) good++; return good; } SingleDrvOutputs filterDrvOutputs(const OutputsSpec& wanted, SingleDrvOutputs&& outputs) { SingleDrvOutputs ret = std::move(outputs); for (auto it = ret.begin(); it != ret.end(); ) { if (!wanted.contains(it->first)) it = ret.erase(it); else ++it; } return ret; } StorePath RealisedPath::path() const { return std::visit([](auto && arg) { return arg.getPath(); }, raw); } bool Realisation::isCompatibleWith(const Realisation & other) const { assert (id == other.id); if (outPath == other.outPath) { if (dependentRealisations.empty() != other.dependentRealisations.empty()) { warn( "Encountered a realisation for '%s' with an empty set of " "dependencies. This is likely an artifact from an older Nix. " "I’ll try to fix the realisation if I can", id.to_string()); return true; } else if (dependentRealisations == other.dependentRealisations) { return true; } } return false; } void RealisedPath::closure( Store& store, const RealisedPath::Set& startPaths, RealisedPath::Set& ret) { // FIXME: This only builds the store-path closure, not the real realisation // closure StorePathSet initialStorePaths, pathsClosure; for (auto& path : startPaths) initialStorePaths.insert(path.path()); store.computeFSClosure(initialStorePaths, pathsClosure); ret.insert(startPaths.begin(), startPaths.end()); ret.insert(pathsClosure.begin(), pathsClosure.end()); } void RealisedPath::closure(Store& store, RealisedPath::Set & ret) const { RealisedPath::closure(store, {*this}, ret); } RealisedPath::Set RealisedPath::closure(Store& store) const { RealisedPath::Set ret; closure(store, ret); return ret; } } // namespace nix
6,574
C++
.cc
176
30.852273
113
0.653786
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,799
machines.cc
NixOS_nix/src/libstore/machines.cc
#include "machines.hh" #include "globals.hh" #include "store-api.hh" #include <algorithm> namespace nix { Machine::Machine( const std::string & storeUri, decltype(systemTypes) systemTypes, decltype(sshKey) sshKey, decltype(maxJobs) maxJobs, decltype(speedFactor) speedFactor, decltype(supportedFeatures) supportedFeatures, decltype(mandatoryFeatures) mandatoryFeatures, decltype(sshPublicHostKey) sshPublicHostKey) : storeUri(StoreReference::parse( // Backwards compatibility: if the URI is schemeless, is not a path, // and is not one of the special store connection words, prepend // ssh://. storeUri.find("://") != std::string::npos || storeUri.find("/") != std::string::npos || storeUri == "auto" || storeUri == "daemon" || storeUri == "local" || hasPrefix(storeUri, "auto?") || hasPrefix(storeUri, "daemon?") || hasPrefix(storeUri, "local?") || hasPrefix(storeUri, "?") ? storeUri : "ssh://" + storeUri)), systemTypes(systemTypes), sshKey(sshKey), maxJobs(maxJobs), speedFactor(speedFactor == 0.0f ? 1.0f : speedFactor), supportedFeatures(supportedFeatures), mandatoryFeatures(mandatoryFeatures), sshPublicHostKey(sshPublicHostKey) { if (speedFactor < 0.0) throw UsageError("speed factor must be >= 0"); } bool Machine::systemSupported(const std::string & system) const { return system == "builtin" || (systemTypes.count(system) > 0); } bool Machine::allSupported(const std::set<std::string> & features) const { return std::all_of(features.begin(), features.end(), [&](const std::string & feature) { return supportedFeatures.count(feature) || mandatoryFeatures.count(feature); }); } bool Machine::mandatoryMet(const std::set<std::string> & features) const { return std::all_of(mandatoryFeatures.begin(), mandatoryFeatures.end(), [&](const std::string & feature) { return features.count(feature); }); } StoreReference Machine::completeStoreReference() const { auto storeUri = this->storeUri; auto * generic = std::get_if<StoreReference::Specified>(&storeUri.variant); if (generic && generic->scheme == "ssh") { storeUri.params["max-connections"] = "1"; storeUri.params["log-fd"] = "4"; } if (generic && (generic->scheme == "ssh" || generic->scheme == "ssh-ng")) { if (sshKey != "") storeUri.params["ssh-key"] = sshKey; if (sshPublicHostKey != "") storeUri.params["base64-ssh-public-host-key"] = sshPublicHostKey; } { auto & fs = storeUri.params["system-features"]; auto append = [&](auto feats) { for (auto & f : feats) { if (fs.size() > 0) fs += ' '; fs += f; } }; append(supportedFeatures); append(mandatoryFeatures); } return storeUri; } ref<Store> Machine::openStore() const { return nix::openStore(completeStoreReference()); } static std::vector<std::string> expandBuilderLines(const std::string & builders) { std::vector<std::string> result; for (auto line : tokenizeString<std::vector<std::string>>(builders, "\n;")) { trim(line); line.erase(std::find(line.begin(), line.end(), '#'), line.end()); if (line.empty()) continue; if (line[0] == '@') { const std::string path = trim(std::string(line, 1)); std::string text; try { text = readFile(path); } catch (const SysError & e) { if (e.errNo != ENOENT) throw; debug("cannot find machines file '%s'", path); } const auto lines = expandBuilderLines(text); result.insert(end(result), begin(lines), end(lines)); continue; } result.emplace_back(line); } return result; } static Machine parseBuilderLine(const std::set<std::string> & defaultSystems, const std::string & line) { const auto tokens = tokenizeString<std::vector<std::string>>(line); auto isSet = [&](size_t fieldIndex) { return tokens.size() > fieldIndex && tokens[fieldIndex] != "" && tokens[fieldIndex] != "-"; }; auto parseUnsignedIntField = [&](size_t fieldIndex) { const auto result = string2Int<unsigned int>(tokens[fieldIndex]); if (!result) { throw FormatError("bad machine specification: failed to convert column #%lu in a row: '%s' to 'unsigned int'", fieldIndex, line); } return result.value(); }; auto parseFloatField = [&](size_t fieldIndex) { const auto result = string2Float<float>(tokens[fieldIndex]); if (!result) { throw FormatError("bad machine specification: failed to convert column #%lu in a row: '%s' to 'float'", fieldIndex, line); } return result.value(); }; auto ensureBase64 = [&](size_t fieldIndex) { const auto & str = tokens[fieldIndex]; try { base64Decode(str); } catch (FormatError & e) { e.addTrace({}, "while parsing machine specification at a column #%lu in a row: '%s'", fieldIndex, line); throw; } return str; }; if (!isSet(0)) throw FormatError("bad machine specification: store URL was not found at the first column of a row: '%s'", line); // TODO use designated initializers, once C++ supports those with // custom constructors. return { // `storeUri` tokens[0], // `systemTypes` isSet(1) ? tokenizeString<std::set<std::string>>(tokens[1], ",") : defaultSystems, // `sshKey` isSet(2) ? tokens[2] : "", // `maxJobs` isSet(3) ? parseUnsignedIntField(3) : 1U, // `speedFactor` isSet(4) ? parseFloatField(4) : 1.0f, // `supportedFeatures` isSet(5) ? tokenizeString<std::set<std::string>>(tokens[5], ",") : std::set<std::string>{}, // `mandatoryFeatures` isSet(6) ? tokenizeString<std::set<std::string>>(tokens[6], ",") : std::set<std::string>{}, // `sshPublicHostKey` isSet(7) ? ensureBase64(7) : "" }; } static Machines parseBuilderLines(const std::set<std::string> & defaultSystems, const std::vector<std::string> & builders) { Machines result; std::transform( builders.begin(), builders.end(), std::back_inserter(result), [&](auto && line) { return parseBuilderLine(defaultSystems, line); }); return result; } Machines Machine::parseConfig(const std::set<std::string> & defaultSystems, const std::string & s) { const auto builderLines = expandBuilderLines(s); return parseBuilderLines(defaultSystems, builderLines); } Machines getMachines() { return Machine::parseConfig({settings.thisSystem}, settings.builders); } }
6,997
C++
.cc
186
30.575269
141
0.612266
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,800
http-binary-cache-store.cc
NixOS_nix/src/libstore/http-binary-cache-store.cc
#include "http-binary-cache-store.hh" #include "filetransfer.hh" #include "globals.hh" #include "nar-info-disk-cache.hh" #include "callback.hh" namespace nix { MakeError(UploadToHTTP, Error); HttpBinaryCacheStoreConfig::HttpBinaryCacheStoreConfig( std::string_view scheme, std::string_view _cacheUri, const Params & params) : StoreConfig(params) , BinaryCacheStoreConfig(params) , cacheUri( std::string { scheme } + "://" + (!_cacheUri.empty() ? _cacheUri : throw UsageError("`%s` Store requires a non-empty authority in Store URL", scheme))) { while (!cacheUri.empty() && cacheUri.back() == '/') cacheUri.pop_back(); } std::string HttpBinaryCacheStoreConfig::doc() { return #include "http-binary-cache-store.md" ; } class HttpBinaryCacheStore : public virtual HttpBinaryCacheStoreConfig, public virtual BinaryCacheStore { private: struct State { bool enabled = true; std::chrono::steady_clock::time_point disabledUntil; }; Sync<State> _state; public: HttpBinaryCacheStore( std::string_view scheme, PathView cacheUri, const Params & params) : StoreConfig(params) , BinaryCacheStoreConfig(params) , HttpBinaryCacheStoreConfig(scheme, cacheUri, params) , Store(params) , BinaryCacheStore(params) { diskCache = getNarInfoDiskCache(); } std::string getUri() override { return cacheUri; } void init() override { // FIXME: do this lazily? if (auto cacheInfo = diskCache->upToDateCacheExists(cacheUri)) { wantMassQuery.setDefault(cacheInfo->wantMassQuery); priority.setDefault(cacheInfo->priority); } else { try { BinaryCacheStore::init(); } catch (UploadToHTTP &) { throw Error("'%s' does not appear to be a binary cache", cacheUri); } diskCache->createCache(cacheUri, storeDir, wantMassQuery, priority); } } protected: void maybeDisable() { auto state(_state.lock()); if (state->enabled && settings.tryFallback) { int t = 60; printError("disabling binary cache '%s' for %s seconds", getUri(), t); state->enabled = false; state->disabledUntil = std::chrono::steady_clock::now() + std::chrono::seconds(t); } } void checkEnabled() { auto state(_state.lock()); if (state->enabled) return; if (std::chrono::steady_clock::now() > state->disabledUntil) { state->enabled = true; debug("re-enabling binary cache '%s'", getUri()); return; } throw SubstituterDisabled("substituter '%s' is disabled", getUri()); } bool fileExists(const std::string & path) override { checkEnabled(); try { FileTransferRequest request(makeRequest(path)); request.head = true; getFileTransfer()->download(request); return true; } catch (FileTransferError & e) { /* S3 buckets return 403 if a file doesn't exist and the bucket is unlistable, so treat 403 as 404. */ if (e.error == FileTransfer::NotFound || e.error == FileTransfer::Forbidden) return false; maybeDisable(); throw; } } void upsertFile(const std::string & path, std::shared_ptr<std::basic_iostream<char>> istream, const std::string & mimeType) override { auto req = makeRequest(path); req.data = StreamToSourceAdapter(istream).drain(); req.mimeType = mimeType; try { getFileTransfer()->upload(req); } catch (FileTransferError & e) { throw UploadToHTTP("while uploading to HTTP binary cache at '%s': %s", cacheUri, e.msg()); } } FileTransferRequest makeRequest(const std::string & path) { return FileTransferRequest( hasPrefix(path, "https://") || hasPrefix(path, "http://") || hasPrefix(path, "file://") ? path : cacheUri + "/" + path); } void getFile(const std::string & path, Sink & sink) override { checkEnabled(); auto request(makeRequest(path)); try { getFileTransfer()->download(std::move(request), sink); } catch (FileTransferError & e) { if (e.error == FileTransfer::NotFound || e.error == FileTransfer::Forbidden) throw NoSuchBinaryCacheFile("file '%s' does not exist in binary cache '%s'", path, getUri()); maybeDisable(); throw; } } void getFile(const std::string & path, Callback<std::optional<std::string>> callback) noexcept override { try { checkEnabled(); auto request(makeRequest(path)); auto callbackPtr = std::make_shared<decltype(callback)>(std::move(callback)); getFileTransfer()->enqueueFileTransfer(request, {[callbackPtr, this](std::future<FileTransferResult> result) { try { (*callbackPtr)(std::move(result.get().data)); } catch (FileTransferError & e) { if (e.error == FileTransfer::NotFound || e.error == FileTransfer::Forbidden) return (*callbackPtr)({}); maybeDisable(); callbackPtr->rethrow(); } catch (...) { callbackPtr->rethrow(); } }}); } catch (...) { callback.rethrow(); return; } } /** * This isn't actually necessary read only. We support "upsert" now, so we * have a notion of authentication via HTTP POST/PUT. * * For now, we conservatively say we don't know. * * \todo try to expose our HTTP authentication status. */ std::optional<TrustedFlag> isTrustedClient() override { return std::nullopt; } }; static RegisterStoreImplementation<HttpBinaryCacheStore, HttpBinaryCacheStoreConfig> regHttpBinaryCacheStore; }
6,341
C++
.cc
182
25.813187
109
0.582409
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,801
posix-fs-canonicalise.cc
NixOS_nix/src/libstore/posix-fs-canonicalise.cc
#if HAVE_ACL_SUPPORT # include <sys/xattr.h> #endif #include "posix-fs-canonicalise.hh" #include "file-system.hh" #include "signals.hh" #include "util.hh" #include "globals.hh" #include "store-api.hh" namespace nix { const time_t mtimeStore = 1; /* 1 second into the epoch */ static void canonicaliseTimestampAndPermissions(const Path & path, const struct stat & st) { if (!S_ISLNK(st.st_mode)) { /* Mask out all type related bits. */ mode_t mode = st.st_mode & ~S_IFMT; if (mode != 0444 && mode != 0555) { mode = (st.st_mode & S_IFMT) | 0444 | (st.st_mode & S_IXUSR ? 0111 : 0); if (chmod(path.c_str(), mode) == -1) throw SysError("changing mode of '%1%' to %2$o", path, mode); } } #ifndef _WIN32 // TODO implement if (st.st_mtime != mtimeStore) { struct stat st2 = st; st2.st_mtime = mtimeStore, setWriteTime(path, st2); } #endif } void canonicaliseTimestampAndPermissions(const Path & path) { canonicaliseTimestampAndPermissions(path, lstat(path)); } static void canonicalisePathMetaData_( const Path & path, #ifndef _WIN32 std::optional<std::pair<uid_t, uid_t>> uidRange, #endif InodesSeen & inodesSeen) { checkInterrupt(); #if __APPLE__ /* Remove flags, in particular UF_IMMUTABLE which would prevent the file from being garbage-collected. FIXME: Use setattrlist() to remove other attributes as well. */ if (lchflags(path.c_str(), 0)) { if (errno != ENOTSUP) throw SysError("clearing flags of path '%1%'", path); } #endif auto st = lstat(path); /* Really make sure that the path is of a supported type. */ if (!(S_ISREG(st.st_mode) || S_ISDIR(st.st_mode) || S_ISLNK(st.st_mode))) throw Error("file '%1%' has an unsupported type", path); #if HAVE_ACL_SUPPORT /* Remove extended attributes / ACLs. */ ssize_t eaSize = llistxattr(path.c_str(), nullptr, 0); if (eaSize < 0) { if (errno != ENOTSUP && errno != ENODATA) throw SysError("querying extended attributes of '%s'", path); } else if (eaSize > 0) { std::vector<char> eaBuf(eaSize); if ((eaSize = llistxattr(path.c_str(), eaBuf.data(), eaBuf.size())) < 0) throw SysError("querying extended attributes of '%s'", path); for (auto & eaName: tokenizeString<Strings>(std::string(eaBuf.data(), eaSize), std::string("\000", 1))) { if (settings.ignoredAcls.get().count(eaName)) continue; if (lremovexattr(path.c_str(), eaName.c_str()) == -1) throw SysError("removing extended attribute '%s' from '%s'", eaName, path); } } #endif #ifndef _WIN32 /* Fail if the file is not owned by the build user. This prevents us from messing up the ownership/permissions of files hard-linked into the output (e.g. "ln /etc/shadow $out/foo"). However, ignore files that we chown'ed ourselves previously to ensure that we don't fail on hard links within the same build (i.e. "touch $out/foo; ln $out/foo $out/bar"). */ if (uidRange && (st.st_uid < uidRange->first || st.st_uid > uidRange->second)) { if (S_ISDIR(st.st_mode) || !inodesSeen.count(Inode(st.st_dev, st.st_ino))) throw BuildError("invalid ownership on file '%1%'", path); mode_t mode = st.st_mode & ~S_IFMT; assert(S_ISLNK(st.st_mode) || (st.st_uid == geteuid() && (mode == 0444 || mode == 0555) && st.st_mtime == mtimeStore)); return; } #endif inodesSeen.insert(Inode(st.st_dev, st.st_ino)); canonicaliseTimestampAndPermissions(path, st); #ifndef _WIN32 /* Change ownership to the current uid. If it's a symlink, use lchown if available, otherwise don't bother. Wrong ownership of a symlink doesn't matter, since the owning user can't change the symlink and can't delete it because the directory is not writable. The only exception is top-level paths in the Nix store (since that directory is group-writable for the Nix build users group); we check for this case below. */ if (st.st_uid != geteuid()) { #if HAVE_LCHOWN if (lchown(path.c_str(), geteuid(), getegid()) == -1) #else if (!S_ISLNK(st.st_mode) && chown(path.c_str(), geteuid(), getegid()) == -1) #endif throw SysError("changing owner of '%1%' to %2%", path, geteuid()); } #endif if (S_ISDIR(st.st_mode)) { for (auto & i : std::filesystem::directory_iterator{path}) { checkInterrupt(); canonicalisePathMetaData_( i.path().string(), #ifndef _WIN32 uidRange, #endif inodesSeen); } } } void canonicalisePathMetaData( const Path & path, #ifndef _WIN32 std::optional<std::pair<uid_t, uid_t>> uidRange, #endif InodesSeen & inodesSeen) { canonicalisePathMetaData_( path, #ifndef _WIN32 uidRange, #endif inodesSeen); #ifndef _WIN32 /* On platforms that don't have lchown(), the top-level path can't be a symlink, since we can't change its ownership. */ auto st = lstat(path); if (st.st_uid != geteuid()) { assert(S_ISLNK(st.st_mode)); throw Error("wrong ownership of top-level store path '%1%'", path); } #endif } void canonicalisePathMetaData(const Path & path #ifndef _WIN32 , std::optional<std::pair<uid_t, uid_t>> uidRange #endif ) { InodesSeen inodesSeen; canonicalisePathMetaData_( path, #ifndef _WIN32 uidRange, #endif inodesSeen); } }
5,704
C++
.cc
160
29.56875
127
0.621009
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,802
profiles.cc
NixOS_nix/src/libstore/profiles.cc
#include "profiles.hh" #include "signals.hh" #include "store-api.hh" #include "local-fs-store.hh" #include "users.hh" #include <sys/types.h> #include <sys/stat.h> #include <unistd.h> #include <errno.h> #include <stdio.h> namespace nix { /** * Parse a generation name of the format * `<profilename>-<number>-link'. */ static std::optional<GenerationNumber> parseName(const std::string & profileName, const std::string & name) { if (name.substr(0, profileName.size() + 1) != profileName + "-") return {}; auto s = name.substr(profileName.size() + 1); auto p = s.find("-link"); if (p == std::string::npos) return {}; if (auto n = string2Int<unsigned int>(s.substr(0, p))) return *n; else return {}; } std::pair<Generations, std::optional<GenerationNumber>> findGenerations(Path profile) { Generations gens; std::filesystem::path profileDir = dirOf(profile); auto profileName = std::string(baseNameOf(profile)); for (auto & i : std::filesystem::directory_iterator{profileDir}) { checkInterrupt(); if (auto n = parseName(profileName, i.path().filename().string())) { auto path = i.path().string(); gens.push_back({ .number = *n, .path = path, .creationTime = lstat(path).st_mtime }); } } gens.sort([](const Generation & a, const Generation & b) { return a.number < b.number; }); return { gens, pathExists(profile) ? parseName(profileName, readLink(profile)) : std::nullopt }; } /** * Create a generation name that can be parsed by `parseName()`. */ static Path makeName(const Path & profile, GenerationNumber num) { return fmt("%s-%s-link", profile, num); } Path createGeneration(LocalFSStore & store, Path profile, StorePath outPath) { /* The new generation number should be higher than old the previous ones. */ auto [gens, dummy] = findGenerations(profile); GenerationNumber num; if (gens.size() > 0) { Generation last = gens.back(); if (readLink(last.path) == store.printStorePath(outPath)) { /* We only create a new generation symlink if it differs from the last one. This helps keeping gratuitous installs/rebuilds from piling up uncontrolled numbers of generations, cluttering up the UI like grub. */ return last.path; } num = last.number; } else { num = 0; } /* Create the new generation. Note that addPermRoot() blocks if the garbage collector is running to prevent the stuff we've built from moving from the temporary roots (which the GC knows) to the permanent roots (of which the GC would have a stale view). If we didn't do it this way, the GC might remove the user environment etc. we've just built. */ Path generation = makeName(profile, num + 1); store.addPermRoot(outPath, generation); return generation; } static void removeFile(const Path & path) { if (remove(path.c_str()) == -1) throw SysError("cannot unlink '%1%'", path); } void deleteGeneration(const Path & profile, GenerationNumber gen) { Path generation = makeName(profile, gen); removeFile(generation); } /** * Delete a generation with dry-run mode. * * Like `deleteGeneration()` but: * * - We log what we are going to do. * * - We only actually delete if `dryRun` is false. */ static void deleteGeneration2(const Path & profile, GenerationNumber gen, bool dryRun) { if (dryRun) notice("would remove profile version %1%", gen); else { notice("removing profile version %1%", gen); deleteGeneration(profile, gen); } } void deleteGenerations(const Path & profile, const std::set<GenerationNumber> & gensToDelete, bool dryRun) { PathLocks lock; lockProfile(lock, profile); auto [gens, curGen] = findGenerations(profile); if (gensToDelete.count(*curGen)) throw Error("cannot delete current version of profile %1%'", profile); for (auto & i : gens) { if (!gensToDelete.count(i.number)) continue; deleteGeneration2(profile, i.number, dryRun); } } /** * Advanced the iterator until the given predicate `cond` returns `true`. */ static inline void iterDropUntil(Generations & gens, auto && i, auto && cond) { for (; i != gens.rend() && !cond(*i); ++i); } void deleteGenerationsGreaterThan(const Path & profile, GenerationNumber max, bool dryRun) { if (max == 0) throw Error("Must keep at least one generation, otherwise the current one would be deleted"); PathLocks lock; lockProfile(lock, profile); auto [gens, _curGen] = findGenerations(profile); auto curGen = _curGen; auto i = gens.rbegin(); // Find the current generation iterDropUntil(gens, i, [&](auto & g) { return g.number == curGen; }); // Skip over `max` generations, preserving them for (GenerationNumber keep = 0; i != gens.rend() && keep < max; ++i, ++keep); // Delete the rest for (; i != gens.rend(); ++i) deleteGeneration2(profile, i->number, dryRun); } void deleteOldGenerations(const Path & profile, bool dryRun) { PathLocks lock; lockProfile(lock, profile); auto [gens, curGen] = findGenerations(profile); for (auto & i : gens) if (i.number != curGen) deleteGeneration2(profile, i.number, dryRun); } void deleteGenerationsOlderThan(const Path & profile, time_t t, bool dryRun) { PathLocks lock; lockProfile(lock, profile); auto [gens, curGen] = findGenerations(profile); auto i = gens.rbegin(); // Predicate that the generation is older than the given time. auto older = [&](auto & g) { return g.creationTime < t; }; // Find the first older generation, if one exists iterDropUntil(gens, i, older); /* Take the previous generation We don't want delete this one yet because it existed at the requested point in time, and we want to be able to roll back to it. */ if (i != gens.rend()) ++i; // Delete all previous generations (unless current). for (; i != gens.rend(); ++i) { /* Creating date and generations should be monotonic, so lower numbered derivations should also be older. */ assert(older(*i)); if (i->number != curGen) deleteGeneration2(profile, i->number, dryRun); } } time_t parseOlderThanTimeSpec(std::string_view timeSpec) { if (timeSpec.empty() || timeSpec[timeSpec.size() - 1] != 'd') throw UsageError("invalid number of days specifier '%1%', expected something like '14d'", timeSpec); time_t curTime = time(0); auto strDays = timeSpec.substr(0, timeSpec.size() - 1); auto days = string2Int<int>(strDays); if (!days || *days < 1) throw UsageError("invalid number of days specifier '%1%'", timeSpec); return curTime - *days * 24 * 3600; } void switchLink(Path link, Path target) { /* Hacky. */ if (dirOf(target) == dirOf(link)) target = baseNameOf(target); replaceSymlink(target, link); } void switchGeneration( const Path & profile, std::optional<GenerationNumber> dstGen, bool dryRun) { PathLocks lock; lockProfile(lock, profile); auto [gens, curGen] = findGenerations(profile); std::optional<Generation> dst; for (auto & i : gens) if ((!dstGen && i.number < curGen) || (dstGen && i.number == *dstGen)) dst = i; if (!dst) { if (dstGen) throw Error("profile version %1% does not exist", *dstGen); else throw Error("no profile version older than the current (%1%) exists", curGen.value_or(0)); } notice("switching profile from version %d to %d", curGen.value_or(0), dst->number); if (dryRun) return; switchLink(profile, dst->path); } void lockProfile(PathLocks & lock, const Path & profile) { lock.lockPaths({profile}, fmt("waiting for lock on profile '%1%'", profile)); lock.setDeletion(true); } std::string optimisticLockProfile(const Path & profile) { return pathExists(profile) ? readLink(profile) : ""; } Path profilesDir() { auto profileRoot = isRootUser() ? rootProfilesDir() : createNixStateDir() + "/profiles"; createDirs(profileRoot); return profileRoot; } Path rootProfilesDir() { return settings.nixStateDir + "/profiles/per-user/root"; } Path getDefaultProfile() { Path profileLink = settings.useXDGBaseDirectories ? createNixStateDir() + "/profile" : getHome() + "/.nix-profile"; try { auto profile = profilesDir() + "/profile"; if (!pathExists(profileLink)) { replaceSymlink(profile, profileLink); } // Backwards compatibiliy measure: Make root's profile available as // `.../default` as it's what NixOS and most of the init scripts expect Path globalProfileLink = settings.nixStateDir + "/profiles/default"; if (isRootUser() && !pathExists(globalProfileLink)) { replaceSymlink(profile, globalProfileLink); } return absPath(readLink(profileLink), dirOf(profileLink)); } catch (Error &) { return profileLink; } catch (std::filesystem::filesystem_error &) { return profileLink; } } Path defaultChannelsDir() { return profilesDir() + "/channels"; } Path rootChannelsDir() { return rootProfilesDir() + "/channels"; } }
9,608
C++
.cc
279
29.035842
119
0.650486
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,803
globals.cc
NixOS_nix/src/libstore/globals.cc
#include "globals.hh" #include "config-global.hh" #include "current-process.hh" #include "archive.hh" #include "args.hh" #include "abstract-setting-to-json.hh" #include "compute-levels.hh" #include "signals.hh" #include <algorithm> #include <map> #include <mutex> #include <thread> #include <curl/curl.h> #include <nlohmann/json.hpp> #ifndef _WIN32 # include <sys/utsname.h> #endif #ifdef __GLIBC__ # include <gnu/lib-names.h> # include <nss.h> # include <dlfcn.h> #endif #if __APPLE__ # include "processes.hh" #endif #include "config-impl.hh" #ifdef __APPLE__ #include <sys/sysctl.h> #endif #include "strings.hh" namespace nix { /* The default location of the daemon socket, relative to nixStateDir. The socket is in a directory to allow you to control access to the Nix daemon by setting the mode/ownership of the directory appropriately. (This wouldn't work on the socket itself since it must be deleted and recreated on startup.) */ #define DEFAULT_SOCKET_PATH "/daemon-socket/socket" Settings settings; static GlobalConfig::Register rSettings(&settings); Settings::Settings() : nixPrefix(NIX_PREFIX) , nixStore( #ifndef _WIN32 // On Windows `/nix/store` is not a canonical path, but we dont' // want to deal with that yet. canonPath #endif (getEnvNonEmpty("NIX_STORE_DIR").value_or(getEnvNonEmpty("NIX_STORE").value_or(NIX_STORE_DIR)))) , nixDataDir(canonPath(getEnvNonEmpty("NIX_DATA_DIR").value_or(NIX_DATA_DIR))) , nixLogDir(canonPath(getEnvNonEmpty("NIX_LOG_DIR").value_or(NIX_LOG_DIR))) , nixStateDir(canonPath(getEnvNonEmpty("NIX_STATE_DIR").value_or(NIX_STATE_DIR))) , nixConfDir(canonPath(getEnvNonEmpty("NIX_CONF_DIR").value_or(NIX_CONF_DIR))) , nixUserConfFiles(getUserConfigFiles()) , nixManDir(canonPath(NIX_MAN_DIR)) , nixDaemonSocketFile(canonPath(getEnvNonEmpty("NIX_DAEMON_SOCKET_PATH").value_or(nixStateDir + DEFAULT_SOCKET_PATH))) { #ifndef _WIN32 buildUsersGroup = isRootUser() ? "nixbld" : ""; #endif allowSymlinkedStore = getEnv("NIX_IGNORE_SYMLINK_STORE") == "1"; auto sslOverride = getEnv("NIX_SSL_CERT_FILE").value_or(getEnv("SSL_CERT_FILE").value_or("")); if (sslOverride != "") caFile = sslOverride; /* Backwards compatibility. */ auto s = getEnv("NIX_REMOTE_SYSTEMS"); if (s) { Strings ss; for (auto & p : tokenizeString<Strings>(*s, ":")) ss.push_back("@" + p); builders = concatStringsSep("\n", ss); } #if defined(__linux__) && defined(SANDBOX_SHELL) sandboxPaths = tokenizeString<StringSet>("/bin/sh=" SANDBOX_SHELL); #endif /* chroot-like behavior from Apple's sandbox */ #if __APPLE__ sandboxPaths = tokenizeString<StringSet>("/System/Library/Frameworks /System/Library/PrivateFrameworks /bin/sh /bin/bash /private/tmp /private/var/tmp /usr/lib"); allowedImpureHostPrefixes = tokenizeString<StringSet>("/System/Library /usr/lib /dev /bin/sh"); #endif } void loadConfFile(AbstractConfig & config) { auto applyConfigFile = [&](const Path & path) { try { std::string contents = readFile(path); config.applyConfig(contents, path); } catch (SystemError &) { } }; applyConfigFile(settings.nixConfDir + "/nix.conf"); /* We only want to send overrides to the daemon, i.e. stuff from ~/.nix/nix.conf or the command line. */ config.resetOverridden(); auto files = settings.nixUserConfFiles; for (auto file = files.rbegin(); file != files.rend(); file++) { applyConfigFile(*file); } auto nixConfEnv = getEnv("NIX_CONFIG"); if (nixConfEnv.has_value()) { config.applyConfig(nixConfEnv.value(), "NIX_CONFIG"); } } std::vector<Path> getUserConfigFiles() { // Use the paths specified in NIX_USER_CONF_FILES if it has been defined auto nixConfFiles = getEnv("NIX_USER_CONF_FILES"); if (nixConfFiles.has_value()) { return tokenizeString<std::vector<std::string>>(nixConfFiles.value(), ":"); } // Use the paths specified by the XDG spec std::vector<Path> files; auto dirs = getConfigDirs(); for (auto & dir : dirs) { files.insert(files.end(), dir + "/nix.conf"); } return files; } unsigned int Settings::getDefaultCores() { const unsigned int concurrency = std::max(1U, std::thread::hardware_concurrency()); const unsigned int maxCPU = getMaxCPU(); if (maxCPU > 0) return maxCPU; else return concurrency; } #if __APPLE__ static bool hasVirt() { int hasVMM; int hvSupport; size_t size; size = sizeof(hasVMM); if (sysctlbyname("kern.hv_vmm_present", &hasVMM, &size, NULL, 0) == 0) { if (hasVMM) return false; } // whether the kernel and hardware supports virt size = sizeof(hvSupport); if (sysctlbyname("kern.hv_support", &hvSupport, &size, NULL, 0) == 0) { return hvSupport == 1; } else { return false; } } #endif StringSet Settings::getDefaultSystemFeatures() { /* For backwards compatibility, accept some "features" that are used in Nixpkgs to route builds to certain machines but don't actually require anything special on the machines. */ StringSet features{"nixos-test", "benchmark", "big-parallel"}; #if __linux__ features.insert("uid-range"); #endif #if __linux__ if (access("/dev/kvm", R_OK | W_OK) == 0) features.insert("kvm"); #endif #if __APPLE__ if (hasVirt()) features.insert("apple-virt"); #endif return features; } StringSet Settings::getDefaultExtraPlatforms() { StringSet extraPlatforms; if (std::string{SYSTEM} == "x86_64-linux" && !isWSL1()) extraPlatforms.insert("i686-linux"); #if __linux__ StringSet levels = computeLevels(); for (auto iter = levels.begin(); iter != levels.end(); ++iter) extraPlatforms.insert(*iter + "-linux"); #elif __APPLE__ // Rosetta 2 emulation layer can run x86_64 binaries on aarch64 // machines. Note that we can’t force processes from executing // x86_64 in aarch64 environments or vice versa since they can // always exec with their own binary preferences. if (std::string{SYSTEM} == "aarch64-darwin" && runProgram(RunOptions {.program = "arch", .args = {"-arch", "x86_64", "/usr/bin/true"}, .mergeStderrToStdout = true}).first == 0) extraPlatforms.insert("x86_64-darwin"); #endif return extraPlatforms; } bool Settings::isWSL1() { #if __linux__ struct utsname utsbuf; uname(&utsbuf); // WSL1 uses -Microsoft suffix // WSL2 uses -microsoft-standard suffix return hasSuffix(utsbuf.release, "-Microsoft"); #else return false; #endif } Path Settings::getDefaultSSLCertFile() { for (auto & fn : {"/etc/ssl/certs/ca-certificates.crt", "/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt"}) if (pathAccessible(fn)) return fn; return ""; } const std::string nixVersion = PACKAGE_VERSION; NLOHMANN_JSON_SERIALIZE_ENUM(SandboxMode, { {SandboxMode::smEnabled, true}, {SandboxMode::smRelaxed, "relaxed"}, {SandboxMode::smDisabled, false}, }); template<> SandboxMode BaseSetting<SandboxMode>::parse(const std::string & str) const { if (str == "true") return smEnabled; else if (str == "relaxed") return smRelaxed; else if (str == "false") return smDisabled; else throw UsageError("option '%s' has invalid value '%s'", name, str); } template<> struct BaseSetting<SandboxMode>::trait { static constexpr bool appendable = false; }; template<> std::string BaseSetting<SandboxMode>::to_string() const { if (value == smEnabled) return "true"; else if (value == smRelaxed) return "relaxed"; else if (value == smDisabled) return "false"; else unreachable(); } template<> void BaseSetting<SandboxMode>::convertToArg(Args & args, const std::string & category) { args.addFlag({ .longName = name, .aliases = aliases, .description = "Enable sandboxing.", .category = category, .handler = {[this]() { override(smEnabled); }} }); args.addFlag({ .longName = "no-" + name, .aliases = aliases, .description = "Disable sandboxing.", .category = category, .handler = {[this]() { override(smDisabled); }} }); args.addFlag({ .longName = "relaxed-" + name, .aliases = aliases, .description = "Enable sandboxing, but allow builds to disable it.", .category = category, .handler = {[this]() { override(smRelaxed); }} }); } unsigned int MaxBuildJobsSetting::parse(const std::string & str) const { if (str == "auto") return std::max(1U, std::thread::hardware_concurrency()); else { if (auto n = string2Int<decltype(value)>(str)) return *n; else throw UsageError("configuration setting '%s' should be 'auto' or an integer", name); } } static void preloadNSS() { /* builtin:fetchurl can trigger a DNS lookup, which with glibc can trigger a dynamic library load of one of the glibc NSS libraries in a sandboxed child, which will fail unless the library's already been loaded in the parent. So we force a lookup of an invalid domain to force the NSS machinery to load its lookup libraries in the parent before any child gets a chance to. */ static std::once_flag dns_resolve_flag; std::call_once(dns_resolve_flag, []() { #ifdef __GLIBC__ /* On linux, glibc will run every lookup through the nss layer. * That means every lookup goes, by default, through nscd, which acts as a local * cache. * Because we run builds in a sandbox, we also remove access to nscd otherwise * lookups would leak into the sandbox. * * But now we have a new problem, we need to make sure the nss_dns backend that * does the dns lookups when nscd is not available is loaded or available. * * We can't make it available without leaking nix's environment, so instead we'll * load the backend, and configure nss so it does not try to run dns lookups * through nscd. * * This is technically only used for builtins:fetch* functions so we only care * about dns. * * All other platforms are unaffected. */ if (!dlopen(LIBNSS_DNS_SO, RTLD_NOW)) warn("unable to load nss_dns backend"); // FIXME: get hosts entry from nsswitch.conf. __nss_configure_lookup("hosts", "files dns"); #endif }); } static bool initLibStoreDone = false; void assertLibStoreInitialized() { if (!initLibStoreDone) { printError("The program must call nix::initNix() before calling any libstore library functions."); abort(); }; } void initLibStore(bool loadConfig) { if (initLibStoreDone) return; initLibUtil(); if (loadConfig) loadConfFile(globalConfig); preloadNSS(); /* Because of an objc quirk[1], calling curl_global_init for the first time after fork() will always result in a crash. Up until now the solution has been to set OBJC_DISABLE_INITIALIZE_FORK_SAFETY for every nix process to ignore that error. Instead of working around that error we address it at the core - by calling curl_global_init here, which should mean curl will already have been initialized by the time we try to do so in a forked process. [1] https://github.com/apple-oss-distributions/objc4/blob/01edf1705fbc3ff78a423cd21e03dfc21eb4d780/runtime/objc-initialize.mm#L614-L636 */ curl_global_init(CURL_GLOBAL_ALL); #if __APPLE__ /* On macOS, don't use the per-session TMPDIR (as set e.g. by sshd). This breaks build users because they don't have access to the TMPDIR, in particular in ‘nix-store --serve’. */ if (hasPrefix(defaultTempDir(), "/var/folders/")) unsetenv("TMPDIR"); #endif initLibStoreDone = true; } }
12,087
C++
.cc
326
32.015337
166
0.670943
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,804
pathlocks.cc
NixOS_nix/src/libstore/pathlocks.cc
#include "pathlocks.hh" #include "util.hh" #include "sync.hh" #include "signals.hh" #include <cerrno> #include <cstdlib> namespace nix { PathLocks::PathLocks() : deletePaths(false) { } PathLocks::PathLocks(const PathSet & paths, const std::string & waitMsg) : deletePaths(false) { lockPaths(paths, waitMsg); } PathLocks::~PathLocks() { try { unlock(); } catch (...) { ignoreExceptionInDestructor(); } } void PathLocks::setDeletion(bool deletePaths) { this->deletePaths = deletePaths; } }
544
C++
.cc
29
15.827586
72
0.695825
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,805
store-api.cc
NixOS_nix/src/libstore/store-api.cc
#include "signature/local-keys.hh" #include "source-accessor.hh" #include "globals.hh" #include "derived-path.hh" #include "realisation.hh" #include "derivations.hh" #include "store-api.hh" #include "util.hh" #include "nar-info-disk-cache.hh" #include "thread-pool.hh" #include "references.hh" #include "archive.hh" #include "callback.hh" #include "git.hh" #include "posix-source-accessor.hh" // FIXME this should not be here, see TODO below on // `addMultipleToStore`. #include "worker-protocol.hh" #include "signals.hh" #include "users.hh" #include <filesystem> #include <nlohmann/json.hpp> #include "strings.hh" using json = nlohmann::json; namespace nix { bool StoreDirConfig::isInStore(PathView path) const { return isInDir(path, storeDir); } std::pair<StorePath, Path> StoreDirConfig::toStorePath(PathView path) const { if (!isInStore(path)) throw Error("path '%1%' is not in the Nix store", path); auto slash = path.find('/', storeDir.size() + 1); if (slash == Path::npos) return {parseStorePath(path), ""}; else return {parseStorePath(path.substr(0, slash)), (Path) path.substr(slash)}; } Path Store::followLinksToStore(std::string_view _path) const { Path path = absPath(std::string(_path)); while (!isInStore(path)) { if (!std::filesystem::is_symlink(path)) break; auto target = readLink(path); path = absPath(target, dirOf(path)); } if (!isInStore(path)) throw BadStorePath("path '%1%' is not in the Nix store", path); return path; } StorePath Store::followLinksToStorePath(std::string_view path) const { return toStorePath(followLinksToStore(path)).first; } /* The exact specification of store paths is in `protocols/store-path.md` in the Nix manual. These few functions implement that specification. If changes to these functions go beyond mere implementation changes i.e. also update the user-visible behavior, please update the specification to match. */ StorePath StoreDirConfig::makeStorePath(std::string_view type, std::string_view hash, std::string_view name) const { /* e.g., "source:sha256:1abc...:/nix/store:foo.tar.gz" */ auto s = std::string(type) + ":" + std::string(hash) + ":" + storeDir + ":" + std::string(name); auto h = compressHash(hashString(HashAlgorithm::SHA256, s), 20); return StorePath(h, name); } StorePath StoreDirConfig::makeStorePath(std::string_view type, const Hash & hash, std::string_view name) const { return makeStorePath(type, hash.to_string(HashFormat::Base16, true), name); } StorePath StoreDirConfig::makeOutputPath(std::string_view id, const Hash & hash, std::string_view name) const { return makeStorePath("output:" + std::string { id }, hash, outputPathName(name, id)); } /* Stuff the references (if any) into the type. This is a bit hacky, but we can't put them in, say, <s2> (per the grammar above) since that would be ambiguous. */ static std::string makeType( const StoreDirConfig & store, std::string && type, const StoreReferences & references) { for (auto & i : references.others) { type += ":"; type += store.printStorePath(i); } if (references.self) type += ":self"; return std::move(type); } StorePath StoreDirConfig::makeFixedOutputPath(std::string_view name, const FixedOutputInfo & info) const { if (info.method == FileIngestionMethod::Git && info.hash.algo != HashAlgorithm::SHA1) throw Error("Git file ingestion must use SHA-1 hash"); if (info.hash.algo == HashAlgorithm::SHA256 && info.method == FileIngestionMethod::NixArchive) { return makeStorePath(makeType(*this, "source", info.references), info.hash, name); } else { if (!info.references.empty()) { throw Error("fixed output derivation '%s' is not allowed to refer to other store paths.\nYou may need to use the 'unsafeDiscardReferences' derivation attribute, see the manual for more details.", name); } // make a unique digest based on the parameters for creating this store object auto payload = "fixed:out:" + makeFileIngestionPrefix(info.method) + info.hash.to_string(HashFormat::Base16, true) + ":"; auto digest = hashString(HashAlgorithm::SHA256, payload); return makeStorePath("output:out", digest, name); } } StorePath StoreDirConfig::makeFixedOutputPathFromCA(std::string_view name, const ContentAddressWithReferences & ca) const { // New template return std::visit(overloaded { [&](const TextInfo & ti) { assert(ti.hash.algo == HashAlgorithm::SHA256); return makeStorePath( makeType(*this, "text", StoreReferences { .others = ti.references, .self = false, }), ti.hash, name); }, [&](const FixedOutputInfo & foi) { return makeFixedOutputPath(name, foi); } }, ca.raw); } std::pair<StorePath, Hash> StoreDirConfig::computeStorePath( std::string_view name, const SourcePath & path, ContentAddressMethod method, HashAlgorithm hashAlgo, const StorePathSet & references, PathFilter & filter) const { auto [h, size] = hashPath(path, method.getFileIngestionMethod(), hashAlgo, filter); if (settings.warnLargePathThreshold && size && *size >= settings.warnLargePathThreshold) warn("hashed large path '%s' (%s)", path, renderSize(*size)); return { makeFixedOutputPathFromCA( name, ContentAddressWithReferences::fromParts( method, h, { .others = references, .self = false, })), h, }; } StorePath Store::addToStore( std::string_view name, const SourcePath & path, ContentAddressMethod method, HashAlgorithm hashAlgo, const StorePathSet & references, PathFilter & filter, RepairFlag repair) { FileSerialisationMethod fsm; switch (method.getFileIngestionMethod()) { case FileIngestionMethod::Flat: fsm = FileSerialisationMethod::Flat; break; case FileIngestionMethod::NixArchive: fsm = FileSerialisationMethod::NixArchive; break; case FileIngestionMethod::Git: // Use NAR; Git is not a serialization method fsm = FileSerialisationMethod::NixArchive; break; } std::optional<StorePath> storePath; auto sink = sourceToSink([&](Source & source) { LengthSource lengthSource(source); storePath = addToStoreFromDump(lengthSource, name, fsm, method, hashAlgo, references, repair); if (settings.warnLargePathThreshold && lengthSource.total >= settings.warnLargePathThreshold) warn("copied large path '%s' to the store (%s)", path, renderSize(lengthSource.total)); }); dumpPath(path, *sink, fsm, filter); sink->finish(); return storePath.value(); } void Store::addMultipleToStore( PathsSource & pathsToCopy, Activity & act, RepairFlag repair, CheckSigsFlag checkSigs) { std::atomic<size_t> nrDone{0}; std::atomic<size_t> nrFailed{0}; std::atomic<uint64_t> bytesExpected{0}; std::atomic<uint64_t> nrRunning{0}; using PathWithInfo = std::pair<ValidPathInfo, std::unique_ptr<Source>>; std::map<StorePath, PathWithInfo *> infosMap; StorePathSet storePathsToAdd; for (auto & thingToAdd : pathsToCopy) { infosMap.insert_or_assign(thingToAdd.first.path, &thingToAdd); storePathsToAdd.insert(thingToAdd.first.path); } auto showProgress = [&]() { act.progress(nrDone, pathsToCopy.size(), nrRunning, nrFailed); }; ThreadPool pool; processGraph<StorePath>(pool, storePathsToAdd, [&](const StorePath & path) { auto & [info, _] = *infosMap.at(path); if (isValidPath(info.path)) { nrDone++; showProgress(); return StorePathSet(); } bytesExpected += info.narSize; act.setExpected(actCopyPath, bytesExpected); return info.references; }, [&](const StorePath & path) { checkInterrupt(); auto & [info_, source_] = *infosMap.at(path); auto info = info_; info.ultimate = false; /* Make sure that the Source object is destroyed when we're done. In particular, a SinkToSource object must be destroyed to ensure that the destructors on its stack frame are run; this includes LegacySSHStore::narFromPath()'s connection lock. */ auto source = std::move(source_); if (!isValidPath(info.path)) { MaintainCount<decltype(nrRunning)> mc(nrRunning); showProgress(); try { addToStore(info, *source, repair, checkSigs); } catch (Error & e) { nrFailed++; if (!settings.keepGoing) throw e; printMsg(lvlError, "could not copy %s: %s", printStorePath(path), e.what()); showProgress(); return; } } nrDone++; showProgress(); }); } void Store::addMultipleToStore( Source & source, RepairFlag repair, CheckSigsFlag checkSigs) { auto expected = readNum<uint64_t>(source); for (uint64_t i = 0; i < expected; ++i) { // FIXME we should not be using the worker protocol here, let // alone the worker protocol with a hard-coded version! auto info = WorkerProto::Serialise<ValidPathInfo>::read(*this, WorkerProto::ReadConn { .from = source, .version = 16, }); info.ultimate = false; addToStore(info, source, repair, checkSigs); } } /* The aim of this function is to compute in one pass the correct ValidPathInfo for the files that we are trying to add to the store. To accomplish that in one pass, given the different kind of inputs that we can take (normal nar archives, nar archives with non SHA-256 hashes, and flat files), we set up a net of sinks and aliases. Also, since the dataflow is obfuscated by this, we include here a graphviz diagram: digraph graphname { node [shape=box] fileSource -> narSink narSink [style=dashed] narSink -> unsualHashTee [style = dashed, label = "Recursive && !SHA-256"] narSink -> narHashSink [style = dashed, label = "else"] unsualHashTee -> narHashSink unsualHashTee -> caHashSink fileSource -> parseSink parseSink [style=dashed] parseSink-> fileSink [style = dashed, label = "Flat"] parseSink -> blank [style = dashed, label = "Recursive"] fileSink -> caHashSink } */ ValidPathInfo Store::addToStoreSlow( std::string_view name, const SourcePath & srcPath, ContentAddressMethod method, HashAlgorithm hashAlgo, const StorePathSet & references, std::optional<Hash> expectedCAHash) { HashSink narHashSink { HashAlgorithm::SHA256 }; HashSink caHashSink { hashAlgo }; /* Note that fileSink and unusualHashTee must be mutually exclusive, since they both write to caHashSink. Note that that requisite is currently true because the former is only used in the flat case. */ RegularFileSink fileSink { caHashSink }; TeeSink unusualHashTee { narHashSink, caHashSink }; auto & narSink = method == ContentAddressMethod::Raw::NixArchive && hashAlgo != HashAlgorithm::SHA256 ? static_cast<Sink &>(unusualHashTee) : narHashSink; /* Functionally, this means that fileSource will yield the content of srcPath. The fact that we use scratchpadSink as a temporary buffer here is an implementation detail. */ auto fileSource = sinkToSource([&](Sink & scratchpadSink) { srcPath.dumpPath(scratchpadSink); }); /* tapped provides the same data as fileSource, but we also write all the information to narSink. */ TeeSource tapped { *fileSource, narSink }; NullFileSystemObjectSink blank; auto & parseSink = method.getFileIngestionMethod() == FileIngestionMethod::Flat ? (FileSystemObjectSink &) fileSink : (FileSystemObjectSink &) blank; // for recursive or git we do recursive /* The information that flows from tapped (besides being replicated in narSink), is now put in parseSink. */ parseDump(parseSink, tapped); /* We extract the result of the computation from the sink by calling finish. */ auto [narHash, narSize] = narHashSink.finish(); auto hash = method == ContentAddressMethod::Raw::NixArchive && hashAlgo == HashAlgorithm::SHA256 ? narHash : method == ContentAddressMethod::Raw::Git ? git::dumpHash(hashAlgo, srcPath).hash : caHashSink.finish().first; if (expectedCAHash && expectedCAHash != hash) throw Error("hash mismatch for '%s'", srcPath); ValidPathInfo info { *this, name, ContentAddressWithReferences::fromParts( method, hash, { .others = references, .self = false, }), narHash, }; info.narSize = narSize; if (!isValidPath(info.path)) { auto source = sinkToSource([&](Sink & scratchpadSink) { srcPath.dumpPath(scratchpadSink); }); addToStore(info, *source); } return info; } StringSet StoreConfig::getDefaultSystemFeatures() { auto res = settings.systemFeatures.get(); if (experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) res.insert("ca-derivations"); if (experimentalFeatureSettings.isEnabled(Xp::RecursiveNix)) res.insert("recursive-nix"); return res; } Store::Store(const Params & params) : StoreConfig(params) , state({(size_t) pathInfoCacheSize}) { assertLibStoreInitialized(); } std::string Store::getUri() { return ""; } bool Store::PathInfoCacheValue::isKnownNow() { std::chrono::duration ttl = didExist() ? std::chrono::seconds(settings.ttlPositiveNarInfoCache) : std::chrono::seconds(settings.ttlNegativeNarInfoCache); return std::chrono::steady_clock::now() < time_point + ttl; } std::map<std::string, std::optional<StorePath>> Store::queryStaticPartialDerivationOutputMap(const StorePath & path) { std::map<std::string, std::optional<StorePath>> outputs; auto drv = readInvalidDerivation(path); for (auto & [outputName, output] : drv.outputsAndOptPaths(*this)) { outputs.emplace(outputName, output.second); } return outputs; } std::map<std::string, std::optional<StorePath>> Store::queryPartialDerivationOutputMap( const StorePath & path, Store * evalStore_) { auto & evalStore = evalStore_ ? *evalStore_ : *this; auto outputs = evalStore.queryStaticPartialDerivationOutputMap(path); if (!experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) return outputs; auto drv = evalStore.readInvalidDerivation(path); auto drvHashes = staticOutputHashes(*this, drv); for (auto & [outputName, hash] : drvHashes) { auto realisation = queryRealisation(DrvOutput{hash, outputName}); if (realisation) { outputs.insert_or_assign(outputName, realisation->outPath); } else { // queryStaticPartialDerivationOutputMap is not guaranteed // to return std::nullopt for outputs which are not // statically known. outputs.insert({outputName, std::nullopt}); } } return outputs; } OutputPathMap Store::queryDerivationOutputMap(const StorePath & path, Store * evalStore) { auto resp = queryPartialDerivationOutputMap(path, evalStore); OutputPathMap result; for (auto & [outName, optOutPath] : resp) { if (!optOutPath) throw MissingRealisation(printStorePath(path), outName); result.insert_or_assign(outName, *optOutPath); } return result; } StorePathSet Store::queryDerivationOutputs(const StorePath & path) { auto outputMap = this->queryDerivationOutputMap(path); StorePathSet outputPaths; for (auto & i: outputMap) { outputPaths.emplace(std::move(i.second)); } return outputPaths; } void Store::querySubstitutablePathInfos(const StorePathCAMap & paths, SubstitutablePathInfos & infos) { if (!settings.useSubstitutes) return; for (auto & sub : getDefaultSubstituters()) { for (auto & path : paths) { if (infos.count(path.first)) // Choose first succeeding substituter. continue; auto subPath(path.first); // Recompute store path so that we can use a different store root. if (path.second) { subPath = makeFixedOutputPathFromCA( path.first.name(), ContentAddressWithReferences::withoutRefs(*path.second)); if (sub->storeDir == storeDir) assert(subPath == path.first); if (subPath != path.first) debug("replaced path '%s' with '%s' for substituter '%s'", printStorePath(path.first), sub->printStorePath(subPath), sub->getUri()); } else if (sub->storeDir != storeDir) continue; debug("checking substituter '%s' for path '%s'", sub->getUri(), sub->printStorePath(subPath)); try { auto info = sub->queryPathInfo(subPath); if (sub->storeDir != storeDir && !