id
int64
0
755k
file_name
stringlengths
3
109
file_path
stringlengths
13
185
content
stringlengths
31
9.38M
size
int64
31
9.38M
language
stringclasses
1 value
extension
stringclasses
11 values
total_lines
int64
1
340k
avg_line_length
float64
2.18
149k
max_line_length
int64
7
2.22M
alphanum_fraction
float64
0
1
repo_name
stringlengths
6
65
repo_stars
int64
100
47.3k
repo_forks
int64
0
12k
repo_open_issues
int64
0
3.4k
repo_license
stringclasses
9 values
repo_extraction_date
stringclasses
92 values
exact_duplicates_redpajama
bool
2 classes
near_duplicates_redpajama
bool
2 classes
exact_duplicates_githubcode
bool
2 classes
exact_duplicates_stackv2
bool
1 class
exact_duplicates_stackv1
bool
2 classes
near_duplicates_githubcode
bool
2 classes
near_duplicates_stackv1
bool
2 classes
near_duplicates_stackv2
bool
1 class
10,942
references.cc
NixOS_nix/src/libutil-tests/references.cc
#include "references.hh" #include <gtest/gtest.h> namespace nix { using std::string; struct RewriteParams { string originalString, finalString; StringMap rewrites; friend std::ostream& operator<<(std::ostream& os, const RewriteParams& bar) { StringSet strRewrites; for (auto & [from, to] : bar.rewrites) strRewrites.insert(from + "->" + to); return os << "OriginalString: " << bar.originalString << std::endl << "Rewrites: " << dropEmptyInitThenConcatStringsSep(",", strRewrites) << std::endl << "Expected result: " << bar.finalString; } }; class RewriteTest : public ::testing::TestWithParam<RewriteParams> { }; TEST_P(RewriteTest, IdentityRewriteIsIdentity) { RewriteParams param = GetParam(); StringSink rewritten; auto rewriter = RewritingSink(param.rewrites, rewritten); rewriter(param.originalString); rewriter.flush(); ASSERT_EQ(rewritten.s, param.finalString); } INSTANTIATE_TEST_CASE_P( references, RewriteTest, ::testing::Values( RewriteParams{ "foooo", "baroo", {{"foo", "bar"}, {"bar", "baz"}}}, RewriteParams{ "foooo", "bazoo", {{"fou", "bar"}, {"foo", "baz"}}}, RewriteParams{ "foooo", "foooo", {}} ) ); }
1,281
C++
.cc
37
29.27027
95
0.644534
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,943
git.cc
NixOS_nix/src/libutil-tests/git.cc
#include <gtest/gtest.h> #include "git.hh" #include "memory-source-accessor.hh" #include "tests/characterization.hh" namespace nix { using namespace git; class GitTest : public CharacterizationTest { std::filesystem::path unitTestData = getUnitTestData() / "git"; public: std::filesystem::path goldenMaster(std::string_view testStem) const override { return unitTestData / std::string(testStem); } /** * We set these in tests rather than the regular globals so we don't have * to worry about race conditions if the tests run concurrently. */ ExperimentalFeatureSettings mockXpSettings; private: void SetUp() override { mockXpSettings.set("experimental-features", "git-hashing"); } }; TEST(GitMode, gitMode_directory) { Mode m = Mode::Directory; RawMode r = 0040000; ASSERT_EQ(static_cast<RawMode>(m), r); ASSERT_EQ(decodeMode(r), std::optional { m }); }; TEST(GitMode, gitMode_executable) { Mode m = Mode::Executable; RawMode r = 0100755; ASSERT_EQ(static_cast<RawMode>(m), r); ASSERT_EQ(decodeMode(r), std::optional { m }); }; TEST(GitMode, gitMode_regular) { Mode m = Mode::Regular; RawMode r = 0100644; ASSERT_EQ(static_cast<RawMode>(m), r); ASSERT_EQ(decodeMode(r), std::optional { m }); }; TEST(GitMode, gitMode_symlink) { Mode m = Mode::Symlink; RawMode r = 0120000; ASSERT_EQ(static_cast<RawMode>(m), r); ASSERT_EQ(decodeMode(r), std::optional { m }); }; TEST_F(GitTest, blob_read) { readTest("hello-world-blob.bin", [&](const auto & encoded) { StringSource in { encoded }; StringSink out; RegularFileSink out2 { out }; ASSERT_EQ(parseObjectType(in, mockXpSettings), ObjectType::Blob); parseBlob(out2, CanonPath::root, in, BlobMode::Regular, mockXpSettings); auto expected = readFile(goldenMaster("hello-world.bin")); ASSERT_EQ(out.s, expected); }); } TEST_F(GitTest, blob_write) { writeTest("hello-world-blob.bin", [&]() { auto decoded = readFile(goldenMaster("hello-world.bin")); StringSink s; dumpBlobPrefix(decoded.size(), s, mockXpSettings); s(decoded); return s.s; }); } /** * This data is for "shallow" tree tests. However, we use "real" hashes * so that we can check our test data in a small shell script test test * (`src/libutil-tests/data/git/check-data.sh`). */ const static Tree tree = { { "Foo", { .mode = Mode::Regular, // hello world with special chars from above .hash = Hash::parseAny("63ddb340119baf8492d2da53af47e8c7cfcd5eb2", HashAlgorithm::SHA1), }, }, { "bAr", { .mode = Mode::Executable, // ditto .hash = Hash::parseAny("63ddb340119baf8492d2da53af47e8c7cfcd5eb2", HashAlgorithm::SHA1), }, }, { "baZ/", { .mode = Mode::Directory, // Empty directory hash .hash = Hash::parseAny("4b825dc642cb6eb9a060e54bf8d69288fbee4904", HashAlgorithm::SHA1), }, }, { "quuX", { .mode = Mode::Symlink, // hello world with special chars from above (symlink target // can be anything) .hash = Hash::parseAny("63ddb340119baf8492d2da53af47e8c7cfcd5eb2", HashAlgorithm::SHA1), }, }, }; TEST_F(GitTest, tree_read) { readTest("tree.bin", [&](const auto & encoded) { StringSource in { encoded }; NullFileSystemObjectSink out; Tree got; ASSERT_EQ(parseObjectType(in, mockXpSettings), ObjectType::Tree); parseTree(out, CanonPath::root, in, [&](auto & name, auto entry) { auto name2 = std::string{name.rel()}; if (entry.mode == Mode::Directory) name2 += '/'; got.insert_or_assign(name2, std::move(entry)); }, mockXpSettings); ASSERT_EQ(got, tree); }); } TEST_F(GitTest, tree_write) { writeTest("tree.bin", [&]() { StringSink s; dumpTree(tree, s, mockXpSettings); return s.s; }); } TEST_F(GitTest, both_roundrip) { using File = MemorySourceAccessor::File; auto files = make_ref<MemorySourceAccessor>(); files->root = File::Directory { .contents { { "foo", File::Regular { .contents = "hello\n\0\n\tworld!", }, }, { "bar", File::Directory { .contents = { { "baz", File::Regular { .executable = true, .contents = "good day,\n\0\n\tworld!", }, }, { "quux", File::Symlink { .target = "/over/there", }, }, }, }, }, }, }; std::map<Hash, std::string> cas; std::function<DumpHook> dumpHook; dumpHook = [&](const SourcePath & path) { StringSink s; HashSink hashSink { HashAlgorithm::SHA1 }; TeeSink s2 { s, hashSink }; auto mode = dump( path, s2, dumpHook, defaultPathFilter, mockXpSettings); auto hash = hashSink.finish().first; cas.insert_or_assign(hash, std::move(s.s)); return TreeEntry { .mode = mode, .hash = hash, }; }; auto root = dumpHook({files}); auto files2 = make_ref<MemorySourceAccessor>(); MemorySink sinkFiles2 { *files2 }; std::function<void(const CanonPath, const Hash &, BlobMode)> mkSinkHook; mkSinkHook = [&](auto prefix, auto & hash, auto blobMode) { StringSource in { cas[hash] }; parse( sinkFiles2, prefix, in, blobMode, [&](const CanonPath & name, const auto & entry) { mkSinkHook( prefix / name, entry.hash, // N.B. this cast would not be acceptable in real // code, because it would make an assert reachable, // but it should harmless in this test. static_cast<BlobMode>(entry.mode)); }, mockXpSettings); }; mkSinkHook(CanonPath::root, root.hash, BlobMode::Regular); ASSERT_EQ(files->root, files2->root); } TEST(GitLsRemote, parseSymrefLineWithReference) { auto line = "ref: refs/head/main HEAD"; auto res = parseLsRemoteLine(line); ASSERT_TRUE(res.has_value()); ASSERT_EQ(res->kind, LsRemoteRefLine::Kind::Symbolic); ASSERT_EQ(res->target, "refs/head/main"); ASSERT_EQ(res->reference, "HEAD"); } TEST(GitLsRemote, parseSymrefLineWithNoReference) { auto line = "ref: refs/head/main"; auto res = parseLsRemoteLine(line); ASSERT_TRUE(res.has_value()); ASSERT_EQ(res->kind, LsRemoteRefLine::Kind::Symbolic); ASSERT_EQ(res->target, "refs/head/main"); ASSERT_EQ(res->reference, std::nullopt); } TEST(GitLsRemote, parseObjectRefLine) { auto line = "abc123 refs/head/main"; auto res = parseLsRemoteLine(line); ASSERT_TRUE(res.has_value()); ASSERT_EQ(res->kind, LsRemoteRefLine::Kind::Object); ASSERT_EQ(res->target, "abc123"); ASSERT_EQ(res->reference, "refs/head/main"); } }
7,627
C++
.cc
226
25.053097
100
0.568228
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,944
xml-writer.cc
NixOS_nix/src/libutil-tests/xml-writer.cc
#include "xml-writer.hh" #include <gtest/gtest.h> #include <sstream> namespace nix { /* ---------------------------------------------------------------------------- * XMLWriter * --------------------------------------------------------------------------*/ TEST(XMLWriter, emptyObject) { std::stringstream out; { XMLWriter t(false, out); } ASSERT_EQ(out.str(), "<?xml version='1.0' encoding='utf-8'?>\n"); } TEST(XMLWriter, objectWithEmptyElement) { std::stringstream out; { XMLWriter t(false, out); t.openElement("foobar"); } ASSERT_EQ(out.str(), "<?xml version='1.0' encoding='utf-8'?>\n<foobar></foobar>"); } TEST(XMLWriter, objectWithElementWithAttrs) { std::stringstream out; { XMLWriter t(false, out); XMLAttrs attrs = { { "foo", "bar" } }; t.openElement("foobar", attrs); } ASSERT_EQ(out.str(), "<?xml version='1.0' encoding='utf-8'?>\n<foobar foo=\"bar\"></foobar>"); } TEST(XMLWriter, objectWithElementWithEmptyAttrs) { std::stringstream out; { XMLWriter t(false, out); XMLAttrs attrs = {}; t.openElement("foobar", attrs); } ASSERT_EQ(out.str(), "<?xml version='1.0' encoding='utf-8'?>\n<foobar></foobar>"); } TEST(XMLWriter, objectWithElementWithAttrsEscaping) { std::stringstream out; { XMLWriter t(false, out); XMLAttrs attrs = { { "<key>", "<value>" } }; t.openElement("foobar", attrs); } // XXX: While "<value>" is escaped, "<key>" isn't which I think is a bug. ASSERT_EQ(out.str(), "<?xml version='1.0' encoding='utf-8'?>\n<foobar <key>=\"&lt;value&gt;\"></foobar>"); } TEST(XMLWriter, objectWithElementWithAttrsIndented) { std::stringstream out; { XMLWriter t(true, out); XMLAttrs attrs = { { "foo", "bar" } }; t.openElement("foobar", attrs); } ASSERT_EQ(out.str(), "<?xml version='1.0' encoding='utf-8'?>\n<foobar foo=\"bar\">\n</foobar>\n"); } TEST(XMLWriter, writeEmptyElement) { std::stringstream out; { XMLWriter t(false, out); t.writeEmptyElement("foobar"); } ASSERT_EQ(out.str(), "<?xml version='1.0' encoding='utf-8'?>\n<foobar />"); } TEST(XMLWriter, writeEmptyElementWithAttributes) { std::stringstream out; { XMLWriter t(false, out); XMLAttrs attrs = { { "foo", "bar" } }; t.writeEmptyElement("foobar", attrs); } ASSERT_EQ(out.str(), "<?xml version='1.0' encoding='utf-8'?>\n<foobar foo=\"bar\" />"); } }
2,945
C++
.cc
85
25.247059
114
0.487324
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
true
false
false
true
false
false
10,945
terminal.cc
NixOS_nix/src/libutil-tests/terminal.cc
#include "util.hh" #include "types.hh" #include "terminal.hh" #include "strings.hh" #include <limits.h> #include <gtest/gtest.h> #include <numeric> namespace nix { /* ---------------------------------------------------------------------------- * filterANSIEscapes * --------------------------------------------------------------------------*/ TEST(filterANSIEscapes, emptyString) { auto s = ""; auto expected = ""; ASSERT_EQ(filterANSIEscapes(s), expected); } TEST(filterANSIEscapes, doesntChangePrintableChars) { auto s = "09 2q304ruyhr slk2-19024 kjsadh sar f"; ASSERT_EQ(filterANSIEscapes(s), s); } TEST(filterANSIEscapes, filtersColorCodes) { auto s = "\u001b[30m A \u001b[31m B \u001b[32m C \u001b[33m D \u001b[0m"; ASSERT_EQ(filterANSIEscapes(s, true, 2), " A"); ASSERT_EQ(filterANSIEscapes(s, true, 3), " A "); ASSERT_EQ(filterANSIEscapes(s, true, 4), " A "); ASSERT_EQ(filterANSIEscapes(s, true, 5), " A B"); ASSERT_EQ(filterANSIEscapes(s, true, 8), " A B C"); } TEST(filterANSIEscapes, expandsTabs) { auto s = "foo\tbar\tbaz"; ASSERT_EQ(filterANSIEscapes(s, true), "foo bar baz"); } TEST(filterANSIEscapes, utf8) { ASSERT_EQ(filterANSIEscapes("foobar", true, 5), "fooba"); ASSERT_EQ(filterANSIEscapes("f贸贸b盲r", true, 6), "f贸贸b盲r"); ASSERT_EQ(filterANSIEscapes("f贸贸b盲r", true, 5), "f贸贸b盲"); ASSERT_EQ(filterANSIEscapes("f贸贸b盲r", true, 3), "f贸贸"); ASSERT_EQ(filterANSIEscapes("fb盲r", true, 4), "fb"); ASSERT_EQ(filterANSIEscapes("fb盲r", true, 4), "fb"); } TEST(filterANSIEscapes, osc8) { ASSERT_EQ(filterANSIEscapes("\e]8;;http://example.com\e\\This is a link\e]8;;\e\\"), "This is a link"); } } // namespace nix
1,776
C++
.cc
50
31.64
107
0.617788
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,946
lru-cache.cc
NixOS_nix/src/libutil-tests/lru-cache.cc
#include "lru-cache.hh" #include <gtest/gtest.h> namespace nix { /* ---------------------------------------------------------------------------- * size * --------------------------------------------------------------------------*/ TEST(LRUCache, sizeOfEmptyCacheIsZero) { LRUCache<std::string, std::string> c(10); ASSERT_EQ(c.size(), 0); } TEST(LRUCache, sizeOfSingleElementCacheIsOne) { LRUCache<std::string, std::string> c(10); c.upsert("foo", "bar"); ASSERT_EQ(c.size(), 1); } /* ---------------------------------------------------------------------------- * upsert / get * --------------------------------------------------------------------------*/ TEST(LRUCache, getFromEmptyCache) { LRUCache<std::string, std::string> c(10); auto val = c.get("x"); ASSERT_EQ(val.has_value(), false); } TEST(LRUCache, getExistingValue) { LRUCache<std::string, std::string> c(10); c.upsert("foo", "bar"); auto val = c.get("foo"); ASSERT_EQ(val, "bar"); } TEST(LRUCache, getNonExistingValueFromNonEmptyCache) { LRUCache<std::string, std::string> c(10); c.upsert("foo", "bar"); auto val = c.get("another"); ASSERT_EQ(val.has_value(), false); } TEST(LRUCache, upsertOnZeroCapacityCache) { LRUCache<std::string, std::string> c(0); c.upsert("foo", "bar"); auto val = c.get("foo"); ASSERT_EQ(val.has_value(), false); } TEST(LRUCache, updateExistingValue) { LRUCache<std::string, std::string> c(1); c.upsert("foo", "bar"); auto val = c.get("foo"); ASSERT_EQ(val.value_or("error"), "bar"); ASSERT_EQ(c.size(), 1); c.upsert("foo", "changed"); val = c.get("foo"); ASSERT_EQ(val.value_or("error"), "changed"); ASSERT_EQ(c.size(), 1); } TEST(LRUCache, overwriteOldestWhenCapacityIsReached) { LRUCache<std::string, std::string> c(3); c.upsert("one", "eins"); c.upsert("two", "zwei"); c.upsert("three", "drei"); ASSERT_EQ(c.size(), 3); ASSERT_EQ(c.get("one").value_or("error"), "eins"); // exceed capacity c.upsert("another", "whatever"); ASSERT_EQ(c.size(), 3); // Retrieving "one" makes it the most recent element thus // two will be the oldest one and thus replaced. ASSERT_EQ(c.get("two").has_value(), false); ASSERT_EQ(c.get("another").value(), "whatever"); } /* ---------------------------------------------------------------------------- * clear * --------------------------------------------------------------------------*/ TEST(LRUCache, clearEmptyCache) { LRUCache<std::string, std::string> c(10); c.clear(); ASSERT_EQ(c.size(), 0); } TEST(LRUCache, clearNonEmptyCache) { LRUCache<std::string, std::string> c(10); c.upsert("one", "eins"); c.upsert("two", "zwei"); c.upsert("three", "drei"); ASSERT_EQ(c.size(), 3); c.clear(); ASSERT_EQ(c.size(), 0); } /* ---------------------------------------------------------------------------- * erase * --------------------------------------------------------------------------*/ TEST(LRUCache, eraseFromEmptyCache) { LRUCache<std::string, std::string> c(10); ASSERT_EQ(c.erase("foo"), false); ASSERT_EQ(c.size(), 0); } TEST(LRUCache, eraseMissingFromNonEmptyCache) { LRUCache<std::string, std::string> c(10); c.upsert("one", "eins"); ASSERT_EQ(c.erase("foo"), false); ASSERT_EQ(c.size(), 1); ASSERT_EQ(c.get("one").value_or("error"), "eins"); } TEST(LRUCache, eraseFromNonEmptyCache) { LRUCache<std::string, std::string> c(10); c.upsert("one", "eins"); ASSERT_EQ(c.erase("one"), true); ASSERT_EQ(c.size(), 0); ASSERT_EQ(c.get("one").value_or("empty"), "empty"); } }
4,093
C++
.cc
107
30.682243
83
0.464295
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
true
false
false
true
false
false
10,947
canon-path.cc
NixOS_nix/src/libutil-tests/canon-path.cc
#include "canon-path.hh" #include <gtest/gtest.h> namespace nix { TEST(CanonPath, basic) { { CanonPath p("/"); ASSERT_EQ(p.abs(), "/"); ASSERT_EQ(p.rel(), ""); ASSERT_EQ(p.baseName(), std::nullopt); ASSERT_EQ(p.dirOf(), std::nullopt); ASSERT_FALSE(p.parent()); } { CanonPath p("/foo//"); ASSERT_EQ(p.abs(), "/foo"); ASSERT_EQ(p.rel(), "foo"); ASSERT_EQ(*p.baseName(), "foo"); ASSERT_EQ(*p.dirOf(), ""); // FIXME: do we want this? ASSERT_EQ(p.parent()->abs(), "/"); } { CanonPath p("foo/bar"); ASSERT_EQ(p.abs(), "/foo/bar"); ASSERT_EQ(p.rel(), "foo/bar"); ASSERT_EQ(*p.baseName(), "bar"); ASSERT_EQ(*p.dirOf(), "/foo"); ASSERT_EQ(p.parent()->abs(), "/foo"); } { CanonPath p("foo//bar/"); ASSERT_EQ(p.abs(), "/foo/bar"); ASSERT_EQ(p.rel(), "foo/bar"); ASSERT_EQ(*p.baseName(), "bar"); ASSERT_EQ(*p.dirOf(), "/foo"); } } TEST(CanonPath, from_existing) { CanonPath p0("foo//bar/"); { CanonPath p("/baz//quux/", p0); ASSERT_EQ(p.abs(), "/baz/quux"); ASSERT_EQ(p.rel(), "baz/quux"); ASSERT_EQ(*p.baseName(), "quux"); ASSERT_EQ(*p.dirOf(), "/baz"); } { CanonPath p("baz//quux/", p0); ASSERT_EQ(p.abs(), "/foo/bar/baz/quux"); ASSERT_EQ(p.rel(), "foo/bar/baz/quux"); ASSERT_EQ(*p.baseName(), "quux"); ASSERT_EQ(*p.dirOf(), "/foo/bar/baz"); } } TEST(CanonPath, pop) { CanonPath p("foo/bar/x"); ASSERT_EQ(p.abs(), "/foo/bar/x"); p.pop(); ASSERT_EQ(p.abs(), "/foo/bar"); p.pop(); ASSERT_EQ(p.abs(), "/foo"); p.pop(); ASSERT_EQ(p.abs(), "/"); } TEST(CanonPath, removePrefix) { CanonPath p1("foo/bar"); CanonPath p2("foo/bar/a/b/c"); ASSERT_EQ(p2.removePrefix(p1).abs(), "/a/b/c"); ASSERT_EQ(p1.removePrefix(p1).abs(), "/"); ASSERT_EQ(p1.removePrefix(CanonPath("/")).abs(), "/foo/bar"); } TEST(CanonPath, iter) { { CanonPath p("a//foo/bar//"); std::vector<std::string_view> ss; for (auto & c : p) ss.push_back(c); ASSERT_EQ(ss, std::vector<std::string_view>({"a", "foo", "bar"})); } { CanonPath p("/"); std::vector<std::string_view> ss; for (auto & c : p) ss.push_back(c); ASSERT_EQ(ss, std::vector<std::string_view>()); } } TEST(CanonPath, concat) { { CanonPath p1("a//foo/bar//"); CanonPath p2("xyzzy/bla"); ASSERT_EQ((p1 / p2).abs(), "/a/foo/bar/xyzzy/bla"); } { CanonPath p1("/"); CanonPath p2("/a/b"); ASSERT_EQ((p1 / p2).abs(), "/a/b"); } { CanonPath p1("/a/b"); CanonPath p2("/"); ASSERT_EQ((p1 / p2).abs(), "/a/b"); } { CanonPath p("/foo/bar"); ASSERT_EQ((p / "x").abs(), "/foo/bar/x"); } { CanonPath p("/"); ASSERT_EQ((p / "foo" / "bar").abs(), "/foo/bar"); } } TEST(CanonPath, within) { ASSERT_TRUE(CanonPath("foo").isWithin(CanonPath("foo"))); ASSERT_FALSE(CanonPath("foo").isWithin(CanonPath("bar"))); ASSERT_FALSE(CanonPath("foo").isWithin(CanonPath("fo"))); ASSERT_TRUE(CanonPath("foo/bar").isWithin(CanonPath("foo"))); ASSERT_FALSE(CanonPath("foo").isWithin(CanonPath("foo/bar"))); ASSERT_TRUE(CanonPath("/foo/bar/default.nix").isWithin(CanonPath("/"))); ASSERT_TRUE(CanonPath("/").isWithin(CanonPath("/"))); } TEST(CanonPath, sort) { ASSERT_FALSE(CanonPath("foo") < CanonPath("foo")); ASSERT_TRUE (CanonPath("foo") < CanonPath("foo/bar")); ASSERT_TRUE (CanonPath("foo/bar") < CanonPath("foo!")); ASSERT_FALSE(CanonPath("foo!") < CanonPath("foo")); ASSERT_TRUE (CanonPath("foo") < CanonPath("foo!")); } TEST(CanonPath, allowed) { std::set<CanonPath> allowed { CanonPath("foo/bar"), CanonPath("foo!"), CanonPath("xyzzy"), CanonPath("a/b/c"), }; ASSERT_TRUE (CanonPath("foo/bar").isAllowed(allowed)); ASSERT_TRUE (CanonPath("foo/bar/bla").isAllowed(allowed)); ASSERT_TRUE (CanonPath("foo").isAllowed(allowed)); ASSERT_FALSE(CanonPath("bar").isAllowed(allowed)); ASSERT_FALSE(CanonPath("bar/a").isAllowed(allowed)); ASSERT_TRUE (CanonPath("a").isAllowed(allowed)); ASSERT_TRUE (CanonPath("a/b").isAllowed(allowed)); ASSERT_TRUE (CanonPath("a/b/c").isAllowed(allowed)); ASSERT_TRUE (CanonPath("a/b/c/d").isAllowed(allowed)); ASSERT_TRUE (CanonPath("a/b/c/d/e").isAllowed(allowed)); ASSERT_FALSE(CanonPath("a/b/a").isAllowed(allowed)); ASSERT_FALSE(CanonPath("a/b/d").isAllowed(allowed)); ASSERT_FALSE(CanonPath("aaa").isAllowed(allowed)); ASSERT_FALSE(CanonPath("zzz").isAllowed(allowed)); ASSERT_TRUE (CanonPath("/").isAllowed(allowed)); } TEST(CanonPath, makeRelative) { CanonPath d("/foo/bar"); ASSERT_EQ(d.makeRelative(CanonPath("/foo/bar")), "."); ASSERT_EQ(d.makeRelative(CanonPath("/foo")), ".."); ASSERT_EQ(d.makeRelative(CanonPath("/")), "../.."); ASSERT_EQ(d.makeRelative(CanonPath("/foo/bar/xyzzy")), "xyzzy"); ASSERT_EQ(d.makeRelative(CanonPath("/foo/bar/xyzzy/bla")), "xyzzy/bla"); ASSERT_EQ(d.makeRelative(CanonPath("/foo/xyzzy/bla")), "../xyzzy/bla"); ASSERT_EQ(d.makeRelative(CanonPath("/xyzzy/bla")), "../../xyzzy/bla"); } }
6,053
C++
.cc
159
28.18239
80
0.505704
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,948
json-utils.cc
NixOS_nix/src/libutil-tests/json-utils.cc
#include <vector> #include <optional> #include <gtest/gtest.h> #include "error.hh" #include "json-utils.hh" namespace nix { /* Test `to_json` and `from_json` with `std::optional` types. * We are specifically interested in whether we can _nest_ optionals in STL * containers so we that we can leverage existing adl_serializer templates. */ TEST(to_json, optionalInt) { std::optional<int> val = std::make_optional(420); ASSERT_EQ(nlohmann::json(val), nlohmann::json(420)); val = std::nullopt; ASSERT_EQ(nlohmann::json(val), nlohmann::json(nullptr)); } TEST(to_json, vectorOfOptionalInts) { std::vector<std::optional<int>> vals = { std::make_optional(420), std::nullopt, }; ASSERT_EQ(nlohmann::json(vals), nlohmann::json::parse("[420,null]")); } TEST(to_json, optionalVectorOfInts) { std::optional<std::vector<int>> val = std::make_optional(std::vector<int> { -420, 420, }); ASSERT_EQ(nlohmann::json(val), nlohmann::json::parse("[-420,420]")); val = std::nullopt; ASSERT_EQ(nlohmann::json(val), nlohmann::json(nullptr)); } TEST(from_json, optionalInt) { nlohmann::json json = 420; std::optional<int> val = json; ASSERT_TRUE(val.has_value()); ASSERT_EQ(*val, 420); json = nullptr; json.get_to(val); ASSERT_FALSE(val.has_value()); } TEST(from_json, vectorOfOptionalInts) { nlohmann::json json = { 420, nullptr }; std::vector<std::optional<int>> vals = json; ASSERT_EQ(vals.size(), 2); ASSERT_TRUE(vals.at(0).has_value()); ASSERT_EQ(*vals.at(0), 420); ASSERT_FALSE(vals.at(1).has_value()); } TEST(valueAt, simpleObject) { auto simple = R"({ "hello": "world" })"_json; ASSERT_EQ(valueAt(getObject(simple), "hello"), "world"); auto nested = R"({ "hello": { "world": "" } })"_json; auto & nestedObject = valueAt(getObject(nested), "hello"); ASSERT_EQ(valueAt(nestedObject, "world"), ""); } TEST(valueAt, missingKey) { auto json = R"({ "hello": { "nested": "world" } })"_json; auto & obj = getObject(json); ASSERT_THROW(valueAt(obj, "foo"), Error); } TEST(getObject, rightAssertions) { auto simple = R"({ "object": {} })"_json; ASSERT_EQ(getObject(valueAt(getObject(simple), "object")), (nlohmann::json::object_t {})); auto nested = R"({ "object": { "object": {} } })"_json; auto & nestedObject = getObject(valueAt(getObject(nested), "object")); ASSERT_EQ(nestedObject, getObject(nlohmann::json::parse(R"({ "object": {} })"))); ASSERT_EQ(getObject(valueAt(getObject(nestedObject), "object")), (nlohmann::json::object_t {})); } TEST(getObject, wrongAssertions) { auto json = R"({ "object": {}, "array": [], "string": "", "int": 0, "boolean": false })"_json; auto & obj = getObject(json); ASSERT_THROW(getObject(valueAt(obj, "array")), Error); ASSERT_THROW(getObject(valueAt(obj, "string")), Error); ASSERT_THROW(getObject(valueAt(obj, "int")), Error); ASSERT_THROW(getObject(valueAt(obj, "boolean")), Error); } TEST(getArray, rightAssertions) { auto simple = R"({ "array": [] })"_json; ASSERT_EQ(getArray(valueAt(getObject(simple), "array")), (nlohmann::json::array_t {})); } TEST(getArray, wrongAssertions) { auto json = R"({ "object": {}, "array": [], "string": "", "int": 0, "boolean": false })"_json; ASSERT_THROW(getArray(valueAt(json, "object")), Error); ASSERT_THROW(getArray(valueAt(json, "string")), Error); ASSERT_THROW(getArray(valueAt(json, "int")), Error); ASSERT_THROW(getArray(valueAt(json, "boolean")), Error); } TEST(getString, rightAssertions) { auto simple = R"({ "string": "" })"_json; ASSERT_EQ(getString(valueAt(getObject(simple), "string")), ""); } TEST(getString, wrongAssertions) { auto json = R"({ "object": {}, "array": [], "string": "", "int": 0, "boolean": false })"_json; ASSERT_THROW(getString(valueAt(json, "object")), Error); ASSERT_THROW(getString(valueAt(json, "array")), Error); ASSERT_THROW(getString(valueAt(json, "int")), Error); ASSERT_THROW(getString(valueAt(json, "boolean")), Error); } TEST(getInteger, rightAssertions) { auto simple = R"({ "int": 0 })"_json; ASSERT_EQ(getInteger(valueAt(getObject(simple), "int")), 0); } TEST(getInteger, wrongAssertions) { auto json = R"({ "object": {}, "array": [], "string": "", "int": 0, "boolean": false })"_json; ASSERT_THROW(getInteger(valueAt(json, "object")), Error); ASSERT_THROW(getInteger(valueAt(json, "array")), Error); ASSERT_THROW(getInteger(valueAt(json, "string")), Error); ASSERT_THROW(getInteger(valueAt(json, "boolean")), Error); } TEST(getBoolean, rightAssertions) { auto simple = R"({ "boolean": false })"_json; ASSERT_EQ(getBoolean(valueAt(getObject(simple), "boolean")), false); } TEST(getBoolean, wrongAssertions) { auto json = R"({ "object": {}, "array": [], "string": "", "int": 0, "boolean": false })"_json; ASSERT_THROW(getBoolean(valueAt(json, "object")), Error); ASSERT_THROW(getBoolean(valueAt(json, "array")), Error); ASSERT_THROW(getBoolean(valueAt(json, "string")), Error); ASSERT_THROW(getBoolean(valueAt(json, "int")), Error); } TEST(optionalValueAt, existing) { auto json = R"({ "string": "ssh-rsa" })"_json; ASSERT_EQ(optionalValueAt(json, "string"), std::optional { "ssh-rsa" }); } TEST(optionalValueAt, empty) { auto json = R"({})"_json; ASSERT_EQ(optionalValueAt(json, "string"), std::nullopt); } TEST(getNullable, null) { auto json = R"(null)"_json; ASSERT_EQ(getNullable(json), nullptr); } TEST(getNullable, empty) { auto json = R"({})"_json; auto * p = getNullable(json); ASSERT_NE(p, nullptr); ASSERT_EQ(*p, R"({})"_json); } } /* namespace nix */
5,778
C++
.cc
139
37.568345
100
0.645669
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,949
spawn.cc
NixOS_nix/src/libutil-tests/spawn.cc
#include <gtest/gtest.h> #include "processes.hh" namespace nix { #ifdef _WIN32 TEST(SpawnTest, spawnEcho) { auto output = runProgram(RunOptions{.program = "cmd.exe", .args = {"/C", "echo", "hello world"}}); ASSERT_EQ(output.first, 0); ASSERT_EQ(output.second, "\"hello world\"\r\n"); } std::string windowsEscape(const std::string & str, bool cmd); TEST(SpawnTest, windowsEscape) { auto empty = windowsEscape("", false); ASSERT_EQ(empty, R"("")"); // There's no quotes in this argument so the input should equal the output auto backslashStr = R"(\\\\)"; auto backslashes = windowsEscape(backslashStr, false); ASSERT_EQ(backslashes, backslashStr); auto nestedQuotes = windowsEscape(R"(he said: "hello there")", false); ASSERT_EQ(nestedQuotes, R"("he said: \"hello there\"")"); auto middleQuote = windowsEscape(R"( \\\" )", false); ASSERT_EQ(middleQuote, R"(" \\\\\\\" ")"); auto space = windowsEscape("hello world", false); ASSERT_EQ(space, R"("hello world")"); } #endif }
1,039
C++
.cc
28
33.678571
102
0.664008
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,950
hash.cc
NixOS_nix/src/libutil-tests/hash.cc
#include <regex> #include <gtest/gtest.h> #include "hash.hh" namespace nix { /* ---------------------------------------------------------------------------- * hashString * --------------------------------------------------------------------------*/ TEST(hashString, testKnownMD5Hashes1) { // values taken from: https://tools.ietf.org/html/rfc1321 auto s1 = ""; auto hash = hashString(HashAlgorithm::MD5, s1); ASSERT_EQ(hash.to_string(HashFormat::Base16, true), "md5:d41d8cd98f00b204e9800998ecf8427e"); } TEST(hashString, testKnownMD5Hashes2) { // values taken from: https://tools.ietf.org/html/rfc1321 auto s2 = "abc"; auto hash = hashString(HashAlgorithm::MD5, s2); ASSERT_EQ(hash.to_string(HashFormat::Base16, true), "md5:900150983cd24fb0d6963f7d28e17f72"); } TEST(hashString, testKnownSHA1Hashes1) { // values taken from: https://tools.ietf.org/html/rfc3174 auto s = "abc"; auto hash = hashString(HashAlgorithm::SHA1, s); ASSERT_EQ(hash.to_string(HashFormat::Base16, true),"sha1:a9993e364706816aba3e25717850c26c9cd0d89d"); } TEST(hashString, testKnownSHA1Hashes2) { // values taken from: https://tools.ietf.org/html/rfc3174 auto s = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"; auto hash = hashString(HashAlgorithm::SHA1, s); ASSERT_EQ(hash.to_string(HashFormat::Base16, true),"sha1:84983e441c3bd26ebaae4aa1f95129e5e54670f1"); } TEST(hashString, testKnownSHA256Hashes1) { // values taken from: https://tools.ietf.org/html/rfc4634 auto s = "abc"; auto hash = hashString(HashAlgorithm::SHA256, s); ASSERT_EQ(hash.to_string(HashFormat::Base16, true), "sha256:ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad"); } TEST(hashString, testKnownSHA256Hashes2) { // values taken from: https://tools.ietf.org/html/rfc4634 auto s = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"; auto hash = hashString(HashAlgorithm::SHA256, s); ASSERT_EQ(hash.to_string(HashFormat::Base16, true), "sha256:248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1"); } TEST(hashString, testKnownSHA512Hashes1) { // values taken from: https://tools.ietf.org/html/rfc4634 auto s = "abc"; auto hash = hashString(HashAlgorithm::SHA512, s); ASSERT_EQ(hash.to_string(HashFormat::Base16, true), "sha512:ddaf35a193617abacc417349ae20413112e6fa4e89a9" "7ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd" "454d4423643ce80e2a9ac94fa54ca49f"); } TEST(hashString, testKnownSHA512Hashes2) { // values taken from: https://tools.ietf.org/html/rfc4634 auto s = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu"; auto hash = hashString(HashAlgorithm::SHA512, s); ASSERT_EQ(hash.to_string(HashFormat::Base16, true), "sha512:8e959b75dae313da8cf4f72814fc143f8f7779c6eb9f7fa1" "7299aeadb6889018501d289e4900f7e4331b99dec4b5433a" "c7d329eeb6dd26545e96e55b874be909"); } /* ---------------------------------------------------------------------------- * parseHashFormat, parseHashFormatOpt, printHashFormat * --------------------------------------------------------------------------*/ TEST(hashFormat, testRoundTripPrintParse) { for (const HashFormat hashFormat: { HashFormat::Base64, HashFormat::Nix32, HashFormat::Base16, HashFormat::SRI}) { ASSERT_EQ(parseHashFormat(printHashFormat(hashFormat)), hashFormat); ASSERT_EQ(*parseHashFormatOpt(printHashFormat(hashFormat)), hashFormat); } } TEST(hashFormat, testParseHashFormatOptException) { ASSERT_EQ(parseHashFormatOpt("sha0042"), std::nullopt); } }
4,024
C++
.cc
76
44.631579
132
0.642675
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,951
compression.cc
NixOS_nix/src/libutil-tests/compression.cc
#include "compression.hh" #include <gtest/gtest.h> namespace nix { /* ---------------------------------------------------------------------------- * compress / decompress * --------------------------------------------------------------------------*/ TEST(compress, compressWithUnknownMethod) { ASSERT_THROW(compress("invalid-method", "something-to-compress"), UnknownCompressionMethod); } TEST(compress, noneMethodDoesNothingToTheInput) { auto o = compress("none", "this-is-a-test"); ASSERT_EQ(o, "this-is-a-test"); } TEST(decompress, decompressNoneCompressed) { auto method = "none"; auto str = "slfja;sljfklsa;jfklsjfkl;sdjfkl;sadjfkl;sdjf;lsdfjsadlf"; auto o = decompress(method, str); ASSERT_EQ(o, str); } TEST(decompress, decompressEmptyCompressed) { // Empty-method decompression used e.g. by S3 store // (Content-Encoding == ""). auto method = ""; auto str = "slfja;sljfklsa;jfklsjfkl;sdjfkl;sadjfkl;sdjf;lsdfjsadlf"; auto o = decompress(method, str); ASSERT_EQ(o, str); } TEST(decompress, decompressXzCompressed) { auto method = "xz"; auto str = "slfja;sljfklsa;jfklsjfkl;sdjfkl;sadjfkl;sdjf;lsdfjsadlf"; auto o = decompress(method, compress(method, str)); ASSERT_EQ(o, str); } TEST(decompress, decompressBzip2Compressed) { auto method = "bzip2"; auto str = "slfja;sljfklsa;jfklsjfkl;sdjfkl;sadjfkl;sdjf;lsdfjsadlf"; auto o = decompress(method, compress(method, str)); ASSERT_EQ(o, str); } TEST(decompress, decompressBrCompressed) { auto method = "br"; auto str = "slfja;sljfklsa;jfklsjfkl;sdjfkl;sadjfkl;sdjf;lsdfjsadlf"; auto o = decompress(method, compress(method, str)); ASSERT_EQ(o, str); } TEST(decompress, decompressInvalidInputThrowsCompressionError) { auto method = "bzip2"; auto str = "this is a string that does not qualify as valid bzip2 data"; ASSERT_THROW(decompress(method, str), CompressionError); } /* ---------------------------------------------------------------------------- * compression sinks * --------------------------------------------------------------------------*/ TEST(makeCompressionSink, noneSinkDoesNothingToInput) { StringSink strSink; auto inputString = "slfja;sljfklsa;jfklsjfkl;sdjfkl;sadjfkl;sdjf;lsdfjsadlf"; auto sink = makeCompressionSink("none", strSink); (*sink)(inputString); sink->finish(); ASSERT_STREQ(strSink.s.c_str(), inputString); } TEST(makeCompressionSink, compressAndDecompress) { StringSink strSink; auto inputString = "slfja;sljfklsa;jfklsjfkl;sdjfkl;sadjfkl;sdjf;lsdfjsadlf"; auto decompressionSink = makeDecompressionSink("bzip2", strSink); auto sink = makeCompressionSink("bzip2", *decompressionSink); (*sink)(inputString); sink->finish(); decompressionSink->finish(); ASSERT_STREQ(strSink.s.c_str(), inputString); } }
3,155
C++
.cc
72
36.319444
100
0.589735
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
true
false
false
true
false
false
10,952
strings.cc
NixOS_nix/src/libutil-tests/strings.cc
#include <gtest/gtest.h> #include <rapidcheck/gtest.h> #include "strings.hh" namespace nix { using Strings = std::vector<std::string>; /* ---------------------------------------------------------------------------- * concatStringsSep * --------------------------------------------------------------------------*/ TEST(concatStringsSep, empty) { Strings strings; ASSERT_EQ(concatStringsSep(",", strings), ""); } TEST(concatStringsSep, justOne) { Strings strings; strings.push_back("this"); ASSERT_EQ(concatStringsSep(",", strings), "this"); } TEST(concatStringsSep, emptyString) { Strings strings; strings.push_back(""); ASSERT_EQ(concatStringsSep(",", strings), ""); } TEST(concatStringsSep, emptyStrings) { Strings strings; strings.push_back(""); strings.push_back(""); ASSERT_EQ(concatStringsSep(",", strings), ","); } TEST(concatStringsSep, threeEmptyStrings) { Strings strings; strings.push_back(""); strings.push_back(""); strings.push_back(""); ASSERT_EQ(concatStringsSep(",", strings), ",,"); } TEST(concatStringsSep, buildCommaSeparatedString) { Strings strings; strings.push_back("this"); strings.push_back("is"); strings.push_back("great"); ASSERT_EQ(concatStringsSep(",", strings), "this,is,great"); } TEST(concatStringsSep, buildStringWithEmptySeparator) { Strings strings; strings.push_back("this"); strings.push_back("is"); strings.push_back("great"); ASSERT_EQ(concatStringsSep("", strings), "thisisgreat"); } TEST(concatStringsSep, buildSingleString) { Strings strings; strings.push_back("this"); ASSERT_EQ(concatStringsSep(",", strings), "this"); } /* ---------------------------------------------------------------------------- * dropEmptyInitThenConcatStringsSep * --------------------------------------------------------------------------*/ TEST(dropEmptyInitThenConcatStringsSep, empty) { Strings strings; ASSERT_EQ(dropEmptyInitThenConcatStringsSep(",", strings), ""); } TEST(dropEmptyInitThenConcatStringsSep, buildCommaSeparatedString) { Strings strings; strings.push_back("this"); strings.push_back("is"); strings.push_back("great"); ASSERT_EQ(dropEmptyInitThenConcatStringsSep(",", strings), "this,is,great"); } TEST(dropEmptyInitThenConcatStringsSep, buildStringWithEmptySeparator) { Strings strings; strings.push_back("this"); strings.push_back("is"); strings.push_back("great"); ASSERT_EQ(dropEmptyInitThenConcatStringsSep("", strings), "thisisgreat"); } TEST(dropEmptyInitThenConcatStringsSep, buildSingleString) { Strings strings; strings.push_back("this"); strings.push_back(""); ASSERT_EQ(dropEmptyInitThenConcatStringsSep(",", strings), "this,"); } TEST(dropEmptyInitThenConcatStringsSep, emptyStrings) { Strings strings; strings.push_back(""); strings.push_back(""); ASSERT_EQ(dropEmptyInitThenConcatStringsSep(",", strings), ""); } /* ---------------------------------------------------------------------------- * tokenizeString * --------------------------------------------------------------------------*/ TEST(tokenizeString, empty) { Strings expected = {}; ASSERT_EQ(tokenizeString<Strings>(""), expected); } TEST(tokenizeString, oneSep) { Strings expected = {}; ASSERT_EQ(tokenizeString<Strings>(" "), expected); } TEST(tokenizeString, twoSep) { Strings expected = {}; ASSERT_EQ(tokenizeString<Strings>(" \n"), expected); } TEST(tokenizeString, tokenizeSpacesWithDefaults) { auto s = "foo bar baz"; Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s), expected); } TEST(tokenizeString, tokenizeTabsWithDefaults) { auto s = "foo\tbar\tbaz"; Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s), expected); } TEST(tokenizeString, tokenizeTabsSpacesWithDefaults) { auto s = "foo\t bar\t baz"; Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s), expected); } TEST(tokenizeString, tokenizeTabsSpacesNewlineWithDefaults) { auto s = "foo\t\n bar\t\n baz"; Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s), expected); } TEST(tokenizeString, tokenizeTabsSpacesNewlineRetWithDefaults) { auto s = "foo\t\n\r bar\t\n\r baz"; Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s), expected); auto s2 = "foo \t\n\r bar \t\n\r baz"; Strings expected2 = {"foo", "bar", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s2), expected2); } TEST(tokenizeString, tokenizeWithCustomSep) { auto s = "foo\n,bar\n,baz\n"; Strings expected = {"foo\n", "bar\n", "baz\n"}; ASSERT_EQ(tokenizeString<Strings>(s, ","), expected); } TEST(tokenizeString, tokenizeSepAtStart) { auto s = ",foo,bar,baz"; Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s, ","), expected); } TEST(tokenizeString, tokenizeSepAtEnd) { auto s = "foo,bar,baz,"; Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s, ","), expected); } TEST(tokenizeString, tokenizeSepEmpty) { auto s = "foo,,baz"; Strings expected = {"foo", "baz"}; ASSERT_EQ(tokenizeString<Strings>(s, ","), expected); } /* ---------------------------------------------------------------------------- * splitString * --------------------------------------------------------------------------*/ TEST(splitString, empty) { Strings expected = {""}; ASSERT_EQ(splitString<Strings>("", " \t\n\r"), expected); } TEST(splitString, oneSep) { Strings expected = {"", ""}; ASSERT_EQ(splitString<Strings>(" ", " \t\n\r"), expected); } TEST(splitString, twoSep) { Strings expected = {"", "", ""}; ASSERT_EQ(splitString<Strings>(" \n", " \t\n\r"), expected); } TEST(splitString, tokenizeSpacesWithSpaces) { auto s = "foo bar baz"; Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(splitString<Strings>(s, " \t\n\r"), expected); } TEST(splitString, tokenizeTabsWithDefaults) { auto s = "foo\tbar\tbaz"; // Using it like this is weird, but shows the difference with tokenizeString, which also has this test Strings expected = {"foo", "bar", "baz"}; ASSERT_EQ(splitString<Strings>(s, " \t\n\r"), expected); } TEST(splitString, tokenizeTabsSpacesWithDefaults) { auto s = "foo\t bar\t baz"; // Using it like this is weird, but shows the difference with tokenizeString, which also has this test Strings expected = {"foo", "", "bar", "", "baz"}; ASSERT_EQ(splitString<Strings>(s, " \t\n\r"), expected); } TEST(splitString, tokenizeTabsSpacesNewlineWithDefaults) { auto s = "foo\t\n bar\t\n baz"; // Using it like this is weird, but shows the difference with tokenizeString, which also has this test Strings expected = {"foo", "", "", "bar", "", "", "baz"}; ASSERT_EQ(splitString<Strings>(s, " \t\n\r"), expected); } TEST(splitString, tokenizeTabsSpacesNewlineRetWithDefaults) { auto s = "foo\t\n\r bar\t\n\r baz"; // Using it like this is weird, but shows the difference with tokenizeString, which also has this test Strings expected = {"foo", "", "", "", "bar", "", "", "", "baz"}; ASSERT_EQ(splitString<Strings>(s, " \t\n\r"), expected); auto s2 = "foo \t\n\r bar \t\n\r baz"; Strings expected2 = {"foo", "", "", "", "", "bar", "", "", "", "", "baz"}; ASSERT_EQ(splitString<Strings>(s2, " \t\n\r"), expected2); } TEST(splitString, tokenizeWithCustomSep) { auto s = "foo\n,bar\n,baz\n"; Strings expected = {"foo\n", "bar\n", "baz\n"}; ASSERT_EQ(splitString<Strings>(s, ","), expected); } TEST(splitString, tokenizeSepAtStart) { auto s = ",foo,bar,baz"; Strings expected = {"", "foo", "bar", "baz"}; ASSERT_EQ(splitString<Strings>(s, ","), expected); } TEST(splitString, tokenizeSepAtEnd) { auto s = "foo,bar,baz,"; Strings expected = {"foo", "bar", "baz", ""}; ASSERT_EQ(splitString<Strings>(s, ","), expected); } TEST(splitString, tokenizeSepEmpty) { auto s = "foo,,baz"; Strings expected = {"foo", "", "baz"}; ASSERT_EQ(splitString<Strings>(s, ","), expected); } // concatStringsSep sep . splitString sep = id if sep is 1 char RC_GTEST_PROP(splitString, recoveredByConcatStringsSep, (const std::string & s)) { RC_ASSERT(concatStringsSep("/", splitString<Strings>(s, "/")) == s); RC_ASSERT(concatStringsSep("a", splitString<Strings>(s, "a")) == s); } } // namespace nix
8,596
C++
.cc
261
29.609195
106
0.625849
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,953
nix_api_util.cc
NixOS_nix/src/libutil-tests/nix_api_util.cc
#include "config-global.hh" #include "args.hh" #include "nix_api_util.h" #include "nix_api_util_internal.h" #include "tests/nix_api_util.hh" #include "tests/string_callback.hh" #include <gtest/gtest.h> #include <memory> namespace nixC { TEST_F(nix_api_util_context, nix_context_error) { std::string err_msg_ref; try { throw nix::Error("testing error"); } catch (nix::Error & e) { err_msg_ref = e.what(); nix_context_error(ctx); } ASSERT_EQ(ctx->last_err_code, NIX_ERR_NIX_ERROR); ASSERT_EQ(ctx->name, "nix::Error"); ASSERT_EQ(*ctx->last_err, err_msg_ref); ASSERT_EQ(ctx->info->msg.str(), "testing error"); try { throw std::runtime_error("testing exception"); } catch (std::exception & e) { err_msg_ref = e.what(); nix_context_error(ctx); } ASSERT_EQ(ctx->last_err_code, NIX_ERR_UNKNOWN); ASSERT_EQ(*ctx->last_err, err_msg_ref); nix_clear_err(ctx); ASSERT_EQ(ctx->last_err_code, NIX_OK); } TEST_F(nix_api_util_context, nix_set_err_msg) { ASSERT_EQ(ctx->last_err_code, NIX_OK); nix_set_err_msg(ctx, NIX_ERR_UNKNOWN, "unknown test error"); ASSERT_EQ(ctx->last_err_code, NIX_ERR_UNKNOWN); ASSERT_EQ(*ctx->last_err, "unknown test error"); } TEST(nix_api_util, nix_version_get) { ASSERT_EQ(std::string(nix_version_get()), PACKAGE_VERSION); } struct MySettings : nix::Config { nix::Setting<std::string> settingSet{this, "empty", "setting-name", "Description"}; }; MySettings mySettings; static nix::GlobalConfig::Register rs(&mySettings); static auto createOwnedNixContext() { return std::unique_ptr<nix_c_context, decltype([](nix_c_context * ctx) { if (ctx) nix_c_context_free(ctx); })>(nix_c_context_create(), {}); } TEST_F(nix_api_util_context, nix_setting_get) { ASSERT_EQ(ctx->last_err_code, NIX_OK); std::string setting_value; nix_err result = nix_setting_get(ctx, "invalid-key", OBSERVE_STRING(setting_value)); ASSERT_EQ(result, NIX_ERR_KEY); result = nix_setting_get(ctx, "setting-name", OBSERVE_STRING(setting_value)); ASSERT_EQ(result, NIX_OK); ASSERT_STREQ("empty", setting_value.c_str()); } TEST_F(nix_api_util_context, nix_setting_set) { nix_err result = nix_setting_set(ctx, "invalid-key", "new-value"); ASSERT_EQ(result, NIX_ERR_KEY); result = nix_setting_set(ctx, "setting-name", "new-value"); ASSERT_EQ(result, NIX_OK); std::string setting_value; result = nix_setting_get(ctx, "setting-name", OBSERVE_STRING(setting_value)); ASSERT_EQ(result, NIX_OK); ASSERT_STREQ("new-value", setting_value.c_str()); } TEST_F(nix_api_util_context, nix_err_msg) { // no error EXPECT_THROW(nix_err_msg(nullptr, ctx, NULL), nix::Error); // set error nix_set_err_msg(ctx, NIX_ERR_UNKNOWN, "unknown test error"); // basic usage std::string err_msg = nix_err_msg(NULL, ctx, NULL); ASSERT_EQ(err_msg, "unknown test error"); // advanced usage unsigned int sz; auto new_ctx = createOwnedNixContext(); err_msg = nix_err_msg(new_ctx.get(), ctx, &sz); ASSERT_EQ(sz, err_msg.size()); } TEST_F(nix_api_util_context, nix_err_info_msg) { std::string err_info; // no error EXPECT_THROW(nix_err_info_msg(NULL, ctx, OBSERVE_STRING(err_info)), nix::Error); try { throw nix::Error("testing error"); } catch (...) { nix_context_error(ctx); } auto new_ctx = createOwnedNixContext(); nix_err_info_msg(new_ctx.get(), ctx, OBSERVE_STRING(err_info)); ASSERT_STREQ("testing error", err_info.c_str()); } TEST_F(nix_api_util_context, nix_err_name) { std::string err_name; // no error EXPECT_THROW(nix_err_name(NULL, ctx, OBSERVE_STRING(err_name)), nix::Error); std::string err_msg_ref; try { throw nix::Error("testing error"); } catch (...) { nix_context_error(ctx); } auto new_ctx = createOwnedNixContext(); nix_err_name(new_ctx.get(), ctx, OBSERVE_STRING(err_name)); ASSERT_EQ(std::string(err_name), "nix::Error"); } TEST_F(nix_api_util_context, nix_err_code) { ASSERT_EQ(nix_err_code(ctx), NIX_OK); nix_set_err_msg(ctx, NIX_ERR_UNKNOWN, "unknown test error"); ASSERT_EQ(nix_err_code(ctx), NIX_ERR_UNKNOWN); } }
4,364
C++
.cc
129
29.069767
88
0.645115
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,954
suggestions.cc
NixOS_nix/src/libutil-tests/suggestions.cc
#include "suggestions.hh" #include <gtest/gtest.h> namespace nix { struct LevenshteinDistanceParam { std::string s1, s2; int distance; }; class LevenshteinDistanceTest : public testing::TestWithParam<LevenshteinDistanceParam> { }; TEST_P(LevenshteinDistanceTest, CorrectlyComputed) { auto params = GetParam(); ASSERT_EQ(levenshteinDistance(params.s1, params.s2), params.distance); ASSERT_EQ(levenshteinDistance(params.s2, params.s1), params.distance); } INSTANTIATE_TEST_SUITE_P(LevenshteinDistance, LevenshteinDistanceTest, testing::Values( LevenshteinDistanceParam{"foo", "foo", 0}, LevenshteinDistanceParam{"foo", "", 3}, LevenshteinDistanceParam{"", "", 0}, LevenshteinDistanceParam{"foo", "fo", 1}, LevenshteinDistanceParam{"foo", "oo", 1}, LevenshteinDistanceParam{"foo", "fao", 1}, LevenshteinDistanceParam{"foo", "abc", 3} ) ); TEST(Suggestions, Trim) { auto suggestions = Suggestions::bestMatches({"foooo", "bar", "fo", "gao"}, "foo"); auto onlyOne = suggestions.trim(1); ASSERT_EQ(onlyOne.suggestions.size(), 1); ASSERT_TRUE(onlyOne.suggestions.begin()->suggestion == "fo"); auto closest = suggestions.trim(999, 2); ASSERT_EQ(closest.suggestions.size(), 3); } }
1,452
C++
.cc
35
32.485714
90
0.622427
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
true
false
false
true
false
false
10,955
args.cc
NixOS_nix/src/libutil-tests/args.cc
#include "args.hh" #include "fs-sink.hh" #include <list> #include <gtest/gtest.h> #include <rapidcheck/gtest.h> namespace nix { TEST(parseShebangContent, basic) { std::list<std::string> r = parseShebangContent("hi there"); ASSERT_EQ(r.size(), 2); auto i = r.begin(); ASSERT_EQ(*i++, "hi"); ASSERT_EQ(*i++, "there"); } TEST(parseShebangContent, empty) { std::list<std::string> r = parseShebangContent(""); ASSERT_EQ(r.size(), 0); } TEST(parseShebangContent, doubleBacktick) { std::list<std::string> r = parseShebangContent("``\"ain't that nice\"``"); ASSERT_EQ(r.size(), 1); auto i = r.begin(); ASSERT_EQ(*i++, "\"ain't that nice\""); } TEST(parseShebangContent, doubleBacktickEmpty) { std::list<std::string> r = parseShebangContent("````"); ASSERT_EQ(r.size(), 1); auto i = r.begin(); ASSERT_EQ(*i++, ""); } TEST(parseShebangContent, doubleBacktickMarkdownInlineCode) { std::list<std::string> r = parseShebangContent("``# I'm markdown section about `coolFunction` ``"); ASSERT_EQ(r.size(), 1); auto i = r.begin(); ASSERT_EQ(*i++, "# I'm markdown section about `coolFunction`"); } TEST(parseShebangContent, doubleBacktickMarkdownCodeBlockNaive) { std::list<std::string> r = parseShebangContent("``Example 1\n```nix\na: a\n``` ``"); auto i = r.begin(); ASSERT_EQ(r.size(), 1); ASSERT_EQ(*i++, "Example 1\n``nix\na: a\n``"); } TEST(parseShebangContent, doubleBacktickMarkdownCodeBlockCorrect) { std::list<std::string> r = parseShebangContent("``Example 1\n````nix\na: a\n```` ``"); auto i = r.begin(); ASSERT_EQ(r.size(), 1); ASSERT_EQ(*i++, "Example 1\n```nix\na: a\n```"); } TEST(parseShebangContent, doubleBacktickMarkdownCodeBlock2) { std::list<std::string> r = parseShebangContent("``Example 1\n````nix\na: a\n````\nExample 2\n````nix\na: a\n```` ``"); auto i = r.begin(); ASSERT_EQ(r.size(), 1); ASSERT_EQ(*i++, "Example 1\n```nix\na: a\n```\nExample 2\n```nix\na: a\n```"); } TEST(parseShebangContent, singleBacktickInDoubleBacktickQuotes) { std::list<std::string> r = parseShebangContent("``` ``"); auto i = r.begin(); ASSERT_EQ(r.size(), 1); ASSERT_EQ(*i++, "`"); } TEST(parseShebangContent, singleBacktickAndSpaceInDoubleBacktickQuotes) { std::list<std::string> r = parseShebangContent("``` ``"); auto i = r.begin(); ASSERT_EQ(r.size(), 1); ASSERT_EQ(*i++, "` "); } TEST(parseShebangContent, doubleBacktickInDoubleBacktickQuotes) { std::list<std::string> r = parseShebangContent("````` ``"); auto i = r.begin(); ASSERT_EQ(r.size(), 1); ASSERT_EQ(*i++, "``"); } TEST(parseShebangContent, increasingQuotes) { std::list<std::string> r = parseShebangContent("```` ``` `` ````` `` `````` ``"); auto i = r.begin(); ASSERT_EQ(r.size(), 4); ASSERT_EQ(*i++, ""); ASSERT_EQ(*i++, "`"); ASSERT_EQ(*i++, "``"); ASSERT_EQ(*i++, "```"); } #ifndef COVERAGE // quick and dirty static inline std::string escape(std::string_view s_) { std::string_view s = s_; std::string r = "``"; // make a guess to allocate ahead of time r.reserve( // plain chars s.size() // quotes + 5 // some "escape" backticks + s.size() / 8); while (!s.empty()) { if (s[0] == '`' && s.size() >= 2 && s[1] == '`') { // escape it r += "`"; while (!s.empty() && s[0] == '`') { r += "`"; s = s.substr(1); } } else { r += s[0]; s = s.substr(1); } } if (!r.empty() && ( r[r.size() - 1] == '`' || r[r.size() - 1] == ' ' )) { r += " "; } r += "``"; return r; }; RC_GTEST_PROP( parseShebangContent, prop_round_trip_single, (const std::string & orig)) { auto escaped = escape(orig); // RC_LOG() << "escaped: <[[" << escaped << "]]>" << std::endl; auto ss = parseShebangContent(escaped); RC_ASSERT(ss.size() == 1); RC_ASSERT(*ss.begin() == orig); } RC_GTEST_PROP( parseShebangContent, prop_round_trip_two, (const std::string & one, const std::string & two)) { auto ss = parseShebangContent(escape(one) + " " + escape(two)); RC_ASSERT(ss.size() == 2); auto i = ss.begin(); RC_ASSERT(*i++ == one); RC_ASSERT(*i++ == two); } #endif }
4,736
C++
.cc
140
26.742857
126
0.52824
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,956
position.cc
NixOS_nix/src/libutil-tests/position.cc
#include <gtest/gtest.h> #include "position.hh" namespace nix { inline Pos::Origin makeStdin(std::string s) { return Pos::Stdin{make_ref<std::string>(s)}; } TEST(Position, getSnippetUpTo_0) { Pos::Origin o = makeStdin(""); Pos p(1, 1, o); ASSERT_EQ(p.getSnippetUpTo(p), ""); } TEST(Position, getSnippetUpTo_1) { Pos::Origin o = makeStdin("x"); { // NOTE: line and column are actually 1-based indexes Pos start(0, 0, o); Pos end(99, 99, o); ASSERT_EQ(start.getSnippetUpTo(start), ""); ASSERT_EQ(start.getSnippetUpTo(end), "x"); ASSERT_EQ(end.getSnippetUpTo(end), ""); ASSERT_EQ(end.getSnippetUpTo(start), std::nullopt); } { // NOTE: line and column are actually 1-based indexes Pos start(0, 99, o); Pos end(99, 0, o); ASSERT_EQ(start.getSnippetUpTo(start), ""); // "x" might be preferable, but we only care about not crashing for invalid inputs ASSERT_EQ(start.getSnippetUpTo(end), ""); ASSERT_EQ(end.getSnippetUpTo(end), ""); ASSERT_EQ(end.getSnippetUpTo(start), std::nullopt); } { Pos start(1, 1, o); Pos end(1, 99, o); ASSERT_EQ(start.getSnippetUpTo(start), ""); ASSERT_EQ(start.getSnippetUpTo(end), "x"); ASSERT_EQ(end.getSnippetUpTo(end), ""); ASSERT_EQ(end.getSnippetUpTo(start), ""); } { Pos start(1, 1, o); Pos end(99, 99, o); ASSERT_EQ(start.getSnippetUpTo(start), ""); ASSERT_EQ(start.getSnippetUpTo(end), "x"); ASSERT_EQ(end.getSnippetUpTo(end), ""); ASSERT_EQ(end.getSnippetUpTo(start), std::nullopt); } } TEST(Position, getSnippetUpTo_2) { Pos::Origin o = makeStdin("asdf\njkl\nqwer"); { Pos start(1, 1, o); Pos end(1, 2, o); ASSERT_EQ(start.getSnippetUpTo(start), ""); ASSERT_EQ(start.getSnippetUpTo(end), "a"); ASSERT_EQ(end.getSnippetUpTo(end), ""); // nullopt? I feel like changing the column handling would just make it more fragile ASSERT_EQ(end.getSnippetUpTo(start), ""); } { Pos start(1, 2, o); Pos end(1, 3, o); ASSERT_EQ(start.getSnippetUpTo(end), "s"); } { Pos start(1, 2, o); Pos end(2, 2, o); ASSERT_EQ(start.getSnippetUpTo(end), "sdf\nj"); } { Pos start(1, 2, o); Pos end(3, 2, o); ASSERT_EQ(start.getSnippetUpTo(end), "sdf\njkl\nq"); } { Pos start(1, 2, o); Pos end(2, 99, o); ASSERT_EQ(start.getSnippetUpTo(end), "sdf\njkl"); } { Pos start(1, 4, o); Pos end(2, 99, o); ASSERT_EQ(start.getSnippetUpTo(end), "f\njkl"); } { Pos start(1, 5, o); Pos end(2, 99, o); ASSERT_EQ(start.getSnippetUpTo(end), "\njkl"); } { Pos start(1, 6, o); // invalid: starting column past last "line character", ie at the newline Pos end(2, 99, o); ASSERT_EQ(start.getSnippetUpTo(end), "\njkl"); // jkl might be acceptable for this invalid start position } { Pos start(1, 1, o); Pos end(2, 0, o); // invalid ASSERT_EQ(start.getSnippetUpTo(end), "asdf\n"); } } TEST(Position, example_1) { Pos::Origin o = makeStdin(" unambiguous = \n /** Very close */\n x: x;\n# ok\n"); Pos start(2, 5, o); Pos end(2, 22, o); ASSERT_EQ(start.getSnippetUpTo(end), "/** Very close */"); } } // namespace nix
3,517
C++
.cc
113
24.663717
113
0.571723
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,957
hilite.cc
NixOS_nix/src/libutil-tests/hilite.cc
#include "hilite.hh" #include <gtest/gtest.h> namespace nix { /* ----------- tests for fmt.hh -------------------------------------------------*/ TEST(hiliteMatches, noHighlight) { ASSERT_STREQ(hiliteMatches("Hello, world!", std::vector<std::smatch>(), "(", ")").c_str(), "Hello, world!"); } TEST(hiliteMatches, simpleHighlight) { std::string str = "Hello, world!"; std::regex re = std::regex("world"); auto matches = std::vector(std::sregex_iterator(str.begin(), str.end(), re), std::sregex_iterator()); ASSERT_STREQ( hiliteMatches(str, matches, "(", ")").c_str(), "Hello, (world)!" ); } TEST(hiliteMatches, multipleMatches) { std::string str = "Hello, world, world, world, world, world, world, Hello!"; std::regex re = std::regex("world"); auto matches = std::vector(std::sregex_iterator(str.begin(), str.end(), re), std::sregex_iterator()); ASSERT_STREQ( hiliteMatches(str, matches, "(", ")").c_str(), "Hello, (world), (world), (world), (world), (world), (world), Hello!" ); } TEST(hiliteMatches, overlappingMatches) { std::string str = "world, Hello, world, Hello, world, Hello, world, Hello, world!"; std::regex re = std::regex("Hello, world"); std::regex re2 = std::regex("world, Hello"); auto v = std::vector(std::sregex_iterator(str.begin(), str.end(), re), std::sregex_iterator()); for(auto it = std::sregex_iterator(str.begin(), str.end(), re2); it != std::sregex_iterator(); ++it) { v.push_back(*it); } ASSERT_STREQ( hiliteMatches(str, v, "(", ")").c_str(), "(world, Hello, world, Hello, world, Hello, world, Hello, world)!" ); } TEST(hiliteMatches, complexOverlappingMatches) { std::string str = "legacyPackages.x86_64-linux.git-crypt"; std::vector regexes = { std::regex("t-cry"), std::regex("ux\\.git-cry"), std::regex("git-c"), std::regex("pt"), }; std::vector<std::smatch> matches; for(auto regex : regexes) { for(auto it = std::sregex_iterator(str.begin(), str.end(), regex); it != std::sregex_iterator(); ++it) { matches.push_back(*it); } } ASSERT_STREQ( hiliteMatches(str, matches, "(", ")").c_str(), "legacyPackages.x86_64-lin(ux.git-crypt)" ); } }
2,600
C++
.cc
59
34.067797
116
0.519337
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,958
file-system.cc
NixOS_nix/src/libutil-tests/file-system.cc
#include "util.hh" #include "types.hh" #include "file-system.hh" #include "processes.hh" #include "terminal.hh" #include "strings.hh" #include <limits.h> #include <gtest/gtest.h> #include <rapidcheck/gtest.h> #include <numeric> #ifdef _WIN32 # define FS_SEP L"\\" # define FS_ROOT L"C:" FS_SEP // Need a mounted one, C drive is likely #else # define FS_SEP "/" # define FS_ROOT FS_SEP #endif #ifndef PATH_MAX # define PATH_MAX 4096 #endif #ifdef _WIN32 # define GET_CWD _wgetcwd #else # define GET_CWD getcwd #endif namespace nix { /* ----------- tests for file-system.hh -------------------------------------*/ /* ---------------------------------------------------------------------------- * absPath * --------------------------------------------------------------------------*/ TEST(absPath, doesntChangeRoot) { auto p = absPath(std::filesystem::path{FS_ROOT}); ASSERT_EQ(p, FS_ROOT); } TEST(absPath, turnsEmptyPathIntoCWD) { OsChar cwd[PATH_MAX + 1]; auto p = absPath(std::filesystem::path{""}); ASSERT_EQ(p, GET_CWD((OsChar *) &cwd, PATH_MAX)); } TEST(absPath, usesOptionalBasePathWhenGiven) { OsChar _cwd[PATH_MAX + 1]; OsChar * cwd = GET_CWD((OsChar *) &_cwd, PATH_MAX); auto p = absPath(std::filesystem::path{""}.string(), std::filesystem::path{cwd}.string()); ASSERT_EQ(p, std::filesystem::path{cwd}.string()); } TEST(absPath, isIdempotent) { OsChar _cwd[PATH_MAX + 1]; OsChar * cwd = GET_CWD((OsChar *) &_cwd, PATH_MAX); auto p1 = absPath(std::filesystem::path{cwd}); auto p2 = absPath(p1); ASSERT_EQ(p1, p2); } TEST(absPath, pathIsCanonicalised) { auto path = FS_ROOT OS_STR("some/path/with/trailing/dot/."); auto p1 = absPath(std::filesystem::path{path}); auto p2 = absPath(p1); ASSERT_EQ(p1, FS_ROOT "some" FS_SEP "path" FS_SEP "with" FS_SEP "trailing" FS_SEP "dot"); ASSERT_EQ(p1, p2); } /* ---------------------------------------------------------------------------- * canonPath * --------------------------------------------------------------------------*/ TEST(canonPath, removesTrailingSlashes) { std::filesystem::path path = FS_ROOT "this/is/a/path//"; auto p = canonPath(path.string()); ASSERT_EQ(p, std::filesystem::path{FS_ROOT "this" FS_SEP "is" FS_SEP "a" FS_SEP "path"}.string()); } TEST(canonPath, removesDots) { std::filesystem::path path = FS_ROOT "this/./is/a/path/./"; auto p = canonPath(path.string()); ASSERT_EQ(p, std::filesystem::path{FS_ROOT "this" FS_SEP "is" FS_SEP "a" FS_SEP "path"}.string()); } TEST(canonPath, removesDots2) { std::filesystem::path path = FS_ROOT "this/a/../is/a////path/foo/.."; auto p = canonPath(path.string()); ASSERT_EQ(p, std::filesystem::path{FS_ROOT "this" FS_SEP "is" FS_SEP "a" FS_SEP "path"}.string()); } TEST(canonPath, requiresAbsolutePath) { ASSERT_ANY_THROW(canonPath(".")); ASSERT_ANY_THROW(canonPath("..")); ASSERT_ANY_THROW(canonPath("../")); ASSERT_DEATH({ canonPath(""); }, "path != \"\""); } /* ---------------------------------------------------------------------------- * dirOf * --------------------------------------------------------------------------*/ TEST(dirOf, returnsEmptyStringForRoot) { auto p = dirOf("/"); ASSERT_EQ(p, "/"); } TEST(dirOf, returnsFirstPathComponent) { auto p1 = dirOf("/dir/"); ASSERT_EQ(p1, "/dir"); auto p2 = dirOf("/dir"); ASSERT_EQ(p2, "/"); auto p3 = dirOf("/dir/.."); ASSERT_EQ(p3, "/dir"); auto p4 = dirOf("/dir/../"); ASSERT_EQ(p4, "/dir/.."); } /* ---------------------------------------------------------------------------- * baseNameOf * --------------------------------------------------------------------------*/ TEST(baseNameOf, emptyPath) { auto p1 = baseNameOf(""); ASSERT_EQ(p1, ""); } TEST(baseNameOf, pathOnRoot) { auto p1 = baseNameOf("/dir"); ASSERT_EQ(p1, "dir"); } TEST(baseNameOf, relativePath) { auto p1 = baseNameOf("dir/foo"); ASSERT_EQ(p1, "foo"); } TEST(baseNameOf, pathWithTrailingSlashRoot) { auto p1 = baseNameOf("/"); ASSERT_EQ(p1, ""); } TEST(baseNameOf, trailingSlash) { auto p1 = baseNameOf("/dir/"); ASSERT_EQ(p1, "dir"); } TEST(baseNameOf, trailingSlashes) { auto p1 = baseNameOf("/dir//"); ASSERT_EQ(p1, "dir"); } TEST(baseNameOf, absoluteNothingSlashNothing) { auto p1 = baseNameOf("//"); ASSERT_EQ(p1, ""); } /* ---------------------------------------------------------------------------- * isInDir * --------------------------------------------------------------------------*/ TEST(isInDir, trivialCase) { auto p1 = isInDir("/foo/bar", "/foo"); ASSERT_EQ(p1, true); } TEST(isInDir, notInDir) { auto p1 = isInDir("/zes/foo/bar", "/foo"); ASSERT_EQ(p1, false); } // XXX: hm, bug or feature? :) Looking at the implementation // this might be problematic. TEST(isInDir, emptyDir) { auto p1 = isInDir("/zes/foo/bar", ""); ASSERT_EQ(p1, true); } /* ---------------------------------------------------------------------------- * isDirOrInDir * --------------------------------------------------------------------------*/ TEST(isDirOrInDir, trueForSameDirectory) { ASSERT_EQ(isDirOrInDir("/nix", "/nix"), true); ASSERT_EQ(isDirOrInDir("/", "/"), true); } TEST(isDirOrInDir, trueForEmptyPaths) { ASSERT_EQ(isDirOrInDir("", ""), true); } TEST(isDirOrInDir, falseForDisjunctPaths) { ASSERT_EQ(isDirOrInDir("/foo", "/bar"), false); } TEST(isDirOrInDir, relativePaths) { ASSERT_EQ(isDirOrInDir("/foo/..", "/foo"), true); } // XXX: while it is possible to use "." or ".." in the // first argument this doesn't seem to work in the second. TEST(isDirOrInDir, DISABLED_shouldWork) { ASSERT_EQ(isDirOrInDir("/foo/..", "/foo/."), true); } /* ---------------------------------------------------------------------------- * pathExists * --------------------------------------------------------------------------*/ TEST(pathExists, rootExists) { ASSERT_TRUE(pathExists(std::filesystem::path{FS_ROOT}.string())); } TEST(pathExists, cwdExists) { ASSERT_TRUE(pathExists(".")); } TEST(pathExists, bogusPathDoesNotExist) { ASSERT_FALSE(pathExists("/schnitzel/darmstadt/pommes")); } }
6,265
C++
.cc
211
27.028436
102
0.532911
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,959
file-content-address.cc
NixOS_nix/src/libutil-tests/file-content-address.cc
#include <gtest/gtest.h> #include "file-content-address.hh" namespace nix { /* ---------------------------------------------------------------------------- * parseFileSerialisationMethod, renderFileSerialisationMethod * --------------------------------------------------------------------------*/ TEST(FileSerialisationMethod, testRoundTripPrintParse_1) { for (const FileSerialisationMethod fim : { FileSerialisationMethod::Flat, FileSerialisationMethod::NixArchive, }) { EXPECT_EQ(parseFileSerialisationMethod(renderFileSerialisationMethod(fim)), fim); } } TEST(FileSerialisationMethod, testRoundTripPrintParse_2) { for (const std::string_view fimS : { "flat", "nar", }) { EXPECT_EQ(renderFileSerialisationMethod(parseFileSerialisationMethod(fimS)), fimS); } } TEST(FileSerialisationMethod, testParseFileSerialisationMethodOptException) { EXPECT_THROW(parseFileSerialisationMethod("narwhal"), UsageError); } /* ---------------------------------------------------------------------------- * parseFileIngestionMethod, renderFileIngestionMethod * --------------------------------------------------------------------------*/ TEST(FileIngestionMethod, testRoundTripPrintParse_1) { for (const FileIngestionMethod fim : { FileIngestionMethod::Flat, FileIngestionMethod::NixArchive, FileIngestionMethod::Git, }) { EXPECT_EQ(parseFileIngestionMethod(renderFileIngestionMethod(fim)), fim); } } TEST(FileIngestionMethod, testRoundTripPrintParse_2) { for (const std::string_view fimS : { "flat", "nar", "git", }) { EXPECT_EQ(renderFileIngestionMethod(parseFileIngestionMethod(fimS)), fimS); } } TEST(FileIngestionMethod, testParseFileIngestionMethodOptException) { EXPECT_THROW(parseFileIngestionMethod("narwhal"), UsageError); } }
1,904
C++
.cc
50
33.42
91
0.617472
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,960
nix-instantiate.cc
NixOS_nix/src/nix-instantiate/nix-instantiate.cc
#include "globals.hh" #include "print-ambiguous.hh" #include "shared.hh" #include "eval.hh" #include "eval-inline.hh" #include "get-drvs.hh" #include "attr-path.hh" #include "signals.hh" #include "value-to-xml.hh" #include "value-to-json.hh" #include "store-api.hh" #include "local-fs-store.hh" #include "common-eval-args.hh" #include "legacy.hh" #include <map> #include <iostream> using namespace nix; static Path gcRoot; static int rootNr = 0; enum OutputKind { okPlain, okXML, okJSON }; void processExpr(EvalState & state, const Strings & attrPaths, bool parseOnly, bool strict, Bindings & autoArgs, bool evalOnly, OutputKind output, bool location, Expr * e) { if (parseOnly) { e->show(state.symbols, std::cout); std::cout << "\n"; return; } Value vRoot; state.eval(e, vRoot); for (auto & i : attrPaths) { Value & v(*findAlongAttrPath(state, i, autoArgs, vRoot).first); state.forceValue(v, v.determinePos(noPos)); NixStringContext context; if (evalOnly) { Value vRes; if (autoArgs.empty()) vRes = v; else state.autoCallFunction(autoArgs, v, vRes); if (output == okXML) printValueAsXML(state, strict, location, vRes, std::cout, context, noPos); else if (output == okJSON) { printValueAsJSON(state, strict, vRes, v.determinePos(noPos), std::cout, context); std::cout << std::endl; } else { if (strict) state.forceValueDeep(vRes); std::set<const void *> seen; printAmbiguous(vRes, state.symbols, std::cout, &seen, std::numeric_limits<int>::max()); std::cout << std::endl; } } else { PackageInfos drvs; getDerivations(state, v, "", autoArgs, drvs, false); for (auto & i : drvs) { auto drvPath = i.requireDrvPath(); auto drvPathS = state.store->printStorePath(drvPath); /* What output do we want? */ std::string outputName = i.queryOutputName(); if (outputName == "") throw Error("derivation '%1%' lacks an 'outputName' attribute", drvPathS); if (gcRoot == "") printGCWarning(); else { Path rootName = absPath(gcRoot); if (++rootNr > 1) rootName += "-" + std::to_string(rootNr); auto store2 = state.store.dynamic_pointer_cast<LocalFSStore>(); if (store2) drvPathS = store2->addPermRoot(drvPath, rootName); } std::cout << fmt("%s%s\n", drvPathS, (outputName != "out" ? "!" + outputName : "")); } } } } static int main_nix_instantiate(int argc, char * * argv) { { Strings files; bool readStdin = false; bool fromArgs = false; bool findFile = false; bool evalOnly = false; bool parseOnly = false; OutputKind outputKind = okPlain; bool xmlOutputSourceLocation = true; bool strict = false; Strings attrPaths; bool wantsReadWrite = false; struct MyArgs : LegacyArgs, MixEvalArgs { using LegacyArgs::LegacyArgs; }; MyArgs myArgs(std::string(baseNameOf(argv[0])), [&](Strings::iterator & arg, const Strings::iterator & end) { if (*arg == "--help") showManPage("nix-instantiate"); else if (*arg == "--version") printVersion("nix-instantiate"); else if (*arg == "-") readStdin = true; else if (*arg == "--expr" || *arg == "-E") fromArgs = true; else if (*arg == "--eval" || *arg == "--eval-only") evalOnly = true; else if (*arg == "--read-write-mode") wantsReadWrite = true; else if (*arg == "--parse" || *arg == "--parse-only") parseOnly = evalOnly = true; else if (*arg == "--find-file") findFile = true; else if (*arg == "--attr" || *arg == "-A") attrPaths.push_back(getArg(*arg, arg, end)); else if (*arg == "--add-root") gcRoot = getArg(*arg, arg, end); else if (*arg == "--indirect") ; else if (*arg == "--xml") outputKind = okXML; else if (*arg == "--json") outputKind = okJSON; else if (*arg == "--no-location") xmlOutputSourceLocation = false; else if (*arg == "--strict") strict = true; else if (*arg == "--dry-run") settings.readOnlyMode = true; else if (*arg != "" && arg->at(0) == '-') return false; else files.push_back(*arg); return true; }); myArgs.parseCmdline(argvToStrings(argc, argv)); if (evalOnly && !wantsReadWrite) settings.readOnlyMode = true; auto store = openStore(); auto evalStore = myArgs.evalStoreUrl ? openStore(*myArgs.evalStoreUrl) : store; auto state = std::make_unique<EvalState>(myArgs.lookupPath, evalStore, fetchSettings, evalSettings, store); state->repair = myArgs.repair; Bindings & autoArgs = *myArgs.getAutoArgs(*state); if (attrPaths.empty()) attrPaths = {""}; if (findFile) { for (auto & i : files) { auto p = state->findFile(i); if (auto fn = p.getPhysicalPath()) std::cout << fn->string() << std::endl; else throw Error("'%s' has no physical path", p); } return 0; } if (readStdin) { Expr * e = state->parseStdin(); processExpr(*state, attrPaths, parseOnly, strict, autoArgs, evalOnly, outputKind, xmlOutputSourceLocation, e); } else if (files.empty() && !fromArgs) files.push_back("./default.nix"); for (auto & i : files) { Expr * e = fromArgs ? state->parseExprFromString(i, state->rootPath(".")) : state->parseExprFromFile(resolveExprPath(lookupFileArg(*state, i))); processExpr(*state, attrPaths, parseOnly, strict, autoArgs, evalOnly, outputKind, xmlOutputSourceLocation, e); } state->maybePrintStats(); return 0; } } static RegisterLegacyCommand r_nix_instantiate("nix-instantiate", main_nix_instantiate);
6,797
C++
.cc
170
28.694118
117
0.527887
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,961
nix-collect-garbage.cc
NixOS_nix/src/nix-collect-garbage/nix-collect-garbage.cc