(info->isContentAddressed(*sub) && info->references.empty())) continue; auto narInfo = std::dynamic_pointer_cast<const NarInfo>( std::shared_ptr<const ValidPathInfo>(info)); infos.insert_or_assign(path.first, SubstitutablePathInfo{ .deriver = info->deriver, .references = info->references, .downloadSize = narInfo ? narInfo->fileSize : 0, .narSize = info->narSize, }); } catch (InvalidPath &) { } catch (SubstituterDisabled &) { } catch (Error & e) { if (settings.tryFallback) logError(e.info()); else throw; } } } } bool Store::isValidPath(const StorePath & storePath) { { auto state_(state.lock()); auto res = state_->pathInfoCache.get(std::string(storePath.to_string())); if (res && res->isKnownNow()) { stats.narInfoReadAverted++; return res->didExist(); } } if (diskCache) { auto res = diskCache->lookupNarInfo(getUri(), std::string(storePath.hashPart())); if (res.first != NarInfoDiskCache::oUnknown) { stats.narInfoReadAverted++; auto state_(state.lock()); state_->pathInfoCache.upsert(std::string(storePath.to_string()), res.first == NarInfoDiskCache::oInvalid ? PathInfoCacheValue{} : PathInfoCacheValue { .value = res.second }); return res.first == NarInfoDiskCache::oValid; } } bool valid = isValidPathUncached(storePath); if (diskCache && !valid) // FIXME: handle valid = true case. diskCache->upsertNarInfo(getUri(), std::string(storePath.hashPart()), 0); return valid; } /* Default implementation for stores that only implement queryPathInfoUncached(). */ bool Store::isValidPathUncached(const StorePath & path) { try { queryPathInfo(path); return true; } catch (InvalidPath &) { return false; } } ref<const ValidPathInfo> Store::queryPathInfo(const StorePath & storePath) { std::promise<ref<const ValidPathInfo>> promise; queryPathInfo(storePath, {[&](std::future<ref<const ValidPathInfo>> result) { try { promise.set_value(result.get()); } catch (...) { promise.set_exception(std::current_exception()); } }}); return promise.get_future().get(); } static bool goodStorePath(const StorePath & expected, const StorePath & actual) { return expected.hashPart() == actual.hashPart() && (expected.name() == Store::MissingName || expected.name() == actual.name()); } std::optional<std::shared_ptr<const ValidPathInfo>> Store::queryPathInfoFromClientCache(const StorePath & storePath) { auto hashPart = std::string(storePath.hashPart()); { auto res = state.lock()->pathInfoCache.get(std::string(storePath.to_string())); if (res && res->isKnownNow()) { stats.narInfoReadAverted++; if (res->didExist()) return std::make_optional(res->value); else return std::make_optional(nullptr); } } if (diskCache) { auto res = diskCache->lookupNarInfo(getUri(), hashPart); if (res.first != NarInfoDiskCache::oUnknown) { stats.narInfoReadAverted++; { auto state_(state.lock()); state_->pathInfoCache.upsert(std::string(storePath.to_string()), res.first == NarInfoDiskCache::oInvalid ? PathInfoCacheValue{} : PathInfoCacheValue{ .value = res.second }); if (res.first == NarInfoDiskCache::oInvalid || !goodStorePath(storePath, res.second->path)) return std::make_optional(nullptr); } assert(res.second); return std::make_optional(res.second); } } return std::nullopt; } void Store::queryPathInfo(const StorePath & storePath, Callback<ref<const ValidPathInfo>> callback) noexcept { auto hashPart = std::string(storePath.hashPart()); try { auto r = queryPathInfoFromClientCache(storePath); if (r.has_value()) { std::shared_ptr<const ValidPathInfo> & info = *r; if (info) return callback(ref(info)); else throw InvalidPath("path '%s' is not valid", printStorePath(storePath)); } } catch (...) { return callback.rethrow(); } auto callbackPtr = std::make_shared<decltype(callback)>(std::move(callback)); queryPathInfoUncached(storePath, {[this, storePath, hashPart, callbackPtr](std::future<std::shared_ptr<const ValidPathInfo>> fut) { try { auto info = fut.get(); if (diskCache) diskCache->upsertNarInfo(getUri(), hashPart, info); { auto state_(state.lock()); state_->pathInfoCache.upsert(std::string(storePath.to_string()), PathInfoCacheValue { .value = info }); } if (!info || !goodStorePath(storePath, info->path)) { stats.narInfoMissing++; throw InvalidPath("path '%s' is not valid", printStorePath(storePath)); } (*callbackPtr)(ref<const ValidPathInfo>(info)); } catch (...) { callbackPtr->rethrow(); } }}); } void Store::queryRealisation(const DrvOutput & id, Callback<std::shared_ptr<const Realisation>> callback) noexcept { try { if (diskCache) { auto [cacheOutcome, maybeCachedRealisation] = diskCache->lookupRealisation(getUri(), id); switch (cacheOutcome) { case NarInfoDiskCache::oValid: debug("Returning a cached realisation for %s", id.to_string()); callback(maybeCachedRealisation); return; case NarInfoDiskCache::oInvalid: debug( "Returning a cached missing realisation for %s", id.to_string()); callback(nullptr); return; case NarInfoDiskCache::oUnknown: break; } } } catch (...) { return callback.rethrow(); } auto callbackPtr = std::make_shared<decltype(callback)>(std::move(callback)); queryRealisationUncached( id, { [this, id, callbackPtr]( std::future<std::shared_ptr<const Realisation>> fut) { try { auto info = fut.get(); if (diskCache) { if (info) diskCache->upsertRealisation(getUri(), *info); else diskCache->upsertAbsentRealisation(getUri(), id); } (*callbackPtr)(std::shared_ptr<const Realisation>(info)); } catch (...) { callbackPtr->rethrow(); } } }); } std::shared_ptr<const Realisation> Store::queryRealisation(const DrvOutput & id) { using RealPtr = std::shared_ptr<const Realisation>; std::promise<RealPtr> promise; queryRealisation(id, {[&](std::future<RealPtr> result) { try { promise.set_value(result.get()); } catch (...) { promise.set_exception(std::current_exception()); } }}); return promise.get_future().get(); } void Store::substitutePaths(const StorePathSet & paths) { std::vector<DerivedPath> paths2; for (auto & path : paths) if (!path.isDerivation()) paths2.emplace_back(DerivedPath::Opaque{path}); uint64_t downloadSize, narSize; StorePathSet willBuild, willSubstitute, unknown; queryMissing(paths2, willBuild, willSubstitute, unknown, downloadSize, narSize); if (!willSubstitute.empty()) try { std::vector<DerivedPath> subs; for (auto & p : willSubstitute) subs.emplace_back(DerivedPath::Opaque{p}); buildPaths(subs); } catch (Error & e) { logWarning(e.info()); } } StorePathSet Store::queryValidPaths(const StorePathSet & paths, SubstituteFlag maybeSubstitute) { struct State { size_t left; StorePathSet valid; std::exception_ptr exc; }; Sync<State> state_(State{paths.size(), StorePathSet()}); std::condition_variable wakeup; ThreadPool pool; auto doQuery = [&](const StorePath & path) { checkInterrupt(); queryPathInfo(path, {[path, &state_, &wakeup](std::future<ref<const ValidPathInfo>> fut) { bool exists = false; std::exception_ptr newExc{}; try { auto info = fut.get(); exists = true; } catch (InvalidPath &) { } catch (...) { newExc = std::current_exception(); } auto state(state_.lock()); if (exists) state->valid.insert(path); if (newExc) state->exc = newExc; assert(state->left); if (!--state->left) wakeup.notify_one(); }}); }; for (auto & path : paths) pool.enqueue(std::bind(doQuery, path)); pool.process(); while (true) { auto state(state_.lock()); if (!state->left) { if (state->exc) std::rethrow_exception(state->exc); return std::move(state->valid); } state.wait(wakeup); } } /* Return a string accepted by decodeValidPathInfo() that registers the specified paths as valid. Note: it's the responsibility of the caller to provide a closure. */ std::string Store::makeValidityRegistration(const StorePathSet & paths, bool showDerivers, bool showHash) { std::string s = ""; for (auto & i : paths) { s += printStorePath(i) + "\n"; auto info = queryPathInfo(i); if (showHash) { s += info->narHash.to_string(HashFormat::Base16, false) + "\n"; s += fmt("%1%\n", info->narSize); } auto deriver = showDerivers && info->deriver ? printStorePath(*info->deriver) : ""; s += deriver + "\n"; s += fmt("%1%\n", info->references.size()); for (auto & j : info->references) s += printStorePath(j) + "\n"; } return s; } StorePathSet Store::exportReferences(const StorePathSet & storePaths, const StorePathSet & inputPaths) { StorePathSet paths; for (auto & storePath : storePaths) { if (!inputPaths.count(storePath)) throw BuildError("cannot export references of path '%s' because it is not in the input closure of the derivation", printStorePath(storePath)); computeFSClosure({storePath}, paths); } /* If there are derivations in the graph, then include their outputs as well. This is useful if you want to do things like passing all build-time dependencies of some path to a derivation that builds a NixOS DVD image. */ auto paths2 = paths; for (auto & j : paths2) { if (j.isDerivation()) { Derivation drv = derivationFromPath(j); for (auto & k : drv.outputsAndOptPaths(*this)) { if (!k.second.second) /* FIXME: I am confused why we are calling `computeFSClosure` on the output path, rather than derivation itself. That doesn't seem right to me, so I won't try to implemented this for CA derivations. */ throw UnimplementedError("exportReferences on CA derivations is not yet implemented"); computeFSClosure(*k.second.second, paths); } } } return paths; } const Store::Stats & Store::getStats() { { auto state_(state.readLock()); stats.pathInfoCacheSize = state_->pathInfoCache.size(); } return stats; } static std::string makeCopyPathMessage( std::string_view srcUri, std::string_view dstUri, std::string_view storePath) { return srcUri == "local" || srcUri == "daemon" ? fmt("copying path '%s' to '%s'", storePath, dstUri) : dstUri == "local" || dstUri == "daemon" ? fmt("copying path '%s' from '%s'", storePath, srcUri) : fmt("copying path '%s' from '%s' to '%s'", storePath, srcUri, dstUri); } void copyStorePath( Store & srcStore, Store & dstStore, const StorePath & storePath, RepairFlag repair, CheckSigsFlag checkSigs) { /* Bail out early (before starting a download from srcStore) if dstStore already has this path. */ if (!repair && dstStore.isValidPath(storePath)) return; auto srcUri = srcStore.getUri(); auto dstUri = dstStore.getUri(); auto storePathS = srcStore.printStorePath(storePath); Activity act(*logger, lvlInfo, actCopyPath, makeCopyPathMessage(srcUri, dstUri, storePathS), {storePathS, srcUri, dstUri}); PushActivity pact(act.id); auto info = srcStore.queryPathInfo(storePath); uint64_t total = 0; // recompute store path on the chance dstStore does it differently if (info->ca && info->references.empty()) { auto info2 = make_ref<ValidPathInfo>(*info); info2->path = dstStore.makeFixedOutputPathFromCA( info->path.name(), info->contentAddressWithReferences().value()); if (dstStore.storeDir == srcStore.storeDir) assert(info->path == info2->path); info = info2; } if (info->ultimate) { auto info2 = make_ref<ValidPathInfo>(*info); info2->ultimate = false; info = info2; } auto source = sinkToSource([&](Sink & sink) { LambdaSink progressSink([&](std::string_view data) { total += data.size(); act.progress(total, info->narSize); }); TeeSink tee { sink, progressSink }; srcStore.narFromPath(storePath, tee); }, [&]() { throw EndOfFile("NAR for '%s' fetched from '%s' is incomplete", srcStore.printStorePath(storePath), srcStore.getUri()); }); dstStore.addToStore(*info, *source, repair, checkSigs); } std::map<StorePath, StorePath> copyPaths( Store & srcStore, Store & dstStore, const RealisedPath::Set & paths, RepairFlag repair, CheckSigsFlag checkSigs, SubstituteFlag substitute) { StorePathSet storePaths; std::set<Realisation> toplevelRealisations; for (auto & path : paths) { storePaths.insert(path.path()); if (auto realisation = std::get_if<Realisation>(&path.raw)) { experimentalFeatureSettings.require(Xp::CaDerivations); toplevelRealisations.insert(*realisation); } } auto pathsMap = copyPaths(srcStore, dstStore, storePaths, repair, checkSigs, substitute); ThreadPool pool; try { // Copy the realisation closure processGraph<Realisation>( pool, Realisation::closure(srcStore, toplevelRealisations), [&](const Realisation & current) -> std::set<Realisation> { std::set<Realisation> children; for (const auto & [drvOutput, _] : current.dependentRealisations) { auto currentChild = srcStore.queryRealisation(drvOutput); if (!currentChild) throw Error( "incomplete realisation closure: '%s' is a " "dependency of '%s' but isn't registered", drvOutput.to_string(), current.id.to_string()); children.insert(*currentChild); } return children; }, [&](const Realisation& current) -> void { dstStore.registerDrvOutput(current, checkSigs); }); } catch (MissingExperimentalFeature & e) { // Don't fail if the remote doesn't support CA derivations is it might // not be within our control to change that, and we might still want // to at least copy the output paths. if (e.missingFeature == Xp::CaDerivations) ignoreExceptionExceptInterrupt(); else throw; } return pathsMap; } std::map<StorePath, StorePath> copyPaths( Store & srcStore, Store & dstStore, const StorePathSet & storePaths, RepairFlag repair, CheckSigsFlag checkSigs, SubstituteFlag substitute) { auto valid = dstStore.queryValidPaths(storePaths, substitute); StorePathSet missing; for (auto & path : storePaths) if (!valid.count(path)) missing.insert(path); Activity act(*logger, lvlInfo, actCopyPaths, fmt("copying %d paths", missing.size())); // In the general case, `addMultipleToStore` requires a sorted list of // store paths to add, so sort them right now auto sortedMissing = srcStore.topoSortPaths(missing); std::reverse(sortedMissing.begin(), sortedMissing.end()); std::map<StorePath, StorePath> pathsMap; for (auto & path : storePaths) pathsMap.insert_or_assign(path, path); Store::PathsSource pathsToCopy; auto computeStorePathForDst = [&](const ValidPathInfo & currentPathInfo) -> StorePath { auto storePathForSrc = currentPathInfo.path; auto storePathForDst = storePathForSrc; if (currentPathInfo.ca && currentPathInfo.references.empty()) { storePathForDst = dstStore.makeFixedOutputPathFromCA( currentPathInfo.path.name(), currentPathInfo.contentAddressWithReferences().value()); if (dstStore.storeDir == srcStore.storeDir) assert(storePathForDst == storePathForSrc); if (storePathForDst != storePathForSrc) debug("replaced path '%s' to '%s' for substituter '%s'", srcStore.printStorePath(storePathForSrc), dstStore.printStorePath(storePathForDst), dstStore.getUri()); } return storePathForDst; }; // total is accessed by each copy, which are each handled in separate threads std::atomic<uint64_t> total = 0; for (auto & missingPath : sortedMissing) { auto info = srcStore.queryPathInfo(missingPath); auto storePathForDst = computeStorePathForDst(*info); pathsMap.insert_or_assign(missingPath, storePathForDst); ValidPathInfo infoForDst = *info; infoForDst.path = storePathForDst; auto source = sinkToSource([&](Sink & sink) { // We can reasonably assume that the copy will happen whenever we // read the path, so log something about that at that point auto srcUri = srcStore.getUri(); auto dstUri = dstStore.getUri(); auto storePathS = srcStore.printStorePath(missingPath); Activity act(*logger, lvlInfo, actCopyPath, makeCopyPathMessage(srcUri, dstUri, storePathS), {storePathS, srcUri, dstUri}); PushActivity pact(act.id); LambdaSink progressSink([&](std::string_view data) { total += data.size(); act.progress(total, info->narSize); }); TeeSink tee { sink, progressSink }; srcStore.narFromPath(missingPath, tee); }); pathsToCopy.push_back(std::pair{infoForDst, std::move(source)}); } dstStore.addMultipleToStore(pathsToCopy, act, repair, checkSigs); return pathsMap; } void copyClosure( Store & srcStore, Store & dstStore, const RealisedPath::Set & paths, RepairFlag repair, CheckSigsFlag checkSigs, SubstituteFlag substitute) { if (&srcStore == &dstStore) return; RealisedPath::Set closure; RealisedPath::closure(srcStore, paths, closure); copyPaths(srcStore, dstStore, closure, repair, checkSigs, substitute); } void copyClosure( Store & srcStore, Store & dstStore, const StorePathSet & storePaths, RepairFlag repair, CheckSigsFlag checkSigs, SubstituteFlag substitute) { if (&srcStore == &dstStore) return; StorePathSet closure; srcStore.computeFSClosure(storePaths, closure); copyPaths(srcStore, dstStore, closure, repair, checkSigs, substitute); } std::optional<ValidPathInfo> decodeValidPathInfo(const Store & store, std::istream & str, std::optional<HashResult> hashGiven) { std::string path; getline(str, path); if (str.eof()) { return {}; } if (!hashGiven) { std::string s; getline(str, s); auto narHash = Hash::parseAny(s, HashAlgorithm::SHA256); getline(str, s); auto narSize = string2Int<uint64_t>(s); if (!narSize) throw Error("number expected"); hashGiven = { narHash, *narSize }; } ValidPathInfo info(store.parseStorePath(path), hashGiven->first); info.narSize = hashGiven->second; std::string deriver; getline(str, deriver); if (deriver != "") info.deriver = store.parseStorePath(deriver); std::string s; getline(str, s); auto n = string2Int<int>(s); if (!n) throw Error("number expected"); while ((*n)--) { getline(str, s); info.references.insert(store.parseStorePath(s)); } if (!str || str.eof()) throw Error("missing input"); return std::optional<ValidPathInfo>(std::move(info)); } std::string StoreDirConfig::showPaths(const StorePathSet & paths) { std::string s; for (auto & i : paths) { if (s.size() != 0) s += ", "; s += "'" + printStorePath(i) + "'"; } return s; } std::string showPaths(const PathSet & paths) { return concatStringsSep(", ", quoteStrings(paths)); } Derivation Store::derivationFromPath(const StorePath & drvPath) { ensurePath(drvPath); return readDerivation(drvPath); } static Derivation readDerivationCommon(Store & store, const StorePath & drvPath, bool requireValidPath) { auto accessor = store.getFSAccessor(requireValidPath); try { return parseDerivation(store, accessor->readFile(CanonPath(store.printStorePath(drvPath))), Derivation::nameFromPath(drvPath)); } catch (FormatError & e) { throw Error("error parsing derivation '%s': %s", store.printStorePath(drvPath), e.msg()); } } std::optional<StorePath> Store::getBuildDerivationPath(const StorePath & path) { if (!path.isDerivation()) { try { auto info = queryPathInfo(path); if (!info->deriver) return std::nullopt; return *info->deriver; } catch (InvalidPath &) { return std::nullopt; } } if (!experimentalFeatureSettings.isEnabled(Xp::CaDerivations) || !isValidPath(path)) return path; auto drv = readDerivation(path); if (!drv.type().hasKnownOutputPaths()) { // The build log is actually attached to the corresponding // resolved derivation, so we need to get it first auto resolvedDrv = drv.tryResolve(*this); if (resolvedDrv) return writeDerivation(*this, *resolvedDrv, NoRepair, true); } return path; } Derivation Store::readDerivation(const StorePath & drvPath) { return readDerivationCommon(*this, drvPath, true); } Derivation Store::readInvalidDerivation(const StorePath & drvPath) { return readDerivationCommon(*this, drvPath, false); } } #include "local-store.hh" #include "uds-remote-store.hh" namespace nix { ref<Store> openStore(const std::string & uri, const Store::Params & extraParams) { return openStore(StoreReference::parse(uri, extraParams)); } ref<Store> openStore(StoreReference && storeURI) { auto & params = storeURI.params; auto store = std::visit(overloaded { [&](const StoreReference::Auto &) -> std::shared_ptr<Store> { auto stateDir = getOr(params, "state", settings.nixStateDir); if (access(stateDir.c_str(), R_OK | W_OK) == 0) return std::make_shared<LocalStore>(params); else if (pathExists(settings.nixDaemonSocketFile)) return std::make_shared<UDSRemoteStore>(params); #if __linux__ else if (!pathExists(stateDir) && params.empty() && !isRootUser() && !getEnv("NIX_STORE_DIR").has_value() && !getEnv("NIX_STATE_DIR").has_value()) { /* If /nix doesn't exist, there is no daemon socket, and we're not root, then automatically set up a chroot store in ~/.local/share/nix/root. */ auto chrootStore = getDataDir() + "/root"; if (!pathExists(chrootStore)) { try { createDirs(chrootStore); } catch (SystemError & e) { return std::make_shared<LocalStore>(params); } warn("'%s' does not exist, so Nix will use '%s' as a chroot store", stateDir, chrootStore); } else debug("'%s' does not exist, so Nix will use '%s' as a chroot store", stateDir, chrootStore); return std::make_shared<LocalStore>("local", chrootStore, params); } #endif else return std::make_shared<LocalStore>(params); }, [&](const StoreReference::Specified & g) { for (auto implem : *Implementations::registered) if (implem.uriSchemes.count(g.scheme)) return implem.create(g.scheme, g.authority, params); throw Error("don't know how to open Nix store with scheme '%s'", g.scheme); }, }, storeURI.variant); experimentalFeatureSettings.require(store->experimentalFeature()); store->warnUnknownSettings(); store->init(); return ref<Store> { store }; } std::list<ref<Store>> getDefaultSubstituters() { static auto stores([]() { std::list<ref<Store>> stores; StringSet done; auto addStore = [&](const std::string & uri) { if (!done.insert(uri).second) return; try { stores.push_back(openStore(uri)); } catch (Error & e) { logWarning(e.info()); } }; for (auto uri : settings.substituters.get()) addStore(uri); stores.sort([](ref<Store> & a, ref<Store> & b) { return a->priority < b->priority; }); return stores; } ()); return stores; } std::vector<StoreFactory> * Implementations::registered = 0; }
44,908
C++
.cc
1,149
30.662315
207
0.619983
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,806
nar-info-disk-cache.cc
NixOS_nix/src/libstore/nar-info-disk-cache.cc
#include "nar-info-disk-cache.hh" #include "users.hh" #include "sync.hh" #include "sqlite.hh" #include "globals.hh" #include <sqlite3.h> #include <nlohmann/json.hpp> #include "strings.hh" namespace nix { static const char * schema = R"sql( create table if not exists BinaryCaches ( id integer primary key autoincrement not null, url text unique not null, timestamp integer not null, storeDir text not null, wantMassQuery integer not null, priority integer not null ); create table if not exists NARs ( cache integer not null, hashPart text not null, namePart text, url text, compression text, fileHash text, fileSize integer, narHash text, narSize integer, refs text, deriver text, sigs text, ca text, timestamp integer not null, present integer not null, primary key (cache, hashPart), foreign key (cache) references BinaryCaches(id) on delete cascade ); create table if not exists Realisations ( cache integer not null, outputId text not null, content blob, -- Json serialisation of the realisation, or null if the realisation is absent timestamp integer not null, primary key (cache, outputId), foreign key (cache) references BinaryCaches(id) on delete cascade ); create table if not exists LastPurge ( dummy text primary key, value integer ); )sql"; class NarInfoDiskCacheImpl : public NarInfoDiskCache { public: /* How often to purge expired entries from the cache. */ const int purgeInterval = 24 * 3600; /* How long to cache binary cache info (i.e. /nix-cache-info) */ const int cacheInfoTtl = 7 * 24 * 3600; struct Cache { int id; Path storeDir; bool wantMassQuery; int priority; }; struct State { SQLite db; SQLiteStmt insertCache, queryCache, insertNAR, insertMissingNAR, queryNAR, insertRealisation, insertMissingRealisation, queryRealisation, purgeCache; std::map<std::string, Cache> caches; }; Sync<State> _state; NarInfoDiskCacheImpl(Path dbPath = getCacheDir() + "/binary-cache-v6.sqlite") { auto state(_state.lock()); createDirs(dirOf(dbPath)); state->db = SQLite(dbPath); state->db.isCache(); state->db.exec(schema); state->insertCache.create(state->db, "insert into BinaryCaches(url, timestamp, storeDir, wantMassQuery, priority) values (?1, ?2, ?3, ?4, ?5) on conflict (url) do update set timestamp = ?2, storeDir = ?3, wantMassQuery = ?4, priority = ?5 returning id;"); state->queryCache.create(state->db, "select id, storeDir, wantMassQuery, priority from BinaryCaches where url = ? and timestamp > ?"); state->insertNAR.create(state->db, "insert or replace into NARs(cache, hashPart, namePart, url, compression, fileHash, fileSize, narHash, " "narSize, refs, deriver, sigs, ca, timestamp, present) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, 1)"); state->insertMissingNAR.create(state->db, "insert or replace into NARs(cache, hashPart, timestamp, present) values (?, ?, ?, 0)"); state->queryNAR.create(state->db, "select present, namePart, url, compression, fileHash, fileSize, narHash, narSize, refs, deriver, sigs, ca from NARs where cache = ? and hashPart = ? and ((present = 0 and timestamp > ?) or (present = 1 and timestamp > ?))"); state->insertRealisation.create(state->db, R"( insert or replace into Realisations(cache, outputId, content, timestamp) values (?, ?, ?, ?) )"); state->insertMissingRealisation.create(state->db, R"( insert or replace into Realisations(cache, outputId, timestamp) values (?, ?, ?) )"); state->queryRealisation.create(state->db, R"( select content from Realisations where cache = ? and outputId = ? and ((content is null and timestamp > ?) or (content is not null and timestamp > ?)) )"); /* Periodically purge expired entries from the database. */ retrySQLite<void>([&]() { auto now = time(0); SQLiteStmt queryLastPurge(state->db, "select value from LastPurge"); auto queryLastPurge_(queryLastPurge.use()); if (!queryLastPurge_.next() || queryLastPurge_.getInt(0) < now - purgeInterval) { SQLiteStmt(state->db, "delete from NARs where ((present = 0 and timestamp < ?) or (present = 1 and timestamp < ?))") .use() // Use a minimum TTL to prevent --refresh from // nuking the entire disk cache. (now - std::max(settings.ttlNegativeNarInfoCache.get(), 3600U)) (now - std::max(settings.ttlPositiveNarInfoCache.get(), 30 * 24 * 3600U)) .exec(); debug("deleted %d entries from the NAR info disk cache", sqlite3_changes(state->db)); SQLiteStmt(state->db, "insert or replace into LastPurge(dummy, value) values ('', ?)") .use()(now).exec(); } }); } Cache & getCache(State & state, const std::string & uri) { auto i = state.caches.find(uri); if (i == state.caches.end()) unreachable(); return i->second; } private: std::optional<Cache> queryCacheRaw(State & state, const std::string & uri) { auto i = state.caches.find(uri); if (i == state.caches.end()) { auto queryCache(state.queryCache.use()(uri)(time(0) - cacheInfoTtl)); if (!queryCache.next()) return std::nullopt; auto cache = Cache { .id = (int) queryCache.getInt(0), .storeDir = queryCache.getStr(1), .wantMassQuery = queryCache.getInt(2) != 0, .priority = (int) queryCache.getInt(3), }; state.caches.emplace(uri, cache); } return getCache(state, uri); } public: int createCache(const std::string & uri, const Path & storeDir, bool wantMassQuery, int priority) override { return retrySQLite<int>([&]() { auto state(_state.lock()); SQLiteTxn txn(state->db); // To avoid the race, we have to check if maybe someone hasn't yet created // the cache for this URI in the meantime. auto cache(queryCacheRaw(*state, uri)); if (cache) return cache->id; Cache ret { .id = -1, // set below .storeDir = storeDir, .wantMassQuery = wantMassQuery, .priority = priority, }; { auto r(state->insertCache.use()(uri)(time(0))(storeDir)(wantMassQuery)(priority)); if (!r.next()) { unreachable(); } ret.id = (int) r.getInt(0); } state->caches[uri] = ret; txn.commit(); return ret.id; }); } std::optional<CacheInfo> upToDateCacheExists(const std::string & uri) override { return retrySQLite<std::optional<CacheInfo>>([&]() -> std::optional<CacheInfo> { auto state(_state.lock()); auto cache(queryCacheRaw(*state, uri)); if (!cache) return std::nullopt; return CacheInfo { .id = cache->id, .wantMassQuery = cache->wantMassQuery, .priority = cache->priority }; }); } std::pair<Outcome, std::shared_ptr<NarInfo>> lookupNarInfo( const std::string & uri, const std::string & hashPart) override { return retrySQLite<std::pair<Outcome, std::shared_ptr<NarInfo>>>( [&]() -> std::pair<Outcome, std::shared_ptr<NarInfo>> { auto state(_state.lock()); auto & cache(getCache(*state, uri)); auto now = time(0); auto queryNAR(state->queryNAR.use() (cache.id) (hashPart) (now - settings.ttlNegativeNarInfoCache) (now - settings.ttlPositiveNarInfoCache)); if (!queryNAR.next()) return {oUnknown, 0}; if (!queryNAR.getInt(0)) return {oInvalid, 0}; auto namePart = queryNAR.getStr(1); auto narInfo = make_ref<NarInfo>( StorePath(hashPart + "-" + namePart), Hash::parseAnyPrefixed(queryNAR.getStr(6))); narInfo->url = queryNAR.getStr(2); narInfo->compression = queryNAR.getStr(3); if (!queryNAR.isNull(4)) narInfo->fileHash = Hash::parseAnyPrefixed(queryNAR.getStr(4)); narInfo->fileSize = queryNAR.getInt(5); narInfo->narSize = queryNAR.getInt(7); for (auto & r : tokenizeString<Strings>(queryNAR.getStr(8), " ")) narInfo->references.insert(StorePath(r)); if (!queryNAR.isNull(9)) narInfo->deriver = StorePath(queryNAR.getStr(9)); for (auto & sig : tokenizeString<Strings>(queryNAR.getStr(10), " ")) narInfo->sigs.insert(sig); narInfo->ca = ContentAddress::parseOpt(queryNAR.getStr(11)); return {oValid, narInfo}; }); } std::pair<Outcome, std::shared_ptr<Realisation>> lookupRealisation( const std::string & uri, const DrvOutput & id) override { return retrySQLite<std::pair<Outcome, std::shared_ptr<Realisation>>>( [&]() -> std::pair<Outcome, std::shared_ptr<Realisation>> { auto state(_state.lock()); auto & cache(getCache(*state, uri)); auto now = time(0); auto queryRealisation(state->queryRealisation.use() (cache.id) (id.to_string()) (now - settings.ttlNegativeNarInfoCache) (now - settings.ttlPositiveNarInfoCache)); if (!queryRealisation.next()) return {oUnknown, 0}; if (queryRealisation.isNull(0)) return {oInvalid, 0}; auto realisation = std::make_shared<Realisation>(Realisation::fromJSON( nlohmann::json::parse(queryRealisation.getStr(0)), "Local disk cache")); return {oValid, realisation}; }); } void upsertNarInfo( const std::string & uri, const std::string & hashPart, std::shared_ptr<const ValidPathInfo> info) override { retrySQLite<void>([&]() { auto state(_state.lock()); auto & cache(getCache(*state, uri)); if (info) { auto narInfo = std::dynamic_pointer_cast<const NarInfo>(info); //assert(hashPart == storePathToHash(info->path)); state->insertNAR.use() (cache.id) (hashPart) (std::string(info->path.name())) (narInfo ? narInfo->url : "", narInfo != 0) (narInfo ? narInfo->compression : "", narInfo != 0) (narInfo && narInfo->fileHash ? narInfo->fileHash->to_string(HashFormat::Nix32, true) : "", narInfo && narInfo->fileHash) (narInfo ? narInfo->fileSize : 0, narInfo != 0 && narInfo->fileSize) (info->narHash.to_string(HashFormat::Nix32, true)) (info->narSize) (concatStringsSep(" ", info->shortRefs())) (info->deriver ? std::string(info->deriver->to_string()) : "", (bool) info->deriver) (concatStringsSep(" ", info->sigs)) (renderContentAddress(info->ca)) (time(0)).exec(); } else { state->insertMissingNAR.use() (cache.id) (hashPart) (time(0)).exec(); } }); } void upsertRealisation( const std::string & uri, const Realisation & realisation) override { retrySQLite<void>([&]() { auto state(_state.lock()); auto & cache(getCache(*state, uri)); state->insertRealisation.use() (cache.id) (realisation.id.to_string()) (realisation.toJSON().dump()) (time(0)).exec(); }); } virtual void upsertAbsentRealisation( const std::string & uri, const DrvOutput & id) override { retrySQLite<void>([&]() { auto state(_state.lock()); auto & cache(getCache(*state, uri)); state->insertMissingRealisation.use() (cache.id) (id.to_string()) (time(0)).exec(); }); } }; ref<NarInfoDiskCache> getNarInfoDiskCache() { static ref<NarInfoDiskCache> cache = make_ref<NarInfoDiskCacheImpl>(); return cache; } ref<NarInfoDiskCache> getTestNarInfoDiskCache(Path dbPath) { return make_ref<NarInfoDiskCacheImpl>(dbPath); } }
13,664
C++
.cc
326
30.849693
237
0.551576
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,807
uds-remote-store.cc
NixOS_nix/src/libstore/uds-remote-store.cc
#include "uds-remote-store.hh" #include "unix-domain-socket.hh" #include "worker-protocol.hh" #include <sys/types.h> #include <sys/stat.h> #include <fcntl.h> #include <unistd.h> #ifdef _WIN32 # include <winsock2.h> # include <afunix.h> #else # include <sys/socket.h> # include <sys/un.h> #endif namespace nix { UDSRemoteStoreConfig::UDSRemoteStoreConfig( std::string_view scheme, std::string_view authority, const Params & params) : StoreConfig(params) , LocalFSStoreConfig(params) , RemoteStoreConfig(params) , path{authority.empty() ? settings.nixDaemonSocketFile : authority} { if (scheme != UDSRemoteStoreConfig::scheme) { throw UsageError("Scheme must be 'unix'"); } } std::string UDSRemoteStoreConfig::doc() { return #include "uds-remote-store.md" ; } // A bit gross that we now pass empty string but this is knowing that // empty string will later default to the same nixDaemonSocketFile. Why // don't we just wire it all through? I believe there are cases where it // will live reload so we want to continue to account for that. UDSRemoteStore::UDSRemoteStore(const Params & params) : UDSRemoteStore(scheme, "", params) {} UDSRemoteStore::UDSRemoteStore(std::string_view scheme, std::string_view authority, const Params & params) : StoreConfig(params) , LocalFSStoreConfig(params) , RemoteStoreConfig(params) , UDSRemoteStoreConfig(scheme, authority, params) , Store(params) , LocalFSStore(params) , RemoteStore(params) { } std::string UDSRemoteStore::getUri() { return path == settings.nixDaemonSocketFile ? // FIXME: Not clear why we return daemon here and not default // to settings.nixDaemonSocketFile // // unix:// with no path also works. Change what we return? "daemon" : std::string(scheme) + "://" + path; } void UDSRemoteStore::Connection::closeWrite() { shutdown(toSocket(fd.get()), SHUT_WR); } ref<RemoteStore::Connection> UDSRemoteStore::openConnection() { auto conn = make_ref<Connection>(); /* Connect to a daemon that does the privileged work for us. */ conn->fd = createUnixDomainSocket(); nix::connect(toSocket(conn->fd.get()), path); conn->from.fd = conn->fd.get(); conn->to.fd = conn->fd.get(); conn->startTime = std::chrono::steady_clock::now(); return conn; } void UDSRemoteStore::addIndirectRoot(const Path & path) { auto conn(getConnection()); conn->to << WorkerProto::Op::AddIndirectRoot << path; conn.processStderr(); readInt(conn->from); } static RegisterStoreImplementation<UDSRemoteStore, UDSRemoteStoreConfig> regUDSRemoteStore; }
2,703
C++
.cc
85
28.047059
106
0.710262
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,808
gc.cc
NixOS_nix/src/libstore/gc.cc
#include "derivations.hh" #include "globals.hh" #include "local-store.hh" #include "finally.hh" #include "unix-domain-socket.hh" #include "signals.hh" #if !defined(__linux__) // For shelling out to lsof # include "processes.hh" #endif #include <functional> #include <queue> #include <algorithm> #include <regex> #include <random> #include <climits> #include <errno.h> #include <fcntl.h> #include <sys/stat.h> #if HAVE_STATVFS # include <sys/statvfs.h> #endif #ifndef _WIN32 # include <poll.h> # include <sys/socket.h> # include <sys/un.h> #endif #include <sys/types.h> #include <unistd.h> namespace nix { static std::string gcSocketPath = "/gc-socket/socket"; static std::string gcRootsDir = "gcroots"; void LocalStore::addIndirectRoot(const Path & path) { std::string hash = hashString(HashAlgorithm::SHA1, path).to_string(HashFormat::Nix32, false); Path realRoot = canonPath(fmt("%1%/%2%/auto/%3%", stateDir, gcRootsDir, hash)); makeSymlink(realRoot, path); } void LocalStore::createTempRootsFile() { auto fdTempRoots(_fdTempRoots.lock()); /* Create the temporary roots file for this process. */ if (*fdTempRoots) return; while (1) { if (pathExists(fnTempRoots)) /* It *must* be stale, since there can be no two processes with the same pid. */ unlink(fnTempRoots.c_str()); *fdTempRoots = openLockFile(fnTempRoots, true); debug("acquiring write lock on '%s'", fnTempRoots); lockFile(fdTempRoots->get(), ltWrite, true); /* Check whether the garbage collector didn't get in our way. */ struct stat st; if (fstat(fromDescriptorReadOnly(fdTempRoots->get()), &st) == -1) throw SysError("statting '%1%'", fnTempRoots); if (st.st_size == 0) break; /* The garbage collector deleted this file before we could get a lock. (It won't delete the file after we get a lock.) Try again. */ } } void LocalStore::addTempRoot(const StorePath & path) { if (readOnly) { debug("Read-only store doesn't support creating lock files for temp roots, but nothing can be deleted anyways."); return; } createTempRootsFile(); /* Open/create the global GC lock file. */ { auto fdGCLock(_fdGCLock.lock()); if (!*fdGCLock) *fdGCLock = openGCLock(); } restart: /* Try to acquire a shared global GC lock (non-blocking). This only succeeds if the garbage collector is not currently running. */ FdLock gcLock(_fdGCLock.lock()->get(), ltRead, false, ""); if (!gcLock.acquired) { /* We couldn't get a shared global GC lock, so the garbage collector is running. So we have to connect to the garbage collector and inform it about our root. */ auto fdRootsSocket(_fdRootsSocket.lock()); if (!*fdRootsSocket) { auto socketPath = stateDir.get() + gcSocketPath; debug("connecting to '%s'", socketPath); *fdRootsSocket = createUnixDomainSocket(); try { nix::connect(toSocket(fdRootsSocket->get()), socketPath); } catch (SysError & e) { /* The garbage collector may have exited or not created the socket yet, so we need to restart. */ if (e.errNo == ECONNREFUSED || e.errNo == ENOENT) { debug("GC socket connection refused: %s", e.msg()); fdRootsSocket->close(); std::this_thread::sleep_for(std::chrono::milliseconds(100)); goto restart; } throw; } } try { debug("sending GC root '%s'", printStorePath(path)); writeFull(fdRootsSocket->get(), printStorePath(path) + "\n", false); char c; readFull(fdRootsSocket->get(), &c, 1); assert(c == '1'); debug("got ack for GC root '%s'", printStorePath(path)); } catch (SysError & e) { /* The garbage collector may have exited, so we need to restart. */ if (e.errNo == EPIPE || e.errNo == ECONNRESET) { debug("GC socket disconnected"); fdRootsSocket->close(); goto restart; } throw; } catch (EndOfFile & e) { debug("GC socket disconnected"); fdRootsSocket->close(); goto restart; } } /* Record the store path in the temporary roots file so it will be seen by a future run of the garbage collector. */ auto s = printStorePath(path) + '\0'; writeFull(_fdTempRoots.lock()->get(), s); } static std::string censored = "{censored}"; void LocalStore::findTempRoots(Roots & tempRoots, bool censor) { /* Read the `temproots' directory for per-process temporary root files. */ for (auto & i : std::filesystem::directory_iterator{tempRootsDir}) { checkInterrupt(); auto name = i.path().filename().string(); if (name[0] == '.') { // Ignore hidden files. Some package managers (notably portage) create // those to keep the directory alive. continue; } Path path = i.path().string(); pid_t pid = std::stoi(name); debug("reading temporary root file '%1%'", path); AutoCloseFD fd(toDescriptor(open(path.c_str(), #ifndef _WIN32 O_CLOEXEC | #endif O_RDWR, 0666))); if (!fd) { /* It's okay if the file has disappeared. */ if (errno == ENOENT) continue; throw SysError("opening temporary roots file '%1%'", path); } /* Try to acquire a write lock without blocking. This can only succeed if the owning process has died. In that case we don't care about its temporary roots. */ if (lockFile(fd.get(), ltWrite, false)) { printInfo("removing stale temporary roots file '%1%'", path); unlink(path.c_str()); writeFull(fd.get(), "d"); continue; } /* Read the entire file. */ auto contents = readFile(fd.get()); /* Extract the roots. */ std::string::size_type pos = 0, end; while ((end = contents.find((char) 0, pos)) != std::string::npos) { Path root(contents, pos, end - pos); debug("got temporary root '%s'", root); tempRoots[parseStorePath(root)].emplace(censor ? censored : fmt("{temp:%d}", pid)); pos = end + 1; } } } void LocalStore::findRoots(const Path & path, std::filesystem::file_type type, Roots & roots) { auto foundRoot = [&](const Path & path, const Path & target) { try { auto storePath = toStorePath(target).first; if (isValidPath(storePath)) roots[std::move(storePath)].emplace(path); else printInfo("skipping invalid root from '%1%' to '%2%'", path, target); } catch (BadStorePath &) { } }; try { if (type == std::filesystem::file_type::unknown) type = std::filesystem::symlink_status(path).type(); if (type == std::filesystem::file_type::directory) { for (auto & i : std::filesystem::directory_iterator{path}) { checkInterrupt(); findRoots(i.path().string(), i.symlink_status().type(), roots); } } else if (type == std::filesystem::file_type::symlink) { Path target = readLink(path); if (isInStore(target)) foundRoot(path, target); /* Handle indirect roots. */ else { target = absPath(target, dirOf(path)); if (!pathExists(target)) { if (isInDir(path, stateDir + "/" + gcRootsDir + "/auto")) { printInfo("removing stale link from '%1%' to '%2%'", path, target); unlink(path.c_str()); } } else { if (!std::filesystem::is_symlink(target)) return; Path target2 = readLink(target); if (isInStore(target2)) foundRoot(target, target2); } } } else if (type == std::filesystem::file_type::regular) { auto storePath = maybeParseStorePath(storeDir + "/" + std::string(baseNameOf(path))); if (storePath && isValidPath(*storePath)) roots[std::move(*storePath)].emplace(path); } } catch (std::filesystem::filesystem_error & e) { /* We only ignore permanent failures. */ if (e.code() == std::errc::permission_denied || e.code() == std::errc::no_such_file_or_directory || e.code() == std::errc::not_a_directory) printInfo("cannot read potential root '%1%'", path); else throw; } catch (SysError & e) { /* We only ignore permanent failures. */ if (e.errNo == EACCES || e.errNo == ENOENT || e.errNo == ENOTDIR) printInfo("cannot read potential root '%1%'", path); else throw; } } void LocalStore::findRootsNoTemp(Roots & roots, bool censor) { /* Process direct roots in {gcroots,profiles}. */ findRoots(stateDir + "/" + gcRootsDir, std::filesystem::file_type::unknown, roots); findRoots(stateDir + "/profiles", std::filesystem::file_type::unknown, roots); /* Add additional roots returned by different platforms-specific heuristics. This is typically used to add running programs to the set of roots (to prevent them from being garbage collected). */ findRuntimeRoots(roots, censor); } Roots LocalStore::findRoots(bool censor) { Roots roots; findRootsNoTemp(roots, censor); findTempRoots(roots, censor); return roots; } /** * Key is a mere string because cannot has path with macOS's libc++ */ typedef std::unordered_map<std::string, std::unordered_set<std::string>> UncheckedRoots; static void readProcLink(const std::filesystem::path & file, UncheckedRoots & roots) { std::filesystem::path buf; try { buf = std::filesystem::read_symlink(file); } catch (std::filesystem::filesystem_error & e) { if (e.code() == std::errc::no_such_file_or_directory || e.code() == std::errc::permission_denied || e.code() == std::errc::no_such_process) return; throw; } if (buf.is_absolute()) roots[buf.string()].emplace(file.string()); } static std::string quoteRegexChars(const std::string & raw) { static auto specialRegex = std::regex(R"([.^$\\*+?()\[\]{}|])"); return std::regex_replace(raw, specialRegex, R"(\$&)"); } #if __linux__ static void readFileRoots(const std::filesystem::path & path, UncheckedRoots & roots) { try { roots[readFile(path)].emplace(path); } catch (SysError & e) { if (e.errNo != ENOENT && e.errNo != EACCES) throw; } } #endif void LocalStore::findRuntimeRoots(Roots & roots, bool censor) { UncheckedRoots unchecked; auto procDir = AutoCloseDir{opendir("/proc")}; if (procDir) { struct dirent * ent; auto digitsRegex = std::regex(R"(^\d+$)"); auto mapRegex = std::regex(R"(^\s*\S+\s+\S+\s+\S+\s+\S+\s+\S+\s+(/\S+)\s*$)"); auto storePathRegex = std::regex(quoteRegexChars(storeDir) + R"(/[0-9a-z]+[0-9a-zA-Z\+\-\._\?=]*)"); while (errno = 0, ent = readdir(procDir.get())) { checkInterrupt(); if (std::regex_match(ent->d_name, digitsRegex)) { try { readProcLink(fmt("/proc/%s/exe" ,ent->d_name), unchecked); readProcLink(fmt("/proc/%s/cwd", ent->d_name), unchecked); auto fdStr = fmt("/proc/%s/fd", ent->d_name); auto fdDir = AutoCloseDir(opendir(fdStr.c_str())); if (!fdDir) { if (errno == ENOENT || errno == EACCES) continue; throw SysError("opening %1%", fdStr); } struct dirent * fd_ent; while (errno = 0, fd_ent = readdir(fdDir.get())) { if (fd_ent->d_name[0] != '.') readProcLink(fmt("%s/%s", fdStr, fd_ent->d_name), unchecked); } if (errno) { if (errno == ESRCH) continue; throw SysError("iterating /proc/%1%/fd", ent->d_name); } fdDir.reset(); std::filesystem::path mapFile = fmt("/proc/%s/maps", ent->d_name); auto mapLines = tokenizeString<std::vector<std::string>>(readFile(mapFile.string()), "\n"); for (const auto & line : mapLines) { auto match = std::smatch{}; if (std::regex_match(line, match, mapRegex)) unchecked[match[1]].emplace(mapFile.string()); } auto envFile = fmt("/proc/%s/environ", ent->d_name); auto envString = readFile(envFile); auto env_end = std::sregex_iterator{}; for (auto i = std::sregex_iterator{envString.begin(), envString.end(), storePathRegex}; i != env_end; ++i) unchecked[i->str()].emplace(envFile); } catch (SystemError & e) { if (errno == ENOENT || errno == EACCES || errno == ESRCH) continue; throw; } } } if (errno) throw SysError("iterating /proc"); } #if !defined(__linux__) // lsof is really slow on OS X. This actually causes the gc-concurrent.sh test to fail. // See: https://github.com/NixOS/nix/issues/3011 // Because of this we disable lsof when running the tests. if (getEnv("_NIX_TEST_NO_LSOF") != "1") { try { std::regex lsofRegex(R"(^n(/.*)$)"); auto lsofLines = tokenizeString<std::vector<std::string>>(runProgram(LSOF, true, { "-n", "-w", "-F", "n" }), "\n"); for (const auto & line : lsofLines) { std::smatch match; if (std::regex_match(line, match, lsofRegex)) unchecked[match[1].str()].emplace("{lsof}"); } } catch (ExecError & e) { /* lsof not installed, lsof failed */ } } #endif #if __linux__ readFileRoots("/proc/sys/kernel/modprobe", unchecked); readFileRoots("/proc/sys/kernel/fbsplash", unchecked); readFileRoots("/proc/sys/kernel/poweroff_cmd", unchecked); #endif for (auto & [target, links] : unchecked) { if (!isInStore(target)) continue; try { auto path = toStorePath(target).first; if (!isValidPath(path)) continue; debug("got additional root '%1%'", printStorePath(path)); if (censor) roots[path].insert(censored); else roots[path].insert(links.begin(), links.end()); } catch (BadStorePath &) { } } } struct GCLimitReached { }; void LocalStore::collectGarbage(const GCOptions & options, GCResults & results) { bool shouldDelete = options.action == GCOptions::gcDeleteDead || options.action == GCOptions::gcDeleteSpecific; bool gcKeepOutputs = settings.gcKeepOutputs; bool gcKeepDerivations = settings.gcKeepDerivations; StorePathSet roots, dead, alive; struct Shared { // The temp roots only store the hash part to make it easier to // ignore suffixes like '.lock', '.chroot' and '.check'. std::unordered_set<std::string> tempRoots; // Hash part of the store path currently being deleted, if // any. std::optional<std::string> pending; }; Sync<Shared> _shared; std::condition_variable wakeup; /* Using `--ignore-liveness' with `--delete' can have unintended consequences if `keep-outputs' or `keep-derivations' are true (the garbage collector will recurse into deleting the outputs or derivers, respectively). So disable them. */ if (options.action == GCOptions::gcDeleteSpecific && options.ignoreLiveness) { gcKeepOutputs = false; gcKeepDerivations = false; } if (shouldDelete) deletePath(reservedPath); /* Acquire the global GC root. Note: we don't use fdGCLock here because then in auto-gc mode, another thread could downgrade our exclusive lock. */ auto fdGCLock = openGCLock(); FdLock gcLock(fdGCLock.get(), ltWrite, true, "waiting for the big garbage collector lock..."); /* Synchronisation point to test ENOENT handling in addTempRoot(), see tests/gc-non-blocking.sh. */ if (auto p = getEnv("_NIX_TEST_GC_SYNC_1")) readFile(*p); /* Start the server for receiving new roots. */ auto socketPath = stateDir.get() + gcSocketPath; createDirs(dirOf(socketPath)); auto fdServer = createUnixDomainSocket(socketPath, 0666); // TODO nonblocking socket on windows? #ifdef _WIN32 throw UnimplementedError("External GC client not implemented yet"); #else if (fcntl(fdServer.get(), F_SETFL, fcntl(fdServer.get(), F_GETFL) | O_NONBLOCK) == -1) throw SysError("making socket '%1%' non-blocking", socketPath); Pipe shutdownPipe; shutdownPipe.create(); std::thread serverThread([&]() { Sync<std::map<int, std::thread>> connections; Finally cleanup([&]() { debug("GC roots server shutting down"); fdServer.close(); while (true) { auto item = remove_begin(*connections.lock()); if (!item) break; auto & [fd, thread] = *item; shutdown(fd, SHUT_RDWR); thread.join(); } }); while (true) { std::vector<struct pollfd> fds; fds.push_back({.fd = shutdownPipe.readSide.get(), .events = POLLIN}); fds.push_back({.fd = fdServer.get(), .events = POLLIN}); auto count = poll(fds.data(), fds.size(), -1); assert(count != -1); if (fds[0].revents) /* Parent is asking us to quit. */ break; if (fds[1].revents) { /* Accept a new connection. */ assert(fds[1].revents & POLLIN); AutoCloseFD fdClient = accept(fdServer.get(), nullptr, nullptr); if (!fdClient) continue; debug("GC roots server accepted new client"); /* Process the connection in a separate thread. */ auto fdClient_ = fdClient.get(); std::thread clientThread([&, fdClient = std::move(fdClient)]() { Finally cleanup([&]() { auto conn(connections.lock()); auto i = conn->find(fdClient.get()); if (i != conn->end()) { i->second.detach(); conn->erase(i); } }); /* On macOS, accepted sockets inherit the non-blocking flag from the server socket, so explicitly make it blocking. */ if (fcntl(fdClient.get(), F_SETFL, fcntl(fdClient.get(), F_GETFL) & ~O_NONBLOCK) == -1) panic("Could not set non-blocking flag on client socket"); while (true) { try { auto path = readLine(fdClient.get()); auto storePath = maybeParseStorePath(path); if (storePath) { debug("got new GC root '%s'", path); auto hashPart = std::string(storePath->hashPart()); auto shared(_shared.lock()); shared->tempRoots.insert(hashPart); /* If this path is currently being deleted, then we have to wait until deletion is finished to ensure that the client doesn't start re-creating it before we're done. FIXME: ideally we would use a FD for this so we don't block the poll loop. */ while (shared->pending == hashPart) { debug("synchronising with deletion of path '%s'", path); shared.wait(wakeup); } } else printError("received garbage instead of a root from client"); writeFull(fdClient.get(), "1", false); } catch (Error & e) { debug("reading GC root from client: %s", e.msg()); break; } } }); connections.lock()->insert({fdClient_, std::move(clientThread)}); } } }); Finally stopServer([&]() { writeFull(shutdownPipe.writeSide.get(), "x", false); wakeup.notify_all(); if (serverThread.joinable()) serverThread.join(); }); #endif /* Find the roots. Since we've grabbed the GC lock, the set of permanent roots cannot increase now. */ printInfo("finding garbage collector roots..."); Roots rootMap; if (!options.ignoreLiveness) findRootsNoTemp(rootMap, true); for (auto & i : rootMap) roots.insert(i.first); /* Read the temporary roots created before we acquired the global GC root. Any new roots will be sent to our socket. */ Roots tempRoots; findTempRoots(tempRoots, true); for (auto & root : tempRoots) { _shared.lock()->tempRoots.insert(std::string(root.first.hashPart())); roots.insert(root.first); } /* Synchronisation point for testing, see tests/functional/gc-non-blocking.sh. */ if (auto p = getEnv("_NIX_TEST_GC_SYNC_2")) readFile(*p); /* Helper function that deletes a path from the store and throws GCLimitReached if we've deleted enough garbage. */ auto deleteFromStore = [&](std::string_view baseName) { Path path = storeDir + "/" + std::string(baseName); Path realPath = realStoreDir + "/" + std::string(baseName); /* There may be temp directories in the store that are still in use by another process. We need to be sure that we can acquire an exclusive lock before deleting them. */ if (baseName.find("tmp-", 0) == 0) { AutoCloseFD tmpDirFd = openDirectory(realPath); if (!tmpDirFd || !lockFile(tmpDirFd.get(), ltWrite, false)) { debug("skipping locked tempdir '%s'", realPath); return; } } printInfo("deleting '%1%'", path); results.paths.insert(path); uint64_t bytesFreed; deleteStorePath(realPath, bytesFreed); results.bytesFreed += bytesFreed; if (results.bytesFreed > options.maxFreed) { printInfo("deleted more than %d bytes; stopping", options.maxFreed); throw GCLimitReached(); } }; std::map<StorePath, StorePathSet> referrersCache; /* Helper function that visits all paths reachable from `start` via the referrers edges and optionally derivers and derivation output edges. If none of those paths are roots, then all visited paths are garbage and are deleted. */ auto deleteReferrersClosure = [&](const StorePath & start) { StorePathSet visited; std::queue<StorePath> todo; /* Wake up any GC client waiting for deletion of the paths in 'visited' to finish. */ Finally releasePending([&]() { auto shared(_shared.lock()); shared->pending.reset(); wakeup.notify_all(); }); auto enqueue = [&](const StorePath & path) { if (visited.insert(path).second) todo.push(path); }; enqueue(start); while (auto path = pop(todo)) { checkInterrupt(); /* Bail out if we've previously discovered that this path is alive. */ if (alive.count(*path)) { alive.insert(start); return; } /* If we've previously deleted this path, we don't have to handle it again. */ if (dead.count(*path)) continue; auto markAlive = [&]() { alive.insert(*path); alive.insert(start); try { StorePathSet closure; computeFSClosure(*path, closure, /* flipDirection */ false, gcKeepOutputs, gcKeepDerivations); for (auto & p : closure) alive.insert(p); } catch (InvalidPath &) { } }; /* If this is a root, bail out. */ if (roots.count(*path)) { debug("cannot delete '%s' because it's a root", printStorePath(*path)); return markAlive(); } if (options.action == GCOptions::gcDeleteSpecific && !options.pathsToDelete.count(*path)) return; { auto hashPart = std::string(path->hashPart()); auto shared(_shared.lock()); if (shared->tempRoots.count(hashPart)) { debug("cannot delete '%s' because it's a temporary root", printStorePath(*path)); return markAlive(); } shared->pending = hashPart; } if (isValidPath(*path)) { /* Visit the referrers of this path. */ auto i = referrersCache.find(*path); if (i == referrersCache.end()) { StorePathSet referrers; queryGCReferrers(*path, referrers); referrersCache.emplace(*path, std::move(referrers)); i = referrersCache.find(*path); } for (auto & p : i->second) enqueue(p); /* If keep-derivations is set and this is a derivation, then visit the derivation outputs. */ if (gcKeepDerivations && path->isDerivation()) { for (auto & [name, maybeOutPath] : queryPartialDerivationOutputMap(*path)) if (maybeOutPath && isValidPath(*maybeOutPath) && queryPathInfo(*maybeOutPath)->deriver == *path) enqueue(*maybeOutPath); } /* If keep-outputs is set, then visit the derivers. */ if (gcKeepOutputs) { auto derivers = queryValidDerivers(*path); for (auto & i : derivers) enqueue(i); } } } for (auto & path : topoSortPaths(visited)) { if (!dead.insert(path).second) continue; if (shouldDelete) { invalidatePathChecked(path); deleteFromStore(path.to_string()); referrersCache.erase(path); } } }; /* Either delete all garbage paths, or just the specified paths (for gcDeleteSpecific). */ if (options.action == GCOptions::gcDeleteSpecific) { for (auto & i : options.pathsToDelete) { deleteReferrersClosure(i); if (!dead.count(i)) throw Error( "Cannot delete path '%1%' since it is still alive. " "To find out why, use: " "nix-store --query --roots and nix-store --query --referrers", printStorePath(i)); } } else if (options.maxFreed > 0) { if (shouldDelete) printInfo("deleting garbage..."); else printInfo("determining live/dead paths..."); try { AutoCloseDir dir(opendir(realStoreDir.get().c_str())); if (!dir) throw SysError("opening directory '%1%'", realStoreDir); /* Read the store and delete all paths that are invalid or unreachable. We don't use readDirectory() here so that GCing can start faster. */ auto linksName = baseNameOf(linksDir); Paths entries; struct dirent * dirent; while (errno = 0, dirent = readdir(dir.get())) { checkInterrupt(); std::string name = dirent->d_name; if (name == "." || name == ".." || name == linksName) continue; if (auto storePath = maybeParseStorePath(storeDir + "/" + name)) deleteReferrersClosure(*storePath); else deleteFromStore(name); } } catch (GCLimitReached & e) { } } if (options.action == GCOptions::gcReturnLive) { for (auto & i : alive) results.paths.insert(printStorePath(i)); return; } if (options.action == GCOptions::gcReturnDead) { for (auto & i : dead) results.paths.insert(printStorePath(i)); return; } /* Unlink all files in /nix/store/.links that have a link count of 1, which indicates that there are no other links and so they can be safely deleted. FIXME: race condition with optimisePath(): we might see a link count of 1 just before optimisePath() increases the link count. */ if (options.action == GCOptions::gcDeleteDead || options.action == GCOptions::gcDeleteSpecific) { printInfo("deleting unused links..."); AutoCloseDir dir(opendir(linksDir.c_str())); if (!dir) throw SysError("opening directory '%1%'", linksDir); int64_t actualSize = 0, unsharedSize = 0; struct dirent * dirent; while (errno = 0, dirent = readdir(dir.get())) { checkInterrupt(); std::string name = dirent->d_name; if (name == "." || name == "..") continue; Path path = linksDir + "/" + name; auto st = lstat(path); if (st.st_nlink != 1) { actualSize += st.st_size; unsharedSize += (st.st_nlink - 1) * st.st_size; continue; } printMsg(lvlTalkative, "deleting unused link '%1%'", path); if (unlink(path.c_str()) == -1) throw SysError("deleting '%1%'", path); /* Do not account for deleted file here. Rely on deletePath() accounting. */ } struct stat st; if (stat(linksDir.c_str(), &st) == -1) throw SysError("statting '%1%'", linksDir); int64_t overhead = #ifdef _WIN32 0 #else st.st_blocks * 512ULL #endif ; printInfo("note: currently hard linking saves %.2f MiB", ((unsharedSize - actualSize - overhead) / (1024.0 * 1024.0))); } /* While we're at it, vacuum the database. */ //if (options.action == GCOptions::gcDeleteDead) vacuumDB(); } void LocalStore::autoGC(bool sync) { #if HAVE_STATVFS static auto fakeFreeSpaceFile = getEnv("_NIX_TEST_FREE_SPACE_FILE"); auto getAvail = [this]() -> uint64_t { if (fakeFreeSpaceFile) return std::stoll(readFile(*fakeFreeSpaceFile)); struct statvfs st; if (statvfs(realStoreDir.get().c_str(), &st)) throw SysError("getting filesystem info about '%s'", realStoreDir); return (uint64_t) st.f_bavail * st.f_frsize; }; std::shared_future<void> future; { auto state(_state.lock()); if (state->gcRunning) { future = state->gcFuture; debug("waiting for auto-GC to finish"); goto sync; } auto now = std::chrono::steady_clock::now(); if (now < state->lastGCCheck + std::chrono::seconds(settings.minFreeCheckInterval)) return; auto avail = getAvail(); state->lastGCCheck = now; if (avail >= settings.minFree || avail >= settings.maxFree) return; if (avail > state->availAfterGC * 0.97) return; state->gcRunning = true; std::promise<void> promise; future = state->gcFuture = promise.get_future().share(); std::thread([promise{std::move(promise)}, this, avail, getAvail]() mutable { try { /* Wake up any threads waiting for the auto-GC to finish. */ Finally wakeup([&]() { auto state(_state.lock()); state->gcRunning = false; state->lastGCCheck = std::chrono::steady_clock::now(); promise.set_value(); }); GCOptions options; options.maxFreed = settings.maxFree - avail; printInfo("running auto-GC to free %d bytes", options.maxFreed); GCResults results; collectGarbage(options, results); _state.lock()->availAfterGC = getAvail(); } catch (...) { // FIXME: we could propagate the exception to the // future, but we don't really care. (what??) ignoreExceptionInDestructor(); } }).detach(); } sync: // Wait for the future outside of the state lock. if (sync) future.get(); #endif } }
34,464
C++
.cc
804
31.114428
147
0.542835
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,809
worker-protocol.cc
NixOS_nix/src/libstore/worker-protocol.cc
#include "serialise.hh" #include "path-with-outputs.hh" #include "store-api.hh" #include "build-result.hh" #include "worker-protocol.hh" #include "worker-protocol-impl.hh" #include "archive.hh" #include "path-info.hh" #include <chrono> #include <nlohmann/json.hpp> namespace nix { /* protocol-specific definitions */ BuildMode WorkerProto::Serialise<BuildMode>::read(const StoreDirConfig & store, WorkerProto::ReadConn conn) { auto temp = readNum<uint8_t>(conn.from); switch (temp) { case 0: return bmNormal; case 1: return bmRepair; case 2: return bmCheck; default: throw Error("Invalid build mode"); } } void WorkerProto::Serialise<BuildMode>::write(const StoreDirConfig & store, WorkerProto::WriteConn conn, const BuildMode & buildMode) { switch (buildMode) { case bmNormal: conn.to << uint8_t{0}; break; case bmRepair: conn.to << uint8_t{1}; break; case bmCheck: conn.to << uint8_t{2}; break; default: assert(false); }; } std::optional<TrustedFlag> WorkerProto::Serialise<std::optional<TrustedFlag>>::read(const StoreDirConfig & store, WorkerProto::ReadConn conn) { auto temp = readNum<uint8_t>(conn.from); switch (temp) { case 0: return std::nullopt; case 1: return { Trusted }; case 2: return { NotTrusted }; default: throw Error("Invalid trusted status from remote"); } } void WorkerProto::Serialise<std::optional<TrustedFlag>>::write(const StoreDirConfig & store, WorkerProto::WriteConn conn, const std::optional<TrustedFlag> & optTrusted) { if (!optTrusted) conn.to << uint8_t{0}; else { switch (*optTrusted) { case Trusted: conn.to << uint8_t{1}; break; case NotTrusted: conn.to << uint8_t{2}; break; default: assert(false); }; } } std::optional<std::chrono::microseconds> WorkerProto::Serialise<std::optional<std::chrono::microseconds>>::read(const StoreDirConfig & store, WorkerProto::ReadConn conn) { auto tag = readNum<uint8_t>(conn.from); switch (tag) { case 0: return std::nullopt; case 1: return std::optional<std::chrono::microseconds>{std::chrono::microseconds(readNum<int64_t>(conn.from))}; default: throw Error("Invalid optional tag from remote"); } } void WorkerProto::Serialise<std::optional<std::chrono::microseconds>>::write(const StoreDirConfig & store, WorkerProto::WriteConn conn, const std::optional<std::chrono::microseconds> & optDuration) { if (!optDuration.has_value()) { conn.to << uint8_t{0}; } else { conn.to << uint8_t{1} << optDuration.value().count(); } } DerivedPath WorkerProto::Serialise<DerivedPath>::read(const StoreDirConfig & store, WorkerProto::ReadConn conn) { auto s = readString(conn.from); if (GET_PROTOCOL_MINOR(conn.version) >= 30) { return DerivedPath::parseLegacy(store, s); } else { return parsePathWithOutputs(store, s).toDerivedPath(); } } void WorkerProto::Serialise<DerivedPath>::write(const StoreDirConfig & store, WorkerProto::WriteConn conn, const DerivedPath & req) { if (GET_PROTOCOL_MINOR(conn.version) >= 30) { conn.to << req.to_string_legacy(store); } else { auto sOrDrvPath = StorePathWithOutputs::tryFromDerivedPath(req); std::visit(overloaded { [&](const StorePathWithOutputs & s) { conn.to << s.to_string(store); }, [&](const StorePath & drvPath) { throw Error("trying to request '%s', but daemon protocol %d.%d is too old (< 1.29) to request a derivation file", store.printStorePath(drvPath), GET_PROTOCOL_MAJOR(conn.version), GET_PROTOCOL_MINOR(conn.version)); }, [&](std::monostate) { throw Error("wanted to build a derivation that is itself a build product, but protocols do not support that. Try upgrading the Nix on the other end of this connection"); }, }, sOrDrvPath); } } KeyedBuildResult WorkerProto::Serialise<KeyedBuildResult>::read(const StoreDirConfig & store, WorkerProto::ReadConn conn) { auto path = WorkerProto::Serialise<DerivedPath>::read(store, conn); auto br = WorkerProto::Serialise<BuildResult>::read(store, conn); return KeyedBuildResult { std::move(br), /* .path = */ std::move(path), }; } void WorkerProto::Serialise<KeyedBuildResult>::write(const StoreDirConfig & store, WorkerProto::WriteConn conn, const KeyedBuildResult & res) { WorkerProto::write(store, conn, res.path); WorkerProto::write(store, conn, static_cast<const BuildResult &>(res)); } BuildResult WorkerProto::Serialise<BuildResult>::read(const StoreDirConfig & store, WorkerProto::ReadConn conn) { BuildResult res; res.status = static_cast<BuildResult::Status>(readInt(conn.from)); conn.from >> res.errorMsg; if (GET_PROTOCOL_MINOR(conn.version) >= 29) { conn.from >> res.timesBuilt >> res.isNonDeterministic >> res.startTime >> res.stopTime; } if (GET_PROTOCOL_MINOR(conn.version) >= 37) { res.cpuUser = WorkerProto::Serialise<std::optional<std::chrono::microseconds>>::read(store, conn); res.cpuSystem = WorkerProto::Serialise<std::optional<std::chrono::microseconds>>::read(store, conn); } if (GET_PROTOCOL_MINOR(conn.version) >= 28) { auto builtOutputs = WorkerProto::Serialise<DrvOutputs>::read(store, conn); for (auto && [output, realisation] : builtOutputs) res.builtOutputs.insert_or_assign( std::move(output.outputName), std::move(realisation)); } return res; } void WorkerProto::Serialise<BuildResult>::write(const StoreDirConfig & store, WorkerProto::WriteConn conn, const BuildResult & res) { conn.to << res.status << res.errorMsg; if (GET_PROTOCOL_MINOR(conn.version) >= 29) { conn.to << res.timesBuilt << res.isNonDeterministic << res.startTime << res.stopTime; } if (GET_PROTOCOL_MINOR(conn.version) >= 37) { WorkerProto::write(store, conn, res.cpuUser); WorkerProto::write(store, conn, res.cpuSystem); } if (GET_PROTOCOL_MINOR(conn.version) >= 28) { DrvOutputs builtOutputs; for (auto & [output, realisation] : res.builtOutputs) builtOutputs.insert_or_assign(realisation.id, realisation); WorkerProto::write(store, conn, builtOutputs); } } ValidPathInfo WorkerProto::Serialise<ValidPathInfo>::read(const StoreDirConfig & store, ReadConn conn) { auto path = WorkerProto::Serialise<StorePath>::read(store, conn); return ValidPathInfo { std::move(path), WorkerProto::Serialise<UnkeyedValidPathInfo>::read(store, conn), }; } void WorkerProto::Serialise<ValidPathInfo>::write(const StoreDirConfig & store, WriteConn conn, const ValidPathInfo & pathInfo) { WorkerProto::write(store, conn, pathInfo.path); WorkerProto::write(store, conn, static_cast<const UnkeyedValidPathInfo &>(pathInfo)); } UnkeyedValidPathInfo WorkerProto::Serialise<UnkeyedValidPathInfo>::read(const StoreDirConfig & store, ReadConn conn) { auto deriver = readString(conn.from); auto narHash = Hash::parseAny(readString(conn.from), HashAlgorithm::SHA256); UnkeyedValidPathInfo info(narHash); if (deriver != "") info.deriver = store.parseStorePath(deriver); info.references = WorkerProto::Serialise<StorePathSet>::read(store, conn); conn.from >> info.registrationTime >> info.narSize; if (GET_PROTOCOL_MINOR(conn.version) >= 16) { conn.from >> info.ultimate; info.sigs = readStrings<StringSet>(conn.from); info.ca = ContentAddress::parseOpt(readString(conn.from)); } return info; } void WorkerProto::Serialise<UnkeyedValidPathInfo>::write(const StoreDirConfig & store, WriteConn conn, const UnkeyedValidPathInfo & pathInfo) { conn.to << (pathInfo.deriver ? store.printStorePath(*pathInfo.deriver) : "") << pathInfo.narHash.to_string(HashFormat::Base16, false); WorkerProto::write(store, conn, pathInfo.references); conn.to << pathInfo.registrationTime << pathInfo.narSize; if (GET_PROTOCOL_MINOR(conn.version) >= 16) { conn.to << pathInfo.ultimate << pathInfo.sigs << renderContentAddress(pathInfo.ca); } } WorkerProto::ClientHandshakeInfo WorkerProto::Serialise<WorkerProto::ClientHandshakeInfo>::read(const StoreDirConfig & store, ReadConn conn) { WorkerProto::ClientHandshakeInfo res; if (GET_PROTOCOL_MINOR(conn.version) >= 33) { res.daemonNixVersion = readString(conn.from); } if (GET_PROTOCOL_MINOR(conn.version) >= 35) { res.remoteTrustsUs = WorkerProto::Serialise<std::optional< TrustedFlag>>::read(store, conn); } else { // We don't know the answer; protocol to old. res.remoteTrustsUs = std::nullopt; } return res; } void WorkerProto::Serialise<WorkerProto::ClientHandshakeInfo>::write(const StoreDirConfig & store, WriteConn conn, const WorkerProto::ClientHandshakeInfo & info) { if (GET_PROTOCOL_MINOR(conn.version) >= 33) { assert(info.daemonNixVersion); conn.to << *info.daemonNixVersion; } if (GET_PROTOCOL_MINOR(conn.version) >= 35) { WorkerProto::write(store, conn, info.remoteTrustsUs); } } }
9,732
C++
.cc
251
32.302789
197
0.662786
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,810
ssh.cc
NixOS_nix/src/libstore/ssh.cc
#include "ssh.hh" #include "finally.hh" #include "current-process.hh" #include "environment-variables.hh" #include "util.hh" #include "exec.hh" namespace nix { static std::string parsePublicHostKey(std::string_view host, std::string_view sshPublicHostKey) { try { return base64Decode(sshPublicHostKey); } catch (Error & e) { e.addTrace({}, "while decoding ssh public host key for host '%s'", host); throw; } } SSHMaster::SSHMaster( std::string_view host, std::string_view keyFile, std::string_view sshPublicHostKey, bool useMaster, bool compress, Descriptor logFD) : host(host) , fakeSSH(host == "localhost") , keyFile(keyFile) , sshPublicHostKey(parsePublicHostKey(host, sshPublicHostKey)) , useMaster(useMaster && !fakeSSH) , compress(compress) , logFD(logFD) { if (host == "" || hasPrefix(host, "-")) throw Error("invalid SSH host name '%s'", host); auto state(state_.lock()); state->tmpDir = std::make_unique<AutoDelete>(createTempDir("", "nix", true, true, 0700)); } void SSHMaster::addCommonSSHOpts(Strings & args) { auto state(state_.lock()); for (auto & i : tokenizeString<Strings>(getEnv("NIX_SSHOPTS").value_or(""))) args.push_back(i); if (!keyFile.empty()) args.insert(args.end(), {"-i", keyFile}); if (!sshPublicHostKey.empty()) { std::filesystem::path fileName = state->tmpDir->path() / "host-key"; auto p = host.rfind("@"); std::string thost = p != std::string::npos ? std::string(host, p + 1) : host; writeFile(fileName.string(), thost + " " + sshPublicHostKey + "\n"); args.insert(args.end(), {"-oUserKnownHostsFile=" + fileName.string()}); } if (compress) args.push_back("-C"); // We use this to make ssh signal back to us that the connection is established. // It really does run locally; see createSSHEnv which sets up SHELL to make // it launch more reliably. The local command runs synchronously, so presumably // the remote session won't be garbled if the local command is slow. args.push_back("-oPermitLocalCommand=yes"); args.push_back("-oLocalCommand=echo started"); } bool SSHMaster::isMasterRunning() { Strings args = {"-O", "check", host}; addCommonSSHOpts(args); auto res = runProgram(RunOptions {.program = "ssh", .args = args, .mergeStderrToStdout = true}); return res.first == 0; } Strings createSSHEnv() { // Copy the environment and set SHELL=/bin/sh std::map<std::string, std::string> env = getEnv(); // SSH will invoke the "user" shell for -oLocalCommand, but that means // $SHELL. To keep things simple and avoid potential issues with other // shells, we set it to /bin/sh. // Technically, we don't need that, and we could reinvoke ourselves to print // "started". Self-reinvocation is tricky with library consumers, but mostly // solved; refer to the development history of nixExePath in libstore/globals.cc. env.insert_or_assign("SHELL", "/bin/sh"); Strings r; for (auto & [k, v] : env) { r.push_back(k + "=" + v); } return r; } std::unique_ptr<SSHMaster::Connection> SSHMaster::startCommand( Strings && command, Strings && extraSshArgs) { #ifdef _WIN32 // TODO re-enable on Windows, once we can start processes. throw UnimplementedError("cannot yet SSH on windows because spawning processes is not yet implemented"); #else Path socketPath = startMaster(); Pipe in, out; in.create(); out.create(); auto conn = std::make_unique<Connection>(); ProcessOptions options; options.dieWithParent = false; if (!fakeSSH && !useMaster) { logger->pause(); } Finally cleanup = [&]() { logger->resume(); }; conn->sshPid = startProcess([&]() { restoreProcessContext(); close(in.writeSide.get()); close(out.readSide.get()); if (dup2(in.readSide.get(), STDIN_FILENO) == -1) throw SysError("duping over stdin"); if (dup2(out.writeSide.get(), STDOUT_FILENO) == -1) throw SysError("duping over stdout"); if (logFD != -1 && dup2(logFD, STDERR_FILENO) == -1) throw SysError("duping over stderr"); Strings args; if (!fakeSSH) { args = { "ssh", host.c_str(), "-x" }; addCommonSSHOpts(args); if (socketPath != "") args.insert(args.end(), {"-S", socketPath}); if (verbosity >= lvlChatty) args.push_back("-v"); args.splice(args.end(), std::move(extraSshArgs)); args.push_back("--"); } args.splice(args.end(), std::move(command)); auto env = createSSHEnv(); nix::execvpe(args.begin()->c_str(), stringsToCharPtrs(args).data(), stringsToCharPtrs(env).data()); // could not exec ssh/bash throw SysError("unable to execute '%s'", args.front()); }, options); in.readSide = INVALID_DESCRIPTOR; out.writeSide = INVALID_DESCRIPTOR; // Wait for the SSH connection to be established, // So that we don't overwrite the password prompt with our progress bar. if (!fakeSSH && !useMaster && !isMasterRunning()) { std::string reply; try { reply = readLine(out.readSide.get()); } catch (EndOfFile & e) { } if (reply != "started") { printTalkative("SSH stdout first line: %s", reply); throw Error("failed to start SSH connection to '%s'", host); } } conn->out = std::move(out.readSide); conn->in = std::move(in.writeSide); return conn; #endif } #ifndef _WIN32 // TODO re-enable on Windows, once we can start processes. Path SSHMaster::startMaster() { if (!useMaster) return ""; auto state(state_.lock()); if (state->sshMaster != INVALID_DESCRIPTOR) return state->socketPath; state->socketPath = (Path) *state->tmpDir + "/ssh.sock"; Pipe out; out.create(); ProcessOptions options; options.dieWithParent = false; logger->pause(); Finally cleanup = [&]() { logger->resume(); }; if (isMasterRunning()) return state->socketPath; state->sshMaster = startProcess([&]() { restoreProcessContext(); close(out.readSide.get()); if (dup2(out.writeSide.get(), STDOUT_FILENO) == -1) throw SysError("duping over stdout"); Strings args = { "ssh", host.c_str(), "-M", "-N", "-S", state->socketPath }; if (verbosity >= lvlChatty) args.push_back("-v"); addCommonSSHOpts(args); auto env = createSSHEnv(); nix::execvpe(args.begin()->c_str(), stringsToCharPtrs(args).data(), stringsToCharPtrs(env).data()); throw SysError("unable to execute '%s'", args.front()); }, options); out.writeSide = INVALID_DESCRIPTOR; std::string reply; try { reply = readLine(out.readSide.get()); } catch (EndOfFile & e) { } if (reply != "started") { printTalkative("SSH master stdout first line: %s", reply); throw Error("failed to start SSH master connection to '%s'", host); } return state->socketPath; } #endif }
7,240
C++
.cc
184
33.054348
108
0.627462
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,811
make-content-addressed.cc
NixOS_nix/src/libstore/make-content-addressed.cc
#include "make-content-addressed.hh" #include "references.hh" namespace nix { std::map<StorePath, StorePath> makeContentAddressed( Store & srcStore, Store & dstStore, const StorePathSet & storePaths) { StorePathSet closure; srcStore.computeFSClosure(storePaths, closure); auto paths = srcStore.topoSortPaths(closure); std::reverse(paths.begin(), paths.end()); std::map<StorePath, StorePath> remappings; for (auto & path : paths) { auto pathS = srcStore.printStorePath(path); auto oldInfo = srcStore.queryPathInfo(path); std::string oldHashPart(path.hashPart()); StringSink sink; srcStore.narFromPath(path, sink); StringMap rewrites; StoreReferences refs; for (auto & ref : oldInfo->references) { if (ref == path) refs.self = true; else { auto i = remappings.find(ref); auto replacement = i != remappings.end() ? i->second : ref; // FIXME: warn about unremapped paths? if (replacement != ref) rewrites.insert_or_assign(srcStore.printStorePath(ref), srcStore.printStorePath(replacement)); refs.others.insert(std::move(replacement)); } } sink.s = rewriteStrings(sink.s, rewrites); HashModuloSink hashModuloSink(HashAlgorithm::SHA256, oldHashPart); hashModuloSink(sink.s); auto narModuloHash = hashModuloSink.finish().first; ValidPathInfo info { dstStore, path.name(), FixedOutputInfo { .method = FileIngestionMethod::NixArchive, .hash = narModuloHash, .references = std::move(refs), }, Hash::dummy, }; printInfo("rewriting '%s' to '%s'", pathS, dstStore.printStorePath(info.path)); StringSink sink2; RewritingSink rsink2(oldHashPart, std::string(info.path.hashPart()), sink2); rsink2(sink.s); rsink2.flush(); info.narHash = hashString(HashAlgorithm::SHA256, sink2.s); info.narSize = sink.s.size(); StringSource source(sink2.s); dstStore.addToStore(info, source); remappings.insert_or_assign(std::move(path), std::move(info.path)); } return remappings; } StorePath makeContentAddressed( Store & srcStore, Store & dstStore, const StorePath & fromPath) { auto remappings = makeContentAddressed(srcStore, dstStore, StorePathSet { fromPath }); auto i = remappings.find(fromPath); assert(i != remappings.end()); return i->second; } }
2,678
C++
.cc
71
28.929577
114
0.622583
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,812
common-ssh-store-config.cc
NixOS_nix/src/libstore/common-ssh-store-config.cc
#include <regex> #include "common-ssh-store-config.hh" #include "ssh.hh" namespace nix { static std::string extractConnStr(std::string_view scheme, std::string_view _connStr) { if (_connStr.empty()) throw UsageError("`%s` store requires a valid SSH host as the authority part in Store URI", scheme); std::string connStr{_connStr}; std::smatch result; static std::regex v6AddrRegex("^((.*)@)?\\[(.*)\\]$"); if (std::regex_match(connStr, result, v6AddrRegex)) { connStr = result[1].matched ? result.str(1) + result.str(3) : result.str(3); } return connStr; } CommonSSHStoreConfig::CommonSSHStoreConfig(std::string_view scheme, std::string_view host, const Params & params) : StoreConfig(params) , host(extractConnStr(scheme, host)) { } SSHMaster CommonSSHStoreConfig::createSSHMaster(bool useMaster, Descriptor logFD) { return { host, sshKey.get(), sshPublicHostKey.get(), useMaster, compress, logFD, }; } }
1,024
C++
.cc
33
26.454545
113
0.671764
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,813
local-binary-cache-store.cc
NixOS_nix/src/libstore/local-binary-cache-store.cc
#include "local-binary-cache-store.hh" #include "globals.hh" #include "nar-info-disk-cache.hh" #include "signals.hh" #include <atomic> namespace nix { LocalBinaryCacheStoreConfig::LocalBinaryCacheStoreConfig( std::string_view scheme, PathView binaryCacheDir, const Params & params) : StoreConfig(params) , BinaryCacheStoreConfig(params) , binaryCacheDir(binaryCacheDir) { } std::string LocalBinaryCacheStoreConfig::doc() { return #include "local-binary-cache-store.md" ; } struct LocalBinaryCacheStore : virtual LocalBinaryCacheStoreConfig, virtual BinaryCacheStore { /** * @param binaryCacheDir `file://` is a short-hand for `file:///` * for now. */ LocalBinaryCacheStore( std::string_view scheme, PathView binaryCacheDir, const Params & params) : StoreConfig(params) , BinaryCacheStoreConfig(params) , LocalBinaryCacheStoreConfig(scheme, binaryCacheDir, params) , Store(params) , BinaryCacheStore(params) { } void init() override; std::string getUri() override { return "file://" + binaryCacheDir; } protected: bool fileExists(const std::string & path) override; void upsertFile(const std::string & path, std::shared_ptr<std::basic_iostream<char>> istream, const std::string & mimeType) override { auto path2 = binaryCacheDir + "/" + path; static std::atomic<int> counter{0}; Path tmp = fmt("%s.tmp.%d.%d", path2, getpid(), ++counter); AutoDelete del(tmp, false); StreamToSourceAdapter source(istream); writeFile(tmp, source); std::filesystem::rename(tmp, path2); del.cancel(); } void getFile(const std::string & path, Sink & sink) override { try { readFile(binaryCacheDir + "/" + path, sink); } catch (SysError & e) { if (e.errNo == ENOENT) throw NoSuchBinaryCacheFile("file '%s' does not exist in binary cache", path); throw; } } StorePathSet queryAllValidPaths() override { StorePathSet paths; for (auto & entry : std::filesystem::directory_iterator{binaryCacheDir}) { checkInterrupt(); auto name = entry.path().filename().string(); if (name.size() != 40 || !hasSuffix(name, ".narinfo")) continue; paths.insert(parseStorePath( storeDir + "/" + name.substr(0, name.size() - 8) + "-" + MissingName)); } return paths; } std::optional<TrustedFlag> isTrustedClient() override { return Trusted; } }; void LocalBinaryCacheStore::init() { createDirs(binaryCacheDir + "/nar"); createDirs(binaryCacheDir + "/" + realisationsPrefix); if (writeDebugInfo) createDirs(binaryCacheDir + "/debuginfo"); createDirs(binaryCacheDir + "/log"); BinaryCacheStore::init(); } bool LocalBinaryCacheStore::fileExists(const std::string & path) { return pathExists(binaryCacheDir + "/" + path); } std::set<std::string> LocalBinaryCacheStoreConfig::uriSchemes() { if (getEnv("_NIX_FORCE_HTTP") == "1") return {}; else return {"file"}; } static RegisterStoreImplementation<LocalBinaryCacheStore, LocalBinaryCacheStoreConfig> regLocalBinaryCacheStore; }
3,432
C++
.cc
110
24.7
112
0.63697
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,814
derived-path.cc
NixOS_nix/src/libstore/derived-path.cc
#include "derived-path.hh" #include "derivations.hh" #include "store-api.hh" #include "comparator.hh" #include <nlohmann/json.hpp> #include <optional> namespace nix { // Custom implementation to avoid `ref` ptr equality GENERATE_CMP_EXT( , std::strong_ordering, SingleDerivedPathBuilt, *me->drvPath, me->output); // Custom implementation to avoid `ref` ptr equality // TODO no `GENERATE_CMP_EXT` because no `std::set::operator<=>` on // Darwin, per header. GENERATE_EQUAL( , DerivedPathBuilt ::, DerivedPathBuilt, *me->drvPath, me->outputs); GENERATE_ONE_CMP( , bool, DerivedPathBuilt ::, <, DerivedPathBuilt, *me->drvPath, me->outputs); nlohmann::json DerivedPath::Opaque::toJSON(const StoreDirConfig & store) const { return store.printStorePath(path); } nlohmann::json SingleDerivedPath::Built::toJSON(Store & store) const { nlohmann::json res; res["drvPath"] = drvPath->toJSON(store); // Fallback for the input-addressed derivation case: We expect to always be // able to print the output paths, so let’s do it // FIXME try-resolve on drvPath const auto outputMap = store.queryPartialDerivationOutputMap(resolveDerivedPath(store, *drvPath)); res["output"] = output; auto outputPathIter = outputMap.find(output); if (outputPathIter == outputMap.end()) res["outputPath"] = nullptr; else if (std::optional p = outputPathIter->second) res["outputPath"] = store.printStorePath(*p); else res["outputPath"] = nullptr; return res; } nlohmann::json DerivedPath::Built::toJSON(Store & store) const { nlohmann::json res; res["drvPath"] = drvPath->toJSON(store); // Fallback for the input-addressed derivation case: We expect to always be // able to print the output paths, so let’s do it // FIXME try-resolve on drvPath const auto outputMap = store.queryPartialDerivationOutputMap(resolveDerivedPath(store, *drvPath)); for (const auto & [output, outputPathOpt] : outputMap) { if (!outputs.contains(output)) continue; if (outputPathOpt) res["outputs"][output] = store.printStorePath(*outputPathOpt); else res["outputs"][output] = nullptr; } return res; } nlohmann::json SingleDerivedPath::toJSON(Store & store) const { return std::visit([&](const auto & buildable) { return buildable.toJSON(store); }, raw()); } nlohmann::json DerivedPath::toJSON(Store & store) const { return std::visit([&](const auto & buildable) { return buildable.toJSON(store); }, raw()); } std::string DerivedPath::Opaque::to_string(const StoreDirConfig & store) const { return store.printStorePath(path); } std::string SingleDerivedPath::Built::to_string(const StoreDirConfig & store) const { return drvPath->to_string(store) + "^" + output; } std::string SingleDerivedPath::Built::to_string_legacy(const StoreDirConfig & store) const { return drvPath->to_string(store) + "!" + output; } std::string DerivedPath::Built::to_string(const StoreDirConfig & store) const { return drvPath->to_string(store) + '^' + outputs.to_string(); } std::string DerivedPath::Built::to_string_legacy(const StoreDirConfig & store) const { return drvPath->to_string_legacy(store) + "!" + outputs.to_string(); } std::string SingleDerivedPath::to_string(const StoreDirConfig & store) const { return std::visit( [&](const auto & req) { return req.to_string(store); }, raw()); } std::string DerivedPath::to_string(const StoreDirConfig & store) const { return std::visit( [&](const auto & req) { return req.to_string(store); }, raw()); } std::string SingleDerivedPath::to_string_legacy(const StoreDirConfig & store) const { return std::visit(overloaded { [&](const SingleDerivedPath::Built & req) { return req.to_string_legacy(store); }, [&](const SingleDerivedPath::Opaque & req) { return req.to_string(store); }, }, this->raw()); } std::string DerivedPath::to_string_legacy(const StoreDirConfig & store) const { return std::visit(overloaded { [&](const DerivedPath::Built & req) { return req.to_string_legacy(store); }, [&](const DerivedPath::Opaque & req) { return req.to_string(store); }, }, this->raw()); } DerivedPath::Opaque DerivedPath::Opaque::parse(const StoreDirConfig & store, std::string_view s) { return {store.parseStorePath(s)}; } void drvRequireExperiment( const SingleDerivedPath & drv, const ExperimentalFeatureSettings & xpSettings) { std::visit(overloaded { [&](const SingleDerivedPath::Opaque &) { // plain drv path; no experimental features required. }, [&](const SingleDerivedPath::Built &) { xpSettings.require(Xp::DynamicDerivations); }, }, drv.raw()); } SingleDerivedPath::Built SingleDerivedPath::Built::parse( const StoreDirConfig & store, ref<SingleDerivedPath> drv, OutputNameView output, const ExperimentalFeatureSettings & xpSettings) { drvRequireExperiment(*drv, xpSettings); return { .drvPath = drv, .output = std::string { output }, }; } DerivedPath::Built DerivedPath::Built::parse( const StoreDirConfig & store, ref<SingleDerivedPath> drv, OutputNameView outputsS, const ExperimentalFeatureSettings & xpSettings) { drvRequireExperiment(*drv, xpSettings); return { .drvPath = drv, .outputs = OutputsSpec::parse(outputsS), }; } static SingleDerivedPath parseWithSingle( const StoreDirConfig & store, std::string_view s, std::string_view separator, const ExperimentalFeatureSettings & xpSettings) { size_t n = s.rfind(separator); return n == s.npos ? (SingleDerivedPath) SingleDerivedPath::Opaque::parse(store, s) : (SingleDerivedPath) SingleDerivedPath::Built::parse(store, make_ref<SingleDerivedPath>(parseWithSingle( store, s.substr(0, n), separator, xpSettings)), s.substr(n + 1), xpSettings); } SingleDerivedPath SingleDerivedPath::parse( const StoreDirConfig & store, std::string_view s, const ExperimentalFeatureSettings & xpSettings) { return parseWithSingle(store, s, "^", xpSettings); } SingleDerivedPath SingleDerivedPath::parseLegacy( const StoreDirConfig & store, std::string_view s, const ExperimentalFeatureSettings & xpSettings) { return parseWithSingle(store, s, "!", xpSettings); } static DerivedPath parseWith( const StoreDirConfig & store, std::string_view s, std::string_view separator, const ExperimentalFeatureSettings & xpSettings) { size_t n = s.rfind(separator); return n == s.npos ? (DerivedPath) DerivedPath::Opaque::parse(store, s) : (DerivedPath) DerivedPath::Built::parse(store, make_ref<SingleDerivedPath>(parseWithSingle( store, s.substr(0, n), separator, xpSettings)), s.substr(n + 1), xpSettings); } DerivedPath DerivedPath::parse( const StoreDirConfig & store, std::string_view s, const ExperimentalFeatureSettings & xpSettings) { return parseWith(store, s, "^", xpSettings); } DerivedPath DerivedPath::parseLegacy( const StoreDirConfig & store, std::string_view s, const ExperimentalFeatureSettings & xpSettings) { return parseWith(store, s, "!", xpSettings); } DerivedPath DerivedPath::fromSingle(const SingleDerivedPath & req) { return std::visit(overloaded { [&](const SingleDerivedPath::Opaque & o) -> DerivedPath { return o; }, [&](const SingleDerivedPath::Built & b) -> DerivedPath { return DerivedPath::Built { .drvPath = b.drvPath, .outputs = OutputsSpec::Names { b.output }, }; }, }, req.raw()); } const StorePath & SingleDerivedPath::Built::getBaseStorePath() const { return drvPath->getBaseStorePath(); } const StorePath & DerivedPath::Built::getBaseStorePath() const { return drvPath->getBaseStorePath(); } template<typename DP> static inline const StorePath & getBaseStorePath_(const DP & derivedPath) { return std::visit(overloaded { [&](const typename DP::Built & bfd) -> auto & { return bfd.drvPath->getBaseStorePath(); }, [&](const typename DP::Opaque & bo) -> auto & { return bo.path; }, }, derivedPath.raw()); } const StorePath & SingleDerivedPath::getBaseStorePath() const { return getBaseStorePath_(*this); } const StorePath & DerivedPath::getBaseStorePath() const { return getBaseStorePath_(*this); } }
8,838
C++
.cc
272
27.441176
102
0.675622
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,815
local-overlay-store.cc
NixOS_nix/src/libstore/local-overlay-store.cc
#include "local-overlay-store.hh" #include "callback.hh" #include "realisation.hh" #include "processes.hh" #include "url.hh" #include <regex> namespace nix { std::string LocalOverlayStoreConfig::doc() { return #include "local-overlay-store.md" ; } Path LocalOverlayStoreConfig::toUpperPath(const StorePath & path) { return upperLayer + "/" + path.to_string(); } LocalOverlayStore::LocalOverlayStore(std::string_view scheme, PathView path, const Params & params) : StoreConfig(params) , LocalFSStoreConfig(path, params) , LocalStoreConfig(params) , LocalOverlayStoreConfig(scheme, path, params) , Store(params) , LocalFSStore(params) , LocalStore(params) , lowerStore(openStore(percentDecode(lowerStoreUri.get())).dynamic_pointer_cast<LocalFSStore>()) { if (checkMount.get()) { std::smatch match; std::string mountInfo; auto mounts = readFile(std::filesystem::path{"/proc/self/mounts"}); auto regex = std::regex(R"((^|\n)overlay )" + realStoreDir.get() + R"( .*(\n|$))"); // Mount points can be stacked, so there might be multiple matching entries. // Loop until the last match, which will be the current state of the mount point. while (std::regex_search(mounts, match, regex)) { mountInfo = match.str(); mounts = match.suffix(); } auto checkOption = [&](std::string option, std::string value) { return std::regex_search(mountInfo, std::regex("\\b" + option + "=" + value + "( |,)")); }; auto expectedLowerDir = lowerStore->realStoreDir.get(); if (!checkOption("lowerdir", expectedLowerDir) || !checkOption("upperdir", upperLayer)) { debug("expected lowerdir: %s", expectedLowerDir); debug("expected upperdir: %s", upperLayer); debug("actual mount: %s", mountInfo); throw Error("overlay filesystem '%s' mounted incorrectly", realStoreDir.get()); } } } void LocalOverlayStore::registerDrvOutput(const Realisation & info) { // First do queryRealisation on lower layer to populate DB auto res = lowerStore->queryRealisation(info.id); if (res) LocalStore::registerDrvOutput(*res); LocalStore::registerDrvOutput(info); } void LocalOverlayStore::queryPathInfoUncached(const StorePath & path, Callback<std::shared_ptr<const ValidPathInfo>> callback) noexcept { auto callbackPtr = std::make_shared<decltype(callback)>(std::move(callback)); LocalStore::queryPathInfoUncached(path, {[this, path, callbackPtr](std::future<std::shared_ptr<const ValidPathInfo>> fut) { try { auto info = fut.get(); if (info) return (*callbackPtr)(std::move(info)); } catch (...) { return callbackPtr->rethrow(); } // If we don't have it, check lower store lowerStore->queryPathInfo(path, {[path, callbackPtr](std::future<ref<const ValidPathInfo>> fut) { try { (*callbackPtr)(fut.get().get_ptr()); } catch (...) { return callbackPtr->rethrow(); } }}); }}); } void LocalOverlayStore::queryRealisationUncached(const DrvOutput & drvOutput, Callback<std::shared_ptr<const Realisation>> callback) noexcept { auto callbackPtr = std::make_shared<decltype(callback)>(std::move(callback)); LocalStore::queryRealisationUncached(drvOutput, {[this, drvOutput, callbackPtr](std::future<std::shared_ptr<const Realisation>> fut) { try { auto info = fut.get(); if (info) return (*callbackPtr)(std::move(info)); } catch (...) { return callbackPtr->rethrow(); } // If we don't have it, check lower store lowerStore->queryRealisation(drvOutput, {[callbackPtr](std::future<std::shared_ptr<const Realisation>> fut) { try { (*callbackPtr)(fut.get()); } catch (...) { return callbackPtr->rethrow(); } }}); }}); } bool LocalOverlayStore::isValidPathUncached(const StorePath & path) { auto res = LocalStore::isValidPathUncached(path); if (res) return res; res = lowerStore->isValidPath(path); if (res) { // Get path info from lower store so upper DB genuinely has it. auto p = lowerStore->queryPathInfo(path); // recur on references, syncing entire closure. for (auto & r : p->references) if (r != path) isValidPath(r); LocalStore::registerValidPath(*p); } return res; } void LocalOverlayStore::queryReferrers(const StorePath & path, StorePathSet & referrers) { LocalStore::queryReferrers(path, referrers); lowerStore->queryReferrers(path, referrers); } void LocalOverlayStore::queryGCReferrers(const StorePath & path, StorePathSet & referrers) { LocalStore::queryReferrers(path, referrers); } StorePathSet LocalOverlayStore::queryValidDerivers(const StorePath & path) { auto res = LocalStore::queryValidDerivers(path); for (auto p : lowerStore->queryValidDerivers(path)) res.insert(p); return res; } std::optional<StorePath> LocalOverlayStore::queryPathFromHashPart(const std::string & hashPart) { auto res = LocalStore::queryPathFromHashPart(hashPart); if (res) return res; else return lowerStore->queryPathFromHashPart(hashPart); } void LocalOverlayStore::registerValidPaths(const ValidPathInfos & infos) { // First, get any from lower store so we merge { StorePathSet notInUpper; for (auto & [p, _] : infos) if (!LocalStore::isValidPathUncached(p)) // avoid divergence notInUpper.insert(p); auto pathsInLower = lowerStore->queryValidPaths(notInUpper); ValidPathInfos inLower; for (auto & p : pathsInLower) inLower.insert_or_assign(p, *lowerStore->queryPathInfo(p)); LocalStore::registerValidPaths(inLower); } // Then do original request LocalStore::registerValidPaths(infos); } void LocalOverlayStore::collectGarbage(const GCOptions & options, GCResults & results) { LocalStore::collectGarbage(options, results); remountIfNecessary(); } void LocalOverlayStore::deleteStorePath(const Path & path, uint64_t & bytesFreed) { auto mergedDir = realStoreDir.get() + "/"; if (path.substr(0, mergedDir.length()) != mergedDir) { warn("local-overlay: unexpected gc path '%s' ", path); return; } StorePath storePath = {path.substr(mergedDir.length())}; auto upperPath = toUpperPath(storePath); if (pathExists(upperPath)) { debug("upper exists: %s", path); if (lowerStore->isValidPath(storePath)) { debug("lower exists: %s", storePath.to_string()); // Path also exists in lower store. // We must delete via upper layer to avoid creating a whiteout. deletePath(upperPath, bytesFreed); _remountRequired = true; } else { // Path does not exist in lower store. // So we can delete via overlayfs and not need to remount. LocalStore::deleteStorePath(path, bytesFreed); } } } void LocalOverlayStore::optimiseStore() { Activity act(*logger, actOptimiseStore); // Note for LocalOverlayStore, queryAllValidPaths only returns paths in upper layer auto paths = queryAllValidPaths(); act.progress(0, paths.size()); uint64_t done = 0; for (auto & path : paths) { if (lowerStore->isValidPath(path)) { uint64_t bytesFreed = 0; // Deduplicate store path deleteStorePath(Store::toRealPath(path), bytesFreed); } done++; act.progress(done, paths.size()); } remountIfNecessary(); } LocalStore::VerificationResult LocalOverlayStore::verifyAllValidPaths(RepairFlag repair) { StorePathSet done; auto existsInStoreDir = [&](const StorePath & storePath) { return pathExists(realStoreDir.get() + "/" + storePath.to_string()); }; bool errors = false; StorePathSet validPaths; for (auto & i : queryAllValidPaths()) verifyPath(i, existsInStoreDir, done, validPaths, repair, errors); return { .errors = errors, .validPaths = validPaths, }; } void LocalOverlayStore::remountIfNecessary() { if (!_remountRequired) return; if (remountHook.get().empty()) { warn("'%s' needs remounting, set remount-hook to do this automatically", realStoreDir.get()); } else { runProgram(remountHook, false, {realStoreDir}); } _remountRequired = false; } static RegisterStoreImplementation<LocalOverlayStore, LocalOverlayStoreConfig> regLocalOverlayStore; }