#include "file-system.hh" #include "signals.hh" #include "store-api.hh" #include "store-cast.hh" #include "gc-store.hh" #include "profiles.hh" #include "shared.hh" #include "globals.hh" #include "legacy.hh" #include <iostream> #include <cerrno> namespace nix::fs { using namespace std::filesystem; } using namespace nix; std::string deleteOlderThan; bool dryRun = false; /* If `-d' was specified, remove all old generations of all profiles. * Of course, this makes rollbacks to before this point in time * impossible. */ void removeOldGenerations(fs::path dir) { if (access(dir.string().c_str(), R_OK) != 0) return; bool canWrite = access(dir.string().c_str(), W_OK) == 0; for (auto & i : fs::directory_iterator{dir}) { checkInterrupt(); auto path = i.path().string(); auto type = i.symlink_status().type(); if (type == fs::file_type::symlink && canWrite) { std::string link; try { link = readLink(path); } catch (fs::filesystem_error & e) { if (e.code() == std::errc::no_such_file_or_directory) continue; throw; } if (link.find("link") != std::string::npos) { printInfo("removing old generations of profile %s", path); if (deleteOlderThan != "") { auto t = parseOlderThanTimeSpec(deleteOlderThan); deleteGenerationsOlderThan(path, t, dryRun); } else deleteOldGenerations(path, dryRun); } } else if (type == fs::file_type::directory) { removeOldGenerations(path); } } } static int main_nix_collect_garbage(int argc, char * * argv) { { bool removeOld = false; GCOptions options; parseCmdLine(argc, argv, [&](Strings::iterator & arg, const Strings::iterator & end) { if (*arg == "--help") showManPage("nix-collect-garbage"); else if (*arg == "--version") printVersion("nix-collect-garbage"); else if (*arg == "--delete-old" || *arg == "-d") removeOld = true; else if (*arg == "--delete-older-than") { removeOld = true; deleteOlderThan = getArg(*arg, arg, end); } else if (*arg == "--dry-run") dryRun = true; else if (*arg == "--max-freed") options.maxFreed = std::max(getIntArg<int64_t>(*arg, arg, end, true), (int64_t) 0); else return false; return true; }); if (removeOld) { std::set<fs::path> dirsToClean = { profilesDir(), fs::path{settings.nixStateDir} / "profiles", fs::path{getDefaultProfile()}.parent_path(), }; for (auto & dir : dirsToClean) removeOldGenerations(dir); } // Run the actual garbage collector. if (!dryRun) { auto store = openStore(); auto & gcStore = require<GcStore>(*store); options.action = GCOptions::gcDeleteDead; GCResults results; PrintFreed freed(true, results); gcStore.collectGarbage(options, results); } return 0; } } static RegisterLegacyCommand r_nix_collect_garbage("nix-collect-garbage", main_nix_collect_garbage);
3,440
C++
.cc
91
28.142857
100
0.554788
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,962
tracing-file-system-object-sink.cc
NixOS_nix/src/libutil-test-support/tests/tracing-file-system-object-sink.cc
#include <iostream> #include "tracing-file-system-object-sink.hh" namespace nix::test { void TracingFileSystemObjectSink::createDirectory(const CanonPath & path) { std::cerr << "createDirectory(" << path << ")\n"; sink.createDirectory(path); } void TracingFileSystemObjectSink::createRegularFile( const CanonPath & path, std::function<void(CreateRegularFileSink &)> fn) { std::cerr << "createRegularFile(" << path << ")\n"; sink.createRegularFile(path, [&](CreateRegularFileSink & crf) { // We could wrap this and trace about the chunks of data and such fn(crf); }); } void TracingFileSystemObjectSink::createSymlink(const CanonPath & path, const std::string & target) { std::cerr << "createSymlink(" << path << ", target: " << target << ")\n"; sink.createSymlink(path, target); } void TracingExtendedFileSystemObjectSink::createHardlink(const CanonPath & path, const CanonPath & target) { std::cerr << "createHardlink(" << path << ", target: " << target << ")\n"; sink.createHardlink(path, target); } } // namespace nix::test
1,089
C++
.cc
28
35.678571
106
0.698578
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,963
string_callback.cc
NixOS_nix/src/libutil-test-support/tests/string_callback.cc
#include "string_callback.hh" namespace nix::testing { void observe_string_cb(const char * start, unsigned int n, void * user_data) { auto user_data_casted = reinterpret_cast<std::string *>(user_data); *user_data_casted = std::string(start); } }
257
C++
.cc
8
29.75
76
0.719512
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,964
hash.cc
NixOS_nix/src/libutil-test-support/tests/hash.cc
#include <regex> #include <rapidcheck.h> #include "hash.hh" #include "tests/hash.hh" namespace rc { using namespace nix; Gen<Hash> Arbitrary<Hash>::arbitrary() { Hash prototype(HashAlgorithm::SHA1); return gen::apply( [](const std::vector<uint8_t> & v) { Hash hash(HashAlgorithm::SHA1); assert(v.size() == hash.hashSize); std::copy(v.begin(), v.end(), hash.hash); return hash; }, gen::container<std::vector<uint8_t>>(prototype.hashSize, gen::arbitrary<uint8_t>()) ); } }
601
C++
.cc
21
21.428571
95
0.571429
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,965
installable-flake.cc
NixOS_nix/src/libcmd/installable-flake.cc
#include "globals.hh" #include "installable-flake.hh" #include "installable-derived-path.hh" #include "outputs-spec.hh" #include "util.hh" #include "command.hh" #include "attr-path.hh" #include "common-eval-args.hh" #include "derivations.hh" #include "eval-inline.hh" #include "eval.hh" #include "get-drvs.hh" #include "store-api.hh" #include "shared.hh" #include "flake/flake.hh" #include "eval-cache.hh" #include "url.hh" #include "registry.hh" #include "build-result.hh" #include <regex> #include <queue> #include <nlohmann/json.hpp> namespace nix { std::vector<std::string> InstallableFlake::getActualAttrPaths() { std::vector<std::string> res; if (attrPaths.size() == 1 && attrPaths.front().starts_with(".")){ attrPaths.front().erase(0,1); res.push_back(attrPaths.front()); return res; } for (auto & prefix : prefixes) res.push_back(prefix + *attrPaths.begin()); for (auto & s : attrPaths) res.push_back(s); return res; } static std::string showAttrPaths(const std::vector<std::string> & paths) { std::string s; for (const auto & [n, i] : enumerate(paths)) { if (n > 0) s += n + 1 == paths.size() ? " or " : ", "; s += '\''; s += i; s += '\''; } return s; } InstallableFlake::InstallableFlake( SourceExprCommand * cmd, ref<EvalState> state, FlakeRef && flakeRef, std::string_view fragment, ExtendedOutputsSpec extendedOutputsSpec, Strings attrPaths, Strings prefixes, const flake::LockFlags & lockFlags) : InstallableValue(state), flakeRef(flakeRef), attrPaths(fragment == "" ? attrPaths : Strings{(std::string) fragment}), prefixes(fragment == "" ? Strings{} : prefixes), extendedOutputsSpec(std::move(extendedOutputsSpec)), lockFlags(lockFlags) { if (cmd && cmd->getAutoArgs(*state)->size()) throw UsageError("'--arg' and '--argstr' are incompatible with flakes"); } DerivedPathsWithInfo InstallableFlake::toDerivedPaths() { Activity act(*logger, lvlTalkative, actUnknown, fmt("evaluating derivation '%s'", what())); auto attr = getCursor(*state); auto attrPath = attr->getAttrPathStr(); if (!attr->isDerivation()) { // FIXME: use eval cache? auto v = attr->forceValue(); if (std::optional derivedPathWithInfo = trySinglePathToDerivedPaths( v, noPos, fmt("while evaluating the flake output attribute '%s'", attrPath))) { return { *derivedPathWithInfo }; } else { throw Error( "expected flake output attribute '%s' to be a derivation or path but found %s: %s", attrPath, showType(v), ValuePrinter(*this->state, v, errorPrintOptions) ); } } auto drvPath = attr->forceDerivation(); std::optional<NixInt::Inner> priority; if (attr->maybeGetAttr(state->sOutputSpecified)) { } else if (auto aMeta = attr->maybeGetAttr(state->sMeta)) { if (auto aPriority = aMeta->maybeGetAttr("priority")) priority = aPriority->getInt().value; } return {{ .path = DerivedPath::Built { .drvPath = makeConstantStorePathRef(std::move(drvPath)), .outputs = std::visit(overloaded { [&](const ExtendedOutputsSpec::Default & d) -> OutputsSpec { std::set<std::string> outputsToInstall; if (auto aOutputSpecified = attr->maybeGetAttr(state->sOutputSpecified)) { if (aOutputSpecified->getBool()) { if (auto aOutputName = attr->maybeGetAttr("outputName")) outputsToInstall = { aOutputName->getString() }; } } else if (auto aMeta = attr->maybeGetAttr(state->sMeta)) { if (auto aOutputsToInstall = aMeta->maybeGetAttr("outputsToInstall")) for (auto & s : aOutputsToInstall->getListOfStrings()) outputsToInstall.insert(s); } if (outputsToInstall.empty()) outputsToInstall.insert("out"); return OutputsSpec::Names { std::move(outputsToInstall) }; }, [&](const ExtendedOutputsSpec::Explicit & e) -> OutputsSpec { return e; }, }, extendedOutputsSpec.raw), }, .info = make_ref<ExtraPathInfoFlake>( ExtraPathInfoValue::Value { .priority = priority, .attrPath = attrPath, .extendedOutputsSpec = extendedOutputsSpec, }, ExtraPathInfoFlake::Flake { .originalRef = flakeRef, .lockedRef = getLockedFlake()->flake.lockedRef, }), }}; } std::pair<Value *, PosIdx> InstallableFlake::toValue(EvalState & state) { return {&getCursor(state)->forceValue(), noPos}; } std::vector<ref<eval_cache::AttrCursor>> InstallableFlake::getCursors(EvalState & state) { auto evalCache = openEvalCache(state, getLockedFlake()); auto root = evalCache->getRoot(); std::vector<ref<eval_cache::AttrCursor>> res; Suggestions suggestions; auto attrPaths = getActualAttrPaths(); for (auto & attrPath : attrPaths) { debug("trying flake output attribute '%s'", attrPath); auto attr = root->findAlongAttrPath(parseAttrPath(state, attrPath)); if (attr) { res.push_back(ref(*attr)); } else { suggestions += attr.getSuggestions(); } } if (res.size() == 0) throw Error( suggestions, "flake '%s' does not provide attribute %s", flakeRef, showAttrPaths(attrPaths)); return res; } std::shared_ptr<flake::LockedFlake> InstallableFlake::getLockedFlake() const { if (!_lockedFlake) { flake::LockFlags lockFlagsApplyConfig = lockFlags; // FIXME why this side effect? lockFlagsApplyConfig.applyNixConfig = true; _lockedFlake = std::make_shared<flake::LockedFlake>(lockFlake( flakeSettings, *state, flakeRef, lockFlagsApplyConfig)); } return _lockedFlake; } FlakeRef InstallableFlake::nixpkgsFlakeRef() const { auto lockedFlake = getLockedFlake(); if (auto nixpkgsInput = lockedFlake->lockFile.findInput({"nixpkgs"})) { if (auto lockedNode = std::dynamic_pointer_cast<const flake::LockedNode>(nixpkgsInput)) { debug("using nixpkgs flake '%s'", lockedNode->lockedRef); return std::move(lockedNode->lockedRef); } } return defaultNixpkgsFlakeRef(); } }
6,807
C++
.cc
184
28.706522
99
0.606102
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,966
repl.cc
NixOS_nix/src/libcmd/repl.cc
#include <iostream> #include <cstdlib> #include <cstring> #include "error.hh" #include "repl-interacter.hh" #include "repl.hh" #include "ansicolor.hh" #include "shared.hh" #include "eval.hh" #include "eval-settings.hh" #include "attr-path.hh" #include "signals.hh" #include "store-api.hh" #include "log-store.hh" #include "common-eval-args.hh" #include "get-drvs.hh" #include "derivations.hh" #include "globals.hh" #include "flake/flake.hh" #include "flake/lockfile.hh" #include "users.hh" #include "editor-for.hh" #include "finally.hh" #include "markdown.hh" #include "local-fs-store.hh" #include "print.hh" #include "ref.hh" #include "value.hh" #include "strings.hh" namespace nix { /** * Returned by `NixRepl::processLine`. */ enum class ProcessLineResult { /** * The user exited with `:quit`. The REPL should exit. The surrounding * program or evaluation (e.g., if the REPL was acting as the debugger) * should also exit. */ Quit, /** * The user exited with `:continue`. The REPL should exit, but the program * should continue running. */ Continue, /** * The user did not exit. The REPL should request another line of input. */ PromptAgain, }; struct NixRepl : AbstractNixRepl , detail::ReplCompleterMixin , gc { size_t debugTraceIndex; Strings loadedFiles; std::function<AnnotatedValues()> getValues; const static int envSize = 32768; std::shared_ptr<StaticEnv> staticEnv; Env * env; int displ; StringSet varNames; RunNix * runNixPtr; void runNix(Path program, const Strings & args, const std::optional<std::string> & input = {}); std::unique_ptr<ReplInteracter> interacter; NixRepl(const LookupPath & lookupPath, nix::ref<Store> store,ref<EvalState> state, std::function<AnnotatedValues()> getValues, RunNix * runNix); virtual ~NixRepl() = default; ReplExitStatus mainLoop() override; void initEnv() override; virtual StringSet completePrefix(const std::string & prefix) override; StorePath getDerivationPath(Value & v); ProcessLineResult processLine(std::string line); void loadFile(const Path & path); void loadFlake(const std::string & flakeRef); void loadFiles(); void reloadFiles(); void addAttrsToScope(Value & attrs); void addVarToScope(const Symbol name, Value & v); Expr * parseString(std::string s); void evalString(std::string s, Value & v); void loadDebugTraceEnv(DebugTrace & dt); void printValue(std::ostream & str, Value & v, unsigned int maxDepth = std::numeric_limits<unsigned int>::max()) { ::nix::printValue(*state, str, v, PrintOptions { .ansiColors = true, .force = true, .derivationPaths = true, .maxDepth = maxDepth, .prettyIndent = 2, .errors = ErrorPrintBehavior::ThrowTopLevel, }); } }; std::string removeWhitespace(std::string s) { s = chomp(s); size_t n = s.find_first_not_of(" \n\r\t"); if (n != std::string::npos) s = std::string(s, n); return s; } NixRepl::NixRepl(const LookupPath & lookupPath, nix::ref<Store> store, ref<EvalState> state, std::function<NixRepl::AnnotatedValues()> getValues, RunNix * runNix = nullptr) : AbstractNixRepl(state) , debugTraceIndex(0) , getValues(getValues) , staticEnv(new StaticEnv(nullptr, state->staticBaseEnv.get())) , runNixPtr{runNix} , interacter(make_unique<ReadlineLikeInteracter>(getDataDir() + "/repl-history")) { } static std::ostream & showDebugTrace(std::ostream & out, const PosTable & positions, const DebugTrace & dt) { if (dt.isError) out << ANSI_RED "error: " << ANSI_NORMAL; out << dt.hint.str() << "\n"; // prefer direct pos, but if noPos then try the expr. auto pos = dt.pos ? dt.pos : positions[dt.expr.getPos() ? dt.expr.getPos() : noPos]; if (pos) { out << *pos; if (auto loc = pos->getCodeLines()) { out << "\n"; printCodeLines(out, "", *pos, *loc); out << "\n"; } } return out; } static bool isFirstRepl = true; ReplExitStatus NixRepl::mainLoop() { if (isFirstRepl) { std::string_view debuggerNotice = ""; if (state->debugRepl) { debuggerNotice = " debugger"; } notice("Nix %1%%2%\nType :? for help.", nixVersion, debuggerNotice); } isFirstRepl = false; loadFiles(); auto _guard = interacter->init(static_cast<detail::ReplCompleterMixin *>(this)); std::string input; while (true) { // Hide the progress bar while waiting for user input, so that it won't interfere. logger->pause(); // When continuing input from previous lines, don't print a prompt, just align to the same // number of chars as the prompt. if (!interacter->getLine(input, input.empty() ? ReplPromptType::ReplPrompt : ReplPromptType::ContinuationPrompt)) { // Ctrl-D should exit the debugger. state->debugStop = false; logger->cout(""); // TODO: Should Ctrl-D exit just the current debugger session or // the entire program? return ReplExitStatus::QuitAll; } logger->resume(); try { switch (processLine(input)) { case ProcessLineResult::Quit: return ReplExitStatus::QuitAll; case ProcessLineResult::Continue: return ReplExitStatus::Continue; case ProcessLineResult::PromptAgain: break; default: unreachable(); } } catch (ParseError & e) { if (e.msg().find("unexpected end of file") != std::string::npos) { // For parse errors on incomplete input, we continue waiting for the next line of // input without clearing the input so far. continue; } else { printMsg(lvlError, e.msg()); } } catch (EvalError & e) { printMsg(lvlError, e.msg()); } catch (Error & e) { printMsg(lvlError, e.msg()); } catch (Interrupted & e) { printMsg(lvlError, e.msg()); } // We handled the current input fully, so we should clear it // and read brand new input. input.clear(); std::cout << std::endl; } } StringSet NixRepl::completePrefix(const std::string & prefix) { StringSet completions; size_t start = prefix.find_last_of(" \n\r\t(){}[]"); std::string prev, cur; if (start == std::string::npos) { prev = ""; cur = prefix; } else { prev = std::string(prefix, 0, start + 1); cur = std::string(prefix, start + 1); } size_t slash, dot; if ((slash = cur.rfind('/')) != std::string::npos) { try { auto dir = std::string(cur, 0, slash); auto prefix2 = std::string(cur, slash + 1); for (auto & entry : std::filesystem::directory_iterator{dir == "" ? "/" : dir}) { checkInterrupt(); auto name = entry.path().filename().string(); if (name[0] != '.' && hasPrefix(name, prefix2)) completions.insert(prev + entry.path().string()); } } catch (Error &) { } catch (std::filesystem::filesystem_error &) { } } else if ((dot = cur.rfind('.')) == std::string::npos) { /* This is a variable name; look it up in the current scope. */ StringSet::iterator i = varNames.lower_bound(cur); while (i != varNames.end()) { if (i->substr(0, cur.size()) != cur) break; completions.insert(prev + *i); i++; } } else { /* Temporarily disable the debugger, to avoid re-entering readline. */ auto debug_repl = state->debugRepl; state->debugRepl = nullptr; Finally restoreDebug([&]() { state->debugRepl = debug_repl; }); try { /* This is an expression that should evaluate to an attribute set. Evaluate it to get the names of the attributes. */ auto expr = cur.substr(0, dot); auto cur2 = cur.substr(dot + 1); Expr * e = parseString(expr); Value v; e->eval(*state, *env, v); state->forceAttrs(v, noPos, "while evaluating an attrset for the purpose of completion (this error should not be displayed; file an issue?)"); for (auto & i : *v.attrs()) { std::string_view name = state->symbols[i.name]; if (name.substr(0, cur2.size()) != cur2) continue; completions.insert(concatStrings(prev, expr, ".", name)); } } catch (ParseError & e) { // Quietly ignore parse errors. } catch (EvalError & e) { // Quietly ignore evaluation errors. } catch (BadURL & e) { // Quietly ignore BadURL flake-related errors. } catch (FileNotFound & e) { // Quietly ignore non-existent file beeing `import`-ed. } } return completions; } // FIXME: DRY and match or use the parser static bool isVarName(std::string_view s) { if (s.size() == 0) return false; char c = s[0]; if ((c >= '0' && c <= '9') || c == '-' || c == '\'') return false; for (auto & i : s) if (!((i >= 'a' && i <= 'z') || (i >= 'A' && i <= 'Z') || (i >= '0' && i <= '9') || i == '_' || i == '-' || i == '\'')) return false; return true; } StorePath NixRepl::getDerivationPath(Value & v) { auto packageInfo = getDerivation(*state, v, false); if (!packageInfo) throw Error("expression does not evaluate to a derivation, so I can't build it"); auto drvPath = packageInfo->queryDrvPath(); if (!drvPath) throw Error("expression did not evaluate to a valid derivation (no 'drvPath' attribute)"); if (!state->store->isValidPath(*drvPath)) throw Error("expression evaluated to invalid derivation '%s'", state->store->printStorePath(*drvPath)); return *drvPath; } void NixRepl::loadDebugTraceEnv(DebugTrace & dt) { initEnv(); auto se = state->getStaticEnv(dt.expr); if (se) { auto vm = mapStaticEnvBindings(state->symbols, *se.get(), dt.env); // add staticenv vars. for (auto & [name, value] : *(vm.get())) addVarToScope(state->symbols.create(name), *value); } } ProcessLineResult NixRepl::processLine(std::string line) { line = trim(line); if (line.empty()) return ProcessLineResult::PromptAgain; setInterrupted(false); std::string command, arg; if (line[0] == ':') { size_t p = line.find_first_of(" \n\r\t"); command = line.substr(0, p); if (p != std::string::npos) arg = removeWhitespace(line.substr(p)); } else { arg = line; } if (command == ":?" || command == ":help") { // FIXME: convert to Markdown, include in the 'nix repl' manpage. std::cout << "The following commands are available:\n" << "\n" << " <expr> Evaluate and print expression\n" << " <x> = <expr> Bind expression to variable\n" << " :a, :add <expr> Add attributes from resulting set to scope\n" << " :b <expr> Build a derivation\n" << " :bl <expr> Build a derivation, creating GC roots in the\n" << " working directory\n" << " :e, :edit <expr> Open package or function in $EDITOR\n" << " :i <expr> Build derivation, then install result into\n" << " current profile\n" << " :l, :load <path> Load Nix expression and add it to scope\n" << " :lf, :load-flake <ref> Load Nix flake and add it to scope\n" << " :p, :print <expr> Evaluate and print expression recursively\n" << " Strings are printed directly, without escaping.\n" << " :q, :quit Exit nix-repl\n" << " :r, :reload Reload all files\n" << " :sh <expr> Build dependencies of derivation, then start\n" << " nix-shell\n" << " :t <expr> Describe result of evaluation\n" << " :u <expr> Build derivation, then start nix-shell\n" << " :doc <expr> Show documentation of a builtin function\n" << " :log <expr> Show logs for a derivation\n" << " :te, :trace-enable [bool] Enable, disable or toggle showing traces for\n" << " errors\n" << " :?, :help Brings up this help menu\n" ; if (state->debugRepl) { std::cout << "\n" << " Debug mode commands\n" << " :env Show env stack\n" << " :bt, :backtrace Show trace stack\n" << " :st Show current trace\n" << " :st <idx> Change to another trace in the stack\n" << " :c, :continue Go until end of program, exception, or builtins.break\n" << " :s, :step Go one step\n" ; } } else if (state->debugRepl && (command == ":bt" || command == ":backtrace")) { for (const auto & [idx, i] : enumerate(state->debugTraces)) { std::cout << "\n" << ANSI_BLUE << idx << ANSI_NORMAL << ": "; showDebugTrace(std::cout, state->positions, i); } } else if (state->debugRepl && (command == ":env")) { for (const auto & [idx, i] : enumerate(state->debugTraces)) { if (idx == debugTraceIndex) { printEnvBindings(*state, i.expr, i.env); break; } } } else if (state->debugRepl && (command == ":st")) { try { // change the DebugTrace index. debugTraceIndex = stoi(arg); } catch (...) { } for (const auto & [idx, i] : enumerate(state->debugTraces)) { if (idx == debugTraceIndex) { std::cout << "\n" << ANSI_BLUE << idx << ANSI_NORMAL << ": "; showDebugTrace(std::cout, state->positions, i); std::cout << std::endl; printEnvBindings(*state, i.expr, i.env); loadDebugTraceEnv(i); break; } } } else if (state->debugRepl && (command == ":s" || command == ":step")) { // set flag to stop at next DebugTrace; exit repl. state->debugStop = true; return ProcessLineResult::Continue; } else if (state->debugRepl && (command == ":c" || command == ":continue")) { // set flag to run to next breakpoint or end of program; exit repl. state->debugStop = false; return ProcessLineResult::Continue; } else if (command == ":a" || command == ":add") { Value v; evalString(arg, v); addAttrsToScope(v); } else if (command == ":l" || command == ":load") { state->resetFileCache(); loadFile(arg); } else if (command == ":lf" || command == ":load-flake") { loadFlake(arg); } else if (command == ":r" || command == ":reload") { state->resetFileCache(); reloadFiles(); } else if (command == ":e" || command == ":edit") { Value v; evalString(arg, v); const auto [path, line] = [&] () -> std::pair<SourcePath, uint32_t> { if (v.type() == nPath || v.type() == nString) { NixStringContext context; auto path = state->coerceToPath(noPos, v, context, "while evaluating the filename to edit"); return {path, 0}; } else if (v.isLambda()) { auto pos = state->positions[v.payload.lambda.fun->pos]; if (auto path = std::get_if<SourcePath>(&pos.origin)) return {*path, pos.line}; else throw Error("'%s' cannot be shown in an editor", pos); } else { // assume it's a derivation return findPackageFilename(*state, v, arg); } }(); // Open in EDITOR auto args = editorFor(path, line); auto editor = args.front(); args.pop_front(); // runProgram redirects stdout to a StringSink, // using runProgram2 to allow editors to display their UI runProgram2(RunOptions { .program = editor, .lookupPath = true, .args = args , .isInteractive = true }); // Reload right after exiting the editor state->resetFileCache(); reloadFiles(); } else if (command == ":t") { Value v; evalString(arg, v); logger->cout(showType(v)); } else if (command == ":u") { Value v, f, result; evalString(arg, v); evalString("drv: (import <nixpkgs> {}).runCommand \"shell\" { buildInputs = [ drv ]; } \"\"", f); state->callFunction(f, v, result, PosIdx()); StorePath drvPath = getDerivationPath(result); runNix("nix-shell", {state->store->printStorePath(drvPath)}); } else if (command == ":b" || command == ":bl" || command == ":i" || command == ":sh" || command == ":log") { Value v; evalString(arg, v); StorePath drvPath = getDerivationPath(v); Path drvPathRaw = state->store->printStorePath(drvPath); if (command == ":b" || command == ":bl") { state->store->buildPaths({ DerivedPath::Built { .drvPath = makeConstantStorePathRef(drvPath), .outputs = OutputsSpec::All { }, }, }); auto drv = state->store->readDerivation(drvPath); logger->cout("\nThis derivation produced the following outputs:"); for (auto & [outputName, outputPath] : state->store->queryDerivationOutputMap(drvPath)) { auto localStore = state->store.dynamic_pointer_cast<LocalFSStore>(); if (localStore && command == ":bl") { std::string symlink = "repl-result-" + outputName; localStore->addPermRoot(outputPath, absPath(symlink)); logger->cout(" ./%s -> %s", symlink, state->store->printStorePath(outputPath)); } else { logger->cout(" %s -> %s", outputName, state->store->printStorePath(outputPath)); } } } else if (command == ":i") { runNix("nix-env", {"-i", drvPathRaw}); } else if (command == ":log") { settings.readOnlyMode = true; Finally roModeReset([&]() { settings.readOnlyMode = false; }); auto subs = getDefaultSubstituters(); subs.push_front(state->store); bool foundLog = false; RunPager pager; for (auto & sub : subs) { auto * logSubP = dynamic_cast<LogStore *>(&*sub); if (!logSubP) { printInfo("Skipped '%s' which does not support retrieving build logs", sub->getUri()); continue; } auto & logSub = *logSubP; auto log = logSub.getBuildLog(drvPath); if (log) { printInfo("got build log for '%s' from '%s'", drvPathRaw, logSub.getUri()); logger->writeToStdout(*log); foundLog = true; break; } } if (!foundLog) throw Error("build log of '%s' is not available", drvPathRaw); } else { runNix("nix-shell", {drvPathRaw}); } } else if (command == ":p" || command == ":print") { Value v; evalString(arg, v); if (v.type() == nString) { std::cout << v.string_view(); } else { printValue(std::cout, v); } std::cout << std::endl; } else if (command == ":q" || command == ":quit") { state->debugStop = false; return ProcessLineResult::Quit; } else if (command == ":doc") { Value v; auto expr = parseString(arg); std::string fallbackName; PosIdx fallbackPos; DocComment fallbackDoc; if (auto select = dynamic_cast<ExprSelect *>(expr)) { Value vAttrs; auto name = select->evalExceptFinalSelect(*state, *env, vAttrs); fallbackName = state->symbols[name]; state->forceAttrs(vAttrs, noPos, "while evaluating an attribute set to look for documentation"); auto attrs = vAttrs.attrs(); assert(attrs); auto attr = attrs->get(name); if (!attr) { // When missing, trigger the normal exception // e.g. :doc builtins.foo // behaves like // nix-repl> builtins.foo<tab> // error: attribute 'foo' missing evalString(arg, v); assert(false); } if (attr->pos) { fallbackPos = attr->pos; fallbackDoc = state->getDocCommentForPos(fallbackPos); } } evalString(arg, v); if (auto doc = state->getDoc(v)) { std::string markdown; if (!doc->args.empty() && doc->name) { auto args = doc->args; for (auto & arg : args) arg = "*" + arg + "*"; markdown += "**Synopsis:** `builtins." + (std::string) (*doc->name) + "` " + concatStringsSep(" ", args) + "\n\n"; } markdown += stripIndentation(doc->doc); logger->cout(trim(renderMarkdownToTerminal(markdown))); } else if (fallbackPos) { std::ostringstream ss; ss << "Attribute `" << fallbackName << "`\n\n"; ss << " … defined at " << state->positions[fallbackPos] << "\n\n"; if (fallbackDoc) { ss << fallbackDoc.getInnerText(state->positions); } else { ss << "No documentation found.\n\n"; } auto markdown = toView(ss); logger->cout(trim(renderMarkdownToTerminal(markdown))); } else throw Error("value does not have documentation"); } else if (command == ":te" || command == ":trace-enable") { if (arg == "false" || (arg == "" && loggerSettings.showTrace)) { std::cout << "not showing error traces\n"; loggerSettings.showTrace = false; } else if (arg == "true" || (arg == "" && !loggerSettings.showTrace)) { std::cout << "showing error traces\n"; loggerSettings.showTrace = true; } else { throw Error("unexpected argument '%s' to %s", arg, command); }; } else if (command != "") throw Error("unknown command '%1%'", command); else { size_t p = line.find('='); std::string name; if (p != std::string::npos && p < line.size() && line[p + 1] != '=' && isVarName(name = removeWhitespace(line.substr(0, p)))) { Expr * e = parseString(line.substr(p + 1)); Value & v(*state->allocValue()); v.mkThunk(env, e); addVarToScope(state->symbols.create(name), v); } else { Value v; evalString(line, v); printValue(std::cout, v, 1); std::cout << std::endl; } } return ProcessLineResult::PromptAgain; } void NixRepl::loadFile(const Path & path) { loadedFiles.remove(path); loadedFiles.push_back(path); Value v, v2; state->evalFile(lookupFileArg(*state, path), v); state->autoCallFunction(*autoArgs, v, v2); addAttrsToScope(v2); } void NixRepl::loadFlake(const std::string & flakeRefS) { if (flakeRefS.empty()) throw Error("cannot use ':load-flake' without a path specified. (Use '.' for the current working directory.)"); std::filesystem::path cwd; try { cwd = std::filesystem::current_path(); } catch (std::filesystem::filesystem_error & e) { throw SysError("cannot determine current working directory"); } auto flakeRef = parseFlakeRef(fetchSettings, flakeRefS, cwd.string(), true); if (evalSettings.pureEval && !flakeRef.input.isLocked()) throw Error("cannot use ':load-flake' on locked flake reference '%s' (use --impure to override)", flakeRefS); Value v; flake::callFlake(*state, flake::lockFlake(flakeSettings, *state, flakeRef, flake::LockFlags { .updateLockFile = false, .useRegistries = !evalSettings.pureEval, .allowUnlocked = !evalSettings.pureEval, }), v); addAttrsToScope(v); } void NixRepl::initEnv() { env = &state->allocEnv(envSize); env->up = &state->baseEnv; displ = 0; staticEnv->vars.clear(); varNames.clear(); for (auto & i : state->staticBaseEnv->vars) varNames.emplace(state->symbols[i.first]); } void NixRepl::reloadFiles() { initEnv(); loadFiles(); } void NixRepl::loadFiles() { Strings old = loadedFiles; loadedFiles.clear(); for (auto & i : old) { notice("Loading '%1%'...", i); loadFile(i); } for (auto & [i, what] : getValues()) { notice("Loading installable '%1%'...", what); addAttrsToScope(*i); } } void NixRepl::addAttrsToScope(Value & attrs) { state->forceAttrs(attrs, [&]() { return attrs.determinePos(noPos); }, "while evaluating an attribute set to be merged in the global scope"); if (displ + attrs.attrs()->size() >= envSize) throw Error("environment full; cannot add more variables"); for (auto & i : *attrs.attrs()) { staticEnv->vars.emplace_back(i.name, displ); env->values[displ++] = i.value; varNames.emplace(state->symbols[i.name]); } staticEnv->sort(); staticEnv->deduplicate(); notice("Added %1% variables.", attrs.attrs()->size()); } void NixRepl::addVarToScope(const Symbol name, Value & v) { if (displ >= envSize) throw Error("environment full; cannot add more variables"); if (auto oldVar = staticEnv->find(name); oldVar != staticEnv->vars.end()) staticEnv->vars.erase(oldVar); staticEnv->vars.emplace_back(name, displ); staticEnv->sort(); env->values[displ++] = &v; varNames.emplace(state->symbols[name]); } Expr * NixRepl::parseString(std::string s) { return state->parseExprFromString(std::move(s), state->rootPath("."), staticEnv); } void NixRepl::evalString(std::string s, Value & v) { Expr * e = parseString(s); e->eval(*state, *env, v); state->forceValue(v, v.determinePos(noPos)); } void NixRepl::runNix(Path program, const Strings & args, const std::optional<std::string> & input) { if (runNixPtr) (*runNixPtr)(program, args, input); else throw Error("Cannot run '%s' because no method of calling the Nix CLI was provided. This is a configuration problem pertaining to how this program was built. See Nix 2.25 release notes", program); } std::unique_ptr<AbstractNixRepl> AbstractNixRepl::create( const LookupPath & lookupPath, nix::ref<Store> store, ref<EvalState> state, std::function<AnnotatedValues()> getValues, RunNix * runNix) { return std::make_unique<NixRepl>( lookupPath, openStore(), state, getValues ); } ReplExitStatus AbstractNixRepl::runSimple( ref<EvalState> evalState, const ValMap & extraEnv) { auto getValues = [&]()->NixRepl::AnnotatedValues{ NixRepl::AnnotatedValues values; return values; }; LookupPath lookupPath = {}; auto repl = std::make_unique<NixRepl>( lookupPath, openStore(), evalState, getValues ); repl->initEnv(); // add 'extra' vars. for (auto & [name, value] : extraEnv) repl->addVarToScope(repl->state->symbols.create(name), *value); return repl->mainLoop(); } }
29,106
C++
.cc
745
30.071141
204
0.547299
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,967
installable-attr-path.cc
NixOS_nix/src/libcmd/installable-attr-path.cc
#include "globals.hh" #include "installable-attr-path.hh" #include "outputs-spec.hh" #include "util.hh" #include "command.hh" #include "attr-path.hh" #include "common-eval-args.hh" #include "derivations.hh" #include "eval-inline.hh" #include "eval.hh" #include "get-drvs.hh" #include "store-api.hh" #include "shared.hh" #include "flake/flake.hh" #include "eval-cache.hh" #include "url.hh" #include "registry.hh" #include "build-result.hh" #include <regex> #include <queue> #include <nlohmann/json.hpp> namespace nix { InstallableAttrPath::InstallableAttrPath( ref<EvalState> state, SourceExprCommand & cmd, Value * v, const std::string & attrPath, ExtendedOutputsSpec extendedOutputsSpec) : InstallableValue(state) , cmd(cmd) , v(allocRootValue(v)) , attrPath(attrPath) , extendedOutputsSpec(std::move(extendedOutputsSpec)) { } std::pair<Value *, PosIdx> InstallableAttrPath::toValue(EvalState & state) { auto [vRes, pos] = findAlongAttrPath(state, attrPath, *cmd.getAutoArgs(state), **v); state.forceValue(*vRes, pos); return {vRes, pos}; } DerivedPathsWithInfo InstallableAttrPath::toDerivedPaths() { auto [v, pos] = toValue(*state); if (std::optional derivedPathWithInfo = trySinglePathToDerivedPaths( *v, pos, fmt("while evaluating the attribute '%s'", attrPath))) { return { *derivedPathWithInfo }; } Bindings & autoArgs = *cmd.getAutoArgs(*state); PackageInfos packageInfos; getDerivations(*state, *v, "", autoArgs, packageInfos, false); // Backward compatibility hack: group results by drvPath. This // helps keep .all output together. std::map<StorePath, OutputsSpec> byDrvPath; for (auto & packageInfo : packageInfos) { auto drvPath = packageInfo.queryDrvPath(); if (!drvPath) throw Error("'%s' is not a derivation", what()); auto newOutputs = std::visit(overloaded { [&](const ExtendedOutputsSpec::Default & d) -> OutputsSpec { std::set<std::string> outputsToInstall; for (auto & output : packageInfo.queryOutputs(false, true)) outputsToInstall.insert(output.first); if (outputsToInstall.empty()) outputsToInstall.insert("out"); return OutputsSpec::Names { std::move(outputsToInstall) }; }, [&](const ExtendedOutputsSpec::Explicit & e) -> OutputsSpec { return e; }, }, extendedOutputsSpec.raw); auto [iter, didInsert] = byDrvPath.emplace(*drvPath, newOutputs); if (!didInsert) iter->second = iter->second.union_(newOutputs); } DerivedPathsWithInfo res; for (auto & [drvPath, outputs] : byDrvPath) res.push_back({ .path = DerivedPath::Built { .drvPath = makeConstantStorePathRef(drvPath), .outputs = outputs, }, .info = make_ref<ExtraPathInfoValue>(ExtraPathInfoValue::Value { .extendedOutputsSpec = outputs, /* FIXME: reconsider backwards compatibility above so we can fill in this info. */ }), }); return res; } InstallableAttrPath InstallableAttrPath::parse( ref<EvalState> state, SourceExprCommand & cmd, Value * v, std::string_view prefix, ExtendedOutputsSpec extendedOutputsSpec) { return { state, cmd, v, prefix == "." ? "" : std::string { prefix }, std::move(extendedOutputsSpec), }; } }
3,606
C++
.cc
106
27.349057
88
0.641011
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,968
legacy.cc
NixOS_nix/src/libcmd/legacy.cc
#include "legacy.hh" namespace nix { RegisterLegacyCommand::Commands * RegisterLegacyCommand::commands = 0; }
113
C++
.cc
4
26.5
70
0.811321
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
true
false
false
true
false
false
10,969
built-path.cc
NixOS_nix/src/libcmd/built-path.cc
#include "built-path.hh" #include "derivations.hh" #include "store-api.hh" #include "comparator.hh" #include <nlohmann/json.hpp> #include <optional> namespace nix { // Custom implementation to avoid `ref` ptr equality GENERATE_CMP_EXT( , std::strong_ordering, SingleBuiltPathBuilt, *me->drvPath, me->output); // Custom implementation to avoid `ref` ptr equality // TODO no `GENERATE_CMP_EXT` because no `std::set::operator<=>` on // Darwin, per header. GENERATE_EQUAL( , BuiltPathBuilt ::, BuiltPathBuilt, *me->drvPath, me->outputs); StorePath SingleBuiltPath::outPath() const { return std::visit( overloaded{ [](const SingleBuiltPath::Opaque & p) { return p.path; }, [](const SingleBuiltPath::Built & b) { return b.output.second; }, }, raw() ); } StorePathSet BuiltPath::outPaths() const { return std::visit( overloaded{ [](const BuiltPath::Opaque & p) { return StorePathSet{p.path}; }, [](const BuiltPath::Built & b) { StorePathSet res; for (auto & [_, path] : b.outputs) res.insert(path); return res; }, }, raw() ); } SingleDerivedPath::Built SingleBuiltPath::Built::discardOutputPath() const { return SingleDerivedPath::Built { .drvPath = make_ref<SingleDerivedPath>(drvPath->discardOutputPath()), .output = output.first, }; } SingleDerivedPath SingleBuiltPath::discardOutputPath() const { return std::visit( overloaded{ [](const SingleBuiltPath::Opaque & p) -> SingleDerivedPath { return p; }, [](const SingleBuiltPath::Built & b) -> SingleDerivedPath { return b.discardOutputPath(); }, }, raw() ); } nlohmann::json BuiltPath::Built::toJSON(const StoreDirConfig & store) const { nlohmann::json res; res["drvPath"] = drvPath->toJSON(store); for (const auto & [outputName, outputPath] : outputs) { res["outputs"][outputName] = store.printStorePath(outputPath); } return res; } nlohmann::json SingleBuiltPath::Built::toJSON(const StoreDirConfig & store) const { nlohmann::json res; res["drvPath"] = drvPath->toJSON(store); auto & [outputName, outputPath] = output; res["output"] = outputName; res["outputPath"] = store.printStorePath(outputPath); return res; } nlohmann::json SingleBuiltPath::toJSON(const StoreDirConfig & store) const { return std::visit([&](const auto & buildable) { return buildable.toJSON(store); }, raw()); } nlohmann::json BuiltPath::toJSON(const StoreDirConfig & store) const { return std::visit([&](const auto & buildable) { return buildable.toJSON(store); }, raw()); } RealisedPath::Set BuiltPath::toRealisedPaths(Store & store) const { RealisedPath::Set res; std::visit( overloaded{ [&](const BuiltPath::Opaque & p) { res.insert(p.path); }, [&](const BuiltPath::Built & p) { auto drvHashes = staticOutputHashes(store, store.readDerivation(p.drvPath->outPath())); for (auto& [outputName, outputPath] : p.outputs) { if (experimentalFeatureSettings.isEnabled( Xp::CaDerivations)) { auto drvOutput = get(drvHashes, outputName); if (!drvOutput) throw Error( "the derivation '%s' has unrealised output '%s' (derived-path.cc/toRealisedPaths)", store.printStorePath(p.drvPath->outPath()), outputName); auto thisRealisation = store.queryRealisation( DrvOutput{*drvOutput, outputName}); assert(thisRealisation); // We’ve built it, so we must // have the realisation res.insert(*thisRealisation); } else { res.insert(outputPath); } } }, }, raw()); return res; } }
4,275
C++
.cc
128
24.664063
115
0.5771
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,970
common-eval-args.cc
NixOS_nix/src/libcmd/common-eval-args.cc
#include "fetch-settings.hh" #include "eval-settings.hh" #include "common-eval-args.hh" #include "shared.hh" #include "config-global.hh" #include "filetransfer.hh" #include "eval.hh" #include "fetchers.hh" #include "registry.hh" #include "flake/flakeref.hh" #include "flake/settings.hh" #include "store-api.hh" #include "command.hh" #include "tarball.hh" #include "fetch-to-store.hh" #include "compatibility-settings.hh" #include "eval-settings.hh" namespace nix { namespace fs { using namespace std::filesystem; } fetchers::Settings fetchSettings; static GlobalConfig::Register rFetchSettings(&fetchSettings); EvalSettings evalSettings { settings.readOnlyMode, { { "flake", [](ref<Store> store, std::string_view rest) { experimentalFeatureSettings.require(Xp::Flakes); // FIXME `parseFlakeRef` should take a `std::string_view`. auto flakeRef = parseFlakeRef(fetchSettings, std::string { rest }, {}, true, false); debug("fetching flake search path element '%s''", rest); auto storePath = flakeRef.resolve(store).fetchTree(store).first; return store->toRealPath(storePath); }, }, }, }; static GlobalConfig::Register rEvalSettings(&evalSettings); flake::Settings flakeSettings; static GlobalConfig::Register rFlakeSettings(&flakeSettings); CompatibilitySettings compatibilitySettings {}; static GlobalConfig::Register rCompatibilitySettings(&compatibilitySettings); MixEvalArgs::MixEvalArgs() { addFlag({ .longName = "arg", .description = "Pass the value *expr* as the argument *name* to Nix functions.", .category = category, .labels = {"name", "expr"}, .handler = {[&](std::string name, std::string expr) { autoArgs.insert_or_assign(name, AutoArg{AutoArgExpr{expr}}); }} }); addFlag({ .longName = "argstr", .description = "Pass the string *string* as the argument *name* to Nix functions.", .category = category, .labels = {"name", "string"}, .handler = {[&](std::string name, std::string s) { autoArgs.insert_or_assign(name, AutoArg{AutoArgString{s}}); }}, }); addFlag({ .longName = "arg-from-file", .description = "Pass the contents of file *path* as the argument *name* to Nix functions.", .category = category, .labels = {"name", "path"}, .handler = {[&](std::string name, std::string path) { autoArgs.insert_or_assign(name, AutoArg{AutoArgFile{path}}); }}, .completer = completePath }); addFlag({ .longName = "arg-from-stdin", .description = "Pass the contents of stdin as the argument *name* to Nix functions.", .category = category, .labels = {"name"}, .handler = {[&](std::string name) { autoArgs.insert_or_assign(name, AutoArg{AutoArgStdin{}}); }}, }); addFlag({ .longName = "include", .shortName = 'I', .description = R"( Add *path* to search path entries used to resolve [lookup paths](@docroot@/language/constructs/lookup-path.md) This option may be given multiple times. Paths added through `-I` take precedence over the [`nix-path` configuration setting](@docroot@/command-ref/conf-file.md#conf-nix-path) and the [`NIX_PATH` environment variable](@docroot@/command-ref/env-common.md#env-NIX_PATH). )", .category = category, .labels = {"path"}, .handler = {[&](std::string s) { lookupPath.elements.emplace_back(LookupPath::Elem::parse(s)); }} }); addFlag({ .longName = "impure", .description = "Allow access to mutable paths and repositories.", .category = category, .handler = {[&]() { evalSettings.pureEval = false; }}, }); addFlag({ .longName = "override-flake", .description = "Override the flake registries, redirecting *original-ref* to *resolved-ref*.", .category = category, .labels = {"original-ref", "resolved-ref"}, .handler = {[&](std::string _from, std::string _to) { auto from = parseFlakeRef(fetchSettings, _from, fs::current_path().string()); auto to = parseFlakeRef(fetchSettings, _to, fs::current_path().string()); fetchers::Attrs extraAttrs; if (to.subdir != "") extraAttrs["dir"] = to.subdir; fetchers::overrideRegistry(from.input, to.input, extraAttrs); }}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeRef(completions, openStore(), prefix); }} }); addFlag({ .longName = "eval-store", .description = R"( The [URL of the Nix store](@docroot@/store/types/index.md#store-url-format) to use for evaluation, i.e. to store derivations (`.drv` files) and inputs referenced by them. )", .category = category, .labels = {"store-url"}, .handler = {&evalStoreUrl}, }); } Bindings * MixEvalArgs::getAutoArgs(EvalState & state) { auto res = state.buildBindings(autoArgs.size()); for (auto & [name, arg] : autoArgs) { auto v = state.allocValue(); std::visit(overloaded { [&](const AutoArgExpr & arg) { state.mkThunk_(*v, state.parseExprFromString(arg.expr, compatibilitySettings.nixShellShebangArgumentsRelativeToScript ? state.rootPath(absPath(getCommandBaseDir())) : state.rootPath("."))); }, [&](const AutoArgString & arg) { v->mkString(arg.s); }, [&](const AutoArgFile & arg) { v->mkString(readFile(arg.path.string())); }, [&](const AutoArgStdin & arg) { v->mkString(readFile(STDIN_FILENO)); } }, arg); res.insert(state.symbols.create(name), v); } return res.finish(); } SourcePath lookupFileArg(EvalState & state, std::string_view s, const Path * baseDir) { if (EvalSettings::isPseudoUrl(s)) { auto accessor = fetchers::downloadTarball( state.store, state.fetchSettings, EvalSettings::resolvePseudoUrl(s)); auto storePath = fetchToStore(*state.store, SourcePath(accessor), FetchMode::Copy); return state.rootPath(CanonPath(state.store->toRealPath(storePath))); } else if (hasPrefix(s, "flake:")) { experimentalFeatureSettings.require(Xp::Flakes); auto flakeRef = parseFlakeRef(fetchSettings, std::string(s.substr(6)), {}, true, false); auto storePath = flakeRef.resolve(state.store).fetchTree(state.store).first; return state.rootPath(CanonPath(state.store->toRealPath(storePath))); } else if (s.size() > 2 && s.at(0) == '<' && s.at(s.size() - 1) == '>') { Path p(s.substr(1, s.size() - 2)); return state.findFile(p); } else return state.rootPath(baseDir ? absPath(s, *baseDir) : absPath(s)); } }
7,094
C++
.cc
170
34.135294
229
0.620595
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,971
installable-derived-path.cc
NixOS_nix/src/libcmd/installable-derived-path.cc
#include "installable-derived-path.hh" #include "derivations.hh" namespace nix { std::string InstallableDerivedPath::what() const { return derivedPath.to_string(*store); } DerivedPathsWithInfo InstallableDerivedPath::toDerivedPaths() { return {{ .path = derivedPath, .info = make_ref<ExtraPathInfo>(), }}; } std::optional<StorePath> InstallableDerivedPath::getStorePath() { return derivedPath.getBaseStorePath(); } InstallableDerivedPath InstallableDerivedPath::parse( ref<Store> store, std::string_view prefix, ExtendedOutputsSpec extendedOutputsSpec) { auto derivedPath = std::visit(overloaded { // If the user did not use ^, we treat the output more // liberally: we accept a symlink chain or an actual // store path. [&](const ExtendedOutputsSpec::Default &) -> DerivedPath { auto storePath = store->followLinksToStorePath(prefix); return DerivedPath::Opaque { .path = std::move(storePath), }; }, // If the user did use ^, we just do exactly what is written. [&](const ExtendedOutputsSpec::Explicit & outputSpec) -> DerivedPath { auto drv = make_ref<SingleDerivedPath>(SingleDerivedPath::parse(*store, prefix)); drvRequireExperiment(*drv); return DerivedPath::Built { .drvPath = std::move(drv), .outputs = outputSpec, }; }, }, extendedOutputsSpec.raw); return InstallableDerivedPath { store, std::move(derivedPath), }; } }
1,605
C++
.cc
49
26.081633
93
0.647097
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,972
repl-interacter.cc
NixOS_nix/src/libcmd/repl-interacter.cc
#include <cstdio> #ifdef USE_READLINE #include <readline/history.h> #include <readline/readline.h> #else // editline < 1.15.2 don't wrap their API for C++ usage // (added in https://github.com/troglobit/editline/commit/91398ceb3427b730995357e9d120539fb9bb7461). // This results in linker errors due to to name-mangling of editline C symbols. // For compatibility with these versions, we wrap the API here // (wrapping multiple times on newer versions is no problem). extern "C" { #include <editline.h> } #endif #include "signals.hh" #include "finally.hh" #include "repl-interacter.hh" #include "file-system.hh" #include "repl.hh" #include "environment-variables.hh" namespace nix { namespace { // Used to communicate to NixRepl::getLine whether a signal occurred in ::readline. volatile sig_atomic_t g_signal_received = 0; void sigintHandler(int signo) { g_signal_received = signo; } }; static detail::ReplCompleterMixin * curRepl; // ugly #ifndef USE_READLINE static char * completionCallback(char * s, int * match) { auto possible = curRepl->completePrefix(s); if (possible.size() == 1) { *match = 1; auto * res = strdup(possible.begin()->c_str() + strlen(s)); if (!res) throw Error("allocation failure"); return res; } else if (possible.size() > 1) { auto checkAllHaveSameAt = [&](size_t pos) { auto & first = *possible.begin(); for (auto & p : possible) { if (p.size() <= pos || p[pos] != first[pos]) return false; } return true; }; size_t start = strlen(s); size_t len = 0; while (checkAllHaveSameAt(start + len)) ++len; if (len > 0) { *match = 1; auto * res = strdup(std::string(*possible.begin(), start, len).c_str()); if (!res) throw Error("allocation failure"); return res; } } *match = 0; return nullptr; } static int listPossibleCallback(char * s, char *** avp) { auto possible = curRepl->completePrefix(s); if (possible.size() > (std::numeric_limits<int>::max() / sizeof(char *))) throw Error("too many completions"); int ac = 0; char ** vp = nullptr; auto check = [&](auto * p) { if (!p) { if (vp) { while (--ac >= 0) free(vp[ac]); free(vp); } throw Error("allocation failure"); } return p; }; vp = check((char **) malloc(possible.size() * sizeof(char *))); for (auto & p : possible) vp[ac++] = check(strdup(p.c_str())); *avp = vp; return ac; } #endif ReadlineLikeInteracter::Guard ReadlineLikeInteracter::init(detail::ReplCompleterMixin * repl) { // Allow nix-repl specific settings in .inputrc rl_readline_name = "nix-repl"; try { createDirs(dirOf(historyFile)); } catch (SystemError & e) { logWarning(e.info()); } #ifndef USE_READLINE el_hist_size = 1000; #endif read_history(historyFile.c_str()); auto oldRepl = curRepl; curRepl = repl; Guard restoreRepl([oldRepl] { curRepl = oldRepl; }); #ifndef USE_READLINE rl_set_complete_func(completionCallback); rl_set_list_possib_func(listPossibleCallback); #endif return restoreRepl; } static constexpr const char * promptForType(ReplPromptType promptType) { switch (promptType) { case ReplPromptType::ReplPrompt: return "nix-repl> "; case ReplPromptType::ContinuationPrompt: return " "; } assert(false); } bool ReadlineLikeInteracter::getLine(std::string & input, ReplPromptType promptType) { #ifndef _WIN32 // TODO use more signals.hh for this struct sigaction act, old; sigset_t savedSignalMask, set; auto setupSignals = [&]() { act.sa_handler = sigintHandler; sigfillset(&act.sa_mask); act.sa_flags = 0; if (sigaction(SIGINT, &act, &old)) throw SysError("installing handler for SIGINT"); sigemptyset(&set); sigaddset(&set, SIGINT); if (sigprocmask(SIG_UNBLOCK, &set, &savedSignalMask)) throw SysError("unblocking SIGINT"); }; auto restoreSignals = [&]() { if (sigprocmask(SIG_SETMASK, &savedSignalMask, nullptr)) throw SysError("restoring signals"); if (sigaction(SIGINT, &old, 0)) throw SysError("restoring handler for SIGINT"); }; setupSignals(); #endif char * s = readline(promptForType(promptType)); Finally doFree([&]() { free(s); }); #ifndef _WIN32 // TODO use more signals.hh for this restoreSignals(); #endif if (g_signal_received) { g_signal_received = 0; input.clear(); return true; } // editline doesn't echo the input to the output when non-interactive, unlike readline // this results in a different behavior when running tests. The echoing is // quite useful for reading the test output, so we add it here. if (auto e = getEnv("_NIX_TEST_REPL_ECHO"); s && e && *e == "1") { #ifndef USE_READLINE // This is probably not right for multi-line input, but we don't use that // in the characterisation tests, so it's fine. std::cout << promptForType(promptType) << s << std::endl; #endif } if (!s) return false; input += s; input += '\n'; return true; } ReadlineLikeInteracter::~ReadlineLikeInteracter() { write_history(historyFile.c_str()); } };
5,585
C++
.cc
177
25.711864
100
0.621863
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,973
command.cc
NixOS_nix/src/libcmd/command.cc
#include <algorithm> #include <nlohmann/json.hpp> #include "command.hh" #include "markdown.hh" #include "store-api.hh" #include "local-fs-store.hh" #include "derivations.hh" #include "nixexpr.hh" #include "profiles.hh" #include "repl.hh" #include "strings.hh" #include "environment-variables.hh" namespace nix { RegisterCommand::Commands * RegisterCommand::commands = nullptr; nix::Commands RegisterCommand::getCommandsFor(const std::vector<std::string> & prefix) { nix::Commands res; for (auto & [name, command] : *RegisterCommand::commands) if (name.size() == prefix.size() + 1) { bool equal = true; for (size_t i = 0; i < prefix.size(); ++i) if (name[i] != prefix[i]) equal = false; if (equal) res.insert_or_assign(name[prefix.size()], command); } return res; } nlohmann::json NixMultiCommand::toJSON() { // FIXME: use Command::toJSON() as well. return MultiCommand::toJSON(); } void NixMultiCommand::run() { if (!command) { std::set<std::string> subCommandTextLines; for (auto & [name, _] : commands) subCommandTextLines.insert(fmt("- `%s`", name)); std::string markdownError = fmt("`nix %s` requires a sub-command. Available sub-commands:\n\n%s\n", commandName, concatStringsSep("\n", subCommandTextLines)); throw UsageError(renderMarkdownToTerminal(markdownError)); } command->second->run(); } StoreCommand::StoreCommand() {} ref<Store> StoreCommand::getStore() { if (!_store) _store = createStore(); return ref<Store>(_store); } ref<Store> StoreCommand::createStore() { return openStore(); } void StoreCommand::run() { run(getStore()); } CopyCommand::CopyCommand() { addFlag({ .longName = "from", .description = "URL of the source Nix store.", .labels = {"store-uri"}, .handler = {&srcUri}, }); addFlag({ .longName = "to", .description = "URL of the destination Nix store.", .labels = {"store-uri"}, .handler = {&dstUri}, }); } ref<Store> CopyCommand::createStore() { return srcUri.empty() ? StoreCommand::createStore() : openStore(srcUri); } ref<Store> CopyCommand::getDstStore() { if (srcUri.empty() && dstUri.empty()) throw UsageError("you must pass '--from' and/or '--to'"); return dstUri.empty() ? openStore() : openStore(dstUri); } EvalCommand::EvalCommand() { addFlag({ .longName = "debugger", .description = "Start an interactive environment if evaluation fails.", .category = MixEvalArgs::category, .handler = {&startReplOnEvalErrors, true}, }); } EvalCommand::~EvalCommand() { if (evalState) evalState->maybePrintStats(); } ref<Store> EvalCommand::getEvalStore() { if (!evalStore) evalStore = evalStoreUrl ? openStore(*evalStoreUrl) : getStore(); return ref<Store>(evalStore); } ref<EvalState> EvalCommand::getEvalState() { if (!evalState) { evalState = std::allocate_shared<EvalState>( traceable_allocator<EvalState>(), lookupPath, getEvalStore(), fetchSettings, evalSettings, getStore()); evalState->repair = repair; if (startReplOnEvalErrors) { evalState->debugRepl = &AbstractNixRepl::runSimple; }; } return ref<EvalState>(evalState); } MixOperateOnOptions::MixOperateOnOptions() { addFlag({ .longName = "derivation", .description = "Operate on the [store derivation](@docroot@/glossary.md#gloss-store-derivation) rather than its outputs.", .category = installablesCategory, .handler = {&operateOn, OperateOn::Derivation}, }); } BuiltPathsCommand::BuiltPathsCommand(bool recursive) : recursive(recursive) { if (recursive) addFlag({ .longName = "no-recursive", .description = "Apply operation to specified paths only.", .category = installablesCategory, .handler = {&this->recursive, false}, }); else addFlag({ .longName = "recursive", .shortName = 'r', .description = "Apply operation to closure of the specified paths.", .category = installablesCategory, .handler = {&this->recursive, true}, }); addFlag({ .longName = "all", .description = "Apply the operation to every store path.", .category = installablesCategory, .handler = {&all, true}, }); } void BuiltPathsCommand::run(ref<Store> store, Installables && installables) { BuiltPaths paths; if (all) { if (installables.size()) throw UsageError("'--all' does not expect arguments"); // XXX: Only uses opaque paths, ignores all the realisations for (auto & p : store->queryAllValidPaths()) paths.emplace_back(BuiltPath::Opaque{p}); } else { paths = Installable::toBuiltPaths(getEvalStore(), store, realiseMode, operateOn, installables); if (recursive) { // XXX: This only computes the store path closure, ignoring // intermediate realisations StorePathSet pathsRoots, pathsClosure; for (auto & root : paths) { auto rootFromThis = root.outPaths(); pathsRoots.insert(rootFromThis.begin(), rootFromThis.end()); } store->computeFSClosure(pathsRoots, pathsClosure); for (auto & path : pathsClosure) paths.emplace_back(BuiltPath::Opaque{path}); } } run(store, std::move(paths)); } StorePathsCommand::StorePathsCommand(bool recursive) : BuiltPathsCommand(recursive) { } void StorePathsCommand::run(ref<Store> store, BuiltPaths && paths) { StorePathSet storePaths; for (auto & builtPath : paths) for (auto & p : builtPath.outPaths()) storePaths.insert(p); auto sorted = store->topoSortPaths(storePaths); std::reverse(sorted.begin(), sorted.end()); run(store, std::move(sorted)); } void StorePathCommand::run(ref<Store> store, StorePaths && storePaths) { if (storePaths.size() != 1) throw UsageError("this command requires exactly one store path"); run(store, *storePaths.begin()); } MixProfile::MixProfile() { addFlag( {.longName = "profile", .description = "The profile to operate on.", .labels = {"path"}, .handler = {&profile}, .completer = completePath}); } void MixProfile::updateProfile(const StorePath & storePath) { if (!profile) return; auto store = getStore().dynamic_pointer_cast<LocalFSStore>(); if (!store) throw Error("'--profile' is not supported for this Nix store"); auto profile2 = absPath(*profile); switchLink(profile2, createGeneration(*store, profile2, storePath)); } void MixProfile::updateProfile(const BuiltPaths & buildables) { if (!profile) return; StorePaths result; for (auto & buildable : buildables) { std::visit( overloaded{ [&](const BuiltPath::Opaque & bo) { result.push_back(bo.path); }, [&](const BuiltPath::Built & bfd) { for (auto & output : bfd.outputs) { result.push_back(output.second); } }, }, buildable.raw()); } if (result.size() != 1) throw UsageError( "'--profile' requires that the arguments produce a single store path, but there are %d", result.size()); updateProfile(result[0]); } MixDefaultProfile::MixDefaultProfile() { profile = getDefaultProfile(); } MixEnvironment::MixEnvironment() : ignoreEnvironment(false) { addFlag({ .longName = "ignore-env", .aliases = {"ignore-environment"}, .shortName = 'i', .description = "Clear the entire environment, except for those specified with `--keep-env-var`.", .category = environmentVariablesCategory, .handler = {&ignoreEnvironment, true}, }); addFlag({ .longName = "keep-env-var", .aliases = {"keep"}, .shortName = 'k', .description = "Keep the environment variable *name*, when using `--ignore-env`.", .category = environmentVariablesCategory, .labels = {"name"}, .handler = {[&](std::string s) { keepVars.insert(s); }}, }); addFlag({ .longName = "unset-env-var", .aliases = {"unset"}, .shortName = 'u', .description = "Unset the environment variable *name*.", .category = environmentVariablesCategory, .labels = {"name"}, .handler = {[&](std::string name) { if (setVars.contains(name)) throw UsageError("Cannot unset environment variable '%s' that is set with '%s'", name, "--set-env-var"); unsetVars.insert(name); }}, }); addFlag({ .longName = "set-env-var", .shortName = 's', .description = "Sets an environment variable *name* with *value*.", .category = environmentVariablesCategory, .labels = {"name", "value"}, .handler = {[&](std::string name, std::string value) { if (unsetVars.contains(name)) throw UsageError( "Cannot set environment variable '%s' that is unset with '%s'", name, "--unset-env-var"); if (setVars.contains(name)) throw UsageError( "Duplicate definition of environment variable '%s' with '%s' is ambiguous", name, "--set-env-var"); setVars.insert_or_assign(name, value); }}, }); } void MixEnvironment::setEnviron() { if (ignoreEnvironment && !unsetVars.empty()) throw UsageError("--unset-env-var does not make sense with --ignore-env"); if (!ignoreEnvironment && !keepVars.empty()) throw UsageError("--keep-env-var does not make sense without --ignore-env"); auto env = getEnv(); if (ignoreEnvironment) std::erase_if(env, [&](const auto & var) { return !keepVars.contains(var.first); }); for (const auto & [name, value] : setVars) env[name] = value; if (!unsetVars.empty()) std::erase_if(env, [&](const auto & var) { return unsetVars.contains(var.first); }); replaceEnv(env); return; } }
10,520
C++
.cc
312
26.807692
120
0.611308
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,974
installables.cc
NixOS_nix/src/libcmd/installables.cc
#include "globals.hh" #include "installables.hh" #include "installable-derived-path.hh" #include "installable-attr-path.hh" #include "installable-flake.hh" #include "outputs-spec.hh" #include "users.hh" #include "util.hh" #include "command.hh" #include "attr-path.hh" #include "common-eval-args.hh" #include "derivations.hh" #include "eval-inline.hh" #include "eval.hh" #include "eval-settings.hh" #include "get-drvs.hh" #include "store-api.hh" #include "shared.hh" #include "flake/flake.hh" #include "eval-cache.hh" #include "url.hh" #include "registry.hh" #include "build-result.hh" #include <regex> #include <queue> #include <nlohmann/json.hpp> #include "strings-inline.hh" namespace nix { namespace fs { using namespace std::filesystem; } void completeFlakeInputPath( AddCompletions & completions, ref<EvalState> evalState, const std::vector<FlakeRef> & flakeRefs, std::string_view prefix) { for (auto & flakeRef : flakeRefs) { auto flake = flake::getFlake(*evalState, flakeRef, true); for (auto & input : flake.inputs) if (hasPrefix(input.first, prefix)) completions.add(input.first); } } MixFlakeOptions::MixFlakeOptions() { auto category = "Common flake-related options"; addFlag({ .longName = "recreate-lock-file", .description = R"( Recreate the flake's lock file from scratch. > **DEPRECATED** > > Use [`nix flake update`](@docroot@/command-ref/new-cli/nix3-flake-update.md) instead. )", .category = category, .handler = {[&]() { lockFlags.recreateLockFile = true; warn("'--recreate-lock-file' is deprecated and will be removed in a future version; use 'nix flake update' instead."); }} }); addFlag({ .longName = "no-update-lock-file", .description = "Do not allow any updates to the flake's lock file.", .category = category, .handler = {&lockFlags.updateLockFile, false} }); addFlag({ .longName = "no-write-lock-file", .description = "Do not write the flake's newly generated lock file.", .category = category, .handler = {&lockFlags.writeLockFile, false} }); addFlag({ .longName = "no-registries", .description = R"( Don't allow lookups in the flake registries. > **DEPRECATED** > > Use [`--no-use-registries`](@docroot@/command-ref/conf-file.md#conf-use-registries) instead. )", .category = category, .handler = {[&]() { lockFlags.useRegistries = false; warn("'--no-registries' is deprecated; use '--no-use-registries'"); }} }); addFlag({ .longName = "commit-lock-file", .description = "Commit changes to the flake's lock file.", .category = category, .handler = {&lockFlags.commitLockFile, true} }); addFlag({ .longName = "update-input", .description = R"( Update a specific flake input (ignoring its previous entry in the lock file). > **DEPRECATED** > > Use [`nix flake update`](@docroot@/command-ref/new-cli/nix3-flake-update.md) instead. )", .category = category, .labels = {"input-path"}, .handler = {[&](std::string s) { warn("'--update-input' is a deprecated alias for 'flake update' and will be removed in a future version."); lockFlags.inputUpdates.insert(flake::parseInputPath(s)); }}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeInputPath(completions, getEvalState(), getFlakeRefsForCompletion(), prefix); }} }); addFlag({ .longName = "override-input", .description = "Override a specific flake input (e.g. `dwarffs/nixpkgs`). This implies `--no-write-lock-file`.", .category = category, .labels = {"input-path", "flake-url"}, .handler = {[&](std::string inputPath, std::string flakeRef) { lockFlags.writeLockFile = false; lockFlags.inputOverrides.insert_or_assign( flake::parseInputPath(inputPath), parseFlakeRef(fetchSettings, flakeRef, absPath(getCommandBaseDir()), true)); }}, .completer = {[&](AddCompletions & completions, size_t n, std::string_view prefix) { if (n == 0) { completeFlakeInputPath(completions, getEvalState(), getFlakeRefsForCompletion(), prefix); } else if (n == 1) { completeFlakeRef(completions, getEvalState()->store, prefix); } }} }); addFlag({ .longName = "reference-lock-file", .description = "Read the given lock file instead of `flake.lock` within the top-level flake.", .category = category, .labels = {"flake-lock-path"}, .handler = {[&](std::string lockFilePath) { lockFlags.referenceLockFilePath = {getFSSourceAccessor(), CanonPath(absPath(lockFilePath))}; }}, .completer = completePath }); addFlag({ .longName = "output-lock-file", .description = "Write the given lock file instead of `flake.lock` within the top-level flake.", .category = category, .labels = {"flake-lock-path"}, .handler = {[&](std::string lockFilePath) { lockFlags.outputLockFilePath = lockFilePath; }}, .completer = completePath }); addFlag({ .longName = "inputs-from", .description = "Use the inputs of the specified flake as registry entries.", .category = category, .labels = {"flake-url"}, .handler = {[&](std::string flakeRef) { auto evalState = getEvalState(); auto flake = flake::lockFlake( flakeSettings, *evalState, parseFlakeRef(fetchSettings, flakeRef, absPath(getCommandBaseDir())), { .writeLockFile = false }); for (auto & [inputName, input] : flake.lockFile.root->inputs) { auto input2 = flake.lockFile.findInput({inputName}); // resolve 'follows' nodes if (auto input3 = std::dynamic_pointer_cast<const flake::LockedNode>(input2)) { overrideRegistry( fetchers::Input::fromAttrs(fetchSettings, {{"type","indirect"}, {"id", inputName}}), input3->lockedRef.input, {}); } } }}, .completer = {[&](AddCompletions & completions, size_t, std::string_view prefix) { completeFlakeRef(completions, getEvalState()->store, prefix); }} }); } SourceExprCommand::SourceExprCommand() { addFlag({ .longName = "file", .shortName = 'f', .description = "Interpret [*installables*](@docroot@/command-ref/new-cli/nix.md#installables) as attribute paths relative to the Nix expression stored in *file*. " "If *file* is the character -, then a Nix expression will be read from standard input. " "Implies `--impure`.", .category = installablesCategory, .labels = {"file"}, .handler = {&file}, .completer = completePath }); addFlag({ .longName = "expr", .description = "Interpret [*installables*](@docroot@/command-ref/new-cli/nix.md#installables) as attribute paths relative to the Nix expression *expr*.", .category = installablesCategory, .labels = {"expr"}, .handler = {&expr} }); } MixReadOnlyOption::MixReadOnlyOption() { addFlag({ .longName = "read-only", .description = "Do not instantiate each evaluated derivation. " "This improves performance, but can cause errors when accessing " "store paths of derivations during evaluation.", .handler = {&settings.readOnlyMode, true}, }); } Strings SourceExprCommand::getDefaultFlakeAttrPaths() { return { "packages." + settings.thisSystem.get() + ".default", "defaultPackage." + settings.thisSystem.get() }; } Strings SourceExprCommand::getDefaultFlakeAttrPathPrefixes() { return { // As a convenience, look for the attribute in // 'outputs.packages'. "packages." + settings.thisSystem.get() + ".", // As a temporary hack until Nixpkgs is properly converted // to provide a clean 'packages' set, look in 'legacyPackages'. "legacyPackages." + settings.thisSystem.get() + "." }; } Args::CompleterClosure SourceExprCommand::getCompleteInstallable() { return [this](AddCompletions & completions, size_t, std::string_view prefix) { completeInstallable(completions, prefix); }; } void SourceExprCommand::completeInstallable(AddCompletions & completions, std::string_view prefix) { try { if (file) { completions.setType(AddCompletions::Type::Attrs); evalSettings.pureEval = false; auto state = getEvalState(); auto e = state->parseExprFromFile( resolveExprPath( lookupFileArg(*state, *file))); Value root; state->eval(e, root); auto autoArgs = getAutoArgs(*state); std::string prefix_ = std::string(prefix); auto sep = prefix_.rfind('.'); std::string searchWord; if (sep != std::string::npos) { searchWord = prefix_.substr(sep + 1, std::string::npos); prefix_ = prefix_.substr(0, sep); } else { searchWord = prefix_; prefix_ = ""; } auto [v, pos] = findAlongAttrPath(*state, prefix_, *autoArgs, root); Value &v1(*v); state->forceValue(v1, pos); Value v2; state->autoCallFunction(*autoArgs, v1, v2); if (v2.type() == nAttrs) { for (auto & i : *v2.attrs()) { std::string_view name = state->symbols[i.name]; if (name.find(searchWord) == 0) { if (prefix_ == "") completions.add(std::string(name)); else completions.add(prefix_ + "." + name); } } } } else { completeFlakeRefWithFragment( completions, getEvalState(), lockFlags, getDefaultFlakeAttrPathPrefixes(), getDefaultFlakeAttrPaths(), prefix); } } catch (EvalError&) { // Don't want eval errors to mess-up with the completion engine, so let's just swallow them } } void completeFlakeRefWithFragment( AddCompletions & completions, ref<EvalState> evalState, flake::LockFlags lockFlags, Strings attrPathPrefixes, const Strings & defaultFlakeAttrPaths, std::string_view prefix) { /* Look for flake output attributes that match the prefix. */ try { auto hash = prefix.find('#'); if (hash == std::string::npos) { completeFlakeRef(completions, evalState->store, prefix); } else { completions.setType(AddCompletions::Type::Attrs); auto fragment = prefix.substr(hash + 1); std::string prefixRoot = ""; if (fragment.starts_with(".")){ fragment = fragment.substr(1); prefixRoot = "."; } auto flakeRefS = std::string(prefix.substr(0, hash)); // TODO: ideally this would use the command base directory instead of assuming ".". auto flakeRef = parseFlakeRef(fetchSettings, expandTilde(flakeRefS), fs::current_path().string()); auto evalCache = openEvalCache(*evalState, std::make_shared<flake::LockedFlake>(lockFlake( flakeSettings, *evalState, flakeRef, lockFlags))); auto root = evalCache->getRoot(); if (prefixRoot == "."){ attrPathPrefixes.clear(); } /* Complete 'fragment' relative to all the attrpath prefixes as well as the root of the flake. */ attrPathPrefixes.push_back(""); for (auto & attrPathPrefixS : attrPathPrefixes) { auto attrPathPrefix = parseAttrPath(*evalState, attrPathPrefixS); auto attrPathS = attrPathPrefixS + std::string(fragment); auto attrPath = parseAttrPath(*evalState, attrPathS); std::string lastAttr; if (!attrPath.empty() && !hasSuffix(attrPathS, ".")) { lastAttr = evalState->symbols[attrPath.back()]; attrPath.pop_back(); } auto attr = root->findAlongAttrPath(attrPath); if (!attr) continue; for (auto & attr2 : (*attr)->getAttrs()) { if (hasPrefix(evalState->symbols[attr2], lastAttr)) { auto attrPath2 = (*attr)->getAttrPath(attr2); /* Strip the attrpath prefix. */ attrPath2.erase(attrPath2.begin(), attrPath2.begin() + attrPathPrefix.size()); // FIXME: handle names with dots completions.add(flakeRefS + "#" + prefixRoot + concatStringsSep(".", evalState->symbols.resolve(attrPath2))); } } } /* And add an empty completion for the default attrpaths. */ if (fragment.empty()) { for (auto & attrPath : defaultFlakeAttrPaths) { auto attr = root->findAlongAttrPath(parseAttrPath(*evalState, attrPath)); if (!attr) continue; completions.add(flakeRefS + "#" + prefixRoot); } } } } catch (Error & e) { warn(e.msg()); } } void completeFlakeRef(AddCompletions & completions, ref<Store> store, std::string_view prefix) { if (!experimentalFeatureSettings.isEnabled(Xp::Flakes)) return; if (prefix == "") completions.add("."); Args::completeDir(completions, 0, prefix); /* Look for registry entries that match the prefix. */ for (auto & registry : fetchers::getRegistries(fetchSettings, store)) { for (auto & entry : registry->entries) { auto from = entry.from.to_string(); if (!hasPrefix(prefix, "flake:") && hasPrefix(from, "flake:")) { std::string from2(from, 6); if (hasPrefix(from2, prefix)) completions.add(from2); } else { if (hasPrefix(from, prefix)) completions.add(from); } } } } DerivedPathWithInfo Installable::toDerivedPath() { auto buildables = toDerivedPaths(); if (buildables.size() != 1) throw Error("installable '%s' evaluates to %d derivations, where only one is expected", what(), buildables.size()); return std::move(buildables[0]); } static StorePath getDeriver( ref<Store> store, const Installable & i, const StorePath & drvPath) { auto derivers = store->queryValidDerivers(drvPath); if (derivers.empty()) throw Error("'%s' does not have a known deriver", i.what()); // FIXME: use all derivers? return *derivers.begin(); } ref<eval_cache::EvalCache> openEvalCache( EvalState & state, std::shared_ptr<flake::LockedFlake> lockedFlake) { auto fingerprint = evalSettings.useEvalCache && evalSettings.pureEval ? lockedFlake->getFingerprint(state.store) : std::nullopt; auto rootLoader = [&state, lockedFlake]() { /* For testing whether the evaluation cache is complete. */ if (getEnv("NIX_ALLOW_EVAL").value_or("1") == "0") throw Error("not everything is cached, but evaluation is not allowed"); auto vFlake = state.allocValue(); flake::callFlake(state, *lockedFlake, *vFlake); state.forceAttrs(*vFlake, noPos, "while parsing cached flake data"); auto aOutputs = vFlake->attrs()->get(state.symbols.create("outputs")); assert(aOutputs); return aOutputs->value; }; if (fingerprint) { auto search = state.evalCaches.find(fingerprint.value()); if (search == state.evalCaches.end()) { search = state.evalCaches.emplace(fingerprint.value(), make_ref<nix::eval_cache::EvalCache>(fingerprint, state, rootLoader)).first; } return search->second; } else { return make_ref<nix::eval_cache::EvalCache>(std::nullopt, state, rootLoader); } } Installables SourceExprCommand::parseInstallables( ref<Store> store, std::vector<std::string> ss) { Installables result; if (file || expr) { if (file && expr) throw UsageError("'--file' and '--expr' are exclusive"); // FIXME: backward compatibility hack if (file) evalSettings.pureEval = false; auto state = getEvalState(); auto vFile = state->allocValue(); if (file == "-") { auto e = state->parseStdin(); state->eval(e, *vFile); } else if (file) { auto dir = absPath(getCommandBaseDir()); state->evalFile(lookupFileArg(*state, *file, &dir), *vFile); } else { Path dir = absPath(getCommandBaseDir()); auto e = state->parseExprFromString(*expr, state->rootPath(dir)); state->eval(e, *vFile); } for (auto & s : ss) { auto [prefix, extendedOutputsSpec] = ExtendedOutputsSpec::parse(s); result.push_back( make_ref<InstallableAttrPath>( InstallableAttrPath::parse( state, *this, vFile, std::move(prefix), std::move(extendedOutputsSpec)))); } } else { for (auto & s : ss) { std::exception_ptr ex; auto [prefix_, extendedOutputsSpec_] = ExtendedOutputsSpec::parse(s); // To avoid clang's pedantry auto prefix = std::move(prefix_); auto extendedOutputsSpec = std::move(extendedOutputsSpec_); if (prefix.find('/') != std::string::npos) { try { result.push_back(make_ref<InstallableDerivedPath>( InstallableDerivedPath::parse(store, prefix, extendedOutputsSpec.raw))); continue; } catch (BadStorePath &) { } catch (...) { if (!ex) ex = std::current_exception(); } } try { auto [flakeRef, fragment] = parseFlakeRefWithFragment( fetchSettings, std::string { prefix }, absPath(getCommandBaseDir())); result.push_back(make_ref<InstallableFlake>( this, getEvalState(), std::move(flakeRef), fragment, std::move(extendedOutputsSpec), getDefaultFlakeAttrPaths(), getDefaultFlakeAttrPathPrefixes(), lockFlags)); continue; } catch (...) { ex = std::current_exception(); } std::rethrow_exception(ex); } } return result; } ref<Installable> SourceExprCommand::parseInstallable( ref<Store> store, const std::string & installable) { auto installables = parseInstallables(store, {installable}); assert(installables.size() == 1); return installables.front(); } static SingleBuiltPath getBuiltPath(ref<Store> evalStore, ref<Store> store, const SingleDerivedPath & b) { return std::visit( overloaded{ [&](const SingleDerivedPath::Opaque & bo) -> SingleBuiltPath { return SingleBuiltPath::Opaque { bo.path }; }, [&](const SingleDerivedPath::Built & bfd) -> SingleBuiltPath { auto drvPath = getBuiltPath(evalStore, store, *bfd.drvPath); // Resolving this instead of `bfd` will yield the same result, but avoid duplicative work. SingleDerivedPath::Built truncatedBfd { .drvPath = makeConstantStorePathRef(drvPath.outPath()), .output = bfd.output, }; auto outputPath = resolveDerivedPath(*store, truncatedBfd, &*evalStore); return SingleBuiltPath::Built { .drvPath = make_ref<SingleBuiltPath>(std::move(drvPath)), .output = { bfd.output, outputPath }, }; }, }, b.raw()); } std::vector<BuiltPathWithResult> Installable::build( ref<Store> evalStore, ref<Store> store, Realise mode, const Installables & installables, BuildMode bMode) { std::vector<BuiltPathWithResult> res; for (auto & [_, builtPathWithResult] : build2(evalStore, store, mode, installables, bMode)) res.push_back(builtPathWithResult); return res; } static void throwBuildErrors( std::vector<KeyedBuildResult> & buildResults, const Store & store) { std::vector<KeyedBuildResult> failed; for (auto & buildResult : buildResults) { if (!buildResult.success()) { failed.push_back(buildResult); } } auto failedResult = failed.begin(); if (failedResult != failed.end()) { if (failed.size() == 1) { failedResult->rethrow(); } else { StringSet failedPaths; for (; failedResult != failed.end(); failedResult++) { if (!failedResult->errorMsg.empty()) { logError(ErrorInfo{ .level = lvlError, .msg = failedResult->errorMsg, }); } failedPaths.insert(failedResult->path.to_string(store)); } throw Error("build of %s failed", concatStringsSep(", ", quoteStrings(failedPaths))); } } } std::vector<std::pair<ref<Installable>, BuiltPathWithResult>> Installable::build2( ref<Store> evalStore, ref<Store> store, Realise mode, const Installables & installables, BuildMode bMode) { if (mode == Realise::Nothing) settings.readOnlyMode = true; struct Aux { ref<ExtraPathInfo> info; ref<Installable> installable; }; std::vector<DerivedPath> pathsToBuild; std::map<DerivedPath, std::vector<Aux>> backmap; for (auto & i : installables) { for (auto b : i->toDerivedPaths()) { pathsToBuild.push_back(b.path); backmap[b.path].push_back({.info = b.info, .installable = i}); } } std::vector<std::pair<ref<Installable>, BuiltPathWithResult>> res; switch (mode) { case Realise::Nothing: case Realise::Derivation: printMissing(store, pathsToBuild, lvlError); for (auto & path : pathsToBuild) { for (auto & aux : backmap[path]) { std::visit(overloaded { [&](const DerivedPath::Built & bfd) { auto outputs = resolveDerivedPath(*store, bfd, &*evalStore); res.push_back({aux.installable, { .path = BuiltPath::Built { .drvPath = make_ref<SingleBuiltPath>(getBuiltPath(evalStore, store, *bfd.drvPath)), .outputs = outputs, }, .info = aux.info}}); }, [&](const DerivedPath::Opaque & bo) { res.push_back({aux.installable, { .path = BuiltPath::Opaque { bo.path }, .info = aux.info}}); }, }, path.raw()); } } break; case Realise::Outputs: { if (settings.printMissing) printMissing(store, pathsToBuild, lvlInfo); auto buildResults = store->buildPathsWithResults(pathsToBuild, bMode, evalStore); throwBuildErrors(buildResults, *store); for (auto & buildResult : buildResults) { for (auto & aux : backmap[buildResult.path]) { std::visit(overloaded { [&](const DerivedPath::Built & bfd) { std::map<std::string, StorePath> outputs; for (auto & [outputName, realisation] : buildResult.builtOutputs) outputs.emplace(outputName, realisation.outPath); res.push_back({aux.installable, { .path = BuiltPath::Built { .drvPath = make_ref<SingleBuiltPath>(getBuiltPath(evalStore, store, *bfd.drvPath)), .outputs = outputs, }, .info = aux.info, .result = buildResult}}); }, [&](const DerivedPath::Opaque & bo) { res.push_back({aux.installable, { .path = BuiltPath::Opaque { bo.path }, .info = aux.info, .result = buildResult}}); }, }, buildResult.path.raw()); } } break; } default: assert(false); } return res; } BuiltPaths Installable::toBuiltPaths( ref<Store> evalStore, ref<Store> store, Realise mode, OperateOn operateOn, const Installables & installables) { if (operateOn == OperateOn::Output) { BuiltPaths res; for (auto & p : Installable::build(evalStore, store, mode, installables)) res.push_back(p.path); return res; } else { if (mode == Realise::Nothing) settings.readOnlyMode = true; BuiltPaths res; for (auto & drvPath : Installable::toDerivations(store, installables, true)) res.emplace_back(BuiltPath::Opaque{drvPath}); return res; } } StorePathSet Installable::toStorePathSet( ref<Store> evalStore, ref<Store> store, Realise mode, OperateOn operateOn, const Installables & installables) { StorePathSet outPaths; for (auto & path : toBuiltPaths(evalStore, store, mode, operateOn, installables)) { auto thisOutPaths = path.outPaths(); outPaths.insert(thisOutPaths.begin(), thisOutPaths.end()); } return outPaths; } StorePaths Installable::toStorePaths( ref<Store> evalStore, ref<Store> store, Realise mode, OperateOn operateOn, const Installables & installables) { StorePaths outPaths; for (auto & path : toBuiltPaths(evalStore, store, mode, operateOn, installables)) { auto thisOutPaths = path.outPaths(); outPaths.insert(outPaths.end(), thisOutPaths.begin(), thisOutPaths.end()); } return outPaths; } StorePath Installable::toStorePath( ref<Store> evalStore, ref<Store> store, Realise mode, OperateOn operateOn, ref<Installable> installable) { auto paths = toStorePathSet(evalStore, store, mode, operateOn, {installable}); if (paths.size() != 1) throw Error("argument '%s' should evaluate to one store path", installable->what()); return *paths.begin(); } StorePathSet Installable::toDerivations( ref<Store> store, const Installables & installables, bool useDeriver) { StorePathSet drvPaths; for (const auto & i : installables) for (const auto & b : i->toDerivedPaths()) std::visit(overloaded { [&](const DerivedPath::Opaque & bo) { drvPaths.insert( bo.path.isDerivation() ? bo.path : useDeriver ? getDeriver(store, *i, bo.path) : throw Error("argument '%s' did not evaluate to a derivation", i->what())); }, [&](const DerivedPath::Built & bfd) { drvPaths.insert(resolveDerivedPath(*store, *bfd.drvPath)); }, }, b.path.raw()); return drvPaths; } RawInstallablesCommand::RawInstallablesCommand() { addFlag({ .longName = "stdin", .description = "Read installables from the standard input. No default installable applied.", .handler = {&readFromStdIn, true} }); expectArgs({ .label = "installables", .handler = {&rawInstallables}, .completer = getCompleteInstallable(), }); } void RawInstallablesCommand::applyDefaultInstallables(std::vector<std::string> & rawInstallables) { if (rawInstallables.empty()) { // FIXME: commands like "nix profile install" should not have a // default, probably. rawInstallables.push_back("."); } } std::vector<FlakeRef> RawInstallablesCommand::getFlakeRefsForCompletion() { applyDefaultInstallables(rawInstallables); std::vector<FlakeRef> res; res.reserve(rawInstallables.size()); for (auto i : rawInstallables) res.push_back(parseFlakeRefWithFragment( fetchSettings, expandTilde(i), absPath(getCommandBaseDir())).first); return res; } void RawInstallablesCommand::run(ref<Store> store) { if (readFromStdIn && !isatty(STDIN_FILENO)) { std::string word; while (std::cin >> word) { rawInstallables.emplace_back(std::move(word)); } } else { applyDefaultInstallables(rawInstallables); } run(store, std::move(rawInstallables)); } std::vector<FlakeRef> InstallableCommand::getFlakeRefsForCompletion() { return { parseFlakeRefWithFragment( fetchSettings, expandTilde(_installable), absPath(getCommandBaseDir())).first }; } void InstallablesCommand::run(ref<Store> store, std::vector<std::string> && rawInstallables) { auto installables = parseInstallables(store, rawInstallables); run(store, std::move(installables)); } InstallableCommand::InstallableCommand() : SourceExprCommand() { expectArgs({ .label = "installable", .optional = true, .handler = {&_installable}, .completer = getCompleteInstallable(), }); } void InstallableCommand::run(ref<Store> store) { auto installable = parseInstallable(store, _installable); run(store, std::move(installable)); } void BuiltPathsCommand::applyDefaultInstallables(std::vector<std::string> & rawInstallables) { if (rawInstallables.empty() && !all) rawInstallables.push_back("."); } }
31,288
C++
.cc
812
28.511084
161
0.575822
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,975
installable-value.cc
NixOS_nix/src/libcmd/installable-value.cc
#include "installable-value.hh" #include "eval-cache.hh" #include "fetch-to-store.hh" namespace nix { std::vector<ref<eval_cache::AttrCursor>> InstallableValue::getCursors(EvalState & state) { auto evalCache = std::make_shared<nix::eval_cache::EvalCache>(std::nullopt, state, [&]() { return toValue(state).first; }); return {evalCache->getRoot()}; } ref<eval_cache::AttrCursor> InstallableValue::getCursor(EvalState & state) { /* Although getCursors should return at least one element, in case it doesn't, bound check to avoid an undefined behavior for vector[0] */ return getCursors(state).at(0); } static UsageError nonValueInstallable(Installable & installable) { return UsageError("installable '%s' does not correspond to a Nix language value", installable.what()); } InstallableValue & InstallableValue::require(Installable & installable) { auto * castedInstallable = dynamic_cast<InstallableValue *>(&installable); if (!castedInstallable) throw nonValueInstallable(installable); return *castedInstallable; } ref<InstallableValue> InstallableValue::require(ref<Installable> installable) { auto castedInstallable = installable.dynamic_pointer_cast<InstallableValue>(); if (!castedInstallable) throw nonValueInstallable(*installable); return ref { castedInstallable }; } std::optional<DerivedPathWithInfo> InstallableValue::trySinglePathToDerivedPaths(Value & v, const PosIdx pos, std::string_view errorCtx) { if (v.type() == nPath) { auto storePath = fetchToStore(*state->store, v.path(), FetchMode::Copy); return {{ .path = DerivedPath::Opaque { .path = std::move(storePath), }, .info = make_ref<ExtraPathInfo>(), }}; } else if (v.type() == nString) { return {{ .path = DerivedPath::fromSingle( state->coerceToSingleDerivedPath(pos, v, errorCtx)), .info = make_ref<ExtraPathInfo>(), }}; } else return std::nullopt; } }
2,073
C++
.cc
58
30.448276
136
0.686783
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,976
editor-for.cc
NixOS_nix/src/libcmd/editor-for.cc
#include "editor-for.hh" #include "environment-variables.hh" #include "source-path.hh" namespace nix { Strings editorFor(const SourcePath & file, uint32_t line) { auto path = file.getPhysicalPath(); if (!path) throw Error("cannot open '%s' in an editor because it has no physical path", file); auto editor = getEnv("EDITOR").value_or("cat"); auto args = tokenizeString<Strings>(editor); if (line > 0 && ( editor.find("emacs") != std::string::npos || editor.find("nano") != std::string::npos || editor.find("vim") != std::string::npos || editor.find("kak") != std::string::npos)) args.push_back(fmt("+%d", line)); args.push_back(path->string()); return args; } }
741
C++
.cc
21
30.52381
91
0.62901
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,977
command-installable-value.cc
NixOS_nix/src/libcmd/command-installable-value.cc
#include "command-installable-value.hh" namespace nix { void InstallableValueCommand::run(ref<Store> store, ref<Installable> installable) { auto installableValue = InstallableValue::require(installable); run(store, installableValue); } }
249
C++
.cc
8
28.75
81
0.798319
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,978
network-proxy.cc
NixOS_nix/src/libcmd/network-proxy.cc
#include "network-proxy.hh" #include <algorithm> #include "environment-variables.hh" namespace nix { static const StringSet lowercaseVariables{"http_proxy", "https_proxy", "ftp_proxy", "all_proxy", "no_proxy"}; static StringSet getAllVariables() { StringSet variables = lowercaseVariables; for (const auto & variable : lowercaseVariables) { std::string upperVariable; std::transform( variable.begin(), variable.end(), upperVariable.begin(), [](unsigned char c) { return std::toupper(c); }); variables.insert(std::move(upperVariable)); } return variables; } const StringSet networkProxyVariables = getAllVariables(); static StringSet getExcludingNoProxyVariables() { static const StringSet excludeVariables{"no_proxy", "NO_PROXY"}; StringSet variables; std::set_difference( networkProxyVariables.begin(), networkProxyVariables.end(), excludeVariables.begin(), excludeVariables.end(), std::inserter(variables, variables.begin())); return variables; } static const StringSet excludingNoProxyVariables = getExcludingNoProxyVariables(); bool haveNetworkProxyConnection() { for (const auto & variable : excludingNoProxyVariables) { if (getEnv(variable).has_value()) { return true; } } return false; } }
1,355
C++
.cc
40
28.925
118
0.710345
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,979
misc-store-flags.cc
NixOS_nix/src/libcmd/misc-store-flags.cc
#include "misc-store-flags.hh" namespace nix::flag { static void hashFormatCompleter(AddCompletions & completions, size_t index, std::string_view prefix) { for (auto & format : hashFormats) { if (hasPrefix(format, prefix)) { completions.add(format); } } } Args::Flag hashFormatWithDefault(std::string && longName, HashFormat * hf) { assert(*hf == nix::HashFormat::SRI); return Args::Flag { .longName = std::move(longName), .description = "Hash format (`base16`, `nix32`, `base64`, `sri`). Default: `sri`.", .labels = {"hash-format"}, .handler = {[hf](std::string s) { *hf = parseHashFormat(s); }}, .completer = hashFormatCompleter, }; } Args::Flag hashFormatOpt(std::string && longName, std::optional<HashFormat> * ohf) { return Args::Flag { .longName = std::move(longName), .description = "Hash format (`base16`, `nix32`, `base64`, `sri`).", .labels = {"hash-format"}, .handler = {[ohf](std::string s) { *ohf = std::optional<HashFormat>{parseHashFormat(s)}; }}, .completer = hashFormatCompleter, }; } static void hashAlgoCompleter(AddCompletions & completions, size_t index, std::string_view prefix) { for (auto & algo : hashAlgorithms) if (hasPrefix(algo, prefix)) completions.add(algo); } Args::Flag hashAlgo(std::string && longName, HashAlgorithm * ha) { return Args::Flag { .longName = std::move(longName), .description = "Hash algorithm (`md5`, `sha1`, `sha256`, or `sha512`).", .labels = {"hash-algo"}, .handler = {[ha](std::string s) { *ha = parseHashAlgo(s); }}, .completer = hashAlgoCompleter, }; } Args::Flag hashAlgoOpt(std::string && longName, std::optional<HashAlgorithm> * oha) { return Args::Flag { .longName = std::move(longName), .description = "Hash algorithm (`md5`, `sha1`, `sha256`, or `sha512`). Can be omitted for SRI hashes.", .labels = {"hash-algo"}, .handler = {[oha](std::string s) { *oha = std::optional<HashAlgorithm>{parseHashAlgo(s)}; }}, .completer = hashAlgoCompleter, }; } Args::Flag fileIngestionMethod(FileIngestionMethod * method) { return Args::Flag { .longName = "mode", // FIXME indentation carefully made for context, this is messed up. .description = R"( How to compute the hash of the input. One of: - `nar` (the default): Serialises the input as a [Nix Archive](@docroot@/store/file-system-object/content-address.md#serial-nix-archive) and passes that to the hash function. - `flat`: Assumes that the input is a single file and [directly passes](@docroot@/store/file-system-object/content-address.md#serial-flat) it to the hash function. )", .labels = {"file-ingestion-method"}, .handler = {[method](std::string s) { *method = parseFileIngestionMethod(s); }}, }; } Args::Flag contentAddressMethod(ContentAddressMethod * method) { return Args::Flag { .longName = "mode", // FIXME indentation carefully made for context, this is messed up. .description = R"( How to compute the content-address of the store object. One of: - [`nar`](@docroot@/store/store-object/content-address.md#method-nix-archive) (the default): Serialises the input as a [Nix Archive](@docroot@/store/file-system-object/content-address.md#serial-nix-archive) and passes that to the hash function. - [`flat`](@docroot@/store/store-object/content-address.md#method-flat): Assumes that the input is a single file and [directly passes](@docroot@/store/file-system-object/content-address.md#serial-flat) it to the hash function. - [`text`](@docroot@/store/store-object/content-address.md#method-text): Like `flat`, but used for [derivations](@docroot@/glossary.md#store-derivation) serialized in store object and [`builtins.toFile`](@docroot@/language/builtins.html#builtins-toFile). For advanced use-cases only; for regular usage prefer `nar` and `flat`. )", .labels = {"content-address-method"}, .handler = {[method](std::string s) { *method = ContentAddressMethod::parse(s); }}, }; } }
4,559
C++
.cc
120
30.666667
115
0.612342
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,980
markdown.cc
NixOS_nix/src/libcmd/markdown.cc
#include "markdown.hh" #include "environment-variables.hh" #include "error.hh" #include "finally.hh" #include "terminal.hh" #if HAVE_LOWDOWN # include <sys/queue.h> # include <lowdown.h> #endif namespace nix { #if HAVE_LOWDOWN static std::string doRenderMarkdownToTerminal(std::string_view markdown) { int windowWidth = getWindowSize().second; struct lowdown_opts opts { .type = LOWDOWN_TERM, .maxdepth = 20, .cols = (size_t) std::max(windowWidth - 5, 60), .hmargin = 0, .vmargin = 0, .feat = LOWDOWN_COMMONMARK | LOWDOWN_FENCED | LOWDOWN_DEFLIST | LOWDOWN_TABLES, .oflags = LOWDOWN_TERM_NOLINK, }; auto doc = lowdown_doc_new(&opts); if (!doc) throw Error("cannot allocate Markdown document"); Finally freeDoc([&]() { lowdown_doc_free(doc); }); size_t maxn = 0; auto node = lowdown_doc_parse(doc, &maxn, markdown.data(), markdown.size(), nullptr); if (!node) throw Error("cannot parse Markdown document"); Finally freeNode([&]() { lowdown_node_free(node); }); auto renderer = lowdown_term_new(&opts); if (!renderer) throw Error("cannot allocate Markdown renderer"); Finally freeRenderer([&]() { lowdown_term_free(renderer); }); auto buf = lowdown_buf_new(16384); if (!buf) throw Error("cannot allocate Markdown output buffer"); Finally freeBuffer([&]() { lowdown_buf_free(buf); }); int rndr_res = lowdown_term_rndr(buf, renderer, node); if (!rndr_res) throw Error("allocation error while rendering Markdown"); return filterANSIEscapes(std::string(buf->data, buf->size), !isTTY()); } std::string renderMarkdownToTerminal(std::string_view markdown) { if (auto e = getEnv("_NIX_TEST_RAW_MARKDOWN"); e && *e == "1") return std::string(markdown); else return doRenderMarkdownToTerminal(markdown); } #else std::string renderMarkdownToTerminal(std::string_view markdown) { return std::string(markdown); } #endif } // namespace nix
2,043
C++
.cc
60
29.433333
89
0.667513
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
10,981
common-protocol.cc
NixOS_nix/src/libstore-tests/common-protocol.cc
#include <regex> #include <nlohmann/json.hpp> #include <gtest/gtest.h> #include "common-protocol.hh" #include "common-protocol-impl.hh" #include "build-result.hh" #include "tests/protocol.hh" #include "tests/characterization.hh" namespace nix { const char commonProtoDir[] = "common-protocol"; class CommonProtoTest : public ProtoTest<CommonProto, commonProtoDir> { public: /** * Golden test for `T` reading */ template<typename T> void readProtoTest(PathView testStem, const T & expected) { CharacterizationTest::readTest(testStem, [&](const auto & encoded) { T got = ({ StringSource from { encoded }; CommonProto::Serialise<T>::read( *store, CommonProto::ReadConn { .from = from }); }); ASSERT_EQ(got, expected); }); } /** * Golden test for `T` write */ template<typename T> void writeProtoTest(PathView testStem, const T & decoded) { CharacterizationTest::writeTest(testStem, [&]() -> std::string { StringSink to; CommonProto::Serialise<T>::write( *store, CommonProto::WriteConn { .to = to }, decoded); return to.s; }); } }; #define CHARACTERIZATION_TEST(NAME, STEM, VALUE) \ TEST_F(CommonProtoTest, NAME ## _read) { \ readProtoTest(STEM, VALUE); \ } \ TEST_F(CommonProtoTest, NAME ## _write) { \ writeProtoTest(STEM, VALUE); \ } CHARACTERIZATION_TEST( string, "string", (std::tuple<std::string, std::string, std::string, std::string, std::string> { "", "hi", "white rabbit", "大白兔", "oh no \0\0\0 what was that!", })) CHARACTERIZATION_TEST( storePath, "store-path", (std::tuple<StorePath, StorePath> { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo-bar" }, })) CHARACTERIZATION_TEST( contentAddress, "content-address", (std::tuple<ContentAddress, ContentAddress, ContentAddress> { ContentAddress { .method = ContentAddressMethod::Raw::Text, .hash = hashString(HashAlgorithm::SHA256, "Derive(...)"), }, ContentAddress { .method = ContentAddressMethod::Raw::Flat, .hash = hashString(HashAlgorithm::SHA1, "blob blob..."), }, ContentAddress { .method = ContentAddressMethod::Raw::NixArchive, .hash = hashString(HashAlgorithm::SHA256, "(...)"), }, })) CHARACTERIZATION_TEST( drvOutput, "drv-output", (std::tuple<DrvOutput, DrvOutput> { { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "quux", }, })) CHARACTERIZATION_TEST( realisation, "realisation", (std::tuple<Realisation, Realisation> { Realisation { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, .signatures = { "asdf", "qwer" }, }, Realisation { .id = { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, .signatures = { "asdf", "qwer" }, .dependentRealisations = { { DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "quux", }, StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, }, }, })) CHARACTERIZATION_TEST( vector, "vector", (std::tuple<std::vector<std::string>, std::vector<std::string>, std::vector<std::string>, std::vector<std::vector<std::string>>> { { }, { "" }, { "", "foo", "bar" }, { {}, { "" }, { "", "1", "2" } }, })) CHARACTERIZATION_TEST( set, "set", (std::tuple<std::set<std::string>, std::set<std::string>, std::set<std::string>, std::set<std::set<std::string>>> { { }, { "" }, { "", "foo", "bar" }, { {}, { "" }, { "", "1", "2" } }, })) CHARACTERIZATION_TEST( optionalStorePath, "optional-store-path", (std::tuple<std::optional<StorePath>, std::optional<StorePath>> { std::nullopt, std::optional { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo-bar" }, }, })) CHARACTERIZATION_TEST( optionalContentAddress, "optional-content-address", (std::tuple<std::optional<ContentAddress>, std::optional<ContentAddress>> { std::nullopt, std::optional { ContentAddress { .method = ContentAddressMethod::Raw::Flat, .hash = hashString(HashAlgorithm::SHA1, "blob blob..."), }, }, })) }
5,476
C++
.cc
169
23.852071
134
0.557448
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,982
ssh-store.cc
NixOS_nix/src/libstore-tests/ssh-store.cc
// FIXME: Odd failures for templates that are causing the PR to break // for now with discussion with @Ericson2314 to comment out. #if 0 # include <gtest/gtest.h> # include "ssh-store.hh" namespace nix { TEST(SSHStore, constructConfig) { SSHStoreConfig config{ "ssh", "localhost", StoreConfig::Params{ { "remote-program", // TODO #11106, no more split on space "foo bar", }, }, }; EXPECT_EQ( config.remoteProgram.get(), (Strings{ "foo", "bar", })); } TEST(MountedSSHStore, constructConfig) { MountedSSHStoreConfig config{ "mounted-ssh", "localhost", StoreConfig::Params{ { "remote-program", // TODO #11106, no more split on space "foo bar", }, }, }; EXPECT_EQ( config.remoteProgram.get(), (Strings{ "foo", "bar", })); } } #endif
1,066
C++
.cc
48
14.229167
69
0.501484
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,983
path-info.cc
NixOS_nix/src/libstore-tests/path-info.cc
#include <nlohmann/json.hpp> #include <gtest/gtest.h> #include "path-info.hh" #include "tests/characterization.hh" #include "tests/libstore.hh" namespace nix { using nlohmann::json; class PathInfoTest : public CharacterizationTest, public LibStoreTest { std::filesystem::path unitTestData = getUnitTestData() / "path-info"; std::filesystem::path goldenMaster(PathView testStem) const override { return unitTestData / (testStem + ".json"); } }; static UnkeyedValidPathInfo makeEmpty() { return { Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }; } static ValidPathInfo makeFullKeyed(const Store & store, bool includeImpureInfo) { ValidPathInfo info = ValidPathInfo { store, "foo", FixedOutputInfo { .method = FileIngestionMethod::NixArchive, .hash = hashString(HashAlgorithm::SHA256, "(...)"), .references = { .others = { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, }, .self = true, }, }, Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }; info.narSize = 34878; if (includeImpureInfo) { info.deriver = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }; info.registrationTime = 23423; info.ultimate = true; info.sigs = { "asdf", "qwer" }; } return info; } static UnkeyedValidPathInfo makeFull(const Store & store, bool includeImpureInfo) { return makeFullKeyed(store, includeImpureInfo); } #define JSON_TEST(STEM, OBJ, PURE) \ TEST_F(PathInfoTest, PathInfo_ ## STEM ## _from_json) { \ readTest(#STEM, [&](const auto & encoded_) { \ auto encoded = json::parse(encoded_); \ UnkeyedValidPathInfo got = UnkeyedValidPathInfo::fromJSON( \ *store, \ encoded); \ auto expected = OBJ; \ ASSERT_EQ(got, expected); \ }); \ } \ \ TEST_F(PathInfoTest, PathInfo_ ## STEM ## _to_json) { \ writeTest(#STEM, [&]() -> json { \ return OBJ.toJSON(*store, PURE, HashFormat::SRI); \ }, [](const auto & file) { \ return json::parse(readFile(file)); \ }, [](const auto & file, const auto & got) { \ return writeFile(file, got.dump(2) + "\n"); \ }); \ } JSON_TEST(empty_pure, makeEmpty(), false) JSON_TEST(empty_impure, makeEmpty(), true) JSON_TEST(pure, makeFull(*store, false), false) JSON_TEST(impure, makeFull(*store, true), true) TEST_F(PathInfoTest, PathInfo_full_shortRefs) { ValidPathInfo it = makeFullKeyed(*store, true); // it.references = unkeyed.references; auto refs = it.shortRefs(); ASSERT_EQ(refs.size(), 2); ASSERT_EQ(*refs.begin(), "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar"); ASSERT_EQ(*++refs.begin(), "n5wkd9frr45pa74if5gpz9j7mifg27fh-foo"); } } // namespace nix
3,760
C++
.cc
87
35.229885
83
0.496037
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,984
legacy-ssh-store.cc
NixOS_nix/src/libstore-tests/legacy-ssh-store.cc
#include <gtest/gtest.h> #include "legacy-ssh-store.hh" namespace nix { TEST(LegacySSHStore, constructConfig) { LegacySSHStoreConfig config{ "ssh", "localhost", StoreConfig::Params{ { "remote-program", // TODO #11106, no more split on space "foo bar", }, }}; EXPECT_EQ( config.remoteProgram.get(), (Strings{ "foo", "bar", })); } }
494
C++
.cc
23
13.391304
54
0.491453
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,985
references.cc
NixOS_nix/src/libstore-tests/references.cc
#include "references.hh" #include <gtest/gtest.h> namespace nix { TEST(references, scan) { std::string hash1 = "dc04vv14dak1c1r48qa0m23vr9jy8sm0"; std::string hash2 = "zc842j0rz61mjsp3h3wp5ly71ak6qgdn"; { RefScanSink scanner(StringSet{hash1}); auto s = "foobar"; scanner(s); ASSERT_EQ(scanner.getResult(), StringSet{}); } { RefScanSink scanner(StringSet{hash1}); auto s = "foobar" + hash1 + "xyzzy"; scanner(s); ASSERT_EQ(scanner.getResult(), StringSet{hash1}); } { RefScanSink scanner(StringSet{hash1, hash2}); auto s = "foobar" + hash1 + "xyzzy" + hash2; scanner(((std::string_view) s).substr(0, 10)); scanner(((std::string_view) s).substr(10, 5)); scanner(((std::string_view) s).substr(15, 5)); scanner(((std::string_view) s).substr(20)); ASSERT_EQ(scanner.getResult(), StringSet({hash1, hash2})); } { RefScanSink scanner(StringSet{hash1, hash2}); auto s = "foobar" + hash1 + "xyzzy" + hash2; for (auto & i : s) scanner(std::string(1, i)); ASSERT_EQ(scanner.getResult(), StringSet({hash1, hash2})); } } }
1,220
C++
.cc
37
26.243243
66
0.595745
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
true
false
false
true
false
false
10,986
serve-protocol.cc
NixOS_nix/src/libstore-tests/serve-protocol.cc
#include <thread> #include <regex> #include <nlohmann/json.hpp> #include <gtest/gtest.h> #include "serve-protocol.hh" #include "serve-protocol-impl.hh" #include "serve-protocol-connection.hh" #include "build-result.hh" #include "file-descriptor.hh" #include "tests/protocol.hh" #include "tests/characterization.hh" namespace nix { const char serveProtoDir[] = "serve-protocol"; struct ServeProtoTest : VersionedProtoTest<ServeProto, serveProtoDir> { /** * For serializers that don't care about the minimum version, we * used the oldest one: 1.0. */ ServeProto::Version defaultVersion = 2 << 8 | 0; }; VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, string, "string", defaultVersion, (std::tuple<std::string, std::string, std::string, std::string, std::string> { "", "hi", "white rabbit", "大白兔", "oh no \0\0\0 what was that!", })) #ifndef DOXYGEN_SKIP VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, storePath, "store-path", defaultVersion, (std::tuple<StorePath, StorePath> { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo-bar" }, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, contentAddress, "content-address", defaultVersion, (std::tuple<ContentAddress, ContentAddress, ContentAddress> { ContentAddress { .method = ContentAddressMethod::Raw::Text, .hash = hashString(HashAlgorithm::SHA256, "Derive(...)"), }, ContentAddress { .method = ContentAddressMethod::Raw::Flat, .hash = hashString(HashAlgorithm::SHA1, "blob blob..."), }, ContentAddress { .method = ContentAddressMethod::Raw::NixArchive, .hash = hashString(HashAlgorithm::SHA256, "(...)"), }, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, drvOutput, "drv-output", defaultVersion, (std::tuple<DrvOutput, DrvOutput> { { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "quux", }, })) #endif VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, realisation, "realisation", defaultVersion, (std::tuple<Realisation, Realisation> { Realisation { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, .signatures = { "asdf", "qwer" }, }, Realisation { .id = { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, .signatures = { "asdf", "qwer" }, .dependentRealisations = { { DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "quux", }, StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, }, }, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, buildResult_2_2, "build-result-2.2", 2 << 8 | 2, ({ using namespace std::literals::chrono_literals; std::tuple<BuildResult, BuildResult, BuildResult> t { BuildResult { .status = BuildResult::OutputRejected, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::NotDeterministic, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::Built, }, }; t; })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, buildResult_2_3, "build-result-2.3", 2 << 8 | 3, ({ using namespace std::literals::chrono_literals; std::tuple<BuildResult, BuildResult, BuildResult> t { BuildResult { .status = BuildResult::OutputRejected, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::NotDeterministic, .errorMsg = "no idea why", .timesBuilt = 3, .isNonDeterministic = true, .startTime = 30, .stopTime = 50, }, BuildResult { .status = BuildResult::Built, .startTime = 30, .stopTime = 50, }, }; t; })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, buildResult_2_6, "build-result-2.6", 2 << 8 | 6, ({ using namespace std::literals::chrono_literals; std::tuple<BuildResult, BuildResult, BuildResult> t { BuildResult { .status = BuildResult::OutputRejected, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::NotDeterministic, .errorMsg = "no idea why", .timesBuilt = 3, .isNonDeterministic = true, .startTime = 30, .stopTime = 50, }, BuildResult { .status = BuildResult::Built, .timesBuilt = 1, .builtOutputs = { { "foo", { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "foo", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, }, { "bar", { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "bar", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar" }, }, }, }, .startTime = 30, .stopTime = 50, #if 0 // These fields are not yet serialized. // FIXME Include in next version of protocol or document // why they are skipped. .cpuUser = std::chrono::milliseconds(500s), .cpuSystem = std::chrono::milliseconds(604s), #endif }, }; t; })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, unkeyedValidPathInfo_2_3, "unkeyed-valid-path-info-2.3", 2 << 8 | 3, (std::tuple<UnkeyedValidPathInfo, UnkeyedValidPathInfo> { ({ UnkeyedValidPathInfo info { Hash::dummy }; info.narSize = 34878; info; }), ({ UnkeyedValidPathInfo info { Hash::dummy }; info.deriver = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }; info.references = { StorePath { "g1w7hyyyy1w7hy3qg1w7hy3qgqqqqy3q-foo.drv", }, }; info.narSize = 34878; info; }), })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, unkeyedValidPathInfo_2_4, "unkeyed-valid-path-info-2.4", 2 << 8 | 4, (std::tuple<UnkeyedValidPathInfo, UnkeyedValidPathInfo> { ({ UnkeyedValidPathInfo info { Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }; info.deriver = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }; info.references = { StorePath { "g1w7hyyyy1w7hy3qg1w7hy3qgqqqqy3q-foo.drv", }, }; info.narSize = 34878; info; }), ({ ValidPathInfo info { *LibStoreTest::store, "foo", FixedOutputInfo { .method = FileIngestionMethod::NixArchive, .hash = hashString(HashAlgorithm::SHA256, "(...)"), .references = { .others = { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, }, .self = true, }, }, Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }; info.deriver = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }; info.narSize = 34878; info.sigs = { "fake-sig-1", "fake-sig-2", }, static_cast<UnkeyedValidPathInfo>(std::move(info)); }), })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, build_options_2_1, "build-options-2.1", 2 << 8 | 1, (ServeProto::BuildOptions { .maxSilentTime = 5, .buildTimeout = 6, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, build_options_2_2, "build-options-2.2", 2 << 8 | 2, (ServeProto::BuildOptions { .maxSilentTime = 5, .buildTimeout = 6, .maxLogSize = 7, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, build_options_2_3, "build-options-2.3", 2 << 8 | 3, (ServeProto::BuildOptions { .maxSilentTime = 5, .buildTimeout = 6, .maxLogSize = 7, .nrRepeats = 8, .enforceDeterminism = true, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, build_options_2_7, "build-options-2.7", 2 << 8 | 7, (ServeProto::BuildOptions { .maxSilentTime = 5, .buildTimeout = 6, .maxLogSize = 7, .nrRepeats = 8, .enforceDeterminism = false, .keepFailed = true, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, vector, "vector", defaultVersion, (std::tuple<std::vector<std::string>, std::vector<std::string>, std::vector<std::string>, std::vector<std::vector<std::string>>> { { }, { "" }, { "", "foo", "bar" }, { {}, { "" }, { "", "1", "2" } }, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, set, "set", defaultVersion, (std::tuple<std::set<std::string>, std::set<std::string>, std::set<std::string>, std::set<std::set<std::string>>> { { }, { "" }, { "", "foo", "bar" }, { {}, { "" }, { "", "1", "2" } }, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, optionalStorePath, "optional-store-path", defaultVersion, (std::tuple<std::optional<StorePath>, std::optional<StorePath>> { std::nullopt, std::optional { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo-bar" }, }, })) VERSIONED_CHARACTERIZATION_TEST( ServeProtoTest, optionalContentAddress, "optional-content-address", defaultVersion, (std::tuple<std::optional<ContentAddress>, std::optional<ContentAddress>> { std::nullopt, std::optional { ContentAddress { .method = ContentAddressMethod::Raw::Flat, .hash = hashString(HashAlgorithm::SHA1, "blob blob..."), }, }, })) TEST_F(ServeProtoTest, handshake_log) { CharacterizationTest::writeTest("handshake-to-client", [&]() -> std::string { StringSink toClientLog; Pipe toClient, toServer; toClient.create(); toServer.create(); ServeProto::Version clientResult; auto thread = std::thread([&]() { FdSink out { toServer.writeSide.get() }; FdSource in0 { toClient.readSide.get() }; TeeSource in { in0, toClientLog }; clientResult = ServeProto::BasicClientConnection::handshake( out, in, defaultVersion, "blah"); }); { FdSink out { toClient.writeSide.get() }; FdSource in { toServer.readSide.get() }; ServeProto::BasicServerConnection::handshake( out, in, defaultVersion); }; thread.join(); return std::move(toClientLog.s); }); } /// Has to be a `BufferedSink` for handshake. struct NullBufferedSink : BufferedSink { void writeUnbuffered(std::string_view data) override { } }; TEST_F(ServeProtoTest, handshake_client_replay) { CharacterizationTest::readTest("handshake-to-client", [&](std::string toClientLog) { NullBufferedSink nullSink; StringSource in { toClientLog }; auto clientResult = ServeProto::BasicClientConnection::handshake( nullSink, in, defaultVersion, "blah"); EXPECT_EQ(clientResult, defaultVersion); }); } TEST_F(ServeProtoTest, handshake_client_truncated_replay_throws) { CharacterizationTest::readTest("handshake-to-client", [&](std::string toClientLog) { for (size_t len = 0; len < toClientLog.size(); ++len) { NullBufferedSink nullSink; auto substring = toClientLog.substr(0, len); StringSource in{substring}; if (len < 8) { EXPECT_THROW( ServeProto::BasicClientConnection::handshake(nullSink, in, defaultVersion, "blah"), EndOfFile); } else { // Not sure why cannot keep on checking for `EndOfFile`. EXPECT_THROW(ServeProto::BasicClientConnection::handshake(nullSink, in, defaultVersion, "blah"), Error); } } }); } TEST_F(ServeProtoTest, handshake_client_corrupted_throws) { CharacterizationTest::readTest("handshake-to-client", [&](const std::string toClientLog) { for (size_t idx = 0; idx < toClientLog.size(); ++idx) { // corrupt a copy std::string toClientLogCorrupt = toClientLog; toClientLogCorrupt[idx] *= 4; ++toClientLogCorrupt[idx]; NullBufferedSink nullSink; StringSource in { toClientLogCorrupt }; if (idx < 4 || idx == 9) { // magic bytes don't match EXPECT_THROW( ServeProto::BasicClientConnection::handshake( nullSink, in, defaultVersion, "blah"), Error); } else if (idx < 8 || idx >= 12) { // Number out of bounds EXPECT_THROW( ServeProto::BasicClientConnection::handshake( nullSink, in, defaultVersion, "blah"), SerialisationError); } else { auto ver = ServeProto::BasicClientConnection::handshake( nullSink, in, defaultVersion, "blah"); // `std::min` of this and the other version saves us EXPECT_EQ(ver, defaultVersion); } } }); } }
15,803
C++
.cc
472
22.849576
134
0.534742
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,987
path.cc
NixOS_nix/src/libstore-tests/path.cc
#include <regex> #include <nlohmann/json.hpp> #include <gtest/gtest.h> #include <rapidcheck/gtest.h> #include "path-regex.hh" #include "store-api.hh" #include "tests/hash.hh" #include "tests/libstore.hh" #include "tests/path.hh" namespace nix { #define STORE_DIR "/nix/store/" #define HASH_PART "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q" class StorePathTest : public LibStoreTest { }; static std::regex nameRegex { std::string { nameRegexStr } }; #define TEST_DONT_PARSE(NAME, STR) \ TEST_F(StorePathTest, bad_ ## NAME) { \ std::string_view str = \ STORE_DIR HASH_PART "-" STR; \ /* ASSERT_THROW generates a duplicate goto label */ \ /* A lambda isolates those labels. */ \ [&](){ \ ASSERT_THROW( \ store->parseStorePath(str), \ BadStorePath); \ }(); \ std::string name { STR }; \ [&](){ \ ASSERT_THROW( \ nix::checkName(name), \ BadStorePathName); \ }(); \ EXPECT_FALSE(std::regex_match(name, nameRegex)); \ } TEST_DONT_PARSE(empty, "") TEST_DONT_PARSE(garbage, "&*()") TEST_DONT_PARSE(double_star, "**") TEST_DONT_PARSE(star_first, "*,foo") TEST_DONT_PARSE(star_second, "foo,*") TEST_DONT_PARSE(bang, "foo!o") TEST_DONT_PARSE(dot, ".") TEST_DONT_PARSE(dot_dot, "..") TEST_DONT_PARSE(dot_dot_dash, "..-1") TEST_DONT_PARSE(dot_dash, ".-1") TEST_DONT_PARSE(dot_dot_dash_a, "..-a") TEST_DONT_PARSE(dot_dash_a, ".-a") #undef TEST_DONT_PARSE #define TEST_DO_PARSE(NAME, STR) \ TEST_F(StorePathTest, good_ ## NAME) { \ std::string_view str = \ STORE_DIR HASH_PART "-" STR; \ auto p = store->parseStorePath(str); \ std::string name { p.name() }; \ EXPECT_EQ(p.name(), STR); \ EXPECT_TRUE(std::regex_match(name, nameRegex)); \ } // 0-9 a-z A-Z + - . _ ? = TEST_DO_PARSE(numbers, "02345") TEST_DO_PARSE(lower_case, "foo") TEST_DO_PARSE(upper_case, "FOO") TEST_DO_PARSE(plus, "foo+bar") TEST_DO_PARSE(dash, "foo-dev") TEST_DO_PARSE(underscore, "foo_bar") TEST_DO_PARSE(period, "foo.txt") TEST_DO_PARSE(question_mark, "foo?why") TEST_DO_PARSE(equals_sign, "foo=foo") TEST_DO_PARSE(dotfile, ".gitignore") TEST_DO_PARSE(triple_dot_a, "...a") TEST_DO_PARSE(triple_dot_1, "...1") TEST_DO_PARSE(triple_dot_dash, "...-") TEST_DO_PARSE(triple_dot, "...") #undef TEST_DO_PARSE #ifndef COVERAGE RC_GTEST_FIXTURE_PROP( StorePathTest, prop_regex_accept, (const StorePath & p)) { RC_ASSERT(std::regex_match(std::string { p.name() }, nameRegex)); } RC_GTEST_FIXTURE_PROP( StorePathTest, prop_round_rip, (const StorePath & p)) { RC_ASSERT(p == store->parseStorePath(store->printStorePath(p))); } RC_GTEST_FIXTURE_PROP( StorePathTest, prop_check_regex_eq_parse, ()) { static auto nameFuzzer = rc::gen::container<std::string>( rc::gen::oneOf( // alphanum, repeated to weigh heavier rc::gen::oneOf( rc::gen::inRange('0', '9'), rc::gen::inRange('a', 'z'), rc::gen::inRange('A', 'Z') ), // valid symbols rc::gen::oneOf( rc::gen::just('+'), rc::gen::just('-'), rc::gen::just('.'), rc::gen::just('_'), rc::gen::just('?'), rc::gen::just('=') ), // symbols for scary .- and ..- cases, repeated for weight rc::gen::just('.'), rc::gen::just('.'), rc::gen::just('.'), rc::gen::just('.'), rc::gen::just('-'), rc::gen::just('-'), // ascii symbol ranges rc::gen::oneOf( rc::gen::inRange(' ', '/'), rc::gen::inRange(':', '@'), rc::gen::inRange('[', '`'), rc::gen::inRange('{', '~') ), // typical whitespace rc::gen::oneOf( rc::gen::just(' '), rc::gen::just('\t'), rc::gen::just('\n'), rc::gen::just('\r') ), // some chance of control codes, non-ascii or other garbage we missed rc::gen::inRange('\0', '\xff') )); auto name = *nameFuzzer; std::string path = store->storeDir + "/575s52sh487i0ylmbs9pvi606ljdszr0-" + name; bool parsed = false; try { store->parseStorePath(path); parsed = true; } catch (const BadStorePath &) { } RC_ASSERT(parsed == std::regex_match(std::string { name }, nameRegex)); } #endif }
5,434
C++
.cc
144
29.715278
85
0.462123
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,988
machines.cc
NixOS_nix/src/libstore-tests/machines.cc
#include "machines.hh" #include "file-system.hh" #include "util.hh" #include "tests/characterization.hh" #include <gtest/gtest.h> #include <gmock/gmock-matchers.h> using testing::Contains; using testing::ElementsAre; using testing::Eq; using testing::Field; using testing::SizeIs; namespace nix::fs { using namespace std::filesystem; } using namespace nix; TEST(machines, getMachinesWithEmptyBuilders) { auto actual = Machine::parseConfig({}, ""); ASSERT_THAT(actual, SizeIs(0)); } TEST(machines, getMachinesUriOnly) { auto actual = Machine::parseConfig({"TEST_ARCH-TEST_OS"}, "nix@scratchy.labs.cs.uu.nl"); ASSERT_THAT(actual, SizeIs(1)); EXPECT_THAT(actual[0], Field(&Machine::storeUri, Eq(StoreReference::parse("ssh://nix@scratchy.labs.cs.uu.nl")))); EXPECT_THAT(actual[0], Field(&Machine::systemTypes, ElementsAre("TEST_ARCH-TEST_OS"))); EXPECT_THAT(actual[0], Field(&Machine::sshKey, SizeIs(0))); EXPECT_THAT(actual[0], Field(&Machine::maxJobs, Eq(1))); EXPECT_THAT(actual[0], Field(&Machine::speedFactor, Eq(1))); EXPECT_THAT(actual[0], Field(&Machine::supportedFeatures, SizeIs(0))); EXPECT_THAT(actual[0], Field(&Machine::mandatoryFeatures, SizeIs(0))); EXPECT_THAT(actual[0], Field(&Machine::sshPublicHostKey, SizeIs(0))); } TEST(machines, getMachinesDefaults) { auto actual = Machine::parseConfig({"TEST_ARCH-TEST_OS"}, "nix@scratchy.labs.cs.uu.nl - - - - - - -"); ASSERT_THAT(actual, SizeIs(1)); EXPECT_THAT(actual[0], Field(&Machine::storeUri, Eq(StoreReference::parse("ssh://nix@scratchy.labs.cs.uu.nl")))); EXPECT_THAT(actual[0], Field(&Machine::systemTypes, ElementsAre("TEST_ARCH-TEST_OS"))); EXPECT_THAT(actual[0], Field(&Machine::sshKey, SizeIs(0))); EXPECT_THAT(actual[0], Field(&Machine::maxJobs, Eq(1))); EXPECT_THAT(actual[0], Field(&Machine::speedFactor, Eq(1))); EXPECT_THAT(actual[0], Field(&Machine::supportedFeatures, SizeIs(0))); EXPECT_THAT(actual[0], Field(&Machine::mandatoryFeatures, SizeIs(0))); EXPECT_THAT(actual[0], Field(&Machine::sshPublicHostKey, SizeIs(0))); } MATCHER_P(AuthorityMatches, authority, "") { *result_listener << "where the authority of " << arg.render() << " is " << authority; auto * generic = std::get_if<StoreReference::Specified>(&arg.variant); if (!generic) return false; return generic->authority == authority; } TEST(machines, getMachinesWithNewLineSeparator) { auto actual = Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl\nnix@itchy.labs.cs.uu.nl"); ASSERT_THAT(actual, SizeIs(2)); EXPECT_THAT(actual, Contains(Field(&Machine::storeUri, AuthorityMatches("nix@scratchy.labs.cs.uu.nl")))); EXPECT_THAT(actual, Contains(Field(&Machine::storeUri, AuthorityMatches("nix@itchy.labs.cs.uu.nl")))); } TEST(machines, getMachinesWithSemicolonSeparator) { auto actual = Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl ; nix@itchy.labs.cs.uu.nl"); EXPECT_THAT(actual, SizeIs(2)); EXPECT_THAT(actual, Contains(Field(&Machine::storeUri, AuthorityMatches("nix@scratchy.labs.cs.uu.nl")))); EXPECT_THAT(actual, Contains(Field(&Machine::storeUri, AuthorityMatches("nix@itchy.labs.cs.uu.nl")))); } TEST(machines, getMachinesWithCorrectCompleteSingleBuilder) { auto actual = Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl i686-linux " "/home/nix/.ssh/id_scratchy_auto 8 3 kvm " "benchmark SSH+HOST+PUBLIC+KEY+BASE64+ENCODED=="); ASSERT_THAT(actual, SizeIs(1)); EXPECT_THAT(actual[0], Field(&Machine::storeUri, AuthorityMatches("nix@scratchy.labs.cs.uu.nl"))); EXPECT_THAT(actual[0], Field(&Machine::systemTypes, ElementsAre("i686-linux"))); EXPECT_THAT(actual[0], Field(&Machine::sshKey, Eq("/home/nix/.ssh/id_scratchy_auto"))); EXPECT_THAT(actual[0], Field(&Machine::maxJobs, Eq(8))); EXPECT_THAT(actual[0], Field(&Machine::speedFactor, Eq(3))); EXPECT_THAT(actual[0], Field(&Machine::supportedFeatures, ElementsAre("kvm"))); EXPECT_THAT(actual[0], Field(&Machine::mandatoryFeatures, ElementsAre("benchmark"))); EXPECT_THAT(actual[0], Field(&Machine::sshPublicHostKey, Eq("SSH+HOST+PUBLIC+KEY+BASE64+ENCODED=="))); } TEST(machines, getMachinesWithCorrectCompleteSingleBuilderWithTabColumnDelimiter) { auto actual = Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl\ti686-linux\t/home/nix/.ssh/" "id_scratchy_auto\t8\t3\tkvm\tbenchmark\tSSH+HOST+PUBLIC+" "KEY+BASE64+ENCODED=="); ASSERT_THAT(actual, SizeIs(1)); EXPECT_THAT(actual[0], Field(&Machine::storeUri, AuthorityMatches("nix@scratchy.labs.cs.uu.nl"))); EXPECT_THAT(actual[0], Field(&Machine::systemTypes, ElementsAre("i686-linux"))); EXPECT_THAT(actual[0], Field(&Machine::sshKey, Eq("/home/nix/.ssh/id_scratchy_auto"))); EXPECT_THAT(actual[0], Field(&Machine::maxJobs, Eq(8))); EXPECT_THAT(actual[0], Field(&Machine::speedFactor, Eq(3))); EXPECT_THAT(actual[0], Field(&Machine::supportedFeatures, ElementsAre("kvm"))); EXPECT_THAT(actual[0], Field(&Machine::mandatoryFeatures, ElementsAre("benchmark"))); EXPECT_THAT(actual[0], Field(&Machine::sshPublicHostKey, Eq("SSH+HOST+PUBLIC+KEY+BASE64+ENCODED=="))); } TEST(machines, getMachinesWithMultiOptions) { auto actual = Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl Arch1,Arch2 - - - " "SupportedFeature1,SupportedFeature2 " "MandatoryFeature1,MandatoryFeature2"); ASSERT_THAT(actual, SizeIs(1)); EXPECT_THAT(actual[0], Field(&Machine::storeUri, AuthorityMatches("nix@scratchy.labs.cs.uu.nl"))); EXPECT_THAT(actual[0], Field(&Machine::systemTypes, ElementsAre("Arch1", "Arch2"))); EXPECT_THAT(actual[0], Field(&Machine::supportedFeatures, ElementsAre("SupportedFeature1", "SupportedFeature2"))); EXPECT_THAT(actual[0], Field(&Machine::mandatoryFeatures, ElementsAre("MandatoryFeature1", "MandatoryFeature2"))); } TEST(machines, getMachinesWithIncorrectFormat) { EXPECT_THROW( Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl - - eight"), FormatError); EXPECT_THROW( Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl - - -1"), FormatError); EXPECT_THROW( Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl - - 8 three"), FormatError); EXPECT_THROW( Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl - - 8 -3"), UsageError); EXPECT_THROW( Machine::parseConfig({}, "nix@scratchy.labs.cs.uu.nl - - 8 3 - - BAD_BASE64"), FormatError); } TEST(machines, getMachinesWithCorrectFileReference) { auto path = fs::weakly_canonical(getUnitTestData() / "machines/valid"); ASSERT_TRUE(fs::exists(path)); auto actual = Machine::parseConfig({}, "@" + path.string()); ASSERT_THAT(actual, SizeIs(3)); EXPECT_THAT(actual, Contains(Field(&Machine::storeUri, AuthorityMatches("nix@scratchy.labs.cs.uu.nl")))); EXPECT_THAT(actual, Contains(Field(&Machine::storeUri, AuthorityMatches("nix@itchy.labs.cs.uu.nl")))); EXPECT_THAT(actual, Contains(Field(&Machine::storeUri, AuthorityMatches("nix@poochie.labs.cs.uu.nl")))); } TEST(machines, getMachinesWithCorrectFileReferenceToEmptyFile) { fs::path path = "/dev/null"; ASSERT_TRUE(fs::exists(path)); auto actual = Machine::parseConfig({}, "@" + path.string()); ASSERT_THAT(actual, SizeIs(0)); } TEST(machines, getMachinesWithIncorrectFileReference) { auto path = fs::weakly_canonical("/not/a/file"); ASSERT_TRUE(!fs::exists(path)); auto actual = Machine::parseConfig({}, "@" + path.string()); ASSERT_THAT(actual, SizeIs(0)); } TEST(machines, getMachinesWithCorrectFileReferenceToIncorrectFile) { EXPECT_THROW( Machine::parseConfig({}, "@" + fs::weakly_canonical(getUnitTestData() / "machines" / "bad_format").string()), FormatError); }
7,915
C++
.cc
148
48.763514
118
0.697521
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,989
http-binary-cache-store.cc
NixOS_nix/src/libstore-tests/http-binary-cache-store.cc
#include <gtest/gtest.h> #include "http-binary-cache-store.hh" namespace nix { TEST(HttpBinaryCacheStore, constructConfig) { HttpBinaryCacheStoreConfig config{"http", "foo.bar.baz", {}}; EXPECT_EQ(config.cacheUri, "http://foo.bar.baz"); } TEST(HttpBinaryCacheStore, constructConfigNoTrailingSlash) { HttpBinaryCacheStoreConfig config{"https", "foo.bar.baz/a/b/", {}}; EXPECT_EQ(config.cacheUri, "https://foo.bar.baz/a/b"); } } // namespace nix
467
C++
.cc
14
30.714286
71
0.73991
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,990
derivation-advanced-attrs.cc
NixOS_nix/src/libstore-tests/derivation-advanced-attrs.cc
#include <gtest/gtest.h> #include <optional> #include "experimental-features.hh" #include "derivations.hh" #include "tests/libstore.hh" #include "tests/characterization.hh" #include "parsed-derivations.hh" #include "types.hh" #include "json-utils.hh" namespace nix { using nlohmann::json; class DerivationAdvancedAttrsTest : public CharacterizationTest, public LibStoreTest { std::filesystem::path unitTestData = getUnitTestData() / "derivation"; public: std::filesystem::path goldenMaster(std::string_view testStem) const override { return unitTestData / testStem; } }; #define TEST_ATERM_JSON(STEM, NAME) \ TEST_F(DerivationAdvancedAttrsTest, Derivation_##STEM##_from_json) \ { \ readTest(NAME ".json", [&](const auto & encoded_) { \ auto encoded = json::parse(encoded_); \ /* Use DRV file instead of C++ literal as source of truth. */ \ auto aterm = readFile(goldenMaster(NAME ".drv")); \ auto expected = parseDerivation(*store, std::move(aterm), NAME); \ Derivation got = Derivation::fromJSON(*store, encoded); \ EXPECT_EQ(got, expected); \ }); \ } \ \ TEST_F(DerivationAdvancedAttrsTest, Derivation_##STEM##_to_json) \ { \ writeTest( \ NAME ".json", \ [&]() -> json { \ /* Use DRV file instead of C++ literal as source of truth. */ \ auto aterm = readFile(goldenMaster(NAME ".drv")); \ return parseDerivation(*store, std::move(aterm), NAME).toJSON(*store); \ }, \ [](const auto & file) { return json::parse(readFile(file)); }, \ [](const auto & file, const auto & got) { return writeFile(file, got.dump(2) + "\n"); }); \ } \ \ TEST_F(DerivationAdvancedAttrsTest, Derivation_##STEM##_from_aterm) \ { \ readTest(NAME ".drv", [&](auto encoded) { \ /* Use JSON file instead of C++ literal as source of truth. */ \ auto json = json::parse(readFile(goldenMaster(NAME ".json"))); \ auto expected = Derivation::fromJSON(*store, json); \ auto got = parseDerivation(*store, std::move(encoded), NAME); \ EXPECT_EQ(got.toJSON(*store), expected.toJSON(*store)); \ EXPECT_EQ(got, expected); \ }); \ } \ \ /* No corresponding write test, because we need to read the drv to write the json file */ TEST_ATERM_JSON(advancedAttributes_defaults, "advanced-attributes-defaults"); TEST_ATERM_JSON(advancedAttributes, "advanced-attributes-defaults"); TEST_ATERM_JSON(advancedAttributes_structuredAttrs_defaults, "advanced-attributes-structured-attrs"); TEST_ATERM_JSON(advancedAttributes_structuredAttrs, "advanced-attributes-structured-attrs-defaults"); #undef TEST_ATERM_JSON TEST_F(DerivationAdvancedAttrsTest, Derivation_advancedAttributes_defaults) { readTest("advanced-attributes-defaults.drv", [&](auto encoded) { auto got = parseDerivation(*store, std::move(encoded), "foo"); auto drvPath = writeDerivation(*store, got, NoRepair, true); ParsedDerivation parsedDrv(drvPath, got); EXPECT_EQ(parsedDrv.getStringAttr("__sandboxProfile").value_or(""), ""); EXPECT_EQ(parsedDrv.getBoolAttr("__noChroot"), false); EXPECT_EQ(parsedDrv.getStringsAttr("__impureHostDeps").value_or(Strings()), Strings()); EXPECT_EQ(parsedDrv.getStringsAttr("impureEnvVars").value_or(Strings()), Strings()); EXPECT_EQ(parsedDrv.getBoolAttr("__darwinAllowLocalNetworking"), false); EXPECT_EQ(parsedDrv.getStringsAttr("allowedReferences"), std::nullopt); EXPECT_EQ(parsedDrv.getStringsAttr("allowedRequisites"), std::nullopt); EXPECT_EQ(parsedDrv.getStringsAttr("disallowedReferences"), std::nullopt); EXPECT_EQ(parsedDrv.getStringsAttr("disallowedRequisites"), std::nullopt); EXPECT_EQ(parsedDrv.getRequiredSystemFeatures(), StringSet()); EXPECT_EQ(parsedDrv.canBuildLocally(*store), false); EXPECT_EQ(parsedDrv.willBuildLocally(*store), false); EXPECT_EQ(parsedDrv.substitutesAllowed(), true); EXPECT_EQ(parsedDrv.useUidRange(), false); }); }; TEST_F(DerivationAdvancedAttrsTest, Derivation_advancedAttributes) { readTest("advanced-attributes.drv", [&](auto encoded) { auto got = parseDerivation(*store, std::move(encoded), "foo"); auto drvPath = writeDerivation(*store, got, NoRepair, true); ParsedDerivation parsedDrv(drvPath, got); StringSet systemFeatures{"rainbow", "uid-range"}; EXPECT_EQ(parsedDrv.getStringAttr("__sandboxProfile").value_or(""), "sandcastle"); EXPECT_EQ(parsedDrv.getBoolAttr("__noChroot"), true); EXPECT_EQ(parsedDrv.getStringsAttr("__impureHostDeps").value_or(Strings()), Strings{"/usr/bin/ditto"}); EXPECT_EQ(parsedDrv.getStringsAttr("impureEnvVars").value_or(Strings()), Strings{"UNICORN"}); EXPECT_EQ(parsedDrv.getBoolAttr("__darwinAllowLocalNetworking"), true); EXPECT_EQ( parsedDrv.getStringsAttr("allowedReferences"), Strings{"/nix/store/3c08bzb71z4wiag719ipjxr277653ynp-foo"}); EXPECT_EQ( parsedDrv.getStringsAttr("allowedRequisites"), Strings{"/nix/store/3c08bzb71z4wiag719ipjxr277653ynp-foo"}); EXPECT_EQ( parsedDrv.getStringsAttr("disallowedReferences"), Strings{"/nix/store/7rhsm8i393hm1wcsmph782awg1hi2f7x-bar"}); EXPECT_EQ( parsedDrv.getStringsAttr("disallowedRequisites"), Strings{"/nix/store/7rhsm8i393hm1wcsmph782awg1hi2f7x-bar"}); EXPECT_EQ(parsedDrv.getRequiredSystemFeatures(), systemFeatures); EXPECT_EQ(parsedDrv.canBuildLocally(*store), false); EXPECT_EQ(parsedDrv.willBuildLocally(*store), false); EXPECT_EQ(parsedDrv.substitutesAllowed(), false); EXPECT_EQ(parsedDrv.useUidRange(), true); }); }; TEST_F(DerivationAdvancedAttrsTest, Derivation_advancedAttributes_structuredAttrs_defaults) { readTest("advanced-attributes-structured-attrs-defaults.drv", [&](auto encoded) { auto got = parseDerivation(*store, std::move(encoded), "foo"); auto drvPath = writeDerivation(*store, got, NoRepair, true); ParsedDerivation parsedDrv(drvPath, got); EXPECT_EQ(parsedDrv.getStringAttr("__sandboxProfile").value_or(""), ""); EXPECT_EQ(parsedDrv.getBoolAttr("__noChroot"), false); EXPECT_EQ(parsedDrv.getStringsAttr("__impureHostDeps").value_or(Strings()), Strings()); EXPECT_EQ(parsedDrv.getStringsAttr("impureEnvVars").value_or(Strings()), Strings()); EXPECT_EQ(parsedDrv.getBoolAttr("__darwinAllowLocalNetworking"), false); { auto structuredAttrs_ = parsedDrv.getStructuredAttrs(); ASSERT_TRUE(structuredAttrs_); auto & structuredAttrs = *structuredAttrs_; auto outputChecks_ = get(structuredAttrs, "outputChecks"); ASSERT_FALSE(outputChecks_); } EXPECT_EQ(parsedDrv.getRequiredSystemFeatures(), StringSet()); EXPECT_EQ(parsedDrv.canBuildLocally(*store), false); EXPECT_EQ(parsedDrv.willBuildLocally(*store), false); EXPECT_EQ(parsedDrv.substitutesAllowed(), true); EXPECT_EQ(parsedDrv.useUidRange(), false); }); }; TEST_F(DerivationAdvancedAttrsTest, Derivation_advancedAttributes_structuredAttrs) { readTest("advanced-attributes-structured-attrs.drv", [&](auto encoded) { auto got = parseDerivation(*store, std::move(encoded), "foo"); auto drvPath = writeDerivation(*store, got, NoRepair, true); ParsedDerivation parsedDrv(drvPath, got); StringSet systemFeatures{"rainbow", "uid-range"}; EXPECT_EQ(parsedDrv.getStringAttr("__sandboxProfile").value_or(""), "sandcastle"); EXPECT_EQ(parsedDrv.getBoolAttr("__noChroot"), true); EXPECT_EQ(parsedDrv.getStringsAttr("__impureHostDeps").value_or(Strings()), Strings{"/usr/bin/ditto"}); EXPECT_EQ(parsedDrv.getStringsAttr("impureEnvVars").value_or(Strings()), Strings{"UNICORN"}); EXPECT_EQ(parsedDrv.getBoolAttr("__darwinAllowLocalNetworking"), true); { auto structuredAttrs_ = parsedDrv.getStructuredAttrs(); ASSERT_TRUE(structuredAttrs_); auto & structuredAttrs = *structuredAttrs_; auto outputChecks_ = get(structuredAttrs, "outputChecks"); ASSERT_TRUE(outputChecks_); auto & outputChecks = *outputChecks_; { auto output_ = get(outputChecks, "out"); ASSERT_TRUE(output_); auto & output = *output_; EXPECT_EQ( get(output, "allowedReferences")->get<Strings>(), Strings{"/nix/store/3c08bzb71z4wiag719ipjxr277653ynp-foo"}); EXPECT_EQ( get(output, "allowedRequisites")->get<Strings>(), Strings{"/nix/store/3c08bzb71z4wiag719ipjxr277653ynp-foo"}); } { auto output_ = get(outputChecks, "bin"); ASSERT_TRUE(output_); auto & output = *output_; EXPECT_EQ( get(output, "disallowedReferences")->get<Strings>(), Strings{"/nix/store/7rhsm8i393hm1wcsmph782awg1hi2f7x-bar"}); EXPECT_EQ( get(output, "disallowedRequisites")->get<Strings>(), Strings{"/nix/store/7rhsm8i393hm1wcsmph782awg1hi2f7x-bar"}); } { auto output_ = get(outputChecks, "dev"); ASSERT_TRUE(output_); auto & output = *output_; EXPECT_EQ(get(output, "maxSize")->get<uint64_t>(), 789); EXPECT_EQ(get(output, "maxClosureSize")->get<uint64_t>(), 5909); } } EXPECT_EQ(parsedDrv.getRequiredSystemFeatures(), systemFeatures); EXPECT_EQ(parsedDrv.canBuildLocally(*store), false); EXPECT_EQ(parsedDrv.willBuildLocally(*store), false); EXPECT_EQ(parsedDrv.substitutesAllowed(), false); EXPECT_EQ(parsedDrv.useUidRange(), true); }); }; }
12,454
C++
.cc
197
52.395939
119
0.532733
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,991
nar-info-disk-cache.cc
NixOS_nix/src/libstore-tests/nar-info-disk-cache.cc
#include "nar-info-disk-cache.hh" #include <gtest/gtest.h> #include <rapidcheck/gtest.h> #include "sqlite.hh" #include <sqlite3.h> namespace nix { TEST(NarInfoDiskCacheImpl, create_and_read) { // This is a large single test to avoid some setup overhead. int prio = 12345; bool wantMassQuery = true; Path tmpDir = createTempDir(); AutoDelete delTmpDir(tmpDir); Path dbPath(tmpDir + "/test-narinfo-disk-cache.sqlite"); int savedId; int barId; SQLite db; SQLiteStmt getIds; { auto cache = getTestNarInfoDiskCache(dbPath); // Set up "background noise" and check that different caches receive different ids { auto bc1 = cache->createCache("https://bar", "/nix/storedir", wantMassQuery, prio); auto bc2 = cache->createCache("https://xyz", "/nix/storedir", false, 12); ASSERT_NE(bc1, bc2); barId = bc1; } // Check that the fields are saved and returned correctly. This does not test // the select statement yet, because of in-memory caching. savedId = cache->createCache("http://foo", "/nix/storedir", wantMassQuery, prio);; { auto r = cache->upToDateCacheExists("http://foo"); ASSERT_TRUE(r); ASSERT_EQ(r->priority, prio); ASSERT_EQ(r->wantMassQuery, wantMassQuery); ASSERT_EQ(savedId, r->id); } // We're going to pay special attention to the id field because we had a bug // that changed it. db = SQLite(dbPath); getIds.create(db, "select id from BinaryCaches where url = 'http://foo'"); { auto q(getIds.use()); ASSERT_TRUE(q.next()); ASSERT_EQ(savedId, q.getInt(0)); ASSERT_FALSE(q.next()); } // Pretend that the caches are older, but keep one up to date, as "background noise" db.exec("update BinaryCaches set timestamp = timestamp - 1 - 7 * 24 * 3600 where url <> 'https://xyz';"); // This shows that the in-memory cache works { auto r = cache->upToDateCacheExists("http://foo"); ASSERT_TRUE(r); ASSERT_EQ(r->priority, prio); ASSERT_EQ(r->wantMassQuery, wantMassQuery); } } { // We can't clear the in-memory cache, so we use a new cache object. This is // more realistic anyway. auto cache2 = getTestNarInfoDiskCache(dbPath); { auto r = cache2->upToDateCacheExists("http://foo"); ASSERT_FALSE(r); } // "Update", same data, check that the id number is reused cache2->createCache("http://foo", "/nix/storedir", wantMassQuery, prio); { auto r = cache2->upToDateCacheExists("http://foo"); ASSERT_TRUE(r); ASSERT_EQ(r->priority, prio); ASSERT_EQ(r->wantMassQuery, wantMassQuery); ASSERT_EQ(r->id, savedId); } { auto q(getIds.use()); ASSERT_TRUE(q.next()); auto currentId = q.getInt(0); ASSERT_FALSE(q.next()); ASSERT_EQ(currentId, savedId); } // Check that the fields can be modified, and the id remains the same { auto r0 = cache2->upToDateCacheExists("https://bar"); ASSERT_FALSE(r0); cache2->createCache("https://bar", "/nix/storedir", !wantMassQuery, prio + 10); auto r = cache2->upToDateCacheExists("https://bar"); ASSERT_EQ(r->wantMassQuery, !wantMassQuery); ASSERT_EQ(r->priority, prio + 10); ASSERT_EQ(r->id, barId); } // // Force update (no use case yet; we only retrieve cache metadata when stale based on timestamp) // { // cache2->createCache("https://bar", "/nix/storedir", wantMassQuery, prio + 20); // auto r = cache2->upToDateCacheExists("https://bar"); // ASSERT_EQ(r->wantMassQuery, wantMassQuery); // ASSERT_EQ(r->priority, prio + 20); // } } } }
4,114
C++
.cc
100
31.75
113
0.580306
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,992
uds-remote-store.cc
NixOS_nix/src/libstore-tests/uds-remote-store.cc
// FIXME: Odd failures for templates that are causing the PR to break // for now with discussion with @Ericson2314 to comment out. #if 0 # include <gtest/gtest.h> # include "uds-remote-store.hh" namespace nix { TEST(UDSRemoteStore, constructConfig) { UDSRemoteStoreConfig config{"unix", "/tmp/socket", {}}; EXPECT_EQ(config.path, "/tmp/socket"); } TEST(UDSRemoteStore, constructConfigWrongScheme) { EXPECT_THROW(UDSRemoteStoreConfig("http", "/tmp/socket", {}), UsageError); } } // namespace nix #endif
522
C++
.cc
17
28.647059
78
0.743487
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,993
worker-protocol.cc
NixOS_nix/src/libstore-tests/worker-protocol.cc