9,120
C++
.cc
237
30.818565
101
0.63797
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,816
outputs-spec.cc
NixOS_nix/src/libstore/outputs-spec.cc
#include <regex> #include <nlohmann/json.hpp> #include "util.hh" #include "regex-combinators.hh" #include "outputs-spec.hh" #include "path-regex.hh" #include "strings-inline.hh" namespace nix { bool OutputsSpec::contains(const std::string & outputName) const { return std::visit(overloaded { [&](const OutputsSpec::All &) { return true; }, [&](const OutputsSpec::Names & outputNames) { return outputNames.count(outputName) > 0; }, }, raw); } static std::string outputSpecRegexStr = regex::either( regex::group(R"(\*)"), regex::group(regex::list(nameRegexStr))); std::optional<OutputsSpec> OutputsSpec::parseOpt(std::string_view s) { static std::regex regex(std::string { outputSpecRegexStr }); std::cmatch match; if (!std::regex_match(s.cbegin(), s.cend(), match, regex)) return std::nullopt; if (match[1].matched) return { OutputsSpec::All {} }; if (match[2].matched) return OutputsSpec::Names { tokenizeString<StringSet>({match[2].first, match[2].second}, ",") }; assert(false); } OutputsSpec OutputsSpec::parse(std::string_view s) { std::optional spec = parseOpt(s); if (!spec) throw Error("invalid outputs specifier '%s'", s); return std::move(*spec); } std::optional<std::pair<std::string_view, ExtendedOutputsSpec>> ExtendedOutputsSpec::parseOpt(std::string_view s) { auto found = s.rfind('^'); if (found == std::string::npos) return std::pair { s, ExtendedOutputsSpec::Default {} }; auto specOpt = OutputsSpec::parseOpt(s.substr(found + 1)); if (!specOpt) return std::nullopt; return std::pair { s.substr(0, found), ExtendedOutputsSpec::Explicit { std::move(*specOpt) } }; } std::pair<std::string_view, ExtendedOutputsSpec> ExtendedOutputsSpec::parse(std::string_view s) { std::optional spec = parseOpt(s); if (!spec) throw Error("invalid extended outputs specifier '%s'", s); return *spec; } std::string OutputsSpec::to_string() const { return std::visit(overloaded { [&](const OutputsSpec::All &) -> std::string { return "*"; }, [&](const OutputsSpec::Names & outputNames) -> std::string { return concatStringsSep(",", outputNames); }, }, raw); } std::string ExtendedOutputsSpec::to_string() const { return std::visit(overloaded { [&](const ExtendedOutputsSpec::Default &) -> std::string { return ""; }, [&](const ExtendedOutputsSpec::Explicit & outputSpec) -> std::string { return "^" + outputSpec.to_string(); }, }, raw); } OutputsSpec OutputsSpec::union_(const OutputsSpec & that) const { return std::visit(overloaded { [&](const OutputsSpec::All &) -> OutputsSpec { return OutputsSpec::All { }; }, [&](const OutputsSpec::Names & theseNames) -> OutputsSpec { return std::visit(overloaded { [&](const OutputsSpec::All &) -> OutputsSpec { return OutputsSpec::All {}; }, [&](const OutputsSpec::Names & thoseNames) -> OutputsSpec { OutputsSpec::Names ret = theseNames; ret.insert(thoseNames.begin(), thoseNames.end()); return ret; }, }, that.raw); }, }, raw); } bool OutputsSpec::isSubsetOf(const OutputsSpec & that) const { return std::visit(overloaded { [&](const OutputsSpec::All &) { return true; }, [&](const OutputsSpec::Names & thoseNames) { return std::visit(overloaded { [&](const OutputsSpec::All &) { return false; }, [&](const OutputsSpec::Names & theseNames) { bool ret = true; for (auto & o : theseNames) if (thoseNames.count(o) == 0) ret = false; return ret; }, }, raw); }, }, that.raw); } } namespace nlohmann { using namespace nix; #ifndef DOXYGEN_SKIP OutputsSpec adl_serializer<OutputsSpec>::from_json(const json & json) { auto names = json.get<StringSet>(); if (names == StringSet({"*"})) return OutputsSpec::All {}; else return OutputsSpec::Names { std::move(names) }; } void adl_serializer<OutputsSpec>::to_json(json & json, OutputsSpec t) { std::visit(overloaded { [&](const OutputsSpec::All &) { json = std::vector<std::string>({"*"}); }, [&](const OutputsSpec::Names & names) { json = names; }, }, t.raw); } ExtendedOutputsSpec adl_serializer<ExtendedOutputsSpec>::from_json(const json & json) { if (json.is_null()) return ExtendedOutputsSpec::Default {}; else { return ExtendedOutputsSpec::Explicit { json.get<OutputsSpec>() }; } } void adl_serializer<ExtendedOutputsSpec>::to_json(json & json, ExtendedOutputsSpec t) { std::visit(overloaded { [&](const ExtendedOutputsSpec::Default &) { json = nullptr; }, [&](const ExtendedOutputsSpec::Explicit & e) { adl_serializer<OutputsSpec>::to_json(json, e); }, }, t.raw); } #endif }
5,407
C++
.cc
167
25.107784
113
0.584054
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,817
serve-protocol-connection.cc
NixOS_nix/src/libstore/serve-protocol-connection.cc
#include "serve-protocol-connection.hh" #include "serve-protocol-impl.hh" #include "build-result.hh" #include "derivations.hh" namespace nix { ServeProto::Version ServeProto::BasicClientConnection::handshake( BufferedSink & to, Source & from, ServeProto::Version localVersion, std::string_view host) { to << SERVE_MAGIC_1 << localVersion; to.flush(); unsigned int magic = readInt(from); if (magic != SERVE_MAGIC_2) throw Error("'nix-store --serve' protocol mismatch from '%s'", host); auto remoteVersion = readInt(from); if (GET_PROTOCOL_MAJOR(remoteVersion) != 0x200) throw Error("unsupported 'nix-store --serve' protocol version on '%s'", host); return std::min(remoteVersion, localVersion); } ServeProto::Version ServeProto::BasicServerConnection::handshake(BufferedSink & to, Source & from, ServeProto::Version localVersion) { unsigned int magic = readInt(from); if (magic != SERVE_MAGIC_1) throw Error("protocol mismatch"); to << SERVE_MAGIC_2 << localVersion; to.flush(); auto remoteVersion = readInt(from); return std::min(remoteVersion, localVersion); } StorePathSet ServeProto::BasicClientConnection::queryValidPaths( const StoreDirConfig & store, bool lock, const StorePathSet & paths, SubstituteFlag maybeSubstitute) { to << ServeProto::Command::QueryValidPaths << lock << maybeSubstitute; write(store, *this, paths); to.flush(); return Serialise<StorePathSet>::read(store, *this); } std::map<StorePath, UnkeyedValidPathInfo> ServeProto::BasicClientConnection::queryPathInfos(const StoreDirConfig & store, const StorePathSet & paths) { std::map<StorePath, UnkeyedValidPathInfo> infos; to << ServeProto::Command::QueryPathInfos; ServeProto::write(store, *this, paths); to.flush(); while (true) { auto storePathS = readString(from); if (storePathS == "") break; auto storePath = store.parseStorePath(storePathS); assert(paths.count(storePath) == 1); auto info = ServeProto::Serialise<UnkeyedValidPathInfo>::read(store, *this); infos.insert_or_assign(std::move(storePath), std::move(info)); } return infos; } void ServeProto::BasicClientConnection::putBuildDerivationRequest( const StoreDirConfig & store, const StorePath & drvPath, const BasicDerivation & drv, const ServeProto::BuildOptions & options) { to << ServeProto::Command::BuildDerivation << store.printStorePath(drvPath); writeDerivation(to, store, drv); ServeProto::write(store, *this, options); to.flush(); } BuildResult ServeProto::BasicClientConnection::getBuildDerivationResponse(const StoreDirConfig & store) { return ServeProto::Serialise<BuildResult>::read(store, *this); } void ServeProto::BasicClientConnection::narFromPath( const StoreDirConfig & store, const StorePath & path, std::function<void(Source &)> fun) { to << ServeProto::Command::DumpStorePath << store.printStorePath(path); to.flush(); fun(from); } void ServeProto::BasicClientConnection::importPaths(const StoreDirConfig & store, std::function<void(Sink &)> fun) { to << ServeProto::Command::ImportPaths; fun(to); to.flush(); if (readInt(from) != 1) throw Error("remote machine failed to import closure"); } }
3,338
C++
.cc
86
34.511628
114
0.720916
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,818
local-store.cc
NixOS_nix/src/libstore/local-store.cc
#include "local-store.hh" #include "globals.hh" #include "git.hh" #include "archive.hh" #include "pathlocks.hh" #include "worker-protocol.hh" #include "derivations.hh" #include "realisation.hh" #include "nar-info.hh" #include "references.hh" #include "callback.hh" #include "topo-sort.hh" #include "finally.hh" #include "compression.hh" #include "signals.hh" #include "posix-fs-canonicalise.hh" #include "posix-source-accessor.hh" #include "keys.hh" #include "users.hh" #include <iostream> #include <algorithm> #include <cstring> #include <memory> #include <new> #include <sys/types.h> #include <sys/stat.h> #include <sys/time.h> #include <unistd.h> #include <utime.h> #include <fcntl.h> #include <errno.h> #include <stdio.h> #include <time.h> #ifndef _WIN32 # include <grp.h> #endif #if __linux__ # include <sched.h> # include <sys/statvfs.h> # include <sys/mount.h> #endif #ifdef __CYGWIN__ # include <windows.h> #endif #include <sqlite3.h> #include <nlohmann/json.hpp> #include "strings.hh" namespace nix { LocalStoreConfig::LocalStoreConfig( std::string_view scheme, std::string_view authority, const Params & params) : StoreConfig(params) , LocalFSStoreConfig(authority, params) { } std::string LocalStoreConfig::doc() { return #include "local-store.md" ; } struct LocalStore::State::Stmts { /* Some precompiled SQLite statements. */ SQLiteStmt RegisterValidPath; SQLiteStmt UpdatePathInfo; SQLiteStmt AddReference; SQLiteStmt QueryPathInfo; SQLiteStmt QueryReferences; SQLiteStmt QueryReferrers; SQLiteStmt InvalidatePath; SQLiteStmt AddDerivationOutput; SQLiteStmt RegisterRealisedOutput; SQLiteStmt UpdateRealisedOutput; SQLiteStmt QueryValidDerivers; SQLiteStmt QueryDerivationOutputs; SQLiteStmt QueryRealisedOutput; SQLiteStmt QueryAllRealisedOutputs; SQLiteStmt QueryPathFromHashPart; SQLiteStmt QueryValidPaths; SQLiteStmt QueryRealisationReferences; SQLiteStmt AddRealisationReference; }; static int getSchema(Path schemaPath) { int curSchema = 0; if (pathExists(schemaPath)) { auto s = readFile(schemaPath); auto n = string2Int<int>(s); if (!n) throw Error("'%1%' is corrupt", schemaPath); curSchema = *n; } return curSchema; } void migrateCASchema(SQLite& db, Path schemaPath, AutoCloseFD& lockFd) { const int nixCASchemaVersion = 4; int curCASchema = getSchema(schemaPath); if (curCASchema != nixCASchemaVersion) { if (curCASchema > nixCASchemaVersion) { throw Error("current Nix store ca-schema is version %1%, but I only support %2%", curCASchema, nixCASchemaVersion); } if (!lockFile(lockFd.get(), ltWrite, false)) { printInfo("waiting for exclusive access to the Nix store for ca drvs..."); lockFile(lockFd.get(), ltNone, false); // We have acquired a shared lock; release it to prevent deadlocks lockFile(lockFd.get(), ltWrite, true); } if (curCASchema == 0) { static const char schema[] = #include "ca-specific-schema.sql.gen.hh" ; db.exec(schema); curCASchema = nixCASchemaVersion; } if (curCASchema < 4) throw Error("experimental CA schema version %d is no longer supported", curCASchema); writeFile(schemaPath, fmt("%d", nixCASchemaVersion), 0666, true); lockFile(lockFd.get(), ltRead, true); } } LocalStore::LocalStore( std::string_view scheme, PathView path, const Params & params) : StoreConfig(params) , LocalFSStoreConfig(path, params) , LocalStoreConfig(scheme, path, params) , Store(params) , LocalFSStore(params) , dbDir(stateDir + "/db") , linksDir(realStoreDir + "/.links") , reservedPath(dbDir + "/reserved") , schemaPath(dbDir + "/schema") , tempRootsDir(stateDir + "/temproots") , fnTempRoots(fmt("%s/%d", tempRootsDir, getpid())) , locksHeld(tokenizeString<PathSet>(getEnv("NIX_HELD_LOCKS").value_or(""))) { auto state(_state.lock()); state->stmts = std::make_unique<State::Stmts>(); /* Create missing state directories if they don't already exist. */ createDirs(realStoreDir); if (readOnly) { experimentalFeatureSettings.require(Xp::ReadOnlyLocalStore); } else { makeStoreWritable(); } createDirs(linksDir); Path profilesDir = stateDir + "/profiles"; createDirs(profilesDir); createDirs(tempRootsDir); createDirs(dbDir); Path gcRootsDir = stateDir + "/gcroots"; if (!pathExists(gcRootsDir)) { createDirs(gcRootsDir); createSymlink(profilesDir, gcRootsDir + "/profiles"); } for (auto & perUserDir : {profilesDir + "/per-user", gcRootsDir + "/per-user"}) { createDirs(perUserDir); if (!readOnly) { if (chmod(perUserDir.c_str(), 0755) == -1) throw SysError("could not set permissions on '%s' to 755", perUserDir); } } #ifndef _WIN32 /* Optionally, create directories and set permissions for a multi-user install. */ if (isRootUser() && settings.buildUsersGroup != "") { mode_t perm = 01775; struct group * gr = getgrnam(settings.buildUsersGroup.get().c_str()); if (!gr) printError("warning: the group '%1%' specified in 'build-users-group' does not exist", settings.buildUsersGroup); else if (!readOnly) { struct stat st; if (stat(realStoreDir.get().c_str(), &st)) throw SysError("getting attributes of path '%1%'", realStoreDir); if (st.st_uid != 0 || st.st_gid != gr->gr_gid || (st.st_mode & ~S_IFMT) != perm) { if (chown(realStoreDir.get().c_str(), 0, gr->gr_gid) == -1) throw SysError("changing ownership of path '%1%'", realStoreDir); if (chmod(realStoreDir.get().c_str(), perm) == -1) throw SysError("changing permissions on path '%1%'", realStoreDir); } } } #endif /* Ensure that the store and its parents are not symlinks. */ if (!settings.allowSymlinkedStore) { Path path = realStoreDir; struct stat st; while (path != "/") { st = lstat(path); if (S_ISLNK(st.st_mode)) throw Error( "the path '%1%' is a symlink; " "this is not allowed for the Nix store and its parent directories", path); path = dirOf(path); } } /* We can't open a SQLite database if the disk is full. Since this prevents the garbage collector from running when it's most needed, we reserve some dummy space that we can free just before doing a garbage collection. */ try { struct stat st; if (stat(reservedPath.c_str(), &st) == -1 || st.st_size != settings.reservedSize) { AutoCloseFD fd = toDescriptor(open(reservedPath.c_str(), O_WRONLY | O_CREAT #ifndef _WIN32 | O_CLOEXEC #endif , 0600)); int res = -1; #if HAVE_POSIX_FALLOCATE res = posix_fallocate(fd.get(), 0, settings.reservedSize); #endif if (res == -1) { writeFull(fd.get(), std::string(settings.reservedSize, 'X')); [[gnu::unused]] auto res2 = #ifdef _WIN32 SetEndOfFile(fd.get()) #else ftruncate(fd.get(), settings.reservedSize) #endif ; } } } catch (SystemError & e) { /* don't care about errors */ } /* Acquire the big fat lock in shared mode to make sure that no schema upgrade is in progress. */ if (!readOnly) { Path globalLockPath = dbDir + "/big-lock"; globalLock = openLockFile(globalLockPath.c_str(), true); } if (!readOnly && !lockFile(globalLock.get(), ltRead, false)) { printInfo("waiting for the big Nix store lock..."); lockFile(globalLock.get(), ltRead, true); } /* Check the current database schema and if necessary do an upgrade. */ int curSchema = getSchema(); if (readOnly && curSchema < nixSchemaVersion) { debug("current schema version: %d", curSchema); debug("supported schema version: %d", nixSchemaVersion); throw Error(curSchema == 0 ? "database does not exist, and cannot be created in read-only mode" : "database schema needs migrating, but this cannot be done in read-only mode"); } if (curSchema > nixSchemaVersion) throw Error("current Nix store schema is version %1%, but I only support %2%", curSchema, nixSchemaVersion); else if (curSchema == 0) { /* new store */ curSchema = nixSchemaVersion; openDB(*state, true); writeFile(schemaPath, fmt("%1%", nixSchemaVersion), 0666, true); } else if (curSchema < nixSchemaVersion) { if (curSchema < 5) throw Error( "Your Nix store has a database in Berkeley DB format,\n" "which is no longer supported. To convert to the new format,\n" "please upgrade Nix to version 0.12 first."); if (curSchema < 6) throw Error( "Your Nix store has a database in flat file format,\n" "which is no longer supported. To convert to the new format,\n" "please upgrade Nix to version 1.11 first."); if (!lockFile(globalLock.get(), ltWrite, false)) { printInfo("waiting for exclusive access to the Nix store..."); lockFile(globalLock.get(), ltNone, false); // We have acquired a shared lock; release it to prevent deadlocks lockFile(globalLock.get(), ltWrite, true); } /* Get the schema version again, because another process may have performed the upgrade already. */ curSchema = getSchema(); openDB(*state, false); if (curSchema < 8) { SQLiteTxn txn(state->db); state->db.exec("alter table ValidPaths add column ultimate integer"); state->db.exec("alter table ValidPaths add column sigs text"); txn.commit(); } if (curSchema < 9) { SQLiteTxn txn(state->db); state->db.exec("drop table FailedPaths"); txn.commit(); } if (curSchema < 10) { SQLiteTxn txn(state->db); state->db.exec("alter table ValidPaths add column ca text"); txn.commit(); } writeFile(schemaPath, fmt("%1%", nixSchemaVersion), 0666, true); lockFile(globalLock.get(), ltRead, true); } else openDB(*state, false); if (experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) { if (!readOnly) { migrateCASchema(state->db, dbDir + "/ca-schema", globalLock); } else { throw Error("need to migrate to content-addressed schema, but this cannot be done in read-only mode"); } } /* Prepare SQL statements. */ state->stmts->RegisterValidPath.create(state->db, "insert into ValidPaths (path, hash, registrationTime, deriver, narSize, ultimate, sigs, ca) values (?, ?, ?, ?, ?, ?, ?, ?);"); state->stmts->UpdatePathInfo.create(state->db, "update ValidPaths set narSize = ?, hash = ?, ultimate = ?, sigs = ?, ca = ? where path = ?;"); state->stmts->AddReference.create(state->db, "insert or replace into Refs (referrer, reference) values (?, ?);"); state->stmts->QueryPathInfo.create(state->db, "select id, hash, registrationTime, deriver, narSize, ultimate, sigs, ca from ValidPaths where path = ?;"); state->stmts->QueryReferences.create(state->db, "select path from Refs join ValidPaths on reference = id where referrer = ?;"); state->stmts->QueryReferrers.create(state->db, "select path from Refs join ValidPaths on referrer = id where reference = (select id from ValidPaths where path = ?);"); state->stmts->InvalidatePath.create(state->db, "delete from ValidPaths where path = ?;"); state->stmts->AddDerivationOutput.create(state->db, "insert or replace into DerivationOutputs (drv, id, path) values (?, ?, ?);"); state->stmts->QueryValidDerivers.create(state->db, "select v.id, v.path from DerivationOutputs d join ValidPaths v on d.drv = v.id where d.path = ?;"); state->stmts->QueryDerivationOutputs.create(state->db, "select id, path from DerivationOutputs where drv = ?;"); // Use "path >= ?" with limit 1 rather than "path like '?%'" to // ensure efficient lookup. state->stmts->QueryPathFromHashPart.create(state->db, "select path from ValidPaths where path >= ? limit 1;"); state->stmts->QueryValidPaths.create(state->db, "select path from ValidPaths"); if (experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) { state->stmts->RegisterRealisedOutput.create(state->db, R"( insert into Realisations (drvPath, outputName, outputPath, signatures) values (?, ?, (select id from ValidPaths where path = ?), ?) ; )"); state->stmts->UpdateRealisedOutput.create(state->db, R"( update Realisations set signatures = ? where drvPath = ? and outputName = ? ; )"); state->stmts->QueryRealisedOutput.create(state->db, R"( select Realisations.id, Output.path, Realisations.signatures from Realisations inner join ValidPaths as Output on Output.id = Realisations.outputPath where drvPath = ? and outputName = ? ; )"); state->stmts->QueryAllRealisedOutputs.create(state->db, R"( select outputName, Output.path from Realisations inner join ValidPaths as Output on Output.id = Realisations.outputPath where drvPath = ? ; )"); state->stmts->QueryRealisationReferences.create(state->db, R"( select drvPath, outputName from Realisations join RealisationsRefs on realisationReference = Realisations.id where referrer = ?; )"); state->stmts->AddRealisationReference.create(state->db, R"( insert or replace into RealisationsRefs (referrer, realisationReference) values ( (select id from Realisations where drvPath = ? and outputName = ?), (select id from Realisations where drvPath = ? and outputName = ?)); )"); } } LocalStore::LocalStore(const Params & params) : LocalStore("local", "", params) { } AutoCloseFD LocalStore::openGCLock() { Path fnGCLock = stateDir + "/gc.lock"; auto fdGCLock = open(fnGCLock.c_str(), O_RDWR | O_CREAT #ifndef _WIN32 | O_CLOEXEC #endif , 0600); if (!fdGCLock) throw SysError("opening global GC lock '%1%'", fnGCLock); return toDescriptor(fdGCLock); } void LocalStore::deleteStorePath(const Path & path, uint64_t & bytesFreed) { deletePath(path, bytesFreed); } LocalStore::~LocalStore() { std::shared_future<void> future; { auto state(_state.lock()); if (state->gcRunning) future = state->gcFuture; } if (future.valid()) { printInfo("waiting for auto-GC to finish on exit..."); future.get(); } try { auto fdTempRoots(_fdTempRoots.lock()); if (*fdTempRoots) { fdTempRoots->close(); unlink(fnTempRoots.c_str()); } } catch (...) { ignoreExceptionInDestructor(); } } std::string LocalStore::getUri() { return "local"; } int LocalStore::getSchema() { return nix::getSchema(schemaPath); } void LocalStore::openDB(State & state, bool create) { if (create && readOnly) { throw Error("cannot create database while in read-only mode"); } if (access(dbDir.c_str(), R_OK | (readOnly ? 0 : W_OK))) throw SysError("Nix database directory '%1%' is not writable", dbDir); /* Open the Nix database. */ std::string dbPath = dbDir + "/db.sqlite"; auto & db(state.db); auto openMode = readOnly ? SQLiteOpenMode::Immutable : create ? SQLiteOpenMode::Normal : SQLiteOpenMode::NoCreate; state.db = SQLite(dbPath, openMode); #ifdef __CYGWIN__ /* The cygwin version of sqlite3 has a patch which calls SetDllDirectory("/usr/bin") on init. It was intended to fix extension loading, which we don't use, and the effect of SetDllDirectory is inherited by child processes, and causes libraries to be loaded from /usr/bin instead of $PATH. This breaks quite a few things (e.g. checkPhase on openssh), so we set it back to default behaviour. */ SetDllDirectoryW(L""); #endif /* !!! check whether sqlite has been built with foreign key support */ /* Whether SQLite should fsync(). "Normal" synchronous mode should be safe enough. If the user asks for it, don't sync at all. This can cause database corruption if the system crashes. */ std::string syncMode = settings.fsyncMetadata ? "normal" : "off"; db.exec("pragma synchronous = " + syncMode); /* Set the SQLite journal mode. WAL mode is fastest, so it's the default. */ std::string mode = settings.useSQLiteWAL ? "wal" : "truncate"; std::string prevMode; { SQLiteStmt stmt; stmt.create(db, "pragma main.journal_mode;"); if (sqlite3_step(stmt) != SQLITE_ROW) SQLiteError::throw_(db, "querying journal mode"); prevMode = std::string((const char *) sqlite3_column_text(stmt, 0)); } if (prevMode != mode && sqlite3_exec(db, ("pragma main.journal_mode = " + mode + ";").c_str(), 0, 0, 0) != SQLITE_OK) SQLiteError::throw_(db, "setting journal mode"); if (mode == "wal") { /* persist the WAL files when the db connection is closed. This allows for read-only connections without write permissions on the containing directory to succeed on a closed db. Setting the journal_size_limit to 2^40 bytes results in the WAL files getting truncated to 0 on exit and limits the on disk size of the WAL files to 2^40 bytes following a checkpoint */ if (sqlite3_exec(db, "pragma main.journal_size_limit = 1099511627776;", 0, 0, 0) == SQLITE_OK) { int enable = 1; sqlite3_file_control(db, NULL, SQLITE_FCNTL_PERSIST_WAL, &enable); } } /* Increase the auto-checkpoint interval to 40000 pages. This seems enough to ensure that instantiating the NixOS system derivation is done in a single fsync(). */ if (mode == "wal" && sqlite3_exec(db, "pragma wal_autocheckpoint = 40000;", 0, 0, 0) != SQLITE_OK) SQLiteError::throw_(db, "setting autocheckpoint interval"); /* Initialise the database schema, if necessary. */ if (create) { static const char schema[] = #include "schema.sql.gen.hh" ; db.exec(schema); } } /* To improve purity, users may want to make the Nix store a read-only bind mount. So make the Nix store writable for this process. */ void LocalStore::makeStoreWritable() { #if __linux__ if (!isRootUser()) return; /* Check if /nix/store is on a read-only mount. */ struct statvfs stat; if (statvfs(realStoreDir.get().c_str(), &stat) != 0) throw SysError("getting info about the Nix store mount point"); if (stat.f_flag & ST_RDONLY) { if (mount(0, realStoreDir.get().c_str(), "none", MS_REMOUNT | MS_BIND, 0) == -1) throw SysError("remounting %1% writable", realStoreDir); } #endif } void LocalStore::registerDrvOutput(const Realisation & info, CheckSigsFlag checkSigs) { experimentalFeatureSettings.require(Xp::CaDerivations); if (checkSigs == NoCheckSigs || !realisationIsUntrusted(info)) registerDrvOutput(info); else throw Error("cannot register realisation '%s' because it lacks a signature by a trusted key", info.outPath.to_string()); } void LocalStore::registerDrvOutput(const Realisation & info) { experimentalFeatureSettings.require(Xp::CaDerivations); retrySQLite<void>([&]() { auto state(_state.lock()); if (auto oldR = queryRealisation_(*state, info.id)) { if (info.isCompatibleWith(*oldR)) { auto combinedSignatures = oldR->signatures; combinedSignatures.insert(info.signatures.begin(), info.signatures.end()); state->stmts->UpdateRealisedOutput.use() (concatStringsSep(" ", combinedSignatures)) (info.id.strHash()) (info.id.outputName) .exec(); } else { throw Error("Trying to register a realisation of '%s', but we already " "have another one locally.\n" "Local: %s\n" "Remote: %s", info.id.to_string(), printStorePath(oldR->outPath), printStorePath(info.outPath) ); } } else { state->stmts->RegisterRealisedOutput.use() (info.id.strHash()) (info.id.outputName) (printStorePath(info.outPath)) (concatStringsSep(" ", info.signatures)) .exec(); } for (auto & [outputId, depPath] : info.dependentRealisations) { auto localRealisation = queryRealisationCore_(*state, outputId); if (!localRealisation) throw Error("unable to register the derivation '%s' as it " "depends on the non existent '%s'", info.id.to_string(), outputId.to_string()); if (localRealisation->second.outPath != depPath) throw Error("unable to register the derivation '%s' as it " "depends on a realisation of '%s' that doesn’t" "match what we have locally", info.id.to_string(), outputId.to_string()); state->stmts->AddRealisationReference.use() (info.id.strHash()) (info.id.outputName) (outputId.strHash()) (outputId.outputName) .exec(); } }); } void LocalStore::cacheDrvOutputMapping( State & state, const uint64_t deriver, const std::string & outputName, const StorePath & output) { retrySQLite<void>([&]() { state.stmts->AddDerivationOutput.use() (deriver) (outputName) (printStorePath(output)) .exec(); }); } uint64_t LocalStore::addValidPath(State & state, const ValidPathInfo & info, bool checkOutputs) { if (info.ca.has_value() && !info.isContentAddressed(*this)) throw Error("cannot add path '%s' to the Nix store because it claims to be content-addressed but isn't", printStorePath(info.path)); state.stmts->RegisterValidPath.use() (printStorePath(info.path)) (info.narHash.to_string(HashFormat::Base16, true)) (info.registrationTime == 0 ? time(0) : info.registrationTime) (info.deriver ? printStorePath(*info.deriver) : "", (bool) info.deriver) (info.narSize, info.narSize != 0) (info.ultimate ? 1 : 0, info.ultimate) (concatStringsSep(" ", info.sigs), !info.sigs.empty()) (renderContentAddress(info.ca), (bool) info.ca) .exec(); uint64_t id = state.db.getLastInsertedRowId(); /* If this is a derivation, then store the derivation outputs in the database. This is useful for the garbage collector: it can efficiently query whether a path is an output of some derivation. */ if (info.path.isDerivation()) { auto drv = readInvalidDerivation(info.path); /* Verify that the output paths in the derivation are correct (i.e., follow the scheme for computing output paths from derivations). Note that if this throws an error, then the DB transaction is rolled back, so the path validity registration above is undone. */ if (checkOutputs) drv.checkInvariants(*this, info.path); for (auto & i : drv.outputsAndOptPaths(*this)) { /* Floating CA derivations have indeterminate output paths until they are built, so don't register anything in that case */ if (i.second.second) cacheDrvOutputMapping(state, id, i.first, *i.second.second); } } { auto state_(Store::state.lock()); state_->pathInfoCache.upsert(std::string(info.path.to_string()), PathInfoCacheValue{ .value = std::make_shared<const ValidPathInfo>(info) }); } return id; } void LocalStore::queryPathInfoUncached(const StorePath & path, Callback<std::shared_ptr<const ValidPathInfo>> callback) noexcept { try { callback(retrySQLite<std::shared_ptr<const ValidPathInfo>>([&]() { auto state(_state.lock()); return queryPathInfoInternal(*state, path); })); } catch (...) { callback.rethrow(); } } std::shared_ptr<const ValidPathInfo> LocalStore::queryPathInfoInternal(State & state, const StorePath & path) { /* Get the path info. */ auto useQueryPathInfo(state.stmts->QueryPathInfo.use()(printStorePath(path))); if (!useQueryPathInfo.next()) return std::shared_ptr<ValidPathInfo>(); auto id = useQueryPathInfo.getInt(0); auto narHash = Hash::dummy; try { narHash = Hash::parseAnyPrefixed(useQueryPathInfo.getStr(1)); } catch (BadHash & e) { throw Error("invalid-path entry for '%s': %s", printStorePath(path), e.what()); } auto info = std::make_shared<ValidPathInfo>(path, narHash); info->id = id; info->registrationTime = useQueryPathInfo.getInt(2); auto s = (const char *) sqlite3_column_text(state.stmts->QueryPathInfo, 3); if (s) info->deriver = parseStorePath(s); /* Note that narSize = NULL yields 0. */ info->narSize = useQueryPathInfo.getInt(4); info->ultimate = useQueryPathInfo.getInt(5) == 1; s = (const char *) sqlite3_column_text(state.stmts->QueryPathInfo, 6); if (s) info->sigs = tokenizeString<StringSet>(s, " "); s = (const char *) sqlite3_column_text(state.stmts->QueryPathInfo, 7); if (s) info->ca = ContentAddress::parseOpt(s); /* Get the references. */ auto useQueryReferences(state.stmts->QueryReferences.use()(info->id)); while (useQueryReferences.next()) info->references.insert(parseStorePath(useQueryReferences.getStr(0))); return info; } /* Update path info in the database. */ void LocalStore::updatePathInfo(State & state, const ValidPathInfo & info) { state.stmts->UpdatePathInfo.use() (info.narSize, info.narSize != 0) (info.narHash.to_string(HashFormat::Base16, true)) (info.ultimate ? 1 : 0, info.ultimate) (concatStringsSep(" ", info.sigs), !info.sigs.empty()) (renderContentAddress(info.ca), (bool) info.ca) (printStorePath(info.path)) .exec(); } uint64_t LocalStore::queryValidPathId(State & state, const StorePath & path) { auto use(state.stmts->QueryPathInfo.use()(printStorePath(path))); if (!use.next()) throw InvalidPath("path '%s' is not valid", printStorePath(path)); return use.getInt(0); } bool LocalStore::isValidPath_(State & state, const StorePath & path) { return state.stmts->QueryPathInfo.use()(printStorePath(path)).next(); } bool LocalStore::isValidPathUncached(const StorePath & path) { return retrySQLite<bool>([&]() { auto state(_state.lock()); return isValidPath_(*state, path); }); } StorePathSet LocalStore::queryValidPaths(const StorePathSet & paths, SubstituteFlag maybeSubstitute) { StorePathSet res; for (auto & i : paths) if (isValidPath(i)) res.insert(i); return res; } StorePathSet LocalStore::queryAllValidPaths() { return retrySQLite<StorePathSet>([&]() { auto state(_state.lock()); auto use(state->stmts->QueryValidPaths.use()); StorePathSet res; while (use.next()) res.insert(parseStorePath(use.getStr(0))); return res; }); } void LocalStore::queryReferrers(State & state, const StorePath & path, StorePathSet & referrers) { auto useQueryReferrers(state.stmts->QueryReferrers.use()(printStorePath(path))); while (useQueryReferrers.next()) referrers.insert(parseStorePath(useQueryReferrers.getStr(0))); } void LocalStore::queryReferrers(const StorePath & path, StorePathSet & referrers) { return retrySQLite<void>([&]() { auto state(_state.lock()); queryReferrers(*state, path, referrers); }); } StorePathSet LocalStore::queryValidDerivers(const StorePath & path) { return retrySQLite<StorePathSet>([&]() { auto state(_state.lock()); auto useQueryValidDerivers(state->stmts->QueryValidDerivers.use()(printStorePath(path))); StorePathSet derivers; while (useQueryValidDerivers.next()) derivers.insert(parseStorePath(useQueryValidDerivers.getStr(1))); return derivers; }); } std::map<std::string, std::optional<StorePath>> LocalStore::queryStaticPartialDerivationOutputMap(const StorePath & path) { return retrySQLite<std::map<std::string, std::optional<StorePath>>>([&]() { auto state(_state.lock()); std::map<std::string, std::optional<StorePath>> outputs; uint64_t drvId; drvId = queryValidPathId(*state, path); auto use(state->stmts->QueryDerivationOutputs.use()(drvId)); while (use.next()) outputs.insert_or_assign( use.getStr(0), parseStorePath(use.getStr(1))); return outputs; }); } std::optional<StorePath> LocalStore::queryPathFromHashPart(const std::string & hashPart) { if (hashPart.size() != StorePath::HashLen) throw Error("invalid hash part"); Path prefix = storeDir + "/" + hashPart; return retrySQLite<std::optional<StorePath>>([&]() -> std::optional<StorePath> { auto state(_state.lock()); auto useQueryPathFromHashPart(state->stmts->QueryPathFromHashPart.use()(prefix)); if (!useQueryPathFromHashPart.next()) return {}; const char * s = (const char *) sqlite3_column_text(state->stmts->QueryPathFromHashPart, 0); if (s && prefix.compare(0, prefix.size(), s, prefix.size()) == 0) return parseStorePath(s); return {}; }); } StorePathSet LocalStore::querySubstitutablePaths(const StorePathSet & paths) { if (!settings.useSubstitutes) return StorePathSet(); StorePathSet remaining; for (auto & i : paths) remaining.insert(i); StorePathSet res; for (auto & sub : getDefaultSubstituters()) { if (remaining.empty()) break; if (sub->storeDir != storeDir) continue; if (!sub->wantMassQuery) continue; auto valid = sub->queryValidPaths(remaining); StorePathSet remaining2; for (auto & path : remaining) if (valid.count(path)) res.insert(path); else remaining2.insert(path); std::swap(remaining, remaining2); } return res; } void LocalStore::registerValidPath(const ValidPathInfo & info) { registerValidPaths({{info.path, info}}); } void LocalStore::registerValidPaths(const ValidPathInfos & infos) { #ifndef _WIN32 /* SQLite will fsync by default, but the new valid paths may not be fsync-ed. So some may want to fsync them before registering the validity, at the expense of some speed of the path registering operation. */ if (settings.syncBeforeRegistering) sync(); #endif return retrySQLite<void>([&]() { auto state(_state.lock()); SQLiteTxn txn(state->db); StorePathSet paths; for (auto & [_, i] : infos) { assert(i.narHash.algo == HashAlgorithm::SHA256); if (isValidPath_(*state, i.path)) updatePathInfo(*state, i); else addValidPath(*state, i, false); paths.insert(i.path); } for (auto & [_, i] : infos) { auto referrer = queryValidPathId(*state, i.path); for (auto & j : i.references) state->stmts->AddReference.use()(referrer)(queryValidPathId(*state, j)).exec(); } /* Check that the derivation outputs are correct. We can't do this in addValidPath() above, because the references might not be valid yet. */ for (auto & [_, i] : infos) if (i.path.isDerivation()) { // FIXME: inefficient; we already loaded the derivation in addValidPath(). readInvalidDerivation(i.path).checkInvariants(*this, i.path); } /* Do a topological sort of the paths. This will throw an error if a cycle is detected and roll back the transaction. Cycles can only occur when a derivation has multiple outputs. */ topoSort(paths, {[&](const StorePath & path) { auto i = infos.find(path); return i == infos.end() ? StorePathSet() : i->second.references; }}, {[&](const StorePath & path, const StorePath & parent) { return BuildError( "cycle detected in the references of '%s' from '%s'", printStorePath(path), printStorePath(parent)); }}); txn.commit(); }); } /* Invalidate a path. The caller is responsible for checking that there are no referrers. */ void LocalStore::invalidatePath(State & state, const StorePath & path) { debug("invalidating path '%s'", printStorePath(path)); state.stmts->InvalidatePath.use()(printStorePath(path)).exec(); /* Note that the foreign key constraints on the Refs table take care of deleting the references entries for `path'. */ { auto state_(Store::state.lock()); state_->pathInfoCache.erase(std::string(path.to_string())); } } const PublicKeys & LocalStore::getPublicKeys() { auto state(_state.lock()); if (!state->publicKeys) state->publicKeys = std::make_unique<PublicKeys>(getDefaultPublicKeys()); return *state->publicKeys; } bool LocalStore::pathInfoIsUntrusted(const ValidPathInfo & info) { return requireSigs && !info.checkSignatures(*this, getPublicKeys()); } bool LocalStore::realisationIsUntrusted(const Realisation & realisation) { return requireSigs && !realisation.checkSignatures(getPublicKeys()); } void LocalStore::addToStore(const ValidPathInfo & info, Source & source, RepairFlag repair, CheckSigsFlag checkSigs) { if (checkSigs && pathInfoIsUntrusted(info)) throw Error("cannot add path '%s' because it lacks a signature by a trusted key", printStorePath(info.path)); { /* In case we are not interested in reading the NAR: discard it. */ bool narRead = false; Finally cleanup = [&]() { if (!narRead) { NullFileSystemObjectSink sink; try { parseDump(sink, source); } catch (...) { // TODO: should Interrupted be handled here? ignoreExceptionInDestructor(); } } }; addTempRoot(info.path); if (repair || !isValidPath(info.path)) { PathLocks outputLock; auto realPath = Store::toRealPath(info.path); /* Lock the output path. But don't lock if we're being called from a build hook (whose parent process already acquired a lock on this path). */ if (!locksHeld.count(printStorePath(info.path))) outputLock.lockPaths({realPath}); if (repair || !isValidPath(info.path)) { deletePath(realPath); /* While restoring the path from the NAR, compute the hash of the NAR. */ HashSink hashSink(HashAlgorithm::SHA256); TeeSource wrapperSource { source, hashSink }; narRead = true; restorePath(realPath, wrapperSource, settings.fsyncStorePaths); auto hashResult = hashSink.finish(); if (hashResult.first != info.narHash) throw Error("hash mismatch importing path '%s';\n specified: %s\n got: %s", printStorePath(info.path), info.narHash.to_string(HashFormat::Nix32, true), hashResult.first.to_string(HashFormat::Nix32, true)); if (hashResult.second != info.narSize) throw Error("size mismatch importing path '%s';\n specified: %s\n got: %s", printStorePath(info.path), info.narSize, hashResult.second); if (info.ca) { auto & specified = *info.ca; auto actualHash = ({ auto accessor = getFSAccessor(false); CanonPath path { printStorePath(info.path) }; Hash h { HashAlgorithm::SHA256 }; // throwaway def to appease C++ auto fim = specified.method.getFileIngestionMethod(); switch (fim) { case FileIngestionMethod::Flat: case FileIngestionMethod::NixArchive: { HashModuloSink caSink { specified.hash.algo, std::string { info.path.hashPart() }, }; dumpPath({accessor, path}, caSink, (FileSerialisationMethod) fim); h = caSink.finish().first; break; } case FileIngestionMethod::Git: h = git::dumpHash(specified.hash.algo, {accessor, path}).hash; break; } ContentAddress { .method = specified.method, .hash = std::move(h), }; }); if (specified.hash != actualHash.hash) { throw Error("ca hash mismatch importing path '%s';\n specified: %s\n got: %s", printStorePath(info.path), specified.hash.to_string(HashFormat::Nix32, true), actualHash.hash.to_string(HashFormat::Nix32, true)); } } autoGC(); canonicalisePathMetaData(realPath); optimisePath(realPath, repair); // FIXME: combine with hashPath() if (settings.fsyncStorePaths) { recursiveSync(realPath); syncParent(realPath); } registerValidPath(info); } outputLock.setDeletion(true); } } // In case `cleanup` ignored an `Interrupted` exception checkInterrupt(); } StorePath LocalStore::addToStoreFromDump( Source & source0, std::string_view name, FileSerialisationMethod dumpMethod, ContentAddressMethod hashMethod, HashAlgorithm hashAlgo, const StorePathSet & references, RepairFlag repair) { /* For computing the store path. */ auto hashSink = std::make_unique<HashSink>(hashAlgo); TeeSource source { source0, *hashSink }; /* Read the source path into memory, but only if it's up to narBufferSize bytes. If it's larger, write it to a temporary location in the Nix store. If the subsequently computed destination store path is already valid, we just delete the temporary path. Otherwise, we move it to the destination store path. */ bool inMemory = false; struct Free { void operator()(void* v) { free(v); } }; std::unique_ptr<char, Free> dumpBuffer(nullptr); std::string_view dump; /* Fill out buffer, and decide whether we are working strictly in memory based on whether we break out because the buffer is full or the original source is empty */ while (dump.size() < settings.narBufferSize) { auto oldSize = dump.size(); constexpr size_t chunkSize = 65536; auto want = std::min(chunkSize, settings.narBufferSize - oldSize); if (auto tmp = realloc(dumpBuffer.get(), oldSize + want)) { dumpBuffer.release(); dumpBuffer.reset((char*) tmp); } else { throw std::bad_alloc(); } auto got = 0; Finally cleanup([&]() { dump = {dumpBuffer.get(), dump.size() + got}; }); try { got = source.read(dumpBuffer.get() + oldSize, want); } catch (EndOfFile &) { inMemory = true; break; } } std::unique_ptr<AutoDelete> delTempDir; std::filesystem::path tempPath; std::filesystem::path tempDir; AutoCloseFD tempDirFd; bool methodsMatch = static_cast<FileIngestionMethod>(dumpMethod) == hashMethod.getFileIngestionMethod(); /* If the methods don't match, our streaming hash of the dump is the wrong sort, and we need to rehash. */ bool inMemoryAndDontNeedRestore = inMemory && methodsMatch; if (!inMemoryAndDontNeedRestore) { /* Drain what we pulled so far, and then keep on pulling */ StringSource dumpSource { dump }; ChainSource bothSource { dumpSource, source }; std::tie(tempDir, tempDirFd) = createTempDirInStore(); delTempDir = std::make_unique<AutoDelete>(tempDir); tempPath = tempDir / "x"; restorePath(tempPath.string(), bothSource, dumpMethod, settings.fsyncStorePaths); dumpBuffer.reset(); dump = {}; } auto [dumpHash, size] = hashSink->finish(); auto desc = ContentAddressWithReferences::fromParts( hashMethod, methodsMatch ? dumpHash : hashPath( PosixSourceAccessor::createAtRoot(tempPath), hashMethod.getFileIngestionMethod(), hashAlgo).first, { .others = references, // caller is not capable of creating a self-reference, because this is content-addressed without modulus .self = false, }); auto dstPath = makeFixedOutputPathFromCA(name, desc); addTempRoot(dstPath); if (repair || !isValidPath(dstPath)) { /* The first check above is an optimisation to prevent unnecessary lock acquisition. */ auto realPath = Store::toRealPath(dstPath); PathLocks outputLock({realPath}); if (repair || !isValidPath(dstPath)) { deletePath(realPath); autoGC(); if (inMemoryAndDontNeedRestore) { StringSource dumpSource { dump }; /* Restore from the buffer in memory. */ auto fim = hashMethod.getFileIngestionMethod(); switch (fim) { case FileIngestionMethod::Flat: case FileIngestionMethod::NixArchive: restorePath(realPath, dumpSource, (FileSerialisationMethod) fim, settings.fsyncStorePaths); break; case FileIngestionMethod::Git: // doesn't correspond to serialization method, so // this should be unreachable assert(false); } } else { /* Move the temporary path we restored above. */ moveFile(tempPath.string(), realPath); } /* For computing the nar hash. In recursive SHA-256 mode, this is the same as the store hash, so no need to do it again. */ auto narHash = std::pair { dumpHash, size }; if (dumpMethod != FileSerialisationMethod::NixArchive || hashAlgo != HashAlgorithm::SHA256) { HashSink narSink { HashAlgorithm::SHA256 }; dumpPath(realPath, narSink); narHash = narSink.finish(); } canonicalisePathMetaData(realPath); // FIXME: merge into restorePath optimisePath(realPath, repair); if (settings.fsyncStorePaths) { recursiveSync(realPath); syncParent(realPath); } ValidPathInfo info { *this, name, std::move(desc), narHash.first }; info.narSize = narHash.second; registerValidPath(info); } outputLock.setDeletion(true); } return dstPath; } /* Create a temporary directory in the store that won't be garbage-collected until the returned FD is closed. */ std::pair<std::filesystem::path, AutoCloseFD> LocalStore::createTempDirInStore() { std::filesystem::path tmpDirFn; AutoCloseFD tmpDirFd; bool lockedByUs = false; do { /* There is a slight possibility that `tmpDir' gets deleted by the GC between createTempDir() and when we acquire a lock on it. We'll repeat until 'tmpDir' exists and we've locked it. */ tmpDirFn = createTempDir(realStoreDir, "tmp"); tmpDirFd = openDirectory(tmpDirFn); if (!tmpDirFd) { continue; } lockedByUs = lockFile(tmpDirFd.get(), ltWrite, true); } while (!pathExists(tmpDirFn.string()) || !lockedByUs); return {tmpDirFn, std::move(tmpDirFd)}; } void LocalStore::invalidatePathChecked(const StorePath & path) { retrySQLite<void>([&]() { auto state(_state.lock()); SQLiteTxn txn(state->db); if (isValidPath_(*state, path)) { StorePathSet referrers; queryReferrers(*state, path, referrers); referrers.erase(path); /* ignore self-references */ if (!referrers.empty()) throw PathInUse("cannot delete path '%s' because it is in use by %s", printStorePath(path), showPaths(referrers)); invalidatePath(*state, path); } txn.commit(); }); } bool LocalStore::verifyStore(bool checkContents, RepairFlag repair) { printInfo("reading the Nix store..."); /* Acquire the global GC lock to get a consistent snapshot of existing and valid paths. */ auto fdGCLock = openGCLock(); FdLock gcLock(fdGCLock.get(), ltRead, true, "waiting for the big garbage collector lock..."); auto [errors, validPaths] = verifyAllValidPaths(repair); /* Optionally, check the content hashes (slow). */ if (checkContents) { printInfo("checking link hashes..."); for (auto & link : std::filesystem::directory_iterator{linksDir}) { checkInterrupt(); auto name = link.path().filename(); printMsg(lvlTalkative, "checking contents of '%s'", name); PosixSourceAccessor accessor; std::string hash = hashPath( PosixSourceAccessor::createAtRoot(link.path()), FileIngestionMethod::NixArchive, HashAlgorithm::SHA256).first.to_string(HashFormat::Nix32, false); if (hash != name.string()) { printError("link '%s' was modified! expected hash '%s', got '%s'", link.path(), name, hash); if (repair) { std::filesystem::remove(link.path()); printInfo("removed link '%s'", link.path()); } else { errors = true; } } } printInfo("checking store hashes..."); Hash nullHash(HashAlgorithm::SHA256); for (auto & i : validPaths) { try { auto info = std::const_pointer_cast<ValidPathInfo>(std::shared_ptr<const ValidPathInfo>(queryPathInfo(i))); /* Check the content hash (optionally - slow). */ printMsg(lvlTalkative, "checking contents of '%s'", printStorePath(i)); auto hashSink = HashSink(info->narHash.algo); dumpPath(Store::toRealPath(i), hashSink); auto current = hashSink.finish(); if (info->narHash != nullHash && info->narHash != current.first) { printError("path '%s' was modified! expected hash '%s', got '%s'", printStorePath(i), info->narHash.to_string(HashFormat::Nix32, true), current.first.to_string(HashFormat::Nix32, true)); if (repair) repairPath(i); else errors = true; } else { bool update = false; /* Fill in missing hashes. */ if (info->narHash == nullHash) { printInfo("fixing missing hash on '%s'", printStorePath(i)); info->narHash = current.first; update = true; } /* Fill in missing narSize fields (from old stores). */ if (info->narSize == 0) { printInfo("updating size field on '%s' to %s", printStorePath(i), current.second); info->narSize = current.second; update = true; } if (update) { auto state(_state.lock()); updatePathInfo(*state, *info); } } } catch (Error & e) { /* It's possible that the path got GC'ed, so ignore errors on invalid paths. */ if (isValidPath(i)) logError(e.info()); else warn(e.msg()); errors = true; } } } return errors; } LocalStore::VerificationResult LocalStore::verifyAllValidPaths(RepairFlag repair) { StorePathSet storePathsInStoreDir; /* Why aren't we using `queryAllValidPaths`? Because that would tell us about all the paths than the database knows about. Here we want to know about all the store paths in the store directory, regardless of what the database thinks. We will end up cross-referencing these two sources of truth (the database and the filesystem) in the loop below, in order to catch invalid states. */ for (auto & i : std::filesystem::directory_iterator{realStoreDir.to_string()}) { checkInterrupt(); try { storePathsInStoreDir.insert({i.path().filename().string()}); } catch (BadStorePath &) { } } /* Check whether all valid paths actually exist. */ printInfo("checking path existence..."); StorePathSet done; auto existsInStoreDir = [&](const StorePath & storePath) { return storePathsInStoreDir.count(storePath); }; bool errors = false; StorePathSet validPaths; for (auto & i : queryAllValidPaths()) verifyPath(i, existsInStoreDir, done, validPaths, repair, errors); return { .errors = errors, .validPaths = validPaths, }; } void LocalStore::verifyPath(const StorePath & path, std::function<bool(const StorePath &)> existsInStoreDir, StorePathSet & done, StorePathSet & validPaths, RepairFlag repair, bool & errors) { checkInterrupt(); if (!done.insert(path).second) return; if (!existsInStoreDir(path)) { /* Check any referrers first. If we can invalidate them first, then we can invalidate this path as well. */ bool canInvalidate = true; StorePathSet referrers; queryReferrers(path, referrers); for (auto & i : referrers) if (i != path) { verifyPath(i, existsInStoreDir, done, validPaths, repair, errors); if (validPaths.count(i)) canInvalidate = false; } auto pathS = printStorePath(path); if (canInvalidate) { printInfo("path '%s' disappeared, removing from database...", pathS); auto state(_state.lock()); invalidatePath(*state, path); } else { printError("path '%s' disappeared, but it still has valid referrers!", pathS); if (repair) try { repairPath(path); } catch (Error & e) { logWarning(e.info()); errors = true; } else errors = true; } return; } validPaths.insert(std::move(path)); } unsigned int LocalStore::getProtocol() { return PROTOCOL_VERSION; } std::optional<TrustedFlag> LocalStore::isTrustedClient() { return Trusted; } void LocalStore::vacuumDB() { auto state(_state.lock()); state->db.exec("vacuum"); } void LocalStore::addSignatures(const StorePath & storePath, const StringSet & sigs) { retrySQLite<void>([&]() { auto state(_state.lock()); SQLiteTxn txn(state->db); auto info = std::const_pointer_cast<ValidPathInfo>(queryPathInfoInternal(*state, storePath)); info->sigs.insert(sigs.begin(), sigs.end()); updatePathInfo(*state, *info); txn.commit(); }); } void LocalStore::signRealisation(Realisation & realisation) { // FIXME: keep secret keys in memory. auto secretKeyFiles = settings.secretKeyFiles; for (auto & secretKeyFile : secretKeyFiles.get()) { SecretKey secretKey(readFile(secretKeyFile)); LocalSigner signer(std::move(secretKey)); realisation.sign(signer); } } void LocalStore::signPathInfo(ValidPathInfo & info) { // FIXME: keep secret keys in memory. auto secretKeyFiles = settings.secretKeyFiles; for (auto & secretKeyFile : secretKeyFiles.get()) { SecretKey secretKey(readFile(secretKeyFile)); LocalSigner signer(std::move(secretKey)); info.sign(*this, signer); } } std::optional<std::pair<int64_t, Realisation>> LocalStore::queryRealisationCore_( LocalStore::State & state, const DrvOutput & id) { auto useQueryRealisedOutput( state.stmts->QueryRealisedOutput.use() (id.strHash()) (id.outputName)); if (!useQueryRealisedOutput.next()) return std::nullopt; auto realisationDbId = useQueryRealisedOutput.getInt(0); auto outputPath = parseStorePath(useQueryRealisedOutput.getStr(1)); auto signatures = tokenizeString<StringSet>(useQueryRealisedOutput.getStr(2)); return {{ realisationDbId, Realisation{ .id = id, .outPath = outputPath, .signatures = signatures, } }}; } std::optional<const Realisation> LocalStore::queryRealisation_( LocalStore::State & state, const DrvOutput & id) { auto maybeCore = queryRealisationCore_(state, id); if (!maybeCore) return std::nullopt; auto [realisationDbId, res] = *maybeCore; std::map<DrvOutput, StorePath> dependentRealisations; auto useRealisationRefs( state.stmts->QueryRealisationReferences.use() (realisationDbId)); while (useRealisationRefs.next()) { auto depId = DrvOutput { Hash::parseAnyPrefixed(useRealisationRefs.getStr(0)), useRealisationRefs.getStr(1), }; auto dependentRealisation = queryRealisationCore_(state, depId); assert(dependentRealisation); // Enforced by the db schema auto outputPath = dependentRealisation->second.outPath; dependentRealisations.insert({depId, outputPath}); } res.dependentRealisations = dependentRealisations; return { res }; } void LocalStore::queryRealisationUncached(const DrvOutput & id, Callback<std::shared_ptr<const Realisation>> callback) noexcept { try { auto maybeRealisation = retrySQLite<std::optional<const Realisation>>([&]() { auto state(_state.lock()); return queryRealisation_(*state, id); }); if (maybeRealisation) callback( std::make_shared<const Realisation>(maybeRealisation.value())); else callback(nullptr); } catch (...) { callback.rethrow(); } } void LocalStore::addBuildLog(const StorePath & drvPath, std::string_view log) { assert(drvPath.isDerivation()); auto baseName = drvPath.to_string(); auto logPath = fmt("%s/%s/%s/%s.bz2", logDir, drvsLogDir, baseName.substr(0, 2), baseName.substr(2)); if (pathExists(logPath)) return; createDirs(dirOf(logPath)); auto tmpFile = fmt("%s.tmp.%d", logPath, getpid()); writeFile(tmpFile, compress("bzip2", log)); std::filesystem::rename(tmpFile, logPath); } std::optional<std::string> LocalStore::getVersion() { return nixVersion; } static RegisterStoreImplementation<LocalStore, LocalStoreConfig> regLocalStore; } // namespace nix