#include <regex> #include <thread> #include <nlohmann/json.hpp> #include <gtest/gtest.h> #include "worker-protocol.hh" #include "worker-protocol-connection.hh" #include "worker-protocol-impl.hh" #include "derived-path.hh" #include "build-result.hh" #include "tests/protocol.hh" #include "tests/characterization.hh" namespace nix { const char workerProtoDir[] = "worker-protocol"; struct WorkerProtoTest : VersionedProtoTest<WorkerProto, workerProtoDir> { /** * For serializers that don't care about the minimum version, we * used the oldest one: 1.10. */ WorkerProto::Version defaultVersion = 1 << 8 | 10; }; VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, string, "string", defaultVersion, (std::tuple<std::string, std::string, std::string, std::string, std::string> { "", "hi", "white rabbit", "大白兔", "oh no \0\0\0 what was that!", })) #ifndef DOXYGEN_SKIP VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, storePath, "store-path", defaultVersion, (std::tuple<StorePath, StorePath> { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo-bar" }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, contentAddress, "content-address", defaultVersion, (std::tuple<ContentAddress, ContentAddress, ContentAddress> { ContentAddress { .method = ContentAddressMethod::Raw::Text, .hash = hashString(HashAlgorithm::SHA256, "Derive(...)"), }, ContentAddress { .method = ContentAddressMethod::Raw::Flat, .hash = hashString(HashAlgorithm::SHA1, "blob blob..."), }, ContentAddress { .method = ContentAddressMethod::Raw::NixArchive, .hash = hashString(HashAlgorithm::SHA256, "(...)"), }, })) #endif VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, derivedPath_1_29, "derived-path-1.29", 1 << 8 | 29, (std::tuple<DerivedPath, DerivedPath, DerivedPath> { DerivedPath::Opaque { .path = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, DerivedPath::Built { .drvPath = makeConstantStorePathRef(StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }), .outputs = OutputsSpec::All { }, }, DerivedPath::Built { .drvPath = makeConstantStorePathRef(StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }), .outputs = OutputsSpec::Names { "x", "y" }, }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, derivedPath_1_30, "derived-path-1.30", 1 << 8 | 30, (std::tuple<DerivedPath, DerivedPath, DerivedPath, DerivedPath> { DerivedPath::Opaque { .path = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, DerivedPath::Opaque { .path = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo.drv" }, }, DerivedPath::Built { .drvPath = makeConstantStorePathRef(StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }), .outputs = OutputsSpec::All { }, }, DerivedPath::Built { .drvPath = makeConstantStorePathRef(StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }), .outputs = OutputsSpec::Names { "x", "y" }, }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, drvOutput, "drv-output", defaultVersion, (std::tuple<DrvOutput, DrvOutput> { { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "quux", }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, realisation, "realisation", defaultVersion, (std::tuple<Realisation, Realisation> { Realisation { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, .signatures = { "asdf", "qwer" }, }, Realisation { .id = { .drvHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), .outputName = "baz", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, .signatures = { "asdf", "qwer" }, .dependentRealisations = { { DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "quux", }, StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, }, }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, buildResult_1_27, "build-result-1.27", 1 << 8 | 27, ({ using namespace std::literals::chrono_literals; std::tuple<BuildResult, BuildResult, BuildResult> t { BuildResult { .status = BuildResult::OutputRejected, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::NotDeterministic, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::Built, }, }; t; })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, buildResult_1_28, "build-result-1.28", 1 << 8 | 28, ({ using namespace std::literals::chrono_literals; std::tuple<BuildResult, BuildResult, BuildResult> t { BuildResult { .status = BuildResult::OutputRejected, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::NotDeterministic, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::Built, .builtOutputs = { { "foo", { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "foo", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, }, { "bar", { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "bar", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar" }, }, }, }, }, }; t; })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, buildResult_1_29, "build-result-1.29", 1 << 8 | 29, ({ using namespace std::literals::chrono_literals; std::tuple<BuildResult, BuildResult, BuildResult> t { BuildResult { .status = BuildResult::OutputRejected, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::NotDeterministic, .errorMsg = "no idea why", .timesBuilt = 3, .isNonDeterministic = true, .startTime = 30, .stopTime = 50, }, BuildResult { .status = BuildResult::Built, .timesBuilt = 1, .builtOutputs = { { "foo", { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "foo", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, }, { "bar", { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "bar", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar" }, }, }, }, .startTime = 30, .stopTime = 50, }, }; t; })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, buildResult_1_37, "build-result-1.37", 1 << 8 | 37, ({ using namespace std::literals::chrono_literals; std::tuple<BuildResult, BuildResult, BuildResult> t { BuildResult { .status = BuildResult::OutputRejected, .errorMsg = "no idea why", }, BuildResult { .status = BuildResult::NotDeterministic, .errorMsg = "no idea why", .timesBuilt = 3, .isNonDeterministic = true, .startTime = 30, .stopTime = 50, }, BuildResult { .status = BuildResult::Built, .timesBuilt = 1, .builtOutputs = { { "foo", { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "foo", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo" }, }, }, { "bar", { .id = DrvOutput { .drvHash = Hash::parseSRI("sha256-b4afnqKCO9oWXgYHb9DeQ2berSwOjS27rSd9TxXDc/U="), .outputName = "bar", }, .outPath = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar" }, }, }, }, .startTime = 30, .stopTime = 50, .cpuUser = std::chrono::microseconds(500s), .cpuSystem = std::chrono::microseconds(604s), }, }; t; })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, keyedBuildResult_1_29, "keyed-build-result-1.29", 1 << 8 | 29, ({ using namespace std::literals::chrono_literals; std::tuple<KeyedBuildResult, KeyedBuildResult/*, KeyedBuildResult*/> t { KeyedBuildResult { { .status = KeyedBuildResult::OutputRejected, .errorMsg = "no idea why", }, /* .path = */ DerivedPath::Opaque { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-xxx" }, }, }, KeyedBuildResult { { .status = KeyedBuildResult::NotDeterministic, .errorMsg = "no idea why", .timesBuilt = 3, .isNonDeterministic = true, .startTime = 30, .stopTime = 50, }, /* .path = */ DerivedPath::Built { .drvPath = makeConstantStorePathRef(StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }), .outputs = OutputsSpec::Names { "out" }, }, }, }; t; })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, unkeyedValidPathInfo_1_15, "unkeyed-valid-path-info-1.15", 1 << 8 | 15, (std::tuple<UnkeyedValidPathInfo, UnkeyedValidPathInfo> { ({ UnkeyedValidPathInfo info { Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }; info.registrationTime = 23423; info.narSize = 34878; info; }), ({ UnkeyedValidPathInfo info { Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }; info.deriver = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }; info.references = { StorePath { "g1w7hyyyy1w7hy3qg1w7hy3qgqqqqy3q-foo.drv", }, }; info.registrationTime = 23423; info.narSize = 34878; info; }), })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, validPathInfo_1_15, "valid-path-info-1.15", 1 << 8 | 15, (std::tuple<ValidPathInfo, ValidPathInfo> { ({ ValidPathInfo info { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, UnkeyedValidPathInfo { Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }, }; info.registrationTime = 23423; info.narSize = 34878; info; }), ({ ValidPathInfo info { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, UnkeyedValidPathInfo { Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }, }; info.deriver = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }; info.references = { // other reference StorePath { "g1w7hyyyy1w7hy3qg1w7hy3qgqqqqy3q-foo", }, // self reference StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, }; info.registrationTime = 23423; info.narSize = 34878; info; }), })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, validPathInfo_1_16, "valid-path-info-1.16", 1 << 8 | 16, (std::tuple<ValidPathInfo, ValidPathInfo, ValidPathInfo> { ({ ValidPathInfo info { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, UnkeyedValidPathInfo { Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }, }; info.registrationTime = 23423; info.narSize = 34878; info.ultimate = true; info; }), ({ ValidPathInfo info { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, UnkeyedValidPathInfo { Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }, }; info.deriver = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }; info.references = { // other reference StorePath { "g1w7hyyyy1w7hy3qg1w7hy3qgqqqqy3q-foo", }, // self reference StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, }; info.registrationTime = 23423; info.narSize = 34878; info.sigs = { "fake-sig-1", "fake-sig-2", }, info; }), ({ ValidPathInfo info { *LibStoreTest::store, "foo", FixedOutputInfo { .method = FileIngestionMethod::NixArchive, .hash = hashString(HashAlgorithm::SHA256, "(...)"), .references = { .others = { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, }, .self = true, }, }, Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }; info.registrationTime = 23423; info.narSize = 34878; info; }), })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, buildMode, "build-mode", defaultVersion, (std::tuple<BuildMode, BuildMode, BuildMode> { bmNormal, bmRepair, bmCheck, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, optionalTrustedFlag, "optional-trusted-flag", defaultVersion, (std::tuple<std::optional<TrustedFlag>, std::optional<TrustedFlag>, std::optional<TrustedFlag>> { std::nullopt, std::optional { Trusted }, std::optional { NotTrusted }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, vector, "vector", defaultVersion, (std::tuple<std::vector<std::string>, std::vector<std::string>, std::vector<std::string>, std::vector<std::vector<std::string>>> { { }, { "" }, { "", "foo", "bar" }, { {}, { "" }, { "", "1", "2" } }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, set, "set", defaultVersion, (std::tuple<std::set<std::string>, std::set<std::string>, std::set<std::string>, std::set<std::set<std::string>>> { { }, { "" }, { "", "foo", "bar" }, { {}, { "" }, { "", "1", "2" } }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, optionalStorePath, "optional-store-path", defaultVersion, (std::tuple<std::optional<StorePath>, std::optional<StorePath>> { std::nullopt, std::optional { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo-bar" }, }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, optionalContentAddress, "optional-content-address", defaultVersion, (std::tuple<std::optional<ContentAddress>, std::optional<ContentAddress>> { std::nullopt, std::optional { ContentAddress { .method = ContentAddressMethod::Raw::Flat, .hash = hashString(HashAlgorithm::SHA1, "blob blob..."), }, }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, clientHandshakeInfo_1_30, "client-handshake-info_1_30", 1 << 8 | 30, (std::tuple<WorkerProto::ClientHandshakeInfo> { {}, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, clientHandshakeInfo_1_33, "client-handshake-info_1_33", 1 << 8 | 33, (std::tuple<WorkerProto::ClientHandshakeInfo, WorkerProto::ClientHandshakeInfo> { { .daemonNixVersion = std::optional { "foo" }, }, { .daemonNixVersion = std::optional { "bar" }, }, })) VERSIONED_CHARACTERIZATION_TEST( WorkerProtoTest, clientHandshakeInfo_1_35, "client-handshake-info_1_35", 1 << 8 | 35, (std::tuple<WorkerProto::ClientHandshakeInfo, WorkerProto::ClientHandshakeInfo> { { .daemonNixVersion = std::optional { "foo" }, .remoteTrustsUs = std::optional { NotTrusted }, }, { .daemonNixVersion = std::optional { "bar" }, .remoteTrustsUs = std::optional { Trusted }, }, })) TEST_F(WorkerProtoTest, handshake_log) { CharacterizationTest::writeTest("handshake-to-client", [&]() -> std::string { StringSink toClientLog; Pipe toClient, toServer; toClient.create(); toServer.create(); WorkerProto::Version clientResult; auto thread = std::thread([&]() { FdSink out { toServer.writeSide.get() }; FdSource in0 { toClient.readSide.get() }; TeeSource in { in0, toClientLog }; clientResult = std::get<0>(WorkerProto::BasicClientConnection::handshake( out, in, defaultVersion, {})); }); { FdSink out { toClient.writeSide.get() }; FdSource in { toServer.readSide.get() }; WorkerProto::BasicServerConnection::handshake( out, in, defaultVersion, {}); }; thread.join(); return std::move(toClientLog.s); }); } TEST_F(WorkerProtoTest, handshake_features) { Pipe toClient, toServer; toClient.create(); toServer.create(); std::tuple<WorkerProto::Version, std::set<WorkerProto::Feature>> clientResult; auto clientThread = std::thread([&]() { FdSink out { toServer.writeSide.get() }; FdSource in { toClient.readSide.get() }; clientResult = WorkerProto::BasicClientConnection::handshake( out, in, 123, {"bar", "aap", "mies", "xyzzy"}); }); FdSink out { toClient.writeSide.get() }; FdSource in { toServer.readSide.get() }; auto daemonResult = WorkerProto::BasicServerConnection::handshake( out, in, 456, {"foo", "bar", "xyzzy"}); clientThread.join(); EXPECT_EQ(clientResult, daemonResult); EXPECT_EQ(std::get<0>(clientResult), 123); EXPECT_EQ(std::get<1>(clientResult), std::set<WorkerProto::Feature>({"bar", "xyzzy"})); } /// Has to be a `BufferedSink` for handshake. struct NullBufferedSink : BufferedSink { void writeUnbuffered(std::string_view data) override { } }; TEST_F(WorkerProtoTest, handshake_client_replay) { CharacterizationTest::readTest("handshake-to-client", [&](std::string toClientLog) { NullBufferedSink nullSink; StringSource in { toClientLog }; auto clientResult = std::get<0>(WorkerProto::BasicClientConnection::handshake( nullSink, in, defaultVersion, {})); EXPECT_EQ(clientResult, defaultVersion); }); } TEST_F(WorkerProtoTest, handshake_client_truncated_replay_throws) { CharacterizationTest::readTest("handshake-to-client", [&](std::string toClientLog) { for (size_t len = 0; len < toClientLog.size(); ++len) { NullBufferedSink nullSink; auto substring = toClientLog.substr(0, len); StringSource in{substring}; if (len < 8) { EXPECT_THROW( WorkerProto::BasicClientConnection::handshake(nullSink, in, defaultVersion, {}), EndOfFile); } else { // Not sure why cannot keep on checking for `EndOfFile`. EXPECT_THROW(WorkerProto::BasicClientConnection::handshake(nullSink, in, defaultVersion, {}), Error); } } }); } TEST_F(WorkerProtoTest, handshake_client_corrupted_throws) { CharacterizationTest::readTest("handshake-to-client", [&](const std::string toClientLog) { for (size_t idx = 0; idx < toClientLog.size(); ++idx) { // corrupt a copy std::string toClientLogCorrupt = toClientLog; toClientLogCorrupt[idx] *= 4; ++toClientLogCorrupt[idx]; NullBufferedSink nullSink; StringSource in { toClientLogCorrupt }; if (idx < 4 || idx == 9) { // magic bytes don't match EXPECT_THROW( WorkerProto::BasicClientConnection::handshake( nullSink, in, defaultVersion, {}), Error); } else if (idx < 8 || idx >= 12) { // Number out of bounds EXPECT_THROW( WorkerProto::BasicClientConnection::handshake( nullSink, in, defaultVersion, {}), SerialisationError); } else { auto ver = std::get<0>(WorkerProto::BasicClientConnection::handshake( nullSink, in, defaultVersion, {})); // `std::min` of this and the other version saves us EXPECT_EQ(ver, defaultVersion); } } }); } }
25,179
C++
.cc
725
22.768276
134
0.51566
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,994
local-binary-cache-store.cc
NixOS_nix/src/libstore-tests/local-binary-cache-store.cc
#include <gtest/gtest.h> #include "local-binary-cache-store.hh" namespace nix { TEST(LocalBinaryCacheStore, constructConfig) { LocalBinaryCacheStoreConfig config{"local", "/foo/bar/baz", {}}; EXPECT_EQ(config.binaryCacheDir, "/foo/bar/baz"); } } // namespace nix
276
C++
.cc
9
28.222222
68
0.748092
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,995
derived-path.cc
NixOS_nix/src/libstore-tests/derived-path.cc
#include <regex> #include <gtest/gtest.h> #include <rapidcheck/gtest.h> #include "tests/derived-path.hh" #include "tests/libstore.hh" namespace nix { class DerivedPathTest : public LibStoreTest { }; /** * Round trip (string <-> data structure) test for * `DerivedPath::Opaque`. */ TEST_F(DerivedPathTest, opaque) { std::string_view opaque = "/nix/store/g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-x"; auto elem = DerivedPath::parse(*store, opaque); auto * p = std::get_if<DerivedPath::Opaque>(&elem); ASSERT_TRUE(p); ASSERT_EQ(p->path, store->parseStorePath(opaque)); ASSERT_EQ(elem.to_string(*store), opaque); } /** * Round trip (string <-> data structure) test for a simpler * `DerivedPath::Built`. */ TEST_F(DerivedPathTest, built_opaque) { std::string_view built = "/nix/store/g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-x.drv^bar,foo"; auto elem = DerivedPath::parse(*store, built); auto * p = std::get_if<DerivedPath::Built>(&elem); ASSERT_TRUE(p); ASSERT_EQ(p->outputs, ((OutputsSpec) OutputsSpec::Names { "foo", "bar" })); ASSERT_EQ(*p->drvPath, ((SingleDerivedPath) SingleDerivedPath::Opaque { .path = store->parseStorePath(built.substr(0, 49)), })); ASSERT_EQ(elem.to_string(*store), built); } /** * Round trip (string <-> data structure) test for a more complex, * inductive `DerivedPath::Built`. */ TEST_F(DerivedPathTest, built_built) { /** * We set these in tests rather than the regular globals so we don't have * to worry about race conditions if the tests run concurrently. */ ExperimentalFeatureSettings mockXpSettings; mockXpSettings.set("experimental-features", "dynamic-derivations ca-derivations"); std::string_view built = "/nix/store/g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-x.drv^foo^bar,baz"; auto elem = DerivedPath::parse(*store, built, mockXpSettings); auto * p = std::get_if<DerivedPath::Built>(&elem); ASSERT_TRUE(p); ASSERT_EQ(p->outputs, ((OutputsSpec) OutputsSpec::Names { "bar", "baz" })); auto * drvPath = std::get_if<SingleDerivedPath::Built>(&*p->drvPath); ASSERT_TRUE(drvPath); ASSERT_EQ(drvPath->output, "foo"); ASSERT_EQ(*drvPath->drvPath, ((SingleDerivedPath) SingleDerivedPath::Opaque { .path = store->parseStorePath(built.substr(0, 49)), })); ASSERT_EQ(elem.to_string(*store), built); } /** * Without the right experimental features enabled, we cannot parse a * complex inductive derived path. */ TEST_F(DerivedPathTest, built_built_xp) { ASSERT_THROW( DerivedPath::parse(*store, "/nix/store/g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-x.drv^foo^bar,baz"), MissingExperimentalFeature); } #ifndef COVERAGE RC_GTEST_FIXTURE_PROP( DerivedPathTest, prop_legacy_round_rip, (const DerivedPath & o)) { RC_ASSERT(o == DerivedPath::parseLegacy(*store, o.to_string_legacy(*store))); } RC_GTEST_FIXTURE_PROP( DerivedPathTest, prop_round_rip, (const DerivedPath & o)) { RC_ASSERT(o == DerivedPath::parse(*store, o.to_string(*store))); } #endif }
3,058
C++
.cc
86
31.988372
100
0.699459
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,996
local-overlay-store.cc
NixOS_nix/src/libstore-tests/local-overlay-store.cc
// FIXME: Odd failures for templates that are causing the PR to break // for now with discussion with @Ericson2314 to comment out. #if 0 # include <gtest/gtest.h> # include "local-overlay-store.hh" namespace nix { TEST(LocalOverlayStore, constructConfig_rootQueryParam) { LocalOverlayStoreConfig config{ "local-overlay", "", { { "root", "/foo/bar", }, }, }; EXPECT_EQ(config.rootDir.get(), std::optional{"/foo/bar"}); } TEST(LocalOverlayStore, constructConfig_rootPath) { LocalOverlayStoreConfig config{"local-overlay", "/foo/bar", {}}; EXPECT_EQ(config.rootDir.get(), std::optional{"/foo/bar"}); } } // namespace nix #endif
742
C++
.cc
27
22.222222
69
0.637006
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,997
outputs-spec.cc
NixOS_nix/src/libstore-tests/outputs-spec.cc
#include "tests/outputs-spec.hh" #include <nlohmann/json.hpp> #include <gtest/gtest.h> #include <rapidcheck/gtest.h> namespace nix { TEST(OutputsSpec, no_empty_names) { ASSERT_DEATH(OutputsSpec::Names { std::set<std::string> { } }, ""); } #define TEST_DONT_PARSE(NAME, STR) \ TEST(OutputsSpec, bad_ ## NAME) { \ std::optional OutputsSpecOpt = \ OutputsSpec::parseOpt(STR); \ ASSERT_FALSE(OutputsSpecOpt); \ } TEST_DONT_PARSE(empty, "") TEST_DONT_PARSE(garbage, "&*()") TEST_DONT_PARSE(double_star, "**") TEST_DONT_PARSE(star_first, "*,foo") TEST_DONT_PARSE(star_second, "foo,*") #undef TEST_DONT_PARSE TEST(OutputsSpec, all) { std::string_view str = "*"; OutputsSpec expected = OutputsSpec::All { }; ASSERT_EQ(OutputsSpec::parse(str), expected); ASSERT_EQ(expected.to_string(), str); } TEST(OutputsSpec, names_out) { std::string_view str = "out"; OutputsSpec expected = OutputsSpec::Names { "out" }; ASSERT_EQ(OutputsSpec::parse(str), expected); ASSERT_EQ(expected.to_string(), str); } TEST(OutputsSpec, names_underscore) { std::string_view str = "a_b"; OutputsSpec expected = OutputsSpec::Names { "a_b" }; ASSERT_EQ(OutputsSpec::parse(str), expected); ASSERT_EQ(expected.to_string(), str); } TEST(OutputsSpec, names_numberic) { std::string_view str = "01"; OutputsSpec expected = OutputsSpec::Names { "01" }; ASSERT_EQ(OutputsSpec::parse(str), expected); ASSERT_EQ(expected.to_string(), str); } TEST(OutputsSpec, names_out_bin) { OutputsSpec expected = OutputsSpec::Names { "out", "bin" }; ASSERT_EQ(OutputsSpec::parse("out,bin"), expected); // N.B. This normalization is OK. ASSERT_EQ(expected.to_string(), "bin,out"); } #define TEST_SUBSET(X, THIS, THAT) \ X((OutputsSpec { THIS }).isSubsetOf(THAT)); TEST(OutputsSpec, subsets_all_all) { TEST_SUBSET(ASSERT_TRUE, OutputsSpec::All { }, OutputsSpec::All { }); } TEST(OutputsSpec, subsets_names_all) { TEST_SUBSET(ASSERT_TRUE, OutputsSpec::Names { "a" }, OutputsSpec::All { }); } TEST(OutputsSpec, subsets_names_names_eq) { TEST_SUBSET(ASSERT_TRUE, OutputsSpec::Names { "a" }, OutputsSpec::Names { "a" }); } TEST(OutputsSpec, subsets_names_names_noneq) { TEST_SUBSET(ASSERT_TRUE, OutputsSpec::Names { "a" }, (OutputsSpec::Names { "a", "b" })); } TEST(OutputsSpec, not_subsets_all_names) { TEST_SUBSET(ASSERT_FALSE, OutputsSpec::All { }, OutputsSpec::Names { "a" }); } TEST(OutputsSpec, not_subsets_names_names) { TEST_SUBSET(ASSERT_FALSE, (OutputsSpec::Names { "a", "b" }), (OutputsSpec::Names { "a" })); } #undef TEST_SUBSET #define TEST_UNION(RES, THIS, THAT) \ ASSERT_EQ(OutputsSpec { RES }, (OutputsSpec { THIS }).union_(THAT)); TEST(OutputsSpec, union_all_all) { TEST_UNION(OutputsSpec::All { }, OutputsSpec::All { }, OutputsSpec::All { }); } TEST(OutputsSpec, union_all_names) { TEST_UNION(OutputsSpec::All { }, OutputsSpec::All { }, OutputsSpec::Names { "a" }); } TEST(OutputsSpec, union_names_all) { TEST_UNION(OutputsSpec::All { }, OutputsSpec::Names { "a" }, OutputsSpec::All { }); } TEST(OutputsSpec, union_names_names) { TEST_UNION((OutputsSpec::Names { "a", "b" }), OutputsSpec::Names { "a" }, OutputsSpec::Names { "b" }); } #undef TEST_UNION #define TEST_DONT_PARSE(NAME, STR) \ TEST(ExtendedOutputsSpec, bad_ ## NAME) { \ std::optional extendedOutputsSpecOpt = \ ExtendedOutputsSpec::parseOpt(STR); \ ASSERT_FALSE(extendedOutputsSpecOpt); \ } TEST_DONT_PARSE(carot_empty, "^") TEST_DONT_PARSE(prefix_carot_empty, "foo^") TEST_DONT_PARSE(garbage, "^&*()") TEST_DONT_PARSE(double_star, "^**") TEST_DONT_PARSE(star_first, "^*,foo") TEST_DONT_PARSE(star_second, "^foo,*") #undef TEST_DONT_PARSE TEST(ExtendedOutputsSpec, defeault) { std::string_view str = "foo"; auto [prefix, extendedOutputsSpec] = ExtendedOutputsSpec::parse(str); ASSERT_EQ(prefix, "foo"); ExtendedOutputsSpec expected = ExtendedOutputsSpec::Default { }; ASSERT_EQ(extendedOutputsSpec, expected); ASSERT_EQ(std::string { prefix } + expected.to_string(), str); } TEST(ExtendedOutputsSpec, all) { std::string_view str = "foo^*"; auto [prefix, extendedOutputsSpec] = ExtendedOutputsSpec::parse(str); ASSERT_EQ(prefix, "foo"); ExtendedOutputsSpec expected = OutputsSpec::All { }; ASSERT_EQ(extendedOutputsSpec, expected); ASSERT_EQ(std::string { prefix } + expected.to_string(), str); } TEST(ExtendedOutputsSpec, out) { std::string_view str = "foo^out"; auto [prefix, extendedOutputsSpec] = ExtendedOutputsSpec::parse(str); ASSERT_EQ(prefix, "foo"); ExtendedOutputsSpec expected = OutputsSpec::Names { "out" }; ASSERT_EQ(extendedOutputsSpec, expected); ASSERT_EQ(std::string { prefix } + expected.to_string(), str); } TEST(ExtendedOutputsSpec, out_bin) { auto [prefix, extendedOutputsSpec] = ExtendedOutputsSpec::parse("foo^out,bin"); ASSERT_EQ(prefix, "foo"); ExtendedOutputsSpec expected = OutputsSpec::Names { "out", "bin" }; ASSERT_EQ(extendedOutputsSpec, expected); ASSERT_EQ(std::string { prefix } + expected.to_string(), "foo^bin,out"); } TEST(ExtendedOutputsSpec, many_carrot) { auto [prefix, extendedOutputsSpec] = ExtendedOutputsSpec::parse("foo^bar^out,bin"); ASSERT_EQ(prefix, "foo^bar"); ExtendedOutputsSpec expected = OutputsSpec::Names { "out", "bin" }; ASSERT_EQ(extendedOutputsSpec, expected); ASSERT_EQ(std::string { prefix } + expected.to_string(), "foo^bar^bin,out"); } #define TEST_JSON(TYPE, NAME, STR, VAL) \ \ TEST(TYPE, NAME ## _to_json) { \ using nlohmann::literals::operator "" _json; \ ASSERT_EQ( \ STR ## _json, \ ((nlohmann::json) TYPE { VAL })); \ } \ \ TEST(TYPE, NAME ## _from_json) { \ using nlohmann::literals::operator "" _json; \ ASSERT_EQ( \ TYPE { VAL }, \ (STR ## _json).get<TYPE>()); \ } TEST_JSON(OutputsSpec, all, R"(["*"])", OutputsSpec::All { }) TEST_JSON(OutputsSpec, name, R"(["a"])", OutputsSpec::Names { "a" }) TEST_JSON(OutputsSpec, names, R"(["a","b"])", (OutputsSpec::Names { "a", "b" })) TEST_JSON(ExtendedOutputsSpec, def, R"(null)", ExtendedOutputsSpec::Default { }) TEST_JSON(ExtendedOutputsSpec, all, R"(["*"])", ExtendedOutputsSpec::Explicit { OutputsSpec::All { } }) TEST_JSON(ExtendedOutputsSpec, name, R"(["a"])", ExtendedOutputsSpec::Explicit { OutputsSpec::Names { "a" } }) TEST_JSON(ExtendedOutputsSpec, names, R"(["a","b"])", (ExtendedOutputsSpec::Explicit { OutputsSpec::Names { "a", "b" } })) #undef TEST_JSON #ifndef COVERAGE RC_GTEST_PROP( OutputsSpec, prop_round_rip, (const OutputsSpec & o)) { RC_ASSERT(o == OutputsSpec::parse(o.to_string())); } #endif }
7,326
C++
.cc
170
38.635294
122
0.620186
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,998
local-store.cc
NixOS_nix/src/libstore-tests/local-store.cc
// FIXME: Odd failures for templates that are causing the PR to break // for now with discussion with @Ericson2314 to comment out. #if 0 # include <gtest/gtest.h> # include "local-store.hh" // Needed for template specialisations. This is not good! When we // overhaul how store configs work, this should be fixed. # include "args.hh" # include "config-impl.hh" # include "abstract-setting-to-json.hh" namespace nix { TEST(LocalStore, constructConfig_rootQueryParam) { LocalStoreConfig config{ "local", "", { { "root", "/foo/bar", }, }, }; EXPECT_EQ(config.rootDir.get(), std::optional{"/foo/bar"}); } TEST(LocalStore, constructConfig_rootPath) { LocalStoreConfig config{"local", "/foo/bar", {}}; EXPECT_EQ(config.rootDir.get(), std::optional{"/foo/bar"}); } } // namespace nix #endif
905
C++
.cc
32
23.65625
69
0.646243
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
10,999
s3-binary-cache-store.cc
NixOS_nix/src/libstore-tests/s3-binary-cache-store.cc
#if ENABLE_S3 # include <gtest/gtest.h> # include "s3-binary-cache-store.hh" namespace nix { TEST(S3BinaryCacheStore, constructConfig) { S3BinaryCacheStoreConfig config{"s3", "foobar", {}}; EXPECT_EQ(config.bucketName, "foobar"); } } // namespace nix #endif
275
C++
.cc
11
22.636364
56
0.735409
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,000
nar-info.cc
NixOS_nix/src/libstore-tests/nar-info.cc
#include <nlohmann/json.hpp> #include <gtest/gtest.h> #include "path-info.hh" #include "nar-info.hh" #include "tests/characterization.hh" #include "tests/libstore.hh" namespace nix { using nlohmann::json; class NarInfoTest : public CharacterizationTest, public LibStoreTest { std::filesystem::path unitTestData = getUnitTestData() / "nar-info"; std::filesystem::path goldenMaster(PathView testStem) const override { return unitTestData / (testStem + ".json"); } }; static NarInfo makeNarInfo(const Store & store, bool includeImpureInfo) { NarInfo info = ValidPathInfo { store, "foo", FixedOutputInfo { .method = FileIngestionMethod::NixArchive, .hash = hashString(HashAlgorithm::SHA256, "(...)"), .references = { .others = { StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar", }, }, .self = true, }, }, Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="), }; info.narSize = 34878; if (includeImpureInfo) { info.deriver = StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-bar.drv", }; info.registrationTime = 23423; info.ultimate = true; info.sigs = { "asdf", "qwer" }; info.url = "nar/1w1fff338fvdw53sqgamddn1b2xgds473pv6y13gizdbqjv4i5p3.nar.xz"; info.compression = "xz"; info.fileHash = Hash::parseSRI("sha256-FePFYIlMuycIXPZbWi7LGEiMmZSX9FMbaQenWBzm1Sc="); info.fileSize = 4029176; } return info; } #define JSON_TEST(STEM, PURE) \ TEST_F(NarInfoTest, NarInfo_ ## STEM ## _from_json) { \ readTest(#STEM, [&](const auto & encoded_) { \ auto encoded = json::parse(encoded_); \ auto expected = makeNarInfo(*store, PURE); \ NarInfo got = NarInfo::fromJSON( \ *store, \ expected.path, \ encoded); \ ASSERT_EQ(got, expected); \ }); \ } \ \ TEST_F(NarInfoTest, NarInfo_ ## STEM ## _to_json) { \ writeTest(#STEM, [&]() -> json { \ return makeNarInfo(*store, PURE) \ .toJSON(*store, PURE, HashFormat::SRI); \ }, [](const auto & file) { \ return json::parse(readFile(file)); \ }, [](const auto & file, const auto & got) { \ return writeFile(file, got.dump(2) + "\n"); \ }); \ } JSON_TEST(pure, false) JSON_TEST(impure, true) }
3,382
C++
.cc
74
36.243243
94
0.435983
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,001
content-address.cc
NixOS_nix/src/libstore-tests/content-address.cc
#include <gtest/gtest.h> #include "content-address.hh" namespace nix { /* ---------------------------------------------------------------------------- * ContentAddressMethod::parse, ContentAddressMethod::render * --------------------------------------------------------------------------*/ TEST(ContentAddressMethod, testRoundTripPrintParse_1) { for (ContentAddressMethod cam : { ContentAddressMethod::Raw::Text, ContentAddressMethod::Raw::Flat, ContentAddressMethod::Raw::NixArchive, ContentAddressMethod::Raw::Git, }) { EXPECT_EQ(ContentAddressMethod::parse(cam.render()), cam); } } TEST(ContentAddressMethod, testRoundTripPrintParse_2) { for (const std::string_view camS : { "text", "flat", "nar", "git", }) { EXPECT_EQ(ContentAddressMethod::parse(camS).render(), camS); } } TEST(ContentAddressMethod, testParseContentAddressMethodOptException) { EXPECT_THROW(ContentAddressMethod::parse("narwhal"), UsageError); } }
1,037
C++
.cc
30
29.666667
79
0.588
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,002
nix_api_store.cc
NixOS_nix/src/libstore-tests/nix_api_store.cc
#include "nix_api_util.h" #include "nix_api_util_internal.h" #include "nix_api_store.h" #include "nix_api_store_internal.h" #include "tests/nix_api_store.hh" #include "tests/string_callback.hh" namespace nixC { std::string PATH_SUFFIX = "/g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-name"; TEST_F(nix_api_util_context, nix_libstore_init) { auto ret = nix_libstore_init(ctx); ASSERT_EQ(NIX_OK, ret); } TEST_F(nix_api_store_test, nix_store_get_uri) { std::string str; auto ret = nix_store_get_uri(ctx, store, OBSERVE_STRING(str)); ASSERT_EQ(NIX_OK, ret); ASSERT_STREQ("local", str.c_str()); } TEST_F(nix_api_store_test, InvalidPathFails) { nix_store_parse_path(ctx, store, "invalid-path"); ASSERT_EQ(ctx->last_err_code, NIX_ERR_NIX_ERROR); } TEST_F(nix_api_store_test, ReturnsValidStorePath) { StorePath * result = nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str()); ASSERT_NE(result, nullptr); ASSERT_STREQ("name", result->path.name().data()); ASSERT_STREQ(PATH_SUFFIX.substr(1).c_str(), result->path.to_string().data()); } TEST_F(nix_api_store_test, SetsLastErrCodeToNixOk) { nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str()); ASSERT_EQ(ctx->last_err_code, NIX_OK); } TEST_F(nix_api_store_test, DoesNotCrashWhenContextIsNull) { ASSERT_NO_THROW(nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str())); } TEST_F(nix_api_store_test, get_version) { std::string str; auto ret = nix_store_get_version(ctx, store, OBSERVE_STRING(str)); ASSERT_EQ(NIX_OK, ret); ASSERT_STREQ(PACKAGE_VERSION, str.c_str()); } TEST_F(nix_api_util_context, nix_store_open_dummy) { nix_libstore_init(ctx); Store * store = nix_store_open(ctx, "dummy://", nullptr); ASSERT_EQ(NIX_OK, ctx->last_err_code); ASSERT_STREQ("dummy", store->ptr->getUri().c_str()); std::string str; nix_store_get_version(ctx, store, OBSERVE_STRING(str)); ASSERT_STREQ("", str.c_str()); nix_store_free(store); } TEST_F(nix_api_util_context, nix_store_open_invalid) { nix_libstore_init(ctx); Store * store = nix_store_open(ctx, "invalid://", nullptr); ASSERT_EQ(NIX_ERR_NIX_ERROR, ctx->last_err_code); ASSERT_EQ(nullptr, store); nix_store_free(store); } TEST_F(nix_api_store_test, nix_store_is_valid_path_not_in_store) { StorePath * path = nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str()); ASSERT_EQ(false, nix_store_is_valid_path(ctx, store, path)); } }
2,513
C++
.cc
73
31.342466
95
0.693894
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,003
store-reference.cc
NixOS_nix/src/libstore-tests/store-reference.cc
#include <nlohmann/json.hpp> #include <gtest/gtest.h> #include "file-system.hh" #include "store-reference.hh" #include "tests/characterization.hh" #include "tests/libstore.hh" namespace nix { using nlohmann::json; class StoreReferenceTest : public CharacterizationTest, public LibStoreTest { std::filesystem::path unitTestData = getUnitTestData() / "store-reference"; std::filesystem::path goldenMaster(PathView testStem) const override { return unitTestData / (testStem + ".txt"); } }; #define URI_TEST_READ(STEM, OBJ) \ TEST_F(StoreReferenceTest, PathInfo_##STEM##_from_uri) \ { \ readTest(#STEM, ([&](const auto & encoded) { \ StoreReference expected = OBJ; \ auto got = StoreReference::parse(encoded); \ ASSERT_EQ(got, expected); \ })); \ } #define URI_TEST_WRITE(STEM, OBJ) \ TEST_F(StoreReferenceTest, PathInfo_##STEM##_to_uri) \ { \ writeTest( \ #STEM, \ [&]() -> StoreReference { return OBJ; }, \ [](const auto & file) { return StoreReference::parse(readFile(file)); }, \ [](const auto & file, const auto & got) { return writeFile(file, got.render()); }); \ } #define URI_TEST(STEM, OBJ) \ URI_TEST_READ(STEM, OBJ) \ URI_TEST_WRITE(STEM, OBJ) URI_TEST( auto, (StoreReference{ .variant = StoreReference::Auto{}, .params = {}, })) URI_TEST( auto_param, (StoreReference{ .variant = StoreReference::Auto{}, .params = { {"root", "/foo/bar/baz"}, }, })) static StoreReference localExample_1{ .variant = StoreReference::Specified{ .scheme = "local", }, .params = { {"root", "/foo/bar/baz"}, }, }; static StoreReference localExample_2{ .variant = StoreReference::Specified{ .scheme = "local", .authority = "/foo/bar/baz", }, .params = { {"trusted", "true"}, }, }; URI_TEST(local_1, localExample_1) URI_TEST(local_2, localExample_2) URI_TEST_READ(local_shorthand_1, localExample_1) URI_TEST_READ(local_shorthand_2, localExample_2) static StoreReference unixExample{ .variant = StoreReference::Specified{ .scheme = "unix", }, .params = { {"max-connections", "7"}, {"trusted", "true"}, }, }; URI_TEST(unix, unixExample) URI_TEST_READ(unix_shorthand, unixExample) URI_TEST( ssh, (StoreReference{ .variant = StoreReference::Specified{ .scheme = "ssh", .authority = "localhost", }, .params = {}, })) }
3,390
C++
.cc
101
26.445545
97
0.464034
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,004
downstream-placeholder.cc
NixOS_nix/src/libstore-tests/downstream-placeholder.cc
#include <gtest/gtest.h> #include "downstream-placeholder.hh" namespace nix { TEST(DownstreamPlaceholder, unknownCaOutput) { /** * We set these in tests rather than the regular globals so we don't have * to worry about race conditions if the tests run concurrently. */ ExperimentalFeatureSettings mockXpSettings; mockXpSettings.set("experimental-features", "ca-derivations"); ASSERT_EQ( DownstreamPlaceholder::unknownCaOutput( StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo.drv" }, "out", mockXpSettings).render(), "/0c6rn30q4frawknapgwq386zq358m8r6msvywcvc89n6m5p2dgbz"); } TEST(DownstreamPlaceholder, unknownDerivation) { /** * Same reason as above */ ExperimentalFeatureSettings mockXpSettings; mockXpSettings.set("experimental-features", "dynamic-derivations ca-derivations"); ASSERT_EQ( DownstreamPlaceholder::unknownDerivation( DownstreamPlaceholder::unknownCaOutput( StorePath { "g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-foo.drv.drv" }, "out", mockXpSettings), "out", mockXpSettings).render(), "/0gn6agqxjyyalf0dpihgyf49xq5hqxgw100f0wydnj6yqrhqsb3w"); } }
1,274
C++
.cc
34
30.117647
86
0.694242
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,005
derivation.cc
NixOS_nix/src/libstore-tests/derivation.cc
#include <nlohmann/json.hpp> #include <gtest/gtest.h> #include "experimental-features.hh" #include "derivations.hh" #include "tests/libstore.hh" #include "tests/characterization.hh" namespace nix { using nlohmann::json; class DerivationTest : public CharacterizationTest, public LibStoreTest { std::filesystem::path unitTestData = getUnitTestData() / "derivation"; public: std::filesystem::path goldenMaster(std::string_view testStem) const override { return unitTestData / testStem; } /** * We set these in tests rather than the regular globals so we don't have * to worry about race conditions if the tests run concurrently. */ ExperimentalFeatureSettings mockXpSettings; }; class CaDerivationTest : public DerivationTest { void SetUp() override { mockXpSettings.set("experimental-features", "ca-derivations"); } }; class DynDerivationTest : public DerivationTest { void SetUp() override { mockXpSettings.set("experimental-features", "dynamic-derivations ca-derivations"); } }; class ImpureDerivationTest : public DerivationTest { void SetUp() override { mockXpSettings.set("experimental-features", "impure-derivations"); } }; TEST_F(DerivationTest, BadATerm_version) { ASSERT_THROW( parseDerivation( *store, readFile(goldenMaster("bad-version.drv")), "whatever", mockXpSettings), FormatError); } TEST_F(DynDerivationTest, BadATerm_oldVersionDynDeps) { ASSERT_THROW( parseDerivation( *store, readFile(goldenMaster("bad-old-version-dyn-deps.drv")), "dyn-dep-derivation", mockXpSettings), FormatError); } #define TEST_JSON(FIXTURE, NAME, VAL, DRV_NAME, OUTPUT_NAME) \ TEST_F(FIXTURE, DerivationOutput_ ## NAME ## _from_json) { \ readTest("output-" #NAME ".json", [&](const auto & encoded_) { \ auto encoded = json::parse(encoded_); \ DerivationOutput got = DerivationOutput::fromJSON( \ *store, \ DRV_NAME, \ OUTPUT_NAME, \ encoded, \ mockXpSettings); \ DerivationOutput expected { VAL }; \ ASSERT_EQ(got, expected); \ }); \ } \ \ TEST_F(FIXTURE, DerivationOutput_ ## NAME ## _to_json) { \ writeTest("output-" #NAME ".json", [&]() -> json { \ return DerivationOutput { (VAL) }.toJSON( \ *store, \ (DRV_NAME), \ (OUTPUT_NAME)); \ }, [](const auto & file) { \ return json::parse(readFile(file)); \ }, [](const auto & file, const auto & got) { \ return writeFile(file, got.dump(2) + "\n"); \ }); \ } TEST_JSON(DerivationTest, inputAddressed, (DerivationOutput::InputAddressed { .path = store->parseStorePath("/nix/store/c015dhfh5l0lp6wxyvdn7bmwhbbr6hr9-drv-name-output-name"), }), "drv-name", "output-name") TEST_JSON(DerivationTest, caFixedFlat, (DerivationOutput::CAFixed { .ca = { .method = ContentAddressMethod::Raw::Flat, .hash = Hash::parseAnyPrefixed("sha256-iUUXyRY8iW7DGirb0zwGgf1fRbLA7wimTJKgP7l/OQ8="), }, }), "drv-name", "output-name") TEST_JSON(DerivationTest, caFixedNAR, (DerivationOutput::CAFixed { .ca = { .method = ContentAddressMethod::Raw::NixArchive, .hash = Hash::parseAnyPrefixed("sha256-iUUXyRY8iW7DGirb0zwGgf1fRbLA7wimTJKgP7l/OQ8="), }, }), "drv-name", "output-name") TEST_JSON(DynDerivationTest, caFixedText, (DerivationOutput::CAFixed { .ca = { .method = ContentAddressMethod::Raw::Text, .hash = Hash::parseAnyPrefixed("sha256-iUUXyRY8iW7DGirb0zwGgf1fRbLA7wimTJKgP7l/OQ8="), }, }), "drv-name", "output-name") TEST_JSON(CaDerivationTest, caFloating, (DerivationOutput::CAFloating { .method = ContentAddressMethod::Raw::NixArchive, .hashAlgo = HashAlgorithm::SHA256, }), "drv-name", "output-name") TEST_JSON(DerivationTest, deferred, DerivationOutput::Deferred { }, "drv-name", "output-name") TEST_JSON(ImpureDerivationTest, impure, (DerivationOutput::Impure { .method = ContentAddressMethod::Raw::NixArchive, .hashAlgo = HashAlgorithm::SHA256, }), "drv-name", "output-name") #undef TEST_JSON #define TEST_JSON(FIXTURE, NAME, VAL) \ TEST_F(FIXTURE, Derivation_ ## NAME ## _from_json) { \ readTest(#NAME ".json", [&](const auto & encoded_) { \ auto encoded = json::parse(encoded_); \ Derivation expected { VAL }; \ Derivation got = Derivation::fromJSON( \ *store, \ encoded, \ mockXpSettings); \ ASSERT_EQ(got, expected); \ }); \ } \ \ TEST_F(FIXTURE, Derivation_ ## NAME ## _to_json) { \ writeTest(#NAME ".json", [&]() -> json { \ return Derivation { VAL }.toJSON(*store); \ }, [](const auto & file) { \ return json::parse(readFile(file)); \ }, [](const auto & file, const auto & got) { \ return writeFile(file, got.dump(2) + "\n"); \ }); \ } #define TEST_ATERM(FIXTURE, NAME, VAL, DRV_NAME) \ TEST_F(FIXTURE, Derivation_ ## NAME ## _from_aterm) { \ readTest(#NAME ".drv", [&](auto encoded) { \ Derivation expected { VAL }; \ auto got = parseDerivation( \ *store, \ std::move(encoded), \ DRV_NAME, \ mockXpSettings); \ ASSERT_EQ(got.toJSON(*store), expected.toJSON(*store)) ; \ ASSERT_EQ(got, expected); \ }); \ } \ \ TEST_F(FIXTURE, Derivation_ ## NAME ## _to_aterm) { \ writeTest(#NAME ".drv", [&]() -> std::string { \ return (VAL).unparse(*store, false); \ }); \ } Derivation makeSimpleDrv(const Store & store) { Derivation drv; drv.name = "simple-derivation"; drv.inputSrcs = { store.parseStorePath("/nix/store/c015dhfh5l0lp6wxyvdn7bmwhbbr6hr9-dep1"), }; drv.inputDrvs = { .map = { { store.parseStorePath("/nix/store/c015dhfh5l0lp6wxyvdn7bmwhbbr6hr9-dep2.drv"), { .value = { "cat", "dog", }, }, }, }, }; drv.platform = "wasm-sel4"; drv.builder = "foo"; drv.args = { "bar", "baz", }; drv.env = { { "BIG_BAD", "WOLF", }, }; return drv; } TEST_JSON(DerivationTest, simple, makeSimpleDrv(*store)) TEST_ATERM(DerivationTest, simple, makeSimpleDrv(*store), "simple-derivation") Derivation makeDynDepDerivation(const Store & store) { Derivation drv; drv.name = "dyn-dep-derivation"; drv.inputSrcs = { store.parseStorePath("/nix/store/c015dhfh5l0lp6wxyvdn7bmwhbbr6hr9-dep1"), }; drv.inputDrvs = { .map = { { store.parseStorePath("/nix/store/c015dhfh5l0lp6wxyvdn7bmwhbbr6hr9-dep2.drv"), DerivedPathMap<StringSet>::ChildNode { .value = { "cat", "dog", }, .childMap = { { "cat", DerivedPathMap<StringSet>::ChildNode { .value = { "kitten", }, }, }, { "goose", DerivedPathMap<StringSet>::ChildNode { .value = { "gosling", }, }, }, }, }, }, }, }; drv.platform = "wasm-sel4"; drv.builder = "foo"; drv.args = { "bar", "baz", }; drv.env = { { "BIG_BAD", "WOLF", }, }; return drv; } TEST_JSON(DynDerivationTest, dynDerivationDeps, makeDynDepDerivation(*store)) TEST_ATERM(DynDerivationTest, dynDerivationDeps, makeDynDepDerivation(*store), "dyn-dep-derivation") #undef TEST_JSON #undef TEST_ATERM }
11,012
C++
.cc
268
30.835821
106
0.421264
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,006
nixexpr.cc
NixOS_nix/src/libexpr/nixexpr.cc
#include "nixexpr.hh" #include "eval.hh" #include "symbol-table.hh" #include "util.hh" #include "print.hh" #include <cstdlib> #include <sstream> #include "strings-inline.hh" namespace nix { unsigned long Expr::nrExprs = 0; ExprBlackHole eBlackHole; // FIXME: remove, because *symbols* are abstract and do not have a single // textual representation; see printIdentifier() std::ostream & operator <<(std::ostream & str, const SymbolStr & symbol) { std::string_view s = symbol; return printIdentifier(str, s); } void Expr::show(const SymbolTable & symbols, std::ostream & str) const { unreachable(); } void ExprInt::show(const SymbolTable & symbols, std::ostream & str) const { str << v.integer(); } void ExprFloat::show(const SymbolTable & symbols, std::ostream & str) const { str << v.fpoint(); } void ExprString::show(const SymbolTable & symbols, std::ostream & str) const { printLiteralString(str, s); } void ExprPath::show(const SymbolTable & symbols, std::ostream & str) const { str << s; } void ExprVar::show(const SymbolTable & symbols, std::ostream & str) const { str << symbols[name]; } void ExprSelect::show(const SymbolTable & symbols, std::ostream & str) const { str << "("; e->show(symbols, str); str << ")." << showAttrPath(symbols, attrPath); if (def) { str << " or ("; def->show(symbols, str); str << ")"; } } void ExprOpHasAttr::show(const SymbolTable & symbols, std::ostream & str) const { str << "(("; e->show(symbols, str); str << ") ? " << showAttrPath(symbols, attrPath) << ")"; } void ExprAttrs::showBindings(const SymbolTable & symbols, std::ostream & str) const { typedef const decltype(attrs)::value_type * Attr; std::vector<Attr> sorted; for (auto & i : attrs) sorted.push_back(&i); std::sort(sorted.begin(), sorted.end(), [&](Attr a, Attr b) { std::string_view sa = symbols[a->first], sb = symbols[b->first]; return sa < sb; }); std::vector<Symbol> inherits; // We can use the displacement as a proxy for the order in which the symbols were parsed. // The assignment of displacements should be deterministic, so that showBindings is deterministic. std::map<Displacement, std::vector<Symbol>> inheritsFrom; for (auto & i : sorted) { switch (i->second.kind) { case AttrDef::Kind::Plain: break; case AttrDef::Kind::Inherited: inherits.push_back(i->first); break; case AttrDef::Kind::InheritedFrom: { auto & select = dynamic_cast<ExprSelect &>(*i->second.e); auto & from = dynamic_cast<ExprInheritFrom &>(*select.e); inheritsFrom[from.displ].push_back(i->first); break; } } } if (!inherits.empty()) { str << "inherit"; for (auto sym : inherits) str << " " << symbols[sym]; str << "; "; } for (const auto & [from, syms] : inheritsFrom) { str << "inherit ("; (*inheritFromExprs)[from]->show(symbols, str); str << ")"; for (auto sym : syms) str << " " << symbols[sym]; str << "; "; } for (auto & i : sorted) { if (i->second.kind == AttrDef::Kind::Plain) { str << symbols[i->first] << " = "; i->second.e->show(symbols, str); str << "; "; } } for (auto & i : dynamicAttrs) { str << "\"${"; i.nameExpr->show(symbols, str); str << "}\" = "; i.valueExpr->show(symbols, str); str << "; "; } } void ExprAttrs::show(const SymbolTable & symbols, std::ostream & str) const { if (recursive) str << "rec "; str << "{ "; showBindings(symbols, str); str << "}"; } void ExprList::show(const SymbolTable & symbols, std::ostream & str) const { str << "[ "; for (auto & i : elems) { str << "("; i->show(symbols, str); str << ") "; } str << "]"; } void ExprLambda::show(const SymbolTable & symbols, std::ostream & str) const { str << "("; if (hasFormals()) { str << "{ "; bool first = true; // the natural Symbol ordering is by creation time, which can lead to the // same expression being printed in two different ways depending on its // context. always use lexicographic ordering to avoid this. for (auto & i : formals->lexicographicOrder(symbols)) { if (first) first = false; else str << ", "; str << symbols[i.name]; if (i.def) { str << " ? "; i.def->show(symbols, str); } } if (formals->ellipsis) { if (!first) str << ", "; str << "..."; } str << " }"; if (arg) str << " @ "; } if (arg) str << symbols[arg]; str << ": "; body->show(symbols, str); str << ")"; } void ExprCall::show(const SymbolTable & symbols, std::ostream & str) const { str << '('; fun->show(symbols, str); for (auto e : args) { str << ' '; e->show(symbols, str); } str << ')'; } void ExprLet::show(const SymbolTable & symbols, std::ostream & str) const { str << "(let "; attrs->showBindings(symbols, str); str << "in "; body->show(symbols, str); str << ")"; } void ExprWith::show(const SymbolTable & symbols, std::ostream & str) const { str << "(with "; attrs->show(symbols, str); str << "; "; body->show(symbols, str); str << ")"; } void ExprIf::show(const SymbolTable & symbols, std::ostream & str) const { str << "(if "; cond->show(symbols, str); str << " then "; then->show(symbols, str); str << " else "; else_->show(symbols, str); str << ")"; } void ExprAssert::show(const SymbolTable & symbols, std::ostream & str) const { str << "assert "; cond->show(symbols, str); str << "; "; body->show(symbols, str); } void ExprOpNot::show(const SymbolTable & symbols, std::ostream & str) const { str << "(! "; e->show(symbols, str); str << ")"; } void ExprConcatStrings::show(const SymbolTable & symbols, std::ostream & str) const { bool first = true; str << "("; for (auto & i : *es) { if (first) first = false; else str << " + "; i.second->show(symbols, str); } str << ")"; } void ExprPos::show(const SymbolTable & symbols, std::ostream & str) const { str << "__curPos"; } std::string showAttrPath(const SymbolTable & symbols, const AttrPath & attrPath) { std::ostringstream out; bool first = true; for (auto & i : attrPath) { if (!first) out << '.'; else first = false; if (i.symbol) out << symbols[i.symbol]; else { out << "\"${"; i.expr->show(symbols, out); out << "}\""; } } return out.str(); } /* Computing levels/displacements for variables. */ void Expr::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { unreachable(); } void ExprInt::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); } void ExprFloat::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); } void ExprString::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); } void ExprPath::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); } void ExprVar::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); fromWith = nullptr; /* Check whether the variable appears in the environment. If so, set its level and displacement. */ const StaticEnv * curEnv; Level level; int withLevel = -1; for (curEnv = env.get(), level = 0; curEnv; curEnv = curEnv->up, level++) { if (curEnv->isWith) { if (withLevel == -1) withLevel = level; } else { auto i = curEnv->find(name); if (i != curEnv->vars.end()) { this->level = level; displ = i->second; return; } } } /* Otherwise, the variable must be obtained from the nearest enclosing `with'. If there is no `with', then we can issue an "undefined variable" error now. */ if (withLevel == -1) es.error<UndefinedVarError>( "undefined variable '%1%'", es.symbols[name] ).atPos(pos).debugThrow(); for (auto * e = env.get(); e && !fromWith; e = e->up) fromWith = e->isWith; this->level = withLevel; } void ExprInheritFrom::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); } void ExprSelect::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); e->bindVars(es, env); if (def) def->bindVars(es, env); for (auto & i : attrPath) if (!i.symbol) i.expr->bindVars(es, env); } void ExprOpHasAttr::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); e->bindVars(es, env); for (auto & i : attrPath) if (!i.symbol) i.expr->bindVars(es, env); } std::shared_ptr<const StaticEnv> ExprAttrs::bindInheritSources( EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (!inheritFromExprs) return nullptr; // the inherit (from) source values are inserted into an env of its own, which // does not introduce any variable names. // analysis must see an empty env, or an env that contains only entries with // otherwise unused names to not interfere with regular names. the parser // has already filled all exprs that access this env with appropriate level // and displacement, and nothing else is allowed to access it. ideally we'd // not even *have* an expr that grabs anything from this env since it's fully // invisible, but the evaluator does not allow for this yet. auto inner = std::make_shared<StaticEnv>(nullptr, env.get(), 0); for (auto from : *inheritFromExprs) from->bindVars(es, env); return inner; } void ExprAttrs::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); if (recursive) { auto newEnv = [&] () -> std::shared_ptr<const StaticEnv> { auto newEnv = std::make_shared<StaticEnv>(nullptr, env.get(), attrs.size()); Displacement displ = 0; for (auto & i : attrs) newEnv->vars.emplace_back(i.first, i.second.displ = displ++); return newEnv; }(); // No need to sort newEnv since attrs is in sorted order. auto inheritFromEnv = bindInheritSources(es, newEnv); for (auto & i : attrs) i.second.e->bindVars(es, i.second.chooseByKind(newEnv, env, inheritFromEnv)); for (auto & i : dynamicAttrs) { i.nameExpr->bindVars(es, newEnv); i.valueExpr->bindVars(es, newEnv); } } else { auto inheritFromEnv = bindInheritSources(es, env); for (auto & i : attrs) i.second.e->bindVars(es, i.second.chooseByKind(env, env, inheritFromEnv)); for (auto & i : dynamicAttrs) { i.nameExpr->bindVars(es, env); i.valueExpr->bindVars(es, env); } } } void ExprList::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); for (auto & i : elems) i->bindVars(es, env); } void ExprLambda::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); auto newEnv = std::make_shared<StaticEnv>( nullptr, env.get(), (hasFormals() ? formals->formals.size() : 0) + (!arg ? 0 : 1)); Displacement displ = 0; if (arg) newEnv->vars.emplace_back(arg, displ++); if (hasFormals()) { for (auto & i : formals->formals) newEnv->vars.emplace_back(i.name, displ++); newEnv->sort(); for (auto & i : formals->formals) if (i.def) i.def->bindVars(es, newEnv); } body->bindVars(es, newEnv); } void ExprCall::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); fun->bindVars(es, env); for (auto e : args) e->bindVars(es, env); } void ExprLet::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { auto newEnv = [&] () -> std::shared_ptr<const StaticEnv> { auto newEnv = std::make_shared<StaticEnv>(nullptr, env.get(), attrs->attrs.size()); Displacement displ = 0; for (auto & i : attrs->attrs) newEnv->vars.emplace_back(i.first, i.second.displ = displ++); return newEnv; }(); // No need to sort newEnv since attrs->attrs is in sorted order. auto inheritFromEnv = attrs->bindInheritSources(es, newEnv); for (auto & i : attrs->attrs) i.second.e->bindVars(es, i.second.chooseByKind(newEnv, env, inheritFromEnv)); if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, newEnv)); body->bindVars(es, newEnv); } void ExprWith::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); parentWith = nullptr; for (auto * e = env.get(); e && !parentWith; e = e->up) parentWith = e->isWith; /* Does this `with' have an enclosing `with'? If so, record its level so that `lookupVar' can look up variables in the previous `with' if this one doesn't contain the desired attribute. */ const StaticEnv * curEnv; Level level; prevWith = 0; for (curEnv = env.get(), level = 1; curEnv; curEnv = curEnv->up, level++) if (curEnv->isWith) { prevWith = level; break; } attrs->bindVars(es, env); auto newEnv = std::make_shared<StaticEnv>(this, env.get()); body->bindVars(es, newEnv); } void ExprIf::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); cond->bindVars(es, env); then->bindVars(es, env); else_->bindVars(es, env); } void ExprAssert::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); cond->bindVars(es, env); body->bindVars(es, env); } void ExprOpNot::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); e->bindVars(es, env); } void ExprConcatStrings::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); for (auto & i : *this->es) i.second->bindVars(es, env); } void ExprPos::bindVars(EvalState & es, const std::shared_ptr<const StaticEnv> & env) { if (es.debugRepl) es.exprEnvs.insert(std::make_pair(this, env)); } /* Storing function names. */ void Expr::setName(Symbol name) { } void ExprLambda::setName(Symbol name) { this->name = name; body->setName(name); } std::string ExprLambda::showNamePos(const EvalState & state) const { std::string id(name ? concatStrings("'", state.symbols[name], "'") : "anonymous function"); return fmt("%1% at %2%", id, state.positions[pos]); } void ExprLambda::setDocComment(DocComment docComment) { // RFC 145 specifies that the innermost doc comment wins. // See https://github.com/NixOS/rfcs/blob/master/rfcs/0145-doc-strings.md#ambiguous-placement if (!this->docComment) { this->docComment = docComment; // Curried functions are defined by putting a function directly // in the body of another function. To render docs for those, we // need to propagate the doc comment to the innermost function. // // If we have our own comment, we've already propagated it, so this // belongs in the same conditional. body->setDocComment(docComment); } }; /* Position table. */ Pos PosTable::operator[](PosIdx p) const { auto origin = resolve(p); if (!origin) return {}; const auto offset = origin->offsetOf(p); Pos result{0, 0, origin->origin}; auto lines = this->lines.lock(); auto linesForInput = (*lines)[origin->offset]; if (linesForInput.empty()) { auto source = result.getSource().value_or(""); const char * begin = source.data(); for (Pos::LinesIterator it(source), end; it != end; it++) linesForInput.push_back(it->data() - begin); if (linesForInput.empty()) linesForInput.push_back(0); } // as above: the first line starts at byte 0 and is always present auto lineStartOffset = std::prev( std::upper_bound(linesForInput.begin(), linesForInput.end(), offset)); result.line = 1 + (lineStartOffset - linesForInput.begin()); result.column = 1 + (offset - *lineStartOffset); return result; } /* Symbol table. */ size_t SymbolTable::totalSize() const { size_t n = 0; dump([&] (const std::string & s) { n += s.size(); }); return n; } std::string DocComment::getInnerText(const PosTable & positions) const { auto beginPos = positions[begin]; auto endPos = positions[end]; auto docCommentStr = beginPos.getSnippetUpTo(endPos).value_or(""); // Strip "/**" and "*/" constexpr size_t prefixLen = 3; constexpr size_t suffixLen = 2; std::string docStr = docCommentStr.substr(prefixLen, docCommentStr.size() - prefixLen - suffixLen); if (docStr.empty()) return {}; // Turn the now missing "/**" into indentation docStr = " " + docStr; // Strip indentation (for the whole, potentially multi-line string) docStr = stripIndentation(docStr); return docStr; } /* ‘Cursed or’ handling. * * In parser.y, every use of expr_select in a production must call one of the * two below functions. * * To be removed by https://github.com/NixOS/nix/pull/11121 */ void ExprCall::resetCursedOr() { cursedOrEndPos.reset(); } void ExprCall::warnIfCursedOr(const SymbolTable & symbols, const PosTable & positions) { if (cursedOrEndPos.has_value()) { std::ostringstream out; out << "at " << positions[pos] << ": " "This expression uses `or` as an identifier in a way that will change in a future Nix release.\n" "Wrap this entire expression in parentheses to preserve its current meaning:\n" " (" << positions[pos].getSnippetUpTo(positions[*cursedOrEndPos]).value_or("could not read expression") << ")\n" "Give feedback at https://github.com/NixOS/nix/pull/11121"; warn(out.str()); } } }
19,719
C++
.cc
579
28.366149
130
0.613164
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,007
primops.cc
NixOS_nix/src/libexpr/primops.cc
#include "derivations.hh" #include "downstream-placeholder.hh" #include "eval-inline.hh" #include "eval.hh" #include "eval-settings.hh" #include "gc-small-vector.hh" #include "json-to-value.hh" #include "names.hh" #include "path-references.hh" #include "store-api.hh" #include "util.hh" #include "processes.hh" #include "value-to-json.hh" #include "value-to-xml.hh" #include "primops.hh" #include "fetch-to-store.hh" #include <boost/container/small_vector.hpp> #include <nlohmann/json.hpp> #include <sys/types.h> #include <sys/stat.h> #include <unistd.h> #include <algorithm> #include <cstring> #include <sstream> #include <regex> #ifndef _WIN32 # include <dlfcn.h> #endif #include <cmath> namespace nix { /************************************************************* * Miscellaneous *************************************************************/ static inline Value * mkString(EvalState & state, const std::csub_match & match) { Value * v = state.allocValue(); v->mkString({match.first, match.second}); return v; } StringMap EvalState::realiseContext(const NixStringContext & context, StorePathSet * maybePathsOut, bool isIFD) { std::vector<DerivedPath::Built> drvs; StringMap res; for (auto & c : context) { auto ensureValid = [&](const StorePath & p) { if (!store->isValidPath(p)) error<InvalidPathError>(store->printStorePath(p)).debugThrow(); }; std::visit(overloaded { [&](const NixStringContextElem::Built & b) { drvs.push_back(DerivedPath::Built { .drvPath = b.drvPath, .outputs = OutputsSpec::Names { b.output }, }); ensureValid(b.drvPath->getBaseStorePath()); }, [&](const NixStringContextElem::Opaque & o) { auto ctxS = store->printStorePath(o.path); ensureValid(o.path); if (maybePathsOut) maybePathsOut->emplace(o.path); }, [&](const NixStringContextElem::DrvDeep & d) { /* Treat same as Opaque */ auto ctxS = store->printStorePath(d.drvPath); ensureValid(d.drvPath); if (maybePathsOut) maybePathsOut->emplace(d.drvPath); }, }, c.raw); } if (drvs.empty()) return {}; if (isIFD && !settings.enableImportFromDerivation) error<EvalBaseError>( "cannot build '%1%' during evaluation because the option 'allow-import-from-derivation' is disabled", drvs.begin()->to_string(*store) ).debugThrow(); /* Build/substitute the context. */ std::vector<DerivedPath> buildReqs; buildReqs.reserve(drvs.size()); for (auto & d : drvs) buildReqs.emplace_back(DerivedPath { d }); buildStore->buildPaths(buildReqs, bmNormal, store); StorePathSet outputsToCopyAndAllow; for (auto & drv : drvs) { auto outputs = resolveDerivedPath(*buildStore, drv, &*store); for (auto & [outputName, outputPath] : outputs) { outputsToCopyAndAllow.insert(outputPath); if (maybePathsOut) maybePathsOut->emplace(outputPath); /* Get all the output paths corresponding to the placeholders we had */ if (experimentalFeatureSettings.isEnabled(Xp::CaDerivations)) { res.insert_or_assign( DownstreamPlaceholder::fromSingleDerivedPathBuilt( SingleDerivedPath::Built { .drvPath = drv.drvPath, .output = outputName, }).render(), buildStore->printStorePath(outputPath) ); } } } if (store != buildStore) copyClosure(*buildStore, *store, outputsToCopyAndAllow); if (isIFD) { for (auto & outputPath : outputsToCopyAndAllow) { /* Add the output of this derivations to the allowed paths. */ allowPath(outputPath); } } return res; } static SourcePath realisePath(EvalState & state, const PosIdx pos, Value & v, std::optional<SymlinkResolution> resolveSymlinks = SymlinkResolution::Full) { NixStringContext context; auto path = state.coerceToPath(noPos, v, context, "while realising the context of a path"); try { if (!context.empty() && path.accessor == state.rootFS) { auto rewrites = state.realiseContext(context); auto realPath = state.toRealPath(rewriteStrings(path.path.abs(), rewrites), context); path = {path.accessor, CanonPath(realPath)}; } return resolveSymlinks ? path.resolveSymlinks(*resolveSymlinks) : path; } catch (Error & e) { e.addTrace(state.positions[pos], "while realising the context of path '%s'", path); throw; } } /** * Add and attribute to the given attribute map from the output name to * the output path, or a placeholder. * * Where possible the path is used, but for floating CA derivations we * may not know it. For sake of determinism we always assume we don't * and instead put in a place holder. In either case, however, the * string context will contain the drv path and output name, so * downstream derivations will have the proper dependency, and in * addition, before building, the placeholder will be rewritten to be * the actual path. * * The 'drv' and 'drvPath' outputs must correspond. */ static void mkOutputString( EvalState & state, BindingsBuilder & attrs, const StorePath & drvPath, const std::pair<std::string, DerivationOutput> & o) { state.mkOutputString( attrs.alloc(o.first), SingleDerivedPath::Built { .drvPath = makeConstantStorePathRef(drvPath), .output = o.first, }, o.second.path(*state.store, Derivation::nameFromPath(drvPath), o.first)); } /** * `import` will parse a derivation when it imports a `.drv` file from the store. * * @param state The evaluation state. * @param pos The position of the `import` call. * @param path The path to the `.drv` to import. * @param storePath The path to the `.drv` to import. * @param v Return value */ void derivationToValue(EvalState & state, const PosIdx pos, const SourcePath & path, const StorePath & storePath, Value & v) { auto path2 = path.path.abs(); Derivation drv = state.store->readDerivation(storePath); auto attrs = state.buildBindings(3 + drv.outputs.size()); attrs.alloc(state.sDrvPath).mkString(path2, { NixStringContextElem::DrvDeep { .drvPath = storePath }, }); attrs.alloc(state.sName).mkString(drv.env["name"]); auto list = state.buildList(drv.outputs.size()); for (const auto & [i, o] : enumerate(drv.outputs)) { mkOutputString(state, attrs, storePath, o); (list[i] = state.allocValue())->mkString(o.first); } attrs.alloc(state.sOutputs).mkList(list); auto w = state.allocValue(); w->mkAttrs(attrs); if (!state.vImportedDrvToDerivation) { state.vImportedDrvToDerivation = allocRootValue(state.allocValue()); state.eval(state.parseExprFromString( #include "imported-drv-to-derivation.nix.gen.hh" , state.rootPath(CanonPath::root)), **state.vImportedDrvToDerivation); } state.forceFunction(**state.vImportedDrvToDerivation, pos, "while evaluating imported-drv-to-derivation.nix.gen.hh"); v.mkApp(*state.vImportedDrvToDerivation, w); state.forceAttrs(v, pos, "while calling imported-drv-to-derivation.nix.gen.hh"); } /** * Import a Nix file with an alternate base scope, as `builtins.scopedImport` does. * * @param state The evaluation state. * @param pos The position of the import call. * @param path The path to the file to import. * @param vScope The base scope to use for the import. * @param v Return value */ static void scopedImport(EvalState & state, const PosIdx pos, SourcePath & path, Value * vScope, Value & v) { state.forceAttrs(*vScope, pos, "while evaluating the first argument passed to builtins.scopedImport"); Env * env = &state.allocEnv(vScope->attrs()->size()); env->up = &state.baseEnv; auto staticEnv = std::make_shared<StaticEnv>(nullptr, state.staticBaseEnv.get(), vScope->attrs()->size()); unsigned int displ = 0; for (auto & attr : *vScope->attrs()) { staticEnv->vars.emplace_back(attr.name, displ); env->values[displ++] = attr.value; } // No need to call staticEnv.sort(), because // args[0]->attrs is already sorted. printTalkative("evaluating file '%1%'", path); Expr * e = state.parseExprFromFile(resolveExprPath(path), staticEnv); e->eval(state, *env, v); } /* Load and evaluate an expression from path specified by the argument. */ static void import(EvalState & state, const PosIdx pos, Value & vPath, Value * vScope, Value & v) { auto path = realisePath(state, pos, vPath, std::nullopt); auto path2 = path.path.abs(); // FIXME auto isValidDerivationInStore = [&]() -> std::optional<StorePath> { if (!state.store->isStorePath(path2)) return std::nullopt; auto storePath = state.store->parseStorePath(path2); if (!