58,209
C++
.cc
1,411
31.953933
161
0.606875
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,819
dummy-store.cc
NixOS_nix/src/libstore/dummy-store.cc
#include "store-api.hh" #include "callback.hh" namespace nix { struct DummyStoreConfig : virtual StoreConfig { using StoreConfig::StoreConfig; DummyStoreConfig(std::string_view scheme, std::string_view authority, const Params & params) : StoreConfig(params) { if (!authority.empty()) throw UsageError("`%s` store URIs must not contain an authority part %s", scheme, authority); } const std::string name() override { return "Dummy Store"; } std::string doc() override { return #include "dummy-store.md" ; } static std::set<std::string> uriSchemes() { return {"dummy"}; } }; struct DummyStore : public virtual DummyStoreConfig, public virtual Store { DummyStore(std::string_view scheme, std::string_view authority, const Params & params) : StoreConfig(params) , DummyStoreConfig(scheme, authority, params) , Store(params) { } DummyStore(const Params & params) : DummyStore("dummy", "", params) { } std::string getUri() override { return *uriSchemes().begin(); } void queryPathInfoUncached(const StorePath & path, Callback<std::shared_ptr<const ValidPathInfo>> callback) noexcept override { callback(nullptr); } /** * The dummy store is incapable of *not* trusting! :) */ virtual std::optional<TrustedFlag> isTrustedClient() override { return Trusted; } std::optional<StorePath> queryPathFromHashPart(const std::string & hashPart) override { unsupported("queryPathFromHashPart"); } void addToStore(const ValidPathInfo & info, Source & source, RepairFlag repair, CheckSigsFlag checkSigs) override { unsupported("addToStore"); } virtual StorePath addToStoreFromDump( Source & dump, std::string_view name, FileSerialisationMethod dumpMethod = FileSerialisationMethod::NixArchive, ContentAddressMethod hashMethod = FileIngestionMethod::NixArchive, HashAlgorithm hashAlgo = HashAlgorithm::SHA256, const StorePathSet & references = StorePathSet(), RepairFlag repair = NoRepair) override { unsupported("addToStore"); } void narFromPath(const StorePath & path, Sink & sink) override { unsupported("narFromPath"); } void queryRealisationUncached(const DrvOutput &, Callback<std::shared_ptr<const Realisation>> callback) noexcept override { callback(nullptr); } virtual ref<SourceAccessor> getFSAccessor(bool requireValidPath) override { unsupported("getFSAccessor"); } }; static RegisterStoreImplementation<DummyStore, DummyStoreConfig> regDummyStore; }
2,715
C++
.cc
72
31.527778
105
0.691311
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,820
s3-binary-cache-store.cc
NixOS_nix/src/libstore/s3-binary-cache-store.cc
#if ENABLE_S3 #include <assert.h> #include "s3.hh" #include "s3-binary-cache-store.hh" #include "nar-info.hh" #include "nar-info-disk-cache.hh" #include "globals.hh" #include "compression.hh" #include "filetransfer.hh" #include "signals.hh" #include <aws/core/Aws.h> #include <aws/core/VersionConfig.h> #include <aws/core/auth/AWSCredentialsProvider.h> #include <aws/core/auth/AWSCredentialsProviderChain.h> #include <aws/core/client/ClientConfiguration.h> #include <aws/core/client/DefaultRetryStrategy.h> #include <aws/core/utils/logging/FormattedLogSystem.h> #include <aws/core/utils/logging/LogMacros.h> #include <aws/core/utils/threading/Executor.h> #include <aws/s3/S3Client.h> #include <aws/s3/model/GetObjectRequest.h> #include <aws/s3/model/HeadObjectRequest.h> #include <aws/s3/model/ListObjectsRequest.h> #include <aws/s3/model/PutObjectRequest.h> #include <aws/transfer/TransferManager.h> using namespace Aws::Transfer; namespace nix { struct S3Error : public Error { Aws::S3::S3Errors err; template<typename... Args> S3Error(Aws::S3::S3Errors err, const Args & ... args) : Error(args...), err(err) { }; }; /* Helper: given an Outcome<R, E>, return R in case of success, or throw an exception in case of an error. */ template<typename R, typename E> R && checkAws(std::string_view s, Aws::Utils::Outcome<R, E> && outcome) { if (!outcome.IsSuccess()) throw S3Error( outcome.GetError().GetErrorType(), s + ": " + outcome.GetError().GetMessage()); return outcome.GetResultWithOwnership(); } class AwsLogger : public Aws::Utils::Logging::FormattedLogSystem { using Aws::Utils::Logging::FormattedLogSystem::FormattedLogSystem; void ProcessFormattedStatement(Aws::String && statement) override { debug("AWS: %s", chomp(statement)); } #if !(AWS_SDK_VERSION_MAJOR <= 1 && AWS_SDK_VERSION_MINOR <= 7 && AWS_SDK_VERSION_PATCH <= 115) void Flush() override {} #endif }; static void initAWS() { static std::once_flag flag; std::call_once(flag, []() { Aws::SDKOptions options; /* We install our own OpenSSL locking function (see shared.cc), so don't let aws-sdk-cpp override it. */ options.cryptoOptions.initAndCleanupOpenSSL = false; if (verbosity >= lvlDebug) { options.loggingOptions.logLevel = verbosity == lvlDebug ? Aws::Utils::Logging::LogLevel::Debug : Aws::Utils::Logging::LogLevel::Trace; options.loggingOptions.logger_create_fn = [options]() { return std::make_shared<AwsLogger>(options.loggingOptions.logLevel); }; } Aws::InitAPI(options); }); } S3Helper::S3Helper( const std::string & profile, const std::string & region, const std::string & scheme, const std::string & endpoint) : config(makeConfig(region, scheme, endpoint)) , client(make_ref<Aws::S3::S3Client>( profile == "" ? std::dynamic_pointer_cast<Aws::Auth::AWSCredentialsProvider>( std::make_shared<Aws::Auth::DefaultAWSCredentialsProviderChain>()) : std::dynamic_pointer_cast<Aws::Auth::AWSCredentialsProvider>( std::make_shared<Aws::Auth::ProfileConfigFileAWSCredentialsProvider>(profile.c_str())), *config, // FIXME: https://github.com/aws/aws-sdk-cpp/issues/759 #if AWS_SDK_VERSION_MAJOR == 1 && AWS_SDK_VERSION_MINOR < 3 false, #else Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy::Never, #endif endpoint.empty())) { } /* Log AWS retries. */ class RetryStrategy : public Aws::Client::DefaultRetryStrategy { bool ShouldRetry(const Aws::Client::AWSError<Aws::Client::CoreErrors>& error, long attemptedRetries) const override { checkInterrupt(); auto retry = Aws::Client::DefaultRetryStrategy::ShouldRetry(error, attemptedRetries); if (retry) printError("AWS error '%s' (%s), will retry in %d ms", error.GetExceptionName(), error.GetMessage(), CalculateDelayBeforeNextRetry(error, attemptedRetries)); return retry; } }; ref<Aws::Client::ClientConfiguration> S3Helper::makeConfig( const std::string & region, const std::string & scheme, const std::string & endpoint) { initAWS(); auto res = make_ref<Aws::Client::ClientConfiguration>(); res->allowSystemProxy = true; res->region = region; if (!scheme.empty()) { res->scheme = Aws::Http::SchemeMapper::FromString(scheme.c_str()); } if (!endpoint.empty()) { res->endpointOverride = endpoint; } res->requestTimeoutMs = 600 * 1000; res->connectTimeoutMs = 5 * 1000; res->retryStrategy = std::make_shared<RetryStrategy>(); res->caFile = settings.caFile; return res; } S3Helper::FileTransferResult S3Helper::getObject( const std::string & bucketName, const std::string & key) { debug("fetching 's3://%s/%s'...", bucketName, key); auto request = Aws::S3::Model::GetObjectRequest() .WithBucket(bucketName) .WithKey(key); request.SetResponseStreamFactory([&]() { return Aws::New<std::stringstream>("STRINGSTREAM"); }); FileTransferResult res; auto now1 = std::chrono::steady_clock::now(); try { auto result = checkAws(fmt("AWS error fetching '%s'", key), client->GetObject(request)); res.data = decompress(result.GetContentEncoding(), dynamic_cast<std::stringstream &>(result.GetBody()).str()); } catch (S3Error & e) { if ((e.err != Aws::S3::S3Errors::NO_SUCH_KEY) && (e.err != Aws::S3::S3Errors::ACCESS_DENIED)) throw; } auto now2 = std::chrono::steady_clock::now(); res.durationMs = std::chrono::duration_cast<std::chrono::milliseconds>(now2 - now1).count(); return res; } S3BinaryCacheStore::S3BinaryCacheStore(const Params & params) : BinaryCacheStoreConfig(params) , BinaryCacheStore(params) { } S3BinaryCacheStoreConfig::S3BinaryCacheStoreConfig( std::string_view uriScheme, std::string_view bucketName, const Params & params) : StoreConfig(params) , BinaryCacheStoreConfig(params) , bucketName(bucketName) { // Don't want to use use AWS SDK in header, so we check the default // here. TODO do this better after we overhaul the store settings // system. assert(std::string{defaultRegion} == std::string{Aws::Region::US_EAST_1}); if (bucketName.empty()) throw UsageError("`%s` store requires a bucket name in its Store URI", uriScheme); } std::string S3BinaryCacheStoreConfig::doc() { return #include "s3-binary-cache-store.md" ; } struct S3BinaryCacheStoreImpl : virtual S3BinaryCacheStoreConfig, public virtual S3BinaryCacheStore { Stats stats; S3Helper s3Helper; S3BinaryCacheStoreImpl( std::string_view uriScheme, std::string_view bucketName, const Params & params) : StoreConfig(params) , BinaryCacheStoreConfig(params) , S3BinaryCacheStoreConfig(uriScheme, bucketName, params) , Store(params) , BinaryCacheStore(params) , S3BinaryCacheStore(params) , s3Helper(profile, region, scheme, endpoint) { diskCache = getNarInfoDiskCache(); } std::string getUri() override { return "s3://" + bucketName; } void init() override { if (auto cacheInfo = diskCache->upToDateCacheExists(getUri())) { wantMassQuery.setDefault(cacheInfo->wantMassQuery); priority.setDefault(cacheInfo->priority); } else { BinaryCacheStore::init(); diskCache->createCache(getUri(), storeDir, wantMassQuery, priority); } } const Stats & getS3Stats() override { return stats; } /* This is a specialisation of isValidPath() that optimistically fetches the .narinfo file, rather than first checking for its existence via a HEAD request. Since .narinfos are small, doing a GET is unlikely to be slower than HEAD. */ bool isValidPathUncached(const StorePath & storePath) override { try { queryPathInfo(storePath); return true; } catch (InvalidPath & e) { return false; } } bool fileExists(const std::string & path) override { stats.head++; auto res = s3Helper.client->HeadObject( Aws::S3::Model::HeadObjectRequest() .WithBucket(bucketName) .WithKey(path)); if (!res.IsSuccess()) { auto & error = res.GetError(); if (error.GetErrorType() == Aws::S3::S3Errors::RESOURCE_NOT_FOUND || error.GetErrorType() == Aws::S3::S3Errors::NO_SUCH_KEY // If bucket listing is disabled, 404s turn into 403s || error.GetErrorType() == Aws::S3::S3Errors::ACCESS_DENIED) return false; throw Error("AWS error fetching '%s': %s", path, error.GetMessage()); } return true; } std::shared_ptr<TransferManager> transferManager; std::once_flag transferManagerCreated; void uploadFile(const std::string & path, std::shared_ptr<std::basic_iostream<char>> istream, const std::string & mimeType, const std::string & contentEncoding) { istream->seekg(0, istream->end); auto size = istream->tellg(); istream->seekg(0, istream->beg); auto maxThreads = std::thread::hardware_concurrency(); static std::shared_ptr<Aws::Utils::Threading::PooledThreadExecutor> executor = std::make_shared<Aws::Utils::Threading::PooledThreadExecutor>(maxThreads); std::call_once(transferManagerCreated, [&]() { if (multipartUpload) { TransferManagerConfiguration transferConfig(executor.get()); transferConfig.s3Client = s3Helper.client; transferConfig.bufferSize = bufferSize; transferConfig.uploadProgressCallback = [](const TransferManager *transferManager, const std::shared_ptr<const TransferHandle> &transferHandle) { //FIXME: find a way to properly abort the multipart upload. //checkInterrupt(); debug("upload progress ('%s'): '%d' of '%d' bytes", transferHandle->GetKey(), transferHandle->GetBytesTransferred(), transferHandle->GetBytesTotalSize()); }; transferManager = TransferManager::Create(transferConfig); } }); auto now1 = std::chrono::steady_clock::now(); if (transferManager) { if (contentEncoding != "") throw Error("setting a content encoding is not supported with S3 multi-part uploads"); std::shared_ptr<TransferHandle> transferHandle = transferManager->UploadFile( istream, bucketName, path, mimeType, Aws::Map<Aws::String, Aws::String>(), nullptr /*, contentEncoding */); transferHandle->WaitUntilFinished(); if (transferHandle->GetStatus() == TransferStatus::FAILED) throw Error("AWS error: failed to upload 's3://%s/%s': %s", bucketName, path, transferHandle->GetLastError().GetMessage()); if (transferHandle->GetStatus() != TransferStatus::COMPLETED) throw Error("AWS error: transfer status of 's3://%s/%s' in unexpected state", bucketName, path); } else { auto request = Aws::S3::Model::PutObjectRequest() .WithBucket(bucketName) .WithKey(path); request.SetContentType(mimeType); if (contentEncoding != "") request.SetContentEncoding(contentEncoding); request.SetBody(istream); auto result = checkAws(fmt("AWS error uploading '%s'", path), s3Helper.client->PutObject(request)); } auto now2 = std::chrono::steady_clock::now(); auto duration = std::chrono::duration_cast<std::chrono::milliseconds>(now2 - now1) .count(); printInfo("uploaded 's3://%s/%s' (%d bytes) in %d ms", bucketName, path, size, duration); stats.putTimeMs += duration; stats.putBytes += std::max(size, (decltype(size)) 0); stats.put++; } void upsertFile(const std::string & path, std::shared_ptr<std::basic_iostream<char>> istream, const std::string & mimeType) override { auto compress = [&](std::string compression) { auto compressed = nix::compress(compression, StreamToSourceAdapter(istream).drain()); return std::make_shared<std::stringstream>(std::move(compressed)); }; if (narinfoCompression != "" && hasSuffix(path, ".narinfo")) uploadFile(path, compress(narinfoCompression), mimeType, narinfoCompression); else if (lsCompression != "" && hasSuffix(path, ".ls")) uploadFile(path, compress(lsCompression), mimeType, lsCompression); else if (logCompression != "" && hasPrefix(path, "log/")) uploadFile(path, compress(logCompression), mimeType, logCompression); else uploadFile(path, istream, mimeType, ""); } void getFile(const std::string & path, Sink & sink) override { stats.get++; // FIXME: stream output to sink. auto res = s3Helper.getObject(bucketName, path); stats.getBytes += res.data ? res.data->size() : 0; stats.getTimeMs += res.durationMs; if (res.data) { printTalkative("downloaded 's3://%s/%s' (%d bytes) in %d ms", bucketName, path, res.data->size(), res.durationMs); sink(*res.data); } else throw NoSuchBinaryCacheFile("file '%s' does not exist in binary cache '%s'", path, getUri()); } StorePathSet queryAllValidPaths() override { StorePathSet paths; std::string marker; do { debug("listing bucket 's3://%s' from key '%s'...", bucketName, marker); auto res = checkAws(fmt("AWS error listing bucket '%s'", bucketName), s3Helper.client->ListObjects( Aws::S3::Model::ListObjectsRequest() .WithBucket(bucketName) .WithDelimiter("/") .WithMarker(marker))); auto & contents = res.GetContents(); debug("got %d keys, next marker '%s'", contents.size(), res.GetNextMarker()); for (auto object : contents) { auto & key = object.GetKey(); if (key.size() != 40 || !hasSuffix(key, ".narinfo")) continue; paths.insert(parseStorePath(storeDir + "/" + key.substr(0, key.size() - 8) + "-" + MissingName)); } marker = res.GetNextMarker(); } while (!marker.empty()); return paths; } /** * For now, we conservatively say we don't know. * * \todo try to expose our S3 authentication status. */ std::optional<TrustedFlag> isTrustedClient() override { return std::nullopt; } }; static RegisterStoreImplementation<S3BinaryCacheStoreImpl, S3BinaryCacheStoreConfig> regS3BinaryCacheStore; } #endif
15,841
C++
.cc
393
31.638677
119
0.618415
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,821
local-fs-store.cc
NixOS_nix/src/libstore/local-fs-store.cc
#include "archive.hh" #include "posix-source-accessor.hh" #include "store-api.hh" #include "local-fs-store.hh" #include "globals.hh" #include "compression.hh" #include "derivations.hh" namespace nix { LocalFSStoreConfig::LocalFSStoreConfig(PathView rootDir, const Params & params) : StoreConfig(params) // Default `?root` from `rootDir` if non set // FIXME don't duplicate description once we don't have root setting , rootDir{ this, !rootDir.empty() && params.count("root") == 0 ? (std::optional<Path>{rootDir}) : std::nullopt, "root", "Directory prefixed to all other paths."} { } LocalFSStore::LocalFSStore(const Params & params) : Store(params) { } struct LocalStoreAccessor : PosixSourceAccessor { ref<LocalFSStore> store; bool requireValidPath; LocalStoreAccessor(ref<LocalFSStore> store, bool requireValidPath) : store(store) , requireValidPath(requireValidPath) { } CanonPath toRealPath(const CanonPath & path) { auto [storePath, rest] = store->toStorePath(path.abs()); if (requireValidPath && !store->isValidPath(storePath)) throw InvalidPath("path '%1%' is not a valid store path", store->printStorePath(storePath)); return CanonPath(store->getRealStoreDir()) / storePath.to_string() / CanonPath(rest); } std::optional<Stat> maybeLstat(const CanonPath & path) override { /* Handle the case where `path` is (a parent of) the store. */ if (isDirOrInDir(store->storeDir, path.abs())) return Stat{ .type = tDirectory }; return PosixSourceAccessor::maybeLstat(toRealPath(path)); } DirEntries readDirectory(const CanonPath & path) override { return PosixSourceAccessor::readDirectory(toRealPath(path)); } void readFile( const CanonPath & path, Sink & sink, std::function<void(uint64_t)> sizeCallback) override { return PosixSourceAccessor::readFile(toRealPath(path), sink, sizeCallback); } std::string readLink(const CanonPath & path) override { return PosixSourceAccessor::readLink(toRealPath(path)); } }; ref<SourceAccessor> LocalFSStore::getFSAccessor(bool requireValidPath) { return make_ref<LocalStoreAccessor>(ref<LocalFSStore>( std::dynamic_pointer_cast<LocalFSStore>(shared_from_this())), requireValidPath); } void LocalFSStore::narFromPath(const StorePath & path, Sink & sink) { if (!isValidPath(path)) throw Error("path '%s' is not valid", printStorePath(path)); dumpPath(getRealStoreDir() + std::string(printStorePath(path), storeDir.size()), sink); } const std::string LocalFSStore::drvsLogDir = "drvs"; std::optional<std::string> LocalFSStore::getBuildLogExact(const StorePath & path) { auto baseName = path.to_string(); for (int j = 0; j < 2; j++) { Path logPath = j == 0 ? fmt("%s/%s/%s/%s", logDir, drvsLogDir, baseName.substr(0, 2), baseName.substr(2)) : fmt("%s/%s/%s", logDir, drvsLogDir, baseName); Path logBz2Path = logPath + ".bz2"; if (pathExists(logPath)) return readFile(logPath); else if (pathExists(logBz2Path)) { try { return decompress("bzip2", readFile(logBz2Path)); } catch (Error &) { } } } return std::nullopt; } }
3,446
C++
.cc
96
29.75
104
0.659255
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,822
keys.cc
NixOS_nix/src/libstore/keys.cc
#include "file-system.hh" #include "globals.hh" #include "keys.hh" namespace nix { PublicKeys getDefaultPublicKeys() { PublicKeys publicKeys; // FIXME: filter duplicates for (auto s : settings.trustedPublicKeys.get()) { PublicKey key(s); publicKeys.emplace(key.name, key); } for (auto secretKeyFile : settings.secretKeyFiles.get()) { try { SecretKey secretKey(readFile(secretKeyFile)); publicKeys.emplace(secretKey.name, secretKey.toPublicKey()); } catch (SystemError & e) { /* Ignore unreadable key files. That's normal in a multi-user installation. */ } } return publicKeys; } }
707
C++
.cc
24
23.208333
72
0.64497
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,823
nar-info.cc
NixOS_nix/src/libstore/nar-info.cc
#include "globals.hh" #include "nar-info.hh" #include "store-api.hh" #include "strings.hh" #include "json-utils.hh" namespace nix { NarInfo::NarInfo(const Store & store, const std::string & s, const std::string & whence) : ValidPathInfo(StorePath(StorePath::dummy), Hash(Hash::dummy)) // FIXME: hack { unsigned line = 1; auto corrupt = [&](const char * reason) { return Error("NAR info file '%1%' is corrupt: %2%", whence, std::string(reason) + (line > 0 ? " at line " + std::to_string(line) : "")); }; auto parseHashField = [&](const std::string & s) { try { return Hash::parseAnyPrefixed(s); } catch (BadHash &) { throw corrupt("bad hash"); } }; bool havePath = false; bool haveNarHash = false; size_t pos = 0; while (pos < s.size()) { size_t colon = s.find(':', pos); if (colon == s.npos) throw corrupt("expecting ':'"); std::string name(s, pos, colon - pos); size_t eol = s.find('\n', colon + 2); if (eol == s.npos) throw corrupt("expecting '\\n'"); std::string value(s, colon + 2, eol - colon - 2); if (name == "StorePath") { path = store.parseStorePath(value); havePath = true; } else if (name == "URL") url = value; else if (name == "Compression") compression = value; else if (name == "FileHash") fileHash = parseHashField(value); else if (name == "FileSize") { auto n = string2Int<decltype(fileSize)>(value); if (!n) throw corrupt("invalid FileSize"); fileSize = *n; } else if (name == "NarHash") { narHash = parseHashField(value); haveNarHash = true; } else if (name == "NarSize") { auto n = string2Int<decltype(narSize)>(value); if (!n) throw corrupt("invalid NarSize"); narSize = *n; } else if (name == "References") { auto refs = tokenizeString<Strings>(value, " "); if (!references.empty()) throw corrupt("extra References"); for (auto & r : refs) references.insert(StorePath(r)); } else if (name == "Deriver") { if (value != "unknown-deriver") deriver = StorePath(value); } else if (name == "Sig") sigs.insert(value); else if (name == "CA") { if (ca) throw corrupt("extra CA"); // FIXME: allow blank ca or require skipping field? ca = ContentAddress::parseOpt(value); } pos = eol + 1; line += 1; } if (compression == "") compression = "bzip2"; if (!havePath || !haveNarHash || url.empty() || narSize == 0) { line = 0; // don't include line information in the error throw corrupt( !havePath ? "StorePath missing" : !haveNarHash ? "NarHash missing" : url.empty() ? "URL missing" : narSize == 0 ? "NarSize missing or zero" : "?"); } } std::string NarInfo::to_string(const Store & store) const { std::string res; res += "StorePath: " + store.printStorePath(path) + "\n"; res += "URL: " + url + "\n"; assert(compression != ""); res += "Compression: " + compression + "\n"; assert(fileHash && fileHash->algo == HashAlgorithm::SHA256); res += "FileHash: " + fileHash->to_string(HashFormat::Nix32, true) + "\n"; res += "FileSize: " + std::to_string(fileSize) + "\n"; assert(narHash.algo == HashAlgorithm::SHA256); res += "NarHash: " + narHash.to_string(HashFormat::Nix32, true) + "\n"; res += "NarSize: " + std::to_string(narSize) + "\n"; res += "References: " + concatStringsSep(" ", shortRefs()) + "\n"; if (deriver) res += "Deriver: " + std::string(deriver->to_string()) + "\n"; for (auto sig : sigs) res += "Sig: " + sig + "\n"; if (ca) res += "CA: " + renderContentAddress(*ca) + "\n"; return res; } nlohmann::json NarInfo::toJSON( const Store & store, bool includeImpureInfo, HashFormat hashFormat) const { using nlohmann::json; auto jsonObject = ValidPathInfo::toJSON(store, includeImpureInfo, hashFormat); if (includeImpureInfo) { if (!url.empty()) jsonObject["url"] = url; if (!compression.empty()) jsonObject["compression"] = compression; if (fileHash) jsonObject["downloadHash"] = fileHash->to_string(hashFormat, true); if (fileSize) jsonObject["downloadSize"] = fileSize; } return jsonObject; } NarInfo NarInfo::fromJSON( const Store & store, const StorePath & path, const nlohmann::json & json) { using nlohmann::detail::value_t; NarInfo res { ValidPathInfo { path, UnkeyedValidPathInfo::fromJSON(store, json), } }; if (json.contains("url")) res.url = getString(valueAt(json, "url")); if (json.contains("compression")) res.compression = getString(valueAt(json, "compression")); if (json.contains("downloadHash")) res.fileHash = Hash::parseAny( getString(valueAt(json, "downloadHash")), std::nullopt); if (json.contains("downloadSize")) res.fileSize = getInteger(valueAt(json, "downloadSize")); return res; } }
5,494
C++
.cc
152
28.144737
88
0.556497
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,824
build-result.cc
NixOS_nix/src/libstore/build-result.cc
#include "build-result.hh" namespace nix { bool BuildResult::operator==(const BuildResult &) const noexcept = default; std::strong_ordering BuildResult::operator<=>(const BuildResult &) const noexcept = default; }
217
C++
.cc
5
41.8
92
0.779904
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,825
worker-protocol-connection.cc
NixOS_nix/src/libstore/worker-protocol-connection.cc
#include "worker-protocol-connection.hh" #include "worker-protocol-impl.hh" #include "build-result.hh" #include "derivations.hh" namespace nix { const std::set<WorkerProto::Feature> WorkerProto::allFeatures{}; WorkerProto::BasicClientConnection::~BasicClientConnection() { try { to.flush(); } catch (...) { ignoreExceptionInDestructor(); } } static Logger::Fields readFields(Source & from) { Logger::Fields fields; size_t size = readInt(from); for (size_t n = 0; n < size; n++) { auto type = (decltype(Logger::Field::type)) readInt(from); if (type == Logger::Field::tInt) fields.push_back(readNum<uint64_t>(from)); else if (type == Logger::Field::tString) fields.push_back(readString(from)); else throw Error("got unsupported field type %x from Nix daemon", (int) type); } return fields; } std::exception_ptr WorkerProto::BasicClientConnection::processStderrReturn(Sink * sink, Source * source, bool flush, bool block) { if (flush) to.flush(); std::exception_ptr ex; while (true) { if (!block && !from.hasData()) break; auto msg = readNum<uint64_t>(from); if (msg == STDERR_WRITE) { auto s = readString(from); if (!sink) throw Error("no sink"); (*sink)(s); } else if (msg == STDERR_READ) { if (!source) throw Error("no source"); size_t len = readNum<size_t>(from); auto buf = std::make_unique<char[]>(len); writeString({(const char *) buf.get(), source->read(buf.get(), len)}, to); to.flush(); } else if (msg == STDERR_ERROR) { if (GET_PROTOCOL_MINOR(protoVersion) >= 26) { ex = std::make_exception_ptr(readError(from)); } else { auto error = readString(from); unsigned int status = readInt(from); ex = std::make_exception_ptr(Error(status, error)); } break; } else if (msg == STDERR_NEXT) printError(chomp(readString(from))); else if (msg == STDERR_START_ACTIVITY) { auto act = readNum<ActivityId>(from); auto lvl = (Verbosity) readInt(from); auto type = (ActivityType) readInt(from); auto s = readString(from); auto fields = readFields(from); auto parent = readNum<ActivityId>(from); logger->startActivity(act, lvl, type, s, fields, parent); } else if (msg == STDERR_STOP_ACTIVITY) { auto act = readNum<ActivityId>(from); logger->stopActivity(act); } else if (msg == STDERR_RESULT) { auto act = readNum<ActivityId>(from); auto type = (ResultType) readInt(from); auto fields = readFields(from); logger->result(act, type, fields); } else if (msg == STDERR_LAST) { assert(block); break; } else throw Error("got unknown message type %x from Nix daemon", msg); } if (!ex) { return ex; } else { try { std::rethrow_exception(ex); } catch (const Error & e) { // Nix versions before #4628 did not have an adequate // behavior for reporting that the derivation format was // upgraded. To avoid having to add compatibility logic in // many places, we expect to catch almost all occurrences of // the old incomprehensible error here, so that we can // explain to users what's going on when their daemon is // older than #4628 (2023). if (experimentalFeatureSettings.isEnabled(Xp::DynamicDerivations) && GET_PROTOCOL_MINOR(protoVersion) <= 35) { auto m = e.msg(); if (m.find("parsing derivation") != std::string::npos && m.find("expected string") != std::string::npos && m.find("Derive([") != std::string::npos) return std::make_exception_ptr(Error( "%s, this might be because the daemon is too old to understand dependencies on dynamic derivations. Check to see if the raw derivation is in the form '%s'", std::move(m), "Drv WithVersion(..)")); } return std::current_exception(); } } } void WorkerProto::BasicClientConnection::processStderr( bool * daemonException, Sink * sink, Source * source, bool flush, bool block) { auto ex = processStderrReturn(sink, source, flush, block); if (ex) { *daemonException = true; std::rethrow_exception(ex); } } static std::set<WorkerProto::Feature> intersectFeatures(const std::set<WorkerProto::Feature> & a, const std::set<WorkerProto::Feature> & b) { std::set<WorkerProto::Feature> res; for (auto & x : a) if (b.contains(x)) res.insert(x); return res; } std::tuple<WorkerProto::Version, std::set<WorkerProto::Feature>> WorkerProto::BasicClientConnection::handshake( BufferedSink & to, Source & from, WorkerProto::Version localVersion, const std::set<WorkerProto::Feature> & supportedFeatures) { to << WORKER_MAGIC_1 << localVersion; to.flush(); unsigned int magic = readInt(from); if (magic != WORKER_MAGIC_2) throw Error("nix-daemon protocol mismatch from"); auto daemonVersion = readInt(from); if (GET_PROTOCOL_MAJOR(daemonVersion) != GET_PROTOCOL_MAJOR(PROTOCOL_VERSION)) throw Error("Nix daemon protocol version not supported"); if (GET_PROTOCOL_MINOR(daemonVersion) < 10) throw Error("the Nix daemon version is too old"); auto protoVersion = std::min(daemonVersion, localVersion); /* Exchange features. */ std::set<WorkerProto::Feature> daemonFeatures; if (GET_PROTOCOL_MINOR(protoVersion) >= 38) { to << supportedFeatures; to.flush(); daemonFeatures = readStrings<std::set<WorkerProto::Feature>>(from); } return {protoVersion, intersectFeatures(daemonFeatures, supportedFeatures)}; } std::tuple<WorkerProto::Version, std::set<WorkerProto::Feature>> WorkerProto::BasicServerConnection::handshake( BufferedSink & to, Source & from, WorkerProto::Version localVersion, const std::set<WorkerProto::Feature> & supportedFeatures) { unsigned int magic = readInt(from); if (magic != WORKER_MAGIC_1) throw Error("protocol mismatch"); to << WORKER_MAGIC_2 << localVersion; to.flush(); auto clientVersion = readInt(from); auto protoVersion = std::min(clientVersion, localVersion); /* Exchange features. */ std::set<WorkerProto::Feature> clientFeatures; if (GET_PROTOCOL_MINOR(protoVersion) >= 38) { clientFeatures = readStrings<std::set<WorkerProto::Feature>>(from); to << supportedFeatures; to.flush(); } return {protoVersion, intersectFeatures(clientFeatures, supportedFeatures)}; } WorkerProto::ClientHandshakeInfo WorkerProto::BasicClientConnection::postHandshake(const StoreDirConfig & store) { WorkerProto::ClientHandshakeInfo res; if (GET_PROTOCOL_MINOR(protoVersion) >= 14) { // Obsolete CPU affinity. to << 0; } if (GET_PROTOCOL_MINOR(protoVersion) >= 11) to << false; // obsolete reserveSpace if (GET_PROTOCOL_MINOR(protoVersion) >= 33) to.flush(); return WorkerProto::Serialise<ClientHandshakeInfo>::read(store, *this); } void WorkerProto::BasicServerConnection::postHandshake(const StoreDirConfig & store, const ClientHandshakeInfo & info) { if (GET_PROTOCOL_MINOR(protoVersion) >= 14 && readInt(from)) { // Obsolete CPU affinity. readInt(from); } if (GET_PROTOCOL_MINOR(protoVersion) >= 11) readInt(from); // obsolete reserveSpace WorkerProto::write(store, *this, info); } UnkeyedValidPathInfo WorkerProto::BasicClientConnection::queryPathInfo( const StoreDirConfig & store, bool * daemonException, const StorePath & path) { to << WorkerProto::Op::QueryPathInfo << store.printStorePath(path); try { processStderr(daemonException); } catch (Error & e) { // Ugly backwards compatibility hack. if (e.msg().find("is not valid") != std::string::npos) throw InvalidPath(std::move(e.info())); throw; } if (GET_PROTOCOL_MINOR(protoVersion) >= 17) { bool valid; from >> valid; if (!valid) throw InvalidPath("path '%s' is not valid", store.printStorePath(path)); } return WorkerProto::Serialise<UnkeyedValidPathInfo>::read(store, *this); } StorePathSet WorkerProto::BasicClientConnection::queryValidPaths( const StoreDirConfig & store, bool * daemonException, const StorePathSet & paths, SubstituteFlag maybeSubstitute) { assert(GET_PROTOCOL_MINOR(protoVersion) >= 12); to << WorkerProto::Op::QueryValidPaths; WorkerProto::write(store, *this, paths); if (GET_PROTOCOL_MINOR(protoVersion) >= 27) { to << maybeSubstitute; } processStderr(daemonException); return WorkerProto::Serialise<StorePathSet>::read(store, *this); } void WorkerProto::BasicClientConnection::addTempRoot( const StoreDirConfig & store, bool * daemonException, const StorePath & path) { to << WorkerProto::Op::AddTempRoot << store.printStorePath(path); processStderr(daemonException); readInt(from); } void WorkerProto::BasicClientConnection::putBuildDerivationRequest( const StoreDirConfig & store, bool * daemonException, const StorePath & drvPath, const BasicDerivation & drv, BuildMode buildMode) { to << WorkerProto::Op::BuildDerivation << store.printStorePath(drvPath); writeDerivation(to, store, drv); to << buildMode; } BuildResult WorkerProto::BasicClientConnection::getBuildDerivationResponse(const StoreDirConfig & store, bool * daemonException) { return WorkerProto::Serialise<BuildResult>::read(store, *this); } void WorkerProto::BasicClientConnection::narFromPath( const StoreDirConfig & store, bool * daemonException, const StorePath & path, std::function<void(Source &)> fun) { to << WorkerProto::Op::NarFromPath << store.printStorePath(path); processStderr(daemonException); fun(from); } void WorkerProto::BasicClientConnection::importPaths( const StoreDirConfig & store, bool * daemonException, Source & source) { to << WorkerProto::Op::ImportPaths; processStderr(daemonException, 0, &source); auto importedPaths = WorkerProto::Serialise<StorePathSet>::read(store, *this); assert(importedPaths.size() <= importedPaths.size()); } }
10,874
C++
.cc
278
31.888489
180
0.642905
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,826
misc.cc
NixOS_nix/src/libstore/misc.cc
#include <unordered_set> #include "derivations.hh" #include "parsed-derivations.hh" #include "globals.hh" #include "store-api.hh" #include "thread-pool.hh" #include "realisation.hh" #include "topo-sort.hh" #include "callback.hh" #include "closure.hh" #include "filetransfer.hh" #include "strings.hh" namespace nix { void Store::computeFSClosure(const StorePathSet & startPaths, StorePathSet & paths_, bool flipDirection, bool includeOutputs, bool includeDerivers) { std::function<std::set<StorePath>(const StorePath & path, std::future<ref<const ValidPathInfo>> &)> queryDeps; if (flipDirection) queryDeps = [&](const StorePath& path, std::future<ref<const ValidPathInfo>> & fut) { StorePathSet res; StorePathSet referrers; queryReferrers(path, referrers); for (auto& ref : referrers) if (ref != path) res.insert(ref); if (includeOutputs) for (auto& i : queryValidDerivers(path)) res.insert(i); if (includeDerivers && path.isDerivation()) for (auto& [_, maybeOutPath] : queryPartialDerivationOutputMap(path)) if (maybeOutPath && isValidPath(*maybeOutPath)) res.insert(*maybeOutPath); return res; }; else queryDeps = [&](const StorePath& path, std::future<ref<const ValidPathInfo>> & fut) { StorePathSet res; auto info = fut.get(); for (auto& ref : info->references) if (ref != path) res.insert(ref); if (includeOutputs && path.isDerivation()) for (auto& [_, maybeOutPath] : queryPartialDerivationOutputMap(path)) if (maybeOutPath && isValidPath(*maybeOutPath)) res.insert(*maybeOutPath); if (includeDerivers && info->deriver && isValidPath(*info->deriver)) res.insert(*info->deriver); return res; }; computeClosure<StorePath>( startPaths, paths_, [&](const StorePath& path, std::function<void(std::promise<std::set<StorePath>>&)> processEdges) { std::promise<std::set<StorePath>> promise; std::function<void(std::future<ref<const ValidPathInfo>>)> getDependencies = [&](std::future<ref<const ValidPathInfo>> fut) { try { promise.set_value(queryDeps(path, fut)); } catch (...) { promise.set_exception(std::current_exception()); } }; queryPathInfo(path, getDependencies); processEdges(promise); }); } void Store::computeFSClosure(const StorePath & startPath, StorePathSet & paths_, bool flipDirection, bool includeOutputs, bool includeDerivers) { StorePathSet paths; paths.insert(startPath); computeFSClosure(paths, paths_, flipDirection, includeOutputs, includeDerivers); } const ContentAddress * getDerivationCA(const BasicDerivation & drv) { auto out = drv.outputs.find("out"); if (out == drv.outputs.end()) return nullptr; if (auto dof = std::get_if<DerivationOutput::CAFixed>(&out->second.raw)) { return &dof->ca; } return nullptr; } void Store::queryMissing(const std::vector<DerivedPath> & targets, StorePathSet & willBuild_, StorePathSet & willSubstitute_, StorePathSet & unknown_, uint64_t & downloadSize_, uint64_t & narSize_) { Activity act(*logger, lvlDebug, actUnknown, "querying info about missing paths"); downloadSize_ = narSize_ = 0; // FIXME: make async. ThreadPool pool(fileTransferSettings.httpConnections); struct State { std::unordered_set<std::string> done; StorePathSet & unknown, & willSubstitute, & willBuild; uint64_t & downloadSize; uint64_t & narSize; }; struct DrvState { size_t left; bool done = false; StorePathSet outPaths; DrvState(size_t left) : left(left) { } }; Sync<State> state_(State{{}, unknown_, willSubstitute_, willBuild_, downloadSize_, narSize_}); std::function<void(DerivedPath)> doPath; std::function<void(ref<SingleDerivedPath>, const DerivedPathMap<StringSet>::ChildNode &)> enqueueDerivedPaths; enqueueDerivedPaths = [&](ref<SingleDerivedPath> inputDrv, const DerivedPathMap<StringSet>::ChildNode & inputNode) { if (!inputNode.value.empty()) pool.enqueue(std::bind(doPath, DerivedPath::Built { inputDrv, inputNode.value })); for (const auto & [outputName, childNode] : inputNode.childMap) enqueueDerivedPaths( make_ref<SingleDerivedPath>(SingleDerivedPath::Built { inputDrv, outputName }), childNode); }; auto mustBuildDrv = [&](const StorePath & drvPath, const Derivation & drv) { { auto state(state_.lock()); state->willBuild.insert(drvPath); } for (const auto & [inputDrv, inputNode] : drv.inputDrvs.map) { enqueueDerivedPaths(makeConstantStorePathRef(inputDrv), inputNode); } }; auto checkOutput = [&]( const StorePath & drvPath, ref<Derivation> drv, const StorePath & outPath, ref<Sync<DrvState>> drvState_) { if (drvState_->lock()->done) return; SubstitutablePathInfos infos; auto * cap = getDerivationCA(*drv); querySubstitutablePathInfos({ { outPath, cap ? std::optional { *cap } : std::nullopt, }, }, infos); if (infos.empty()) { drvState_->lock()->done = true; mustBuildDrv(drvPath, *drv); } else { { auto drvState(drvState_->lock()); if (drvState->done) return; assert(drvState->left); drvState->left--; drvState->outPaths.insert(outPath); if (!drvState->left) { for (auto & path : drvState->outPaths) pool.enqueue(std::bind(doPath, DerivedPath::Opaque { path } )); } } } }; doPath = [&](const DerivedPath & req) { { auto state(state_.lock()); if (!state->done.insert(req.to_string(*this)).second) return; } std::visit(overloaded { [&](const DerivedPath::Built & bfd) { auto drvPathP = std::get_if<DerivedPath::Opaque>(&*bfd.drvPath); if (!drvPathP) { // TODO make work in this case. warn("Ignoring dynamic derivation %s while querying missing paths; not yet implemented", bfd.drvPath->to_string(*this)); return; } auto & drvPath = drvPathP->path; if (!isValidPath(drvPath)) { // FIXME: we could try to substitute the derivation. auto state(state_.lock()); state->unknown.insert(drvPath); return; } StorePathSet invalid; /* true for regular derivations, and CA derivations for which we have a trust mapping for all wanted outputs. */ auto knownOutputPaths = true; for (auto & [outputName, pathOpt] : queryPartialDerivationOutputMap(drvPath)) { if (!pathOpt) { knownOutputPaths = false; break; } if (bfd.outputs.contains(outputName) && !isValidPath(*pathOpt)) invalid.insert(*pathOpt); } if (knownOutputPaths && invalid.empty()) return; auto drv = make_ref<Derivation>(derivationFromPath(drvPath)); ParsedDerivation parsedDrv(StorePath(drvPath), *drv); if (!knownOutputPaths && settings.useSubstitutes && parsedDrv.substitutesAllowed()) { experimentalFeatureSettings.require(Xp::CaDerivations); // If there are unknown output paths, attempt to find if the // paths are known to substituters through a realisation. auto outputHashes = staticOutputHashes(*this, *drv); knownOutputPaths = true; for (auto [outputName, hash] : outputHashes) { if (!bfd.outputs.contains(outputName)) continue; bool found = false; for (auto &sub : getDefaultSubstituters()) { auto realisation = sub->queryRealisation({hash, outputName}); if (!realisation) continue; found = true; if (!isValidPath(realisation->outPath)) invalid.insert(realisation->outPath); break; } if (!found) { // Some paths did not have a realisation, this must be built. knownOutputPaths = false; break; } } } if (knownOutputPaths && settings.useSubstitutes && parsedDrv.substitutesAllowed()) { auto drvState = make_ref<Sync<DrvState>>(DrvState(invalid.size())); for (auto & output : invalid) pool.enqueue(std::bind(checkOutput, drvPath, drv, output, drvState)); } else mustBuildDrv(drvPath, *drv); }, [&](const DerivedPath::Opaque & bo) { if (isValidPath(bo.path)) return; SubstitutablePathInfos infos; querySubstitutablePathInfos({{bo.path, std::nullopt}}, infos); if (infos.empty()) { auto state(state_.lock()); state->unknown.insert(bo.path); return; } auto info = infos.find(bo.path); assert(info != infos.end()); { auto state(state_.lock()); state->willSubstitute.insert(bo.path); state->downloadSize += info->second.downloadSize; state->narSize += info->second.narSize; } for (auto & ref : info->second.references) pool.enqueue(std::bind(doPath, DerivedPath::Opaque { ref })); }, }, req.raw()); }; for (auto & path : targets) pool.enqueue(std::bind(doPath, path)); pool.process(); } StorePaths Store::topoSortPaths(const StorePathSet & paths) { return topoSort(paths, {[&](const StorePath & path) { try { return queryPathInfo(path)->references; } catch (InvalidPath &) { return StorePathSet(); } }}, {[&](const StorePath & path, const StorePath & parent) { return BuildError( "cycle detected in the references of '%s' from '%s'", printStorePath(path), printStorePath(parent)); }}); } std::map<DrvOutput, StorePath> drvOutputReferences( const std::set<Realisation> & inputRealisations, const StorePathSet & pathReferences) { std::map<DrvOutput, StorePath> res; for (const auto & input : inputRealisations) { if (pathReferences.count(input.outPath)) { res.insert({input.id, input.outPath}); } } return res; } std::map<DrvOutput, StorePath> drvOutputReferences( Store & store, const Derivation & drv, const StorePath & outputPath, Store * evalStore_) { auto & evalStore = evalStore_ ? *evalStore_ : store; std::set<Realisation> inputRealisations; std::function<void(const StorePath &, const DerivedPathMap<StringSet>::ChildNode &)> accumRealisations; accumRealisations = [&](const StorePath & inputDrv, const DerivedPathMap<StringSet>::ChildNode & inputNode) { if (!inputNode.value.empty()) { auto outputHashes = staticOutputHashes(evalStore, evalStore.readDerivation(inputDrv)); for (const auto & outputName : inputNode.value) { auto outputHash = get(outputHashes, outputName); if (!outputHash) throw Error( "output '%s' of derivation '%s' isn't realised", outputName, store.printStorePath(inputDrv)); auto thisRealisation = store.queryRealisation( DrvOutput{*outputHash, outputName}); if (!thisRealisation) throw Error( "output '%s' of derivation '%s' isn’t built", outputName, store.printStorePath(inputDrv)); inputRealisations.insert(*thisRealisation); } } if (!inputNode.value.empty()) { auto d = makeConstantStorePathRef(inputDrv); for (const auto & [outputName, childNode] : inputNode.childMap) { SingleDerivedPath next = SingleDerivedPath::Built { d, outputName }; accumRealisations( // TODO deep resolutions for dynamic derivations, issue #8947, would go here. resolveDerivedPath(store, next, evalStore_), childNode); } } }; for (const auto & [inputDrv, inputNode] : drv.inputDrvs.map) accumRealisations(inputDrv, inputNode); auto info = store.queryPathInfo(outputPath); return drvOutputReferences(Realisation::closure(store, inputRealisations), info->references); } OutputPathMap resolveDerivedPath(Store & store, const DerivedPath::Built & bfd, Store * evalStore_) { auto drvPath = resolveDerivedPath(store, *bfd.drvPath, evalStore_); auto outputsOpt_ = store.queryPartialDerivationOutputMap(drvPath, evalStore_); auto outputsOpt = std::visit(overloaded { [&](const OutputsSpec::All &) { // Keep all outputs return std::move(outputsOpt_); }, [&](const OutputsSpec::Names & names) { // Get just those mentioned by name std::map<std::string, std::optional<StorePath>> outputsOpt; for (auto & output : names) { auto * pOutputPathOpt = get(outputsOpt_, output); if (!pOutputPathOpt) throw Error( "the derivation '%s' doesn't have an output named '%s'", bfd.drvPath->to_string(store), output); outputsOpt.insert_or_assign(output, std::move(*pOutputPathOpt)); } return outputsOpt; }, }, bfd.outputs.raw); OutputPathMap outputs; for (auto & [outputName, outputPathOpt] : outputsOpt) { if (!outputPathOpt) throw MissingRealisation(bfd.drvPath->to_string(store), outputName); auto & outputPath = *outputPathOpt; outputs.insert_or_assign(outputName, outputPath); } return outputs; } StorePath resolveDerivedPath(Store & store, const SingleDerivedPath & req, Store * evalStore_) { auto & evalStore = evalStore_ ? *evalStore_ : store; return std::visit(overloaded { [&](const SingleDerivedPath::Opaque & bo) { return bo.path; }, [&](const SingleDerivedPath::Built & bfd) { auto drvPath = resolveDerivedPath(store, *bfd.drvPath, evalStore_); auto outputPaths = evalStore.queryPartialDerivationOutputMap(drvPath, evalStore_); if (outputPaths.count(bfd.output) == 0) throw Error("derivation '%s' does not have an output named '%s'", store.printStorePath(drvPath), bfd.output); auto & optPath = outputPaths.at(bfd.output); if (!optPath) throw MissingRealisation(bfd.drvPath->to_string(store), bfd.output); return *optPath; }, }, req.raw()); } OutputPathMap resolveDerivedPath(Store & store, const DerivedPath::Built & bfd) { auto drvPath = resolveDerivedPath(store, *bfd.drvPath); auto outputMap = store.queryDerivationOutputMap(drvPath); auto outputsLeft = std::visit(overloaded { [&](const OutputsSpec::All &) { return StringSet {}; }, [&](const OutputsSpec::Names & names) { return static_cast<StringSet>(names); }, }, bfd.outputs.raw); for (auto iter = outputMap.begin(); iter != outputMap.end();) { auto & outputName = iter->first; if (bfd.outputs.contains(outputName)) { outputsLeft.erase(outputName); ++iter; } else { iter = outputMap.erase(iter); } } if (!outputsLeft.empty()) throw Error("derivation '%s' does not have an outputs %s", store.printStorePath(drvPath), concatStringsSep(", ", quoteStrings(std::get<OutputsSpec::Names>(bfd.outputs.raw)))); return outputMap; } }