(state.store->isValidPath(storePath) && isDerivation(path2))) return std::nullopt; return storePath; }; if (auto storePath = isValidDerivationInStore()) { derivationToValue(state, pos, path, *storePath, v); } else if (vScope) { scopedImport(state, pos, path, vScope, v); } else { state.evalFile(path, v); } } static RegisterPrimOp primop_scopedImport(PrimOp { .name = "scopedImport", .arity = 2, .fun = [](EvalState & state, const PosIdx pos, Value * * args, Value & v) { import(state, pos, *args[1], args[0], v); } }); static RegisterPrimOp primop_import({ .name = "import", .args = {"path"}, // TODO turn "normal path values" into link below .doc = R"( Load, parse, and return the Nix expression in the file *path*. > **Note** > > Unlike some languages, `import` is a regular function in Nix. The *path* argument must meet the same criteria as an [interpolated expression](@docroot@/language/string-interpolation.md#interpolated-expression). If *path* is a directory, the file `default.nix` in that directory is used if it exists. > **Example** > > ```console > $ echo 123 > default.nix > ``` > > Import `default.nix` from the current directory. > > ```nix > import ./. > ``` > > 123 Evaluation aborts if the file doesn’t exist or contains an invalid Nix expression. A Nix expression loaded by `import` must not contain any *free variables*, that is, identifiers that are not defined in the Nix expression itself and are not built-in. Therefore, it cannot refer to variables that are in scope at the call site. > **Example** > > If you have a calling expression > > ```nix > rec { > x = 123; > y = import ./foo.nix; > } > ``` > > then the following `foo.nix` will give an error: > > ```nix > # foo.nix > x + 456 > ``` > > since `x` is not in scope in `foo.nix`. > If you want `x` to be available in `foo.nix`, pass it as a function argument: > > ```nix > rec { > x = 123; > y = import ./foo.nix x; > } > ``` > > and > > ```nix > # foo.nix > x: x + 456 > ``` > > The function argument doesn’t have to be called `x` in `foo.nix`; any name would work. )", .fun = [](EvalState & state, const PosIdx pos, Value * * args, Value & v) { import(state, pos, *args[0], nullptr, v); } }); #ifndef _WIN32 // TODO implement via DLL loading on Windows /* Want reasonable symbol names, so extern C */ /* !!! Should we pass the Pos or the file name too? */ extern "C" typedef void (*ValueInitializer)(EvalState & state, Value & v); /* Load a ValueInitializer from a DSO and return whatever it initializes */ void prim_importNative(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto path = realisePath(state, pos, *args[0]); std::string sym(state.forceStringNoCtx(*args[1], pos, "while evaluating the second argument passed to builtins.importNative")); void *handle = dlopen(path.path.c_str(), RTLD_LAZY | RTLD_LOCAL); if (!handle) state.error<EvalError>("could not open '%1%': %2%", path, dlerror()).debugThrow(); dlerror(); ValueInitializer func = (ValueInitializer) dlsym(handle, sym.c_str()); if(!func) { char *message = dlerror(); if (message) state.error<EvalError>("could not load symbol '%1%' from '%2%': %3%", sym, path, message).debugThrow(); else state.error<EvalError>("symbol '%1%' from '%2%' resolved to NULL when a function pointer was expected", sym, path).debugThrow(); } (func)(state, v); /* We don't dlclose because v may be a primop referencing a function in the shared object file */ } /* Execute a program and parse its output */ void prim_exec(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[0], pos, "while evaluating the first argument passed to builtins.exec"); auto elems = args[0]->listElems(); auto count = args[0]->listSize(); if (count == 0) state.error<EvalError>("at least one argument to 'exec' required").atPos(pos).debugThrow(); NixStringContext context; auto program = state.coerceToString(pos, *elems[0], context, "while evaluating the first element of the argument passed to builtins.exec", false, false).toOwned(); Strings commandArgs; for (unsigned int i = 1; i < args[0]->listSize(); ++i) { commandArgs.push_back( state.coerceToString(pos, *elems[i], context, "while evaluating an element of the argument passed to builtins.exec", false, false).toOwned()); } try { auto _ = state.realiseContext(context); // FIXME: Handle CA derivations } catch (InvalidPathError & e) { state.error<EvalError>("cannot execute '%1%', since path '%2%' is not valid", program, e.path).atPos(pos).debugThrow(); } auto output = runProgram(program, true, commandArgs); Expr * parsed; try { parsed = state.parseExprFromString(std::move(output), state.rootPath(CanonPath::root)); } catch (Error & e) { e.addTrace(state.positions[pos], "while parsing the output from '%1%'", program); throw; } try { state.eval(parsed, v); } catch (Error & e) { e.addTrace(state.positions[pos], "while evaluating the output from '%1%'", program); throw; } } #endif /* Return a string representing the type of the expression. */ static void prim_typeOf(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); std::string t; switch (args[0]->type()) { case nInt: t = "int"; break; case nBool: t = "bool"; break; case nString: t = "string"; break; case nPath: t = "path"; break; case nNull: t = "null"; break; case nAttrs: t = "set"; break; case nList: t = "list"; break; case nFunction: t = "lambda"; break; case nExternal: t = args[0]->external()->typeOf(); break; case nFloat: t = "float"; break; case nThunk: unreachable(); } v.mkString(t); } static RegisterPrimOp primop_typeOf({ .name = "__typeOf", .args = {"e"}, .doc = R"( Return a string representing the type of the value *e*, namely `"int"`, `"bool"`, `"string"`, `"path"`, `"null"`, `"set"`, `"list"`, `"lambda"` or `"float"`. )", .fun = prim_typeOf, }); /* Determine whether the argument is the null value. */ static void prim_isNull(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nNull); } static RegisterPrimOp primop_isNull({ .name = "isNull", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to `null`, and `false` otherwise. This is equivalent to `e == null`. )", .fun = prim_isNull, }); /* Determine whether the argument is a function. */ static void prim_isFunction(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nFunction); } static RegisterPrimOp primop_isFunction({ .name = "__isFunction", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to a function, and `false` otherwise. )", .fun = prim_isFunction, }); /* Determine whether the argument is an integer. */ static void prim_isInt(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nInt); } static RegisterPrimOp primop_isInt({ .name = "__isInt", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to an integer, and `false` otherwise. )", .fun = prim_isInt, }); /* Determine whether the argument is a float. */ static void prim_isFloat(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nFloat); } static RegisterPrimOp primop_isFloat({ .name = "__isFloat", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to a float, and `false` otherwise. )", .fun = prim_isFloat, }); /* Determine whether the argument is a string. */ static void prim_isString(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nString); } static RegisterPrimOp primop_isString({ .name = "__isString", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to a string, and `false` otherwise. )", .fun = prim_isString, }); /* Determine whether the argument is a Boolean. */ static void prim_isBool(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nBool); } static RegisterPrimOp primop_isBool({ .name = "__isBool", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to a bool, and `false` otherwise. )", .fun = prim_isBool, }); /* Determine whether the argument is a path. */ static void prim_isPath(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nPath); } static RegisterPrimOp primop_isPath({ .name = "__isPath", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to a path, and `false` otherwise. )", .fun = prim_isPath, }); template<typename Callable> static inline void withExceptionContext(Trace trace, Callable&& func) { try { func(); } catch(Error & e) { e.pushTrace(trace); throw; } } struct CompareValues { EvalState & state; const PosIdx pos; const std::string_view errorCtx; CompareValues(EvalState & state, const PosIdx pos, const std::string_view && errorCtx) : state(state), pos(pos), errorCtx(errorCtx) { }; bool operator () (Value * v1, Value * v2) const { return (*this)(v1, v2, errorCtx); } bool operator () (Value * v1, Value * v2, std::string_view errorCtx) const { try { if (v1->type() == nFloat && v2->type() == nInt) return v1->fpoint() < v2->integer().value; if (v1->type() == nInt && v2->type() == nFloat) return v1->integer().value < v2->fpoint(); if (v1->type() != v2->type()) state.error<EvalError>("cannot compare %s with %s", showType(*v1), showType(*v2)).debugThrow(); // Allow selecting a subset of enum values #pragma GCC diagnostic push #pragma GCC diagnostic ignored "-Wswitch-enum" switch (v1->type()) { case nInt: return v1->integer() < v2->integer(); case nFloat: return v1->fpoint() < v2->fpoint(); case nString: return strcmp(v1->c_str(), v2->c_str()) < 0; case nPath: // Note: we don't take the accessor into account // since it's not obvious how to compare them in a // reproducible way. return strcmp(v1->payload.path.path, v2->payload.path.path) < 0; case nList: // Lexicographic comparison for (size_t i = 0;; i++) { if (i == v2->listSize()) { return false; } else if (i == v1->listSize()) { return true; } else if (!state.eqValues(*v1->listElems()[i], *v2->listElems()[i], pos, errorCtx)) { return (*this)(v1->listElems()[i], v2->listElems()[i], "while comparing two list elements"); } } default: state.error<EvalError>("cannot compare %s with %s; values of that type are incomparable", showType(*v1), showType(*v2)).debugThrow(); #pragma GCC diagnostic pop } } catch (Error & e) { if (!errorCtx.empty()) e.addTrace(nullptr, errorCtx); throw; } } }; typedef std::list<Value *, gc_allocator<Value *>> ValueList; static Bindings::const_iterator getAttr( EvalState & state, Symbol attrSym, const Bindings * attrSet, std::string_view errorCtx) { auto value = attrSet->find(attrSym); if (value == attrSet->end()) { state.error<TypeError>("attribute '%s' missing", state.symbols[attrSym]).withTrace(noPos, errorCtx).debugThrow(); } return value; } static void prim_genericClosure(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[0], noPos, "while evaluating the first argument passed to builtins.genericClosure"); /* Get the start set. */ auto startSet = getAttr(state, state.sStartSet, args[0]->attrs(), "in the attrset passed as argument to builtins.genericClosure"); state.forceList(*startSet->value, noPos, "while evaluating the 'startSet' attribute passed as argument to builtins.genericClosure"); ValueList workSet; for (auto elem : startSet->value->listItems()) workSet.push_back(elem); if (startSet->value->listSize() == 0) { v = *startSet->value; return; } /* Get the operator. */ auto op = getAttr(state, state.sOperator, args[0]->attrs(), "in the attrset passed as argument to builtins.genericClosure"); state.forceFunction(*op->value, noPos, "while evaluating the 'operator' attribute passed as argument to builtins.genericClosure"); /* Construct the closure by applying the operator to elements of `workSet', adding the result to `workSet', continuing until no new elements are found. */ ValueList res; // `doneKeys' doesn't need to be a GC root, because its values are // reachable from res. auto cmp = CompareValues(state, noPos, "while comparing the `key` attributes of two genericClosure elements"); std::set<Value *, decltype(cmp)> doneKeys(cmp); while (!workSet.empty()) { Value * e = *(workSet.begin()); workSet.pop_front(); state.forceAttrs(*e, noPos, "while evaluating one of the elements generated by (or initially passed to) builtins.genericClosure"); auto key = getAttr(state, state.sKey, e->attrs(), "in one of the attrsets generated by (or initially passed to) builtins.genericClosure"); state.forceValue(*key->value, noPos); if (!doneKeys.insert(key->value).second) continue; res.push_back(e); /* Call the `operator' function with `e' as argument. */ Value newElements; state.callFunction(*op->value, 1, &e, newElements, noPos); state.forceList(newElements, noPos, "while evaluating the return value of the `operator` passed to builtins.genericClosure"); /* Add the values returned by the operator to the work set. */ for (auto elem : newElements.listItems()) { state.forceValue(*elem, noPos); // "while evaluating one one of the elements returned by the `operator` passed to builtins.genericClosure"); workSet.push_back(elem); } } /* Create the result list. */ auto list = state.buildList(res.size()); for (const auto & [n, i] : enumerate(res)) list[n] = i; v.mkList(list); } static RegisterPrimOp primop_genericClosure(PrimOp { .name = "__genericClosure", .args = {"attrset"}, .arity = 1, .doc = R"( `builtins.genericClosure` iteratively computes the transitive closure over an arbitrary relation defined by a function. It takes *attrset* with two attributes named `startSet` and `operator`, and returns a list of attribute sets: - `startSet`: The initial list of attribute sets. - `operator`: A function that takes an attribute set and returns a list of attribute sets. It defines how each item in the current set is processed and expanded into more items. Each attribute set in the list `startSet` and the list returned by `operator` must have an attribute `key`, which must support equality comparison. The value of `key` can be one of the following types: - [Int](@docroot@/language/types.md#type-int) - [Float](@docroot@/language/types.md#type-float) - [Boolean](@docroot@/language/types.md#type-boolean) - [String](@docroot@/language/types.md#type-string) - [Path](@docroot@/language/types.md#type-path) - [List](@docroot@/language/types.md#list) The result is produced by calling the `operator` on each `item` that has not been called yet, including newly added items, until no new items are added. Items are compared by their `key` attribute. Common usages are: - Generating unique collections of items, such as dependency graphs. - Traversing through structures that may contain cycles or loops. - Processing data structures with complex internal relationships. > **Example** > > ```nix > builtins.genericClosure { > startSet = [ {key = 5;} ]; > operator = item: [{ > key = if (item.key / 2 ) * 2 == item.key > then item.key / 2 > else 3 * item.key + 1; > }]; > } > ``` > > evaluates to > > ```nix > [ { key = 5; } { key = 16; } { key = 8; } { key = 4; } { key = 2; } { key = 1; } ] > ``` )", .fun = prim_genericClosure, }); static RegisterPrimOp primop_break({ .name = "break", .args = {"v"}, .doc = R"( In debug mode (enabled using `--debugger`), pause Nix expression evaluation and enter the REPL. Otherwise, return the argument `v`. )", .fun = [](EvalState & state, const PosIdx pos, Value * * args, Value & v) { if (state.canDebug()) { auto error = Error(ErrorInfo { .level = lvlInfo, .msg = HintFmt("breakpoint reached"), .pos = state.positions[pos], }); state.runDebugRepl(&error); } // Return the value we were passed. v = *args[0]; } }); static RegisterPrimOp primop_abort({ .name = "abort", .args = {"s"}, .doc = R"( Abort Nix expression evaluation and print the error message *s*. )", .fun = [](EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto s = state.coerceToString(pos, *args[0], context, "while evaluating the error message passed to builtins.abort").toOwned(); state.error<Abort>("evaluation aborted with the following error message: '%1%'", s).setIsFromExpr().debugThrow(); } }); static RegisterPrimOp primop_throw({ .name = "throw", .args = {"s"}, .doc = R"( Throw an error message *s*. This usually aborts Nix expression evaluation, but in `nix-env -qa` and other commands that try to evaluate a set of derivations to get information about those derivations, a derivation that throws an error is silently skipped (which is not the case for `abort`). )", .fun = [](EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto s = state.coerceToString(pos, *args[0], context, "while evaluating the error message passed to builtin.throw").toOwned(); state.error<ThrownError>(s).setIsFromExpr().debugThrow(); } }); static void prim_addErrorContext(EvalState & state, const PosIdx pos, Value * * args, Value & v) { try { state.forceValue(*args[1], pos); v = *args[1]; } catch (Error & e) { NixStringContext context; auto message = state.coerceToString(pos, *args[0], context, "while evaluating the error message passed to builtins.addErrorContext", false, false).toOwned(); e.addTrace(nullptr, HintFmt(message), TracePrint::Always); throw; } } static RegisterPrimOp primop_addErrorContext(PrimOp { .name = "__addErrorContext", .arity = 2, // The normal trace item is redundant .addTrace = false, .fun = prim_addErrorContext, }); static void prim_ceil(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto value = state.forceFloat(*args[0], args[0]->determinePos(pos), "while evaluating the first argument passed to builtins.ceil"); v.mkInt(ceil(value)); } static RegisterPrimOp primop_ceil({ .name = "__ceil", .args = {"double"}, .doc = R"( Converts an IEEE-754 double-precision floating-point number (*double*) to the next higher integer. If the datatype is neither an integer nor a "float", an evaluation error will be thrown. )", .fun = prim_ceil, }); static void prim_floor(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto value = state.forceFloat(*args[0], args[0]->determinePos(pos), "while evaluating the first argument passed to builtins.floor"); v.mkInt(floor(value)); } static RegisterPrimOp primop_floor({ .name = "__floor", .args = {"double"}, .doc = R"( Converts an IEEE-754 double-precision floating-point number (*double*) to the next lower integer. If the datatype is neither an integer nor a "float", an evaluation error will be thrown. )", .fun = prim_floor, }); /* Try evaluating the argument. Success => {success=true; value=something;}, * else => {success=false; value=false;} */ static void prim_tryEval(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto attrs = state.buildBindings(2); /* increment state.trylevel, and decrement it when this function returns. */ MaintainCount trylevel(state.trylevel); ReplExitStatus (* savedDebugRepl)(ref<EvalState> es, const ValMap & extraEnv) = nullptr; if (state.debugRepl && state.settings.ignoreExceptionsDuringTry) { /* to prevent starting the repl from exceptions withing a tryEval, null it. */ savedDebugRepl = state.debugRepl; state.debugRepl = nullptr; } try { state.forceValue(*args[0], pos); attrs.insert(state.sValue, args[0]); attrs.insert(state.symbols.create("success"), &state.vTrue); } catch (AssertionError & e) { // `value = false;` is unfortunate but removing it is a breaking change. attrs.insert(state.sValue, &state.vFalse); attrs.insert(state.symbols.create("success"), &state.vFalse); } // restore the debugRepl pointer if we saved it earlier. if (savedDebugRepl) state.debugRepl = savedDebugRepl; v.mkAttrs(attrs); } static RegisterPrimOp primop_tryEval({ .name = "__tryEval", .args = {"e"}, .doc = R"( Try to shallowly evaluate *e*. Return a set containing the attributes `success` (`true` if *e* evaluated successfully, `false` if an error was thrown) and `value`, equalling *e* if successful and `false` otherwise. `tryEval` will only prevent errors created by `throw` or `assert` from being thrown. Errors `tryEval` will not catch are for example those created by `abort` and type errors generated by builtins. Also note that this doesn't evaluate *e* deeply, so `let e = { x = throw ""; }; in (builtins.tryEval e).success` will be `true`. Using `builtins.deepSeq` one can get the expected result: `let e = { x = throw ""; }; in (builtins.tryEval (builtins.deepSeq e e)).success` will be `false`. `tryEval` intentionally does not return the error message, because that risks bringing non-determinism into the evaluation result, and it would become very difficult to improve error reporting without breaking existing expressions. Instead, use [`builtins.addErrorContext`](@docroot@/language/builtins.md#builtins-addErrorContext) to add context to the error message, and use a Nix unit testing tool for testing. )", .fun = prim_tryEval, }); /* Return an environment variable. Use with care. */ static void prim_getEnv(EvalState & state, const PosIdx pos, Value * * args, Value & v) { std::string name(state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.getEnv")); v.mkString(state.settings.restrictEval || state.settings.pureEval ? "" : getEnv(name).value_or("")); } static RegisterPrimOp primop_getEnv({ .name = "__getEnv", .args = {"s"}, .doc = R"( `getEnv` returns the value of the environment variable *s*, or an empty string if the variable doesn’t exist. This function should be used with care, as it can introduce all sorts of nasty environment dependencies in your Nix expression. `getEnv` is used in Nix Packages to locate the file `~/.nixpkgs/config.nix`, which contains user-local settings for Nix Packages. (That is, it does a `getEnv "HOME"` to locate the user’s home directory.) )", .fun = prim_getEnv, }); /* Evaluate the first argument, then return the second argument. */ static void prim_seq(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); state.forceValue(*args[1], pos); v = *args[1]; } static RegisterPrimOp primop_seq({ .name = "__seq", .args = {"e1", "e2"}, .doc = R"( Evaluate *e1*, then evaluate and return *e2*. This ensures that a computation is strict in the value of *e1*. )", .fun = prim_seq, }); /* Evaluate the first argument deeply (i.e. recursing into lists and attrsets), then return the second argument. */ static void prim_deepSeq(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValueDeep(*args[0]); state.forceValue(*args[1], pos); v = *args[1]; } static RegisterPrimOp primop_deepSeq({ .name = "__deepSeq", .args = {"e1", "e2"}, .doc = R"( This is like `seq e1 e2`, except that *e1* is evaluated *deeply*: if it’s a list or set, its elements or attributes are also evaluated recursively. )", .fun = prim_deepSeq, }); /* Evaluate the first expression and print it on standard error. Then return the second expression. Useful for debugging. */ static void prim_trace(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); if (args[0]->type() == nString) printError("trace: %1%", args[0]->string_view()); else printError("trace: %1%", ValuePrinter(state, *args[0])); if (state.settings.builtinsTraceDebugger) { state.runDebugRepl(nullptr); } state.forceValue(*args[1], pos); v = *args[1]; } static RegisterPrimOp primop_trace({ .name = "__trace", .args = {"e1", "e2"}, .doc = R"( Evaluate *e1* and print its abstract syntax representation on standard error. Then return *e2*. This function is useful for debugging. If the [`debugger-on-trace`](@docroot@/command-ref/conf-file.md#conf-debugger-on-trace) option is set to `true` and the `--debugger` flag is given, the interactive debugger will be started when `trace` is called (like [`break`](@docroot@/language/builtins.md#builtins-break)). )", .fun = prim_trace, }); static void prim_warn(EvalState & state, const PosIdx pos, Value * * args, Value & v) { // We only accept a string argument for now. The use case for pretty printing a value is covered by `trace`. // By rejecting non-strings we allow future versions to add more features without breaking existing code. auto msgStr = state.forceString(*args[0], pos, "while evaluating the first argument; the message passed to builtins.warn"); { BaseError msg(std::string{msgStr}); msg.atPos(state.positions[pos]); auto info = msg.info(); info.level = lvlWarn; info.isFromExpr = true; logWarning(info); } if (state.settings.builtinsAbortOnWarn) { // Not an EvalError or subclass, which would cause the error to be stored in the eval cache. state.error<EvalBaseError>("aborting to reveal stack trace of warning, as abort-on-warn is set").setIsFromExpr().debugThrow(); } if (state.settings.builtinsTraceDebugger || state.settings.builtinsDebuggerOnWarn) { state.runDebugRepl(nullptr); } state.forceValue(*args[1], pos); v = *args[1]; } static RegisterPrimOp primop_warn({ .name = "__warn", .args = {"e1", "e2"}, .doc = R"( Evaluate *e1*, which must be a string and print iton standard error as a warning. Then return *e2*. This function is useful for non-critical situations where attention is advisable. If the [`debugger-on-trace`](@docroot@/command-ref/conf-file.md#conf-debugger-on-trace) or [`debugger-on-warn`](@docroot@/command-ref/conf-file.md#conf-debugger-on-warn) option is set to `true` and the `--debugger` flag is given, the interactive debugger will be started when `warn` is called (like [`break`](@docroot@/language/builtins.md#builtins-break)). If the [`abort-on-warn`](@docroot@/command-ref/conf-file.md#conf-abort-on-warn) option is set, the evaluation will be aborted after the warning is printed. This is useful to reveal the stack trace of the warning, when the context is non-interactive and a debugger can not be launched. )", .fun = prim_warn, }); /* Takes two arguments and evaluates to the second one. Used as the * builtins.traceVerbose implementation when --trace-verbose is not enabled */ static void prim_second(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[1], pos); v = *args[1]; } /************************************************************* * Derivations *************************************************************/ static void derivationStrictInternal( EvalState & state, const std::string & name, const Bindings * attrs, Value & v); /* Construct (as a unobservable side effect) a Nix derivation expression that performs the derivation described by the argument set. Returns the original set extended with the following attributes: `outPath' containing the primary output path of the derivation; `drvPath' containing the path of the Nix expression; and `type' set to `derivation' to indicate that this is a derivation. */ static void prim_derivationStrict(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[0], pos, "while evaluating the argument passed to builtins.derivationStrict"); auto attrs = args[0]->attrs(); /* Figure out the name first (for stack backtraces). */ auto nameAttr = getAttr(state, state.sName, attrs, "in the attrset passed as argument to builtins.derivationStrict"); std::string drvName; try { drvName = state.forceStringNoCtx(*nameAttr->value, pos, "while evaluating the `name` attribute passed to builtins.derivationStrict"); } catch (Error & e) { e.addTrace(state.positions[nameAttr->pos], "while evaluating the derivation attribute 'name'"); throw; } try { derivationStrictInternal(state, drvName, attrs, v); } catch (Error & e) { Pos pos = state.positions[nameAttr->pos]; /* * Here we make two abuses of the error system * * 1. We print the location as a string to avoid a code snippet being * printed. While the location of the name attribute is a good hint, the * exact code there is irrelevant. * * 2. We mark this trace as a frame trace, meaning that we stop printing * less important traces from now on. In particular, this prevents the * display of the automatic "while calling builtins.derivationStrict" * trace, which is of little use for the public we target here. * * Please keep in mind that error reporting is done on a best-effort * basis in nix. There is no accurate location for a derivation, as it * often results from the composition of several functions * (derivationStrict, derivation, mkDerivation, mkPythonModule, etc.) */ e.addTrace(nullptr, HintFmt( "while evaluating derivation '%s'\n" " whose name attribute is located at %s", drvName, pos)); throw; } } /** * Early validation for the derivation name, for better error message. * It is checked again when constructing store paths. * * @todo Check that the `.drv` suffix also fits. */ static void checkDerivationName(EvalState & state, std::string_view drvName) { try { checkName(drvName); } catch (BadStorePathName & e) { // "Please pass a different name": Users may not be aware that they can // pass a different one, in functions like `fetchurl` where the name // is optional. // Note that Nixpkgs generally won't trigger this, because `mkDerivation` // sanitizes the name. state.error<EvalError>("invalid derivation name: %s. Please pass a different '%s'.", Uncolored(e.message()), "name").debugThrow(); } } static void derivationStrictInternal( EvalState & state, const std::string & drvName, const Bindings * attrs, Value & v) { checkDerivationName(state, drvName); /* Check whether attributes should be passed as a JSON file. */ using nlohmann::json; std::optional<json> jsonObject; auto pos = v.determinePos(noPos); auto attr = attrs->find(state.sStructuredAttrs); if (attr != attrs->end() && state.forceBool(*attr->value, pos, "while evaluating the `__structuredAttrs` " "attribute passed to builtins.derivationStrict")) jsonObject = json::object(); /* Check whether null attributes should be ignored. */ bool ignoreNulls = false; attr = attrs->find(state.sIgnoreNulls); if (attr != attrs->end()) ignoreNulls = state.forceBool(*attr->value, pos, "while evaluating the `__ignoreNulls` attribute " "passed to builtins.derivationStrict"); /* Build the derivation expression by processing the attributes. */ Derivation drv; drv.name = drvName; NixStringContext context; bool contentAddressed = false; bool isImpure = false; std::optional<std::string> outputHash; std::optional<HashAlgorithm> outputHashAlgo; std::optional<ContentAddressMethod> ingestionMethod; StringSet outputs; outputs.insert("out"); for (auto & i : attrs->lexicographicOrder(state.symbols)) { if (i->name == state.sIgnoreNulls) continue; auto key = state.symbols[i->name]; vomit("processing attribute '%1%'", key); auto handleHashMode = [&](const std::string_view s) { if (s == "recursive") { // back compat, new name is "nar" ingestionMethod = ContentAddressMethod::Raw::NixArchive; } else try { ingestionMethod = ContentAddressMethod::parse(s); } catch (UsageError &) { state.error<EvalError>( "invalid value '%s' for 'outputHashMode' attribute", s ).atPos(v).debugThrow(); } if (ingestionMethod == ContentAddressMethod::Raw::Text) experimentalFeatureSettings.require(Xp::DynamicDerivations); if (ingestionMethod == ContentAddressMethod::Raw::Git) experimentalFeatureSettings.require(Xp::GitHashing); }; auto handleOutputs = [&](const Strings & ss) { outputs.clear(); for (auto & j : ss) { if (outputs.find(j) != outputs.end()) state.error<EvalError>("duplicate derivation output '%1%'", j) .atPos(v) .debugThrow(); /* !!! Check whether j is a valid attribute name. */ /* Derivations cannot be named ‘drvPath’, because we already have an attribute ‘drvPath’ in the resulting set (see state.sDrvPath). */ if (j == "drvPath") state.error<EvalError>("invalid derivation output name 'drvPath'") .atPos(v) .debugThrow(); outputs.insert(j); } if (outputs.empty()) state.error<EvalError>("derivation cannot have an empty set of outputs") .atPos(v) .debugThrow(); }; try { // This try-catch block adds context for most errors. // Use this empty error context to signify that we defer to it. const std::string_view context_below(""); if (ignoreNulls) { state.forceValue(*i->value, pos); if (i->value->type() == nNull) continue; } if (i->name == state.sContentAddressed && state.forceBool(*i->value, pos, context_below)) { contentAddressed = true; experimentalFeatureSettings.require(Xp::CaDerivations); } else if (i->name == state.sImpure && state.forceBool(*i->value, pos, context_below)) { isImpure = true; experimentalFeatureSettings.require(Xp::ImpureDerivations); } /* The `args' attribute is special: it supplies the command-line arguments to the builder. */ else if (i->name == state.sArgs) { state.forceList(*i->value, pos, context_below); for (auto elem : i->value->listItems()) { auto s = state.coerceToString(pos, *elem, context, "while evaluating an element of the argument list", true).toOwned(); drv.args.push_back(s); } } /* All other attributes are passed to the builder through the environment. */ else { if (jsonObject) { if (i->name == state.sStructuredAttrs) continue; jsonObject->emplace(key, printValueAsJSON(state, true, *i->value, pos, context)); if (i->name == state.sBuilder) drv.builder = state.forceString(*i->value, context, pos, context_below); else if (i->name == state.sSystem) drv.platform = state.forceStringNoCtx(*i->value, pos, context_below); else if (i->name == state.sOutputHash) outputHash = state.forceStringNoCtx(*i->value, pos, context_below); else if (i->name == state.sOutputHashAlgo) outputHashAlgo = parseHashAlgoOpt(state.forceStringNoCtx(*i->value, pos, context_below)); else if (i->name == state.sOutputHashMode) handleHashMode(state.forceStringNoCtx(*i->value, pos, context_below)); else if (i->name == state.sOutputs) { /* Require ‘outputs’ to be a list of strings. */ state.forceList(*i->value, pos, context_below); Strings ss; for (auto elem : i->value->listItems()) ss.emplace_back(state.forceStringNoCtx(*elem, pos, context_below)); handleOutputs(ss); } if (i->name == state.sAllowedReferences) warn("In a derivation named '%s', 'structuredAttrs' disables the effect of the derivation attribute 'allowedReferences'; use 'outputChecks.<output>.allowedReferences' instead", drvName); if (i->name == state.sAllowedRequisites) warn("In a derivation named '%s', 'structuredAttrs' disables the effect of the derivation attribute 'allowedRequisites'; use 'outputChecks.<output>.allowedRequisites' instead", drvName); if (i->name == state.sDisallowedReferences) warn("In a derivation named '%s', 'structuredAttrs' disables the effect of the derivation attribute 'disallowedReferences'; use 'outputChecks.<output>.disallowedReferences' instead", drvName); if (i->name == state.sDisallowedRequisites) warn("In a derivation named '%s', 'structuredAttrs' disables the effect of the derivation attribute 'disallowedRequisites'; use 'outputChecks.<output>.disallowedRequisites' instead", drvName); if (i->name == state.sMaxSize) warn("In a derivation named '%s', 'structuredAttrs' disables the effect of the derivation attribute 'maxSize'; use 'outputChecks.<output>.maxSize' instead", drvName); if (i->name == state.sMaxClosureSize) warn("In a derivation named '%s', 'structuredAttrs' disables the effect of the derivation attribute 'maxClosureSize'; use 'outputChecks.<output>.maxClosureSize' instead", drvName); } else { auto s = state.coerceToString(pos, *i->value, context, context_below, true).toOwned(); drv.env.emplace(key, s); if (i->name == state.sBuilder) drv.builder = std::move(s); else if (i->name == state.sSystem) drv.platform = std::move(s); else if (i->name == state.sOutputHash) outputHash = std::move(s); else if (i->name == state.sOutputHashAlgo) outputHashAlgo = parseHashAlgoOpt(s); else if (i->name == state.sOutputHashMode) handleHashMode(s); else if (i->name == state.sOutputs) handleOutputs(tokenizeString<Strings>(s)); } } } catch (Error & e) { e.addTrace(state.positions[i->pos], HintFmt("while evaluating attribute '%1%' of derivation '%2%'", key, drvName)); throw; } } if (jsonObject) { drv.env.emplace("__json", jsonObject->dump()); jsonObject.reset(); } /* Everything in the context of the strings in the derivation attributes should be added as dependencies of the resulting derivation. */ for (auto & c : context) { std::visit(overloaded { /* Since this allows the builder to gain access to every path in the dependency graph of the derivation (including all outputs), all paths in the graph must be added to this derivation's list of inputs to ensure that they are available when the builder runs. */ [&](const NixStringContextElem::DrvDeep & d) { /* !!! This doesn't work if readOnlyMode is set. */ StorePathSet refs; state.store->computeFSClosure(d.drvPath, refs); for (auto & j : refs) { drv.inputSrcs.insert(j); if (j.isDerivation()) { drv.inputDrvs.map[j].value = state.store->readDerivation(j).outputNames(); } } }, [&](const NixStringContextElem::Built & b) { drv.inputDrvs.ensureSlot(*b.drvPath).value.insert(b.output); }, [&](const NixStringContextElem::Opaque & o) { drv.inputSrcs.insert(o.path); }, }, c.raw); } /* Do we have all required attributes? */ if (drv.builder == "") state.error<EvalError>("required attribute 'builder' missing") .atPos(v) .debugThrow(); if (drv.platform == "") state.error<EvalError>("required attribute 'system' missing") .atPos(v) .debugThrow(); /* Check whether the derivation name is valid. */ if (isDerivation(drvName) && !(ingestionMethod == ContentAddressMethod::Raw::Text && outputs.size() == 1 && *(outputs.begin()) == "out")) { state.error<EvalError>( "derivation names are allowed to end in '%s' only if they produce a single derivation file", drvExtension ).atPos(v).debugThrow(); } if (outputHash) { /* Handle fixed-output derivations. Ignore `__contentAddressed` because fixed output derivations are already content addressed. */ if (outputs.size() != 1 || *(outputs.begin()) != "out") state.error<EvalError>( "multiple outputs are not supported in fixed-output derivations" ).atPos(v).debugThrow(); auto h = newHashAllowEmpty(*outputHash, outputHashAlgo); auto method = ingestionMethod.value_or(ContentAddressMethod::Raw::Flat); DerivationOutput::CAFixed dof { .ca = ContentAddress { .method = std::move(method), .hash = std::move(h), }, }; drv.env["out"] = state.store->printStorePath(dof.path(*state.store, drvName, "out")); drv.outputs.insert_or_assign("out", std::move(dof)); } else if (contentAddressed || isImpure) { if (contentAddressed && isImpure) state.error<EvalError>("derivation cannot be both content-addressed and impure") .atPos(v).debugThrow(); auto ha = outputHashAlgo.value_or(HashAlgorithm::SHA256); auto method = ingestionMethod.value_or(ContentAddressMethod::Raw::NixArchive); for (auto & i : outputs) { drv.env[i] = hashPlaceholder(i); if (isImpure) drv.outputs.insert_or_assign(i, DerivationOutput::Impure { .method = method, .hashAlgo = ha, }); else drv.outputs.insert_or_assign(i, DerivationOutput::CAFloating { .method = method, .hashAlgo = ha, }); } } else { /* Compute a hash over the "masked" store derivation, which is the final one except that in the list of outputs, the output paths are empty strings, and the corresponding environment variables have an empty value. This ensures that changes in the set of output names do get reflected in the hash. */ for (auto & i : outputs) { drv.env[i] = ""; drv.outputs.insert_or_assign(i, DerivationOutput::Deferred { }); } auto hashModulo = hashDerivationModulo(*state.store, Derivation(drv), true); switch (hashModulo.kind) { case DrvHash::Kind::Regular: for (auto & i : outputs) { auto h = get(hashModulo.hashes, i); if (!h) state.error<AssertionError>( "derivation produced no hash for output '%s'", i ).atPos(v).debugThrow(); auto outPath = state.store->makeOutputPath(i, *h, drvName); drv.env[i] = state.store->printStorePath(outPath); drv.outputs.insert_or_assign( i, DerivationOutput::InputAddressed { .path = std::move(outPath), }); } break; ; case DrvHash::Kind::Deferred: for (auto & i : outputs) { drv.outputs.insert_or_assign(i, DerivationOutput::Deferred {}); } } } /* Write the resulting term into the Nix store directory. */ auto drvPath = writeDerivation(*state.store, drv, state.repair); auto drvPathS = state.store->printStorePath(drvPath); printMsg(lvlChatty, "instantiated '%1%' -> '%2%'", drvName, drvPathS); /* Optimisation, but required in read-only mode! because in that case we don't actually write store derivations, so we can't read them later. */ { auto h = hashDerivationModulo(*state.store, drv, false); drvHashes.lock()->insert_or_assign(drvPath, h); } auto result = state.buildBindings(1 + drv.outputs.size()); result.alloc(state.sDrvPath).mkString(drvPathS, { NixStringContextElem::DrvDeep { .drvPath = drvPath }, }); for (auto & i : drv.outputs) mkOutputString(state, result, drvPath, i); v.mkAttrs(result); } static RegisterPrimOp primop_derivationStrict(PrimOp { .name = "derivationStrict", .arity = 1, .fun = prim_derivationStrict, }); /* Return a placeholder string for the specified output that will be substituted by the corresponding output path at build time. For example, 'placeholder "out"' returns the string /1rz4g4znpzjwh1xymhjpm42vipw92pr73vdgl6xs1hycac8kf2n9. At build time, any occurrence of this string in an derivation attribute will be replaced with the concrete path in the Nix store of the output ‘out’. */ static void prim_placeholder(EvalState & state, const PosIdx pos, Value * * args, Value & v) { v.mkString(hashPlaceholder(state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.placeholder"))); } static RegisterPrimOp primop_placeholder({ .name = "placeholder", .args = {"output"}, .doc = R"( Return a placeholder string for the specified *output* that will be substituted by the corresponding output path at build time. Typical outputs would be `"out"`, `"bin"` or `"dev"`. )", .fun = prim_placeholder, }); /************************************************************* * Paths *************************************************************/ /* Convert the argument to a path. !!! obsolete? */ static void prim_toPath(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto path = state.coerceToPath(pos, *args[0], context, "while evaluating the first argument passed to builtins.toPath"); v.mkString(path.path.abs(), context); } static RegisterPrimOp primop_toPath({ .name = "__toPath", .args = {"s"}, .doc = R"( **DEPRECATED.** Use `/. + "/path"` to convert a string into an absolute path. For relative paths, use `./. + "/path"`. )", .fun = prim_toPath, }); /* Allow a valid store path to be used in an expression. This is useful in some generated expressions such as in nix-push, which generates a call to a function with an already existing store path as argument. You don't want to use `toPath' here because it copies the path to the Nix store, which yields a copy like /nix/store/newhash-oldhash-oldname. In the past, `toPath' had special case behaviour for store paths, but that created weird corner cases. */ static void prim_storePath(EvalState & state, const PosIdx pos, Value * * args, Value & v) { if (state.settings.pureEval) state.error<EvalError>( "'%s' is not allowed in pure evaluation mode", "builtins.storePath" ).atPos(pos).debugThrow(); NixStringContext context; auto path = state.coerceToPath(pos, *args[0], context, "while evaluating the first argument passed to 'builtins.storePath'").path; /* Resolve symlinks in ‘path’, unless ‘path’ itself is a symlink directly in the store. The latter condition is necessary so e.g. nix-push does the right thing. */ if (!state.store->isStorePath(path.abs())) path = CanonPath(canonPath(path.abs(), true)); if (!state.store->isInStore(path.abs())) state.error<EvalError>("path '%1%' is not in the Nix store", path) .atPos(pos).debugThrow(); auto path2 = state.store->toStorePath(path.abs()).first; if (!settings.readOnlyMode) state.store->ensurePath(path2); context.insert(NixStringContextElem::Opaque { .path = path2 }); v.mkString(path.abs(), context); } static RegisterPrimOp primop_storePath({ .name = "__storePath", .args = {"path"}, .doc = R"( This function allows you to define a dependency on an already existing store path. For example, the derivation attribute `src = builtins.storePath /nix/store/f1d18v1y…-source` causes the derivation to depend on the specified path, which must exist or be substitutable. Note that this differs from a plain path (e.g. `src = /nix/store/f1d18v1y…-source`) in that the latter causes the path to be *copied* again to the Nix store, resulting in a new path (e.g. `/nix/store/ld01dnzc…-source-source`). Not available in [pure evaluation mode](@docroot@/command-ref/conf-file.md#conf-pure-eval). See also [`builtins.fetchClosure`](#builtins-fetchClosure). )", .fun = prim_storePath, }); static void prim_pathExists(EvalState & state, const PosIdx pos, Value * * args, Value & v) { try { auto & arg = *args[0]; /* SourcePath doesn't know about trailing slash. */ state.forceValue(arg, pos); auto mustBeDir = arg.type() == nString && (arg.string_view().ends_with("/") || arg.string_view().ends_with("/.")); auto symlinkResolution = mustBeDir ? SymlinkResolution::Full : SymlinkResolution::Ancestors; auto path = realisePath(state, pos, arg, symlinkResolution); auto st = path.maybeLstat(); auto exists = st && (!mustBeDir || st->type == SourceAccessor::tDirectory); v.mkBool(exists); } catch (RestrictedPathError & e) { v.mkBool(false); } } static RegisterPrimOp primop_pathExists({ .name = "__pathExists", .args = {"path"}, .doc = R"( Return `true` if the path *path* exists at evaluation time, and `false` otherwise. )", .fun = prim_pathExists, }); // Ideally, all trailing slashes should have been removed, but it's been like this for // almost a decade as of writing. Changing it will affect reproducibility. static std::string_view legacyBaseNameOf(std::string_view path) { if (path.empty()) return ""; auto last = path.size() - 1; if (path[last] == '/' && last > 0) last -= 1; auto pos = path.rfind('/', last); if (pos == path.npos) pos = 0; else pos += 1; return path.substr(pos, last - pos + 1); } /* Return the base name of the given string, i.e., everything following the last slash. */ static void prim_baseNameOf(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; v.mkString(legacyBaseNameOf(*state.coerceToString(pos, *args[0], context, "while evaluating the first argument passed to builtins.baseNameOf", false, false)), context); } static RegisterPrimOp primop_baseNameOf({ .name = "baseNameOf", .args = {"x"}, .doc = R"( Return the *base name* of either a [path value](@docroot@/language/types.md#type-path) *x* or a string *x*, depending on which type is passed, and according to the following rules. For a path value, the *base name* is considered to be the part of the path after the last directory separator, including any file extensions. This is the simple case, as path values don't have trailing slashes. When the argument is a string, a more involved logic applies. If the string ends with a `/`, only this one final slash is removed. After this, the *base name* is returned as previously described, assuming `/` as the directory separator. (Note that evaluation must be platform independent.) This is somewhat similar to the [GNU `basename`](https://www.gnu.org/software/coreutils/manual/html_node/basename-invocation.html) command, but GNU `basename` will strip any number of trailing slashes. )", .fun = prim_baseNameOf, }); /* Return the directory of the given path, i.e., everything before the last slash. Return either a path or a string depending on the type of the argument. */ static void prim_dirOf(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); if (args[0]->type() == nPath) { auto path = args[0]->path(); v.mkPath(path.path.isRoot() ? path : path.parent()); } else { NixStringContext context; auto path = state.coerceToString(pos, *args[0], context, "while evaluating the first argument passed to 'builtins.dirOf'", false, false); auto dir = dirOf(*path); v.mkString(dir, context); } } static RegisterPrimOp primop_dirOf({ .name = "dirOf", .args = {"s"}, .doc = R"( Return the directory part of the string *s*, that is, everything before the final slash in the string. This is similar to the GNU `dirname` command. )", .fun = prim_dirOf, }); /* Return the contents of a file as a string. */ static void prim_readFile(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto path = realisePath(state, pos, *args[0]); auto s = path.readFile(); if (s.find((char) 0) != std::string::npos) state.error<EvalError>( "the contents of the file '%1%' cannot be represented as a Nix string", path ).atPos(pos).debugThrow(); StorePathSet refs; if (state.store->isInStore(path.path.abs())) { try { refs = state.store->queryPathInfo(state.store->toStorePath(path.path.abs()).first)->references; } catch (Error &) { // FIXME: should be InvalidPathError } // Re-scan references to filter down to just the ones that actually occur in the file. auto refsSink = PathRefScanSink::fromPaths(refs); refsSink << s; refs = refsSink.getResultPaths(); } NixStringContext context; for (auto && p : std::move(refs)) { context.insert(NixStringContextElem::Opaque { .path = std::move((StorePath &&)p), }); } v.mkString(s, context); } static RegisterPrimOp primop_readFile({ .name = "__readFile", .args = {"path"}, .doc = R"( Return the contents of the file *path* as a string. )", .fun = prim_readFile, }); /* Find a file in the Nix search path. Used to implement <x> paths, which are desugared to 'findFile __nixPath "x"'. */ static void prim_findFile(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[0], pos, "while evaluating the first argument passed to builtins.findFile"); LookupPath lookupPath; for (auto v2 : args[0]->listItems()) { state.forceAttrs(*v2, pos, "while evaluating an element of the list passed to builtins.findFile"); std::string prefix; auto i = v2->attrs()->find(state.sPrefix); if (i != v2->attrs()->end()) prefix = state.forceStringNoCtx(*i->value, pos, "while evaluating the `prefix` attribute of an element of the list passed to builtins.findFile"); i = getAttr(state, state.sPath, v2->attrs(), "in an element of the __nixPath"); NixStringContext context; auto path = state.coerceToString(pos, *i->value, context, "while evaluating the `path` attribute of an element of the list passed to builtins.findFile", false, false).toOwned(); try { auto rewrites = state.realiseContext(context); path = rewriteStrings(path, rewrites); } catch (InvalidPathError & e) { state.error<EvalError>( "cannot find '%1%', since path '%2%' is not valid", path, e.path ).atPos(pos).debugThrow(); } lookupPath.elements.emplace_back(LookupPath::Elem { .prefix = LookupPath::Prefix { .s = prefix }, .path = LookupPath::Path { .s = path }, }); } auto path = state.forceStringNoCtx(*args[1], pos, "while evaluating the second argument passed to builtins.findFile"); v.mkPath(state.findFile(lookupPath, path, pos)); } static RegisterPrimOp primop_findFile(PrimOp { .name = "__findFile", .args = {"search-path", "lookup-path"}, .doc = R"( Find *lookup-path* in *search-path*. [Lookup path](@docroot@/language/constructs/lookup-path.md) expressions are [desugared](https://en.wikipedia.org/wiki/Syntactic_sugar) using this and [`builtins.nixPath`](#builtins-nixPath): ```nix <nixpkgs> ``` is equivalent to: ```nix builtins.findFile builtins.nixPath "nixpkgs" ``` A search path is represented as a list of [attribute sets](./types.md#attribute-set) with two attributes: - `prefix` is a relative path. - `path` denotes a file system location Examples of search path attribute sets: - ``` { prefix = ""; path = "/nix/var/nix/profiles/per-user/root/channels"; } ``` - ``` { prefix = "nixos-config"; path = "/etc/nixos/configuration.nix"; } ``` - ``` { prefix = "nixpkgs"; path = "https://github.com/NixOS/nixpkgs/tarballs/master"; } ``` - ``` { prefix = "nixpkgs"; path = "channel:nixpkgs-unstable"; } ``` - ``` { prefix = "flake-compat"; path = "flake:github:edolstra/flake-compat"; } ``` The lookup algorithm checks each entry until a match is found, returning a [path value](@docroot@/language/types.md#type-path) of the match: - If a prefix of `lookup-path` matches `prefix`, then the remainder of *lookup-path* (the "suffix") is searched for within the directory denoted by `path`. The contents of `path` may need to be downloaded at this point to look inside. - If the suffix is found inside that directory, then the entry is a match. The combined absolute path of the directory (now downloaded if need be) and the suffix is returned. > **Example** > > A *search-path* value > > ``` > [ > { > prefix = ""; > path = "/home/eelco/Dev"; > } > { > prefix = "nixos-config"; > path = "/etc/nixos"; > } > ] > ``` > > and a *lookup-path* value `"nixos-config"` will cause Nix to try `/home/eelco/Dev/nixos-config` and `/etc/nixos` in that order and return the first path that exists. If `path` starts with `http://` or `https://`, it is interpreted as the URL of a tarball that will be downloaded and unpacked to a temporary location. The tarball must consist of a single top-level directory. The URLs of the tarballs from the official `nixos.org` channels can be abbreviated as `channel:<channel-name>`. See [documentation on `nix-channel`](@docroot@/command-ref/nix-channel.md) for details about channels. > **Example** > > These two search path entries are equivalent: > > - ``` > { > prefix = "nixpkgs"; > path = "channel:nixpkgs-unstable"; > } > ``` > - ``` > { > prefix = "nixpkgs"; > path = "https://nixos.org/channels/nixos-unstable/nixexprs.tar.xz"; > } > ``` Search paths can also point to source trees using [flake URLs](@docroot@/command-ref/new-cli/nix3-flake.md#url-like-syntax). > **Example** > > The search path entry > > ``` > { > prefix = "nixpkgs"; > path = "flake:nixpkgs"; > } > ``` > specifies that the prefix `nixpkgs` shall refer to the source tree downloaded from the `nixpkgs` entry in the flake registry. > > Similarly > > ``` > { > prefix = "nixpkgs"; > path = "flake:github:nixos/nixpkgs/nixos-22.05"; > } > ``` > > makes `<nixpkgs>` refer to a particular branch of the `NixOS/nixpkgs` repository on GitHub. )", .fun = prim_findFile, }); /* Return the cryptographic hash of a file in base-16. */ static void prim_hashFile(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto algo = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.hashFile"); std::optional<HashAlgorithm> ha = parseHashAlgo(algo); if (!ha) state.error<EvalError>("unknown hash algorithm '%1%'", algo).atPos(pos).debugThrow(); auto path = realisePath(state, pos, *args[1]); v.mkString(hashString(*ha, path.readFile()).to_string(HashFormat::Base16, false)); } static RegisterPrimOp primop_hashFile({ .name = "__hashFile", .args = {"type", "p"}, .doc = R"( Return a base-16 representation of the cryptographic hash of the file at path *p*. The hash algorithm specified by *type* must be one of `"md5"`, `"sha1"`, `"sha256"` or `"sha512"`. )", .fun = prim_hashFile, }); static Value * fileTypeToString(EvalState & state, SourceAccessor::Type type) { return type == SourceAccessor::Type::tRegular ? &state.vStringRegular : type == SourceAccessor::Type::tDirectory ? &state.vStringDirectory : type == SourceAccessor::Type::tSymlink ? &state.vStringSymlink : &state.vStringUnknown; } static void prim_readFileType(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto path = realisePath(state, pos, *args[0], std::nullopt); /* Retrieve the directory entry type and stringize it. */ v = *fileTypeToString(state, path.lstat().type); } static RegisterPrimOp primop_readFileType({ .name = "__readFileType", .args = {"p"}, .doc = R"( Determine the directory entry type of a filesystem node, being one of "directory", "regular", "symlink", or "unknown". )", .fun = prim_readFileType, }); /* Read a directory (without . or ..) */ static void prim_readDir(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto path = realisePath(state, pos, *args[0]); // Retrieve directory entries for all nodes in a directory. // This is similar to `getFileType` but is optimized to reduce system calls // on many systems. auto entries = path.readDirectory(); auto attrs = state.buildBindings(entries.size()); // If we hit unknown directory entry types we may need to fallback to // using `getFileType` on some systems. // In order to reduce system calls we make each lookup lazy by using // `builtins.readFileType` application. Value * readFileType = nullptr; for (auto & [name, type] : entries) { if (!type) { auto & attr = attrs.alloc(name); // Some filesystems or operating systems may not be able to return // detailed node info quickly in this case we produce a thunk to // query the file type lazily. auto epath = state.allocValue(); epath->mkPath(path / name); if (!readFileType) readFileType = &state.getBuiltin("readFileType"); attr.mkApp(readFileType, epath); } else { // This branch of the conditional is much more likely. // Here we just stringize the directory entry type. attrs.insert(state.symbols.create(name), fileTypeToString(state, *type)); } } v.mkAttrs(attrs); } static RegisterPrimOp primop_readDir({ .name = "__readDir", .args = {"path"}, .doc = R"( Return the contents of the directory *path* as a set mapping directory entries to the corresponding file type. For instance, if directory `A` contains a regular file `B` and another directory `C`, then `builtins.readDir ./A` will return the set ```nix { B = "regular"; C = "directory"; } ``` The possible values for the file type are `"regular"`, `"directory"`, `"symlink"` and `"unknown"`. )", .fun = prim_readDir, }); /* Extend single element string context with another output. */ static void prim_outputOf(EvalState & state, const PosIdx pos, Value * * args, Value & v) { SingleDerivedPath drvPath = state.coerceToSingleDerivedPath(pos, *args[0], "while evaluating the first argument to builtins.outputOf"); OutputNameView outputName = state.forceStringNoCtx(*args[1], pos, "while evaluating the second argument to builtins.outputOf"); state.mkSingleDerivedPathString( SingleDerivedPath::Built { .drvPath = make_ref<SingleDerivedPath>(drvPath), .output = std::string { outputName }, }, v); } static RegisterPrimOp primop_outputOf({ .name = "__outputOf", .args = {"derivation-reference", "output-name"}, .doc = R"( Return the output path of a derivation, literally or using a placeholder if needed. If the derivation has a statically-known output path (i.e. the derivation output is input-addressed, or fixed content-addresed), the output path will just be returned. But if the derivation is content-addressed or if the derivation is itself not-statically produced (i.e. is the output of another derivation), a placeholder will be returned instead. *`derivation reference`* must be a string that may contain a regular store path to a derivation, or may be a placeholder reference. If the derivation is produced by a derivation, you must explicitly select `drv.outPath`. This primop can be chained arbitrarily deeply. For instance, ```nix builtins.outputOf (builtins.outputOf myDrv "out") "out" ``` will return a placeholder for the output of the output of `myDrv`. This primop corresponds to the `^` sigil for derivable paths, e.g. as part of installable syntax on the command line. )", .fun = prim_outputOf, .experimentalFeature = Xp::DynamicDerivations, }); /************************************************************* * Creating files *************************************************************/ /* Convert the argument (which can be any Nix expression) to an XML representation returned in a string. Not all Nix expressions can be sensibly or completely represented (e.g., functions). */ static void prim_toXML(EvalState & state, const PosIdx pos, Value * * args, Value & v) { std::ostringstream out; NixStringContext context; printValueAsXML(state, true, false, *args[0], out, context, pos); v.mkString(toView(out), context); } static RegisterPrimOp primop_toXML({ .name = "__toXML", .args = {"e"}, .doc = R"( Return a string containing an XML representation of *e*. The main application for `toXML` is to communicate information with the builder in a more structured format than plain environment variables. Here is an example where this is the case: ```nix { stdenv, fetchurl, libxslt, jira, uberwiki }: stdenv.mkDerivation (rec { name = "web-server"; buildInputs = [ libxslt ]; builder = builtins.toFile "builder.sh" " source $stdenv/setup mkdir $out echo "$servlets" | xsltproc ${stylesheet} - > $out/server-conf.xml ① "; stylesheet = builtins.toFile "stylesheet.xsl" ② "<?xml version='1.0' encoding='UTF-8'?> <xsl:stylesheet xmlns:xsl='http://www.w3.org/1999/XSL/Transform' version='1.0'> <xsl:template match='/'> <Configure> <xsl:for-each select='/expr/list/attrs'> <Call name='addWebApplication'> <Arg><xsl:value-of select=\"attr[@name = 'path']/string/@value\" /></Arg> <Arg><xsl:value-of select=\"attr[@name = 'war']/path/@value\" /></Arg> </Call> </xsl:for-each> </Configure> </xsl:template> </xsl:stylesheet> "; servlets = builtins.toXML [ ③ { path = "/bugtracker"; war = jira + "/lib/atlassian-jira.war"; } { path = "/wiki"; war = uberwiki + "/uberwiki.war"; } ]; }) ``` The builder is supposed to generate the configuration file for a [Jetty servlet container](http://jetty.mortbay.org/). A servlet container contains a number of servlets (`*.war` files) each exported under a specific URI prefix. So the servlet configuration is a list of sets containing the `path` and `war` of the servlet (①). This kind of information is difficult to communicate with the normal method of passing information through an environment variable, which just concatenates everything together into a string (which might just work in this case, but wouldn’t work if fields are optional or contain lists themselves). Instead the Nix expression is converted to an XML representation with `toXML`, which is unambiguous and can easily be processed with the appropriate tools. For instance, in the example an XSLT stylesheet (at point ②) is applied to it (at point ①) to generate the XML configuration file for the Jetty server. The XML representation produced at point ③ by `toXML` is as follows: ```xml <?xml version='1.0' encoding='utf-8'?> <expr> <list> <attrs> <attr name="path"> <string value="/bugtracker" /> </attr> <attr name="war"> <path value="/nix/store/d1jh9pasa7k2...-jira/lib/atlassian-jira.war" /> </attr> </attrs> <attrs> <attr name="path"> <string value="/wiki" /> </attr> <attr name="war"> <path value="/nix/store/y6423b1yi4sx...-uberwiki/uberwiki.war" /> </attr> </attrs> </list> </expr> ``` Note that we used the `toFile` built-in to write the builder and the stylesheet “inline” in the Nix expression. The path of the stylesheet is spliced into the builder using the syntax `xsltproc ${stylesheet}`. )", .fun = prim_toXML, }); /* Convert the argument (which can be any Nix expression) to a JSON string. Not all Nix expressions can be sensibly or completely represented (e.g., functions). */ static void prim_toJSON(EvalState & state, const PosIdx pos, Value * * args, Value & v) { std::ostringstream out; NixStringContext context; printValueAsJSON(state, true, *args[0], pos, out, context); v.mkString(toView(out), context); } static RegisterPrimOp primop_toJSON({ .name = "__toJSON", .args = {"e"}, .doc = R"( Return a string containing a JSON representation of *e*. Strings, integers, floats, booleans, nulls and lists are mapped to their JSON equivalents. Sets (except derivations) are represented as objects. Derivations are translated to a JSON string containing the derivation’s output path. Paths are copied to the store and represented as a JSON string of the resulting store path. )", .fun = prim_toJSON, }); /* Parse a JSON string to a value. */ static void prim_fromJSON(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto s = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.fromJSON"); try { parseJSON(state, s, v); } catch (JSONParseError &e) { e.addTrace(state.positions[pos], "while decoding a JSON string"); throw; } } static RegisterPrimOp primop_fromJSON({ .name = "__fromJSON", .args = {"e"}, .doc = R"( Convert a JSON string to a Nix value. For example, ```nix builtins.fromJSON ''{"x": [1, 2, 3], "y": null}'' ``` returns the value `{ x = [ 1 2 3 ]; y = null; }`. )", .fun = prim_fromJSON, }); /* Store a string in the Nix store as a source file that can be used as an input by derivations. */ static void prim_toFile(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; std::string name(state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.toFile")); std::string contents(state.forceString(*args[1], context, pos, "while evaluating the second argument passed to builtins.toFile")); StorePathSet refs; for (auto c : context) { if (auto p = std::get_if<NixStringContextElem::Opaque>(&c.raw)) refs.insert(p->path); else state.error<EvalError>( "files created by %1% may not reference derivations, but %2% references %3%", "builtins.toFile", name, c.to_string() ).atPos(pos).debugThrow(); } auto storePath = settings.readOnlyMode ? state.store->makeFixedOutputPathFromCA(name, TextInfo { .hash = hashString(HashAlgorithm::SHA256, contents), .references = std::move(refs), }) : ({ StringSource s { contents }; state.store->addToStoreFromDump(s, name, FileSerialisationMethod::Flat, ContentAddressMethod::Raw::Text, HashAlgorithm::SHA256, refs, state.repair); }); /* Note: we don't need to add `context' to the context of the result, since `storePath' itself has references to the paths used in args[1]. */ /* Add the output of this to the allowed paths. */ state.allowAndSetStorePathString(storePath, v); } static RegisterPrimOp primop_toFile({ .name = "__toFile", .args = {"name", "s"}, .doc = R"( Store the string *s* in a file in the Nix store and return its path. The file has suffix *name*. This file can be used as an input to derivations. One application is to write builders “inline”. For instance, the following Nix expression combines the Nix expression for GNU Hello and its build script into one file: ```nix { stdenv, fetchurl, perl }: stdenv.mkDerivation { name = "hello-2.1.1"; builder = builtins.toFile "builder.sh" " source $stdenv/setup PATH=$perl/bin:$PATH tar xvfz $src cd hello-* ./configure --prefix=$out make make install "; src = fetchurl { url = "http://ftp.nluug.nl/pub/gnu/hello/hello-2.1.1.tar.gz"; sha256 = "1md7jsfd8pa45z73bz1kszpp01yw6x5ljkjk2hx7wl800any6465"; }; inherit perl; } ``` It is even possible for one file to refer to another, e.g., ```nix builder = let configFile = builtins.toFile "foo.conf" " # This is some dummy configuration file. ... "; in builtins.toFile "builder.sh" " source $stdenv/setup ... cp ${configFile} $out/etc/foo.conf "; ``` Note that `${configFile}` is a [string interpolation](@docroot@/language/types.md#type-string), so the result of the expression `configFile` (i.e., a path like `/nix/store/m7p7jfny445k...-foo.conf`) will be spliced into the resulting string. It is however *not* allowed to have files mutually referring to each other, like so: ```nix let foo = builtins.toFile "foo" "...${bar}..."; bar = builtins.toFile "bar" "...${foo}..."; in foo ``` This is not allowed because it would cause a cyclic dependency in the computation of the cryptographic hashes for `foo` and `bar`. It is also not possible to reference the result of a derivation. If you are using Nixpkgs, the `writeTextFile` function is able to do that. )", .fun = prim_toFile, }); bool EvalState::callPathFilter( Value * filterFun, const SourcePath & path, std::string_view pathArg, PosIdx pos) { auto st = path.lstat(); /* Call the filter function. The first argument is the path, the second is a string indicating the type of the file. */ Value arg1; arg1.mkString(pathArg); // assert that type is not "unknown" Value * args []{&arg1, fileTypeToString(*this, st.type)}; Value res; callFunction(*filterFun, 2, args, res, pos); return forceBool(res, pos, "while evaluating the return value of the path filter function"); } static void addPath( EvalState & state, const PosIdx pos, std::string_view name, SourcePath path, Value * filterFun, ContentAddressMethod method, const std::optional<Hash> expectedHash, Value & v, const NixStringContext & context) { try { StorePathSet refs; if (path.accessor == state.rootFS && state.store->isInStore(path.path.abs())) { // FIXME: handle CA derivation outputs (where path needs to // be rewritten to the actual output). auto rewrites = state.realiseContext(context); path = {state.rootFS, CanonPath(state.toRealPath(rewriteStrings(path.path.abs(), rewrites), context))}; try { auto [storePath, subPath] = state.store->toStorePath(path.path.abs()); // FIXME: we should scanForReferences on the path before adding it refs = state.store->queryPathInfo(storePath)->references; path = {state.rootFS, CanonPath(state.store->toRealPath(storePath) + subPath)}; } catch (Error &) { // FIXME: should be InvalidPathError } } std::unique_ptr<PathFilter> filter; if (filterFun) filter = std::make_unique<PathFilter>([&](const Path & p) { auto p2 = CanonPath(p); return state.callPathFilter(filterFun, {path.accessor, p2}, p2.abs(), pos); }); std::optional<StorePath> expectedStorePath; if (expectedHash) expectedStorePath = state.store->makeFixedOutputPathFromCA(name, ContentAddressWithReferences::fromParts( method, *expectedHash, {})); if (!expectedHash || !state.store->isValidPath(*expectedStorePath)) { auto dstPath = fetchToStore( *state.store, path.resolveSymlinks(), settings.readOnlyMode ? FetchMode::DryRun : FetchMode::Copy, name, method, filter.get(), state.repair); if (expectedHash && expectedStorePath != dstPath) state.error<EvalError>( "store path mismatch in (possibly filtered) path added from '%s'", path ).atPos(pos).debugThrow(); state.allowAndSetStorePathString(dstPath, v); } else state.allowAndSetStorePathString(*expectedStorePath, v); } catch (Error & e) { e.addTrace(state.positions[pos], "while adding path '%s'", path); throw; } } static void prim_filterSource(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto path = state.coerceToPath(pos, *args[1], context, "while evaluating the second argument (the path to filter) passed to 'builtins.filterSource'"); state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.filterSource"); addPath(state, pos, path.baseName(), path, args[0], ContentAddressMethod::Raw::NixArchive, std::nullopt, v, context); } static RegisterPrimOp primop_filterSource({ .name = "__filterSource", .args = {"e1", "e2"}, .doc = R"( > **Warning** > > `filterSource` should not be used to filter store paths. Since > `filterSource` uses the name of the input directory while naming > the output directory, doing so will produce a directory name in > the form of `<hash2>-<hash>-<name>`, where `<hash>-<name>` is > the name of the input directory. Since `<hash>` depends on the > unfiltered directory, the name of the output directory will > indirectly depend on files that are filtered out by the > function. This will trigger a rebuild even when a filtered out > file is changed. Use `builtins.path` instead, which allows > specifying the name of the output directory. This function allows you to copy sources into the Nix store while filtering certain files. For instance, suppose that you want to use the directory `source-dir` as an input to a Nix expression, e.g. ```nix stdenv.mkDerivation { ... src = ./source-dir; } ``` However, if `source-dir` is a Subversion working copy, then all those annoying `.svn` subdirectories will also be copied to the store. Worse, the contents of those directories may change a lot, causing lots of spurious rebuilds. With `filterSource` you can filter out the `.svn` directories: ```nix src = builtins.filterSource (path: type: type != "directory" || baseNameOf path != ".svn") ./source-dir; ``` Thus, the first argument *e1* must be a predicate function that is called for each regular file, directory or symlink in the source tree *e2*. If the function returns `true`, the file is copied to the Nix store, otherwise it is omitted. The function is called with two arguments. The first is the full path of the file. The second is a string that identifies the type of the file, which is either `"regular"`, `"directory"`, `"symlink"` or `"unknown"` (for other kinds of files such as device nodes or fifos — but note that those cannot be copied to the Nix store, so if the predicate returns `true` for them, the copy will fail). If you exclude a directory, the entire corresponding subtree of *e2* will be excluded. )", .fun = prim_filterSource, }); static void prim_path(EvalState & state, const PosIdx pos, Value * * args, Value & v) { std::optional<SourcePath> path; std::string name; Value * filterFun = nullptr; auto method = ContentAddressMethod::Raw::NixArchive; std::optional<Hash> expectedHash; NixStringContext context; state.forceAttrs(*args[0], pos, "while evaluating the argument passed to 'builtins.path'"); for (auto & attr : *args[0]->attrs()) { auto n = state.symbols[attr.name]; if (n == "path") path.emplace(state.coerceToPath(attr.pos, *attr.value, context, "while evaluating the 'path' attribute passed to 'builtins.path'")); else if (attr.name == state.sName) name = state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the `name` attribute passed to builtins.path"); else if (n == "filter") state.forceFunction(*(filterFun = attr.value), attr.pos, "while evaluating the `filter` parameter passed to builtins.path"); else if (n == "recursive") method = state.forceBool(*attr.value, attr.pos, "while evaluating the `recursive` attribute passed to builtins.path") ? ContentAddressMethod::Raw::NixArchive : ContentAddressMethod::Raw::Flat; else if (n == "sha256") expectedHash = newHashAllowEmpty(state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the `sha256` attribute passed to builtins.path"), HashAlgorithm::SHA256); else state.error<EvalError>( "unsupported argument '%1%' to 'addPath'", state.symbols[attr.name] ).atPos(attr.pos).debugThrow(); } if (!path) state.error<EvalError>( "missing required 'path' attribute in the first argument to builtins.path" ).atPos(pos).debugThrow(); if (name.empty()) name = path->baseName(); addPath(state, pos, name, *path, filterFun, method, expectedHash, v, context); } static RegisterPrimOp primop_path({ .name = "__path", .args = {"args"}, .doc = R"( An enrichment of the built-in path type, based on the attributes present in *args*. All are optional except `path`: - path\ The underlying path. - name\ The name of the path when added to the store. This can used to reference paths that have nix-illegal characters in their names, like `@`. - filter\ A function of the type expected by [`builtins.filterSource`](#builtins-filterSource), with the same semantics. - recursive\ When `false`, when `path` is added to the store it is with a flat hash, rather than a hash of the NAR serialization of the file. Thus, `path` must refer to a regular file, not a directory. This allows similar behavior to `fetchurl`. Defaults to `true`. - sha256\ When provided, this is the expected hash of the file at the path. Evaluation will fail if the hash is incorrect, and providing a hash allows `builtins.path` to be used even when the `pure-eval` nix config option is on. )", .fun = prim_path, }); /************************************************************* * Sets *************************************************************/ /* Return the names of the attributes in a set as a sorted list of strings. */ static void prim_attrNames(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[0], pos, "while evaluating the argument passed to builtins.attrNames"); auto list = state.buildList(args[0]->attrs()->size()); for (const auto & [n, i] : enumerate(*args[0]->attrs())) (list[n] = state.allocValue())->mkString(state.symbols[i.name]); std::sort(list.begin(), list.end(), [](Value * v1, Value * v2) { return strcmp(v1->c_str(), v2->c_str()) < 0; }); v.mkList(list); } static RegisterPrimOp primop_attrNames({ .name = "__attrNames", .args = {"set"}, .doc = R"( Return the names of the attributes in the set *set* in an alphabetically sorted list. For instance, `builtins.attrNames { y = 1; x = "foo"; }` evaluates to `[ "x" "y" ]`. )", .fun = prim_attrNames, }); /* Return the values of the attributes in a set as a list, in the same order as attrNames. */ static void prim_attrValues(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[0], pos, "while evaluating the argument passed to builtins.attrValues"); auto list = state.buildList(args[0]->attrs()->size()); for (const auto & [n, i] : enumerate(*args[0]->attrs())) list[n] = (Value *) &i; std::sort(list.begin(), list.end(), [&](Value * v1, Value * v2) { std::string_view s1 = state.symbols[((Attr *) v1)->name], s2 = state.symbols[((Attr *) v2)->name]; return s1 < s2; }); for (auto & v : list) v = ((Attr *) v)->value; v.mkList(list); } static RegisterPrimOp primop_attrValues({ .name = "__attrValues", .args = {"set"}, .doc = R"( Return the values of the attributes in the set *set* in the order corresponding to the sorted attribute names. )", .fun = prim_attrValues, }); /* Dynamic version of the `.' operator. */ void prim_getAttr(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto attr = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.getAttr"); state.forceAttrs(*args[1], pos, "while evaluating the second argument passed to builtins.getAttr"); auto i = getAttr( state, state.symbols.create(attr), args[1]->attrs(), "in the attribute set under consideration" ); // !!! add to stack trace? if (state.countCalls && i->pos) state.attrSelects[i->pos]++; state.forceValue(*i->value, pos); v = *i->value; } static RegisterPrimOp primop_getAttr({ .name = "__getAttr", .args = {"s", "set"}, .doc = R"( `getAttr` returns the attribute named *s* from *set*. Evaluation aborts if the attribute doesn’t exist. This is a dynamic version of the `.` operator, since *s* is an expression rather than an identifier. )", .fun = prim_getAttr, }); /* Return position information of the specified attribute. */ static void prim_unsafeGetAttrPos(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto attr = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.unsafeGetAttrPos"); state.forceAttrs(*args[1], pos, "while evaluating the second argument passed to builtins.unsafeGetAttrPos"); auto i = args[1]->attrs()->find(state.symbols.create(attr)); if (i == args[1]->attrs()->end()) v.mkNull(); else state.mkPos(v, i->pos); } static RegisterPrimOp primop_unsafeGetAttrPos(PrimOp { .name = "__unsafeGetAttrPos", .arity = 2, .fun = prim_unsafeGetAttrPos, }); // access to exact position information (ie, line and colum numbers) is deferred // due to the cost associated with calculating that information and how rarely // it is used in practice. this is achieved by creating thunks to otherwise // inaccessible primops that are not exposed as __op or under builtins to turn // the internal PosIdx back into a line and column number, respectively. exposing // these primops in any way would at best be not useful and at worst create wildly // indeterministic eval results depending on parse order of files. // // in a simpler world this would instead be implemented as another kind of thunk, // but each type of thunk has an associated runtime cost in the current evaluator. // as with black holes this cost is too high to justify another thunk type to check // for in the very hot path that is forceValue. static struct LazyPosAcessors { PrimOp primop_lineOfPos{ .arity = 1, .fun = [] (EvalState & state, PosIdx pos, Value * * args, Value & v) { v.mkInt(state.positions[PosIdx(args[0]->integer().value)].line); } }; PrimOp primop_columnOfPos{ .arity = 1, .fun = [] (EvalState & state, PosIdx pos, Value * * args, Value & v) { v.mkInt(state.positions[PosIdx(args[0]->integer().value)].column); } }; Value lineOfPos, columnOfPos; LazyPosAcessors() { lineOfPos.mkPrimOp(&primop_lineOfPos); columnOfPos.mkPrimOp(&primop_columnOfPos); } void operator()(EvalState & state, const PosIdx pos, Value & line, Value & column) { Value * posV = state.allocValue(); posV->mkInt(pos.id); line.mkApp(&lineOfPos, posV); column.mkApp(&columnOfPos, posV); } } makeLazyPosAccessors; void makePositionThunks(EvalState & state, const PosIdx pos, Value & line, Value & column) { makeLazyPosAccessors(state, pos, line, column); } /* Dynamic version of the `?' operator. */ static void prim_hasAttr(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto attr = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.hasAttr"); state.forceAttrs(*args[1], pos, "while evaluating the second argument passed to builtins.hasAttr"); v.mkBool(args[1]->attrs()->find(state.symbols.create(attr)) != args[1]->attrs()->end()); } static RegisterPrimOp primop_hasAttr({ .name = "__hasAttr", .args = {"s", "set"}, .doc = R"( `hasAttr` returns `true` if *set* has an attribute named *s*, and `false` otherwise. This is a dynamic version of the `?` operator, since *s* is an expression rather than an identifier. )", .fun = prim_hasAttr, }); /* Determine whether the argument is a set. */ static void prim_isAttrs(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nAttrs); } static RegisterPrimOp primop_isAttrs({ .name = "__isAttrs", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to a set, and `false` otherwise. )", .fun = prim_isAttrs, }); static void prim_removeAttrs(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[0], pos, "while evaluating the first argument passed to builtins.removeAttrs"); state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.removeAttrs"); /* Get the attribute names to be removed. We keep them as Attrs instead of Symbols so std::set_difference can be used to remove them from attrs[0]. */ // 64: large enough to fit the attributes of a derivation boost::container::small_vector<Attr, 64> names; names.reserve(args[1]->listSize()); for (auto elem : args[1]->listItems()) { state.forceStringNoCtx(*elem, pos, "while evaluating the values of the second argument passed to builtins.removeAttrs"); names.emplace_back(state.symbols.create(elem->string_view()), nullptr); } std::sort(names.begin(), names.end()); /* Copy all attributes not in that set. Note that we don't need to sort v.attrs because it's a subset of an already sorted vector. */ auto attrs = state.buildBindings(args[0]->attrs()->size()); std::set_difference( args[0]->attrs()->begin(), args[0]->attrs()->end(), names.begin(), names.end(), std::back_inserter(attrs)); v.mkAttrs(attrs.alreadySorted()); } static RegisterPrimOp primop_removeAttrs({ .name = "removeAttrs", .args = {"set", "list"}, .doc = R"( Remove the attributes listed in *list* from *set*. The attributes don’t have to exist in *set*. For instance, ```nix removeAttrs { x = 1; y = 2; z = 3; } [ "a" "x" "z" ] ``` evaluates to `{ y = 2; }`. )", .fun = prim_removeAttrs, }); /* Builds a set from a list specifying (name, value) pairs. To be precise, a list [{name = "name1"; value = value1;} ... {name = "nameN"; value = valueN;}] is transformed to {name1 = value1; ... nameN = valueN;}. In case of duplicate occurrences of the same name, the first takes precedence. */ static void prim_listToAttrs(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[0], pos, "while evaluating the argument passed to builtins.listToAttrs"); auto attrs = state.buildBindings(args[0]->listSize()); std::set<Symbol> seen; for (auto v2 : args[0]->listItems()) { state.forceAttrs(*v2, pos, "while evaluating an element of the list passed to builtins.listToAttrs"); auto j = getAttr(state, state.sName, v2->attrs(), "in a {name=...; value=...;} pair"); auto name = state.forceStringNoCtx(*j->value, j->pos, "while evaluating the `name` attribute of an element of the list passed to builtins.listToAttrs"); auto sym = state.symbols.create(name); if (seen.insert(sym).second) { auto j2 = getAttr(state, state.sValue, v2->attrs(), "in a {name=...; value=...;} pair"); attrs.insert(sym, j2->value, j2->pos); } } v.mkAttrs(attrs); } static RegisterPrimOp primop_listToAttrs({ .name = "__listToAttrs", .args = {"e"}, .doc = R"( Construct a set from a list specifying the names and values of each attribute. Each element of the list should be a set consisting of a string-valued attribute `name` specifying the name of the attribute, and an attribute `value` specifying its value. In case of duplicate occurrences of the same name, the first takes precedence. Example: ```nix builtins.listToAttrs [ { name = "foo"; value = 123; } { name = "bar"; value = 456; } { name = "bar"; value = 420; } ] ``` evaluates to ```nix { foo = 123; bar = 456; } ``` )", .fun = prim_listToAttrs, }); static void prim_intersectAttrs(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[0], pos, "while evaluating the first argument passed to builtins.intersectAttrs"); state.forceAttrs(*args[1], pos, "while evaluating the second argument passed to builtins.intersectAttrs"); auto & left = *args[0]->attrs(); auto & right = *args[1]->attrs(); auto attrs = state.buildBindings(std::min(left.size(), right.size())); // The current implementation has good asymptotic complexity and is reasonably // simple. Further optimization may be possible, but does not seem productive, // considering the state of eval performance in 2022. // // I have looked for reusable and/or standard solutions and these are my // findings: // // STL // === // std::set_intersection is not suitable, as it only performs a simultaneous // linear scan; not taking advantage of random access. This is O(n + m), so // linear in the largest set, which is not acceptable for callPackage in Nixpkgs. // // Simultaneous scan, with alternating simple binary search // === // One alternative algorithm scans the attrsets simultaneously, jumping // forward using `lower_bound` in case of inequality. This should perform // well on very similar sets, having a local and predictable access pattern. // On dissimilar sets, it seems to need more comparisons than the current // algorithm, as few consecutive attrs match. `lower_bound` could take // advantage of the decreasing remaining search space, but this causes // the medians to move, which can mean that they don't stay in the cache // like they would with the current naive `find`. // // Double binary search // === // The optimal algorithm may be "Double binary search", which doesn't // scan at all, but rather divides both sets simultaneously. // See "Fast Intersection Algorithms for Sorted Sequences" by Baeza-Yates et al. // https://cs.uwaterloo.ca/~ajsaling/papers/intersection_alg_app10.pdf // The only downsides I can think of are not having a linear access pattern // for similar sets, and having to maintain a more intricate algorithm. // // Adaptive // === // Finally one could run try a simultaneous scan, count misses and fall back // to double binary search when the counter hit some threshold and/or ratio. if (left.size() < right.size()) { for (auto & l : left) { auto r = right.find(l.name); if (r != right.end()) attrs.insert(*r); } } else { for (auto & r : right) { auto l = left.find(r.name); if (l != left.end()) attrs.insert(r); } } v.mkAttrs(attrs.alreadySorted()); } static RegisterPrimOp primop_intersectAttrs({ .name = "__intersectAttrs", .args = {"e1", "e2"}, .doc = R"( Return a set consisting of the attributes in the set *e2* which have the same name as some attribute in *e1*. Performs in O(*n* log *m*) where *n* is the size of the smaller set and *m* the larger set's size. )", .fun = prim_intersectAttrs, }); static void prim_catAttrs(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto attrName = state.symbols.create(state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.catAttrs")); state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.catAttrs"); SmallValueVector<nonRecursiveStackReservation> res(args[1]->listSize()); size_t found = 0; for (auto v2 : args[1]->listItems()) { state.forceAttrs(*v2, pos, "while evaluating an element in the list passed as second argument to builtins.catAttrs"); if (auto i = v2->attrs()->get(attrName)) res[found++] = i->value; } auto list = state.buildList(found); for (unsigned int n = 0; n < found; ++n) list[n] = res[n]; v.mkList(list); } static RegisterPrimOp primop_catAttrs({ .name = "__catAttrs", .args = {"attr", "list"}, .doc = R"( Collect each attribute named *attr* from a list of attribute sets. Attrsets that don't contain the named attribute are ignored. For example, ```nix builtins.catAttrs "a" [{a = 1;} {b = 0;} {a = 2;}] ``` evaluates to `[1 2]`. )", .fun = prim_catAttrs, }); static void prim_functionArgs(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); if (args[0]->isPrimOpApp() || args[0]->isPrimOp()) { v.mkAttrs(&state.emptyBindings); return; } if (!args[0]->isLambda()) state.error<TypeError>("'functionArgs' requires a function").atPos(pos).debugThrow(); if (!args[0]->payload.lambda.fun->hasFormals()) { v.mkAttrs(&state.emptyBindings); return; } auto attrs = state.buildBindings(args[0]->payload.lambda.fun->formals->formals.size()); for (auto & i : args[0]->payload.lambda.fun->formals->formals) attrs.insert(i.name, state.getBool(i.def), i.pos); v.mkAttrs(attrs); } static RegisterPrimOp primop_functionArgs({ .name = "__functionArgs", .args = {"f"}, .doc = R"( Return a set containing the names of the formal arguments expected by the function *f*. The value of each attribute is a Boolean denoting whether the corresponding argument has a default value. For instance, `functionArgs ({ x, y ? 123}: ...) = { x = false; y = true; }`. "Formal argument" here refers to the attributes pattern-matched by the function. Plain lambdas are not included, e.g. `functionArgs (x: ...) = { }`. )", .fun = prim_functionArgs, }); /* */ static void prim_mapAttrs(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[1], pos, "while evaluating the second argument passed to builtins.mapAttrs"); auto attrs = state.buildBindings(args[1]->attrs()->size()); for (auto & i : *args[1]->attrs()) { Value * vName = state.allocValue(); Value * vFun2 = state.allocValue(); vName->mkString(state.symbols[i.name]); vFun2->mkApp(args[0], vName); attrs.alloc(i.name).mkApp(vFun2, i.value); } v.mkAttrs(attrs.alreadySorted()); } static RegisterPrimOp primop_mapAttrs({ .name = "__mapAttrs", .args = {"f", "attrset"}, .doc = R"( Apply function *f* to every element of *attrset*. For example, ```nix builtins.mapAttrs (name: value: value * 10) { a = 1; b = 2; } ``` evaluates to `{ a = 10; b = 20; }`. )", .fun = prim_mapAttrs, }); static void prim_zipAttrsWith(EvalState & state, const PosIdx pos, Value * * args, Value & v) { // we will first count how many values are present for each given key. // we then allocate a single attrset and pre-populate it with lists of // appropriate sizes, stash the pointers to the list elements of each, // and populate the lists. after that we replace the list in the every // attribute with the merge function application. this way we need not // use (slightly slower) temporary storage the GC does not know about. struct Item { size_t size = 0; size_t pos = 0; std::optional<ListBuilder> list; }; std::map<Symbol, Item, std::less<Symbol>, traceable_allocator<std::pair<const Symbol, Item>>> attrsSeen; state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.zipAttrsWith"); state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.zipAttrsWith"); const auto listItems = args[1]->listItems(); for (auto & vElem : listItems) { state.forceAttrs(*vElem, noPos, "while evaluating a value of the list passed as second argument to builtins.zipAttrsWith"); for (auto & attr : *vElem->attrs()) attrsSeen.try_emplace(attr.name).first->second.size++; } for (auto & [sym, elem] : attrsSeen) elem.list.emplace(state.buildList(elem.size)); for (auto & vElem : listItems) { for (auto & attr : *vElem->attrs()) { auto & item = attrsSeen.at(attr.name); (*item.list)[item.pos++] = attr.value; } } auto attrs = state.buildBindings(attrsSeen.size()); for (auto & [sym, elem] : attrsSeen) { auto name = state.allocValue(); name->mkString(state.symbols[sym]); auto call1 = state.allocValue(); call1->mkApp(args[0], name); auto call2 = state.allocValue(); auto arg = state.allocValue(); arg->mkList(*elem.list); call2->mkApp(call1, arg); attrs.insert(sym, call2); } v.mkAttrs(attrs.alreadySorted()); } static RegisterPrimOp primop_zipAttrsWith({ .name = "__zipAttrsWith", .args = {"f", "list"}, .doc = R"( Transpose a list of attribute sets into an attribute set of lists, then apply `mapAttrs`. `f` receives two arguments: the attribute name and a non-empty list of all values encountered for that attribute name. The result is an attribute set where the attribute names are the union of the attribute names in each element of `list`. The attribute values are the return values of `f`. ```nix builtins.zipAttrsWith (name: values: { inherit name values; }) [ { a = "x"; } { a = "y"; b = "z"; } ] ``` evaluates to ``` { a = { name = "a"; values = [ "x" "y" ]; }; b = { name = "b"; values = [ "z" ]; }; } ``` )", .fun = prim_zipAttrsWith, }); /************************************************************* * Lists *************************************************************/ /* Determine whether the argument is a list. */ static void prim_isList(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); v.mkBool(args[0]->type() == nList); } static RegisterPrimOp primop_isList({ .name = "__isList", .args = {"e"}, .doc = R"( Return `true` if *e* evaluates to a list, and `false` otherwise. )", .fun = prim_isList, }); static void elemAt(EvalState & state, const PosIdx pos, Value & list, int n, Value & v) { state.forceList(list, pos, "while evaluating the first argument passed to builtins.elemAt"); if (n < 0 || (unsigned int) n >= list.listSize()) state.error<EvalError>( "list index %1% is out of bounds", n ).atPos(pos).debugThrow(); state.forceValue(*list.listElems()[n], pos); v = *list.listElems()[n]; } /* Return the n-1'th element of a list. */ static void prim_elemAt(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixInt::Inner elem = state.forceInt(*args[1], pos, "while evaluating the second argument passed to builtins.elemAt").value; elemAt(state, pos, *args[0], elem, v); } static RegisterPrimOp primop_elemAt({ .name = "__elemAt", .args = {"xs", "n"}, .doc = R"( Return element *n* from the list *xs*. Elements are counted starting from 0. A fatal error occurs if the index is out of bounds. )", .fun = prim_elemAt, }); /* Return the first element of a list. */ static void prim_head(EvalState & state, const PosIdx pos, Value * * args, Value & v) { elemAt(state, pos, *args[0], 0, v); } static RegisterPrimOp primop_head({ .name = "__head", .args = {"list"}, .doc = R"( Return the first element of a list; abort evaluation if the argument isn’t a list or is an empty list. You can test whether a list is empty by comparing it with `[]`. )", .fun = prim_head, }); /* Return a list consisting of everything but the first element of a list. Warning: this function takes O(n) time, so you probably don't want to use it! */ static void prim_tail(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[0], pos, "while evaluating the first argument passed to builtins.tail"); if (args[0]->listSize() == 0) state.error<EvalError>("'tail' called on an empty list").atPos(pos).debugThrow(); auto list = state.buildList(args[0]->listSize() - 1); for (const auto & [n, v] : enumerate(list)) v = args[0]->listElems()[n + 1]; v.mkList(list); } static RegisterPrimOp primop_tail({ .name = "__tail", .args = {"list"}, .doc = R"( Return the list without its first item; abort evaluation if the argument isn’t a list or is an empty list. > **Warning** > > This function should generally be avoided since it's inefficient: > unlike Haskell's `tail`, it takes O(n) time, so recursing over a > list by repeatedly calling `tail` takes O(n^2) time. )", .fun = prim_tail, }); /* Apply a function to every element of a list. */ static void prim_map(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.map"); if (args[1]->listSize() == 0) { v = *args[1]; return; } state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.map"); auto list = state.buildList(args[1]->listSize()); for (const auto & [n, v] : enumerate(list)) (v = state.allocValue())->mkApp( args[0], args[1]->listElems()[n]); v.mkList(list); } static RegisterPrimOp primop_map({ .name = "map", .args = {"f", "list"}, .doc = R"( Apply the function *f* to each element in the list *list*. For example, ```nix map (x: "foo" + x) [ "bar" "bla" "abc" ] ``` evaluates to `[ "foobar" "foobla" "fooabc" ]`. )", .fun = prim_map, }); /* Filter a list using a predicate; that is, return a list containing every element from the list for which the predicate function returns true. */ static void prim_filter(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.filter"); if (args[1]->listSize() == 0) { v = *args[1]; return; } state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.filter"); SmallValueVector<nonRecursiveStackReservation> vs(args[1]->listSize()); size_t k = 0; bool same = true; for (unsigned int n = 0; n < args[1]->listSize(); ++n) { Value res; state.callFunction(*args[0], *args[1]->listElems()[n], res, noPos); if (state.forceBool(res, pos, "while evaluating the return value of the filtering function passed to builtins.filter")) vs[k++] = args[1]->listElems()[n]; else same = false; } if (same) v = *args[1]; else { auto list = state.buildList(k); for (const auto & [n, v] : enumerate(list)) v = vs[n]; v.mkList(list); } } static RegisterPrimOp primop_filter({ .name = "__filter", .args = {"f", "list"}, .doc = R"( Return a list consisting of the elements of *list* for which the function *f* returns `true`. )", .fun = prim_filter, }); /* Return true if a list contains a given element. */ static void prim_elem(EvalState & state, const PosIdx pos, Value * * args, Value & v) { bool res = false; state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.elem"); for (auto elem : args[1]->listItems()) if (state.eqValues(*args[0], *elem, pos, "while searching for the presence of the given element in the list")) { res = true; break; } v.mkBool(res); } static RegisterPrimOp primop_elem({ .name = "__elem", .args = {"x", "xs"}, .doc = R"( Return `true` if a value equal to *x* occurs in the list *xs*, and `false` otherwise. )", .fun = prim_elem, }); /* Concatenate a list of lists. */ static void prim_concatLists(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[0], pos, "while evaluating the first argument passed to builtins.concatLists"); state.concatLists(v, args[0]->listSize(), args[0]->listElems(), pos, "while evaluating a value of the list passed to builtins.concatLists"); } static RegisterPrimOp primop_concatLists({ .name = "__concatLists", .args = {"lists"}, .doc = R"( Concatenate a list of lists into a single list. )", .fun = prim_concatLists, }); /* Return the length of a list. This is an O(1) time operation. */ static void prim_length(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[0], pos, "while evaluating the first argument passed to builtins.length"); v.mkInt(args[0]->listSize()); } static RegisterPrimOp primop_length({ .name = "__length", .args = {"e"}, .doc = R"( Return the length of the list *e*. )", .fun = prim_length, }); /* Reduce a list by applying a binary operator, from left to right. The operator is applied strictly. */ static void prim_foldlStrict(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.foldlStrict"); state.forceList(*args[2], pos, "while evaluating the third argument passed to builtins.foldlStrict"); if (args[2]->listSize()) { Value * vCur = args[1]; for (auto [n, elem] : enumerate(args[2]->listItems())) { Value * vs []{vCur, elem}; vCur = n == args[2]->listSize() - 1 ? &v : state.allocValue(); state.callFunction(*args[0], 2, vs, *vCur, pos); } state.forceValue(v, pos); } else { state.forceValue(*args[1], pos); v = *args[1]; } } static RegisterPrimOp primop_foldlStrict({ .name = "__foldl'", .args = {"op", "nul", "list"}, .doc = R"( Reduce a list by applying a binary operator, from left to right, e.g. `foldl' op nul [x0 x1 x2 ...] = op (op (op nul x0) x1) x2) ...`. For example, `foldl' (acc: elem: acc + elem) 0 [1 2 3]` evaluates to `6` and `foldl' (acc: elem: { "${elem}" = elem; } // acc) {} ["a" "b"]` evaluates to `{ a = "a"; b = "b"; }`. The first argument of `op` is the accumulator whereas the second argument is the current element being processed. The return value of each application of `op` is evaluated immediately, even for intermediate values. )", .fun = prim_foldlStrict, }); static void anyOrAll(bool any, EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceFunction(*args[0], pos, std::string("while evaluating the first argument passed to builtins.") + (any ? "any" : "all")); state.forceList(*args[1], pos, std::string("while evaluating the second argument passed to builtins.") + (any ? "any" : "all")); std::string_view errorCtx = any ? "while evaluating the return value of the function passed to builtins.any" : "while evaluating the return value of the function passed to builtins.all"; Value vTmp; for (auto elem : args[1]->listItems()) { state.callFunction(*args[0], *elem, vTmp, pos); bool res = state.forceBool(vTmp, pos, errorCtx); if (res == any) { v.mkBool(any); return; } } v.mkBool(!any); } static void prim_any(EvalState & state, const PosIdx pos, Value * * args, Value & v) { anyOrAll(true, state, pos, args, v); } static RegisterPrimOp primop_any({ .name = "__any", .args = {"pred", "list"}, .doc = R"( Return `true` if the function *pred* returns `true` for at least one element of *list*, and `false` otherwise. )", .fun = prim_any, }); static void prim_all(EvalState & state, const PosIdx pos, Value * * args, Value & v) { anyOrAll(false, state, pos, args, v); } static RegisterPrimOp primop_all({ .name = "__all", .args = {"pred", "list"}, .doc = R"( Return `true` if the function *pred* returns `true` for all elements of *list*, and `false` otherwise. )", .fun = prim_all, }); static void prim_genList(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto len_ = state.forceInt(*args[1], pos, "while evaluating the second argument passed to builtins.genList").value; if (len_ < 0) state.error<EvalError>("cannot create list of size %1%", len_).atPos(pos).debugThrow(); size_t len = size_t(len_); // More strict than striclty (!) necessary, but acceptable // as evaluating map without accessing any values makes little sense. state.forceFunction(*args[0], noPos, "while evaluating the first argument passed to builtins.genList"); auto list = state.buildList(len); for (const auto & [n, v] : enumerate(list)) { auto arg = state.allocValue(); arg->mkInt(n); (v = state.allocValue())->mkApp(args[0], arg); } v.mkList(list); } static RegisterPrimOp primop_genList({ .name = "__genList", .args = {"generator", "length"}, .doc = R"( Generate list of size *length*, with each element *i* equal to the value returned by *generator* `i`. For example, ```nix builtins.genList (x: x * x) 5 ``` returns the list `[ 0 1 4 9 16 ]`. )", .fun = prim_genList, }); static void prim_lessThan(EvalState & state, const PosIdx pos, Value * * args, Value & v); static void prim_sort(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.sort"); auto len = args[1]->listSize(); if (len == 0) { v = *args[1]; return; } state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.sort"); auto list = state.buildList(len); for (const auto & [n, v] : enumerate(list)) state.forceValue(*(v = args[1]->listElems()[n]), pos); auto comparator = [&](Value * a, Value * b) { /* Optimization: if the comparator is lessThan, bypass callFunction. */ if (args[0]->isPrimOp()) { auto ptr = args[0]->primOp()->fun.target<decltype(&prim_lessThan)>(); if (ptr && *ptr == prim_lessThan) return CompareValues(state, noPos, "while evaluating the ordering function passed to builtins.sort")(a, b); } Value * vs[] = {a, b}; Value vBool; state.callFunction(*args[0], 2, vs, vBool, noPos); return state.forceBool(vBool, pos, "while evaluating the return value of the sorting function passed to builtins.sort"); }; /* FIXME: std::sort can segfault if the comparator is not a strict weak ordering. What to do? std::stable_sort() seems more resilient, but no guarantees... */ std::stable_sort(list.begin(), list.end(), comparator); v.mkList(list); } static RegisterPrimOp primop_sort({ .name = "__sort", .args = {"comparator", "list"}, .doc = R"( Return *list* in sorted order. It repeatedly calls the function *comparator* with two elements. The comparator should return `true` if the first element is less than the second, and `false` otherwise. For example, ```nix builtins.sort builtins.lessThan [ 483 249 526 147 42 77 ] ``` produces the list `[ 42 77 147 249 483 526 ]`. This is a stable sort: it preserves the relative order of elements deemed equal by the comparator. )", .fun = prim_sort, }); static void prim_partition(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.partition"); state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.partition"); auto len = args[1]->listSize(); ValueVector right, wrong; for (unsigned int n = 0; n < len; ++n) { auto vElem = args[1]->listElems()[n]; state.forceValue(*vElem, pos); Value res; state.callFunction(*args[0], *vElem, res, pos); if (state.forceBool(res, pos, "while evaluating the return value of the partition function passed to builtins.partition")) right.push_back(vElem); else wrong.push_back(vElem); } auto attrs = state.buildBindings(2); auto rsize = right.size(); auto rlist = state.buildList(rsize); if (rsize) memcpy(rlist.elems, right.data(), sizeof(Value *) * rsize); attrs.alloc(state.sRight).mkList(rlist); auto wsize = wrong.size(); auto wlist = state.buildList(wsize); if (wsize) memcpy(wlist.elems, wrong.data(), sizeof(Value *) * wsize); attrs.alloc(state.sWrong).mkList(wlist); v.mkAttrs(attrs); } static RegisterPrimOp primop_partition({ .name = "__partition", .args = {"pred", "list"}, .doc = R"( Given a predicate function *pred*, this function returns an attrset containing a list named `right`, containing the elements in *list* for which *pred* returned `true`, and a list named `wrong`, containing the elements for which it returned `false`. For example, ```nix builtins.partition (x: x > 10) [1 23 9 3 42] ``` evaluates to ```nix { right = [ 23 42 ]; wrong = [ 1 9 3 ]; } ``` )", .fun = prim_partition, }); static void prim_groupBy(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.groupBy"); state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.groupBy"); ValueVectorMap attrs; for (auto vElem : args[1]->listItems()) { Value res; state.callFunction(*args[0], *vElem, res, pos); auto name = state.forceStringNoCtx(res, pos, "while evaluating the return value of the grouping function passed to builtins.groupBy"); auto sym = state.symbols.create(name); auto vector = attrs.try_emplace(sym, ValueVector()).first; vector->second.push_back(vElem); } auto attrs2 = state.buildBindings(attrs.size()); for (auto & i : attrs) { auto size = i.second.size(); auto list = state.buildList(size); memcpy(list.elems, i.second.data(), sizeof(Value *) * size); attrs2.alloc(i.first).mkList(list); } v.mkAttrs(attrs2.alreadySorted()); } static RegisterPrimOp primop_groupBy({ .name = "__groupBy", .args = {"f", "list"}, .doc = R"( Groups elements of *list* together by the string returned from the function *f* called on each element. It returns an attribute set where each attribute value contains the elements of *list* that are mapped to the same corresponding attribute name returned by *f*. For example, ```nix builtins.groupBy (builtins.substring 0 1) ["foo" "bar" "baz"] ``` evaluates to ```nix { b = [ "bar" "baz" ]; f = [ "foo" ]; } ``` )", .fun = prim_groupBy, }); static void prim_concatMap(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceFunction(*args[0], pos, "while evaluating the first argument passed to builtins.concatMap"); state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.concatMap"); auto nrLists = args[1]->listSize(); // List of returned lists before concatenation. References to these Values must NOT be persisted. SmallTemporaryValueVector<conservativeStackReservation> lists(nrLists); size_t len = 0; for (unsigned int n = 0; n < nrLists; ++n) { Value * vElem = args[1]->listElems()[n]; state.callFunction(*args[0], *vElem, lists[n], pos); state.forceList(lists[n], lists[n].determinePos(args[0]->determinePos(pos)), "while evaluating the return value of the function passed to builtins.concatMap"); len += lists[n].listSize(); } auto list = state.buildList(len); auto out = list.elems; for (unsigned int n = 0, pos = 0; n < nrLists; ++n) { auto l = lists[n].listSize(); if (l) memcpy(out + pos, lists[n].listElems(), l * sizeof(Value *)); pos += l; } v.mkList(list); } static RegisterPrimOp primop_concatMap({ .name = "__concatMap", .args = {"f", "list"}, .doc = R"( This function is equivalent to `builtins.concatLists (map f list)` but is more efficient. )", .fun = prim_concatMap, }); /************************************************************* * Integer arithmetic *************************************************************/ static void prim_add(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); state.forceValue(*args[1], pos); if (args[0]->type() == nFloat || args[1]->type() == nFloat) v.mkFloat(state.forceFloat(*args[0], pos, "while evaluating the first argument of the addition") + state.forceFloat(*args[1], pos, "while evaluating the second argument of the addition")); else { auto i1 = state.forceInt(*args[0], pos, "while evaluating the first argument of the addition"); auto i2 = state.forceInt(*args[1], pos, "while evaluating the second argument of the addition"); auto result_ = i1 + i2; if (auto result = result_.valueChecked(); result.has_value()) { v.mkInt(*result); } else { state.error<EvalError>("integer overflow in adding %1% + %2%", i1, i2).atPos(pos).debugThrow(); } } } static RegisterPrimOp primop_add({ .name = "__add", .args = {"e1", "e2"}, .doc = R"( Return the sum of the numbers *e1* and *e2*. )", .fun = prim_add, }); static void prim_sub(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); state.forceValue(*args[1], pos); if (args[0]->type() == nFloat || args[1]->type() == nFloat) v.mkFloat(state.forceFloat(*args[0], pos, "while evaluating the first argument of the subtraction") - state.forceFloat(*args[1], pos, "while evaluating the second argument of the subtraction")); else { auto i1 = state.forceInt(*args[0], pos, "while evaluating the first argument of the subtraction"); auto i2 = state.forceInt(*args[1], pos, "while evaluating the second argument of the subtraction"); auto result_ = i1 - i2; if (auto result = result_.valueChecked(); result.has_value()) { v.mkInt(*result); } else { state.error<EvalError>("integer overflow in subtracting %1% - %2%", i1, i2).atPos(pos).debugThrow(); } } } static RegisterPrimOp primop_sub({ .name = "__sub", .args = {"e1", "e2"}, .doc = R"( Return the difference between the numbers *e1* and *e2*. )", .fun = prim_sub, }); static void prim_mul(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); state.forceValue(*args[1], pos); if (args[0]->type() == nFloat || args[1]->type() == nFloat) v.mkFloat(state.forceFloat(*args[0], pos, "while evaluating the first of the multiplication") * state.forceFloat(*args[1], pos, "while evaluating the second argument of the multiplication")); else { auto i1 = state.forceInt(*args[0], pos, "while evaluating the first argument of the multiplication"); auto i2 = state.forceInt(*args[1], pos, "while evaluating the second argument of the multiplication"); auto result_ = i1 * i2; if (auto result = result_.valueChecked(); result.has_value()) { v.mkInt(*result); } else { state.error<EvalError>("integer overflow in multiplying %1% * %2%", i1, i2).atPos(pos).debugThrow(); } } } static RegisterPrimOp primop_mul({ .name = "__mul", .args = {"e1", "e2"}, .doc = R"( Return the product of the numbers *e1* and *e2*. )", .fun = prim_mul, }); static void prim_div(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); state.forceValue(*args[1], pos); NixFloat f2 = state.forceFloat(*args[1], pos, "while evaluating the second operand of the division"); if (f2 == 0) state.error<EvalError>("division by zero").atPos(pos).debugThrow(); if (args[0]->type() == nFloat || args[1]->type() == nFloat) { v.mkFloat(state.forceFloat(*args[0], pos, "while evaluating the first operand of the division") / f2); } else { NixInt i1 = state.forceInt(*args[0], pos, "while evaluating the first operand of the division"); NixInt i2 = state.forceInt(*args[1], pos, "while evaluating the second operand of the division"); /* Avoid division overflow as it might raise SIGFPE. */ auto result_ = i1 / i2; if (auto result = result_.valueChecked(); result.has_value()) { v.mkInt(*result); } else { state.error<EvalError>("integer overflow in dividing %1% / %2%", i1, i2).atPos(pos).debugThrow(); } } } static RegisterPrimOp primop_div({ .name = "__div", .args = {"e1", "e2"}, .doc = R"( Return the quotient of the numbers *e1* and *e2*. )", .fun = prim_div, }); static void prim_bitAnd(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto i1 = state.forceInt(*args[0], pos, "while evaluating the first argument passed to builtins.bitAnd"); auto i2 = state.forceInt(*args[1], pos, "while evaluating the second argument passed to builtins.bitAnd"); v.mkInt(i1.value & i2.value); } static RegisterPrimOp primop_bitAnd({ .name = "__bitAnd", .args = {"e1", "e2"}, .doc = R"( Return the bitwise AND of the integers *e1* and *e2*. )", .fun = prim_bitAnd, }); static void prim_bitOr(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto i1 = state.forceInt(*args[0], pos, "while evaluating the first argument passed to builtins.bitOr"); auto i2 = state.forceInt(*args[1], pos, "while evaluating the second argument passed to builtins.bitOr"); v.mkInt(i1.value | i2.value); } static RegisterPrimOp primop_bitOr({ .name = "__bitOr", .args = {"e1", "e2"}, .doc = R"( Return the bitwise OR of the integers *e1* and *e2*. )", .fun = prim_bitOr, }); static void prim_bitXor(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto i1 = state.forceInt(*args[0], pos, "while evaluating the first argument passed to builtins.bitXor"); auto i2 = state.forceInt(*args[1], pos, "while evaluating the second argument passed to builtins.bitXor"); v.mkInt(i1.value ^ i2.value); } static RegisterPrimOp primop_bitXor({ .name = "__bitXor", .args = {"e1", "e2"}, .doc = R"( Return the bitwise XOR of the integers *e1* and *e2*. )", .fun = prim_bitXor, }); static void prim_lessThan(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceValue(*args[0], pos); state.forceValue(*args[1], pos); // pos is exact here, no need for a message. CompareValues comp(state, noPos, ""); v.mkBool(comp(args[0], args[1])); } static RegisterPrimOp primop_lessThan({ .name = "__lessThan", .args = {"e1", "e2"}, .doc = R"( Return `true` if the number *e1* is less than the number *e2*, and `false` otherwise. Evaluation aborts if either *e1* or *e2* does not evaluate to a number. )", .fun = prim_lessThan, }); /************************************************************* * String manipulation *************************************************************/ /* Convert the argument to a string. Paths are *not* copied to the store, so `toString /foo/bar' yields `"/foo/bar"', not `"/nix/store/whatever..."'. */ static void prim_toString(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto s = state.coerceToString(pos, *args[0], context, "while evaluating the first argument passed to builtins.toString", true, false); v.mkString(*s, context); } static RegisterPrimOp primop_toString({ .name = "toString", .args = {"e"}, .doc = R"( Convert the expression *e* to a string. *e* can be: - A string (in which case the string is returned unmodified). - A path (e.g., `toString /foo/bar` yields `"/foo/bar"`. - A set containing `{ __toString = self: ...; }` or `{ outPath = ...; }`. - An integer. - A list, in which case the string representations of its elements are joined with spaces. - A Boolean (`false` yields `""`, `true` yields `"1"`). - `null`, which yields the empty string. )", .fun = prim_toString, }); /* `substring start len str' returns the substring of `str' starting at character position `min(start, stringLength str)' inclusive and ending at `min(start + len, stringLength str)'. `start' must be non-negative. */ static void prim_substring(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixInt::Inner start = state.forceInt(*args[0], pos, "while evaluating the first argument (the start offset) passed to builtins.substring").value; if (start < 0) state.error<EvalError>("negative start position in 'substring'").atPos(pos).debugThrow(); NixInt::Inner len = state.forceInt(*args[1], pos, "while evaluating the second argument (the substring length) passed to builtins.substring").value; // Negative length may be idiomatically passed to builtins.substring to get // the tail of the string. if (len < 0) { len = std::numeric_limits<NixInt::Inner>::max(); } // Special-case on empty substring to avoid O(n) strlen // This allows for the use of empty substrings to efficently capture string context if (len == 0) { state.forceValue(*args[2], pos); if (args[2]->type() == nString) { v.mkString("", args[2]->context()); return; } } NixStringContext context; auto s = state.coerceToString(pos, *args[2], context, "while evaluating the third argument (the string) passed to builtins.substring"); v.mkString((unsigned int) start >= s->size() ? "" : s->substr(start, len), context); } static RegisterPrimOp primop_substring({ .name = "__substring", .args = {"start", "len", "s"}, .doc = R"( Return the substring of *s* from character position *start* (zero-based) up to but not including *start + len*. If *start* is greater than the length of the string, an empty string is returned. If *start + len* lies beyond the end of the string or *len* is `-1`, only the substring up to the end of the string is returned. *start* must be non-negative. For example, ```nix builtins.substring 0 3 "nixos" ``` evaluates to `"nix"`. )", .fun = prim_substring, }); static void prim_stringLength(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto s = state.coerceToString(pos, *args[0], context, "while evaluating the argument passed to builtins.stringLength"); v.mkInt(NixInt::Inner(s->size())); } static RegisterPrimOp primop_stringLength({ .name = "__stringLength", .args = {"e"}, .doc = R"( Return the number of bytes of the string *e*. If *e* is not a string, evaluation is aborted. )", .fun = prim_stringLength, }); /* Return the cryptographic hash of a string in base-16. */ static void prim_hashString(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto algo = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.hashString"); std::optional<HashAlgorithm> ha = parseHashAlgo(algo); if (!ha) state.error<EvalError>("unknown hash algorithm '%1%'", algo).atPos(pos).debugThrow(); NixStringContext context; // discarded auto s = state.forceString(*args[1], context, pos, "while evaluating the second argument passed to builtins.hashString"); v.mkString(hashString(*ha, s).to_string(HashFormat::Base16, false)); } static RegisterPrimOp primop_hashString({ .name = "__hashString", .args = {"type", "s"}, .doc = R"( Return a base-16 representation of the cryptographic hash of string *s*. The hash algorithm specified by *type* must be one of `"md5"`, `"sha1"`, `"sha256"` or `"sha512"`. )", .fun = prim_hashString, }); static void prim_convertHash(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[0], pos, "while evaluating the first argument passed to builtins.convertHash"); auto inputAttrs = args[0]->attrs(); auto iteratorHash = getAttr(state, state.symbols.create("hash"), inputAttrs, "while locating the attribute 'hash'"); auto hash = state.forceStringNoCtx(*iteratorHash->value, pos, "while evaluating the attribute 'hash'"); auto iteratorHashAlgo = inputAttrs->get(state.symbols.create("hashAlgo")); std::optional<HashAlgorithm> ha = std::nullopt; if (iteratorHashAlgo) ha = parseHashAlgo(state.forceStringNoCtx(*iteratorHashAlgo->value, pos, "while evaluating the attribute 'hashAlgo'")); auto iteratorToHashFormat = getAttr(state, state.symbols.create("toHashFormat"), args[0]->attrs(), "while locating the attribute 'toHashFormat'"); HashFormat hf = parseHashFormat(state.forceStringNoCtx(*iteratorToHashFormat->value, pos, "while evaluating the attribute 'toHashFormat'")); v.mkString(Hash::parseAny(hash, ha).to_string(hf, hf == HashFormat::SRI)); } static RegisterPrimOp primop_convertHash({ .name = "__convertHash", .args = {"args"}, .doc = R"( Return the specified representation of a hash string, based on the attributes presented in *args*: - `hash` The hash to be converted. The hash format is detected automatically. - `hashAlgo` The algorithm used to create the hash. Must be one of - `"md5"` - `"sha1"` - `"sha256"` - `"sha512"` The attribute may be omitted when `hash` is an [SRI hash](https://www.w3.org/TR/SRI/#the-integrity-attribute) or when the hash is prefixed with the hash algorithm name followed by a colon. That `<hashAlgo>:<hashBody>` syntax is supported for backwards compatibility with existing tooling. - `toHashFormat` The format of the resulting hash. Must be one of - `"base16"` - `"nix32"` - `"base32"` (deprecated alias for `"nix32"`) - `"base64"` - `"sri"` The result hash is the *toHashFormat* representation of the hash *hash*. > **Example** > > Convert a SHA256 hash in Base16 to SRI: > > ```nix > builtins.convertHash { > hash = "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"; > toHashFormat = "sri"; > hashAlgo = "sha256"; > } > ``` > > "sha256-47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=" > **Example** > > Convert a SHA256 hash in SRI to Base16: > > ```nix > builtins.convertHash { > hash = "sha256-47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU="; > toHashFormat = "base16"; > } > ``` > > "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855" > **Example** > > Convert a hash in the form `<hashAlgo>:<hashBody>` in Base16 to SRI: > > ```nix > builtins.convertHash { > hash = "sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"; > toHashFormat = "sri"; > } > ``` > > "sha256-47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=" )", .fun = prim_convertHash, }); struct RegexCache { struct State { // TODO use C++20 transparent comparison when available std::unordered_map<std::string_view, std::regex> cache; std::list<std::string> keys; }; Sync<State> state_; std::regex get(std::string_view re) { auto state(state_.lock()); auto it = state->cache.find(re); if (it != state->cache.end()) return it->second; state->keys.emplace_back(re); return state->cache.emplace(state->keys.back(), std::regex(state->keys.back(), std::regex::extended)).first->second; } }; std::shared_ptr<RegexCache> makeRegexCache() { return std::make_shared<RegexCache>(); } void prim_match(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto re = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.match"); try { auto regex = state.regexCache->get(re); NixStringContext context; const auto str = state.forceString(*args[1], context, pos, "while evaluating the second argument passed to builtins.match"); std::cmatch match; if (!std::regex_match(str.begin(), str.end(), match, regex)) { v.mkNull(); return; } // the first match is the whole string auto list = state.buildList(match.size() - 1); for (const auto & [i, v2] : enumerate(list)) if (!match[i + 1].matched) v2 = &state.vNull; else v2 = mkString(state, match[i + 1]); v.mkList(list); } catch (std::regex_error & e) { if (e.code() == std::regex_constants::error_space) { // limit is _GLIBCXX_REGEX_STATE_LIMIT for libstdc++ state.error<EvalError>("memory limit exceeded by regular expression '%s'", re) .atPos(pos) .debugThrow(); } else state.error<EvalError>("invalid regular expression '%s'", re) .atPos(pos) .debugThrow(); } } static RegisterPrimOp primop_match({ .name = "__match", .args = {"regex", "str"}, .doc = R"s( Returns a list if the [extended POSIX regular expression](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap09.html#tag_09_04) *regex* matches *str* precisely, otherwise returns `null`. Each item in the list is a regex group. ```nix builtins.match "ab" "abc" ``` Evaluates to `null`. ```nix builtins.match "abc" "abc" ``` Evaluates to `[ ]`. ```nix builtins.match "a(b)(c)" "abc" ``` Evaluates to `[ "b" "c" ]`. ```nix builtins.match "[[:space:]]+([[:upper:]]+)[[:space:]]+" " FOO " ``` Evaluates to `[ "FOO" ]`. )s", .fun = prim_match, }); /* Split a string with a regular expression, and return a list of the non-matching parts interleaved by the lists of the matching groups. */ void prim_split(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto re = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.split"); try { auto regex = state.regexCache->get(re); NixStringContext context; const auto str = state.forceString(*args[1], context, pos, "while evaluating the second argument passed to builtins.split"); auto begin = std::cregex_iterator(str.begin(), str.end(), regex); auto end = std::cregex_iterator(); // Any matches results are surrounded by non-matching results. const size_t len = std::distance(begin, end); auto list = state.buildList(2 * len + 1); size_t idx = 0; if (len == 0) { list[0] = args[1]; v.mkList(list); return; } for (auto i = begin; i != end; ++i) { assert(idx <= 2 * len + 1 - 3); auto match = *i; // Add a string for non-matched characters. list[idx++] = mkString(state, match.prefix()); // Add a list for matched substrings. const size_t slen = match.size() - 1; // Start at 1, beacause the first match is the whole string. auto list2 = state.buildList(slen); for (const auto & [si, v2] : enumerate(list2)) { if (!match[si + 1].matched) v2 = &state.vNull; else v2 = mkString(state, match[si + 1]); } (list[idx++] = state.allocValue())->mkList(list2); // Add a string for non-matched suffix characters. if (idx == 2 * len) list[idx++] = mkString(state, match.suffix()); } assert(idx == 2 * len + 1); v.mkList(list); } catch (std::regex_error & e) { if (e.code() == std::regex_constants::error_space) { // limit is _GLIBCXX_REGEX_STATE_LIMIT for libstdc++ state.error<EvalError>("memory limit exceeded by regular expression '%s'", re) .atPos(pos) .debugThrow(); } else state.error<EvalError>("invalid regular expression '%s'", re) .atPos(pos) .debugThrow(); } } static RegisterPrimOp primop_split({ .name = "__split", .args = {"regex", "str"}, .doc = R"s( Returns a list composed of non matched strings interleaved with the lists of the [extended POSIX regular expression](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap09.html#tag_09_04) *regex* matches of *str*. Each item in the lists of matched sequences is a regex group. ```nix builtins.split "(a)b" "abc" ``` Evaluates to `[ "" [ "a" ] "c" ]`. ```nix builtins.split "([ac])" "abc" ``` Evaluates to `[ "" [ "a" ] "b" [ "c" ] "" ]`. ```nix builtins.split "(a)|(c)" "abc" ``` Evaluates to `[ "" [ "a" null ] "b" [ null "c" ] "" ]`. ```nix builtins.split "([[:upper:]]+)" " FOO " ``` Evaluates to `[ " " [ "FOO" ] " " ]`. )s", .fun = prim_split, }); static void prim_concatStringsSep(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto sep = state.forceString(*args[0], context, pos, "while evaluating the first argument (the separator string) passed to builtins.concatStringsSep"); state.forceList(*args[1], pos, "while evaluating the second argument (the list of strings to concat) passed to builtins.concatStringsSep"); std::string res; res.reserve((args[1]->listSize() + 32) * sep.size()); bool first = true; for (auto elem : args[1]->listItems()) { if (first) first = false; else res += sep; res += *state.coerceToString(pos, *elem, context, "while evaluating one element of the list of strings to concat passed to builtins.concatStringsSep"); } v.mkString(res, context); } static RegisterPrimOp primop_concatStringsSep({ .name = "__concatStringsSep", .args = {"separator", "list"}, .doc = R"( Concatenate a list of strings with a separator between each element, e.g. `concatStringsSep "/" ["usr" "local" "bin"] == "usr/local/bin"`. )", .fun = prim_concatStringsSep, }); static void prim_replaceStrings(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceList(*args[0], pos, "while evaluating the first argument passed to builtins.replaceStrings"); state.forceList(*args[1], pos, "while evaluating the second argument passed to builtins.replaceStrings"); if (args[0]->listSize() != args[1]->listSize()) state.error<EvalError>( "'from' and 'to' arguments passed to builtins.replaceStrings have different lengths" ).atPos(pos).debugThrow(); std::vector<std::string> from; from.reserve(args[0]->listSize()); for (auto elem : args[0]->listItems()) from.emplace_back(state.forceString(*elem, pos, "while evaluating one of the strings to replace passed to builtins.replaceStrings")); std::unordered_map<size_t, std::string> cache; auto to = args[1]->listItems(); NixStringContext context; auto s = state.forceString(*args[2], context, pos, "while evaluating the third argument passed to builtins.replaceStrings"); std::string res; // Loops one past last character to handle the case where 'from' contains an empty string. for (size_t p = 0; p <= s.size(); ) { bool found = false; auto i = from.begin(); auto j = to.begin(); size_t j_index = 0; for (; i != from.end(); ++i, ++j, ++j_index) if (s.compare(p, i->size(), *i) == 0) { found = true; auto v = cache.find(j_index); if (v == cache.end()) { NixStringContext ctx; auto ts = state.forceString(**j, ctx, pos, "while evaluating one of the replacement strings passed to builtins.replaceStrings"); v = (cache.emplace(j_index, ts)).first; for (auto& path : ctx) context.insert(path); } res += v->second; if (i->empty()) { if (p < s.size()) res += s[p]; p++; } else { p += i->size(); } break; } if (!found) { if (p < s.size()) res += s[p]; p++; } } v.mkString(res, context); } static RegisterPrimOp primop_replaceStrings({ .name = "__replaceStrings", .args = {"from", "to", "s"}, .doc = R"( Given string *s*, replace every occurrence of the strings in *from* with the corresponding string in *to*. The argument *to* is lazy, that is, it is only evaluated when its corresponding pattern in *from* is matched in the string *s* Example: ```nix builtins.replaceStrings ["oo" "a"] ["a" "i"] "foobar" ``` evaluates to `"fabir"`. )", .fun = prim_replaceStrings, }); /************************************************************* * Versions *************************************************************/ static void prim_parseDrvName(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto name = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.parseDrvName"); DrvName parsed(name); auto attrs = state.buildBindings(2); attrs.alloc(state.sName).mkString(parsed.name); attrs.alloc("version").mkString(parsed.version); v.mkAttrs(attrs); } static RegisterPrimOp primop_parseDrvName({ .name = "__parseDrvName", .args = {"s"}, .doc = R"( Split the string *s* into a package name and version. The package name is everything up to but not including the first dash not followed by a letter, and the version is everything following that dash. The result is returned in a set `{ name, version }`. Thus, `builtins.parseDrvName "nix-0.12pre12876"` returns `{ name = "nix"; version = "0.12pre12876"; }`. )", .fun = prim_parseDrvName, }); static void prim_compareVersions(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto version1 = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.compareVersions"); auto version2 = state.forceStringNoCtx(*args[1], pos, "while evaluating the second argument passed to builtins.compareVersions"); auto result = compareVersions(version1, version2); v.mkInt(result < 0 ? -1 : result > 0 ? 1 : 0); } static RegisterPrimOp primop_compareVersions({ .name = "__compareVersions", .args = {"s1", "s2"}, .doc = R"( Compare two strings representing versions and return `-1` if version *s1* is older than version *s2*, `0` if they are the same, and `1` if *s1* is newer than *s2*. The version comparison algorithm is the same as the one used by [`nix-env -u`](../command-ref/nix-env.md#operation---upgrade). )", .fun = prim_compareVersions, }); static void prim_splitVersion(EvalState & state, const PosIdx pos, Value * * args, Value & v) { auto version = state.forceStringNoCtx(*args[0], pos, "while evaluating the first argument passed to builtins.splitVersion"); auto iter = version.cbegin(); Strings components; while (iter != version.cend()) { auto component = nextComponent(iter, version.cend()); if (component.empty()) break; components.emplace_back(component); } auto list = state.buildList(components.size()); for (const auto & [n, component] : enumerate(components)) (list[n] = state.allocValue())->mkString(std::move(component)); v.mkList(list); } static RegisterPrimOp primop_splitVersion({ .name = "__splitVersion", .args = {"s"}, .doc = R"( Split a string representing a version into its components, by the same version splitting logic underlying the version comparison in [`nix-env -u`](../command-ref/nix-env.md#operation---upgrade). )", .fun = prim_splitVersion, }); /************************************************************* * Primop registration *************************************************************/ RegisterPrimOp::PrimOps * RegisterPrimOp::primOps; RegisterPrimOp::RegisterPrimOp(PrimOp && primOp) { if (!primOps) primOps = new PrimOps; primOps->push_back(std::move(primOp)); } void EvalState::createBaseEnv() { baseEnv.up = 0; /* Add global constants such as `true' to the base environment. */ Value v; /* `builtins' must be first! */ v.mkAttrs(buildBindings(128).finish()); addConstant("builtins", v, { .type = nAttrs, .doc = R"( Contains all the built-in functions and values. Since built-in functions were added over time, [testing for attributes](./operators.md#has-attribute) in `builtins` can be used for graceful fallback on older Nix installations: ```nix # if hasContext is not available, we assume `s` has a context if builtins ? hasContext then builtins.hasContext s else true ``` )", }); v.mkBool(true); addConstant("true", v, { .type = nBool, .doc = R"( Primitive value. It can be returned by [comparison operators](@docroot@/language/operators.md#Comparison) and used in [conditional expressions](@docroot@/language/syntax.md#Conditionals). The name `true` is not special, and can be shadowed: ```nix-repl nix-repl> let true = 1; in true 1 ``` )", }); v.mkBool(false); addConstant("false", v, { .type = nBool, .doc = R"( Primitive value. It can be returned by [comparison operators](@docroot@/language/operators.md#Comparison) and used in [conditional expressions](@docroot@/language/syntax.md#Conditionals). The name `false` is not special, and can be shadowed: ```nix-repl nix-repl> let false = 1; in false 1 ``` )", }); addConstant("null", &vNull, { .type = nNull, .doc = R"( Primitive value. The name `null` is not special, and can be shadowed: ```nix-repl nix-repl> let null = 1; in null 1 ``` )", }); if (!settings.pureEval) { v.mkInt(time(0)); } addConstant("__currentTime", v, { .type = nInt, .doc = R"( Return the [Unix time](https://en.wikipedia.org/wiki/Unix_time) at first evaluation. Repeated references to that name will re-use the initially obtained value. Example: ```console $ nix repl Welcome to Nix 2.15.1 Type :? for help. nix-repl> builtins.currentTime 1683705525 nix-repl> builtins.currentTime 1683705525 ``` The [store path](@docroot@/store/store-path.md) of a derivation depending on `currentTime` will differ for each evaluation, unless both evaluate `builtins.currentTime` in the same second. )", .impureOnly = true, }); if (!settings.pureEval) v.mkString(settings.getCurrentSystem()); addConstant("__currentSystem", v, { .type = nString, .doc = R"( The value of the [`eval-system`](@docroot@/command-ref/conf-file.md#conf-eval-system) or else [`system`](@docroot@/command-ref/conf-file.md#conf-system) configuration option. It can be used to set the `system` attribute for [`builtins.derivation`](@docroot@/language/derivations.md) such that the resulting derivation can be built on the same system that evaluates the Nix expression: ```nix builtins.derivation { # ... system = builtins.currentSystem; } ``` It can be overridden in order to create derivations for different system than the current one: ```console $ nix-instantiate --system "mips64-linux" --eval --expr 'builtins.currentSystem' "mips64-linux" ``` )", .impureOnly = true, }); v.mkString(nixVersion); addConstant("__nixVersion", v, { .type = nString, .doc = R"( The version of Nix. For example, where the command line returns the current Nix version, ```shell-session $ nix --version nix (Nix) 2.16.0 ``` the Nix language evaluator returns the same value: ```nix-repl nix-repl> builtins.nixVersion "2.16.0" ``` )", }); v.mkString(store->storeDir); addConstant("__storeDir", v, { .type = nString, .doc = R"( Logical file system location of the [Nix store](@docroot@/glossary.md#gloss-store) currently in use. This value is determined by the `store` parameter in [Store URLs](@docroot@/store/types/index.md#store-url-format): ```shell-session $ nix-instantiate --store 'dummy://?store=/blah' --eval --expr builtins.storeDir "/blah" ``` )", }); /* Language version. This should be increased every time a new language feature gets added. It's not necessary to increase it when primops get added, because you can just use `builtins ? primOp' to check. */ v.mkInt(6); addConstant("__langVersion", v, { .type = nInt, .doc = R"( The current version of the Nix language. )", }); #ifndef _WIN32 // TODO implement on Windows // Miscellaneous if (settings.enableNativeCode) { addPrimOp({ .name = "__importNative", .arity = 2, .fun = prim_importNative, }); addPrimOp({ .name = "__exec", .arity = 1, .fun = prim_exec, }); } #endif addPrimOp({ .name = "__traceVerbose", .args = { "e1", "e2" }, .arity = 2, .doc = R"( Evaluate *e1* and print its abstract syntax representation on standard error if `--trace-verbose` is enabled. Then return *e2*. This function is useful for debugging. )", .fun = settings.traceVerbose ? prim_trace : prim_second, }); /* Add a value containing the current Nix expression search path. */ auto list = buildList(lookupPath.elements.size()); for (const auto & [n, i] : enumerate(lookupPath.elements)) { auto attrs = buildBindings(2); attrs.alloc("path").mkString(i.path.s); attrs.alloc("prefix").mkString(i.prefix.s); (list[n] = allocValue())->mkAttrs(attrs); } v.mkList(list); addConstant("__nixPath", v, { .type = nList, .doc = R"( A list of search path entries used to resolve [lookup paths](@docroot@/language/constructs/lookup-path.md). Its value is primarily determined by the [`nix-path` configuration setting](@docroot@/command-ref/conf-file.md#conf-nix-path), which are - Overridden by the [`NIX_PATH`](@docroot@/command-ref/env-common.md#env-NIX_PATH) environment variable or the `--nix-path` option - Extended by the [`-I` option](@docroot@/command-ref/opt-common.md#opt-I) or `--extra-nix-path` > **Example** > > ```bash > $ NIX_PATH= nix-instantiate --eval --expr "builtins.nixPath" -I foo=bar --no-pure-eval > [ { path = "bar"; prefix = "foo"; } ] > ``` Lookup path expressions are [desugared](https://en.wikipedia.org/wiki/Syntactic_sugar) using this and [`builtins.findFile`](./builtins.html#builtins-findFile): ```nix <nixpkgs> ``` is equivalent to: ```nix builtins.findFile builtins.nixPath "nixpkgs" ``` )", }); if (RegisterPrimOp::primOps) for (auto & primOp : *RegisterPrimOp::primOps) if (experimentalFeatureSettings.isEnabled(primOp.experimentalFeature)) { auto primOpAdjusted = primOp; primOpAdjusted.arity = std::max(primOp.args.size(), primOp.arity); addPrimOp(std::move(primOpAdjusted)); } /* Add a wrapper around the derivation primop that computes the `drvPath' and `outPath' attributes lazily. Null docs because it is documented separately. */ auto vDerivation = allocValue(); addConstant("derivation", vDerivation, { .type = nFunction, }); /* Now that we've added all primops, sort the `builtins' set, because attribute lookups expect it to be sorted. */ baseEnv.values[0]->payload.attrs->sort(); staticBaseEnv->sort(); /* Note: we have to initialize the 'derivation' constant *after* building baseEnv/staticBaseEnv because it uses 'builtins'. */ evalFile(derivationInternal, *vDerivation); } }
177,676
C++
.cc
4,199
35.076447
237
0.618836
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,008
json-to-value.cc
NixOS_nix/src/libexpr/json-to-value.cc
#include "json-to-value.hh" #include "value.hh" #include "eval.hh" #include <limits> #include <variant> #include <nlohmann/json.hpp> using json = nlohmann::json; namespace nix { // for more information, refer to // https://github.com/nlohmann/json/blob/master/include/nlohmann/detail/input/json_sax.hpp class JSONSax : nlohmann::json_sax<json> { class JSONState { protected: std::unique_ptr<JSONState> parent; RootValue v; public: virtual std::unique_ptr<JSONState> resolve(EvalState &) { throw std::logic_error("tried to close toplevel json parser state"); } explicit JSONState(std::unique_ptr<JSONState> && p) : parent(std::move(p)) {} explicit JSONState(Value * v) : v(allocRootValue(v)) {} JSONState(JSONState & p) = delete; Value & value(EvalState & state) { if (!v) v = allocRootValue(state.allocValue()); return **v; } virtual ~JSONState() {} virtual void add() {} }; class JSONObjectState : public JSONState { using JSONState::JSONState; ValueMap attrs; std::unique_ptr<JSONState> resolve(EvalState & state) override { auto attrs2 = state.buildBindings(attrs.size()); for (auto & i : attrs) attrs2.insert(i.first, i.second); parent->value(state).mkAttrs(attrs2); return std::move(parent); } void add() override { v = nullptr; } public: void key(string_t & name, EvalState & state) { attrs.insert_or_assign(state.symbols.create(name), &value(state)); } }; class JSONListState : public JSONState { ValueVector values; std::unique_ptr<JSONState> resolve(EvalState & state) override { auto list = state.buildList(values.size()); for (const auto & [n, v2] : enumerate(list)) v2 = values[n]; parent->value(state).mkList(list); return std::move(parent); } void add() override { values.push_back(*v); v = nullptr; } public: JSONListState(std::unique_ptr<JSONState> && p, std::size_t reserve) : JSONState(std::move(p)) { values.reserve(reserve); } }; EvalState & state; std::unique_ptr<JSONState> rs; public: JSONSax(EvalState & state, Value & v) : state(state), rs(new JSONState(&v)) {}; bool null() override { rs->value(state).mkNull(); rs->add(); return true; } bool boolean(bool val) override { rs->value(state).mkBool(val); rs->add(); return true; } bool number_integer(number_integer_t val) override { rs->value(state).mkInt(val); rs->add(); return true; } bool number_unsigned(number_unsigned_t val_) override { if (val_ > std::numeric_limits<NixInt::Inner>::max()) { throw Error("unsigned json number %1% outside of Nix integer range", val_); } NixInt::Inner val = val_; rs->value(state).mkInt(val); rs->add(); return true; } bool number_float(number_float_t val, const string_t & s) override { rs->value(state).mkFloat(val); rs->add(); return true; } bool string(string_t & val) override { rs->value(state).mkString(val); rs->add(); return true; } #if NLOHMANN_JSON_VERSION_MAJOR >= 3 && NLOHMANN_JSON_VERSION_MINOR >= 8 bool binary(binary_t&) override { // This function ought to be unreachable assert(false); return true; } #endif bool start_object(std::size_t len) override { rs = std::make_unique<JSONObjectState>(std::move(rs)); return true; } bool key(string_t & name) override { dynamic_cast<JSONObjectState*>(rs.get())->key(name, state); return true; } bool end_object() override { rs = rs->resolve(state); rs->add(); return true; } bool end_array() override { return end_object(); } bool start_array(size_t len) override { rs = std::make_unique<JSONListState>(std::move(rs), len != std::numeric_limits<size_t>::max() ? len : 128); return true; } bool parse_error(std::size_t, const std::string&, const nlohmann::detail::exception& ex) override { throw JSONParseError("%s", ex.what()); } }; void parseJSON(EvalState & state, const std::string_view & s_, Value & v) { JSONSax parser(state, v); bool res = json::sax_parse(s_, &parser); if (!res) throw JSONParseError("Invalid JSON Value"); } }
4,823
C++
.cc
157
23.254777
103
0.578721
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
11,009
attr-set.cc
NixOS_nix/src/libexpr/attr-set.cc