17,298
C++
.cc
405
31.079012
136
0.572031
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,827
indirect-root-store.cc
NixOS_nix/src/libstore/indirect-root-store.cc
#include "indirect-root-store.hh" namespace nix { void IndirectRootStore::makeSymlink(const Path & link, const Path & target) { /* Create directories up to `gcRoot'. */ createDirs(dirOf(link)); /* Create the new symlink. */ Path tempLink = fmt("%1%.tmp-%2%-%3%", link, getpid(), rand()); createSymlink(target, tempLink); /* Atomically replace the old one. */ std::filesystem::rename(tempLink, link); } Path IndirectRootStore::addPermRoot(const StorePath & storePath, const Path & _gcRoot) { Path gcRoot(canonPath(_gcRoot)); if (isInStore(gcRoot)) throw Error( "creating a garbage collector root (%1%) in the Nix store is forbidden " "(are you running nix-build inside the store?)", gcRoot); /* Register this root with the garbage collector, if it's running. This should be superfluous since the caller should have registered this root yet, but let's be on the safe side. */ addTempRoot(storePath); /* Don't clobber the link if it already exists and doesn't point to the Nix store. */ if (pathExists(gcRoot) && (!std::filesystem::is_symlink(gcRoot) || !isInStore(readLink(gcRoot)))) throw Error("cannot create symlink '%1%'; already exists", gcRoot); makeSymlink(gcRoot, printStorePath(storePath)); addIndirectRoot(gcRoot); return gcRoot; } }
1,397
C++
.cc
34
35.529412
101
0.675296
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,828
derived-path-map.cc
NixOS_nix/src/libstore/derived-path-map.cc
#include "derived-path-map.hh" #include "util.hh" namespace nix { template<typename V> typename DerivedPathMap<V>::ChildNode & DerivedPathMap<V>::ensureSlot(const SingleDerivedPath & k) { std::function<ChildNode &(const SingleDerivedPath & )> initIter; initIter = [&](const auto & k) -> auto & { return std::visit(overloaded { [&](const SingleDerivedPath::Opaque & bo) -> auto & { // will not overwrite if already there return map[bo.path]; }, [&](const SingleDerivedPath::Built & bfd) -> auto & { auto & n = initIter(*bfd.drvPath); return n.childMap[bfd.output]; }, }, k.raw()); }; return initIter(k); } template<typename V> typename DerivedPathMap<V>::ChildNode * DerivedPathMap<V>::findSlot(const SingleDerivedPath & k) { std::function<ChildNode *(const SingleDerivedPath & )> initIter; initIter = [&](const auto & k) { return std::visit(overloaded { [&](const SingleDerivedPath::Opaque & bo) { auto it = map.find(bo.path); return it != map.end() ? &it->second : nullptr; }, [&](const SingleDerivedPath::Built & bfd) { auto * n = initIter(*bfd.drvPath); if (!n) return (ChildNode *)nullptr; auto it = n->childMap.find(bfd.output); return it != n->childMap.end() ? &it->second : nullptr; }, }, k.raw()); }; return initIter(k); } } // instantiations namespace nix { template<> bool DerivedPathMap<std::set<std::string>>::ChildNode::operator == ( const DerivedPathMap<std::set<std::string>>::ChildNode &) const noexcept = default; // TODO libc++ 16 (used by darwin) missing `std::map::operator <=>`, can't do yet. #if 0 template<> std::strong_ordering DerivedPathMap<std::set<std::string>>::ChildNode::operator <=> ( const DerivedPathMap<std::set<std::string>>::ChildNode &) const noexcept = default; #endif template struct DerivedPathMap<std::set<std::string>>::ChildNode; template struct DerivedPathMap<std::set<std::string>>; };
2,251
C++
.cc
60
29.533333
98
0.587615
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,829
remote-fs-accessor.cc
NixOS_nix/src/libstore/remote-fs-accessor.cc
#include <nlohmann/json.hpp> #include "remote-fs-accessor.hh" #include "nar-accessor.hh" #include <sys/types.h> #include <sys/stat.h> #include <fcntl.h> namespace nix { RemoteFSAccessor::RemoteFSAccessor(ref<Store> store, bool requireValidPath, const Path & cacheDir) : store(store) , requireValidPath(requireValidPath) , cacheDir(cacheDir) { if (cacheDir != "") createDirs(cacheDir); } Path RemoteFSAccessor::makeCacheFile(std::string_view hashPart, const std::string & ext) { assert(cacheDir != ""); return fmt("%s/%s.%s", cacheDir, hashPart, ext); } ref<SourceAccessor> RemoteFSAccessor::addToCache(std::string_view hashPart, std::string && nar) { if (cacheDir != "") { try { /* FIXME: do this asynchronously. */ writeFile(makeCacheFile(hashPart, "nar"), nar); } catch (...) { ignoreExceptionExceptInterrupt(); } } auto narAccessor = makeNarAccessor(std::move(nar)); nars.emplace(hashPart, narAccessor); if (cacheDir != "") { try { nlohmann::json j = listNar(narAccessor, CanonPath::root, true); writeFile(makeCacheFile(hashPart, "ls"), j.dump()); } catch (...) { ignoreExceptionExceptInterrupt(); } } return narAccessor; } std::pair<ref<SourceAccessor>, CanonPath> RemoteFSAccessor::fetch(const CanonPath & path) { auto [storePath, restPath_] = store->toStorePath(path.abs()); auto restPath = CanonPath(restPath_); if (requireValidPath && !store->isValidPath(storePath)) throw InvalidPath("path '%1%' is not a valid store path", store->printStorePath(storePath)); auto i = nars.find(std::string(storePath.hashPart())); if (i != nars.end()) return {i->second, restPath}; std::string listing; Path cacheFile; if (cacheDir != "" && nix::pathExists(cacheFile = makeCacheFile(storePath.hashPart(), "nar"))) { try { listing = nix::readFile(makeCacheFile(storePath.hashPart(), "ls")); auto narAccessor = makeLazyNarAccessor(listing, [cacheFile](uint64_t offset, uint64_t length) { AutoCloseFD fd = toDescriptor(open(cacheFile.c_str(), O_RDONLY #ifndef _WIN32 | O_CLOEXEC #endif )); if (!fd) throw SysError("opening NAR cache file '%s'", cacheFile); if (lseek(fromDescriptorReadOnly(fd.get()), offset, SEEK_SET) != (off_t) offset) throw SysError("seeking in '%s'", cacheFile); std::string buf(length, 0); readFull(fd.get(), buf.data(), length); return buf; }); nars.emplace(storePath.hashPart(), narAccessor); return {narAccessor, restPath}; } catch (SystemError &) { } try { auto narAccessor = makeNarAccessor(nix::readFile(cacheFile)); nars.emplace(storePath.hashPart(), narAccessor); return {narAccessor, restPath}; } catch (SystemError &) { } } StringSink sink; store->narFromPath(storePath, sink); return {addToCache(storePath.hashPart(), std::move(sink.s)), restPath}; } std::optional<SourceAccessor::Stat> RemoteFSAccessor::maybeLstat(const CanonPath & path) { auto res = fetch(path); return res.first->maybeLstat(res.second); } SourceAccessor::DirEntries RemoteFSAccessor::readDirectory(const CanonPath & path) { auto res = fetch(path); return res.first->readDirectory(res.second); } std::string RemoteFSAccessor::readFile(const CanonPath & path) { auto res = fetch(path); return res.first->readFile(res.second); } std::string RemoteFSAccessor::readLink(const CanonPath & path) { auto res = fetch(path); return res.first->readLink(res.second); } }
3,952
C++
.cc
104
30.269231
100
0.621466
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,830
optimise-store.cc
NixOS_nix/src/libstore/optimise-store.cc
#include "local-store.hh" #include "globals.hh" #include "signals.hh" #include "posix-fs-canonicalise.hh" #include "posix-source-accessor.hh" #include <cstdlib> #include <cstring> #include <sys/types.h> #include <sys/stat.h> #include <unistd.h> #include <errno.h> #include <stdio.h> #include <regex> namespace nix { static void makeWritable(const Path & path) { auto st = lstat(path); if (chmod(path.c_str(), st.st_mode | S_IWUSR) == -1) throw SysError("changing writability of '%1%'", path); } struct MakeReadOnly { Path path; MakeReadOnly(const PathView path) : path(path) { } ~MakeReadOnly() { try { /* This will make the path read-only. */ if (path != "") canonicaliseTimestampAndPermissions(path); } catch (...) { ignoreExceptionInDestructor(); } } }; LocalStore::InodeHash LocalStore::loadInodeHash() { debug("loading hash inodes in memory"); InodeHash inodeHash; AutoCloseDir dir(opendir(linksDir.c_str())); if (!dir) throw SysError("opening directory '%1%'", linksDir); struct dirent * dirent; while (errno = 0, dirent = readdir(dir.get())) { /* sic */ checkInterrupt(); // We don't care if we hit non-hash files, anything goes inodeHash.insert(dirent->d_ino); } if (errno) throw SysError("reading directory '%1%'", linksDir); printMsg(lvlTalkative, "loaded %1% hash inodes", inodeHash.size()); return inodeHash; } Strings LocalStore::readDirectoryIgnoringInodes(const Path & path, const InodeHash & inodeHash) { Strings names; AutoCloseDir dir(opendir(path.c_str())); if (!dir) throw SysError("opening directory '%1%'", path); struct dirent * dirent; while (errno = 0, dirent = readdir(dir.get())) { /* sic */ checkInterrupt(); if (inodeHash.count(dirent->d_ino)) { debug("'%1%' is already linked", dirent->d_name); continue; } std::string name = dirent->d_name; if (name == "." || name == "..") continue; names.push_back(name); } if (errno) throw SysError("reading directory '%1%'", path); return names; } void LocalStore::optimisePath_(Activity * act, OptimiseStats & stats, const Path & path, InodeHash & inodeHash, RepairFlag repair) { checkInterrupt(); auto st = lstat(path); #if __APPLE__ /* HFS/macOS has some undocumented security feature disabling hardlinking for special files within .app dirs. Known affected paths include *.app/Contents/{PkgInfo,Resources/\*.lproj,_CodeSignature} and .DS_Store. See https://github.com/NixOS/nix/issues/1443 and https://github.com/NixOS/nix/pull/2230 for more discussion. */ if (std::regex_search(path, std::regex("\\.app/Contents/.+$"))) { debug("'%1%' is not allowed to be linked in macOS", path); return; } #endif if (S_ISDIR(st.st_mode)) { Strings names = readDirectoryIgnoringInodes(path, inodeHash); for (auto & i : names) optimisePath_(act, stats, path + "/" + i, inodeHash, repair); return; } /* We can hard link regular files and maybe symlinks. */ if (!S_ISREG(st.st_mode) #if CAN_LINK_SYMLINK && !S_ISLNK(st.st_mode) #endif ) return; /* Sometimes SNAFUs can cause files in the Nix store to be modified, in particular when running programs as root under NixOS (example: $fontconfig/var/cache being modified). Skip those files. FIXME: check the modification time. */ if (S_ISREG(st.st_mode) && (st.st_mode & S_IWUSR)) { warn("skipping suspicious writable file '%1%'", path); return; } /* This can still happen on top-level files. */ if (st.st_nlink > 1 && inodeHash.count(st.st_ino)) { debug("'%s' is already linked, with %d other file(s)", path, st.st_nlink - 2); return; } /* Hash the file. Note that hashPath() returns the hash over the NAR serialisation, which includes the execute bit on the file. Thus, executable and non-executable files with the same contents *won't* be linked (which is good because otherwise the permissions would be screwed up). Also note that if `path' is a symlink, then we're hashing the contents of the symlink (i.e. the result of readlink()), not the contents of the target (which may not even exist). */ Hash hash = ({ hashPath( {make_ref<PosixSourceAccessor>(), CanonPath(path)}, FileSerialisationMethod::NixArchive, HashAlgorithm::SHA256).first; }); debug("'%1%' has hash '%2%'", path, hash.to_string(HashFormat::Nix32, true)); /* Check if this is a known hash. */ std::filesystem::path linkPath = std::filesystem::path{linksDir} / hash.to_string(HashFormat::Nix32, false); /* Maybe delete the link, if it has been corrupted. */ if (std::filesystem::exists(std::filesystem::symlink_status(linkPath))) { auto stLink = lstat(linkPath.string()); if (st.st_size != stLink.st_size || (repair && hash != ({ hashPath( PosixSourceAccessor::createAtRoot(linkPath), FileSerialisationMethod::NixArchive, HashAlgorithm::SHA256).first; }))) { // XXX: Consider overwriting linkPath with our valid version. warn("removing corrupted link %s", linkPath); warn("There may be more corrupted paths." "\nYou should run `nix-store --verify --check-contents --repair` to fix them all"); std::filesystem::remove(linkPath); } } if (!std::filesystem::exists(std::filesystem::symlink_status(linkPath))) { /* Nope, create a hard link in the links directory. */ try { std::filesystem::create_hard_link(path, linkPath); inodeHash.insert(st.st_ino); } catch (std::filesystem::filesystem_error & e) { if (e.code() == std::errc::file_exists) { /* Fall through if another process created ‘linkPath’ before we did. */ } else if (e.code() == std::errc::no_space_on_device) { /* On ext4, that probably means the directory index is full. When that happens, it's fine to ignore it: we just effectively disable deduplication of this file. */ printInfo("cannot link '%s' to '%s': %s", linkPath, path, strerror(errno)); return; } else throw; } } /* Yes! We've seen a file with the same contents. Replace the current file with a hard link to that file. */ auto stLink = lstat(linkPath.string()); if (st.st_ino == stLink.st_ino) { debug("'%1%' is already linked to '%2%'", path, linkPath); return; } printMsg(lvlTalkative, "linking '%1%' to '%2%'", path, linkPath); /* Make the containing directory writable, but only if it's not the store itself (we don't want or need to mess with its permissions). */ const Path dirOfPath(dirOf(path)); bool mustToggle = dirOfPath != realStoreDir.get(); if (mustToggle) makeWritable(dirOfPath); /* When we're done, make the directory read-only again and reset its timestamp back to 0. */ MakeReadOnly makeReadOnly(mustToggle ? dirOfPath : ""); std::filesystem::path tempLink = fmt("%1%/.tmp-link-%2%-%3%", realStoreDir, getpid(), rand()); try { std::filesystem::create_hard_link(linkPath, tempLink); inodeHash.insert(st.st_ino); } catch (std::filesystem::filesystem_error & e) { if (e.code() == std::errc::too_many_links) { /* Too many links to the same file (>= 32000 on most file systems). This is likely to happen with empty files. Just shrug and ignore. */ if (st.st_size) printInfo("'%1%' has maximum number of links", linkPath); return; } throw; } /* Atomically replace the old file with the new hard link. */ try { std::filesystem::rename(tempLink, path); } catch (std::filesystem::filesystem_error & e) { std::filesystem::remove(tempLink); printError("unable to unlink '%1%'", tempLink); if (e.code() == std::errc::too_many_links) { /* Some filesystems generate too many links on the rename, rather than on the original link. (Probably it temporarily increases the st_nlink field before decreasing it again.) */ debug("'%s' has reached maximum number of links", linkPath); return; } throw; } stats.filesLinked++; stats.bytesFreed += st.st_size; if (act) act->result(resFileLinked, st.st_size #ifndef _WIN32 , st.st_blocks #endif ); } void LocalStore::optimiseStore(OptimiseStats & stats) { Activity act(*logger, actOptimiseStore); auto paths = queryAllValidPaths(); InodeHash inodeHash = loadInodeHash(); act.progress(0, paths.size()); uint64_t done = 0; for (auto & i : paths) { addTempRoot(i); if (!isValidPath(i)) continue; /* path was GC'ed, probably */ { Activity act(*logger, lvlTalkative, actUnknown, fmt("optimising path '%s'", printStorePath(i))); optimisePath_(&act, stats, realStoreDir + "/" + std::string(i.to_string()), inodeHash, NoRepair); } done++; act.progress(done, paths.size()); } } void LocalStore::optimiseStore() { OptimiseStats stats; optimiseStore(stats); printInfo("%s freed by hard-linking %d files", showBytes(stats.bytesFreed), stats.filesLinked); } void LocalStore::optimisePath(const Path & path, RepairFlag repair) { OptimiseStats stats; InodeHash inodeHash; if (settings.autoOptimiseStore) optimisePath_(nullptr, stats, path, inodeHash, repair); } }
10,152
C++
.cc
255
32.298039
112
0.616636
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,831
export-import.cc
NixOS_nix/src/libstore/export-import.cc
#include "serialise.hh" #include "store-api.hh" #include "archive.hh" #include "common-protocol.hh" #include "common-protocol-impl.hh" #include <algorithm> namespace nix { void Store::exportPaths(const StorePathSet & paths, Sink & sink) { auto sorted = topoSortPaths(paths); std::reverse(sorted.begin(), sorted.end()); std::string doneLabel("paths exported"); //logger->incExpected(doneLabel, sorted.size()); for (auto & path : sorted) { //Activity act(*logger, lvlInfo, "exporting path '%s'", path); sink << 1; exportPath(path, sink); //logger->incProgress(doneLabel); } sink << 0; } void Store::exportPath(const StorePath & path, Sink & sink) { auto info = queryPathInfo(path); HashSink hashSink(HashAlgorithm::SHA256); TeeSink teeSink(sink, hashSink); narFromPath(path, teeSink); /* Refuse to export paths that have changed. This prevents filesystem corruption from spreading to other machines. Don't complain if the stored hash is zero (unknown). */ Hash hash = hashSink.currentHash().first; if (hash != info->narHash && info->narHash != Hash(info->narHash.algo)) throw Error("hash of path '%s' has changed from '%s' to '%s'!", printStorePath(path), info->narHash.to_string(HashFormat::Nix32, true), hash.to_string(HashFormat::Nix32, true)); teeSink << exportMagic << printStorePath(path); CommonProto::write(*this, CommonProto::WriteConn { .to = teeSink }, info->references); teeSink << (info->deriver ? printStorePath(*info->deriver) : "") << 0; } StorePaths Store::importPaths(Source & source, CheckSigsFlag checkSigs) { StorePaths res; while (true) { auto n = readNum<uint64_t>(source); if (n == 0) break; if (n != 1) throw Error("input doesn't look like something created by 'nix-store --export'"); /* Extract the NAR from the source. */ StringSink saved; TeeSource tee { source, saved }; NullFileSystemObjectSink ether; parseDump(ether, tee); uint32_t magic = readInt(source); if (magic != exportMagic) throw Error("Nix archive cannot be imported; wrong format"); auto path = parseStorePath(readString(source)); //Activity act(*logger, lvlInfo, "importing path '%s'", info.path); auto references = CommonProto::Serialise<StorePathSet>::read(*this, CommonProto::ReadConn { .from = source }); auto deriver = readString(source); auto narHash = hashString(HashAlgorithm::SHA256, saved.s); ValidPathInfo info { path, narHash }; if (deriver != "") info.deriver = parseStorePath(deriver); info.references = references; info.narSize = saved.s.size(); // Ignore optional legacy signature. if (readInt(source) == 1) readString(source); // Can't use underlying source, which would have been exhausted auto source = StringSource(saved.s); addToStore(info, source, NoRepair, checkSigs); res.push_back(info.path); } return res; } }
3,206
C++
.cc
81
32.691358
133
0.641844
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,832
nar-accessor.cc
NixOS_nix/src/libstore/nar-accessor.cc
#include "nar-accessor.hh" #include "archive.hh" #include <map> #include <stack> #include <nlohmann/json.hpp> namespace nix { struct NarMember { SourceAccessor::Stat stat; std::string target; /* If this is a directory, all the children of the directory. */ std::map<std::string, NarMember> children; }; struct NarMemberConstructor : CreateRegularFileSink { private: NarMember & narMember; uint64_t & pos; public: NarMemberConstructor(NarMember & nm, uint64_t & pos) : narMember(nm), pos(pos) { } void isExecutable() override { narMember.stat.isExecutable = true; } void preallocateContents(uint64_t size) override { narMember.stat.fileSize = size; narMember.stat.narOffset = pos; } void operator () (std::string_view data) override { } }; struct NarAccessor : public SourceAccessor { std::optional<const std::string> nar; GetNarBytes getNarBytes; NarMember root; struct NarIndexer : FileSystemObjectSink, Source { NarAccessor & acc; Source & source; std::stack<NarMember *> parents; bool isExec = false; uint64_t pos = 0; NarIndexer(NarAccessor & acc, Source & source) : acc(acc), source(source) { } NarMember & createMember(const CanonPath & path, NarMember member) { size_t level = 0; for (auto _ : path) { (void)_; ++level; } while (parents.size() > level) parents.pop(); if (parents.empty()) { acc.root = std::move(member); parents.push(&acc.root); return acc.root; } else { if (parents.top()->stat.type != Type::tDirectory) throw Error("NAR file missing parent directory of path '%s'", path); auto result = parents.top()->children.emplace(*path.baseName(), std::move(member)); auto & ref = result.first->second; parents.push(&ref); return ref; } } void createDirectory(const CanonPath & path) override { createMember(path, NarMember{ .stat = { .type = Type::tDirectory, .fileSize = 0, .isExecutable = false, .narOffset = 0 } }); } void createRegularFile(const CanonPath & path, std::function<void(CreateRegularFileSink &)> func) override { auto & nm = createMember(path, NarMember{ .stat = { .type = Type::tRegular, .fileSize = 0, .isExecutable = false, .narOffset = 0 } }); NarMemberConstructor nmc { nm, pos }; func(nmc); } void createSymlink(const CanonPath & path, const std::string & target) override { createMember(path, NarMember{ .stat = {.type = Type::tSymlink}, .target = target}); } size_t read(char * data, size_t len) override { auto n = source.read(data, len); pos += n; return n; } }; NarAccessor(std::string && _nar) : nar(_nar) { StringSource source(*nar); NarIndexer indexer(*this, source); parseDump(indexer, indexer); } NarAccessor(Source & source) { NarIndexer indexer(*this, source); parseDump(indexer, indexer); } NarAccessor(const std::string & listing, GetNarBytes getNarBytes) : getNarBytes(getNarBytes) { using json = nlohmann::json; std::function<void(NarMember &, json &)> recurse; recurse = [&](NarMember & member, json & v) { std::string type = v["type"]; if (type == "directory") { member.stat = {.type = Type::tDirectory}; for (const auto &[name, function] : v["entries"].items()) { recurse(member.children[name], function); } } else if (type == "regular") { member.stat = { .type = Type::tRegular, .fileSize = v["size"], .isExecutable = v.value("executable", false), .narOffset = v["narOffset"] }; } else if (type == "symlink") { member.stat = {.type = Type::tSymlink}; member.target = v.value("target", ""); } else return; }; json v = json::parse(listing); recurse(root, v); } NarMember * find(const CanonPath & path) { NarMember * current = &root; for (const auto & i : path) { if (current->stat.type != Type::tDirectory) return nullptr; auto child = current->children.find(std::string(i)); if (child == current->children.end()) return nullptr; current = &child->second; } return current; } NarMember & get(const CanonPath & path) { auto result = find(path); if (!result) throw Error("NAR file does not contain path '%1%'", path); return *result; } std::optional<Stat> maybeLstat(const CanonPath & path) override { auto i = find(path); if (!i) return std::nullopt; return i->stat; } DirEntries readDirectory(const CanonPath & path) override { auto i = get(path); if (i.stat.type != Type::tDirectory) throw Error("path '%1%' inside NAR file is not a directory", path); DirEntries res; for (const auto & child : i.children) res.insert_or_assign(child.first, std::nullopt); return res; } std::string readFile(const CanonPath & path) override { auto i = get(path); if (i.stat.type != Type::tRegular) throw Error("path '%1%' inside NAR file is not a regular file", path); if (getNarBytes) return getNarBytes(*i.stat.narOffset, *i.stat.fileSize); assert(nar); return std::string(*nar, *i.stat.narOffset, *i.stat.fileSize); } std::string readLink(const CanonPath & path) override { auto i = get(path); if (i.stat.type != Type::tSymlink) throw Error("path '%1%' inside NAR file is not a symlink", path); return i.target; } }; ref<SourceAccessor> makeNarAccessor(std::string && nar) { return make_ref<NarAccessor>(std::move(nar)); } ref<SourceAccessor> makeNarAccessor(Source & source) { return make_ref<NarAccessor>(source); } ref<SourceAccessor> makeLazyNarAccessor(const std::string & listing, GetNarBytes getNarBytes) { return make_ref<NarAccessor>(listing, getNarBytes); } using nlohmann::json; json listNar(ref<SourceAccessor> accessor, const CanonPath & path, bool recurse) { auto st = accessor->lstat(path); json obj = json::object(); switch (st.type) { case SourceAccessor::Type::tRegular: obj["type"] = "regular"; if (st.fileSize) obj["size"] = *st.fileSize; if (st.isExecutable) obj["executable"] = true; if (st.narOffset && *st.narOffset) obj["narOffset"] = *st.narOffset; break; case SourceAccessor::Type::tDirectory: obj["type"] = "directory"; { obj["entries"] = json::object(); json &res2 = obj["entries"]; for (const auto & [name, type] : accessor->readDirectory(path)) { if (recurse) { res2[name] = listNar(accessor, path / name, true); } else res2[name] = json::object(); } } break; case SourceAccessor::Type::tSymlink: obj["type"] = "symlink"; obj["target"] = accessor->readLink(path); break; case SourceAccessor::Type::tMisc: assert(false); // cannot happen for NARs } return obj; } }
8,157
C++
.cc
244
24.151639
114
0.550592
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,833
filetransfer.cc
NixOS_nix/src/libstore/filetransfer.cc
#include "filetransfer.hh" #include "globals.hh" #include "config-global.hh" #include "store-api.hh" #include "s3.hh" #include "compression.hh" #include "finally.hh" #include "callback.hh" #include "signals.hh" #if ENABLE_S3 #include <aws/core/client/ClientConfiguration.h> #endif #if __linux__ # include "namespaces.hh" #endif #include <unistd.h> #include <fcntl.h> #include <curl/curl.h> #include <algorithm> #include <cmath> #include <cstring> #include <iostream> #include <queue> #include <random> #include <thread> #include <regex> using namespace std::string_literals; namespace nix { FileTransferSettings fileTransferSettings; static GlobalConfig::Register rFileTransferSettings(&fileTransferSettings); struct curlFileTransfer : public FileTransfer { CURLM * curlm = 0; std::random_device rd; std::mt19937 mt19937; struct TransferItem : public std::enable_shared_from_this<TransferItem> { curlFileTransfer & fileTransfer; FileTransferRequest request; FileTransferResult result; Activity act; bool done = false; // whether either the success or failure function has been called Callback<FileTransferResult> callback; CURL * req = 0; // buffer to accompany the `req` above char errbuf[CURL_ERROR_SIZE]; bool active = false; // whether the handle has been added to the multi object std::string statusMsg; unsigned int attempt = 0; /* Don't start this download until the specified time point has been reached. */ std::chrono::steady_clock::time_point embargo; struct curl_slist * requestHeaders = 0; std::string encoding; bool acceptRanges = false; curl_off_t writtenToSink = 0; std::chrono::steady_clock::time_point startTime = std::chrono::steady_clock::now(); inline static const std::set<long> successfulStatuses {200, 201, 204, 206, 304, 0 /* other protocol */}; /* Get the HTTP status code, or 0 for other protocols. */ long getHTTPStatus() { long httpStatus = 0; long protocol = 0; curl_easy_getinfo(req, CURLINFO_PROTOCOL, &protocol); if (protocol == CURLPROTO_HTTP || protocol == CURLPROTO_HTTPS) curl_easy_getinfo(req, CURLINFO_RESPONSE_CODE, &httpStatus); return httpStatus; } TransferItem(curlFileTransfer & fileTransfer, const FileTransferRequest & request, Callback<FileTransferResult> && callback) : fileTransfer(fileTransfer) , request(request) , act(*logger, lvlTalkative, actFileTransfer, fmt(request.data ? "uploading '%s'" : "downloading '%s'", request.uri), {request.uri}, request.parentAct) , callback(std::move(callback)) , finalSink([this](std::string_view data) { if (errorSink) { (*errorSink)(data); } if (this->request.dataCallback) { auto httpStatus = getHTTPStatus(); /* Only write data to the sink if this is a successful response. */ if (successfulStatuses.count(httpStatus)) { writtenToSink += data.size(); this->request.dataCallback(data); } } else this->result.data.append(data); }) { result.urls.push_back(request.uri); requestHeaders = curl_slist_append(requestHeaders, "Accept-Encoding: zstd, br, gzip, deflate, bzip2, xz"); if (!request.expectedETag.empty()) requestHeaders = curl_slist_append(requestHeaders, ("If-None-Match: " + request.expectedETag).c_str()); if (!request.mimeType.empty()) requestHeaders = curl_slist_append(requestHeaders, ("Content-Type: " + request.mimeType).c_str()); for (auto it = request.headers.begin(); it != request.headers.end(); ++it){ requestHeaders = curl_slist_append(requestHeaders, fmt("%s: %s", it->first, it->second).c_str()); } } ~TransferItem() { if (req) { if (active) curl_multi_remove_handle(fileTransfer.curlm, req); curl_easy_cleanup(req); } if (requestHeaders) curl_slist_free_all(requestHeaders); try { if (!done) fail(FileTransferError(Interrupted, {}, "download of '%s' was interrupted", request.uri)); } catch (...) { ignoreExceptionInDestructor(); } } void failEx(std::exception_ptr ex) { assert(!done); done = true; callback.rethrow(ex); } template<class T> void fail(T && e) { failEx(std::make_exception_ptr(std::forward<T>(e))); } LambdaSink finalSink; std::shared_ptr<FinishSink> decompressionSink; std::optional<StringSink> errorSink; std::exception_ptr writeException; size_t writeCallback(void * contents, size_t size, size_t nmemb) { try { size_t realSize = size * nmemb; result.bodySize += realSize; if (!decompressionSink) { decompressionSink = makeDecompressionSink(encoding, finalSink); if (! successfulStatuses.count(getHTTPStatus())) { // In this case we want to construct a TeeSink, to keep // the response around (which we figure won't be big // like an actual download should be) to improve error // messages. errorSink = StringSink { }; } } (*decompressionSink)({(char *) contents, realSize}); return realSize; } catch (...) { writeException = std::current_exception(); return 0; } } static size_t writeCallbackWrapper(void * contents, size_t size, size_t nmemb, void * userp) { return ((TransferItem *) userp)->writeCallback(contents, size, nmemb); } void appendCurrentUrl() { char * effectiveUriCStr = nullptr; curl_easy_getinfo(req, CURLINFO_EFFECTIVE_URL, &effectiveUriCStr); if (effectiveUriCStr && *result.urls.rbegin() != effectiveUriCStr) result.urls.push_back(effectiveUriCStr); } size_t headerCallback(void * contents, size_t size, size_t nmemb) { size_t realSize = size * nmemb; std::string line((char *) contents, realSize); printMsg(lvlVomit, "got header for '%s': %s", request.uri, trim(line)); static std::regex statusLine("HTTP/[^ ]+ +[0-9]+(.*)", std::regex::extended | std::regex::icase); if (std::smatch match; std::regex_match(line, match, statusLine)) { result.etag = ""; result.data.clear(); result.bodySize = 0; statusMsg = trim(match.str(1)); acceptRanges = false; encoding = ""; appendCurrentUrl(); } else { auto i = line.find(':'); if (i != std::string::npos) { std::string name = toLower(trim(line.substr(0, i))); if (name == "etag") { result.etag = trim(line.substr(i + 1)); /* Hack to work around a GitHub bug: it sends ETags, but ignores If-None-Match. So if we get the expected ETag on a 200 response, then shut down the connection because we already have the data. */ long httpStatus = 0; curl_easy_getinfo(req, CURLINFO_RESPONSE_CODE, &httpStatus); if (result.etag == request.expectedETag && httpStatus == 200) { debug("shutting down on 200 HTTP response with expected ETag"); return 0; } } else if (name == "content-encoding") encoding = trim(line.substr(i + 1)); else if (name == "accept-ranges" && toLower(trim(line.substr(i + 1))) == "bytes") acceptRanges = true; else if (name == "link" || name == "x-amz-meta-link") { auto value = trim(line.substr(i + 1)); static std::regex linkRegex("<([^>]*)>; rel=\"immutable\"", std::regex::extended | std::regex::icase); if (std::smatch match; std::regex_match(value, match, linkRegex)) result.immutableUrl = match.str(1); else debug("got invalid link header '%s'", value); } } } return realSize; } static size_t headerCallbackWrapper(void * contents, size_t size, size_t nmemb, void * userp) { return ((TransferItem *) userp)->headerCallback(contents, size, nmemb); } int progressCallback(double dltotal, double dlnow) { try { act.progress(dlnow, dltotal); } catch (nix::Interrupted &) { assert(getInterrupted()); } return getInterrupted(); } static int progressCallbackWrapper(void * userp, double dltotal, double dlnow, double ultotal, double ulnow) { return ((TransferItem *) userp)->progressCallback(dltotal, dlnow); } static int debugCallback(CURL * handle, curl_infotype type, char * data, size_t size, void * userptr) { if (type == CURLINFO_TEXT) vomit("curl: %s", chomp(std::string(data, size))); return 0; } size_t readOffset = 0; size_t readCallback(char *buffer, size_t size, size_t nitems) { if (readOffset == request.data->length()) return 0; auto count = std::min(size * nitems, request.data->length() - readOffset); assert(count); memcpy(buffer, request.data->data() + readOffset, count); readOffset += count; return count; } static size_t readCallbackWrapper(char *buffer, size_t size, size_t nitems, void * userp) { return ((TransferItem *) userp)->readCallback(buffer, size, nitems); } void init() { if (!req) req = curl_easy_init(); curl_easy_reset(req); if (verbosity >= lvlVomit) { curl_easy_setopt(req, CURLOPT_VERBOSE, 1); curl_easy_setopt(req, CURLOPT_DEBUGFUNCTION, TransferItem::debugCallback); } curl_easy_setopt(req, CURLOPT_URL, request.uri.c_str()); curl_easy_setopt(req, CURLOPT_FOLLOWLOCATION, 1L); curl_easy_setopt(req, CURLOPT_MAXREDIRS, 10); curl_easy_setopt(req, CURLOPT_NOSIGNAL, 1); curl_easy_setopt(req, CURLOPT_USERAGENT, ("curl/" LIBCURL_VERSION " Nix/" + nixVersion + (fileTransferSettings.userAgentSuffix != "" ? " " + fileTransferSettings.userAgentSuffix.get() : "")).c_str()); #if LIBCURL_VERSION_NUM >= 0x072b00 curl_easy_setopt(req, CURLOPT_PIPEWAIT, 1); #endif #if LIBCURL_VERSION_NUM >= 0x072f00 if (fileTransferSettings.enableHttp2) curl_easy_setopt(req, CURLOPT_HTTP_VERSION, CURL_HTTP_VERSION_2TLS); else curl_easy_setopt(req, CURLOPT_HTTP_VERSION, CURL_HTTP_VERSION_1_1); #endif curl_easy_setopt(req, CURLOPT_WRITEFUNCTION, TransferItem::writeCallbackWrapper); curl_easy_setopt(req, CURLOPT_WRITEDATA, this); curl_easy_setopt(req, CURLOPT_HEADERFUNCTION, TransferItem::headerCallbackWrapper); curl_easy_setopt(req, CURLOPT_HEADERDATA, this); curl_easy_setopt(req, CURLOPT_PROGRESSFUNCTION, progressCallbackWrapper); curl_easy_setopt(req, CURLOPT_PROGRESSDATA, this); curl_easy_setopt(req, CURLOPT_NOPROGRESS, 0); curl_easy_setopt(req, CURLOPT_HTTPHEADER, requestHeaders); if (settings.downloadSpeed.get() > 0) curl_easy_setopt(req, CURLOPT_MAX_RECV_SPEED_LARGE, (curl_off_t) (settings.downloadSpeed.get() * 1024)); if (request.head) curl_easy_setopt(req, CURLOPT_NOBODY, 1); if (request.data) { curl_easy_setopt(req, CURLOPT_UPLOAD, 1L); curl_easy_setopt(req, CURLOPT_READFUNCTION, readCallbackWrapper); curl_easy_setopt(req, CURLOPT_READDATA, this); curl_easy_setopt(req, CURLOPT_INFILESIZE_LARGE, (curl_off_t) request.data->length()); } if (request.verifyTLS) { if (settings.caFile != "") curl_easy_setopt(req, CURLOPT_CAINFO, settings.caFile.get().c_str()); } else { curl_easy_setopt(req, CURLOPT_SSL_VERIFYPEER, 0); curl_easy_setopt(req, CURLOPT_SSL_VERIFYHOST, 0); } curl_easy_setopt(req, CURLOPT_CONNECTTIMEOUT, fileTransferSettings.connectTimeout.get()); curl_easy_setopt(req, CURLOPT_LOW_SPEED_LIMIT, 1L); curl_easy_setopt(req, CURLOPT_LOW_SPEED_TIME, fileTransferSettings.stalledDownloadTimeout.get()); /* If no file exist in the specified path, curl continues to work anyway as if netrc support was disabled. */ curl_easy_setopt(req, CURLOPT_NETRC_FILE, settings.netrcFile.get().c_str()); curl_easy_setopt(req, CURLOPT_NETRC, CURL_NETRC_OPTIONAL); if (writtenToSink) curl_easy_setopt(req, CURLOPT_RESUME_FROM_LARGE, writtenToSink); curl_easy_setopt(req, CURLOPT_ERRORBUFFER, errbuf); errbuf[0] = 0; result.data.clear(); result.bodySize = 0; } void finish(CURLcode code) { auto finishTime = std::chrono::steady_clock::now(); auto httpStatus = getHTTPStatus(); debug("finished %s of '%s'; curl status = %d, HTTP status = %d, body = %d bytes, duration = %.2f s", request.verb(), request.uri, code, httpStatus, result.bodySize, std::chrono::duration_cast<std::chrono::milliseconds>(finishTime - startTime).count() / 1000.0f ); appendCurrentUrl(); if (decompressionSink) { try { decompressionSink->finish(); } catch (...) { writeException = std::current_exception(); } } if (code == CURLE_WRITE_ERROR && result.etag == request.expectedETag) { code = CURLE_OK; httpStatus = 304; } if (writeException) failEx(writeException); else if (code == CURLE_OK && successfulStatuses.count(httpStatus)) { result.cached = httpStatus == 304; // In 2021, GitHub responds to If-None-Match with 304, // but omits ETag. We just use the If-None-Match etag // since 304 implies they are the same. if (httpStatus == 304 && result.etag == "") result.etag = request.expectedETag; act.progress(result.bodySize, result.bodySize); done = true; callback(std::move(result)); } else { // We treat most errors as transient, but won't retry when hopeless Error err = Transient; if (httpStatus == 404 || httpStatus == 410 || code == CURLE_FILE_COULDNT_READ_FILE) { // The file is definitely not there err = NotFound; } else if (httpStatus == 401 || httpStatus == 403 || httpStatus == 407) { // Don't retry on authentication/authorization failures err = Forbidden; } else if (httpStatus >= 400 && httpStatus < 500 && httpStatus != 408 && httpStatus != 429) { // Most 4xx errors are client errors and are probably not worth retrying: // * 408 means the server timed out waiting for us, so we try again // * 429 means too many requests, so we retry (with a delay) err = Misc; } else if (httpStatus == 501 || httpStatus == 505 || httpStatus == 511) { // Let's treat most 5xx (server) errors as transient, except for a handful: // * 501 not implemented // * 505 http version not supported // * 511 we're behind a captive portal err = Misc; } else { // Don't bother retrying on certain cURL errors either // Allow selecting a subset of enum values #pragma GCC diagnostic push #pragma GCC diagnostic ignored "-Wswitch-enum" switch (code) { case CURLE_FAILED_INIT: case CURLE_URL_MALFORMAT: case CURLE_NOT_BUILT_IN: case CURLE_REMOTE_ACCESS_DENIED: case CURLE_FILE_COULDNT_READ_FILE: case CURLE_FUNCTION_NOT_FOUND: case CURLE_ABORTED_BY_CALLBACK: case CURLE_BAD_FUNCTION_ARGUMENT: case CURLE_INTERFACE_FAILED: case CURLE_UNKNOWN_OPTION: case CURLE_SSL_CACERT_BADFILE: case CURLE_TOO_MANY_REDIRECTS: case CURLE_WRITE_ERROR: case CURLE_UNSUPPORTED_PROTOCOL: err = Misc; break; default: // Shut up warnings break; } #pragma GCC diagnostic pop } attempt++; std::optional<std::string> response; if (errorSink) response = std::move(errorSink->s); auto exc = code == CURLE_ABORTED_BY_CALLBACK && getInterrupted() ? FileTransferError(Interrupted, std::move(response), "%s of '%s' was interrupted", request.verb(), request.uri) : httpStatus != 0 ? FileTransferError(err, std::move(response), "unable to %s '%s': HTTP error %d%s", request.verb(), request.uri, httpStatus, code == CURLE_OK ? "" : fmt(" (curl error: %s)", curl_easy_strerror(code))) : FileTransferError(err, std::move(response), "unable to %s '%s': %s (%d) %s", request.verb(), request.uri, curl_easy_strerror(code), code, errbuf); /* If this is a transient error, then maybe retry the download after a while. If we're writing to a sink, we can only retry if the server supports ranged requests. */ if (err == Transient && attempt < request.tries && (!this->request.dataCallback || writtenToSink == 0 || (acceptRanges && encoding.empty()))) { int ms = request.baseRetryTimeMs * std::pow(2.0f, attempt - 1 + std::uniform_real_distribution<>(0.0, 0.5)(fileTransfer.mt19937)); if (writtenToSink) warn("%s; retrying from offset %d in %d ms", exc.what(), writtenToSink, ms); else warn("%s; retrying in %d ms", exc.what(), ms); embargo = std::chrono::steady_clock::now() + std::chrono::milliseconds(ms); fileTransfer.enqueueItem(shared_from_this()); } else fail(std::move(exc)); } } }; struct State { struct EmbargoComparator { bool operator() (const std::shared_ptr<TransferItem> & i1, const std::shared_ptr<TransferItem> & i2) { return i1->embargo > i2->embargo; } }; bool quit = false; std::priority_queue<std::shared_ptr<TransferItem>, std::vector<std::shared_ptr<TransferItem>>, EmbargoComparator> incoming; }; Sync<State> state_; #ifndef _WIN32 // TODO need graceful async exit support on Windows? /* We can't use a std::condition_variable to wake up the curl thread, because it only monitors file descriptors. So use a pipe instead. */ Pipe wakeupPipe; #endif std::thread workerThread; curlFileTransfer() : mt19937(rd()) { static std::once_flag globalInit; std::call_once(globalInit, curl_global_init, CURL_GLOBAL_ALL); curlm = curl_multi_init(); #if LIBCURL_VERSION_NUM >= 0x072b00 // Multiplex requires >= 7.43.0 curl_multi_setopt(curlm, CURLMOPT_PIPELINING, CURLPIPE_MULTIPLEX); #endif #if LIBCURL_VERSION_NUM >= 0x071e00 // Max connections requires >= 7.30.0 curl_multi_setopt(curlm, CURLMOPT_MAX_TOTAL_CONNECTIONS, fileTransferSettings.httpConnections.get()); #endif #ifndef _WIN32 // TODO need graceful async exit support on Windows? wakeupPipe.create(); fcntl(wakeupPipe.readSide.get(), F_SETFL, O_NONBLOCK); #endif workerThread = std::thread([&]() { workerThreadEntry(); }); } ~curlFileTransfer() { stopWorkerThread(); workerThread.join(); if (curlm) curl_multi_cleanup(curlm); } void stopWorkerThread() { /* Signal the worker thread to exit. */ { auto state(state_.lock()); state->quit = true; } #ifndef _WIN32 // TODO need graceful async exit support on Windows? writeFull(wakeupPipe.writeSide.get(), " ", false); #endif } void workerThreadMain() { /* Cause this thread to be notified on SIGINT. */ #ifndef _WIN32 // TODO need graceful async exit support on Windows? auto callback = createInterruptCallback([&]() { stopWorkerThread(); }); #endif #if __linux__ try { tryUnshareFilesystem(); } catch (nix::Error & e) { e.addTrace({}, "in download thread"); throw; } #endif std::map<CURL *, std::shared_ptr<TransferItem>> items; bool quit = false; std::chrono::steady_clock::time_point nextWakeup; while (!quit) { checkInterrupt(); /* Let curl do its thing. */ int running; CURLMcode mc = curl_multi_perform(curlm, &running); if (mc != CURLM_OK) throw nix::Error("unexpected error from curl_multi_perform(): %s", curl_multi_strerror(mc)); /* Set the promises of any finished requests. */ CURLMsg * msg; int left; while ((msg = curl_multi_info_read(curlm, &left))) { if (msg->msg == CURLMSG_DONE) { auto i = items.find(msg->easy_handle); assert(i != items.end()); i->second->finish(msg->data.result); curl_multi_remove_handle(curlm, i->second->req); i->second->active = false; items.erase(i); } } /* Wait for activity, including wakeup events. */ int numfds = 0; struct curl_waitfd extraFDs[1]; #ifndef _WIN32 // TODO need graceful async exit support on Windows? extraFDs[0].fd = wakeupPipe.readSide.get(); extraFDs[0].events = CURL_WAIT_POLLIN; extraFDs[0].revents = 0; #endif long maxSleepTimeMs = items.empty() ? 10000 : 100; auto sleepTimeMs = nextWakeup != std::chrono::steady_clock::time_point() ? std::max(0, (int) std::chrono::duration_cast<std::chrono::milliseconds>(nextWakeup - std::chrono::steady_clock::now()).count()) : maxSleepTimeMs; vomit("download thread waiting for %d ms", sleepTimeMs); mc = curl_multi_wait(curlm, extraFDs, 1, sleepTimeMs, &numfds); if (mc != CURLM_OK) throw nix::Error("unexpected error from curl_multi_wait(): %s", curl_multi_strerror(mc)); nextWakeup = std::chrono::steady_clock::time_point(); /* Add new curl requests from the incoming requests queue, except for requests that are embargoed (waiting for a retry timeout to expire). */ if (extraFDs[0].revents & CURL_WAIT_POLLIN) { char buf[1024]; auto res = read(extraFDs[0].fd, buf, sizeof(buf)); if (res == -1 && errno != EINTR) throw SysError("reading curl wakeup socket"); } std::vector<std::shared_ptr<TransferItem>> incoming; auto now = std::chrono::steady_clock::now(); { auto state(state_.lock()); while (!state->incoming.empty()) { auto item = state->incoming.top(); if (item->embargo <= now) { incoming.push_back(item); state->incoming.pop(); } else { if (nextWakeup == std::chrono::steady_clock::time_point() || item->embargo < nextWakeup) nextWakeup = item->embargo; break; } } quit = state->quit; } for (auto & item : incoming) { debug("starting %s of %s", item->request.verb(), item->request.uri); item->init(); curl_multi_add_handle(curlm, item->req); item->active = true; items[item->req] = item; } } debug("download thread shutting down"); } void workerThreadEntry() { try { workerThreadMain(); } catch (nix::Interrupted & e) { } catch (std::exception & e) { printError("unexpected error in download thread: %s", e.what()); } { auto state(state_.lock()); while (!state->incoming.empty()) state->incoming.pop(); state->quit = true; } } void enqueueItem(std::shared_ptr<TransferItem> item) { if (item->request.data && !hasPrefix(item->request.uri, "http://") && !hasPrefix(item->request.uri, "https://")) throw nix::Error("uploading to '%s' is not supported", item->request.uri); { auto state(state_.lock()); if (state->quit) throw nix::Error("cannot enqueue download request because the download thread is shutting down"); state->incoming.push(item); } #ifndef _WIN32 // TODO need graceful async exit support on Windows? writeFull(wakeupPipe.writeSide.get(), " "); #endif } #if ENABLE_S3 std::tuple<std::string, std::string, Store::Params> parseS3Uri(std::string uri) { auto [path, params] = splitUriAndParams(uri); auto slash = path.find('/', 5); // 5 is the length of "s3://" prefix if (slash == std::string::npos) throw nix::Error("bad S3 URI '%s'", path); std::string bucketName(path, 5, slash - 5); std::string key(path, slash + 1); return {bucketName, key, params}; } #endif void enqueueFileTransfer(const FileTransferRequest & request, Callback<FileTransferResult> callback) override { /* Ugly hack to support s3:// URIs. */ if (hasPrefix(request.uri, "s3://")) { // FIXME: do this on a worker thread try { #if ENABLE_S3 auto [bucketName, key, params] = parseS3Uri(request.uri); std::string profile = getOr(params, "profile", ""); std::string region = getOr(params, "region", Aws::Region::US_EAST_1); std::string scheme = getOr(params, "scheme", ""); std::string endpoint = getOr(params, "endpoint", ""); S3Helper s3Helper(profile, region, scheme, endpoint); Activity act(*logger, lvlTalkative, actFileTransfer, fmt("downloading '%s'", request.uri), {request.uri}, request.parentAct); // FIXME: implement ETag auto s3Res = s3Helper.getObject(bucketName, key); FileTransferResult res; if (!s3Res.data) throw FileTransferError(NotFound, "S3 object '%s' does not exist", request.uri); res.data = std::move(*s3Res.data); res.urls.push_back(request.uri); callback(std::move(res)); #else throw nix::Error("cannot download '%s' because Nix is not built with S3 support", request.uri); #endif } catch (...) { callback.rethrow(); } return; } enqueueItem(std::make_shared<TransferItem>(*this, request, std::move(callback))); } }; ref<curlFileTransfer> makeCurlFileTransfer() { return make_ref<curlFileTransfer>(); } ref<FileTransfer> getFileTransfer() { static ref<curlFileTransfer> fileTransfer = makeCurlFileTransfer(); if (fileTransfer->state_.lock()->quit) fileTransfer = makeCurlFileTransfer(); return fileTransfer; } ref<FileTransfer> makeFileTransfer() { return makeCurlFileTransfer(); } std::future<FileTransferResult> FileTransfer::enqueueFileTransfer(const FileTransferRequest & request) { auto promise = std::make_shared<std::promise<FileTransferResult>>(); enqueueFileTransfer(request, {[promise](std::future<FileTransferResult> fut) { try { promise->set_value(fut.get()); } catch (...) { promise->set_exception(std::current_exception()); } }}); return promise->get_future(); } FileTransferResult FileTransfer::download(const FileTransferRequest & request) { return enqueueFileTransfer(request).get(); } FileTransferResult FileTransfer::upload(const FileTransferRequest & request) { /* Note: this method is the same as download, but helps in readability */ return enqueueFileTransfer(request).get(); } void FileTransfer::download( FileTransferRequest && request, Sink & sink, std::function<void(FileTransferResult)> resultCallback) { /* Note: we can't call 'sink' via request.dataCallback, because that would cause the sink to execute on the fileTransfer thread. If 'sink' is a coroutine, this will fail. Also, if the sink is expensive (e.g. one that does decompression and writing to the Nix store), it would stall the download thread too much. Therefore we use a buffer to communicate data between the download thread and the calling thread. */ struct State { bool quit = false; std::exception_ptr exc; std::string data; std::condition_variable avail, request; }; auto _state = std::make_shared<Sync<State>>(); /* In case of an exception, wake up the download thread. FIXME: abort the download request. */ Finally finally([&]() { auto state(_state->lock()); state->quit = true; state->request.notify_one(); }); request.dataCallback = [_state](std::string_view data) { auto state(_state->lock()); if (state->quit) return; /* If the buffer is full, then go to sleep until the calling thread wakes us up (i.e. when it has removed data from the buffer). We don't wait forever to prevent stalling the download thread. (Hopefully sleeping will throttle the sender.) */ if (state->data.size() > fileTransferSettings.downloadBufferSize) { debug("download buffer is full; going to sleep"); static bool haveWarned = false; warnOnce(haveWarned, "download buffer is full; consider increasing the 'download-buffer-size' setting"); state.wait_for(state->request, std::chrono::seconds(10)); } /* Append data to the buffer and wake up the calling thread. */ state->data.append(data); state->avail.notify_one(); }; enqueueFileTransfer(request, {[_state, resultCallback{std::move(resultCallback)}](std::future<FileTransferResult> fut) { auto state(_state->lock()); state->quit = true; try { auto res = fut.get(); if (resultCallback) resultCallback(std::move(res)); } catch (...) { state->exc = std::current_exception(); } state->avail.notify_one(); state->request.notify_one(); }}); while (true) { checkInterrupt(); std::string chunk; /* Grab data if available, otherwise wait for the download thread to wake us up. */ { auto state(_state->lock()); if (state->data.empty()) { if (state->quit) { if (state->exc) std::rethrow_exception(state->exc); return; } state.wait(state->avail); if (state->data.empty()) continue; } chunk = std::move(state->data); /* Reset state->data after the move, since we check data.empty() */ state->data = ""; state->request.notify_one(); } /* Flush the data to the sink and wake up the download thread if it's blocked on a full buffer. We don't hold the state lock while doing this to prevent blocking the download thread if sink() takes a long time. */ sink(chunk); } } template<typename... Args> FileTransferError::FileTransferError(FileTransfer::Error error, std::optional<std::string> response, const Args & ... args) : Error(args...), error(error), response(response) { const auto hf = HintFmt(args...); // FIXME: Due to https://github.com/NixOS/nix/issues/3841 we don't know how // to print different messages for different verbosity levels. For now // we add some heuristics for detecting when we want to show the response. if (response && (response->size() < 1024 || response->find("<html>") != std::string::npos)) err.msg = HintFmt("%1%\n\nresponse body:\n\n%2%", Uncolored(hf.str()), chomp(*response)); else err.msg = hf; } }
36,128
C++
.cc
797
32.308657
150
0.546336
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,834
parsed-derivations.cc
NixOS_nix/src/libstore/parsed-derivations.cc
#include "parsed-derivations.hh" #include <nlohmann/json.hpp> #include <regex> namespace nix { ParsedDerivation::ParsedDerivation(const StorePath & drvPath, BasicDerivation & drv) : drvPath(drvPath), drv(drv) { /* Parse the __json attribute, if any. */ auto jsonAttr = drv.env.find("__json"); if (jsonAttr != drv.env.end()) { try { structuredAttrs = std::make_unique<nlohmann::json>(nlohmann::json::parse(jsonAttr->second)); } catch (std::exception & e) { throw Error("cannot process __json attribute of '%s': %s", drvPath.to_string(), e.what()); } } } ParsedDerivation::~ParsedDerivation() { } std::optional<std::string> ParsedDerivation::getStringAttr(const std::string & name) const { if (structuredAttrs) { auto i = structuredAttrs->find(name); if (i == structuredAttrs->end()) return {}; else { if (!i->is_string()) throw Error("attribute '%s' of derivation '%s' must be a string", name, drvPath.to_string()); return i->get<std::string>(); } } else { auto i = drv.env.find(name); if (i == drv.env.end()) return {}; else return i->second; } } bool ParsedDerivation::getBoolAttr(const std::string & name, bool def) const { if (structuredAttrs) { auto i = structuredAttrs->find(name); if (i == structuredAttrs->end()) return def; else { if (!i->is_boolean()) throw Error("attribute '%s' of derivation '%s' must be a Boolean", name, drvPath.to_string()); return i->get<bool>(); } } else { auto i = drv.env.find(name); if (i == drv.env.end()) return def; else return i->second == "1"; } } std::optional<Strings> ParsedDerivation::getStringsAttr(const std::string & name) const { if (structuredAttrs) { auto i = structuredAttrs->find(name); if (i == structuredAttrs->end()) return {}; else { if (!i->is_array()) throw Error("attribute '%s' of derivation '%s' must be a list of strings", name, drvPath.to_string()); Strings res; for (auto j = i->begin(); j != i->end(); ++j) { if (!j->is_string()) throw Error("attribute '%s' of derivation '%s' must be a list of strings", name, drvPath.to_string()); res.push_back(j->get<std::string>()); } return res; } } else { auto i = drv.env.find(name); if (i == drv.env.end()) return {}; else return tokenizeString<Strings>(i->second); } } StringSet ParsedDerivation::getRequiredSystemFeatures() const { // FIXME: cache this? StringSet res; for (auto & i : getStringsAttr("requiredSystemFeatures").value_or(Strings())) res.insert(i); if (!drv.type().hasKnownOutputPaths()) res.insert("ca-derivations"); return res; } bool ParsedDerivation::canBuildLocally(Store & localStore) const { if (drv.platform != settings.thisSystem.get() && !settings.extraPlatforms.get().count(drv.platform) && !drv.isBuiltin()) return false; if (settings.maxBuildJobs.get() == 0 && !drv.isBuiltin()) return false; for (auto & feature : getRequiredSystemFeatures()) if (!localStore.systemFeatures.get().count(feature)) return false; return true; } bool ParsedDerivation::willBuildLocally(Store & localStore) const { return getBoolAttr("preferLocalBuild") && canBuildLocally(localStore); } bool ParsedDerivation::substitutesAllowed() const { return settings.alwaysAllowSubstitutes ? true : getBoolAttr("allowSubstitutes", true); } bool ParsedDerivation::useUidRange() const { return getRequiredSystemFeatures().count("uid-range"); } static std::regex shVarName("[A-Za-z_][A-Za-z0-9_]*"); /** * Write a JSON representation of store object metadata, such as the * hash and the references. * * @note Do *not* use `ValidPathInfo::toJSON` because this function is * subject to stronger stability requirements since it is used to * prepare build environments. Perhaps someday we'll have a versionining * mechanism to allow this to evolve again and get back in sync, but for * now we must not change - not even extend - the behavior. */ static nlohmann::json pathInfoToJSON( Store & store, const StorePathSet & storePaths) { using nlohmann::json; nlohmann::json::array_t jsonList = json::array(); for (auto & storePath : storePaths) { auto info = store.queryPathInfo(storePath); auto & jsonPath = jsonList.emplace_back(json::object()); jsonPath["narHash"] = info->narHash.to_string(HashFormat::Nix32, true); jsonPath["narSize"] = info->narSize; { auto & jsonRefs = jsonPath["references"] = json::array(); for (auto & ref : info->references) jsonRefs.emplace_back(store.printStorePath(ref)); } if (info->ca) jsonPath["ca"] = renderContentAddress(info->ca); // Add the path to the object whose metadata we are including. jsonPath["path"] = store.printStorePath(storePath); jsonPath["valid"] = true; jsonPath["closureSize"] = ({ uint64_t totalNarSize = 0; StorePathSet closure; store.computeFSClosure(info->path, closure, false, false); for (auto & p : closure) { auto info = store.queryPathInfo(p); totalNarSize += info->narSize; } totalNarSize; }); } return jsonList; } std::optional<nlohmann::json> ParsedDerivation::prepareStructuredAttrs(Store & store, const StorePathSet & inputPaths) { auto structuredAttrs = getStructuredAttrs(); if (!structuredAttrs) return std::nullopt; auto json = *structuredAttrs; /* Add an "outputs" object containing the output paths. */ nlohmann::json outputs; for (auto & i : drv.outputs) outputs[i.first] = hashPlaceholder(i.first); json["outputs"] = outputs; /* Handle exportReferencesGraph. */ auto e = json.find("exportReferencesGraph"); if (e != json.end() && e->is_object()) { for (auto i = e->begin(); i != e->end(); ++i) { StorePathSet storePaths; for (auto & p : *i) storePaths.insert(store.toStorePath(p.get<std::string>()).first); json[i.key()] = pathInfoToJSON(store, store.exportReferences(storePaths, inputPaths)); } } return json; } /* As a convenience to bash scripts, write a shell file that maps all attributes that are representable in bash - namely, strings, integers, nulls, Booleans, and arrays and objects consisting entirely of those values. (So nested arrays or objects are not supported.) */ std::string writeStructuredAttrsShell(const nlohmann::json & json) { auto handleSimpleType = [](const nlohmann::json & value) -> std::optional<std::string> { if (value.is_string()) return shellEscape(value.get<std::string_view>()); if (value.is_number()) { auto f = value.get<float>(); if (std::ceil(f) == f) return std::to_string(value.get<int>()); } if (value.is_null()) return std::string("''"); if (value.is_boolean()) return value.get<bool>() ? std::string("1") : std::string(""); return {}; }; std::string jsonSh; for (auto & [key, value] : json.items()) { if (!std::regex_match(key, shVarName)) continue; auto s = handleSimpleType(value); if (s) jsonSh += fmt("declare %s=%s\n", key, *s); else if (value.is_array()) { std::string s2; bool good = true; for (auto & value2 : value) { auto s3 = handleSimpleType(value2); if (!s3) { good = false; break; } s2 += *s3; s2 += ' '; } if (good) jsonSh += fmt("declare -a %s=(%s)\n", key, s2); } else if (value.is_object()) { std::string s2; bool good = true; for (auto & [key2, value2] : value.items()) { auto s3 = handleSimpleType(value2); if (!s3) { good = false; break; } s2 += fmt("[%s]=%s ", shellEscape(key2), *s3); } if (good) jsonSh += fmt("declare -A %s=(%s)\n", key, s2); } } return jsonSh; } }
8,761
C++
.cc
237
28.991561
122
0.586951
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,835
sqlite.cc
NixOS_nix/src/libstore/sqlite.cc
#include "sqlite.hh" #include "globals.hh" #include "util.hh" #include "url.hh" #include "signals.hh" #include <sqlite3.h> #include <atomic> #include <thread> namespace nix { SQLiteError::SQLiteError(const char *path, const char *errMsg, int errNo, int extendedErrNo, int offset, HintFmt && hf) : Error(""), path(path), errMsg(errMsg), errNo(errNo), extendedErrNo(extendedErrNo), offset(offset) { auto offsetStr = (offset == -1) ? "" : "at offset " + std::to_string(offset) + ": "; err.msg = HintFmt("%s: %s%s, %s (in '%s')", Uncolored(hf.str()), offsetStr, sqlite3_errstr(extendedErrNo), errMsg, path ? path : "(in-memory)"); } [[noreturn]] void SQLiteError::throw_(sqlite3 * db, HintFmt && hf) { int err = sqlite3_errcode(db); int exterr = sqlite3_extended_errcode(db); int offset = sqlite3_error_offset(db); auto path = sqlite3_db_filename(db, nullptr); auto errMsg = sqlite3_errmsg(db); if (err == SQLITE_BUSY || err == SQLITE_PROTOCOL) { auto exp = SQLiteBusy(path, errMsg, err, exterr, offset, std::move(hf)); exp.err.msg = HintFmt( err == SQLITE_PROTOCOL ? "SQLite database '%s' is busy (SQLITE_PROTOCOL)" : "SQLite database '%s' is busy", path ? path : "(in-memory)"); throw exp; } else throw SQLiteError(path, errMsg, err, exterr, offset, std::move(hf)); } static void traceSQL(void * x, const char * sql) { // wacky delimiters: // so that we're quite unambiguous without escaping anything // notice instead of trace: // so that this can be enabled without getting the firehose in our face. notice("SQL<[%1%]>", sql); }; SQLite::SQLite(const Path & path, SQLiteOpenMode mode) { // useSQLiteWAL also indicates what virtual file system we need. Using // `unix-dotfile` is needed on NFS file systems and on Windows' Subsystem // for Linux (WSL) where useSQLiteWAL should be false by default. const char *vfs = settings.useSQLiteWAL ? 0 : "unix-dotfile"; bool immutable = mode == SQLiteOpenMode::Immutable; int flags = immutable ? SQLITE_OPEN_READONLY : SQLITE_OPEN_READWRITE; if (mode == SQLiteOpenMode::Normal) flags |= SQLITE_OPEN_CREATE; auto uri = "file:" + percentEncode(path) + "?immutable=" + (immutable ? "1" : "0"); int ret = sqlite3_open_v2(uri.c_str(), &db, SQLITE_OPEN_URI | flags, vfs); if (ret != SQLITE_OK) { const char * err = sqlite3_errstr(ret); throw Error("cannot open SQLite database '%s': %s", path, err); } if (sqlite3_busy_timeout(db, 60 * 60 * 1000) != SQLITE_OK) SQLiteError::throw_(db, "setting timeout"); if (getEnv("NIX_DEBUG_SQLITE_TRACES") == "1") { // To debug sqlite statements; trace all of them sqlite3_trace(db, &traceSQL, nullptr); } exec("pragma foreign_keys = 1"); } SQLite::~SQLite() { try { if (db && sqlite3_close(db) != SQLITE_OK) SQLiteError::throw_(db, "closing database"); } catch (...) { ignoreExceptionInDestructor(); } } void SQLite::isCache() { exec("pragma synchronous = off"); exec("pragma main.journal_mode = truncate"); } void SQLite::exec(const std::string & stmt) { retrySQLite<void>([&]() { if (sqlite3_exec(db, stmt.c_str(), 0, 0, 0) != SQLITE_OK) SQLiteError::throw_(db, "executing SQLite statement '%s'", stmt); }); } uint64_t SQLite::getLastInsertedRowId() { return sqlite3_last_insert_rowid(db); } void SQLiteStmt::create(sqlite3 * db, const std::string & sql) { checkInterrupt(); assert(!stmt); if (sqlite3_prepare_v2(db, sql.c_str(), -1, &stmt, 0) != SQLITE_OK) SQLiteError::throw_(db, "creating statement '%s'", sql); this->db = db; this->sql = sql; } SQLiteStmt::~SQLiteStmt() { try { if (stmt && sqlite3_finalize(stmt) != SQLITE_OK) SQLiteError::throw_(db, "finalizing statement '%s'", sql); } catch (...) { ignoreExceptionInDestructor(); } } SQLiteStmt::Use::Use(SQLiteStmt & stmt) : stmt(stmt) { assert(stmt.stmt); /* Note: sqlite3_reset() returns the error code for the most recent call to sqlite3_step(). So ignore it. */ sqlite3_reset(stmt); } SQLiteStmt::Use::~Use() { sqlite3_reset(stmt); } SQLiteStmt::Use & SQLiteStmt::Use::operator () (std::string_view value, bool notNull) { if (notNull) { if (sqlite3_bind_text(stmt, curArg++, value.data(), -1, SQLITE_TRANSIENT) != SQLITE_OK) SQLiteError::throw_(stmt.db, "binding argument"); } else bind(); return *this; } SQLiteStmt::Use & SQLiteStmt::Use::operator () (const unsigned char * data, size_t len, bool notNull) { if (notNull) { if (sqlite3_bind_blob(stmt, curArg++, data, len, SQLITE_TRANSIENT) != SQLITE_OK) SQLiteError::throw_(stmt.db, "binding argument"); } else bind(); return *this; } SQLiteStmt::Use & SQLiteStmt::Use::operator () (int64_t value, bool notNull) { if (notNull) { if (sqlite3_bind_int64(stmt, curArg++, value) != SQLITE_OK) SQLiteError::throw_(stmt.db, "binding argument"); } else bind(); return *this; } SQLiteStmt::Use & SQLiteStmt::Use::bind() { if (sqlite3_bind_null(stmt, curArg++) != SQLITE_OK) SQLiteError::throw_(stmt.db, "binding argument"); return *this; } int SQLiteStmt::Use::step() { return sqlite3_step(stmt); } void SQLiteStmt::Use::exec() { int r = step(); assert(r != SQLITE_ROW); if (r != SQLITE_DONE) SQLiteError::throw_(stmt.db, fmt("executing SQLite statement '%s'", sqlite3_expanded_sql(stmt.stmt))); } bool SQLiteStmt::Use::next() { int r = step(); if (r != SQLITE_DONE && r != SQLITE_ROW) SQLiteError::throw_(stmt.db, fmt("executing SQLite query '%s'", sqlite3_expanded_sql(stmt.stmt))); return r == SQLITE_ROW; } std::string SQLiteStmt::Use::getStr(int col) { auto s = (const char *) sqlite3_column_text(stmt, col); assert(s); return s; } int64_t SQLiteStmt::Use::getInt(int col) { // FIXME: detect nulls? return sqlite3_column_int64(stmt, col); } bool SQLiteStmt::Use::isNull(int col) { return sqlite3_column_type(stmt, col) == SQLITE_NULL; } SQLiteTxn::SQLiteTxn(sqlite3 * db) { this->db = db; if (sqlite3_exec(db, "begin;", 0, 0, 0) != SQLITE_OK) SQLiteError::throw_(db, "starting transaction"); active = true; } void SQLiteTxn::commit() { if (sqlite3_exec(db, "commit;", 0, 0, 0) != SQLITE_OK) SQLiteError::throw_(db, "committing transaction"); active = false; } SQLiteTxn::~SQLiteTxn() { try { if (active && sqlite3_exec(db, "rollback;", 0, 0, 0) != SQLITE_OK) SQLiteError::throw_(db, "aborting transaction"); } catch (...) { ignoreExceptionInDestructor(); } } void handleSQLiteBusy(const SQLiteBusy & e, time_t & nextWarning) { time_t now = time(0); if (now > nextWarning) { nextWarning = now + 10; logWarning({ .msg = HintFmt(e.what()) }); } /* Sleep for a while since retrying the transaction right away is likely to fail again. */ checkInterrupt(); /* <= 0.1s */ std::this_thread::sleep_for(std::chrono::milliseconds { rand() % 100 }); } }
7,382
C++
.cc
228
27.657895
119
0.626861
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,836
daemon.cc
NixOS_nix/src/libstore/daemon.cc
#include "daemon.hh" #include "signals.hh" #include "worker-protocol.hh" #include "worker-protocol-connection.hh" #include "worker-protocol-impl.hh" #include "build-result.hh" #include "store-api.hh" #include "store-cast.hh" #include "gc-store.hh" #include "log-store.hh" #include "indirect-root-store.hh" #include "path-with-outputs.hh" #include "finally.hh" #include "archive.hh" #include "derivations.hh" #include "args.hh" #include "git.hh" #ifndef _WIN32 // TODO need graceful async exit support on Windows? # include "monitor-fd.hh" #endif #include <sstream> namespace nix::daemon { Sink & operator << (Sink & sink, const Logger::Fields & fields) { sink << fields.size(); for (auto & f : fields) { sink << f.type; if (f.type == Logger::Field::tInt) sink << f.i; else if (f.type == Logger::Field::tString) sink << f.s; else unreachable(); } return sink; } /* Logger that forwards log messages to the client, *if* we're in a state where the protocol allows it (i.e., when canSendStderr is true). */ struct TunnelLogger : public Logger { FdSink & to; struct State { bool canSendStderr = false; std::vector<std::string> pendingMsgs; }; Sync<State> state_; WorkerProto::Version clientVersion; TunnelLogger(FdSink & to, WorkerProto::Version clientVersion) : to(to), clientVersion(clientVersion) { } void enqueueMsg(const std::string & s) { auto state(state_.lock()); if (state->canSendStderr) { assert(state->pendingMsgs.empty()); try { to(s); to.flush(); } catch (...) { /* Write failed; that means that the other side is gone. */ state->canSendStderr = false; throw; } } else state->pendingMsgs.push_back(s); } void log(Verbosity lvl, std::string_view s) override { if (lvl > verbosity) return; StringSink buf; buf << STDERR_NEXT << (s + "\n"); enqueueMsg(buf.s); } void logEI(const ErrorInfo & ei) override { if (ei.level > verbosity) return; std::ostringstream oss; showErrorInfo(oss, ei, false); StringSink buf; buf << STDERR_NEXT << toView(oss); enqueueMsg(buf.s); } /* startWork() means that we're starting an operation for which we want to send out stderr to the client. */ void startWork() { auto state(state_.lock()); state->canSendStderr = true; for (auto & msg : state->pendingMsgs) to(msg); state->pendingMsgs.clear(); to.flush(); } /* stopWork() means that we're done; stop sending stderr to the client. */ void stopWork(const Error * ex = nullptr) { auto state(state_.lock()); state->canSendStderr = false; if (!ex) to << STDERR_LAST; else { if (GET_PROTOCOL_MINOR(clientVersion) >= 26) { to << STDERR_ERROR << *ex; } else { to << STDERR_ERROR << ex->what() << ex->info().status; } } } void startActivity(ActivityId act, Verbosity lvl, ActivityType type, const std::string & s, const Fields & fields, ActivityId parent) override { if (GET_PROTOCOL_MINOR(clientVersion) < 20) { if (!s.empty()) log(lvl, s + "..."); return; } StringSink buf; buf << STDERR_START_ACTIVITY << act << lvl << type << s << fields << parent; enqueueMsg(buf.s); } void stopActivity(ActivityId act) override { if (GET_PROTOCOL_MINOR(clientVersion) < 20) return; StringSink buf; buf << STDERR_STOP_ACTIVITY << act; enqueueMsg(buf.s); } void result(ActivityId act, ResultType type, const Fields & fields) override { if (GET_PROTOCOL_MINOR(clientVersion) < 20) return; StringSink buf; buf << STDERR_RESULT << act << type << fields; enqueueMsg(buf.s); } }; struct TunnelSink : Sink { Sink & to; TunnelSink(Sink & to) : to(to) { } void operator () (std::string_view data) override { to << STDERR_WRITE; writeString(data, to); } }; struct TunnelSource : BufferedSource { Source & from; BufferedSink & to; TunnelSource(Source & from, BufferedSink & to) : from(from), to(to) { } size_t readUnbuffered(char * data, size_t len) override { to << STDERR_READ << len; to.flush(); size_t n = readString(data, len, from); if (n == 0) throw EndOfFile("unexpected end-of-file"); return n; } }; struct ClientSettings { bool keepFailed; bool keepGoing; bool tryFallback; Verbosity verbosity; unsigned int maxBuildJobs; time_t maxSilentTime; bool verboseBuild; unsigned int buildCores; bool useSubstitutes; StringMap overrides; void apply(TrustedFlag trusted) { settings.keepFailed = keepFailed; settings.keepGoing = keepGoing; settings.tryFallback = tryFallback; nix::verbosity = verbosity; settings.maxBuildJobs.assign(maxBuildJobs); settings.maxSilentTime = maxSilentTime; settings.verboseBuild = verboseBuild; settings.buildCores = buildCores; settings.useSubstitutes = useSubstitutes; for (auto & i : overrides) { auto & name(i.first); auto & value(i.second); auto setSubstituters = [&](Setting<Strings> & res) { if (name != res.name && res.aliases.count(name) == 0) return false; StringSet trusted = settings.trustedSubstituters; for (auto & s : settings.substituters.get()) trusted.insert(s); Strings subs; auto ss = tokenizeString<Strings>(value); for (auto & s : ss) if (trusted.count(s)) subs.push_back(s); else if (!hasSuffix(s, "/") && trusted.count(s + "/")) subs.push_back(s + "/"); else warn("ignoring untrusted substituter '%s', you are not a trusted user.\n" "Run `man nix.conf` for more information on the `substituters` configuration option.", s); res = subs; return true; }; try { if (name == "ssh-auth-sock") // obsolete ; else if (name == experimentalFeatureSettings.experimentalFeatures.name) { // We don’t want to forward the experimental features to // the daemon, as that could cause some pretty weird stuff if (parseFeatures(tokenizeString<StringSet>(value)) != experimentalFeatureSettings.experimentalFeatures.get()) debug("Ignoring the client-specified experimental features"); } else if (name == "plugin-files") { warn("Ignoring the client-specified plugin-files.\n" "The client specifying plugins to the daemon never made sense, and was removed in Nix >=2.14."); } else if (trusted || name == settings.buildTimeout.name || name == settings.maxSilentTime.name || name == settings.pollInterval.name || name == "connect-timeout" || (name == "builders" && value == "")) settings.set(name, value); else if (setSubstituters(settings.substituters)) ; else warn("ignoring the client-specified setting '%s', because it is a restricted setting and you are not a trusted user", name); } catch (UsageError & e) { warn(e.what()); } } } }; static void performOp(TunnelLogger * logger, ref<Store> store, TrustedFlag trusted, RecursiveFlag recursive, WorkerProto::BasicServerConnection & conn, WorkerProto::Op op) { WorkerProto::ReadConn rconn(conn); WorkerProto::WriteConn wconn(conn); switch (op) { case WorkerProto::Op::IsValidPath: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); bool result = store->isValidPath(path); logger->stopWork(); conn.to << result; break; } case WorkerProto::Op::QueryValidPaths: { auto paths = WorkerProto::Serialise<StorePathSet>::read(*store, rconn); SubstituteFlag substitute = NoSubstitute; if (GET_PROTOCOL_MINOR(conn.protoVersion) >= 27) { substitute = readInt(conn.from) ? Substitute : NoSubstitute; } logger->startWork(); if (substitute) { store->substitutePaths(paths); } auto res = store->queryValidPaths(paths, substitute); logger->stopWork(); WorkerProto::write(*store, wconn, res); break; } case WorkerProto::Op::HasSubstitutes: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); StorePathSet paths; // FIXME paths.insert(path); auto res = store->querySubstitutablePaths(paths); logger->stopWork(); conn.to << (res.count(path) != 0); break; } case WorkerProto::Op::QuerySubstitutablePaths: { auto paths = WorkerProto::Serialise<StorePathSet>::read(*store, rconn); logger->startWork(); auto res = store->querySubstitutablePaths(paths); logger->stopWork(); WorkerProto::write(*store, wconn, res); break; } case WorkerProto::Op::QueryPathHash: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); auto hash = store->queryPathInfo(path)->narHash; logger->stopWork(); conn.to << hash.to_string(HashFormat::Base16, false); break; } case WorkerProto::Op::QueryReferences: case WorkerProto::Op::QueryReferrers: case WorkerProto::Op::QueryValidDerivers: case WorkerProto::Op::QueryDerivationOutputs: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); StorePathSet paths; if (op == WorkerProto::Op::QueryReferences) for (auto & i : store->queryPathInfo(path)->references) paths.insert(i); else if (op == WorkerProto::Op::QueryReferrers) store->queryReferrers(path, paths); else if (op == WorkerProto::Op::QueryValidDerivers) paths = store->queryValidDerivers(path); else paths = store->queryDerivationOutputs(path); logger->stopWork(); WorkerProto::write(*store, wconn, paths); break; } case WorkerProto::Op::QueryDerivationOutputNames: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); auto names = store->readDerivation(path).outputNames(); logger->stopWork(); conn.to << names; break; } case WorkerProto::Op::QueryDerivationOutputMap: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); auto outputs = store->queryPartialDerivationOutputMap(path); logger->stopWork(); WorkerProto::write(*store, wconn, outputs); break; } case WorkerProto::Op::QueryDeriver: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); auto info = store->queryPathInfo(path); logger->stopWork(); conn.to << (info->deriver ? store->printStorePath(*info->deriver) : ""); break; } case WorkerProto::Op::QueryPathFromHashPart: { auto hashPart = readString(conn.from); logger->startWork(); auto path = store->queryPathFromHashPart(hashPart); logger->stopWork(); conn.to << (path ? store->printStorePath(*path) : ""); break; } case WorkerProto::Op::AddToStore: { if (GET_PROTOCOL_MINOR(conn.protoVersion) >= 25) { auto name = readString(conn.from); auto camStr = readString(conn.from); auto refs = WorkerProto::Serialise<StorePathSet>::read(*store, rconn); bool repairBool; conn.from >> repairBool; auto repair = RepairFlag{repairBool}; logger->startWork(); auto pathInfo = [&]() { // NB: FramedSource must be out of scope before logger->stopWork(); // FIXME: this means that if there is an error // half-way through, the client will keep sending // data, since we haven't sent it the error yet. auto [contentAddressMethod, hashAlgo] = ContentAddressMethod::parseWithAlgo(camStr); FramedSource source(conn.from); FileSerialisationMethod dumpMethod; switch (contentAddressMethod.getFileIngestionMethod()) { case FileIngestionMethod::Flat: dumpMethod = FileSerialisationMethod::Flat; break; case FileIngestionMethod::NixArchive: dumpMethod = FileSerialisationMethod::NixArchive; break; case FileIngestionMethod::Git: // Use NAR; Git is not a serialization method dumpMethod = FileSerialisationMethod::NixArchive; break; default: assert(false); } // TODO these two steps are essentially RemoteStore::addCAToStore. Move it up to Store. auto path = store->addToStoreFromDump(source, name, dumpMethod, contentAddressMethod, hashAlgo, refs, repair); return store->queryPathInfo(path); }(); logger->stopWork(); WorkerProto::Serialise<ValidPathInfo>::write(*store, wconn, *pathInfo); } else { HashAlgorithm hashAlgo; std::string baseName; ContentAddressMethod method; { bool fixed; uint8_t recursive; std::string hashAlgoRaw; conn.from >> baseName >> fixed /* obsolete */ >> recursive >> hashAlgoRaw; if (recursive > true) throw Error("unsupported FileIngestionMethod with value of %i; you may need to upgrade nix-daemon", recursive); method = recursive ? ContentAddressMethod::Raw::NixArchive : ContentAddressMethod::Raw::Flat; /* Compatibility hack. */ if (!fixed) { hashAlgoRaw = "sha256"; method = ContentAddressMethod::Raw::NixArchive; } hashAlgo = parseHashAlgo(hashAlgoRaw); } // Old protocol always sends NAR, regardless of hashing method auto dumpSource = sinkToSource([&](Sink & saved) { /* We parse the NAR dump through into `saved` unmodified, so why all this extra work? We still parse the NAR so that we aren't sending arbitrary data to `saved` unwittingly`, and we know when the NAR ends so we don't consume the rest of `conn.from` and can't parse another command. (We don't trust `addToStoreFromDump` to not eagerly consume the entire stream it's given, past the length of the Nar. */ TeeSource savedNARSource(conn.from, saved); NullFileSystemObjectSink sink; /* just parse the NAR */ parseDump(sink, savedNARSource); }); logger->startWork(); auto path = store->addToStoreFromDump( *dumpSource, baseName, FileSerialisationMethod::NixArchive, method, hashAlgo); logger->stopWork(); conn.to << store->printStorePath(path); } break; } case WorkerProto::Op::AddMultipleToStore: { bool repair, dontCheckSigs; conn.from >> repair >> dontCheckSigs; if (!trusted && dontCheckSigs) dontCheckSigs = false; logger->startWork(); { FramedSource source(conn.from); store->addMultipleToStore(source, RepairFlag{repair}, dontCheckSigs ? NoCheckSigs : CheckSigs); } logger->stopWork(); break; } case WorkerProto::Op::AddTextToStore: { std::string suffix = readString(conn.from); std::string s = readString(conn.from); auto refs = WorkerProto::Serialise<StorePathSet>::read(*store, rconn); logger->startWork(); auto path = ({ StringSource source { s }; store->addToStoreFromDump(source, suffix, FileSerialisationMethod::Flat, ContentAddressMethod::Raw::Text, HashAlgorithm::SHA256, refs, NoRepair); }); logger->stopWork(); conn.to << store->printStorePath(path); break; } case WorkerProto::Op::ExportPath: { auto path = store->parseStorePath(readString(conn.from)); readInt(conn.from); // obsolete logger->startWork(); TunnelSink sink(conn.to); store->exportPath(path, sink); logger->stopWork(); conn.to << 1; break; } case WorkerProto::Op::ImportPaths: { logger->startWork(); TunnelSource source(conn.from, conn.to); auto paths = store->importPaths(source, trusted ? NoCheckSigs : CheckSigs); logger->stopWork(); Strings paths2; for (auto & i : paths) paths2.push_back(store->printStorePath(i)); conn.to << paths2; break; } case WorkerProto::Op::BuildPaths: { auto drvs = WorkerProto::Serialise<DerivedPaths>::read(*store, rconn); BuildMode mode = bmNormal; if (GET_PROTOCOL_MINOR(conn.protoVersion) >= 15) { mode = WorkerProto::Serialise<BuildMode>::read(*store, rconn); /* Repairing is not atomic, so disallowed for "untrusted" clients. FIXME: layer violation in this message: the daemon code (i.e. this file) knows whether a client/connection is trusted, but it does not how how the client was authenticated. The mechanism need not be getting the UID of the other end of a Unix Domain Socket. */ if (mode == bmRepair && !trusted) throw Error("repairing is not allowed because you are not in 'trusted-users'"); } logger->startWork(); store->buildPaths(drvs, mode); logger->stopWork(); conn.to << 1; break; } case WorkerProto::Op::BuildPathsWithResults: { auto drvs = WorkerProto::Serialise<DerivedPaths>::read(*store, rconn); BuildMode mode = bmNormal; mode = WorkerProto::Serialise<BuildMode>::read(*store, rconn); /* Repairing is not atomic, so disallowed for "untrusted" clients. FIXME: layer violation; see above. */ if (mode == bmRepair && !trusted) throw Error("repairing is not allowed because you are not in 'trusted-users'"); logger->startWork(); auto results = store->buildPathsWithResults(drvs, mode); logger->stopWork(); WorkerProto::write(*store, wconn, results); break; } case WorkerProto::Op::BuildDerivation: { auto drvPath = store->parseStorePath(readString(conn.from)); BasicDerivation drv; /* * Note: unlike wopEnsurePath, this operation reads a * derivation-to-be-realized from the client with * readDerivation(Source,Store) rather than reading it from * the local store with Store::readDerivation(). Since the * derivation-to-be-realized is not registered in the store * it cannot be trusted that its outPath was calculated * correctly. */ readDerivation(conn.from, *store, drv, Derivation::nameFromPath(drvPath)); auto buildMode = WorkerProto::Serialise<BuildMode>::read(*store, rconn); logger->startWork(); auto drvType = drv.type(); /* Content-addressed derivations are trustless because their output paths are verified by their content alone, so any derivation is free to try to produce such a path. Input-addressed derivation output paths, however, are calculated from the derivation closure that produced them---even knowing the root derivation is not enough. That the output data actually came from those derivations is fundamentally unverifiable, but the daemon trusts itself on that matter. The question instead is whether the submitted plan has rights to the output paths it wants to fill, and at least the derivation closure proves that. It would have been nice if input-address algorithm merely depended on the build time closure, rather than depending on the derivation closure. That would mean input-addressed paths used at build time would just be trusted and not need their own evidence. This is in fact fine as the same guarantees would hold *inductively*: either the remote builder has those paths and already trusts them, or it needs to build them too and thus their evidence must be provided in turn. The advantage of this variant algorithm is that the evidence for input-addressed paths which the remote builder already has doesn't need to be sent again. That said, now that we have floating CA derivations, it is better that people just migrate to those which also solve this problem, and others. It's the same migration difficulty with strictly more benefit. Lastly, do note that when we parse fixed-output content-addressed derivations, we throw out the precomputed output paths and just store the hashes, so there aren't two competing sources of truth an attacker could exploit. */ if (!(drvType.isCA() || trusted)) throw Error("you are not privileged to build input-addressed derivations"); /* Make sure that the non-input-addressed derivations that got this far are in fact content-addressed if we don't trust them. */ assert(drvType.isCA() || trusted); /* Recompute the derivation path when we cannot trust the original. */ if (!trusted) { /* Recomputing the derivation path for input-address derivations makes it harder to audit them after the fact, since we need the original not-necessarily-resolved derivation to verify the drv derivation as adequate claim to the input-addressed output paths. */ assert(drvType.isCA()); Derivation drv2; static_cast<BasicDerivation &>(drv2) = drv; drvPath = writeDerivation(*store, Derivation { drv2 }); } auto res = store->buildDerivation(drvPath, drv, buildMode); logger->stopWork(); WorkerProto::write(*store, wconn, res); break; } case WorkerProto::Op::EnsurePath: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); store->ensurePath(path); logger->stopWork(); conn.to << 1; break; } case WorkerProto::Op::AddTempRoot: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); store->addTempRoot(path); logger->stopWork(); conn.to << 1; break; } case WorkerProto::Op::AddPermRoot: { if (!trusted) throw Error( "you are not privileged to create perm roots\n\n" "hint: you can just do this client-side without special privileges, and probably want to do that instead."); auto storePath = WorkerProto::Serialise<StorePath>::read(*store, rconn); Path gcRoot = absPath(readString(conn.from)); logger->startWork(); auto & localFSStore = require<LocalFSStore>(*store); localFSStore.addPermRoot(storePath, gcRoot); logger->stopWork(); conn.to << gcRoot; break; } case WorkerProto::Op::AddIndirectRoot: { Path path = absPath(readString(conn.from)); logger->startWork(); auto & indirectRootStore = require<IndirectRootStore>(*store); indirectRootStore.addIndirectRoot(path); logger->stopWork(); conn.to << 1; break; } // Obsolete. case WorkerProto::Op::SyncWithGC: { logger->startWork(); logger->stopWork(); conn.to << 1; break; } case WorkerProto::Op::FindRoots: { logger->startWork(); auto & gcStore = require<GcStore>(*store); Roots roots = gcStore.findRoots(!trusted); logger->stopWork(); size_t size = 0; for (auto & i : roots) size += i.second.size(); conn.to << size; for (auto & [target, links] : roots) for (auto & link : links) conn.to << link << store->printStorePath(target); break; } case WorkerProto::Op::CollectGarbage: { GCOptions options; options.action = (GCOptions::GCAction) readInt(conn.from); options.pathsToDelete = WorkerProto::Serialise<StorePathSet>::read(*store, rconn); conn.from >> options.ignoreLiveness >> options.maxFreed; // obsolete fields readInt(conn.from); readInt(conn.from); readInt(conn.from); GCResults results; logger->startWork(); if (options.ignoreLiveness) throw Error("you are not allowed to ignore liveness"); auto & gcStore = require<GcStore>(*store); gcStore.collectGarbage(options, results); logger->stopWork(); conn.to << results.paths << results.bytesFreed << 0 /* obsolete */; break; } case WorkerProto::Op::SetOptions: { ClientSettings clientSettings; clientSettings.keepFailed = readInt(conn.from); clientSettings.keepGoing = readInt(conn.from); clientSettings.tryFallback = readInt(conn.from); clientSettings.verbosity = (Verbosity) readInt(conn.from); clientSettings.maxBuildJobs = readInt(conn.from); clientSettings.maxSilentTime = readInt(conn.from); readInt(conn.from); // obsolete useBuildHook clientSettings.verboseBuild = lvlError == (Verbosity) readInt(conn.from); readInt(conn.from); // obsolete logType readInt(conn.from); // obsolete printBuildTrace clientSettings.buildCores = readInt(conn.from); clientSettings.useSubstitutes = readInt(conn.from); if (GET_PROTOCOL_MINOR(conn.protoVersion) >= 12) { unsigned int n = readInt(conn.from); for (unsigned int i = 0; i < n; i++) { auto name = readString(conn.from); auto value = readString(conn.from); clientSettings.overrides.emplace(name, value); } } logger->startWork(); // FIXME: use some setting in recursive mode. Will need to use // non-global variables. if (!recursive) clientSettings.apply(trusted); logger->stopWork(); break; } case WorkerProto::Op::QuerySubstitutablePathInfo: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); SubstitutablePathInfos infos; store->querySubstitutablePathInfos({{path, std::nullopt}}, infos); logger->stopWork(); auto i = infos.find(path); if (i == infos.end()) conn.to << 0; else { conn.to << 1 << (i->second.deriver ? store->printStorePath(*i->second.deriver) : ""); WorkerProto::write(*store, wconn, i->second.references); conn.to << i->second.downloadSize << i->second.narSize; } break; } case WorkerProto::Op::QuerySubstitutablePathInfos: { SubstitutablePathInfos infos; StorePathCAMap pathsMap = {}; if (GET_PROTOCOL_MINOR(conn.protoVersion) < 22) { auto paths = WorkerProto::Serialise<StorePathSet>::read(*store, rconn); for (auto & path : paths) pathsMap.emplace(path, std::nullopt); } else pathsMap = WorkerProto::Serialise<StorePathCAMap>::read(*store, rconn); logger->startWork(); store->querySubstitutablePathInfos(pathsMap, infos); logger->stopWork(); conn.to << infos.size(); for (auto & i : infos) { conn.to << store->printStorePath(i.first) << (i.second.deriver ? store->printStorePath(*i.second.deriver) : ""); WorkerProto::write(*store, wconn, i.second.references); conn.to << i.second.downloadSize << i.second.narSize; } break; } case WorkerProto::Op::QueryAllValidPaths: { logger->startWork(); auto paths = store->queryAllValidPaths(); logger->stopWork(); WorkerProto::write(*store, wconn, paths); break; } case WorkerProto::Op::QueryPathInfo: { auto path = store->parseStorePath(readString(conn.from)); std::shared_ptr<const ValidPathInfo> info; logger->startWork(); try { info = store->queryPathInfo(path); } catch (InvalidPath &) { if (GET_PROTOCOL_MINOR(conn.protoVersion) < 17) throw; } logger->stopWork(); if (info) { if (GET_PROTOCOL_MINOR(conn.protoVersion) >= 17) conn.to << 1; WorkerProto::write(*store, wconn, static_cast<const UnkeyedValidPathInfo &>(*info)); } else { assert(GET_PROTOCOL_MINOR(conn.protoVersion) >= 17); conn.to << 0; } break; } case WorkerProto::Op::OptimiseStore: logger->startWork(); store->optimiseStore(); logger->stopWork(); conn.to << 1; break; case WorkerProto::Op::VerifyStore: { bool checkContents, repair; conn.from >> checkContents >> repair; logger->startWork(); if (repair && !trusted) throw Error("you are not privileged to repair paths"); bool errors = store->verifyStore(checkContents, (RepairFlag) repair); logger->stopWork(); conn.to << errors; break; } case WorkerProto::Op::AddSignatures: { auto path = store->parseStorePath(readString(conn.from)); StringSet sigs = readStrings<StringSet>(conn.from); logger->startWork(); store->addSignatures(path, sigs); logger->stopWork(); conn.to << 1; break; } case WorkerProto::Op::NarFromPath: { auto path = store->parseStorePath(readString(conn.from)); logger->startWork(); logger->stopWork(); dumpPath(store->toRealPath(path), conn.to); break; } case WorkerProto::Op::AddToStoreNar: { bool repair, dontCheckSigs; auto path = store->parseStorePath(readString(conn.from)); auto deriver = readString(conn.from); auto narHash = Hash::parseAny(readString(conn.from), HashAlgorithm::SHA256); ValidPathInfo info { path, narHash }; if (deriver != "") info.deriver = store->parseStorePath(deriver); info.references = WorkerProto::Serialise<StorePathSet>::read(*store, rconn); conn.from >> info.registrationTime >> info.narSize >> info.ultimate; info.sigs = readStrings<StringSet>(conn.from); info.ca = ContentAddress::parseOpt(readString(conn.from)); conn.from >> repair >> dontCheckSigs; if (!trusted && dontCheckSigs) dontCheckSigs = false; if (!trusted) info.ultimate = false; if (GET_PROTOCOL_MINOR(conn.protoVersion) >= 23) { logger->startWork(); { FramedSource source(conn.from); store->addToStore(info, source, (RepairFlag) repair, dontCheckSigs ? NoCheckSigs : CheckSigs); } logger->stopWork(); } else { std::unique_ptr<Source> source; StringSink saved; if (GET_PROTOCOL_MINOR(conn.protoVersion) >= 21) source = std::make_unique<TunnelSource>(conn.from, conn.to); else { TeeSource tee { conn.from, saved }; NullFileSystemObjectSink ether; parseDump(ether, tee); source = std::make_unique<StringSource>(saved.s); } logger->startWork(); // FIXME: race if addToStore doesn't read source? store->addToStore(info, *source, (RepairFlag) repair, dontCheckSigs ? NoCheckSigs : CheckSigs); logger->stopWork(); } break; } case WorkerProto::Op::QueryMissing: { auto targets = WorkerProto::Serialise<DerivedPaths>::read(*store, rconn); logger->startWork(); StorePathSet willBuild, willSubstitute, unknown; uint64_t downloadSize, narSize; store->queryMissing(targets, willBuild, willSubstitute, unknown, downloadSize, narSize); logger->stopWork(); WorkerProto::write(*store, wconn, willBuild); WorkerProto::write(*store, wconn, willSubstitute); WorkerProto::write(*store, wconn, unknown); conn.to << downloadSize << narSize; break; } case WorkerProto::Op::RegisterDrvOutput: { logger->startWork(); if (GET_PROTOCOL_MINOR(conn.protoVersion) < 31) { auto outputId = DrvOutput::parse(readString(conn.from)); auto outputPath = StorePath(readString(conn.from)); store->registerDrvOutput(Realisation{ .id = outputId, .outPath = outputPath}); } else { auto realisation = WorkerProto::Serialise<Realisation>::read(*store, rconn); store->registerDrvOutput(realisation); } logger->stopWork(); break; } case WorkerProto::Op::QueryRealisation: { logger->startWork(); auto outputId = DrvOutput::parse(readString(conn.from)); auto info = store->queryRealisation(outputId); logger->stopWork(); if (GET_PROTOCOL_MINOR(conn.protoVersion) < 31) { std::set<StorePath> outPaths; if (info) outPaths.insert(info->outPath); WorkerProto::write(*store, wconn, outPaths); } else { std::set<Realisation> realisations; if (info) realisations.insert(*info); WorkerProto::write(*store, wconn, realisations); } break; } case WorkerProto::Op::AddBuildLog: { StorePath path{readString(conn.from)}; logger->startWork(); if (!trusted) throw Error("you are not privileged to add logs"); auto & logStore = require<LogStore>(*store); { FramedSource source(conn.from); StringSink sink; source.drainInto(sink); logStore.addBuildLog(path, sink.s); } logger->stopWork(); conn.to << 1; break; } case WorkerProto::Op::QueryFailedPaths: case WorkerProto::Op::ClearFailedPaths: throw Error("Removed operation %1%", op); default: throw Error("invalid operation %1%", op); } } void processConnection( ref<Store> store, FdSource && from, FdSink && to, TrustedFlag trusted, RecursiveFlag recursive) { #ifndef _WIN32 // TODO need graceful async exit support on Windows? auto monitor = !recursive ? std::make_unique<MonitorFdHup>(from.fd) : nullptr; #endif /* Exchange the greeting. */ auto [protoVersion, features] = WorkerProto::BasicServerConnection::handshake( to, from, PROTOCOL_VERSION, WorkerProto::allFeatures); if (protoVersion < 0x10a) throw Error("the Nix client version is too old"); WorkerProto::BasicServerConnection conn; conn.to = std::move(to); conn.from = std::move(from); conn.protoVersion = protoVersion; conn.features = features; auto tunnelLogger = new TunnelLogger(conn.to, protoVersion); auto prevLogger = nix::logger; // FIXME if (!recursive) logger = tunnelLogger; unsigned int opCount = 0; Finally finally([&]() { setInterrupted(false); printMsgUsing(prevLogger, lvlDebug, "%d operations", opCount); }); conn.postHandshake(*store, { .daemonNixVersion = nixVersion, // We and the underlying store both need to trust the client for // it to be trusted. .remoteTrustsUs = trusted ? store->isTrustedClient() : std::optional { NotTrusted }, }); /* Send startup error messages to the client. */ tunnelLogger->startWork(); try { tunnelLogger->stopWork(); conn.to.flush(); /* Process client requests. */ while (true) { WorkerProto::Op op; try { op = (enum WorkerProto::Op) readInt(conn.from); } catch (Interrupted & e) { break; } catch (EndOfFile & e) { break; } printMsgUsing(prevLogger, lvlDebug, "received daemon op %d", op); opCount++; debug("performing daemon worker op: %d", op); try { performOp(tunnelLogger, store, trusted, recursive, conn, op); } catch (Error & e) { /* If we're not in a state where we can send replies, then something went wrong processing the input of the client. This can happen especially if I/O errors occur during addTextToStore() / importPath(). If that happens, just send the error message and exit. */ bool errorAllowed = tunnelLogger->state_.lock()->canSendStderr; tunnelLogger->stopWork(&e); if (!errorAllowed) throw; } catch (std::bad_alloc & e) { auto ex = Error("Nix daemon out of memory"); tunnelLogger->stopWork(&ex); throw; } conn.to.flush(); assert(!tunnelLogger->state_.lock()->canSendStderr); }; } catch (Error & e) { tunnelLogger->stopWork(&e); conn.to.flush(); return; } catch (std::exception & e) { auto ex = Error(e.what()); tunnelLogger->stopWork(&ex); conn.to.flush(); return; } } }
39,679
C++
.cc
982
30.280041
157
0.592182
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,837
derivations.cc
NixOS_nix/src/libstore/derivations.cc