#include "attr-set.hh" #include "eval-inline.hh" #include <algorithm> namespace nix { /* Allocate a new array of attributes for an attribute set with a specific capacity. The space is implicitly reserved after the Bindings structure. */ Bindings * EvalState::allocBindings(size_t capacity) { if (capacity == 0) return &emptyBindings; if (capacity > std::numeric_limits<Bindings::size_t>::max()) throw Error("attribute set of size %d is too big", capacity); nrAttrsets++; nrAttrsInAttrsets += capacity; return new (allocBytes(sizeof(Bindings) + sizeof(Attr) * capacity)) Bindings((Bindings::size_t) capacity); } Value & BindingsBuilder::alloc(Symbol name, PosIdx pos) { auto value = state.allocValue(); bindings->push_back(Attr(name, value, pos)); return *value; } Value & BindingsBuilder::alloc(std::string_view name, PosIdx pos) { return alloc(state.symbols.create(name), pos); } void Bindings::sort() { if (size_) std::sort(begin(), end()); } Value & Value::mkAttrs(BindingsBuilder & bindings) { mkAttrs(bindings.finish()); return *this; } }
1,130
C++
.cc
37
27.216216
110
0.709378
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
11,010
print.cc
NixOS_nix/src/libexpr/print.cc
#include <limits> #include <unordered_set> #include <sstream> #include "print.hh" #include "ansicolor.hh" #include "signals.hh" #include "store-api.hh" #include "terminal.hh" #include "english.hh" #include "eval.hh" namespace nix { void printElided( std::ostream & output, unsigned int value, const std::string_view single, const std::string_view plural, bool ansiColors) { if (ansiColors) output << ANSI_FAINT; output << "«"; pluralize(output, value, single, plural); output << " elided»"; if (ansiColors) output << ANSI_NORMAL; } std::ostream & printLiteralString(std::ostream & str, const std::string_view string, size_t maxLength, bool ansiColors) { size_t charsPrinted = 0; if (ansiColors) str << ANSI_MAGENTA; str << "\""; for (auto i = string.begin(); i != string.end(); ++i) { if (charsPrinted >= maxLength) { str << "\" "; printElided(str, string.length() - charsPrinted, "byte", "bytes", ansiColors); return str; } if (*i == '\"' || *i == '\\') str << "\\" << *i; else if (*i == '\n') str << "\\n"; else if (*i == '\r') str << "\\r"; else if (*i == '\t') str << "\\t"; else if (*i == '$' && *(i+1) == '{') str << "\\" << *i; else str << *i; charsPrinted++; } str << "\""; if (ansiColors) str << ANSI_NORMAL; return str; } std::ostream & printLiteralString(std::ostream & str, const std::string_view string) { return printLiteralString(str, string, std::numeric_limits<size_t>::max(), false); } std::ostream & printLiteralBool(std::ostream & str, bool boolean) { str << (boolean ? "true" : "false"); return str; } // Returns `true' is a string is a reserved keyword which requires quotation // when printing attribute set field names. // // This list should generally be kept in sync with `./lexer.l'. // You can test if a keyword needs to be added by running: // $ nix eval --expr '{ <KEYWORD> = 1; }' // For example `or' doesn't need to be quoted. bool isReservedKeyword(const std::string_view str) { static const std::unordered_set<std::string_view> reservedKeywords = { "if", "then", "else", "assert", "with", "let", "in", "rec", "inherit" }; return reservedKeywords.contains(str); } std::ostream & printIdentifier(std::ostream & str, std::string_view s) { if (s.empty()) str << "\"\""; else if (isReservedKeyword(s)) str << '"' << s << '"'; else { char c = s[0]; if (!((c >= 'a' && c <= 'z') || (c >= 'A' && c <= 'Z') || c == '_')) { printLiteralString(str, s); return str; } for (auto c : s) if (!((c >= 'a' && c <= 'z') || (c >= 'A' && c <= 'Z') || (c >= '0' && c <= '9') || c == '_' || c == '\'' || c == '-')) { printLiteralString(str, s); return str; } str << s; } return str; } static bool isVarName(std::string_view s) { if (s.size() == 0) return false; if (isReservedKeyword(s)) return false; char c = s[0]; if ((c >= '0' && c <= '9') || c == '-' || c == '\'') return false; for (auto & i : s) if (!((i >= 'a' && i <= 'z') || (i >= 'A' && i <= 'Z') || (i >= '0' && i <= '9') || i == '_' || i == '-' || i == '\'')) return false; return true; } std::ostream & printAttributeName(std::ostream & str, std::string_view name) { if (isVarName(name)) str << name; else printLiteralString(str, name); return str; } bool isImportantAttrName(const std::string& attrName) { return attrName == "type" || attrName == "_type"; } typedef std::pair<std::string, Value *> AttrPair; struct ImportantFirstAttrNameCmp { bool operator()(const AttrPair& lhs, const AttrPair& rhs) const { auto lhsIsImportant = isImportantAttrName(lhs.first); auto rhsIsImportant = isImportantAttrName(rhs.first); return std::forward_as_tuple(!lhsIsImportant, lhs.first) < std::forward_as_tuple(!rhsIsImportant, rhs.first); } }; typedef std::set<const void *> ValuesSeen; typedef std::vector<std::pair<std::string, Value *>> AttrVec; class Printer { private: std::ostream & output; EvalState & state; PrintOptions options; std::optional<ValuesSeen> seen; size_t totalAttrsPrinted = 0; size_t totalListItemsPrinted = 0; std::string indent; void increaseIndent() { if (options.shouldPrettyPrint()) { indent.append(options.prettyIndent, ' '); } } void decreaseIndent() { if (options.shouldPrettyPrint()) { assert(indent.size() >= options.prettyIndent); indent.resize(indent.size() - options.prettyIndent); } } /** * Print a space (for separating items or attributes). * * If pretty-printing is enabled, a newline and the current `indent` is * printed instead. */ void printSpace(bool prettyPrint) { if (prettyPrint) { output << "\n" << indent; } else { output << " "; } } void printRepeated() { if (options.ansiColors) output << ANSI_MAGENTA; output << "«repeated»"; if (options.ansiColors) output << ANSI_NORMAL; } void printNullptr() { if (options.ansiColors) output << ANSI_MAGENTA; output << "«nullptr»"; if (options.ansiColors) output << ANSI_NORMAL; } void printElided(unsigned int value, const std::string_view single, const std::string_view plural) { ::nix::printElided(output, value, single, plural, options.ansiColors); } void printInt(Value & v) { if (options.ansiColors) output << ANSI_CYAN; output << v.integer(); if (options.ansiColors) output << ANSI_NORMAL; } void printFloat(Value & v) { if (options.ansiColors) output << ANSI_CYAN; output << v.fpoint(); if (options.ansiColors) output << ANSI_NORMAL; } void printBool(Value & v) { if (options.ansiColors) output << ANSI_CYAN; printLiteralBool(output, v.boolean()); if (options.ansiColors) output << ANSI_NORMAL; } void printString(Value & v) { printLiteralString(output, v.string_view(), options.maxStringLength, options.ansiColors); } void printPath(Value & v) { if (options.ansiColors) output << ANSI_GREEN; output << v.path().to_string(); // !!! escaping? if (options.ansiColors) output << ANSI_NORMAL; } void printNull() { if (options.ansiColors) output << ANSI_CYAN; output << "null"; if (options.ansiColors) output << ANSI_NORMAL; } void printDerivation(Value & v) { std::optional<StorePath> storePath; if (auto i = v.attrs()->get(state.sDrvPath)) { NixStringContext context; storePath = state.coerceToStorePath(i->pos, *i->value, context, "while evaluating the drvPath of a derivation"); } /* This unfortunately breaks printing nested values because of how the pretty printer is used (when pretting printing and warning to same terminal / std stream). */ #if 0 if (storePath && !storePath->isDerivation()) warn( "drvPath attribute '%s' is not a valid store path to a derivation, this value not work properly", state.store->printStorePath(*storePath)); #endif if (options.ansiColors) output << ANSI_GREEN; output << "«derivation"; if (storePath) { output << " " << state.store->printStorePath(*storePath); } output << "»"; if (options.ansiColors) output << ANSI_NORMAL; } /** * @note This may force items. */ bool shouldPrettyPrintAttrs(AttrVec & v) { if (!options.shouldPrettyPrint() || v.empty()) { return false; } // Pretty-print attrsets with more than one item. if (v.size() > 1) { return true; } auto item = v[0].second; if (!item) { return true; } // It is ok to force the item(s) here, because they will be printed anyway. state.forceValue(*item, item->determinePos(noPos)); // Pretty-print single-item attrsets only if they contain nested // structures. auto itemType = item->type(); return itemType == nList || itemType == nAttrs || itemType == nThunk; } void printAttrs(Value & v, size_t depth) { if (seen && !seen->insert(v.attrs()).second) { printRepeated(); return; } if (options.force && options.derivationPaths && state.isDerivation(v)) { printDerivation(v); } else if (depth < options.maxDepth) { increaseIndent(); output << "{"; AttrVec sorted; for (auto & i : *v.attrs()) sorted.emplace_back(std::pair(state.symbols[i.name], i.value)); if (options.maxAttrs == std::numeric_limits<size_t>::max()) std::sort(sorted.begin(), sorted.end()); else std::sort(sorted.begin(), sorted.end(), ImportantFirstAttrNameCmp()); auto prettyPrint = shouldPrettyPrintAttrs(sorted); size_t currentAttrsPrinted = 0; for (auto & i : sorted) { printSpace(prettyPrint); if (totalAttrsPrinted >= options.maxAttrs) { printElided(sorted.size() - currentAttrsPrinted, "attribute", "attributes"); break; } printAttributeName(output, i.first); output << " = "; print(*i.second, depth + 1); output << ";"; totalAttrsPrinted++; currentAttrsPrinted++; } decreaseIndent(); printSpace(prettyPrint); output << "}"; } else { output << "{ ... }"; } } /** * @note This may force items. */ bool shouldPrettyPrintList(std::span<Value * const> list) { if (!options.shouldPrettyPrint() || list.empty()) { return false; } // Pretty-print lists with more than one item. if (list.size() > 1) { return true; } auto item = list[0]; if (!item) { return true; } // It is ok to force the item(s) here, because they will be printed anyway. state.forceValue(*item, item->determinePos(noPos)); // Pretty-print single-item lists only if they contain nested // structures. auto itemType = item->type(); return itemType == nList || itemType == nAttrs || itemType == nThunk; } void printList(Value & v, size_t depth) { if (seen && v.listSize() && !seen->insert(&v).second) { printRepeated(); return; } if (depth < options.maxDepth) { increaseIndent(); output << "["; auto listItems = v.listItems(); auto prettyPrint = shouldPrettyPrintList(listItems); size_t currentListItemsPrinted = 0; for (auto elem : listItems) { printSpace(prettyPrint); if (totalListItemsPrinted >= options.maxListItems) { printElided(listItems.size() - currentListItemsPrinted, "item", "items"); break; } if (elem) { print(*elem, depth + 1); } else { printNullptr(); } totalListItemsPrinted++; currentListItemsPrinted++; } decreaseIndent(); printSpace(prettyPrint); output << "]"; } else { output << "[ ... ]"; } } void printFunction(Value & v) { if (options.ansiColors) output << ANSI_BLUE; output << "«"; if (v.isLambda()) { output << "lambda"; if (v.payload.lambda.fun) { if (v.payload.lambda.fun->name) { output << " " << state.symbols[v.payload.lambda.fun->name]; } std::ostringstream s; s << state.positions[v.payload.lambda.fun->pos]; output << " @ " << filterANSIEscapes(toView(s)); } } else if (v.isPrimOp()) { if (v.primOp()) output << *v.primOp(); else output << "primop"; } else if (v.isPrimOpApp()) { output << "partially applied "; auto primOp = v.primOpAppPrimOp(); if (primOp) output << *primOp; else output << "primop"; } else { unreachable(); } output << "»"; if (options.ansiColors) output << ANSI_NORMAL; } void printThunk(Value & v) { if (v.isBlackhole()) { // Although we know for sure that it's going to be an infinite recursion // when this value is accessed _in the current context_, it's likely // that the user will misinterpret a simpler «infinite recursion» output // as a definitive statement about the value, while in fact it may be // a valid value after `builtins.trace` and perhaps some other steps // have completed. if (options.ansiColors) output << ANSI_RED; output << "«potential infinite recursion»"; if (options.ansiColors) output << ANSI_NORMAL; } else if (v.isThunk() || v.isApp()) { if (options.ansiColors) output << ANSI_MAGENTA; output << "«thunk»"; if (options.ansiColors) output << ANSI_NORMAL; } else { unreachable(); } } void printExternal(Value & v) { v.external()->print(output); } void printUnknown() { if (options.ansiColors) output << ANSI_RED; output << "«unknown»"; if (options.ansiColors) output << ANSI_NORMAL; } void printError_(Error & e) { if (options.ansiColors) output << ANSI_RED; output << "«error: " << filterANSIEscapes(e.info().msg.str(), true) << "»"; if (options.ansiColors) output << ANSI_NORMAL; } void print(Value & v, size_t depth) { output.flush(); checkInterrupt(); try { if (options.force) { state.forceValue(v, v.determinePos(noPos)); } switch (v.type()) { case nInt: printInt(v); break; case nFloat: printFloat(v); break; case nBool: printBool(v); break; case nString: printString(v); break; case nPath: printPath(v); break; case nNull: printNull(); break; case nAttrs: printAttrs(v, depth); break; case nList: printList(v, depth); break; case nFunction: printFunction(v); break; case nThunk: printThunk(v); break; case nExternal: printExternal(v); break; default: printUnknown(); break; } } catch (Error & e) { if (options.errors == ErrorPrintBehavior::Throw || (options.errors == ErrorPrintBehavior::ThrowTopLevel && depth == 0)) { throw; } printError_(e); } } public: Printer(std::ostream & output, EvalState & state, PrintOptions options) : output(output), state(state), options(options) { } void print(Value & v) { totalAttrsPrinted = 0; totalListItemsPrinted = 0; indent.clear(); if (options.trackRepeated) { seen.emplace(); } else { seen.reset(); } ValuesSeen seen; print(v, 0); } }; void printValue(EvalState & state, std::ostream & output, Value & v, PrintOptions options) { Printer(output, state, options).print(v); } std::ostream & operator<<(std::ostream & output, const ValuePrinter & printer) { printValue(printer.state, output, printer.value, printer.options); return output; } template<> HintFmt & HintFmt::operator%(const ValuePrinter & value) { fmt % value; return *this; } }
17,523
C++
.cc
552
22.480072
124
0.520996
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,011
get-drvs.cc
NixOS_nix/src/libexpr/get-drvs.cc
#include "get-drvs.hh" #include "eval-inline.hh" #include "derivations.hh" #include "store-api.hh" #include "path-with-outputs.hh" #include <cstring> #include <regex> namespace nix { PackageInfo::PackageInfo(EvalState & state, std::string attrPath, const Bindings * attrs) : state(&state), attrs(attrs), attrPath(std::move(attrPath)) { } PackageInfo::PackageInfo(EvalState & state, ref<Store> store, const std::string & drvPathWithOutputs) : state(&state), attrs(nullptr), attrPath("") { auto [drvPath, selectedOutputs] = parsePathWithOutputs(*store, drvPathWithOutputs); this->drvPath = drvPath; auto drv = store->derivationFromPath(drvPath); name = drvPath.name(); if (selectedOutputs.size() > 1) throw Error("building more than one derivation output is not supported, in '%s'", drvPathWithOutputs); outputName = selectedOutputs.empty() ? getOr(drv.env, "outputName", "out") : *selectedOutputs.begin(); auto i = drv.outputs.find(outputName); if (i == drv.outputs.end()) throw Error("derivation '%s' does not have output '%s'", store->printStorePath(drvPath), outputName); auto & [outputName, output] = *i; outPath = {output.path(*store, drv.name, outputName)}; } std::string PackageInfo::queryName() const { if (name == "" && attrs) { auto i = attrs->find(state->sName); if (i == attrs->end()) state->error<TypeError>("derivation name missing").debugThrow(); name = state->forceStringNoCtx(*i->value, noPos, "while evaluating the 'name' attribute of a derivation"); } return name; } std::string PackageInfo::querySystem() const { if (system == "" && attrs) { auto i = attrs->find(state->sSystem); system = i == attrs->end() ? "unknown" : state->forceStringNoCtx(*i->value, i->pos, "while evaluating the 'system' attribute of a derivation"); } return system; } std::optional<StorePath> PackageInfo::queryDrvPath() const { if (!drvPath && attrs) { if (auto i = attrs->get(state->sDrvPath)) { NixStringContext context; auto found = state->coerceToStorePath(i->pos, *i->value, context, "while evaluating the 'drvPath' attribute of a derivation"); try { found.requireDerivation(); } catch (Error & e) { e.addTrace(state->positions[i->pos], "while evaluating the 'drvPath' attribute of a derivation"); throw; } drvPath = {std::move(found)}; } else drvPath = {std::nullopt}; } return drvPath.value_or(std::nullopt); } StorePath PackageInfo::requireDrvPath() const { if (auto drvPath = queryDrvPath()) return *drvPath; throw Error("derivation does not contain a 'drvPath' attribute"); } StorePath PackageInfo::queryOutPath() const { if (!outPath && attrs) { auto i = attrs->find(state->sOutPath); NixStringContext context; if (i != attrs->end()) outPath = state->coerceToStorePath(i->pos, *i->value, context, "while evaluating the output path of a derivation"); } if (!outPath) throw UnimplementedError("CA derivations are not yet supported"); return *outPath; } PackageInfo::Outputs PackageInfo::queryOutputs(bool withPaths, bool onlyOutputsToInstall) { if (outputs.empty()) { /* Get the ‘outputs’ list. */ const Attr * i; if (attrs && (i = attrs->get(state->sOutputs))) { state->forceList(*i->value, i->pos, "while evaluating the 'outputs' attribute of a derivation"); /* For each output... */ for (auto elem : i->value->listItems()) { std::string output(state->forceStringNoCtx(*elem, i->pos, "while evaluating the name of an output of a derivation")); if (withPaths) { /* Evaluate the corresponding set. */ auto out = attrs->get(state->symbols.create(output)); if (!out) continue; // FIXME: throw error? state->forceAttrs(*out->value, i->pos, "while evaluating an output of a derivation"); /* And evaluate its ‘outPath’ attribute. */ auto outPath = out->value->attrs()->get(state->sOutPath); if (!outPath) continue; // FIXME: throw error? NixStringContext context; outputs.emplace(output, state->coerceToStorePath(outPath->pos, *outPath->value, context, "while evaluating an output path of a derivation")); } else outputs.emplace(output, std::nullopt); } } else outputs.emplace("out", withPaths ? std::optional{queryOutPath()} : std::nullopt); } if (!onlyOutputsToInstall || !attrs) return outputs; const Attr * i; if (attrs && (i = attrs->get(state->sOutputSpecified)) && state->forceBool(*i->value, i->pos, "while evaluating the 'outputSpecified' attribute of a derivation")) { Outputs result; auto out = outputs.find(queryOutputName()); if (out == outputs.end()) throw Error("derivation does not have output '%s'", queryOutputName()); result.insert(*out); return result; } else { /* Check for `meta.outputsToInstall` and return `outputs` reduced to that. */ const Value * outTI = queryMeta("outputsToInstall"); if (!outTI) return outputs; auto errMsg = Error("this derivation has bad 'meta.outputsToInstall'"); /* ^ this shows during `nix-env -i` right under the bad derivation */ if (!outTI->isList()) throw errMsg; Outputs result; for (auto elem : outTI->listItems()) { if (elem->type() != nString) throw errMsg; auto out = outputs.find(elem->c_str()); if (out == outputs.end()) throw errMsg; result.insert(*out); } return result; } } std::string PackageInfo::queryOutputName() const { if (outputName == "" && attrs) { auto i = attrs->get(state->sOutputName); outputName = i ? state->forceStringNoCtx(*i->value, noPos, "while evaluating the output name of a derivation") : ""; } return outputName; } const Bindings * PackageInfo::getMeta() { if (meta) return meta; if (!attrs) return 0; auto a = attrs->get(state->sMeta); if (!a) return 0; state->forceAttrs(*a->value, a->pos, "while evaluating the 'meta' attribute of a derivation"); meta = a->value->attrs(); return meta; } StringSet PackageInfo::queryMetaNames() { StringSet res; if (!getMeta()) return res; for (auto & i : *meta) res.emplace(state->symbols[i.name]); return res; } bool PackageInfo::checkMeta(Value & v) { state->forceValue(v, v.determinePos(noPos)); if (v.type() == nList) { for (auto elem : v.listItems()) if (!checkMeta(*elem)) return false; return true; } else if (v.type() == nAttrs) { if (v.attrs()->get(state->sOutPath)) return false; for (auto & i : *v.attrs()) if (!checkMeta(*i.value)) return false; return true; } else return v.type() == nInt || v.type() == nBool || v.type() == nString || v.type() == nFloat; } Value * PackageInfo::queryMeta(const std::string & name) { if (!getMeta()) return 0; auto a = meta->get(state->symbols.create(name)); if (!a || !checkMeta(*a->value)) return 0; return a->value; } std::string PackageInfo::queryMetaString(const std::string & name) { Value * v = queryMeta(name); if (!v || v->type() != nString) return ""; return v->c_str(); } NixInt PackageInfo::queryMetaInt(const std::string & name, NixInt def) { Value * v = queryMeta(name); if (!v) return def; if (v->type() == nInt) return v->integer(); if (v->type() == nString) { /* Backwards compatibility with before we had support for integer meta fields. */ if (auto n = string2Int<NixInt::Inner>(v->c_str())) return NixInt{*n}; } return def; } NixFloat PackageInfo::queryMetaFloat(const std::string & name, NixFloat def) { Value * v = queryMeta(name); if (!v) return def; if (v->type() == nFloat) return v->fpoint(); if (v->type() == nString) { /* Backwards compatibility with before we had support for float meta fields. */ if (auto n = string2Float<NixFloat>(v->c_str())) return *n; } return def; } bool PackageInfo::queryMetaBool(const std::string & name, bool def) { Value * v = queryMeta(name); if (!v) return def; if (v->type() == nBool) return v->boolean(); if (v->type() == nString) { /* Backwards compatibility with before we had support for Boolean meta fields. */ if (v->string_view() == "true") return true; if (v->string_view() == "false") return false; } return def; } void PackageInfo::setMeta(const std::string & name, Value * v) { getMeta(); auto attrs = state->buildBindings(1 + (meta ? meta->size() : 0)); auto sym = state->symbols.create(name); if (meta) for (auto i : *meta) if (i.name != sym) attrs.insert(i); if (v) attrs.insert(sym, v); meta = attrs.finish(); } /* Cache for already considered attrsets. */ typedef std::set<const Bindings *> Done; /* Evaluate value `v'. If it evaluates to a set of type `derivation', then put information about it in `drvs' (unless it's already in `done'). The result boolean indicates whether it makes sense for the caller to recursively search for derivations in `v'. */ static bool getDerivation(EvalState & state, Value & v, const std::string & attrPath, PackageInfos & drvs, Done & done, bool ignoreAssertionFailures) { try { state.forceValue(v, v.determinePos(noPos)); if (!state.isDerivation(v)) return true; /* Remove spurious duplicates (e.g., a set like `rec { x = derivation {...}; y = x;}'. */ if (!done.insert(v.attrs()).second) return false; PackageInfo drv(state, attrPath, v.attrs()); drv.queryName(); drvs.push_back(drv); return false; } catch (AssertionError & e) { if (ignoreAssertionFailures) return false; throw; } } std::optional<PackageInfo> getDerivation(EvalState & state, Value & v, bool ignoreAssertionFailures) { Done done; PackageInfos drvs; getDerivation(state, v, "", drvs, done, ignoreAssertionFailures); if (drvs.size() != 1) return {}; return std::move(drvs.front()); } static std::string addToPath(const std::string & s1, std::string_view s2) { return s1.empty() ? std::string(s2) : s1 + "." + s2; } static std::regex attrRegex("[A-Za-z_][A-Za-z0-9-_+]*"); static void getDerivations(EvalState & state, Value & vIn, const std::string & pathPrefix, Bindings & autoArgs, PackageInfos & drvs, Done & done, bool ignoreAssertionFailures) { Value v; state.autoCallFunction(autoArgs, vIn, v); /* Process the expression. */ if (!getDerivation(state, v, pathPrefix, drvs, done, ignoreAssertionFailures)) ; else if (v.type() == nAttrs) { /* !!! undocumented hackery to support combining channels in nix-env.cc. */ bool combineChannels = v.attrs()->get(state.symbols.create("_combineChannels")); /* Consider the attributes in sorted order to get more deterministic behaviour in nix-env operations (e.g. when there are names clashes between derivations, the derivation bound to the attribute with the "lower" name should take precedence). */ for (auto & i : v.attrs()->lexicographicOrder(state.symbols)) { std::string_view symbol{state.symbols[i->name]}; try { debug("evaluating attribute '%1%'", symbol); if (!std::regex_match(symbol.begin(), symbol.end(), attrRegex)) continue; std::string pathPrefix2 = addToPath(pathPrefix, symbol); if (combineChannels) getDerivations(state, *i->value, pathPrefix2, autoArgs, drvs, done, ignoreAssertionFailures); else if (getDerivation(state, *i->value, pathPrefix2, drvs, done, ignoreAssertionFailures)) { /* If the value of this attribute is itself a set, should we recurse into it? => Only if it has a `recurseForDerivations = true' attribute. */ if (i->value->type() == nAttrs) { auto j = i->value->attrs()->get(state.sRecurseForDerivations); if (j && state.forceBool(*j->value, j->pos, "while evaluating the attribute `recurseForDerivations`")) getDerivations(state, *i->value, pathPrefix2, autoArgs, drvs, done, ignoreAssertionFailures); } } } catch (Error & e) { e.addTrace(state.positions[i->pos], "while evaluating the attribute '%s'", symbol); throw; } } } else if (v.type() == nList) { for (auto [n, elem] : enumerate(v.listItems())) { std::string pathPrefix2 = addToPath(pathPrefix, fmt("%d", n)); if (getDerivation(state, *elem, pathPrefix2, drvs, done, ignoreAssertionFailures)) getDerivations(state, *elem, pathPrefix2, autoArgs, drvs, done, ignoreAssertionFailures); } } else state.error<TypeError>("expression does not evaluate to a derivation (or a set or list of those)").debugThrow(); } void getDerivations(EvalState & state, Value & v, const std::string & pathPrefix, Bindings & autoArgs, PackageInfos & drvs, bool ignoreAssertionFailures) { Done done; getDerivations(state, v, pathPrefix, autoArgs, drvs, done, ignoreAssertionFailures); } }
14,113
C++
.cc
344
33.47093
168
0.613361
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,012
eval-gc.cc
NixOS_nix/src/libexpr/eval-gc.cc
#include "error.hh" #include "environment-variables.hh" #include "eval-settings.hh" #include "config-global.hh" #include "serialise.hh" #include "eval-gc.hh" #if HAVE_BOEHMGC # include <pthread.h> # if __FreeBSD__ # include <pthread_np.h> # endif # include <gc/gc.h> # include <gc/gc_cpp.h> # include <gc/gc_allocator.h> # include <boost/coroutine2/coroutine.hpp> # include <boost/coroutine2/protected_fixedsize_stack.hpp> # include <boost/context/stack_context.hpp> #endif namespace nix { #if HAVE_BOEHMGC /* Called when the Boehm GC runs out of memory. */ static void * oomHandler(size_t requested) { /* Convert this to a proper C++ exception. */ throw std::bad_alloc(); } static inline void initGCReal() { /* Initialise the Boehm garbage collector. */ /* Don't look for interior pointers. This reduces the odds of misdetection a bit. */ GC_set_all_interior_pointers(0); /* We don't have any roots in data segments, so don't scan from there. */ GC_set_no_dls(1); /* Enable perf measurements. This is just a setting; not much of a start of something. */ GC_start_performance_measurement(); GC_INIT(); GC_set_oom_fn(oomHandler); /* Set the initial heap size to something fairly big (25% of physical RAM, up to a maximum of 384 MiB) so that in most cases we don't need to garbage collect at all. (Collection has a fairly significant overhead.) The heap size can be overridden through libgc's GC_INITIAL_HEAP_SIZE environment variable. We should probably also provide a nix.conf setting for this. Note that GC_expand_hp() causes a lot of virtual, but not physical (resident) memory to be allocated. This might be a problem on systems that don't overcommit. */ if (!getEnv("GC_INITIAL_HEAP_SIZE")) { size_t size = 32 * 1024 * 1024; # if HAVE_SYSCONF && defined(_SC_PAGESIZE) && defined(_SC_PHYS_PAGES) size_t maxSize = 384 * 1024 * 1024; long pageSize = sysconf(_SC_PAGESIZE); long pages = sysconf(_SC_PHYS_PAGES); if (pageSize != -1) size = (pageSize * pages) / 4; // 25% of RAM if (size > maxSize) size = maxSize; # endif debug("setting initial heap size to %1% bytes", size); GC_expand_hp(size); } } static size_t gcCyclesAfterInit = 0; size_t getGCCycles() { assertGCInitialized(); return static_cast<size_t>(GC_get_gc_no()) - gcCyclesAfterInit; } #endif static bool gcInitialised = false; void initGC() { if (gcInitialised) return; #if HAVE_BOEHMGC initGCReal(); gcCyclesAfterInit = GC_get_gc_no(); #endif // NIX_PATH must override the regular setting // See the comment in applyConfig if (auto nixPathEnv = getEnv("NIX_PATH")) { globalConfig.set("nix-path", concatStringsSep(" ", EvalSettings::parseNixPath(nixPathEnv.value()))); } gcInitialised = true; } void assertGCInitialized() { assert(gcInitialised); } } // namespace nix
3,057
C++
.cc
92
28.902174
108
0.67517
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,013
eval-error.cc
NixOS_nix/src/libexpr/eval-error.cc
#include "eval-error.hh" #include "eval.hh" #include "value.hh" namespace nix { template<class T> EvalErrorBuilder<T> & EvalErrorBuilder<T>::withExitStatus(unsigned int exitStatus) { error.withExitStatus(exitStatus); return *this; } template<class T> EvalErrorBuilder<T> & EvalErrorBuilder<T>::atPos(PosIdx pos) { error.err.pos = error.state.positions[pos]; return *this; } template<class T> EvalErrorBuilder<T> & EvalErrorBuilder<T>::atPos(Value & value, PosIdx fallback) { return atPos(value.determinePos(fallback)); } template<class T> EvalErrorBuilder<T> & EvalErrorBuilder<T>::withTrace(PosIdx pos, const std::string_view text) { error.addTrace(error.state.positions[pos], text); return *this; } template<class T> EvalErrorBuilder<T> & EvalErrorBuilder<T>::withSuggestions(Suggestions & s) { error.err.suggestions = s; return *this; } template<class T> EvalErrorBuilder<T> & EvalErrorBuilder<T>::withFrame(const Env & env, const Expr & expr) { // NOTE: This is abusing side-effects. // TODO: check compatibility with nested debugger calls. // TODO: What side-effects?? error.state.debugTraces.push_front(DebugTrace{ .pos = error.state.positions[expr.getPos()], .expr = expr, .env = env, .hint = HintFmt("Fake frame for debugging purposes"), .isError = true}); return *this; } template<class T> EvalErrorBuilder<T> & EvalErrorBuilder<T>::addTrace(PosIdx pos, HintFmt hint) { error.addTrace(error.state.positions[pos], hint); return *this; } template<class T> template<typename... Args> EvalErrorBuilder<T> & EvalErrorBuilder<T>::addTrace(PosIdx pos, std::string_view formatString, const Args &... formatArgs) { addTrace(error.state.positions[pos], HintFmt(std::string(formatString), formatArgs...)); return *this; } template<class T> EvalErrorBuilder<T> & EvalErrorBuilder<T>::setIsFromExpr() { error.err.isFromExpr = true; return *this; } template<class T> void EvalErrorBuilder<T>::debugThrow() { error.state.runDebugRepl(&error); // `EvalState` is the only class that can construct an `EvalErrorBuilder`, // and it does so in dynamic storage. This is the final method called on // any such instance and must delete itself before throwing the underlying // error. auto error = std::move(this->error); delete this; throw error; } template<class T> void EvalErrorBuilder<T>::panic() { logError(error.info()); printError("This is a bug! An unexpected condition occurred, causing the Nix evaluator to have to stop. If you could share a reproducible example or a core dump, please open an issue at https://github.com/NixOS/nix/issues"); abort(); } template class EvalErrorBuilder<EvalBaseError>; template class EvalErrorBuilder<EvalError>; template class EvalErrorBuilder<AssertionError>; template class EvalErrorBuilder<ThrownError>; template class EvalErrorBuilder<Abort>; template class EvalErrorBuilder<TypeError>; template class EvalErrorBuilder<UndefinedVarError>; template class EvalErrorBuilder<MissingArgumentError>; template class EvalErrorBuilder<InfiniteRecursionError>; template class EvalErrorBuilder<InvalidPathError>; }
3,218
C++
.cc
97
30.309278
228
0.754832
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,014
paths.cc
NixOS_nix/src/libexpr/paths.cc
#include "eval.hh" namespace nix { SourcePath EvalState::rootPath(CanonPath path) { return {rootFS, std::move(path)}; } SourcePath EvalState::rootPath(PathView path) { return {rootFS, CanonPath(absPath(path))}; } }
227
C++
.cc
11
18.545455
46
0.75
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,015
eval-settings.cc
NixOS_nix/src/libexpr/eval-settings.cc
#include "users.hh" #include "globals.hh" #include "profiles.hh" #include "eval.hh" #include "eval-settings.hh" namespace nix { /* Very hacky way to parse $NIX_PATH, which is colon-separated, but can contain URLs (e.g. "nixpkgs=https://bla...:foo=https://"). */ Strings EvalSettings::parseNixPath(const std::string & s) { Strings res; auto p = s.begin(); while (p != s.end()) { auto start = p; auto start2 = p; while (p != s.end() && *p != ':') { if (*p == '=') start2 = p + 1; ++p; } if (p == s.end()) { if (p != start) res.push_back(std::string(start, p)); break; } if (*p == ':') { auto prefix = std::string(start2, s.end()); if (EvalSettings::isPseudoUrl(prefix) || hasPrefix(prefix, "flake:")) { ++p; while (p != s.end() && *p != ':') ++p; } res.push_back(std::string(start, p)); if (p == s.end()) break; } ++p; } return res; } EvalSettings::EvalSettings(bool & readOnlyMode, EvalSettings::LookupPathHooks lookupPathHooks) : readOnlyMode{readOnlyMode} , lookupPathHooks{lookupPathHooks} { auto var = getEnv("NIX_ABORT_ON_WARN"); if (var && (var == "1" || var == "yes" || var == "true")) builtinsAbortOnWarn = true; } Strings EvalSettings::getDefaultNixPath() { Strings res; auto add = [&](const Path & p, const std::string & s = std::string()) { if (pathAccessible(p)) { if (s.empty()) { res.push_back(p); } else { res.push_back(s + "=" + p); } } }; add(getNixDefExpr() + "/channels"); add(rootChannelsDir() + "/nixpkgs", "nixpkgs"); add(rootChannelsDir()); return res; } bool EvalSettings::isPseudoUrl(std::string_view s) { if (s.compare(0, 8, "channel:") == 0) return true; size_t pos = s.find("://"); if (pos == std::string::npos) return false; std::string scheme(s, 0, pos); return scheme == "http" || scheme == "https" || scheme == "file" || scheme == "channel" || scheme == "git" || scheme == "s3" || scheme == "ssh"; } std::string EvalSettings::resolvePseudoUrl(std::string_view url) { if (hasPrefix(url, "channel:")) return "https://nixos.org/channels/" + std::string(url.substr(8)) + "/nixexprs.tar.xz"; else return std::string(url); } const std::string & EvalSettings::getCurrentSystem() const { const auto & evalSystem = currentSystem.get(); return evalSystem != "" ? evalSystem : settings.thisSystem.get(); } Path getNixDefExpr() { return settings.useXDGBaseDirectories ? getStateDir() + "/defexpr" : getHome() + "/.nix-defexpr"; } }
2,812
C++
.cc
88
25.715909
148
0.556171
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,016
eval.cc
NixOS_nix/src/libexpr/eval.cc
#include "eval.hh" #include "eval-settings.hh" #include "primops.hh" #include "print-options.hh" #include "exit.hh" #include "types.hh" #include "util.hh" #include "store-api.hh" #include "derivations.hh" #include "downstream-placeholder.hh" #include "eval-inline.hh" #include "filetransfer.hh" #include "function-trace.hh" #include "profiles.hh" #include "print.hh" #include "filtering-source-accessor.hh" #include "memory-source-accessor.hh" #include "gc-small-vector.hh" #include "url.hh" #include "fetch-to-store.hh" #include "tarball.hh" #include "parser-tab.hh" #include <algorithm> #include <iostream> #include <sstream> #include <cstring> #include <optional> #include <unistd.h> #include <sys/time.h> #include <fstream> #include <functional> #include <nlohmann/json.hpp> #include <boost/container/small_vector.hpp> #ifndef _WIN32 // TODO use portable implementation # include <sys/resource.h> #endif #include "strings-inline.hh" using json = nlohmann::json; namespace nix { static char * allocString(size_t size) { char * t; t = (char *) GC_MALLOC_ATOMIC(size); if (!t) throw std::bad_alloc(); return t; } // When there's no need to write to the string, we can optimize away empty // string allocations. // This function handles makeImmutableString(std::string_view()) by returning // the empty string. static const char * makeImmutableString(std::string_view s) { const size_t size = s.size(); if (size == 0) return ""; auto t = allocString(size + 1); memcpy(t, s.data(), size); t[size] = '\0'; return t; } RootValue allocRootValue(Value * v) { return std::allocate_shared<Value *>(traceable_allocator<Value *>(), v); } // Pretty print types for assertion errors std::ostream & operator << (std::ostream & os, const ValueType t) { os << showType(t); return os; } std::string printValue(EvalState & state, Value & v) { std::ostringstream out; v.print(state, out); return out.str(); } void Value::print(EvalState & state, std::ostream & str, PrintOptions options) { printValue(state, str, *this, options); } const Value * getPrimOp(const Value &v) { const Value * primOp = &v; while (primOp->isPrimOpApp()) { primOp = primOp->payload.primOpApp.left; } assert(primOp->isPrimOp()); return primOp; } std::string_view showType(ValueType type, bool withArticle) { #define WA(a, w) withArticle ? a " " w : w switch (type) { case nInt: return WA("an", "integer"); case nBool: return WA("a", "Boolean"); case nString: return WA("a", "string"); case nPath: return WA("a", "path"); case nNull: return "null"; case nAttrs: return WA("a", "set"); case nList: return WA("a", "list"); case nFunction: return WA("a", "function"); case nExternal: return WA("an", "external value"); case nFloat: return WA("a", "float"); case nThunk: return WA("a", "thunk"); } unreachable(); } std::string showType(const Value & v) { // Allow selecting a subset of enum values #pragma GCC diagnostic push #pragma GCC diagnostic ignored "-Wswitch-enum" switch (v.internalType) { case tString: return v.payload.string.context ? "a string with context" : "a string"; case tPrimOp: return fmt("the built-in function '%s'", std::string(v.payload.primOp->name)); case tPrimOpApp: return fmt("the partially applied built-in function '%s'", std::string(getPrimOp(v)->payload.primOp->name)); case tExternal: return v.external()->showType(); case tThunk: return v.isBlackhole() ? "a black hole" : "a thunk"; case tApp: return "a function application"; default: return std::string(showType(v.type())); } #pragma GCC diagnostic pop } PosIdx Value::determinePos(const PosIdx pos) const { // Allow selecting a subset of enum values #pragma GCC diagnostic push #pragma GCC diagnostic ignored "-Wswitch-enum" switch (internalType) { case tAttrs: return attrs()->pos; case tLambda: return payload.lambda.fun->pos; case tApp: return payload.app.left->determinePos(pos); default: return pos; } #pragma GCC diagnostic pop } bool Value::isTrivial() const { return internalType != tApp && internalType != tPrimOpApp && (internalType != tThunk || (dynamic_cast<ExprAttrs *>(payload.thunk.expr) && ((ExprAttrs *) payload.thunk.expr)->dynamicAttrs.empty()) || dynamic_cast<ExprLambda *>(payload.thunk.expr) || dynamic_cast<ExprList *>(payload.thunk.expr)); } static Symbol getName(const AttrName & name, EvalState & state, Env & env) { if (name.symbol) { return name.symbol; } else { Value nameValue; name.expr->eval(state, env, nameValue); state.forceStringNoCtx(nameValue, name.expr->getPos(), "while evaluating an attribute name"); return state.symbols.create(nameValue.string_view()); } } static constexpr size_t BASE_ENV_SIZE = 128; EvalState::EvalState( const LookupPath & lookupPathFromArguments, ref<Store> store, const fetchers::Settings & fetchSettings, const EvalSettings & settings, std::shared_ptr<Store> buildStore) : fetchSettings{fetchSettings} , settings{settings} , sWith(symbols.create("<with>")) , sOutPath(symbols.create("outPath")) , sDrvPath(symbols.create("drvPath")) , sType(symbols.create("type")) , sMeta(symbols.create("meta")) , sName(symbols.create("name")) , sValue(symbols.create("value")) , sSystem(symbols.create("system")) , sOverrides(symbols.create("__overrides")) , sOutputs(symbols.create("outputs")) , sOutputName(symbols.create("outputName")) , sIgnoreNulls(symbols.create("__ignoreNulls")) , sFile(symbols.create("file")) , sLine(symbols.create("line")) , sColumn(symbols.create("column")) , sFunctor(symbols.create("__functor")) , sToString(symbols.create("__toString")) , sRight(symbols.create("right")) , sWrong(symbols.create("wrong")) , sStructuredAttrs(symbols.create("__structuredAttrs")) , sAllowedReferences(symbols.create("allowedReferences")) , sAllowedRequisites(symbols.create("allowedRequisites")) , sDisallowedReferences(symbols.create("disallowedReferences")) , sDisallowedRequisites(symbols.create("disallowedRequisites")) , sMaxSize(symbols.create("maxSize")) , sMaxClosureSize(symbols.create("maxClosureSize")) , sBuilder(symbols.create("builder")) , sArgs(symbols.create("args")) , sContentAddressed(symbols.create("__contentAddressed")) , sImpure(symbols.create("__impure")) , sOutputHash(symbols.create("outputHash")) , sOutputHashAlgo(symbols.create("outputHashAlgo")) , sOutputHashMode(symbols.create("outputHashMode")) , sRecurseForDerivations(symbols.create("recurseForDerivations")) , sDescription(symbols.create("description")) , sSelf(symbols.create("self")) , sEpsilon(symbols.create("")) , sStartSet(symbols.create("startSet")) , sOperator(symbols.create("operator")) , sKey(symbols.create("key")) , sPath(symbols.create("path")) , sPrefix(symbols.create("prefix")) , sOutputSpecified(symbols.create("outputSpecified")) , exprSymbols{ .sub = symbols.create("__sub"), .lessThan = symbols.create("__lessThan"), .mul = symbols.create("__mul"), .div = symbols.create("__div"), .or_ = symbols.create("or"), .findFile = symbols.create("__findFile"), .nixPath = symbols.create("__nixPath"), .body = symbols.create("body"), } , repair(NoRepair) , emptyBindings(0) , rootFS( settings.restrictEval || settings.pureEval ? ref<SourceAccessor>(AllowListSourceAccessor::create(getFSSourceAccessor(), {}, [&settings](const CanonPath & path) -> RestrictedPathError { auto modeInformation = settings.pureEval ? "in pure evaluation mode (use '--impure' to override)" : "in restricted mode"; throw RestrictedPathError("access to absolute path '%1%' is forbidden %2%", path, modeInformation); })) : getFSSourceAccessor()) , corepkgsFS(make_ref<MemorySourceAccessor>()) , internalFS(make_ref<MemorySourceAccessor>()) , derivationInternal{corepkgsFS->addFile( CanonPath("derivation-internal.nix"), #include "primops/derivation.nix.gen.hh" )} , callFlakeInternal{internalFS->addFile( CanonPath("call-flake.nix"), #include "call-flake.nix.gen.hh" )} , store(store) , buildStore(buildStore ? buildStore : store) , debugRepl(nullptr) , debugStop(false) , trylevel(0) , regexCache(makeRegexCache()) #if HAVE_BOEHMGC , valueAllocCache(std::allocate_shared<void *>(traceable_allocator<void *>(), nullptr)) , env1AllocCache(std::allocate_shared<void *>(traceable_allocator<void *>(), nullptr)) , baseEnvP(std::allocate_shared<Env *>(traceable_allocator<Env *>(), &allocEnv(BASE_ENV_SIZE))) , baseEnv(**baseEnvP) #else , baseEnv(allocEnv(BASE_ENV_SIZE)) #endif , staticBaseEnv{std::make_shared<StaticEnv>(nullptr, nullptr)} { corepkgsFS->setPathDisplay("<nix", ">"); internalFS->setPathDisplay("«nix-internal»", ""); countCalls = getEnv("NIX_COUNT_CALLS").value_or("0") != "0"; assertGCInitialized(); static_assert(sizeof(Env) <= 16, "environment must be <= 16 bytes"); vEmptyList.mkList(buildList(0)); vNull.mkNull(); vTrue.mkBool(true); vFalse.mkBool(false); vStringRegular.mkString("regular"); vStringDirectory.mkString("directory"); vStringSymlink.mkString("symlink"); vStringUnknown.mkString("unknown"); /* Construct the Nix expression search path. */ assert(lookupPath.elements.empty()); if (!settings.pureEval) { for (auto & i : lookupPathFromArguments.elements) { lookupPath.elements.emplace_back(LookupPath::Elem {i}); } /* $NIX_PATH overriding regular settings is implemented as a hack in `initGC()` */ for (auto & i : settings.nixPath.get()) { lookupPath.elements.emplace_back(LookupPath::Elem::parse(i)); } if (!settings.restrictEval) { for (auto & i : EvalSettings::getDefaultNixPath()) { lookupPath.elements.emplace_back(LookupPath::Elem::parse(i)); } } } /* Allow access to all paths in the search path. */ if (rootFS.dynamic_pointer_cast<AllowListSourceAccessor>()) for (auto & i : lookupPath.elements) resolveLookupPathPath(i.path, true); corepkgsFS->addFile( CanonPath("fetchurl.nix"), #include "fetchurl.nix.gen.hh" ); createBaseEnv(); } EvalState::~EvalState() { } void EvalState::allowPath(const Path & path) { if (auto rootFS2 = rootFS.dynamic_pointer_cast<AllowListSourceAccessor>()) rootFS2->allowPrefix(CanonPath(path)); } void EvalState::allowPath(const StorePath & storePath) { if (auto rootFS2 = rootFS.dynamic_pointer_cast<AllowListSourceAccessor>()) rootFS2->allowPrefix(CanonPath(store->toRealPath(storePath))); } void EvalState::allowAndSetStorePathString(const StorePath & storePath, Value & v) { allowPath(storePath); mkStorePathString(storePath, v); } inline static bool isJustSchemePrefix(std::string_view prefix) { return !prefix.empty() && prefix[prefix.size() - 1] == ':' && isValidSchemeName(prefix.substr(0, prefix.size() - 1)); } bool isAllowedURI(std::string_view uri, const Strings & allowedUris) { /* 'uri' should be equal to a prefix, or in a subdirectory of a prefix. Thus, the prefix https://github.co does not permit access to https://github.com. */ for (auto & prefix : allowedUris) { if (uri == prefix // Allow access to subdirectories of the prefix. || (uri.size() > prefix.size() && prefix.size() > 0 && hasPrefix(uri, prefix) && ( // Allow access to subdirectories of the prefix. prefix[prefix.size() - 1] == '/' || uri[prefix.size()] == '/' // Allow access to whole schemes || isJustSchemePrefix(prefix) ) )) return true; } return false; } void EvalState::checkURI(const std::string & uri) { if (!settings.restrictEval) return; if (isAllowedURI(uri, settings.allowedUris.get())) return; /* If the URI is a path, then check it against allowedPaths as well. */ if (hasPrefix(uri, "/")) { if (auto rootFS2 = rootFS.dynamic_pointer_cast<AllowListSourceAccessor>()) rootFS2->checkAccess(CanonPath(uri)); return; } if (hasPrefix(uri, "file://")) { if (auto rootFS2 = rootFS.dynamic_pointer_cast<AllowListSourceAccessor>()) rootFS2->checkAccess(CanonPath(uri.substr(7))); return; } throw RestrictedPathError("access to URI '%s' is forbidden in restricted mode", uri); } Path EvalState::toRealPath(const Path & path, const NixStringContext & context) { // FIXME: check whether 'path' is in 'context'. return !context.empty() && store->isInStore(path) ? store->toRealPath(path) : path; } Value * EvalState::addConstant(const std::string & name, Value & v, Constant info) { Value * v2 = allocValue(); *v2 = v; addConstant(name, v2, info); return v2; } void EvalState::addConstant(const std::string & name, Value * v, Constant info) { auto name2 = name.substr(0, 2) == "__" ? name.substr(2) : name; constantInfos.push_back({name2, info}); if (!(settings.pureEval && info.impureOnly)) { /* Check the type, if possible. We might know the type of a thunk in advance, so be allowed to just write it down in that case. */ if (auto gotType = v->type(true); gotType != nThunk) assert(info.type == gotType); /* Install value the base environment. */ staticBaseEnv->vars.emplace_back(symbols.create(name), baseEnvDispl); baseEnv.values[baseEnvDispl++] = v; baseEnv.values[0]->payload.attrs->push_back(Attr(symbols.create(name2), v)); } } void PrimOp::check() { if (arity > maxPrimOpArity) { throw Error("primop arity must not exceed %1%", maxPrimOpArity); } } std::ostream & operator<<(std::ostream & output, const PrimOp & primOp) { output << "primop " << primOp.name; return output; } const PrimOp * Value::primOpAppPrimOp() const { Value * left = payload.primOpApp.left; while (left && !left->isPrimOp()) { left = left->payload.primOpApp.left; } if (!left) return nullptr; return left->primOp(); } void Value::mkPrimOp(PrimOp * p) { p->check(); finishValue(tPrimOp, { .primOp = p }); } Value * EvalState::addPrimOp(PrimOp && primOp) { /* Hack to make constants lazy: turn them into a application of the primop to a dummy value. */ if (primOp.arity == 0) { primOp.arity = 1; auto vPrimOp = allocValue(); vPrimOp->mkPrimOp(new PrimOp(primOp)); Value v; v.mkApp(vPrimOp, vPrimOp); return addConstant(primOp.name, v, { .type = nThunk, // FIXME .doc = primOp.doc, }); } auto envName = symbols.create(primOp.name); if (hasPrefix(primOp.name, "__")) primOp.name = primOp.name.substr(2); Value * v = allocValue(); v->mkPrimOp(new PrimOp(primOp)); if (primOp.internal) internalPrimOps.emplace(primOp.name, v); else { staticBaseEnv->vars.emplace_back(envName, baseEnvDispl); baseEnv.values[baseEnvDispl++] = v; baseEnv.values[0]->payload.attrs->push_back(Attr(symbols.create(primOp.name), v)); } return v; } Value & EvalState::getBuiltin(const std::string & name) { return *baseEnv.values[0]->attrs()->find(symbols.create(name))->value; } std::optional<EvalState::Doc> EvalState::getDoc(Value & v) { if (v.isPrimOp()) { auto v2 = &v; if (auto * doc = v2->primOp()->doc) return Doc { .pos = {}, .name = v2->primOp()->name, .arity = v2->primOp()->arity, .args = v2->primOp()->args, .doc = doc, }; } if (v.isLambda()) { auto exprLambda = v.payload.lambda.fun; std::ostringstream s; std::string name; auto pos = positions[exprLambda->getPos()]; std::string docStr; if (exprLambda->name) { name = symbols[exprLambda->name]; } if (exprLambda->docComment) { docStr = exprLambda->docComment.getInnerText(positions); } if (name.empty()) { s << "Function "; } else { s << "Function `" << name << "`"; if (pos) s << "\\\n … " ; else s << "\\\n"; } if (pos) { s << "defined at " << pos; } if (!docStr.empty()) { s << "\n\n"; } s << docStr; return Doc { .pos = pos, .name = name, .arity = 0, // FIXME: figure out how deep by syntax only? It's not semantically useful though... .args = {}, .doc = makeImmutableString(toView(s)), // NOTE: memory leak when compiled without GC }; } if (isFunctor(v)) { try { Value & functor = *v.attrs()->find(sFunctor)->value; Value * vp = &v; Value partiallyApplied; // The first paramater is not user-provided, and may be // handled by code that is opaque to the user, like lib.const = x: y: y; // So preferably we show docs that are relevant to the // "partially applied" function returned by e.g. `const`. // We apply the first argument: callFunction(functor, 1, &vp, partiallyApplied, noPos); auto _level = addCallDepth(noPos); return getDoc(partiallyApplied); } catch (Error & e) { e.addTrace(nullptr, "while partially calling '%1%' to retrieve documentation", "__functor"); throw; } } return {}; } // just for the current level of StaticEnv, not the whole chain. void printStaticEnvBindings(const SymbolTable & st, const StaticEnv & se) { std::cout << ANSI_MAGENTA; for (auto & i : se.vars) std::cout << st[i.first] << " "; std::cout << ANSI_NORMAL; std::cout << std::endl; } // just for the current level of Env, not the whole chain. void printWithBindings(const SymbolTable & st, const Env & env) { if (!env.values[0]->isThunk()) { std::cout << "with: "; std::cout << ANSI_MAGENTA; auto j = env.values[0]->attrs()->begin(); while (j != env.values[0]->attrs()->end()) { std::cout << st[j->name] << " "; ++j; } std::cout << ANSI_NORMAL; std::cout << std::endl; } } void printEnvBindings(const SymbolTable & st, const StaticEnv & se, const Env & env, int lvl) { std::cout << "Env level " << lvl << std::endl; if (se.up && env.up) { std::cout << "static: "; printStaticEnvBindings(st, se); if (se.isWith) printWithBindings(st, env); std::cout << std::endl; printEnvBindings(st, *se.up, *env.up, ++lvl); } else { std::cout << ANSI_MAGENTA; // for the top level, don't print the double underscore ones; // they are in builtins. for (auto & i : se.vars) if (!hasPrefix(st[i.first], "__")) std::cout << st[i.first] << " "; std::cout << ANSI_NORMAL; std::cout << std::endl; if (se.isWith) printWithBindings(st, env); // probably nothing there for the top level. std::cout << std::endl; } } void printEnvBindings(const EvalState &es, const Expr & expr, const Env & env) { // just print the names for now auto se = es.getStaticEnv(expr); if (se) printEnvBindings(es.symbols, *se, env, 0); } void mapStaticEnvBindings(const SymbolTable & st, const StaticEnv & se, const Env & env, ValMap & vm) { // add bindings for the next level up first, so that the bindings for this level // override the higher levels. // The top level bindings (builtins) are skipped since they are added for us by initEnv() if (env.up && se.up) { mapStaticEnvBindings(st, *se.up, *env.up, vm); if (se.isWith && !env.values[0]->isThunk()) { // add 'with' bindings. for (auto & j : *env.values[0]->attrs()) vm.insert_or_assign(std::string(st[j.name]), j.value); } else { // iterate through staticenv bindings and add them. for (auto & i : se.vars) vm.insert_or_assign(std::string(st[i.first]), env.values[i.second]); } } } std::unique_ptr<ValMap> mapStaticEnvBindings(const SymbolTable & st, const StaticEnv & se, const Env & env) { auto vm = std::make_unique<ValMap>(); mapStaticEnvBindings(st, se, env, *vm); return vm; } /** * Sets `inDebugger` to true on construction and false on destruction. */ class DebuggerGuard { bool & inDebugger; public: DebuggerGuard(bool & inDebugger) : inDebugger(inDebugger) { inDebugger = true; } ~DebuggerGuard() { inDebugger = false; } }; bool EvalState::canDebug() { return debugRepl && !debugTraces.empty(); } void EvalState::runDebugRepl(const Error * error) { if (!canDebug()) return; assert(!debugTraces.empty()); const DebugTrace & last = debugTraces.front(); const Env & env = last.env; const Expr & expr = last.expr; runDebugRepl(error, env, expr); } void EvalState::runDebugRepl(const Error * error, const Env & env, const Expr & expr) { // Make sure we have a debugger to run and we're not already in a debugger. if (!debugRepl || inDebugger) return; auto dts = error && expr.getPos() ? std::make_unique<DebugTraceStacker>( *this, DebugTrace { .pos = error->info().pos ? error->info().pos : positions[expr.getPos()], .expr = expr, .env = env, .hint = error->info().msg, .isError = true }) : nullptr; if (error) { printError("%s\n", error->what()); if (trylevel > 0 && error->info().level != lvlInfo) printError("This exception occurred in a 'tryEval' call. Use " ANSI_GREEN "--ignore-try" ANSI_NORMAL " to skip these.\n"); } auto se = getStaticEnv(expr); if (se) { auto vm = mapStaticEnvBindings(symbols, *se.get(), env); DebuggerGuard _guard(inDebugger); auto exitStatus = (debugRepl)(ref<EvalState>(shared_from_this()), *vm); switch (exitStatus) { case ReplExitStatus::QuitAll: if (error) throw *error; throw Exit(0); case ReplExitStatus::Continue: break; default: unreachable(); } } } template<typename... Args> void EvalState::addErrorTrace(Error & e, const Args & ... formatArgs) const { e.addTrace(nullptr, HintFmt(formatArgs...)); } template<typename... Args> void EvalState::addErrorTrace(Error & e, const PosIdx pos, const Args & ... formatArgs) const { e.addTrace(positions[pos], HintFmt(formatArgs...)); } template<typename... Args> static std::unique_ptr<DebugTraceStacker> makeDebugTraceStacker( EvalState & state, Expr & expr, Env & env, std::shared_ptr<Pos> && pos, const Args & ... formatArgs) { return std::make_unique<DebugTraceStacker>(state, DebugTrace { .pos = std::move(pos), .expr = expr, .env = env, .hint = HintFmt(formatArgs...), .isError = false }); } DebugTraceStacker::DebugTraceStacker(EvalState & evalState, DebugTrace t) : evalState(evalState) , trace(std::move(t)) { evalState.debugTraces.push_front(trace); if (evalState.debugStop && evalState.debugRepl) evalState.runDebugRepl(nullptr, trace.env, trace.expr); } void Value::mkString(std::string_view s) { mkString(makeImmutableString(s)); } static const char * * encodeContext(const NixStringContext & context) { if (!context.empty()) { size_t n = 0; auto ctx = (const char * *) allocBytes((context.size() + 1) * sizeof(char *)); for (auto & i : context) { ctx[n++] = makeImmutableString({i.to_string()}); } ctx[n] = nullptr; return ctx; } else return nullptr; } void Value::mkString(std::string_view s, const NixStringContext & context) { mkString(makeImmutableString(s), encodeContext(context)); } void Value::mkStringMove(const char * s, const NixStringContext & context) { mkString(s, encodeContext(context)); } void Value::mkPath(const SourcePath & path) { mkPath(&*path.accessor, makeImmutableString(path.path.abs())); } inline Value * EvalState::lookupVar(Env * env, const ExprVar & var, bool noEval) { for (auto l = var.level; l; --l, env = env->up) ; if (!var.fromWith) return env->values[var.displ]; // This early exit defeats the `maybeThunk` optimization for variables from `with`, // The added complexity of handling this appears to be similarly in cost, or // the cases where applicable were insignificant in the first place. if (noEval) return nullptr; auto * fromWith = var.fromWith; while (1) { forceAttrs(*env->values[0], fromWith->pos, "while evaluating the first subexpression of a with expression"); if (auto j = env->values[0]->attrs()->get(var.name)) { if (countCalls) attrSelects[j->pos]++; return j->value; } if (!fromWith->parentWith) error<UndefinedVarError>("undefined variable '%1%'", symbols[var.name]).atPos(var.pos).withFrame(*env, var).debugThrow(); for (size_t l = fromWith->prevWith; l; --l, env = env->up) ; fromWith = fromWith->parentWith; } } ListBuilder::ListBuilder(EvalState & state, size_t size) : size(size) , elems(size <= 2 ? inlineElems : (Value * *) allocBytes(size * sizeof(Value *))) { state.nrListElems += size; } Value * EvalState::getBool(bool b) { return b ? &vTrue : &vFalse; } unsigned long nrThunks = 0; static inline void mkThunk(Value & v, Env & env, Expr * expr) { v.mkThunk(&env, expr); nrThunks++; } void EvalState::mkThunk_(Value & v, Expr * expr) { mkThunk(v, baseEnv, expr); } void EvalState::mkPos(Value & v, PosIdx p) { auto origin = positions.originOf(p); if (auto path = std::get_if<SourcePath>(&origin)) { auto attrs = buildBindings(3); attrs.alloc(sFile).mkString(path->path.abs()); makePositionThunks(*this, p, attrs.alloc(sLine), attrs.alloc(sColumn)); v.mkAttrs(attrs); } else v.mkNull(); } void EvalState::mkStorePathString(const StorePath & p, Value & v) { v.mkString( store->printStorePath(p), NixStringContext { NixStringContextElem::Opaque { .path = p }, }); } std::string EvalState::mkOutputStringRaw( const SingleDerivedPath::Built & b, std::optional<StorePath> optStaticOutputPath, const ExperimentalFeatureSettings & xpSettings) { /* In practice, this is testing for the case of CA derivations, or dynamic derivations. */ return optStaticOutputPath ? store->printStorePath(std::move(*optStaticOutputPath)) /* Downstream we would substitute this for an actual path once we build the floating CA derivation */ : DownstreamPlaceholder::fromSingleDerivedPathBuilt(b, xpSettings).render(); } void EvalState::mkOutputString( Value & value, const SingleDerivedPath::Built & b, std::optional<StorePath> optStaticOutputPath, const ExperimentalFeatureSettings & xpSettings) { value.mkString( mkOutputStringRaw(b, optStaticOutputPath, xpSettings), NixStringContext { b }); } std::string EvalState::mkSingleDerivedPathStringRaw( const SingleDerivedPath & p) { return std::visit(overloaded { [&](const SingleDerivedPath::Opaque & o) { return store->printStorePath(o.path); }, [&](const SingleDerivedPath::Built & b) { auto optStaticOutputPath = std::visit(overloaded { [&](const SingleDerivedPath::Opaque & o) { auto drv = store->readDerivation(o.path); auto i = drv.outputs.find(b.output); if (i == drv.outputs.end()) throw Error("derivation '%s' does not have output '%s'", b.drvPath->to_string(*store), b.output); return i->second.path(*store, drv.name, b.output); }, [&](const SingleDerivedPath::Built & o) -> std::optional<StorePath> { return std::nullopt; }, }, b.drvPath->raw()); return mkOutputStringRaw(b, optStaticOutputPath); } }, p.raw()); } void EvalState::mkSingleDerivedPathString( const SingleDerivedPath & p, Value & v) { v.mkString( mkSingleDerivedPathStringRaw(p), NixStringContext { std::visit([](auto && v) -> NixStringContextElem { return v; }, p), }); } /* Create a thunk for the delayed computation of the given expression in the given environment. But if the expression is a variable, then look it up right away. This significantly reduces the number of thunks allocated. */ Value * Expr::maybeThunk(EvalState & state, Env & env) { Value * v = state.allocValue(); mkThunk(*v, env, this); return v; } Value * ExprVar::maybeThunk(EvalState & state, Env & env) { Value * v = state.lookupVar(&env, *this, true); /* The value might not be initialised in the environment yet. In that case, ignore it. */ if (v) { state.nrAvoided++; return v; } return Expr::maybeThunk(state, env); } Value * ExprString::maybeThunk(EvalState & state, Env & env) { state.nrAvoided++; return &v; } Value * ExprInt::maybeThunk(EvalState & state, Env & env) { state.nrAvoided++; return &v; } Value * ExprFloat::maybeThunk(EvalState & state, Env & env) { state.nrAvoided++; return &v; } Value * ExprPath::maybeThunk(EvalState & state, Env & env) { state.nrAvoided++; return &v; } void EvalState::evalFile(const SourcePath & path, Value & v, bool mustBeTrivial) { FileEvalCache::iterator i; if ((i = fileEvalCache.find(path)) != fileEvalCache.end()) { v = i->second; return; } auto resolvedPath = resolveExprPath(path); if ((i = fileEvalCache.find(resolvedPath)) != fileEvalCache.end()) { v = i->second; return; } printTalkative("evaluating file '%1%'", resolvedPath); Expr * e = nullptr; auto j = fileParseCache.find(resolvedPath); if (j != fileParseCache.end()) e = j->second; if (!e) e = parseExprFromFile(resolvedPath); fileParseCache.emplace(resolvedPath, e); try { auto dts = debugRepl ? makeDebugTraceStacker( *this, *e, this->baseEnv, e->getPos() ? std::make_shared<Pos>(positions[e->getPos()]) : nullptr, "while evaluating the file '%1%':", resolvedPath.to_string()) : nullptr; // Enforce that 'flake.nix' is a direct attrset, not a // computation. if (mustBeTrivial && !(dynamic_cast<ExprAttrs *>(e))) error<EvalError>("file '%s' must be an attribute set", path).debugThrow(); eval(e, v); } catch (Error & e) { addErrorTrace(e, "while evaluating the file '%1%':", resolvedPath.to_string()); throw; } fileEvalCache.emplace(resolvedPath, v); if (path != resolvedPath) fileEvalCache.emplace(path, v); } void EvalState::resetFileCache() { fileEvalCache.clear(); fileParseCache.clear(); } void EvalState::eval(Expr * e, Value & v) { e->eval(*this, baseEnv, v); } inline bool EvalState::evalBool(Env & env, Expr * e, const PosIdx pos, std::string_view errorCtx) { try { Value v; e->eval(*this, env, v); if (v.type() != nBool) error<TypeError>( "expected a Boolean but found %1%: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ).atPos(pos).withFrame(env, *e).debugThrow(); return v.boolean(); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } } inline void EvalState::evalAttrs(Env & env, Expr * e, Value & v, const PosIdx pos, std::string_view errorCtx) { try { e->eval(*this, env, v); if (v.type() != nAttrs) error<TypeError>( "expected a set but found %1%: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ).withFrame(env, *e).debugThrow(); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } } void Expr::eval(EvalState & state, Env & env, Value & v) { unreachable(); } void ExprInt::eval(EvalState & state, Env & env, Value & v) { v = this->v; } void ExprFloat::eval(EvalState & state, Env & env, Value & v) { v = this->v; } void ExprString::eval(EvalState & state, Env & env, Value & v) { v = this->v; } void ExprPath::eval(EvalState & state, Env & env, Value & v) { v = this->v; } Env * ExprAttrs::buildInheritFromEnv(EvalState & state, Env & up) { Env & inheritEnv = state.allocEnv(inheritFromExprs->size()); inheritEnv.up = &up; Displacement displ = 0; for (auto from : *inheritFromExprs) inheritEnv.values[displ++] = from->maybeThunk(state, up); return &inheritEnv; } void ExprAttrs::eval(EvalState & state, Env & env, Value & v) { auto bindings = state.buildBindings(attrs.size() + dynamicAttrs.size()); auto dynamicEnv = &env; bool sort = false; if (recursive) { /* Create a new environment that contains the attributes in this `rec'. */ Env & env2(state.allocEnv(attrs.size())); env2.up = &env; dynamicEnv = &env2; Env * inheritEnv = inheritFromExprs ? buildInheritFromEnv(state, env2) : nullptr; AttrDefs::iterator overrides = attrs.find(state.sOverrides); bool hasOverrides = overrides != attrs.end(); /* The recursive attributes are evaluated in the new environment, while the inherited attributes are evaluated in the original environment. */ Displacement displ = 0; for (auto & i : attrs) { Value * vAttr; if (hasOverrides && i.second.kind != AttrDef::Kind::Inherited) { vAttr = state.allocValue(); mkThunk(*vAttr, *i.second.chooseByKind(&env2, &env, inheritEnv), i.second.e); } else vAttr = i.second.e->maybeThunk(state, *i.second.chooseByKind(&env2, &env, inheritEnv)); env2.values[displ++] = vAttr; bindings.insert(i.first, vAttr, i.second.pos); } /* If the rec contains an attribute called `__overrides', then evaluate it, and add the attributes in that set to the rec. This allows overriding of recursive attributes, which is otherwise not possible. (You can use the // operator to replace an attribute, but other attributes in the rec will still reference the original value, because that value has been substituted into the bodies of the other attributes. Hence we need __overrides.) */ if (hasOverrides) { Value * vOverrides = (*bindings.bindings)[overrides->second.displ].value; state.forceAttrs(*vOverrides, [&]() { return vOverrides->determinePos(noPos); }, "while evaluating the `__overrides` attribute"); bindings.grow(state.allocBindings(bindings.capacity() + vOverrides->attrs()->size())); for (auto & i : *vOverrides->attrs()) { AttrDefs::iterator j = attrs.find(i.name); if (j != attrs.end()) { (*bindings.bindings)[j->second.displ] = i; env2.values[j->second.displ] = i.value; } else bindings.push_back(i); } sort = true; } } else { Env * inheritEnv = inheritFromExprs ? buildInheritFromEnv(state, env) : nullptr; for (auto & i : attrs) bindings.insert( i.first, i.second.e->maybeThunk(state, *i.second.chooseByKind(&env, &env, inheritEnv)), i.second.pos); } /* Dynamic attrs apply *after* rec and __overrides. */ for (auto & i : dynamicAttrs) { Value nameVal; i.nameExpr->eval(state, *dynamicEnv, nameVal); state.forceValue(nameVal, i.pos); if (nameVal.type() == nNull) continue; state.forceStringNoCtx(nameVal, i.pos, "while evaluating the name of a dynamic attribute"); auto nameSym = state.symbols.create(nameVal.string_view()); if (sort) // FIXME: inefficient bindings.bindings->sort(); if (auto j = bindings.bindings->get(nameSym)) state.error<EvalError>("dynamic attribute '%1%' already defined at %2%", state.symbols[nameSym], state.positions[j->pos]).atPos(i.pos).withFrame(env, *this).debugThrow(); i.valueExpr->setName(nameSym); /* Keep sorted order so find can catch duplicates */ bindings.insert(nameSym, i.valueExpr->maybeThunk(state, *dynamicEnv), i.pos); sort = true; } bindings.bindings->pos = pos; v.mkAttrs(sort ? bindings.finish() : bindings.alreadySorted()); } void ExprLet::eval(EvalState & state, Env & env, Value & v) { /* Create a new environment that contains the attributes in this `let'. */ Env & env2(state.allocEnv(attrs->attrs.size())); env2.up = &env; Env * inheritEnv = attrs->inheritFromExprs ? attrs->buildInheritFromEnv(state, env2) : nullptr; /* The recursive attributes are evaluated in the new environment, while the inherited attributes are evaluated in the original environment. */ Displacement displ = 0; for (auto & i : attrs->attrs) { env2.values[displ++] = i.second.e->maybeThunk( state, *i.second.chooseByKind(&env2, &env, inheritEnv)); } auto dts = state.debugRepl ? makeDebugTraceStacker( state, *this, env2, getPos() ? std::make_shared<Pos>(state.positions[getPos()]) : nullptr, "while evaluating a '%1%' expression", "let" ) : nullptr; body->eval(state, env2, v); } void ExprList::eval(EvalState & state, Env & env, Value & v) { auto list = state.buildList(elems.size()); for (const auto & [n, v2] : enumerate(list)) v2 = elems[n]->maybeThunk(state, env); v.mkList(list); } Value * ExprList::maybeThunk(EvalState & state, Env & env) { if (elems.empty()) { return &state.vEmptyList; } return Expr::maybeThunk(state, env); } void ExprVar::eval(EvalState & state, Env & env, Value & v) { Value * v2 = state.lookupVar(&env, *this, false); state.forceValue(*v2, pos); v = *v2; } static std::string showAttrPath(EvalState & state, Env & env, const AttrPath & attrPath) { std::ostringstream out; bool first = true; for (auto & i : attrPath) { if (!first) out << '.'; else first = false; try { out << state.symbols[getName(i, state, env)]; } catch (Error & e) { assert(!i.symbol); out << "\"${"; i.expr->show(state.symbols, out); out << "}\""; } } return out.str(); } void ExprSelect::eval(EvalState & state, Env & env, Value & v) { Value vTmp; PosIdx pos2; Value * vAttrs = &vTmp; e->eval(state, env, vTmp); try { auto dts = state.debugRepl ? makeDebugTraceStacker( state, *this, env, state.positions[getPos()], "while evaluating the attribute '%1%'", showAttrPath(state, env, attrPath)) : nullptr; for (auto & i : attrPath) { state.nrLookups++; const Attr * j; auto name = getName(i, state, env); if (def) { state.forceValue(*vAttrs, pos); if (vAttrs->type() != nAttrs || !(j = vAttrs->attrs()->get(name))) { def->eval(state, env, v); return; } } else { state.forceAttrs(*vAttrs, pos, "while selecting an attribute"); if (!(j = vAttrs->attrs()->get(name))) { std::set<std::string> allAttrNames; for (auto & attr : *vAttrs->attrs()) allAttrNames.insert(std::string(state.symbols[attr.name])); auto suggestions = Suggestions::bestMatches(allAttrNames, state.symbols[name]); state.error<EvalError>("attribute '%1%' missing", state.symbols[name]) .atPos(pos).withSuggestions(suggestions).withFrame(env, *this).debugThrow(); } } vAttrs = j->value; pos2 = j->pos; if (state.countCalls) state.attrSelects[pos2]++; } state.forceValue(*vAttrs, (pos2 ? pos2 : this->pos ) ); } catch (Error & e) { if (pos2) { auto pos2r = state.positions[pos2]; auto origin = std::get_if<SourcePath>(&pos2r.origin); if (!