#include "derivations.hh" #include "downstream-placeholder.hh" #include "store-api.hh" #include "globals.hh" #include "types.hh" #include "util.hh" #include "split.hh" #include "common-protocol.hh" #include "common-protocol-impl.hh" #include "strings-inline.hh" #include "json-utils.hh" #include <boost/container/small_vector.hpp> #include <nlohmann/json.hpp> namespace nix { std::optional<StorePath> DerivationOutput::path(const StoreDirConfig & store, std::string_view drvName, OutputNameView outputName) const { return std::visit(overloaded { [](const DerivationOutput::InputAddressed & doi) -> std::optional<StorePath> { return { doi.path }; }, [&](const DerivationOutput::CAFixed & dof) -> std::optional<StorePath> { return { dof.path(store, drvName, outputName) }; }, [](const DerivationOutput::CAFloating & dof) -> std::optional<StorePath> { return std::nullopt; }, [](const DerivationOutput::Deferred &) -> std::optional<StorePath> { return std::nullopt; }, [](const DerivationOutput::Impure &) -> std::optional<StorePath> { return std::nullopt; }, }, raw); } StorePath DerivationOutput::CAFixed::path(const StoreDirConfig & store, std::string_view drvName, OutputNameView outputName) const { return store.makeFixedOutputPathFromCA( outputPathName(drvName, outputName), ContentAddressWithReferences::withoutRefs(ca)); } bool DerivationType::isCA() const { /* Normally we do the full `std::visit` to make sure we have exhaustively handled all variants, but so long as there is a variant called `ContentAddressed`, it must be the only one for which `isCA` is true for this to make sense!. */ return std::visit(overloaded { [](const InputAddressed & ia) { return false; }, [](const ContentAddressed & ca) { return true; }, [](const Impure &) { return true; }, }, raw); } bool DerivationType::isFixed() const { return std::visit(overloaded { [](const InputAddressed & ia) { return false; }, [](const ContentAddressed & ca) { return ca.fixed; }, [](const Impure &) { return false; }, }, raw); } bool DerivationType::hasKnownOutputPaths() const { return std::visit(overloaded { [](const InputAddressed & ia) { return !ia.deferred; }, [](const ContentAddressed & ca) { return ca.fixed; }, [](const Impure &) { return false; }, }, raw); } bool DerivationType::isSandboxed() const { return std::visit(overloaded { [](const InputAddressed & ia) { return true; }, [](const ContentAddressed & ca) { return ca.sandboxed; }, [](const Impure &) { return false; }, }, raw); } bool DerivationType::isImpure() const { return std::visit(overloaded { [](const InputAddressed & ia) { return false; }, [](const ContentAddressed & ca) { return false; }, [](const Impure &) { return true; }, }, raw); } bool BasicDerivation::isBuiltin() const { return builder.substr(0, 8) == "builtin:"; } StorePath writeDerivation(Store & store, const Derivation & drv, RepairFlag repair, bool readOnly) { auto references = drv.inputSrcs; for (auto & i : drv.inputDrvs.map) references.insert(i.first); /* Note that the outputs of a derivation are *not* references (that can be missing (of course) and should not necessarily be held during a garbage collection). */ auto suffix = std::string(drv.name) + drvExtension; auto contents = drv.unparse(store, false); return readOnly || settings.readOnlyMode ? store.makeFixedOutputPathFromCA(suffix, TextInfo { .hash = hashString(HashAlgorithm::SHA256, contents), .references = std::move(references), }) : ({ StringSource s { contents }; store.addToStoreFromDump(s, suffix, FileSerialisationMethod::Flat, ContentAddressMethod::Raw::Text, HashAlgorithm::SHA256, references, repair); }); } namespace { /** * This mimics std::istream to some extent. We use this much smaller implementation * instead of plain istreams because the sentry object overhead is too high. */ struct StringViewStream { std::string_view remaining; int peek() const { return remaining.empty() ? EOF : remaining[0]; } int get() { if (remaining.empty()) return EOF; char c = remaining[0]; remaining.remove_prefix(1); return c; } }; constexpr struct Escapes { char map[256]; constexpr Escapes() { for (int i = 0; i < 256; i++) map[i] = (char) (unsigned char) i; map[(int) (unsigned char) 'n'] = '\n'; map[(int) (unsigned char) 'r'] = '\r'; map[(int) (unsigned char) 't'] = '\t'; } char operator[](char c) const { return map[(unsigned char) c]; } } escapes; } /* Read string `s' from stream `str'. */ static void expect(StringViewStream & str, std::string_view s) { if (!str.remaining.starts_with(s)) throw FormatError("expected string '%1%'", s); str.remaining.remove_prefix(s.size()); } /* Read a C-style string from stream `str'. */ static BackedStringView parseString(StringViewStream & str) { expect(str, "\""); auto c = str.remaining.begin(), end = str.remaining.end(); bool escaped = false; for (; c != end && *c != '"'; c++) { if (*c == '\\') { c++; if (c == end) throw FormatError("unterminated string in derivation"); escaped = true; } } const auto contentLen = c - str.remaining.begin(); const auto content = str.remaining.substr(0, contentLen); str.remaining.remove_prefix(contentLen + 1); if (!escaped) return content; std::string res; res.reserve(content.size()); for (c = content.begin(), end = content.end(); c != end; c++) if (*c == '\\') { c++; res += escapes[*c]; } else res += *c; return res; } static void validatePath(std::string_view s) { if (s.size() == 0 || s[0] != '/') throw FormatError("bad path '%1%' in derivation", s); } static BackedStringView parsePath(StringViewStream & str) { auto s = parseString(str); validatePath(*s); return s; } static bool endOfList(StringViewStream & str) { if (str.peek() == ',') { str.get(); return false; } if (str.peek() == ']') { str.get(); return true; } return false; } static StringSet parseStrings(StringViewStream & str, bool arePaths) { StringSet res; expect(str, "["); while (!endOfList(str)) res.insert((arePaths ? parsePath(str) : parseString(str)).toOwned()); return res; } static DerivationOutput parseDerivationOutput( const StoreDirConfig & store, std::string_view pathS, std::string_view hashAlgoStr, std::string_view hashS, const ExperimentalFeatureSettings & xpSettings) { if (hashAlgoStr != "") { ContentAddressMethod method = ContentAddressMethod::parsePrefix(hashAlgoStr); if (method == ContentAddressMethod::Raw::Text) xpSettings.require(Xp::DynamicDerivations); const auto hashAlgo = parseHashAlgo(hashAlgoStr); if (hashS == "impure") { xpSettings.require(Xp::ImpureDerivations); if (pathS != "") throw FormatError("impure derivation output should not specify output path"); return DerivationOutput::Impure { .method = std::move(method), .hashAlgo = std::move(hashAlgo), }; } else if (hashS != "") { validatePath(pathS); auto hash = Hash::parseNonSRIUnprefixed(hashS, hashAlgo); return DerivationOutput::CAFixed { .ca = ContentAddress { .method = std::move(method), .hash = std::move(hash), }, }; } else { xpSettings.require(Xp::CaDerivations); if (pathS != "") throw FormatError("content-addressed derivation output should not specify output path"); return DerivationOutput::CAFloating { .method = std::move(method), .hashAlgo = std::move(hashAlgo), }; } } else { if (pathS == "") { return DerivationOutput::Deferred { }; } validatePath(pathS); return DerivationOutput::InputAddressed { .path = store.parseStorePath(pathS), }; } } static DerivationOutput parseDerivationOutput( const StoreDirConfig & store, StringViewStream & str, const ExperimentalFeatureSettings & xpSettings = experimentalFeatureSettings) { expect(str, ","); const auto pathS = parseString(str); expect(str, ","); const auto hashAlgo = parseString(str); expect(str, ","); const auto hash = parseString(str); expect(str, ")"); return parseDerivationOutput(store, *pathS, *hashAlgo, *hash, xpSettings); } /** * All ATerm Derivation format versions currently known. * * Unknown versions are rejected at the parsing stage. */ enum struct DerivationATermVersion { /** * Older unversioned form */ Traditional, /** * Newer versioned form; only this version so far. */ DynamicDerivations, }; static DerivedPathMap<StringSet>::ChildNode parseDerivedPathMapNode( const StoreDirConfig & store, StringViewStream & str, DerivationATermVersion version) { DerivedPathMap<StringSet>::ChildNode node; auto parseNonDynamic = [&]() { node.value = parseStrings(str, false); }; // Older derivation should never use new form, but newer // derivaiton can use old form. switch (version) { case DerivationATermVersion::Traditional: parseNonDynamic(); break; case DerivationATermVersion::DynamicDerivations: switch (str.peek()) { case '[': parseNonDynamic(); break; case '(': expect(str, "("); node.value = parseStrings(str, false); expect(str, ",["); while (!endOfList(str)) { expect(str, "("); auto outputName = parseString(str).toOwned(); expect(str, ","); node.childMap.insert_or_assign(outputName, parseDerivedPathMapNode(store, str, version)); expect(str, ")"); } expect(str, ")"); break; default: throw FormatError("invalid inputDrvs entry in derivation"); } break; default: // invalid format, not a parse error but internal error assert(false); } return node; } Derivation parseDerivation( const StoreDirConfig & store, std::string && s, std::string_view name, const ExperimentalFeatureSettings & xpSettings) { Derivation drv; drv.name = name; StringViewStream str{s}; expect(str, "D"); DerivationATermVersion version; switch (str.peek()) { case 'e': expect(str, "erive("); version = DerivationATermVersion::Traditional; break; case 'r': { expect(str, "rvWithVersion("); auto versionS = parseString(str); if (*versionS == "xp-dyn-drv") { // Only verison we have so far version = DerivationATermVersion::DynamicDerivations; xpSettings.require(Xp::DynamicDerivations); } else { throw FormatError("Unknown derivation ATerm format version '%s'", *versionS); } expect(str, ","); break; } default: throw Error("derivation does not start with 'Derive' or 'DrvWithVersion'"); } /* Parse the list of outputs. */ expect(str, "["); while (!endOfList(str)) { expect(str, "("); std::string id = parseString(str).toOwned(); auto output = parseDerivationOutput(store, str, xpSettings); drv.outputs.emplace(std::move(id), std::move(output)); } /* Parse the list of input derivations. */ expect(str, ",["); while (!endOfList(str)) { expect(str, "("); auto drvPath = parsePath(str); expect(str, ","); drv.inputDrvs.map.insert_or_assign(store.parseStorePath(*drvPath), parseDerivedPathMapNode(store, str, version)); expect(str, ")"); } expect(str, ","); drv.inputSrcs = store.parseStorePathSet(parseStrings(str, true)); expect(str, ","); drv.platform = parseString(str).toOwned(); expect(str, ","); drv.builder = parseString(str).toOwned(); /* Parse the builder arguments. */ expect(str, ",["); while (!endOfList(str)) drv.args.push_back(parseString(str).toOwned()); /* Parse the environment variables. */ expect(str, ",["); while (!endOfList(str)) { expect(str, "("); auto name = parseString(str).toOwned(); expect(str, ","); auto value = parseString(str).toOwned(); expect(str, ")"); drv.env.insert_or_assign(std::move(name), std::move(value)); } expect(str, ")"); return drv; } /** * Print a derivation string literal to an `std::string`. * * This syntax does not generalize to the expression language, which needs to * escape `$`. * * @param res Where to print to * @param s Which logical string to print */ static void printString(std::string & res, std::string_view s) { boost::container::small_vector<char, 64 * 1024> buffer; buffer.reserve(s.size() * 2 + 2); char * buf = buffer.data(); char * p = buf; *p++ = '"'; for (auto c : s) if (c == '\"' || c == '\\') { *p++ = '\\'; *p++ = c; } else if (c == '\n') { *p++ = '\\'; *p++ = 'n'; } else if (c == '\r') { *p++ = '\\'; *p++ = 'r'; } else if (c == '\t') { *p++ = '\\'; *p++ = 't'; } else *p++ = c; *p++ = '"'; res.append(buf, p - buf); } static void printUnquotedString(std::string & res, std::string_view s) { res += '"'; res.append(s); res += '"'; } template<class ForwardIterator> static void printStrings(std::string & res, ForwardIterator i, ForwardIterator j) { res += '['; bool first = true; for ( ; i != j; ++i) { if (first) first = false; else res += ','; printString(res, *i); } res += ']'; } template<class ForwardIterator> static void printUnquotedStrings(std::string & res, ForwardIterator i, ForwardIterator j) { res += '['; bool first = true; for ( ; i != j; ++i) { if (first) first = false; else res += ','; printUnquotedString(res, *i); } res += ']'; } static void unparseDerivedPathMapNode(const StoreDirConfig & store, std::string & s, const DerivedPathMap<StringSet>::ChildNode & node) { s += ','; if (node.childMap.empty()) { printUnquotedStrings(s, node.value.begin(), node.value.end()); } else { s += "("; printUnquotedStrings(s, node.value.begin(), node.value.end()); s += ",["; bool first = true; for (auto & [outputName, childNode] : node.childMap) { if (first) first = false; else s += ','; s += '('; printUnquotedString(s, outputName); unparseDerivedPathMapNode(store, s, childNode); s += ')'; } s += "])"; } } /** * Does the derivation have a dependency on the output of a dynamic * derivation? * * In other words, does it on the output of derivation that is itself an * ouput of a derivation? This corresponds to a dependency that is an * inductive derived path with more than one layer of * `DerivedPath::Built`. */ static bool hasDynamicDrvDep(const Derivation & drv) { return std::find_if( drv.inputDrvs.map.begin(), drv.inputDrvs.map.end(), [](auto & kv) { return !kv.second.childMap.empty(); }) != drv.inputDrvs.map.end(); } std::string Derivation::unparse(const StoreDirConfig & store, bool maskOutputs, DerivedPathMap<StringSet>::ChildNode::Map * actualInputs) const { std::string s; s.reserve(65536); /* Use older unversioned form if possible, for wider compat. Use newer form only if we need it, which we do for `Xp::DynamicDerivations`. */ if (hasDynamicDrvDep(*this)) { s += "DrvWithVersion("; // Only version we have so far printUnquotedString(s, "xp-dyn-drv"); s += ","; } else { s += "Derive("; } bool first = true; s += "["; for (auto & i : outputs) { if (first) first = false; else s += ','; s += '('; printUnquotedString(s, i.first); std::visit(overloaded { [&](const DerivationOutput::InputAddressed & doi) { s += ','; printUnquotedString(s, maskOutputs ? "" : store.printStorePath(doi.path)); s += ','; printUnquotedString(s, ""); s += ','; printUnquotedString(s, ""); }, [&](const DerivationOutput::CAFixed & dof) { s += ','; printUnquotedString(s, maskOutputs ? "" : store.printStorePath(dof.path(store, name, i.first))); s += ','; printUnquotedString(s, dof.ca.printMethodAlgo()); s += ','; printUnquotedString(s, dof.ca.hash.to_string(HashFormat::Base16, false)); }, [&](const DerivationOutput::CAFloating & dof) { s += ','; printUnquotedString(s, ""); s += ','; printUnquotedString(s, std::string { dof.method.renderPrefix() } + printHashAlgo(dof.hashAlgo)); s += ','; printUnquotedString(s, ""); }, [&](const DerivationOutput::Deferred &) { s += ','; printUnquotedString(s, ""); s += ','; printUnquotedString(s, ""); s += ','; printUnquotedString(s, ""); }, [&](const DerivationOutput::Impure & doi) { // FIXME s += ','; printUnquotedString(s, ""); s += ','; printUnquotedString(s, std::string { doi.method.renderPrefix() } + printHashAlgo(doi.hashAlgo)); s += ','; printUnquotedString(s, "impure"); } }, i.second.raw); s += ')'; } s += "],["; first = true; if (actualInputs) { for (auto & [drvHashModulo, childMap] : *actualInputs) { if (first) first = false; else s += ','; s += '('; printUnquotedString(s, drvHashModulo); unparseDerivedPathMapNode(store, s, childMap); s += ')'; } } else { for (auto & [drvPath, childMap] : inputDrvs.map) { if (first) first = false; else s += ','; s += '('; printUnquotedString(s, store.printStorePath(drvPath)); unparseDerivedPathMapNode(store, s, childMap); s += ')'; } } s += "],"; auto paths = store.printStorePathSet(inputSrcs); // FIXME: slow printUnquotedStrings(s, paths.begin(), paths.end()); s += ','; printUnquotedString(s, platform); s += ','; printString(s, builder); s += ','; printStrings(s, args.begin(), args.end()); s += ",["; first = true; for (auto & i : env) { if (first) first = false; else s += ','; s += '('; printString(s, i.first); s += ','; printString(s, maskOutputs && outputs.count(i.first) ? "" : i.second); s += ')'; } s += "])"; return s; } // FIXME: remove bool isDerivation(std::string_view fileName) { return hasSuffix(fileName, drvExtension); } std::string outputPathName(std::string_view drvName, OutputNameView outputName) { std::string res { drvName }; if (outputName != "out") { res += "-"; res += outputName; } return res; } DerivationType BasicDerivation::type() const { std::set<std::string_view> inputAddressedOutputs, fixedCAOutputs, floatingCAOutputs, deferredIAOutputs, impureOutputs; std::optional<HashAlgorithm> floatingHashAlgo; for (auto & i : outputs) { std::visit(overloaded { [&](const DerivationOutput::InputAddressed &) { inputAddressedOutputs.insert(i.first); }, [&](const DerivationOutput::CAFixed &) { fixedCAOutputs.insert(i.first); }, [&](const DerivationOutput::CAFloating & dof) { floatingCAOutputs.insert(i.first); if (!floatingHashAlgo) { floatingHashAlgo = dof.hashAlgo; } else { if (*floatingHashAlgo != dof.hashAlgo) throw Error("all floating outputs must use the same hash algorithm"); } }, [&](const DerivationOutput::Deferred &) { deferredIAOutputs.insert(i.first); }, [&](const DerivationOutput::Impure &) { impureOutputs.insert(i.first); }, }, i.second.raw); } if (inputAddressedOutputs.empty() && fixedCAOutputs.empty() && floatingCAOutputs.empty() && deferredIAOutputs.empty() && impureOutputs.empty()) throw Error("must have at least one output"); if (!inputAddressedOutputs.empty() && fixedCAOutputs.empty() && floatingCAOutputs.empty() && deferredIAOutputs.empty() && impureOutputs.empty()) return DerivationType::InputAddressed { .deferred = false, }; if (inputAddressedOutputs.empty() && !fixedCAOutputs.empty() && floatingCAOutputs.empty() && deferredIAOutputs.empty() && impureOutputs.empty()) { if (fixedCAOutputs.size() > 1) // FIXME: Experimental feature? throw Error("only one fixed output is allowed for now"); if (*fixedCAOutputs.begin() != "out") throw Error("single fixed output must be named \"out\""); return DerivationType::ContentAddressed { .sandboxed = false, .fixed = true, }; } if (inputAddressedOutputs.empty() && fixedCAOutputs.empty() && !floatingCAOutputs.empty() && deferredIAOutputs.empty() && impureOutputs.empty()) return DerivationType::ContentAddressed { .sandboxed = true, .fixed = false, }; if (inputAddressedOutputs.empty() && fixedCAOutputs.empty() && floatingCAOutputs.empty() && !deferredIAOutputs.empty() && impureOutputs.empty()) return DerivationType::InputAddressed { .deferred = true, }; if (inputAddressedOutputs.empty() && fixedCAOutputs.empty() && floatingCAOutputs.empty() && deferredIAOutputs.empty() && !impureOutputs.empty()) return DerivationType::Impure { }; throw Error("can't mix derivation output types"); } Sync<DrvHashes> drvHashes; /* pathDerivationModulo and hashDerivationModulo are mutually recursive */ /* Look up the derivation by value and memoize the `hashDerivationModulo` call. */ static const DrvHash pathDerivationModulo(Store & store, const StorePath & drvPath) { { auto hashes = drvHashes.lock(); auto h = hashes->find(drvPath); if (h != hashes->end()) { return h->second; } } auto h = hashDerivationModulo( store, store.readInvalidDerivation(drvPath), false); // Cache it drvHashes.lock()->insert_or_assign(drvPath, h); return h; } /* See the header for interface details. These are the implementation details. For fixed-output derivations, each hash in the map is not the corresponding output's content hash, but a hash of that hash along with other constant data. The key point is that the value is a pure function of the output's contents, and there are no preimage attacks either spoofing an output's contents for a derivation, or spoofing a derivation for an output's contents. For regular derivations, it looks up each subderivation from its hash and recurs. If the subderivation is also regular, it simply substitutes the derivation path with its hash. If the subderivation is fixed-output, however, it takes each output hash and pretends it is a derivation hash producing a single "out" output. This is so we don't leak the provenance of fixed outputs, reducing pointless cache misses as the build itself won't know this. */ DrvHash hashDerivationModulo(Store & store, const Derivation & drv, bool maskOutputs) { auto type = drv.type(); /* Return a fixed hash for fixed-output derivations. */ if (type.isFixed()) { std::map<std::string, Hash> outputHashes; for (const auto & i : drv.outputs) { auto & dof = std::get<DerivationOutput::CAFixed>(i.second.raw); auto hash = hashString(HashAlgorithm::SHA256, "fixed:out:" + dof.ca.printMethodAlgo() + ":" + dof.ca.hash.to_string(HashFormat::Base16, false) + ":" + store.printStorePath(dof.path(store, drv.name, i.first))); outputHashes.insert_or_assign(i.first, std::move(hash)); } return DrvHash { .hashes = outputHashes, .kind = DrvHash::Kind::Regular, }; } if (type.isImpure()) { std::map<std::string, Hash> outputHashes; for (const auto & [outputName, _] : drv.outputs) outputHashes.insert_or_assign(outputName, impureOutputHash); return DrvHash { .hashes = outputHashes, .kind = DrvHash::Kind::Deferred, }; } auto kind = std::visit(overloaded { [](const DerivationType::InputAddressed & ia) { /* This might be a "pesimistically" deferred output, so we don't "taint" the kind yet. */ return DrvHash::Kind::Regular; }, [](const DerivationType::ContentAddressed & ca) { return ca.fixed ? DrvHash::Kind::Regular : DrvHash::Kind::Deferred; }, [](const DerivationType::Impure &) -> DrvHash::Kind { assert(false); } }, drv.type().raw); DerivedPathMap<StringSet>::ChildNode::Map inputs2; for (auto & [drvPath, node] : drv.inputDrvs.map) { const auto & res = pathDerivationModulo(store, drvPath); if (res.kind == DrvHash::Kind::Deferred) kind = DrvHash::Kind::Deferred; for (auto & outputName : node.value) { const auto h = get(res.hashes, outputName); if (!h) throw Error("no hash for output '%s' of derivation '%s'", outputName, drv.name); inputs2[h->to_string(HashFormat::Base16, false)].value.insert(outputName); } } auto hash = hashString(HashAlgorithm::SHA256, drv.unparse(store, maskOutputs, &inputs2)); std::map<std::string, Hash> outputHashes; for (const auto & [outputName, _] : drv.outputs) { outputHashes.insert_or_assign(outputName, hash); } return DrvHash { .hashes = outputHashes, .kind = kind, }; } std::map<std::string, Hash> staticOutputHashes(Store & store, const Derivation & drv) { return hashDerivationModulo(store, drv, true).hashes; } static DerivationOutput readDerivationOutput(Source & in, const StoreDirConfig & store) { const auto pathS = readString(in); const auto hashAlgo = readString(in); const auto hash = readString(in); return parseDerivationOutput(store, pathS, hashAlgo, hash, experimentalFeatureSettings); } StringSet BasicDerivation::outputNames() const { StringSet names; for (auto & i : outputs) names.insert(i.first); return names; } DerivationOutputsAndOptPaths BasicDerivation::outputsAndOptPaths(const StoreDirConfig & store) const { DerivationOutputsAndOptPaths outsAndOptPaths; for (auto & [outputName, output] : outputs) outsAndOptPaths.insert(std::make_pair( outputName, std::make_pair(output, output.path(store, name, outputName)) ) ); return outsAndOptPaths; } std::string_view BasicDerivation::nameFromPath(const StorePath & drvPath) { drvPath.requireDerivation(); auto nameWithSuffix = drvPath.name(); nameWithSuffix.remove_suffix(drvExtension.size()); return nameWithSuffix; } Source & readDerivation(Source & in, const StoreDirConfig & store, BasicDerivation & drv, std::string_view name) { drv.name = name; drv.outputs.clear(); auto nr = readNum<size_t>(in); for (size_t n = 0; n < nr; n++) { auto name = readString(in); auto output = readDerivationOutput(in, store); drv.outputs.emplace(std::move(name), std::move(output)); } drv.inputSrcs = CommonProto::Serialise<StorePathSet>::read(store, CommonProto::ReadConn { .from = in }); in >> drv.platform >> drv.builder; drv.args = readStrings<Strings>(in); nr = readNum<size_t>(in); for (size_t n = 0; n < nr; n++) { auto key = readString(in); auto value = readString(in); drv.env[key] = value; } return in; } void writeDerivation(Sink & out, const StoreDirConfig & store, const BasicDerivation & drv) { out << drv.outputs.size(); for (auto & i : drv.outputs) { out << i.first; std::visit(overloaded { [&](const DerivationOutput::InputAddressed & doi) { out << store.printStorePath(doi.path) << "" << ""; }, [&](const DerivationOutput::CAFixed & dof) { out << store.printStorePath(dof.path(store, drv.name, i.first)) << dof.ca.printMethodAlgo() << dof.ca.hash.to_string(HashFormat::Base16, false); }, [&](const DerivationOutput::CAFloating & dof) { out << "" << (std::string { dof.method.renderPrefix() } + printHashAlgo(dof.hashAlgo)) << ""; }, [&](const DerivationOutput::Deferred &) { out << "" << "" << ""; }, [&](const DerivationOutput::Impure & doi) { out << "" << (std::string { doi.method.renderPrefix() } + printHashAlgo(doi.hashAlgo)) << "impure"; }, }, i.second.raw); } CommonProto::write(store, CommonProto::WriteConn { .to = out }, drv.inputSrcs); out << drv.platform << drv.builder << drv.args; out << drv.env.size(); for (auto & i : drv.env) out << i.first << i.second; } std::string hashPlaceholder(const OutputNameView outputName) { // FIXME: memoize? return "/" + hashString(HashAlgorithm::SHA256, concatStrings("nix-output:", outputName)).to_string(HashFormat::Nix32, false); } static void rewriteDerivation(Store & store, BasicDerivation & drv, const StringMap & rewrites) { debug("Rewriting the derivation"); for (auto & rewrite : rewrites) { debug("rewriting %s as %s", rewrite.first, rewrite.second); } drv.builder = rewriteStrings(drv.builder, rewrites); for (auto & arg : drv.args) { arg = rewriteStrings(arg, rewrites); } StringPairs newEnv; for (auto & envVar : drv.env) { auto envName = rewriteStrings(envVar.first, rewrites); auto envValue = rewriteStrings(envVar.second, rewrites); newEnv.emplace(envName, envValue); } drv.env = newEnv; auto hashModulo = hashDerivationModulo(store, Derivation(drv), true); for (auto & [outputName, output] : drv.outputs) { if (std::holds_alternative<DerivationOutput::Deferred>(output.raw)) { auto h = get(hashModulo.hashes, outputName); if (!h) throw Error("derivation '%s' output '%s' has no hash (derivations.cc/rewriteDerivation)", drv.name, outputName); auto outPath = store.makeOutputPath(outputName, *h, drv.name); drv.env[outputName] = store.printStorePath(outPath); output = DerivationOutput::InputAddressed { .path = std::move(outPath), }; } } } std::optional<BasicDerivation> Derivation::tryResolve(Store & store, Store * evalStore) const { std::map<std::pair<StorePath, std::string>, StorePath> inputDrvOutputs; std::function<void(const StorePath &, const DerivedPathMap<StringSet>::ChildNode &)> accum; accum = [&](auto & inputDrv, auto & node) { for (auto & [outputName, outputPath] : store.queryPartialDerivationOutputMap(inputDrv, evalStore)) { if (outputPath) { inputDrvOutputs.insert_or_assign({inputDrv, outputName}, *outputPath); if (auto p = get(node.childMap, outputName)) accum(*outputPath, *p); } } }; for (auto & [inputDrv, node] : inputDrvs.map) accum(inputDrv, node); return tryResolve(store, inputDrvOutputs); } static bool tryResolveInput( Store & store, StorePathSet & inputSrcs, StringMap & inputRewrites, const DownstreamPlaceholder * placeholderOpt, const StorePath & inputDrv, const DerivedPathMap<StringSet>::ChildNode & inputNode, const std::map<std::pair<StorePath, std::string>, StorePath> & inputDrvOutputs) { auto getOutput = [&](const std::string & outputName) { auto * actualPathOpt = get(inputDrvOutputs, { inputDrv, outputName }); if (!actualPathOpt) warn("output %s of input %s missing, aborting the resolving", outputName, store.printStorePath(inputDrv) ); return actualPathOpt; }; auto getPlaceholder = [&](const std::string & outputName) { return placeholderOpt ? DownstreamPlaceholder::unknownDerivation(*placeholderOpt, outputName) : DownstreamPlaceholder::unknownCaOutput(inputDrv, outputName); }; for (auto & outputName : inputNode.value) { auto actualPathOpt = getOutput(outputName); if (!actualPathOpt) return false; auto actualPath = *actualPathOpt; if (experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) { inputRewrites.emplace( getPlaceholder(outputName).render(), store.printStorePath(actualPath)); } inputSrcs.insert(std::move(actualPath)); } for (auto & [outputName, childNode] : inputNode.childMap) { auto actualPathOpt = getOutput(outputName); if (!actualPathOpt) return false; auto actualPath = *actualPathOpt; auto nextPlaceholder = getPlaceholder(outputName); if (!tryResolveInput(store, inputSrcs, inputRewrites, &nextPlaceholder, actualPath, childNode, inputDrvOutputs)) return false; } return true; } std::optional<BasicDerivation> Derivation::tryResolve( Store & store, const std::map<std::pair<StorePath, std::string>, StorePath> & inputDrvOutputs) const { BasicDerivation resolved { *this }; // Input paths that we'll want to rewrite in the derivation StringMap inputRewrites; for (auto & [inputDrv, inputNode] : inputDrvs.map) if (!tryResolveInput(store, resolved.inputSrcs, inputRewrites, nullptr, inputDrv, inputNode, inputDrvOutputs)) return std::nullopt; rewriteDerivation(store, resolved, inputRewrites); return resolved; } void Derivation::checkInvariants(Store & store, const StorePath & drvPath) const { assert(drvPath.isDerivation()); std::string drvName(drvPath.name()); drvName = drvName.substr(0, drvName.size() - drvExtension.size()); if (drvName != name) { throw Error("Derivation '%s' has name '%s' which does not match its path", store.printStorePath(drvPath), name); } auto envHasRightPath = [&](const StorePath & actual, const std::string & varName) { auto j = env.find(varName); if (j == env.end() || store.parseStorePath(j->second) != actual) throw Error("derivation '%s' has incorrect environment variable '%s', should be '%s'", store.printStorePath(drvPath), varName, store.printStorePath(actual)); }; // Don't need the answer, but do this anyways to assert is proper // combination. The code below is more general and naturally allows // combinations that are currently prohibited. type(); std::optional<DrvHash> hashesModulo; for (auto & i : outputs) { std::visit(overloaded { [&](const DerivationOutput::InputAddressed & doia) { if (!hashesModulo) { // somewhat expensive so we do lazily hashesModulo = hashDerivationModulo(store, *this, true); } auto currentOutputHash = get(hashesModulo->hashes, i.first); if (!currentOutputHash) throw Error("derivation '%s' has unexpected output '%s' (local-store / hashesModulo) named '%s'", store.printStorePath(drvPath), store.printStorePath(doia.path), i.first); StorePath recomputed = store.makeOutputPath(i.first, *currentOutputHash, drvName); if (doia.path != recomputed) throw Error("derivation '%s' has incorrect output '%s', should be '%s'", store.printStorePath(drvPath), store.printStorePath(doia.path), store.printStorePath(recomputed)); envHasRightPath(doia.path, i.first); }, [&](const DerivationOutput::CAFixed & dof) { auto path = dof.path(store, drvName, i.first); envHasRightPath(path, i.first); }, [&](const DerivationOutput::CAFloating &) { /* Nothing to check */ }, [&](const DerivationOutput::Deferred &) { /* Nothing to check */ }, [&](const DerivationOutput::Impure &) { /* Nothing to check */ }, }, i.second.raw); } } const Hash impureOutputHash = hashString(HashAlgorithm::SHA256, "impure"); nlohmann::json DerivationOutput::toJSON( const StoreDirConfig & store, std::string_view drvName, OutputNameView outputName) const { nlohmann::json res = nlohmann::json::object(); std::visit(overloaded { [&](const DerivationOutput::InputAddressed & doi) { res["path"] = store.printStorePath(doi.path); }, [&](const DerivationOutput::CAFixed & dof) { res["path"] = store.printStorePath(dof.path(store, drvName, outputName)); res["method"] = std::string { dof.ca.method.render() }; res["hashAlgo"] = printHashAlgo(dof.ca.hash.algo); res["hash"] = dof.ca.hash.to_string(HashFormat::Base16, false); // FIXME print refs? }, [&](const DerivationOutput::CAFloating & dof) { res["method"] = std::string { dof.method.render() }; res["hashAlgo"] = printHashAlgo(dof.hashAlgo); }, [&](const DerivationOutput::Deferred &) {}, [&](const DerivationOutput::Impure & doi) { res["method"] = std::string { doi.method.render() }; res["hashAlgo"] = printHashAlgo(doi.hashAlgo); res["impure"] = true; }, }, raw); return res; } DerivationOutput DerivationOutput::fromJSON( const StoreDirConfig & store, std::string_view drvName, OutputNameView outputName, const nlohmann::json & _json, const ExperimentalFeatureSettings & xpSettings) { std::set<std::string_view> keys; auto & json = getObject(_json); for (const auto & [key, _] : json) keys.insert(key); auto methodAlgo = [&]() -> std::pair<ContentAddressMethod, HashAlgorithm> { auto & method_ = getString(valueAt(json, "method")); ContentAddressMethod method = ContentAddressMethod::parse(method_); if (method == ContentAddressMethod::Raw::Text) xpSettings.require(Xp::DynamicDerivations); auto & hashAlgo_ = getString(valueAt(json, "hashAlgo")); auto hashAlgo = parseHashAlgo(hashAlgo_); return { std::move(method), std::move(hashAlgo) }; }; if (keys == (std::set<std::string_view> { "path" })) { return DerivationOutput::InputAddressed { .path = store.parseStorePath(getString(valueAt(json, "path"))), }; } else if (keys == (std::set<std::string_view> { "path", "method", "hashAlgo", "hash" })) { auto [method, hashAlgo] = methodAlgo(); auto dof = DerivationOutput::CAFixed { .ca = ContentAddress { .method = std::move(method), .hash = Hash::parseNonSRIUnprefixed(getString(valueAt(json, "hash")), hashAlgo), }, }; if (dof.path(store, drvName, outputName) != store.parseStorePath(getString(valueAt(json, "path")))) throw Error("Path doesn't match derivation output"); return dof; } else if (keys == (std::set<std::string_view> { "method", "hashAlgo" })) { xpSettings.require(Xp::CaDerivations); auto [method, hashAlgo] = methodAlgo(); return DerivationOutput::CAFloating { .method = std::move(method), .hashAlgo = std::move(hashAlgo), }; } else if (keys == (std::set<std::string_view> { })) { return DerivationOutput::Deferred {}; } else if (keys == (std::set<std::string_view> { "method", "hashAlgo", "impure" })) { xpSettings.require(Xp::ImpureDerivations); auto [method, hashAlgo] = methodAlgo(); return DerivationOutput::Impure { .method = std::move(method), .hashAlgo = hashAlgo, }; } else { throw Error("invalid JSON for derivation output"); } } nlohmann::json Derivation::toJSON(const StoreDirConfig & store) const { nlohmann::json res = nlohmann::json::object(); res["name"] = name; { nlohmann::json & outputsObj = res["outputs"]; outputsObj = nlohmann::json::object(); for (auto & [outputName, output] : outputs) { outputsObj[outputName] = output.toJSON(store, name, outputName); } } { auto& inputsList = res["inputSrcs"]; inputsList = nlohmann::json ::array(); for (auto & input : inputSrcs) inputsList.emplace_back(store.printStorePath(input)); } { std::function<nlohmann::json(const DerivedPathMap<StringSet>::ChildNode &)> doInput; doInput = [&](const auto & inputNode) { auto value = nlohmann::json::object(); value["outputs"] = inputNode.value; { auto next = nlohmann::json::object(); for (auto & [outputId, childNode] : inputNode.childMap) next[outputId] = doInput(childNode); value["dynamicOutputs"] = std::move(next); } return value; }; { auto& inputDrvsObj = res["inputDrvs"]; inputDrvsObj = nlohmann::json::object(); for (auto & [inputDrv, inputNode] : inputDrvs.map) { inputDrvsObj[store.printStorePath(inputDrv)] = doInput(inputNode); } } } res["system"] = platform; res["builder"] = builder; res["args"] = args; res["env"] = env; return res; } Derivation Derivation::fromJSON( const StoreDirConfig & store, const nlohmann::json & _json, const ExperimentalFeatureSettings & xpSettings) { using nlohmann::detail::value_t; Derivation res; auto & json = getObject(_json); res.name = getString(valueAt(json, "name")); try { for (auto & [outputName, output] : getObject(valueAt(json, "outputs"))) { res.outputs.insert_or_assign( outputName, DerivationOutput::fromJSON(store, res.name, outputName, output)); } } catch (Error & e) { e.addTrace({}, "while reading key 'outputs'"); throw; } try { for (auto & input : getArray(valueAt(json, "inputSrcs"))) res.inputSrcs.insert(store.parseStorePath(static_cast<const std::string &>(input))); } catch (Error & e) { e.addTrace({}, "while reading key 'inputSrcs'"); throw; } try { std::function<DerivedPathMap<StringSet>::ChildNode(const nlohmann::json &)> doInput; doInput = [&](const auto & _json) { auto & json = getObject(_json); DerivedPathMap<StringSet>::ChildNode node; node.value = getStringSet(valueAt(json, "outputs")); for (auto & [outputId, childNode] : getObject(valueAt(json, "dynamicOutputs"))) { xpSettings.require(Xp::DynamicDerivations); node.childMap[outputId] = doInput(childNode); } return node; }; for (auto & [inputDrvPath, inputOutputs] : getObject(valueAt(json, "inputDrvs"))) res.inputDrvs.map[store.parseStorePath(inputDrvPath)] = doInput(inputOutputs); } catch (Error & e) { e.addTrace({}, "while reading key 'inputDrvs'"); throw; } res.platform = getString(valueAt(json, "system")); res.builder = getString(valueAt(json, "builder")); res.args = getStringList(valueAt(json, "args")); res.env = getStringMap(valueAt(json, "env")); return res; } }
46,329
C++
.cc
1,239
29.378531
155
0.596455
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,838
content-address.cc
NixOS_nix/src/libstore/content-address.cc
#include "args.hh" #include "content-address.hh" #include "split.hh" namespace nix { std::string_view makeFileIngestionPrefix(FileIngestionMethod m) { switch (m) { case FileIngestionMethod::Flat: // Not prefixed for back compat return ""; case FileIngestionMethod::NixArchive: return "r:"; case FileIngestionMethod::Git: experimentalFeatureSettings.require(Xp::GitHashing); return "git:"; default: assert(false); } } std::string_view ContentAddressMethod::render() const { switch (raw) { case ContentAddressMethod::Raw::Text: return "text"; case ContentAddressMethod::Raw::Flat: case ContentAddressMethod::Raw::NixArchive: case ContentAddressMethod::Raw::Git: return renderFileIngestionMethod(getFileIngestionMethod()); default: assert(false); } } /** * **Not surjective** * * This is not exposed because `FileIngestionMethod::Flat` maps to * `ContentAddressMethod::Raw::Flat` and * `ContentAddressMethod::Raw::Text` alike. We can thus only safely use * this when the latter is ruled out (e.g. because it is already * handled). */ static ContentAddressMethod fileIngestionMethodToContentAddressMethod(FileIngestionMethod m) { switch (m) { case FileIngestionMethod::Flat: return ContentAddressMethod::Raw::Flat; case FileIngestionMethod::NixArchive: return ContentAddressMethod::Raw::NixArchive; case FileIngestionMethod::Git: return ContentAddressMethod::Raw::Git; default: assert(false); } } ContentAddressMethod ContentAddressMethod::parse(std::string_view m) { if (m == "text") return ContentAddressMethod::Raw::Text; else return fileIngestionMethodToContentAddressMethod( parseFileIngestionMethod(m)); } std::string_view ContentAddressMethod::renderPrefix() const { switch (raw) { case ContentAddressMethod::Raw::Text: return "text:"; case ContentAddressMethod::Raw::Flat: case ContentAddressMethod::Raw::NixArchive: case ContentAddressMethod::Raw::Git: return makeFileIngestionPrefix(getFileIngestionMethod()); default: assert(false); } } ContentAddressMethod ContentAddressMethod::parsePrefix(std::string_view & m) { if (splitPrefix(m, "r:")) { return ContentAddressMethod::Raw::NixArchive; } else if (splitPrefix(m, "git:")) { experimentalFeatureSettings.require(Xp::GitHashing); return ContentAddressMethod::Raw::Git; } else if (splitPrefix(m, "text:")) { return ContentAddressMethod::Raw::Text; } return ContentAddressMethod::Raw::Flat; } /** * This is slightly more mindful of forward compat in that it uses `fixed:` * rather than just doing a raw empty prefix or `r:`, which doesn't "save room" * for future changes very well. */ static std::string renderPrefixModern(const ContentAddressMethod & ca) { switch (ca.raw) { case ContentAddressMethod::Raw::Text: return "text:"; case ContentAddressMethod::Raw::Flat: case ContentAddressMethod::Raw::NixArchive: case ContentAddressMethod::Raw::Git: return "fixed:" + makeFileIngestionPrefix(ca.getFileIngestionMethod()); default: assert(false); } } std::string ContentAddressMethod::renderWithAlgo(HashAlgorithm ha) const { return renderPrefixModern(*this) + printHashAlgo(ha); } FileIngestionMethod ContentAddressMethod::getFileIngestionMethod() const { switch (raw) { case ContentAddressMethod::Raw::Flat: return FileIngestionMethod::Flat; case ContentAddressMethod::Raw::NixArchive: return FileIngestionMethod::NixArchive; case ContentAddressMethod::Raw::Git: return FileIngestionMethod::Git; case ContentAddressMethod::Raw::Text: return FileIngestionMethod::Flat; default: assert(false); } } std::string ContentAddress::render() const { return renderPrefixModern(method) + this->hash.to_string(HashFormat::Nix32, true); } /** * Parses content address strings up to the hash. */ static std::pair<ContentAddressMethod, HashAlgorithm> parseContentAddressMethodPrefix(std::string_view & rest) { std::string_view wholeInput { rest }; std::string_view prefix; { auto optPrefix = splitPrefixTo(rest, ':'); if (!optPrefix) throw UsageError("not a content address because it is not in the form '<prefix>:<rest>': %s", wholeInput); prefix = *optPrefix; } auto parseHashAlgorithm_ = [&](){ auto hashAlgoRaw = splitPrefixTo(rest, ':'); if (!hashAlgoRaw) throw UsageError("content address hash must be in form '<algo>:<hash>', but found: %s", wholeInput); HashAlgorithm hashAlgo = parseHashAlgo(*hashAlgoRaw); return hashAlgo; }; // Switch on prefix if (prefix == "text") { // No parsing of the ingestion method, "text" only support flat. HashAlgorithm hashAlgo = parseHashAlgorithm_(); return { ContentAddressMethod::Raw::Text, std::move(hashAlgo), }; } else if (prefix == "fixed") { // Parse method auto method = ContentAddressMethod::Raw::Flat; if (splitPrefix(rest, "r:")) method = ContentAddressMethod::Raw::NixArchive; else if (splitPrefix(rest, "git:")) { experimentalFeatureSettings.require(Xp::GitHashing); method = ContentAddressMethod::Raw::Git; } HashAlgorithm hashAlgo = parseHashAlgorithm_(); return { std::move(method), std::move(hashAlgo), }; } else throw UsageError("content address prefix '%s' is unrecognized. Recogonized prefixes are 'text' or 'fixed'", prefix); } ContentAddress ContentAddress::parse(std::string_view rawCa) { auto rest = rawCa; auto [caMethod, hashAlgo] = parseContentAddressMethodPrefix(rest); return ContentAddress { .method = std::move(caMethod), .hash = Hash::parseNonSRIUnprefixed(rest, hashAlgo), }; } std::pair<ContentAddressMethod, HashAlgorithm> ContentAddressMethod::parseWithAlgo(std::string_view caMethod) { std::string asPrefix = std::string{caMethod} + ":"; // parseContentAddressMethodPrefix takes its argument by reference std::string_view asPrefixView = asPrefix; return parseContentAddressMethodPrefix(asPrefixView); } std::optional<ContentAddress> ContentAddress::parseOpt(std::string_view rawCaOpt) { return rawCaOpt == "" ? std::nullopt : std::optional { ContentAddress::parse(rawCaOpt) }; }; std::string renderContentAddress(std::optional<ContentAddress> ca) { return ca ? ca->render() : ""; } std::string ContentAddress::printMethodAlgo() const { return std::string { method.renderPrefix() } + printHashAlgo(hash.algo); } bool StoreReferences::empty() const { return !self && others.empty(); } size_t StoreReferences::size() const { return (self ? 1 : 0) + others.size(); } ContentAddressWithReferences ContentAddressWithReferences::withoutRefs(const ContentAddress & ca) noexcept { switch (ca.method.raw) { case ContentAddressMethod::Raw::Text: return TextInfo { .hash = ca.hash, .references = {}, }; case ContentAddressMethod::Raw::Flat: case ContentAddressMethod::Raw::NixArchive: case ContentAddressMethod::Raw::Git: return FixedOutputInfo { .method = ca.method.getFileIngestionMethod(), .hash = ca.hash, .references = {}, }; default: assert(false); } } ContentAddressWithReferences ContentAddressWithReferences::fromParts( ContentAddressMethod method, Hash hash, StoreReferences refs) { switch (method.raw) { case ContentAddressMethod::Raw::Text: if (refs.self) throw Error("self-reference not allowed with text hashing"); return TextInfo { .hash = std::move(hash), .references = std::move(refs.others), }; case ContentAddressMethod::Raw::Flat: case ContentAddressMethod::Raw::NixArchive: case ContentAddressMethod::Raw::Git: return FixedOutputInfo { .method = method.getFileIngestionMethod(), .hash = std::move(hash), .references = std::move(refs), }; default: assert(false); } } ContentAddressMethod ContentAddressWithReferences::getMethod() const { return std::visit(overloaded { [](const TextInfo & th) -> ContentAddressMethod { return ContentAddressMethod::Raw::Text; }, [](const FixedOutputInfo & fsh) -> ContentAddressMethod { return fileIngestionMethodToContentAddressMethod( fsh.method); }, }, raw); } Hash ContentAddressWithReferences::getHash() const { return std::visit(overloaded { [](const TextInfo & th) { return th.hash; }, [](const FixedOutputInfo & fsh) { return fsh.hash; }, }, raw); } }
9,144
C++
.cc
281
26.83274
124
0.67727
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,839
store-reference.cc
NixOS_nix/src/libstore/store-reference.cc
#include <regex> #include "error.hh" #include "url.hh" #include "store-reference.hh" #include "file-system.hh" #include "util.hh" namespace nix { static bool isNonUriPath(const std::string & spec) { return // is not a URL spec.find("://") == std::string::npos // Has at least one path separator, and so isn't a single word that // might be special like "auto" && spec.find("/") != std::string::npos; } std::string StoreReference::render() const { std::string res; std::visit( overloaded{ [&](const StoreReference::Auto &) { res = "auto"; }, [&](const StoreReference::Specified & g) { res = g.scheme; res += "://"; res += g.authority; }, }, variant); if (!params.empty()) { res += "?"; res += encodeQuery(params); } return res; } StoreReference StoreReference::parse(const std::string & uri, const StoreReference::Params & extraParams) { auto params = extraParams; try { auto parsedUri = parseURL(uri); params.insert(parsedUri.query.begin(), parsedUri.query.end()); auto baseURI = parsedUri.authority.value_or("") + parsedUri.path; return { .variant = Specified{ .scheme = std::move(parsedUri.scheme), .authority = std::move(baseURI), }, .params = std::move(params), }; } catch (BadURL &) { auto [baseURI, uriParams] = splitUriAndParams(uri); params.insert(uriParams.begin(), uriParams.end()); if (baseURI == "" || baseURI == "auto") { return { .variant = Auto{}, .params = std::move(params), }; } else if (baseURI == "daemon") { return { .variant = Specified{ .scheme = "unix", .authority = "", }, .params = std::move(params), }; } else if (baseURI == "local") { return { .variant = Specified{ .scheme = "local", .authority = "", }, .params = std::move(params), }; } else if (isNonUriPath(baseURI)) { return { .variant = Specified{ .scheme = "local", .authority = absPath(baseURI), }, .params = std::move(params), }; } } throw UsageError("Cannot parse Nix store '%s'", uri); } /* Split URI into protocol+hierarchy part and its parameter set. */ std::pair<std::string, StoreReference::Params> splitUriAndParams(const std::string & uri_) { auto uri(uri_); StoreReference::Params params; auto q = uri.find('?'); if (q != std::string::npos) { params = decodeQuery(uri.substr(q + 1)); uri = uri_.substr(0, q); } return {uri, params}; } }
3,175
C++
.cc
102
20.892157
105
0.484145
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,840
downstream-placeholder.cc
NixOS_nix/src/libstore/downstream-placeholder.cc
#include "downstream-placeholder.hh" #include "derivations.hh" namespace nix { std::string DownstreamPlaceholder::render() const { return "/" + hash.to_string(HashFormat::Nix32, false); } DownstreamPlaceholder DownstreamPlaceholder::unknownCaOutput( const StorePath & drvPath, OutputNameView outputName, const ExperimentalFeatureSettings & xpSettings) { xpSettings.require(Xp::CaDerivations); auto drvNameWithExtension = drvPath.name(); auto drvName = drvNameWithExtension.substr(0, drvNameWithExtension.size() - 4); auto clearText = "nix-upstream-output:" + std::string { drvPath.hashPart() } + ":" + outputPathName(drvName, outputName); return DownstreamPlaceholder { hashString(HashAlgorithm::SHA256, clearText) }; } DownstreamPlaceholder DownstreamPlaceholder::unknownDerivation( const DownstreamPlaceholder & placeholder, OutputNameView outputName, const ExperimentalFeatureSettings & xpSettings) { xpSettings.require(Xp::DynamicDerivations); auto compressed = compressHash(placeholder.hash, 20); auto clearText = "nix-computed-output:" + compressed.to_string(HashFormat::Nix32, false) + ":" + std::string { outputName }; return DownstreamPlaceholder { hashString(HashAlgorithm::SHA256, clearText) }; } DownstreamPlaceholder DownstreamPlaceholder::fromSingleDerivedPathBuilt( const SingleDerivedPath::Built & b, const ExperimentalFeatureSettings & xpSettings) { return std::visit(overloaded { [&](const SingleDerivedPath::Opaque & o) { return DownstreamPlaceholder::unknownCaOutput(o.path, b.output, xpSettings); }, [&](const SingleDerivedPath::Built & b2) { return DownstreamPlaceholder::unknownDerivation( DownstreamPlaceholder::fromSingleDerivedPathBuilt(b2, xpSettings), b.output, xpSettings); }, }, b.drvPath->raw()); } }
1,963
C++
.cc
51
32.960784
125
0.72126
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,841
names.cc
NixOS_nix/src/libstore/names.cc
#include "names.hh" #include "util.hh" #include <regex> namespace nix { struct Regex { std::regex regex; }; DrvName::DrvName() { name = ""; } /* Parse a derivation name. The `name' part of a derivation name is everything up to but not including the first dash *not* followed by a letter. The `version' part is the rest (excluding the separating dash). E.g., `apache-httpd-2.0.48' is parsed to (`apache-httpd', '2.0.48'). */ DrvName::DrvName(std::string_view s) : hits(0) { name = fullName = std::string(s); for (unsigned int i = 0; i < s.size(); ++i) { /* !!! isalpha/isdigit are affected by the locale. */ if (s[i] == '-' && i + 1 < s.size() && !isalpha(s[i + 1])) { name = s.substr(0, i); version = s.substr(i + 1); break; } } } DrvName::~DrvName() { } bool DrvName::matches(const DrvName & n) { if (name != "*") { if (!regex) { regex = std::make_unique<Regex>(); regex->regex = std::regex(name, std::regex::extended); } if (!std::regex_match(n.name, regex->regex)) return false; } if (version != "" && version != n.version) return false; return true; } std::string_view nextComponent(std::string_view::const_iterator & p, const std::string_view::const_iterator end) { /* Skip any dots and dashes (component separators). */ while (p != end && (*p == '.' || *p == '-')) ++p; if (p == end) return ""; /* If the first character is a digit, consume the longest sequence of digits. Otherwise, consume the longest sequence of non-digit, non-separator characters. */ auto s = p; if (isdigit(*p)) while (p != end && isdigit(*p)) p++; else while (p != end && (!isdigit(*p) && *p != '.' && *p != '-')) p++; return {s, size_t(p - s)}; } static bool componentsLT(const std::string_view c1, const std::string_view c2) { auto n1 = string2Int<int>(c1); auto n2 = string2Int<int>(c2); if (n1 && n2) return *n1 < *n2; else if (c1 == "" && n2) return true; else if (c1 == "pre" && c2 != "pre") return true; else if (c2 == "pre") return false; /* Assume that `2.3a' < `2.3.1'. */ else if (n2) return true; else if (n1) return false; else return c1 < c2; } std::strong_ordering compareVersions(const std::string_view v1, const std::string_view v2) { auto p1 = v1.begin(); auto p2 = v2.begin(); while (p1 != v1.end() || p2 != v2.end()) { auto c1 = nextComponent(p1, v1.end()); auto c2 = nextComponent(p2, v2.end()); if (componentsLT(c1, c2)) return std::strong_ordering::less; else if (componentsLT(c2, c1)) return std::strong_ordering::greater; } return std::strong_ordering::equal; } DrvNames drvNamesFromArgs(const Strings & opArgs) { DrvNames result; for (auto & i : opArgs) result.emplace_back(i); return result; } }
2,982
C++
.cc
93
27.032258
90
0.582517
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false