(origin && *origin == state.derivationInternal)) state.addErrorTrace(e, pos2, "while evaluating the attribute '%1%'", showAttrPath(state, env, attrPath)); } throw; } v = *vAttrs; } Symbol ExprSelect::evalExceptFinalSelect(EvalState & state, Env & env, Value & attrs) { Value vTmp; Symbol name = getName(attrPath[attrPath.size() - 1], state, env); if (attrPath.size() == 1) { e->eval(state, env, vTmp); } else { ExprSelect init(*this); init.attrPath.pop_back(); init.eval(state, env, vTmp); } attrs = vTmp; return name; } void ExprOpHasAttr::eval(EvalState & state, Env & env, Value & v) { Value vTmp; Value * vAttrs = &vTmp; e->eval(state, env, vTmp); for (auto & i : attrPath) { state.forceValue(*vAttrs, getPos()); const Attr * j; auto name = getName(i, state, env); if (vAttrs->type() == nAttrs && (j = vAttrs->attrs()->get(name))) { vAttrs = j->value; } else { v.mkBool(false); return; } } v.mkBool(true); } void ExprLambda::eval(EvalState & state, Env & env, Value & v) { v.mkLambda(&env, this); } void EvalState::callFunction(Value & fun, size_t nrArgs, Value * * args, Value & vRes, const PosIdx pos) { auto _level = addCallDepth(pos); auto trace = settings.traceFunctionCalls ? std::make_unique<FunctionCallTrace>(positions[pos]) : nullptr; forceValue(fun, pos); Value vCur(fun); auto makeAppChain = [&]() { vRes = vCur; for (size_t i = 0; i < nrArgs; ++i) { auto fun2 = allocValue(); *fun2 = vRes; vRes.mkPrimOpApp(fun2, args[i]); } }; const Attr * functor; while (nrArgs > 0) { if (vCur.isLambda()) { ExprLambda & lambda(*vCur.payload.lambda.fun); auto size = (!lambda.arg ? 0 : 1) + (lambda.hasFormals() ? lambda.formals->formals.size() : 0); Env & env2(allocEnv(size)); env2.up = vCur.payload.lambda.env; Displacement displ = 0; if (!lambda.hasFormals()) env2.values[displ++] = args[0]; else { try { forceAttrs(*args[0], lambda.pos, "while evaluating the value passed for the lambda argument"); } catch (Error & e) { if (pos) e.addTrace(positions[pos], "from call site"); throw; } if (lambda.arg) env2.values[displ++] = args[0]; /* For each formal argument, get the actual argument. If there is no matching actual argument but the formal argument has a default, use the default. */ size_t attrsUsed = 0; for (auto & i : lambda.formals->formals) { auto j = args[0]->attrs()->get(i.name); if (!j) { if (!i.def) { error<TypeError>("function '%1%' called without required argument '%2%'", (lambda.name ? std::string(symbols[lambda.name]) : "anonymous lambda"), symbols[i.name]) .atPos(lambda.pos) .withTrace(pos, "from call site") .withFrame(*fun.payload.lambda.env, lambda) .debugThrow(); } env2.values[displ++] = i.def->maybeThunk(*this, env2); } else { attrsUsed++; env2.values[displ++] = j->value; } } /* Check that each actual argument is listed as a formal argument (unless the attribute match specifies a `...'). */ if (!lambda.formals->ellipsis && attrsUsed != args[0]->attrs()->size()) { /* Nope, so show the first unexpected argument to the user. */ for (auto & i : *args[0]->attrs()) if (!lambda.formals->has(i.name)) { std::set<std::string> formalNames; for (auto & formal : lambda.formals->formals) formalNames.insert(std::string(symbols[formal.name])); auto suggestions = Suggestions::bestMatches(formalNames, symbols[i.name]); error<TypeError>("function '%1%' called with unexpected argument '%2%'", (lambda.name ? std::string(symbols[lambda.name]) : "anonymous lambda"), symbols[i.name]) .atPos(lambda.pos) .withTrace(pos, "from call site") .withSuggestions(suggestions) .withFrame(*fun.payload.lambda.env, lambda) .debugThrow(); } unreachable(); } } nrFunctionCalls++; if (countCalls) incrFunctionCall(&lambda); /* Evaluate the body. */ try { auto dts = debugRepl ? makeDebugTraceStacker( *this, *lambda.body, env2, positions[lambda.pos], "while calling %s", lambda.name ? concatStrings("'", symbols[lambda.name], "'") : "anonymous lambda") : nullptr; lambda.body->eval(*this, env2, vCur); } catch (Error & e) { if (loggerSettings.showTrace.get()) { addErrorTrace( e, lambda.pos, "while calling %s", lambda.name ? concatStrings("'", symbols[lambda.name], "'") : "anonymous lambda"); if (pos) addErrorTrace(e, pos, "from call site"); } throw; } nrArgs--; args += 1; } else if (vCur.isPrimOp()) { size_t argsLeft = vCur.primOp()->arity; if (nrArgs < argsLeft) { /* We don't have enough arguments, so create a tPrimOpApp chain. */ makeAppChain(); return; } else { /* We have all the arguments, so call the primop. */ auto * fn = vCur.primOp(); nrPrimOpCalls++; if (countCalls) primOpCalls[fn->name]++; try { fn->fun(*this, vCur.determinePos(noPos), args, vCur); } catch (Error & e) { if (fn->addTrace) addErrorTrace(e, pos, "while calling the '%1%' builtin", fn->name); throw; } nrArgs -= argsLeft; args += argsLeft; } } else if (vCur.isPrimOpApp()) { /* Figure out the number of arguments still needed. */ size_t argsDone = 0; Value * primOp = &vCur; while (primOp->isPrimOpApp()) { argsDone++; primOp = primOp->payload.primOpApp.left; } assert(primOp->isPrimOp()); auto arity = primOp->primOp()->arity; auto argsLeft = arity - argsDone; if (nrArgs < argsLeft) { /* We still don't have enough arguments, so extend the tPrimOpApp chain. */ makeAppChain(); return; } else { /* We have all the arguments, so call the primop with the previous and new arguments. */ Value * vArgs[maxPrimOpArity]; auto n = argsDone; for (Value * arg = &vCur; arg->isPrimOpApp(); arg = arg->payload.primOpApp.left) vArgs[--n] = arg->payload.primOpApp.right; for (size_t i = 0; i < argsLeft; ++i) vArgs[argsDone + i] = args[i]; auto fn = primOp->primOp(); nrPrimOpCalls++; if (countCalls) primOpCalls[fn->name]++; try { // TODO: // 1. Unify this and above code. Heavily redundant. // 2. Create a fake env (arg1, arg2, etc.) and a fake expr (arg1: arg2: etc: builtins.name arg1 arg2 etc) // so the debugger allows to inspect the wrong parameters passed to the builtin. fn->fun(*this, vCur.determinePos(noPos), vArgs, vCur); } catch (Error & e) { if (fn->addTrace) addErrorTrace(e, pos, "while calling the '%1%' builtin", fn->name); throw; } nrArgs -= argsLeft; args += argsLeft; } } else if (vCur.type() == nAttrs && (functor = vCur.attrs()->get(sFunctor))) { /* 'vCur' may be allocated on the stack of the calling function, but for functors we may keep a reference, so heap-allocate a copy and use that instead. */ Value * args2[] = {allocValue(), args[0]}; *args2[0] = vCur; try { callFunction(*functor->value, 2, args2, vCur, functor->pos); } catch (Error & e) { e.addTrace(positions[pos], "while calling a functor (an attribute set with a '__functor' attribute)"); throw; } nrArgs--; args++; } else error<TypeError>( "attempt to call something which is not a function but %1%: %2%", showType(vCur), ValuePrinter(*this, vCur, errorPrintOptions)) .atPos(pos) .debugThrow(); } vRes = vCur; } void ExprCall::eval(EvalState & state, Env & env, Value & v) { auto dts = state.debugRepl ? makeDebugTraceStacker( state, *this, env, getPos() ? std::make_shared<Pos>(state.positions[getPos()]) : nullptr, "while calling a function" ) : nullptr; Value vFun; fun->eval(state, env, vFun); // Empirical arity of Nixpkgs lambdas by regex e.g. ([a-zA-Z]+:(\s|(/\*.*\/)|(#.*\n))*){5} // 2: over 4000 // 3: about 300 // 4: about 60 // 5: under 10 // This excluded attrset lambdas (`{...}:`). Contributions of mixed lambdas appears insignificant at ~150 total. SmallValueVector<4> vArgs(args.size()); for (size_t i = 0; i < args.size(); ++i) vArgs[i] = args[i]->maybeThunk(state, env); state.callFunction(vFun, args.size(), vArgs.data(), v, pos); } // Lifted out of callFunction() because it creates a temporary that // prevents tail-call optimisation. void EvalState::incrFunctionCall(ExprLambda * fun) { functionCalls[fun]++; } void EvalState::autoCallFunction(const Bindings & args, Value & fun, Value & res) { auto pos = fun.determinePos(noPos); forceValue(fun, pos); if (fun.type() == nAttrs) { auto found = fun.attrs()->find(sFunctor); if (found != fun.attrs()->end()) { Value * v = allocValue(); callFunction(*found->value, fun, *v, pos); forceValue(*v, pos); return autoCallFunction(args, *v, res); } } if (!fun.isLambda() || !fun.payload.lambda.fun->hasFormals()) { res = fun; return; } auto attrs = buildBindings(std::max(static_cast<uint32_t>(fun.payload.lambda.fun->formals->formals.size()), args.size())); if (fun.payload.lambda.fun->formals->ellipsis) { // If the formals have an ellipsis (eg the function accepts extra args) pass // all available automatic arguments (which includes arguments specified on // the command line via --arg/--argstr) for (auto & v : args) attrs.insert(v); } else { // Otherwise, only pass the arguments that the function accepts for (auto & i : fun.payload.lambda.fun->formals->formals) { auto j = args.get(i.name); if (j) { attrs.insert(*j); } else if (!i.def) { error<MissingArgumentError>(R"(cannot evaluate a function that has an argument without a value ('%1%') Nix attempted to evaluate a function as a top level expression; in this case it must have its arguments supplied either by default values, or passed explicitly with '--arg' or '--argstr'. See https://nixos.org/manual/nix/stable/language/constructs.html#functions.)", symbols[i.name]) .atPos(i.pos).withFrame(*fun.payload.lambda.env, *fun.payload.lambda.fun).debugThrow(); } } } callFunction(fun, allocValue()->mkAttrs(attrs), res, pos); } void ExprWith::eval(EvalState & state, Env & env, Value & v) { Env & env2(state.allocEnv(1)); env2.up = &env; env2.values[0] = attrs->maybeThunk(state, env); body->eval(state, env2, v); } void ExprIf::eval(EvalState & state, Env & env, Value & v) { // We cheat in the parser, and pass the position of the condition as the position of the if itself. (state.evalBool(env, cond, pos, "while evaluating a branch condition") ? then : else_)->eval(state, env, v); } void ExprAssert::eval(EvalState & state, Env & env, Value & v) { if (!state.evalBool(env, cond, pos, "in the condition of the assert statement")) { std::ostringstream out; cond->show(state.symbols, out); auto exprStr = toView(out); if (auto eq = dynamic_cast<ExprOpEq *>(cond)) { try { Value v1; eq->e1->eval(state, env, v1); Value v2; eq->e2->eval(state, env, v2); state.assertEqValues(v1, v2, eq->pos, "in an equality assertion"); } catch (AssertionError & e) { e.addTrace(state.positions[pos], "while evaluating the condition of the assertion '%s'", exprStr); throw; } } state.error<AssertionError>("assertion '%1%' failed", exprStr).atPos(pos).withFrame(env, *this).debugThrow(); } body->eval(state, env, v); } void ExprOpNot::eval(EvalState & state, Env & env, Value & v) { v.mkBool(!state.evalBool(env, e, getPos(), "in the argument of the not operator")); // XXX: FIXME: ! } void ExprOpEq::eval(EvalState & state, Env & env, Value & v) { Value v1; e1->eval(state, env, v1); Value v2; e2->eval(state, env, v2); v.mkBool(state.eqValues(v1, v2, pos, "while testing two values for equality")); } void ExprOpNEq::eval(EvalState & state, Env & env, Value & v) { Value v1; e1->eval(state, env, v1); Value v2; e2->eval(state, env, v2); v.mkBool(!state.eqValues(v1, v2, pos, "while testing two values for inequality")); } void ExprOpAnd::eval(EvalState & state, Env & env, Value & v) { v.mkBool(state.evalBool(env, e1, pos, "in the left operand of the AND (&&) operator") && state.evalBool(env, e2, pos, "in the right operand of the AND (&&) operator")); } void ExprOpOr::eval(EvalState & state, Env & env, Value & v) { v.mkBool(state.evalBool(env, e1, pos, "in the left operand of the OR (||) operator") || state.evalBool(env, e2, pos, "in the right operand of the OR (||) operator")); } void ExprOpImpl::eval(EvalState & state, Env & env, Value & v) { v.mkBool(!state.evalBool(env, e1, pos, "in the left operand of the IMPL (->) operator") || state.evalBool(env, e2, pos, "in the right operand of the IMPL (->) operator")); } void ExprOpUpdate::eval(EvalState & state, Env & env, Value & v) { Value v1, v2; state.evalAttrs(env, e1, v1, pos, "in the left operand of the update (//) operator"); state.evalAttrs(env, e2, v2, pos, "in the right operand of the update (//) operator"); state.nrOpUpdates++; if (v1.attrs()->size() == 0) { v = v2; return; } if (v2.attrs()->size() == 0) { v = v1; return; } auto attrs = state.buildBindings(v1.attrs()->size() + v2.attrs()->size()); /* Merge the sets, preferring values from the second set. Make sure to keep the resulting vector in sorted order. */ auto i = v1.attrs()->begin(); auto j = v2.attrs()->begin(); while (i != v1.attrs()->end() && j != v2.attrs()->end()) { if (i->name == j->name) { attrs.insert(*j); ++i; ++j; } else if (i->name < j->name) attrs.insert(*i++); else attrs.insert(*j++); } while (i != v1.attrs()->end()) attrs.insert(*i++); while (j != v2.attrs()->end()) attrs.insert(*j++); v.mkAttrs(attrs.alreadySorted()); state.nrOpUpdateValuesCopied += v.attrs()->size(); } void ExprOpConcatLists::eval(EvalState & state, Env & env, Value & v) { Value v1; e1->eval(state, env, v1); Value v2; e2->eval(state, env, v2); Value * lists[2] = { &v1, &v2 }; state.concatLists(v, 2, lists, pos, "while evaluating one of the elements to concatenate"); } void EvalState::concatLists(Value & v, size_t nrLists, Value * const * lists, const PosIdx pos, std::string_view errorCtx) { nrListConcats++; Value * nonEmpty = 0; size_t len = 0; for (size_t n = 0; n < nrLists; ++n) { forceList(*lists[n], pos, errorCtx); auto l = lists[n]->listSize(); len += l; if (l) nonEmpty = lists[n]; } if (nonEmpty && len == nonEmpty->listSize()) { v = *nonEmpty; return; } auto list = buildList(len); auto out = list.elems; for (size_t n = 0, pos = 0; n < nrLists; ++n) { auto l = lists[n]->listSize(); if (l) memcpy(out + pos, lists[n]->listElems(), l * sizeof(Value *)); pos += l; } v.mkList(list); } void ExprConcatStrings::eval(EvalState & state, Env & env, Value & v) { NixStringContext context; std::vector<BackedStringView> s; size_t sSize = 0; NixInt n{0}; NixFloat nf = 0; bool first = !forceString; ValueType firstType = nString; const auto str = [&] { std::string result; result.reserve(sSize); for (const auto & part : s) result += *part; return result; }; /* c_str() is not str().c_str() because we want to create a string Value. allocating a GC'd string directly and moving it into a Value lets us avoid an allocation and copy. */ const auto c_str = [&] { char * result = allocString(sSize + 1); char * tmp = result; for (const auto & part : s) { memcpy(tmp, part->data(), part->size()); tmp += part->size(); } *tmp = 0; return result; }; // List of returned strings. References to these Values must NOT be persisted. SmallTemporaryValueVector<conservativeStackReservation> values(es->size()); Value * vTmpP = values.data(); for (auto & [i_pos, i] : *es) { Value & vTmp = *vTmpP++; i->eval(state, env, vTmp); /* If the first element is a path, then the result will also be a path, we don't copy anything (yet - that's done later, since paths are copied when they are used in a derivation), and none of the strings are allowed to have contexts. */ if (first) { firstType = vTmp.type(); } if (firstType == nInt) { if (vTmp.type() == nInt) { auto newN = n + vTmp.integer(); if (auto checked = newN.valueChecked(); checked.has_value()) { n = NixInt(*checked); } else { state.error<EvalError>("integer overflow in adding %1% + %2%", n, vTmp.integer()).atPos(i_pos).debugThrow(); } } else if (vTmp.type() == nFloat) { // Upgrade the type from int to float; firstType = nFloat; nf = n.value; nf += vTmp.fpoint(); } else state.error<EvalError>("cannot add %1% to an integer", showType(vTmp)).atPos(i_pos).withFrame(env, *this).debugThrow(); } else if (firstType == nFloat) { if (vTmp.type() == nInt) { nf += vTmp.integer().value; } else if (vTmp.type() == nFloat) { nf += vTmp.fpoint(); } else state.error<EvalError>("cannot add %1% to a float", showType(vTmp)).atPos(i_pos).withFrame(env, *this).debugThrow(); } else { if (s.empty()) s.reserve(es->size()); /* skip canonization of first path, which would only be not canonized in the first place if it's coming from a ./${foo} type path */ auto part = state.coerceToString(i_pos, vTmp, context, "while evaluating a path segment", false, firstType == nString, !first); sSize += part->size(); s.emplace_back(std::move(part)); } first = false; } if (firstType == nInt) v.mkInt(n); else if (firstType == nFloat) v.mkFloat(nf); else if (firstType == nPath) { if (!context.empty()) state.error<EvalError>("a string that refers to a store path cannot be appended to a path").atPos(pos).withFrame(env, *this).debugThrow(); v.mkPath(state.rootPath(CanonPath(canonPath(str())))); } else v.mkStringMove(c_str(), context); } void ExprPos::eval(EvalState & state, Env & env, Value & v) { state.mkPos(v, pos); } void ExprBlackHole::eval(EvalState & state, Env & env, Value & v) { state.error<InfiniteRecursionError>("infinite recursion encountered") .atPos(v.determinePos(noPos)) .debugThrow(); } // always force this to be separate, otherwise forceValue may inline it and take // a massive perf hit [[gnu::noinline]] void EvalState::tryFixupBlackHolePos(Value & v, PosIdx pos) { if (!v.isBlackhole()) return; auto e = std::current_exception(); try { std::rethrow_exception(e); } catch (InfiniteRecursionError & e) { e.atPos(positions[pos]); } catch (...) { } } void EvalState::forceValueDeep(Value & v) { std::set<const Value *> seen; std::function<void(Value & v)> recurse; recurse = [&](Value & v) { if (!seen.insert(&v).second) return; forceValue(v, v.determinePos(noPos)); if (v.type() == nAttrs) { for (auto & i : *v.attrs()) try { // If the value is a thunk, we're evaling. Otherwise no trace necessary. auto dts = debugRepl && i.value->isThunk() ? makeDebugTraceStacker(*this, *i.value->payload.thunk.expr, *i.value->payload.thunk.env, positions[i.pos], "while evaluating the attribute '%1%'", symbols[i.name]) : nullptr; recurse(*i.value); } catch (Error & e) { addErrorTrace(e, i.pos, "while evaluating the attribute '%1%'", symbols[i.name]); throw; } } else if (v.isList()) { for (auto v2 : v.listItems()) recurse(*v2); } }; recurse(v); } NixInt EvalState::forceInt(Value & v, const PosIdx pos, std::string_view errorCtx) { try { forceValue(v, pos); if (v.type() != nInt) error<TypeError>( "expected an integer but found %1%: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ).atPos(pos).debugThrow(); return v.integer(); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } return v.integer(); } NixFloat EvalState::forceFloat(Value & v, const PosIdx pos, std::string_view errorCtx) { try { forceValue(v, pos); if (v.type() == nInt) return v.integer().value; else if (v.type() != nFloat) error<TypeError>( "expected a float but found %1%: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ).atPos(pos).debugThrow(); return v.fpoint(); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } } bool EvalState::forceBool(Value & v, const PosIdx pos, std::string_view errorCtx) { try { forceValue(v, pos); if (v.type() != nBool) error<TypeError>( "expected a Boolean but found %1%: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ).atPos(pos).debugThrow(); return v.boolean(); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } return v.boolean(); } bool EvalState::isFunctor(Value & fun) { return fun.type() == nAttrs && fun.attrs()->find(sFunctor) != fun.attrs()->end(); } void EvalState::forceFunction(Value & v, const PosIdx pos, std::string_view errorCtx) { try { forceValue(v, pos); if (v.type() != nFunction && !isFunctor(v)) error<TypeError>( "expected a function but found %1%: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ).atPos(pos).debugThrow(); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } } std::string_view EvalState::forceString(Value & v, const PosIdx pos, std::string_view errorCtx) { try { forceValue(v, pos); if (v.type() != nString) error<TypeError>( "expected a string but found %1%: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ).atPos(pos).debugThrow(); return v.string_view(); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } } void copyContext(const Value & v, NixStringContext & context) { if (v.payload.string.context) for (const char * * p = v.payload.string.context; *p; ++p) context.insert(NixStringContextElem::parse(*p)); } std::string_view EvalState::forceString(Value & v, NixStringContext & context, const PosIdx pos, std::string_view errorCtx) { auto s = forceString(v, pos, errorCtx); copyContext(v, context); return s; } std::string_view EvalState::forceStringNoCtx(Value & v, const PosIdx pos, std::string_view errorCtx) { auto s = forceString(v, pos, errorCtx); if (v.context()) { error<EvalError>("the string '%1%' is not allowed to refer to a store path (such as '%2%')", v.string_view(), v.context()[0]).withTrace(pos, errorCtx).debugThrow(); } return s; } bool EvalState::isDerivation(Value & v) { if (v.type() != nAttrs) return false; auto i = v.attrs()->get(sType); if (!i) return false; forceValue(*i->value, i->pos); if (i->value->type() != nString) return false; return i->value->string_view().compare("derivation") == 0; } std::optional<std::string> EvalState::tryAttrsToString(const PosIdx pos, Value & v, NixStringContext & context, bool coerceMore, bool copyToStore) { auto i = v.attrs()->find(sToString); if (i != v.attrs()->end()) { Value v1; callFunction(*i->value, v, v1, pos); return coerceToString(pos, v1, context, "while evaluating the result of the `__toString` attribute", coerceMore, copyToStore).toOwned(); } return {}; } BackedStringView EvalState::coerceToString( const PosIdx pos, Value & v, NixStringContext & context, std::string_view errorCtx, bool coerceMore, bool copyToStore, bool canonicalizePath) { forceValue(v, pos); if (v.type() == nString) { copyContext(v, context); return v.string_view(); } if (v.type() == nPath) { return !canonicalizePath && !copyToStore ? // FIXME: hack to preserve path literals that end in a // slash, as in /foo/${x}. v.payload.path.path : copyToStore ? store->printStorePath(copyPathToStore(context, v.path())) : std::string(v.path().path.abs()); } if (v.type() == nAttrs) { auto maybeString = tryAttrsToString(pos, v, context, coerceMore, copyToStore); if (maybeString) return std::move(*maybeString); auto i = v.attrs()->find(sOutPath); if (i == v.attrs()->end()) { error<TypeError>( "cannot coerce %1% to a string: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ) .withTrace(pos, errorCtx) .debugThrow(); } return coerceToString(pos, *i->value, context, errorCtx, coerceMore, copyToStore, canonicalizePath); } if (v.type() == nExternal) { try { return v.external()->coerceToString(*this, pos, context, coerceMore, copyToStore); } catch (Error & e) { e.addTrace(nullptr, errorCtx); throw; } } if (coerceMore) { /* Note that `false' is represented as an empty string for shell scripting convenience, just like `null'. */ if (v.type() == nBool && v.boolean()) return "1"; if (v.type() == nBool && !v.boolean()) return ""; if (v.type() == nInt) return std::to_string(v.integer().value); if (v.type() == nFloat) return std::to_string(v.fpoint()); if (v.type() == nNull) return ""; if (v.isList()) { std::string result; for (auto [n, v2] : enumerate(v.listItems())) { try { result += *coerceToString(pos, *v2, context, "while evaluating one element of the list", coerceMore, copyToStore, canonicalizePath); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } if (n < v.listSize() - 1 /* !!! not quite correct */ && (!v2->isList() || v2->listSize() != 0)) result += " "; } return result; } } error<TypeError>("cannot coerce %1% to a string: %2%", showType(v), ValuePrinter(*this, v, errorPrintOptions) ) .withTrace(pos, errorCtx) .debugThrow(); } StorePath EvalState::copyPathToStore(NixStringContext & context, const SourcePath & path) { if (nix::isDerivation(path.path.abs())) error<EvalError>("file names are not allowed to end in '%1%'", drvExtension).debugThrow(); auto dstPathCached = get(*srcToStore.lock(), path); auto dstPath = dstPathCached ? *dstPathCached : [&]() { auto dstPath = fetchToStore( *store, path.resolveSymlinks(), settings.readOnlyMode ? FetchMode::DryRun : FetchMode::Copy, path.baseName(), ContentAddressMethod::Raw::NixArchive, nullptr, repair); allowPath(dstPath); srcToStore.lock()->try_emplace(path, dstPath); printMsg(lvlChatty, "copied source '%1%' -> '%2%'", path, store->printStorePath(dstPath)); return dstPath; }(); context.insert(NixStringContextElem::Opaque { .path = dstPath }); return dstPath; } SourcePath EvalState::coerceToPath(const PosIdx pos, Value & v, NixStringContext & context, std::string_view errorCtx) { try { forceValue(v, pos); } catch (Error & e) { e.addTrace(positions[pos], errorCtx); throw; } /* Handle path values directly, without coercing to a string. */ if (v.type() == nPath) return v.path(); /* Similarly, handle __toString where the result may be a path value. */ if (v.type() == nAttrs) { auto i = v.attrs()->find(sToString); if (i != v.attrs()->end()) { Value v1; callFunction(*i->value, v, v1, pos); return coerceToPath(pos, v1, context, errorCtx); } } /* Any other value should be coercable to a string, interpreted relative to the root filesystem. */ auto path = coerceToString(pos, v, context, errorCtx, false, false, true).toOwned(); if (path == "" || path[0] != '/') error<EvalError>("string '%1%' doesn't represent an absolute path", path).withTrace(pos, errorCtx).debugThrow(); return rootPath(CanonPath(path)); } StorePath EvalState::coerceToStorePath(const PosIdx pos, Value & v, NixStringContext & context, std::string_view errorCtx) { auto path = coerceToString(pos, v, context, errorCtx, false, false, true).toOwned(); if (auto storePath = store->maybeParseStorePath(path)) return *storePath; error<EvalError>("path '%1%' is not in the Nix store", path).withTrace(pos, errorCtx).debugThrow(); } std::pair<SingleDerivedPath, std::string_view> EvalState::coerceToSingleDerivedPathUnchecked(const PosIdx pos, Value & v, std::string_view errorCtx) { NixStringContext context; auto s = forceString(v, context, pos, errorCtx); auto csize = context.size(); if (csize != 1) error<EvalError>( "string '%s' has %d entries in its context. It should only have exactly one entry", s, csize) .withTrace(pos, errorCtx).debugThrow(); auto derivedPath = std::visit(overloaded { [&](NixStringContextElem::Opaque && o) -> SingleDerivedPath { return std::move(o); }, [&](NixStringContextElem::DrvDeep &&) -> SingleDerivedPath { error<EvalError>( "string '%s' has a context which refers to a complete source and binary closure. This is not supported at this time", s).withTrace(pos, errorCtx).debugThrow(); }, [&](NixStringContextElem::Built && b) -> SingleDerivedPath { return std::move(b); }, }, ((NixStringContextElem &&) *context.begin()).raw); return { std::move(derivedPath), std::move(s), }; } SingleDerivedPath EvalState::coerceToSingleDerivedPath(const PosIdx pos, Value & v, std::string_view errorCtx) { auto [derivedPath, s_] = coerceToSingleDerivedPathUnchecked(pos, v, errorCtx); auto s = s_; auto sExpected = mkSingleDerivedPathStringRaw(derivedPath); if (s != sExpected) { /* `std::visit` is used here just to provide a more precise error message. */ std::visit(overloaded { [&](const SingleDerivedPath::Opaque & o) { error<EvalError>( "path string '%s' has context with the different path '%s'", s, sExpected) .withTrace(pos, errorCtx).debugThrow(); }, [&](const SingleDerivedPath::Built & b) { error<EvalError>( "string '%s' has context with the output '%s' from derivation '%s', but the string is not the right placeholder for this derivation output. It should be '%s'", s, b.output, b.drvPath->to_string(*store), sExpected) .withTrace(pos, errorCtx).debugThrow(); } }, derivedPath.raw()); } return derivedPath; } // NOTE: This implementation must match eqValues! // We accept this burden because informative error messages for // `assert a == b; x` are critical for our users' testing UX. void EvalState::assertEqValues(Value & v1, Value & v2, const PosIdx pos, std::string_view errorCtx) { // This implementation must match eqValues. forceValue(v1, pos); forceValue(v2, pos); if (&v1 == &v2) return; // Special case type-compatibility between float and int if ((v1.type() == nInt || v1.type() == nFloat) && (v2.type() == nInt || v2.type() == nFloat)) { if (eqValues(v1, v2, pos, errorCtx)) { return; } else { error<AssertionError>( "%s with value '%s' is not equal to %s with value '%s'", showType(v1), ValuePrinter(*this, v1, errorPrintOptions), showType(v2), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } } if (v1.type() != v2.type()) { error<AssertionError>( "%s of value '%s' is not equal to %s of value '%s'", showType(v1), ValuePrinter(*this, v1, errorPrintOptions), showType(v2), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } switch (v1.type()) { case nInt: if (v1.integer() != v2.integer()) { error<AssertionError>("integer '%d' is not equal to integer '%d'", v1.integer(), v2.integer()).debugThrow(); } return; case nBool: if (v1.boolean() != v2.boolean()) { error<AssertionError>( "boolean '%s' is not equal to boolean '%s'", ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } return; case nString: if (strcmp(v1.c_str(), v2.c_str()) != 0) { error<AssertionError>( "string '%s' is not equal to string '%s'", ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } return; case nPath: if (v1.payload.path.accessor != v2.payload.path.accessor) { error<AssertionError>( "path '%s' is not equal to path '%s' because their accessors are different", ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } if (strcmp(v1.payload.path.path, v2.payload.path.path) != 0) { error<AssertionError>( "path '%s' is not equal to path '%s'", ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } return; case nNull: return; case nList: if (v1.listSize() != v2.listSize()) { error<AssertionError>( "list of size '%d' is not equal to list of size '%d', left hand side is '%s', right hand side is '%s'", v1.listSize(), v2.listSize(), ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } for (size_t n = 0; n < v1.listSize(); ++n) { try { assertEqValues(*v1.listElems()[n], *v2.listElems()[n], pos, errorCtx); } catch (Error & e) { e.addTrace(positions[pos], "while comparing list element %d", n); throw; } } return; case nAttrs: { if (isDerivation(v1) && isDerivation(v2)) { auto i = v1.attrs()->get(sOutPath); auto j = v2.attrs()->get(sOutPath); if (i && j) { try { assertEqValues(*i->value, *j->value, pos, errorCtx); return; } catch (Error & e) { e.addTrace(positions[pos], "while comparing a derivation by its '%s' attribute", "outPath"); throw; } assert(false); } } if (v1.attrs()->size() != v2.attrs()->size()) { error<AssertionError>( "attribute names of attribute set '%s' differs from attribute set '%s'", ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } // Like normal comparison, we compare the attributes in non-deterministic Symbol index order. // This function is called when eqValues has found a difference, so to reliably // report about its result, we should follow in its literal footsteps and not // try anything fancy that could lead to an error. Bindings::const_iterator i, j; for (i = v1.attrs()->begin(), j = v2.attrs()->begin(); i != v1.attrs()->end(); ++i, ++j) { if (i->name != j->name) { // A difference in a sorted list means that one attribute is not contained in the other, but we don't // know which. Let's find out. Could use <, but this is more clear. if (!v2.attrs()->get(i->name)) { error<AssertionError>( "attribute name '%s' is contained in '%s', but not in '%s'", symbols[i->name], ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } if (!v1.attrs()->get(j->name)) { error<AssertionError>( "attribute name '%s' is missing in '%s', but is contained in '%s'", symbols[j->name], ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } assert(false); } try { assertEqValues(*i->value, *j->value, pos, errorCtx); } catch (Error & e) { // The order of traces is reversed, so this presents as // where left hand side is // at <pos> // where right hand side is // at <pos> // while comparing attribute '<name>' if (j->pos != noPos) e.addTrace(positions[j->pos], "where right hand side is"); if (i->pos != noPos) e.addTrace(positions[i->pos], "where left hand side is"); e.addTrace(positions[pos], "while comparing attribute '%s'", symbols[i->name]); throw; } } return; } case nFunction: error<AssertionError>("distinct functions and immediate comparisons of identical functions compare as unequal") .debugThrow(); case nExternal: if (!(*v1.external() == *v2.external())) { error<AssertionError>( "external value '%s' is not equal to external value '%s'", ValuePrinter(*this, v1, errorPrintOptions), ValuePrinter(*this, v2, errorPrintOptions)) .debugThrow(); } return; case nFloat: // !!! if (!(v1.fpoint() == v2.fpoint())) { error<AssertionError>("float '%f' is not equal to float '%f'", v1.fpoint(), v2.fpoint()).debugThrow(); } return; case nThunk: // Must not be left by forceValue assert(false); default: // Note that we pass compiler flags that should make `default:` unreachable. // Also note that this probably ran after `eqValues`, which implements // the same logic more efficiently (without having to unwind stacks), // so maybe `assertEqValues` and `eqValues` are out of sync. Check it for solutions. error<EvalError>("assertEqValues: cannot compare %1% with %2%", showType(v1), showType(v2)).withTrace(pos, errorCtx).panic(); } } // This implementation must match assertEqValues bool EvalState::eqValues(Value & v1, Value & v2, const PosIdx pos, std::string_view errorCtx) { forceValue(v1, pos); forceValue(v2, pos); /* !!! Hack to support some old broken code that relies on pointer equality tests between sets. (Specifically, builderDefs calls uniqList on a list of sets.) Will remove this eventually. */ if (&v1 == &v2) return true; // Special case type-compatibility between float and int if (v1.type() == nInt && v2.type() == nFloat) return v1.integer().value == v2.fpoint(); if (v1.type() == nFloat && v2.type() == nInt) return v1.fpoint() == v2.integer().value; // All other types are not compatible with each other. if (v1.type() != v2.type()) return false; switch (v1.type()) { case nInt: return v1.integer() == v2.integer(); case nBool: return v1.boolean() == v2.boolean(); case nString: return strcmp(v1.c_str(), v2.c_str()) == 0; case nPath: return // FIXME: compare accessors by their fingerprint. v1.payload.path.accessor == v2.payload.path.accessor && strcmp(v1.payload.path.path, v2.payload.path.path) == 0; case nNull: return true; case nList: if (v1.listSize() != v2.listSize()) return false; for (size_t n = 0; n < v1.listSize(); ++n) if (!eqValues(*v1.listElems()[n], *v2.listElems()[n], pos, errorCtx)) return false; return true; case nAttrs: { /* If both sets denote a derivation (type = "derivation"), then compare their outPaths. */ if (isDerivation(v1) && isDerivation(v2)) { auto i = v1.attrs()->get(sOutPath); auto j = v2.attrs()->get(sOutPath); if (i && j) return eqValues(*i->value, *j->value, pos, errorCtx); } if (v1.attrs()->size() != v2.attrs()->size()) return false; /* Otherwise, compare the attributes one by one. */ Bindings::const_iterator i, j; for (i = v1.attrs()->begin(), j = v2.attrs()->begin(); i != v1.attrs()->end(); ++i, ++j) if (i->name != j->name || !eqValues(*i->value, *j->value, pos, errorCtx)) return false; return true; } /* Functions are incomparable. */ case nFunction: return false; case nExternal: return *v1.external() == *v2.external(); case nFloat: // !!! return v1.fpoint() == v2.fpoint(); case nThunk: // Must not be left by forceValue assert(false); default: // Note that we pass compiler flags that should make `default:` unreachable. error<EvalError>("eqValues: cannot compare %1% with %2%", showType(v1), showType(v2)).withTrace(pos, errorCtx).panic(); } } bool EvalState::fullGC() { #if HAVE_BOEHMGC GC_gcollect(); // Check that it ran. We might replace this with a version that uses more // of the boehm API to get this reliably, at a maintenance cost. // We use a 1K margin because technically this has a race condtion, but we // probably won't encounter it in practice, because the CLI isn't concurrent // like that. return GC_get_bytes_since_gc() < 1024; #else return false; #endif } void EvalState::maybePrintStats() { bool showStats = getEnv("NIX_SHOW_STATS").value_or("0") != "0"; if (showStats) { // Make the final heap size more deterministic. #if HAVE_BOEHMGC if (!fullGC()) { warn("failed to perform a full GC before reporting stats"); } #endif printStatistics(); } } void EvalState::printStatistics() { #ifndef _WIN32 // TODO use portable implementation struct rusage buf; getrusage(RUSAGE_SELF, &buf); float cpuTime = buf.ru_utime.tv_sec + ((float) buf.ru_utime.tv_usec / 1000000); #endif uint64_t bEnvs = nrEnvs * sizeof(Env) + nrValuesInEnvs * sizeof(Value *); uint64_t bLists = nrListElems * sizeof(Value *); uint64_t bValues = nrValues * sizeof(Value); uint64_t bAttrsets = nrAttrsets * sizeof(Bindings) + nrAttrsInAttrsets * sizeof(Attr); #if HAVE_BOEHMGC GC_word heapSize, totalBytes; GC_get_heap_usage_safe(&heapSize, 0, 0, 0, &totalBytes); double gcFullOnlyTime = ({ auto ms = GC_get_full_gc_total_time(); ms * 0.001; }); auto gcCycles = getGCCycles(); #endif auto outPath = getEnv("NIX_SHOW_STATS_PATH").value_or("-"); std::fstream fs; if (outPath != "-") fs.open(outPath, std::fstream::out); json topObj = json::object(); #ifndef _WIN32 // TODO implement topObj["cpuTime"] = cpuTime; #endif topObj["time"] = { #ifndef _WIN32 // TODO implement {"cpu", cpuTime}, #endif #if HAVE_BOEHMGC {GC_is_incremental_mode() ? "gcNonIncremental" : "gc", gcFullOnlyTime}, #ifndef _WIN32 // TODO implement {GC_is_incremental_mode() ? "gcNonIncrementalFraction" : "gcFraction", gcFullOnlyTime / cpuTime}, #endif #endif }; topObj["envs"] = { {"number", nrEnvs}, {"elements", nrValuesInEnvs}, {"bytes", bEnvs}, }; topObj["nrExprs"] = Expr::nrExprs; topObj["list"] = { {"elements", nrListElems}, {"bytes", bLists}, {"concats", nrListConcats}, }; topObj["values"] = { {"number", nrValues}, {"bytes", bValues}, }; topObj["symbols"] = { {"number", symbols.size()}, {"bytes", symbols.totalSize()}, }; topObj["sets"] = { {"number", nrAttrsets}, {"bytes", bAttrsets}, {"elements", nrAttrsInAttrsets}, }; topObj["sizes"] = { {"Env", sizeof(Env)}, {"Value", sizeof(Value)}, {"Bindings", sizeof(Bindings)}, {"Attr", sizeof(Attr)}, }; topObj["nrOpUpdates"] = nrOpUpdates; topObj["nrOpUpdateValuesCopied"] = nrOpUpdateValuesCopied; topObj["nrThunks"] = nrThunks; topObj["nrAvoided"] = nrAvoided; topObj["nrLookups"] = nrLookups; topObj["nrPrimOpCalls"] = nrPrimOpCalls; topObj["nrFunctionCalls"] = nrFunctionCalls; #if HAVE_BOEHMGC topObj["gc"] = { {"heapSize", heapSize}, {"totalBytes", totalBytes}, {"cycles", gcCycles}, }; #endif if (countCalls) { topObj["primops"] = primOpCalls; { auto& list = topObj["functions"]; list = json::array(); for (auto & [fun, count] : functionCalls) { json obj = json::object(); if (fun->name) obj["name"] = (std::string_view) symbols[fun->name]; else obj["name"] = nullptr; if (auto pos = positions[fun->pos]) { if (auto path = std::get_if<SourcePath>(&pos.origin)) obj["file"] = path->to_string(); obj["line"] = pos.line; obj["column"] = pos.column; } obj["count"] = count; list.push_back(obj); } } { auto list = topObj["attributes"]; list = json::array(); for (auto & i : attrSelects) { json obj = json::object(); if (auto pos = positions[i.first]) { if (auto path = std::get_if<SourcePath>(&pos.origin)) obj["file"] = path->to_string(); obj["line"] = pos.line; obj["column"] = pos.column; } obj["count"] = i.second; list.push_back(obj); } } } if (getEnv("NIX_SHOW_SYMBOLS").value_or("0") != "0") { // XXX: overrides earlier assignment topObj["symbols"] = json::array(); auto &list = topObj["symbols"]; symbols.dump([&](const std::string & s) { list.emplace_back(s); }); } if (outPath == "-") { std::cerr << topObj.dump(2) << std::endl; } else { fs << topObj.dump(2) << std::endl; } } SourcePath resolveExprPath(SourcePath path, bool addDefaultNix) { unsigned int followCount = 0, maxFollow = 1024; /* If `path' is a symlink, follow it. This is so that relative path references work. */ while (!path.path.isRoot()) { // Basic cycle/depth limit to avoid infinite loops. if (++followCount >= maxFollow) throw Error("too many symbolic links encountered while traversing the path '%s'", path); auto p = path.parent().resolveSymlinks() / path.baseName(); if (p.lstat().type != SourceAccessor::tSymlink) break; path = {path.accessor, CanonPath(p.readLink(), path.path.parent().value_or(CanonPath::root))}; } /* If `path' refers to a directory, append `/default.nix'. */ if (addDefaultNix && path.resolveSymlinks().lstat().type == SourceAccessor::tDirectory) return path / "default.nix"; return path; } Expr * EvalState::parseExprFromFile(const SourcePath & path) { return parseExprFromFile(path, staticBaseEnv); } Expr * EvalState::parseExprFromFile(const SourcePath & path, std::shared_ptr<StaticEnv> & staticEnv) { auto buffer = path.resolveSymlinks().readFile(); // readFile hopefully have left some extra space for terminators buffer.append("\0\0", 2); return parse(buffer.data(), buffer.size(), Pos::Origin(path), path.parent(), staticEnv); } Expr * EvalState::parseExprFromString(std::string s_, const SourcePath & basePath, std::shared_ptr<StaticEnv> & staticEnv) { // NOTE this method (and parseStdin) must take care to *fully copy* their input // into their respective Pos::Origin until the parser stops overwriting its input // data. auto s = make_ref<std::string>(s_); s_.append("\0\0", 2); return parse(s_.data(), s_.size(), Pos::String{.source = s}, basePath, staticEnv); } Expr * EvalState::parseExprFromString(std::string s, const SourcePath & basePath) { return parseExprFromString(std::move(s), basePath, staticBaseEnv); } Expr * EvalState::parseStdin() { // NOTE this method (and parseExprFromString) must take care to *fully copy* their // input into their respective Pos::Origin until the parser stops overwriting its // input data. //Activity act(*logger, lvlTalkative, "parsing standard input"); auto buffer = drainFD(0); // drainFD should have left some extra space for terminators buffer.append("\0\0", 2); auto s = make_ref<std::string>(buffer); return parse(buffer.data(), buffer.size(), Pos::Stdin{.source = s}, rootPath("."), staticBaseEnv); } SourcePath EvalState::findFile(const std::string_view path) { return findFile(lookupPath, path); } SourcePath EvalState::findFile(const LookupPath & lookupPath, const std::string_view path, const PosIdx pos) { for (auto & i : lookupPath.elements) { auto suffixOpt = i.prefix.suffixIfPotentialMatch(path); if (!suffixOpt) continue; auto suffix = *suffixOpt; auto rOpt = resolveLookupPathPath(i.path); if (!rOpt) continue; auto r = *rOpt; Path res = suffix == "" ? r : concatStrings(r, "/", suffix); if (pathExists(res)) return rootPath(CanonPath(canonPath(res))); } if (hasPrefix(path, "nix/")) return {corepkgsFS, CanonPath(path.substr(3))}; error<ThrownError>( settings.pureEval ? "cannot look up '<%s>' in pure evaluation mode (use '--impure' to override)" : "file '%s' was not found in the Nix search path (add it using $NIX_PATH or -I)", path ).atPos(pos).debugThrow(); } std::optional<std::string> EvalState::resolveLookupPathPath(const LookupPath::Path & value0, bool initAccessControl) { auto & value = value0.s; auto i = lookupPathResolved.find(value); if (i != lookupPathResolved.end()) return i->second; auto finish = [&](std::string res) { debug("resolved search path element '%s' to '%s'", value, res); lookupPathResolved.emplace(value, res); return res; }; if (EvalSettings::isPseudoUrl(value)) { try { auto accessor = fetchers::downloadTarball( store, fetchSettings, EvalSettings::resolvePseudoUrl(value)); auto storePath = fetchToStore(*store, SourcePath(accessor), FetchMode::Copy); return finish(store->toRealPath(storePath)); } catch (Error & e) { logWarning({ .msg = HintFmt("Nix search path entry '%1%' cannot be downloaded, ignoring", value) }); } } if (auto colPos = value.find(':'); colPos != value.npos) { auto scheme = value.substr(0, colPos); auto rest = value.substr(colPos + 1); if (auto * hook = get(settings.lookupPathHooks, scheme)) { auto res = (*hook)(store, rest); if (res) return finish(std::move(*res)); } } { auto path = absPath(value); /* Allow access to paths in the search path. */ if (initAccessControl) { allowPath(path); if (store->isInStore(path)) { try { StorePathSet closure; store->computeFSClosure(store->toStorePath(path).first, closure); for (auto & p : closure) allowPath(p); } catch (InvalidPath &) { } } } if (pathExists(path)) return finish(std::move(path)); else { logWarning({ .msg = HintFmt("Nix search path entry '%1%' does not exist, ignoring", value) }); } } debug("failed to resolve search path element '%s'", value); return std::nullopt; } Expr * EvalState::parse( char * text, size_t length, Pos::Origin origin, const SourcePath & basePath, std::shared_ptr<StaticEnv> & staticEnv) { DocCommentMap tmpDocComments; // Only used when not origin is not a SourcePath DocCommentMap *docComments = &tmpDocComments; if (auto sourcePath = std::get_if<SourcePath>(&origin)) { auto [it, _] = positionToDocComment.try_emplace(*sourcePath); docComments = &it->second; } auto result = parseExprFromBuf(text, length, origin, basePath, symbols, settings, positions, *docComments, rootFS, exprSymbols); result->bindVars(*this, staticEnv); return result; } DocComment EvalState::getDocCommentForPos(PosIdx pos) { auto pos2 = positions[pos]; auto path = pos2.getSourcePath(); if (!path) return {}; auto table = positionToDocComment.find(*path); if (table == positionToDocComment.end()) return {}; auto it = table->second.find(pos); if (it == table->second.end()) return {}; return it->second; } std::string ExternalValueBase::coerceToString(EvalState & state, const PosIdx & pos, NixStringContext & context, bool copyMore, bool copyToStore) const { state.error<TypeError>( "cannot coerce %1% to a string: %2%", showType(), *this ).atPos(pos).debugThrow(); } bool ExternalValueBase::operator==(const ExternalValueBase & b) const noexcept { return false; } std::ostream & operator << (std::ostream & str, const ExternalValueBase & v) { return v.print(str); } }
103,156
C++
.cc
2,700
29.462963
182
0.575607
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,017
value-to-xml.cc
NixOS_nix/src/libexpr/value-to-xml.cc
#include "value-to-xml.hh" #include "xml-writer.hh" #include "eval-inline.hh" #include "signals.hh" #include <cstdlib> namespace nix { static XMLAttrs singletonAttrs(const std::string & name, std::string_view value) { XMLAttrs attrs; attrs[name] = value; return attrs; } static void printValueAsXML(EvalState & state, bool strict, bool location, Value & v, XMLWriter & doc, NixStringContext & context, PathSet & drvsSeen, const PosIdx pos); static void posToXML(EvalState & state, XMLAttrs & xmlAttrs, const Pos & pos) { if (auto path = std::get_if<SourcePath>(&pos.origin)) xmlAttrs["path"] = path->path.abs(); xmlAttrs["line"] = fmt("%1%", pos.line); xmlAttrs["column"] = fmt("%1%", pos.column); } static void showAttrs(EvalState & state, bool strict, bool location, const Bindings & attrs, XMLWriter & doc, NixStringContext & context, PathSet & drvsSeen) { StringSet names; for (auto & a : attrs.lexicographicOrder(state.symbols)) { XMLAttrs xmlAttrs; xmlAttrs["name"] = state.symbols[a->name]; if (location && a->pos) posToXML(state, xmlAttrs, state.positions[a->pos]); XMLOpenElement _(doc, "attr", xmlAttrs); printValueAsXML(state, strict, location, *a->value, doc, context, drvsSeen, a->pos); } } static void printValueAsXML(EvalState & state, bool strict, bool location, Value & v, XMLWriter & doc, NixStringContext & context, PathSet & drvsSeen, const PosIdx pos) { checkInterrupt(); if (strict) state.forceValue(v, pos); switch (v.type()) { case nInt: doc.writeEmptyElement("int", singletonAttrs("value", fmt("%1%", v.integer()))); break; case nBool: doc.writeEmptyElement("bool", singletonAttrs("value", v.boolean() ? "true" : "false")); break; case nString: /* !!! show the context? */ copyContext(v, context); doc.writeEmptyElement("string", singletonAttrs("value", v.c_str())); break; case nPath: doc.writeEmptyElement("path", singletonAttrs("value", v.path().to_string())); break; case nNull: doc.writeEmptyElement("null"); break; case nAttrs: if (state.isDerivation(v)) { XMLAttrs xmlAttrs; Path drvPath; if (auto a = v.attrs()->get(state.sDrvPath)) { if (strict) state.forceValue(*a->value, a->pos); if (a->value->type() == nString) xmlAttrs["drvPath"] = drvPath = a->value->c_str(); } if (auto a = v.attrs()->get(state.sOutPath)) { if (strict) state.forceValue(*a->value, a->pos); if (a->value->type() == nString) xmlAttrs["outPath"] = a->value->c_str(); } XMLOpenElement _(doc, "derivation", xmlAttrs); if (drvPath != "" && drvsSeen.insert(drvPath).second) showAttrs(state, strict, location, *v.attrs(), doc, context, drvsSeen); else doc.writeEmptyElement("repeated"); } else { XMLOpenElement _(doc, "attrs"); showAttrs(state, strict, location, *v.attrs(), doc, context, drvsSeen); } break; case nList: { XMLOpenElement _(doc, "list"); for (auto v2 : v.listItems()) printValueAsXML(state, strict, location, *v2, doc, context, drvsSeen, pos); break; } case nFunction: { if (!v.isLambda()) { // FIXME: Serialize primops and primopapps doc.writeEmptyElement("unevaluated"); break; } XMLAttrs xmlAttrs; if (location) posToXML(state, xmlAttrs, state.positions[v.payload.lambda.fun->pos]); XMLOpenElement _(doc, "function", xmlAttrs); if (v.payload.lambda.fun->hasFormals()) { XMLAttrs attrs; if (v.payload.lambda.fun->arg) attrs["name"] = state.symbols[v.payload.lambda.fun->arg]; if (v.payload.lambda.fun->formals->ellipsis) attrs["ellipsis"] = "1"; XMLOpenElement _(doc, "attrspat", attrs); for (auto & i : v.payload.lambda.fun->formals->lexicographicOrder(state.symbols)) doc.writeEmptyElement("attr", singletonAttrs("name", state.symbols[i.name])); } else doc.writeEmptyElement("varpat", singletonAttrs("name", state.symbols[v.payload.lambda.fun->arg])); break; } case nExternal: v.external()->printValueAsXML(state, strict, location, doc, context, drvsSeen, pos); break; case nFloat: doc.writeEmptyElement("float", singletonAttrs("value", fmt("%1%", v.fpoint()))); break; case nThunk: doc.writeEmptyElement("unevaluated"); } } void ExternalValueBase::printValueAsXML(EvalState & state, bool strict, bool location, XMLWriter & doc, NixStringContext & context, PathSet & drvsSeen, const PosIdx pos) const { doc.writeEmptyElement("unevaluated"); } void printValueAsXML(EvalState & state, bool strict, bool location, Value & v, std::ostream & out, NixStringContext & context, const PosIdx pos) { XMLWriter doc(true, out); XMLOpenElement root(doc, "expr"); PathSet drvsSeen; printValueAsXML(state, strict, location, v, doc, context, drvsSeen, pos); } }
5,697
C++
.cc
135
32.088889
114
0.582065
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,018
function-trace.cc
NixOS_nix/src/libexpr/function-trace.cc
#include "function-trace.hh" #include "logging.hh" namespace nix { FunctionCallTrace::FunctionCallTrace(const Pos & pos) : pos(pos) { auto duration = std::chrono::high_resolution_clock::now().time_since_epoch(); auto ns = std::chrono::duration_cast<std::chrono::nanoseconds>(duration); printMsg(lvlInfo, "function-trace entered %1% at %2%", pos, ns.count()); } FunctionCallTrace::~FunctionCallTrace() { auto duration = std::chrono::high_resolution_clock::now().time_since_epoch(); auto ns = std::chrono::duration_cast<std::chrono::nanoseconds>(duration); printMsg(lvlInfo, "function-trace exited %1% at %2%", pos, ns.count()); } }
659
C++
.cc
14
44.071429
81
0.711388
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
true
false
false
true
false
false
11,019
attr-path.cc
NixOS_nix/src/libexpr/attr-path.cc
#include "attr-path.hh" #include "eval-inline.hh" namespace nix { static Strings parseAttrPath(std::string_view s) { Strings res; std::string cur; auto i = s.begin(); while (i != s.end()) { if (*i == '.') { res.push_back(cur); cur.clear(); } else if (*i == '"') { ++i; while (1) { if (i == s.end()) throw ParseError("missing closing quote in selection path '%1%'", s); if (*i == '"') break; cur.push_back(*i++); } } else cur.push_back(*i); ++i; } if (!cur.empty()) res.push_back(cur); return res; } std::vector<Symbol> parseAttrPath(EvalState & state, std::string_view s) { std::vector<Symbol> res; for (auto & a : parseAttrPath(s)) res.push_back(state.symbols.create(a)); return res; } std::pair<Value *, PosIdx> findAlongAttrPath(EvalState & state, const std::string & attrPath, Bindings & autoArgs, Value & vIn) { Strings tokens = parseAttrPath(attrPath); Value * v = &vIn; PosIdx pos = noPos; for (auto & attr : tokens) { /* Is i an index (integer) or a normal attribute name? */ auto attrIndex = string2Int<unsigned int>(attr); /* Evaluate the expression. */ Value * vNew = state.allocValue(); state.autoCallFunction(autoArgs, *v, *vNew); v = vNew; state.forceValue(*v, noPos); /* It should evaluate to either a set or an expression, according to what is specified in the attrPath. */ if (!attrIndex) { if (v->type() != nAttrs) state.error<TypeError>( "the expression selected by the selection path '%1%' should be a set but is %2%", attrPath, showType(*v)).debugThrow(); if (attr.empty()) throw Error("empty attribute name in selection path '%1%'", attrPath); auto a = v->attrs()->get(state.symbols.create(attr)); if (!a) { std::set<std::string> attrNames; for (auto & attr : *v->attrs()) attrNames.insert(std::string(state.symbols[attr.name])); auto suggestions = Suggestions::bestMatches(attrNames, attr); throw AttrPathNotFound(suggestions, "attribute '%1%' in selection path '%2%' not found", attr, attrPath); } v = &*a->value; pos = a->pos; } else { if (!v->isList()) state.error<TypeError>( "the expression selected by the selection path '%1%' should be a list but is %2%", attrPath, showType(*v)).debugThrow(); if (*attrIndex >= v->listSize()) throw AttrPathNotFound("list index %1% in selection path '%2%' is out of range", *attrIndex, attrPath); v = v->listElems()[*attrIndex]; pos = noPos; } } return {v, pos}; } std::pair<SourcePath, uint32_t> findPackageFilename(EvalState & state, Value & v, std::string what) { Value * v2; try { auto dummyArgs = state.allocBindings(0); v2 = findAlongAttrPath(state, "meta.position", *dummyArgs, v).first; } catch (Error &) { throw NoPositionInfo("package '%s' has no source location information", what); } // FIXME: is it possible to extract the Pos object instead of doing this // toString + parsing? NixStringContext context; auto path = state.coerceToPath(noPos, *v2, context, "while evaluating the 'meta.position' attribute of a derivation"); auto fn = path.path.abs(); auto fail = [fn]() { throw ParseError("cannot parse 'meta.position' attribute '%s'", fn); }; try { auto colon = fn.rfind(':'); if (colon == std::string::npos) fail(); std::string filename(fn, 0, colon); auto lineno = std::stoi(std::string(fn, colon + 1, std::string::npos)); return {SourcePath{path.accessor, CanonPath(fn.substr(0, colon))}, lineno}; } catch (std::invalid_argument & e) { fail(); unreachable(); } } }
4,282
C++
.cc
112
28.9375
122
0.552415
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,020
value-to-json.cc
NixOS_nix/src/libexpr/value-to-json.cc
#include "value-to-json.hh" #include "eval-inline.hh" #include "store-api.hh" #include "signals.hh" #include <cstdlib> #include <iomanip> #include <nlohmann/json.hpp> namespace nix { using json = nlohmann::json; json printValueAsJSON(EvalState & state, bool strict, Value & v, const PosIdx pos, NixStringContext & context, bool copyToStore) { checkInterrupt(); if (strict) state.forceValue(v, pos); json out; switch (v.type()) { case nInt: out = v.integer().value; break; case nBool: out = v.boolean(); break; case nString: copyContext(v, context); out = v.c_str(); break; case nPath: if (copyToStore) out = state.store->printStorePath( state.copyPathToStore(context, v.path())); else out = v.path().path.abs(); break; case nNull: // already initialized as null break; case nAttrs: { auto maybeString = state.tryAttrsToString(pos, v, context, false, false); if (maybeString) { out = *maybeString; break; } if (auto i = v.attrs()->get(state.sOutPath)) return printValueAsJSON(state, strict, *i->value, i->pos, context, copyToStore); else { out = json::object(); for (auto & a : v.attrs()->lexicographicOrder(state.symbols)) { try { out.emplace(state.symbols[a->name], printValueAsJSON(state, strict, *a->value, a->pos, context, copyToStore)); } catch (Error & e) { e.addTrace(state.positions[a->pos], HintFmt("while evaluating attribute '%1%'", state.symbols[a->name])); throw; } } } break; } case nList: { out = json::array(); int i = 0; for (auto elem : v.listItems()) { try { out.push_back(printValueAsJSON(state, strict, *elem, pos, context, copyToStore)); } catch (Error & e) { e.addTrace(state.positions[pos], HintFmt("while evaluating list element at index %1%", i)); throw; } i++; } break; } case nExternal: return v.external()->printValueAsJSON(state, strict, context, copyToStore); break; case nFloat: out = v.fpoint(); break; case nThunk: case nFunction: state.error<TypeError>( "cannot convert %1% to JSON", showType(v) ) .atPos(v.determinePos(pos)) .debugThrow(); } return out; } void printValueAsJSON(EvalState & state, bool strict, Value & v, const PosIdx pos, std::ostream & str, NixStringContext & context, bool copyToStore) { str << printValueAsJSON(state, strict, v, pos, context, copyToStore); } json ExternalValueBase::printValueAsJSON(EvalState & state, bool strict, NixStringContext & context, bool copyToStore) const { state.error<TypeError>("cannot convert %1% to JSON", showType()) .debugThrow(); } }
3,470
C++
.cc
102
22.784314
134
0.517622
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,021
lexer-helpers.cc
NixOS_nix/src/libexpr/lexer-helpers.cc
#include "lexer-tab.hh" #include "lexer-helpers.hh" #include "parser-tab.hh" void nix::lexer::internal::initLoc(YYLTYPE * loc) { loc->beginOffset = loc->endOffset = 0; } void nix::lexer::internal::adjustLoc(yyscan_t yyscanner, YYLTYPE * loc, const char * s, size_t len) { loc->stash(); LexerState & lexerState = *yyget_extra(yyscanner); if (lexerState.docCommentDistance == 1) { // Preceding token was a doc comment. ParserLocation doc; doc.beginOffset = lexerState.lastDocCommentLoc.beginOffset; ParserLocation docEnd; docEnd.beginOffset = lexerState.lastDocCommentLoc.endOffset; DocComment docComment{lexerState.at(doc), lexerState.at(docEnd)}; PosIdx locPos = lexerState.at(*loc); lexerState.positionToDocComment.emplace(locPos, docComment); } lexerState.docCommentDistance++; loc->beginOffset = loc->endOffset; loc->endOffset += len; }
941
C++
.cc
25
32.6
99
0.705818
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,022
print-ambiguous.cc
NixOS_nix/src/libexpr/print-ambiguous.cc
#include "print-ambiguous.hh" #include "print.hh" #include "signals.hh" #include "eval.hh" namespace nix { // See: https://github.com/NixOS/nix/issues/9730 void printAmbiguous( Value &v, const SymbolTable &symbols, std::ostream &str, std::set<const void *> *seen, int depth) { checkInterrupt(); if (depth <= 0) { str << "«too deep»"; return; } switch (v.type()) { case nInt: str << v.integer(); break; case nBool: printLiteralBool(str, v.boolean()); break; case nString: printLiteralString(str, v.string_view()); break; case nPath: str << v.path().to_string(); // !!! escaping? break; case nNull: str << "null"; break; case nAttrs: { if (seen && !v.attrs()->empty() && !seen->insert(v.attrs()).second) str << "«repeated»"; else { str << "{ "; for (auto & i : v.attrs()->lexicographicOrder(symbols)) { str << symbols[i->name] << " = "; printAmbiguous(*i->value, symbols, str, seen, depth - 1); str << "; "; } str << "}"; } break; } case nList: if (seen && v.listSize() && !seen->insert(v.listElems()).second) str << "«repeated»"; else { str << "[ "; for (auto v2 : v.listItems()) { if (v2) printAmbiguous(*v2, symbols, str, seen, depth - 1); else str << "(nullptr)"; str << " "; } str << "]"; } break; case nThunk: if (!v.isBlackhole()) { str << "<CODE>"; } else { // Although we know for sure that it's going to be an infinite recursion // when this value is accessed _in the current context_, it's likely // that the user will misinterpret a simpler «infinite recursion» output // as a definitive statement about the value, while in fact it may be // a valid value after `builtins.trace` and perhaps some other steps // have completed. str << "«potential infinite recursion»"; } break; case nFunction: if (v.isLambda()) { str << "<LAMBDA>"; } else if (v.isPrimOp()) { str << "<PRIMOP>"; } else if (v.isPrimOpApp()) { str << "<PRIMOP-APP>"; } break; case nExternal: str << *v.external(); break; case nFloat: str << v.fpoint(); break; default: printError("Nix evaluator internal error: printAmbiguous: invalid value type"); unreachable(); } } }
2,818
C++
.cc
97
20.072165
87
0.49058
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,023
eval-cache.cc
NixOS_nix/src/libexpr/eval-cache.cc
#include "users.hh" #include "eval-cache.hh" #include "sqlite.hh" #include "eval.hh" #include "eval-inline.hh" #include "store-api.hh" // Need specialization involving `SymbolStr` just in this one module. #include "strings-inline.hh" namespace nix::eval_cache { CachedEvalError::CachedEvalError(ref<AttrCursor> cursor, Symbol attr) : EvalError(cursor->root->state, "cached failure of attribute '%s'", cursor->getAttrPathStr(attr)) , cursor(cursor), attr(attr) { } void CachedEvalError::force() { auto & v = cursor->forceValue(); if (v.type() == nAttrs) { auto a = v.attrs()->get(this->attr); state.forceValue(*a->value, a->pos); } // Shouldn't happen. throw EvalError(state, "evaluation of cached failed attribute '%s' unexpectedly succeeded", cursor->getAttrPathStr(attr)); } static const char * schema = R"sql( create table if not exists Attributes ( parent integer not null, name text, type integer not null, value text, context text, primary key (parent, name) ); )sql"; struct AttrDb { std::atomic_bool failed{false}; const StoreDirConfig & cfg; struct State { SQLite db; SQLiteStmt insertAttribute; SQLiteStmt insertAttributeWithContext; SQLiteStmt queryAttribute; SQLiteStmt queryAttributes; std::unique_ptr<SQLiteTxn> txn; }; std::unique_ptr<Sync<State>> _state; SymbolTable & symbols; AttrDb( const StoreDirConfig & cfg, const Hash & fingerprint, SymbolTable & symbols) : cfg(cfg) , _state(std::make_unique<Sync<State>>()) , symbols(symbols) { auto state(_state->lock()); Path cacheDir = getCacheDir() + "/eval-cache-v5"; createDirs(cacheDir); Path dbPath = cacheDir + "/" + fingerprint.to_string(HashFormat::Base16, false) + ".sqlite"; state->db = SQLite(dbPath); state->db.isCache(); state->db.exec(schema); state->insertAttribute.create(state->db, "insert or replace into Attributes(parent, name, type, value) values (?, ?, ?, ?)"); state->insertAttributeWithContext.create(state->db, "insert or replace into Attributes(parent, name, type, value, context) values (?, ?, ?, ?, ?)"); state->queryAttribute.create(state->db, "select rowid, type, value, context from Attributes where parent = ? and name = ?"); state->queryAttributes.create(state->db, "select name from Attributes where parent = ?"); state->txn = std::make_unique<SQLiteTxn>(state->db); } ~AttrDb() { try { auto state(_state->lock()); if (!failed && state->txn->active) state->txn->commit(); state->txn.reset(); } catch (...) { ignoreExceptionInDestructor(); } } template<typename F> AttrId doSQLite(F && fun) { if (failed) return 0; try { return fun(); } catch (SQLiteError &) { ignoreExceptionExceptInterrupt(); failed = true; return 0; } } AttrId setAttrs( AttrKey key, const std::vector<Symbol> & attrs) { return doSQLite([&]() { auto state(_state->lock()); state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::FullAttrs) (0, false).exec(); AttrId rowId = state->db.getLastInsertedRowId(); assert(rowId); for (auto & attr : attrs) state->insertAttribute.use() (rowId) (symbols[attr]) (AttrType::Placeholder) (0, false).exec(); return rowId; }); } AttrId setString( AttrKey key, std::string_view s, const char * * context = nullptr) { return doSQLite([&]() { auto state(_state->lock()); if (context) { std::string ctx; for (const char * * p = context; *p; ++p) { if (p != context) ctx.push_back(' '); ctx.append(*p); } state->insertAttributeWithContext.use() (key.first) (symbols[key.second]) (AttrType::String) (s) (ctx).exec(); } else { state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::String) (s).exec(); } return state->db.getLastInsertedRowId(); }); } AttrId setBool( AttrKey key, bool b) { return doSQLite([&]() { auto state(_state->lock()); state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::Bool) (b ? 1 : 0).exec(); return state->db.getLastInsertedRowId(); }); } AttrId setInt( AttrKey key, int n) { return doSQLite([&]() { auto state(_state->lock()); state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::Int) (n).exec(); return state->db.getLastInsertedRowId(); }); } AttrId setListOfStrings( AttrKey key, const std::vector<std::string> & l) { return doSQLite([&]() { auto state(_state->lock()); state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::ListOfStrings) (dropEmptyInitThenConcatStringsSep("\t", l)).exec(); return state->db.getLastInsertedRowId(); }); } AttrId setPlaceholder(AttrKey key) { return doSQLite([&]() { auto state(_state->lock()); state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::Placeholder) (0, false).exec(); return state->db.getLastInsertedRowId(); }); } AttrId setMissing(AttrKey key) { return doSQLite([&]() { auto state(_state->lock()); state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::Missing) (0, false).exec(); return state->db.getLastInsertedRowId(); }); } AttrId setMisc(AttrKey key) { return doSQLite([&]() { auto state(_state->lock()); state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::Misc) (0, false).exec(); return state->db.getLastInsertedRowId(); }); } AttrId setFailed(AttrKey key) { return doSQLite([&]() { auto state(_state->lock()); state->insertAttribute.use() (key.first) (symbols[key.second]) (AttrType::Failed) (0, false).exec(); return state->db.getLastInsertedRowId(); }); } std::optional<std::pair<AttrId, AttrValue>> getAttr(AttrKey key) { auto state(_state->lock()); auto queryAttribute(state->queryAttribute.use()(key.first)(symbols[key.second])); if (!queryAttribute.next()) return {}; auto rowId = (AttrId) queryAttribute.getInt(0); auto type = (AttrType) queryAttribute.getInt(1); switch (type) { case AttrType::Placeholder: return {{rowId, placeholder_t()}}; case AttrType::FullAttrs: { // FIXME: expensive, should separate this out. std::vector<Symbol> attrs; auto queryAttributes(state->queryAttributes.use()(rowId)); while (queryAttributes.next()) attrs.emplace_back(symbols.create(queryAttributes.getStr(0))); return {{rowId, attrs}}; } case AttrType::String: { NixStringContext context; if (!queryAttribute.isNull(3)) for (auto & s : tokenizeString<std::vector<std::string>>(queryAttribute.getStr(3), ";")) context.insert(NixStringContextElem::parse(s)); return {{rowId, string_t{queryAttribute.getStr(2), context}}}; } case AttrType::Bool: return {{rowId, queryAttribute.getInt(2) != 0}}; case AttrType::Int: return {{rowId, int_t{NixInt{queryAttribute.getInt(2)}}}}; case AttrType::ListOfStrings: return {{rowId, tokenizeString<std::vector<std::string>>(queryAttribute.getStr(2), "\t")}}; case AttrType::Missing: return {{rowId, missing_t()}}; case AttrType::Misc: return {{rowId, misc_t()}}; case AttrType::Failed: return {{rowId, failed_t()}}; default: throw Error("unexpected type in evaluation cache"); } } }; static std::shared_ptr<AttrDb> makeAttrDb( const StoreDirConfig & cfg, const Hash & fingerprint, SymbolTable & symbols) { try { return std::make_shared<AttrDb>(cfg, fingerprint, symbols); } catch (SQLiteError &) { ignoreExceptionExceptInterrupt(); return nullptr; } } EvalCache::EvalCache( std::optional<std::reference_wrapper<const Hash>> useCache, EvalState & state, RootLoader rootLoader) : db(useCache ? makeAttrDb(*state.store, *useCache, state.symbols) : nullptr) , state(state) , rootLoader(rootLoader) { } Value * EvalCache::getRootValue() { if (!value) { debug("getting root value"); value = allocRootValue(rootLoader()); } return *value; } ref<AttrCursor> EvalCache::getRoot() { return make_ref<AttrCursor>(ref(shared_from_this()), std::nullopt); } AttrCursor::AttrCursor( ref<EvalCache> root, Parent parent, Value * value, std::optional<std::pair<AttrId, AttrValue>> && cachedValue) : root(root), parent(parent), cachedValue(std::move(cachedValue)) { if (value) _value = allocRootValue(value); } AttrKey AttrCursor::getKey() { if (!parent) return {0, root->state.sEpsilon}; if (!parent->first->cachedValue) { parent->first->cachedValue = root->db->getAttr(parent->first->getKey()); assert(parent->first->cachedValue); } return {parent->first->cachedValue->first, parent->second}; } Value & AttrCursor::getValue() { if (!_value) { if (parent) { auto & vParent = parent->first->getValue(); root->state.forceAttrs(vParent, noPos, "while searching for an attribute"); auto attr = vParent.attrs()->get(parent->second); if (!attr) throw Error("attribute '%s' is unexpectedly missing", getAttrPathStr()); _value = allocRootValue(attr->value); } else _value = allocRootValue(root->getRootValue()); } return **_value; } std::vector<Symbol> AttrCursor::getAttrPath() const { if (parent) { auto attrPath = parent->first->getAttrPath(); attrPath.push_back(parent->second); return attrPath; } else return {}; } std::vector<Symbol> AttrCursor::getAttrPath(Symbol name) const { auto attrPath = getAttrPath(); attrPath.push_back(name); return attrPath; } std::string AttrCursor::getAttrPathStr() const { return dropEmptyInitThenConcatStringsSep(".", root->state.symbols.resolve(getAttrPath())); } std::string AttrCursor::getAttrPathStr(Symbol name) const { return dropEmptyInitThenConcatStringsSep(".", root->state.symbols.resolve(getAttrPath(name))); } Value & AttrCursor::forceValue() { debug("evaluating uncached attribute '%s'", getAttrPathStr()); auto & v = getValue(); try { root->state.forceValue(v, noPos); } catch (EvalError &) { debug("setting '%s' to failed", getAttrPathStr()); if (root->db) cachedValue = {root->db->setFailed(getKey()), failed_t()}; throw; } if (root->db && (!cachedValue || std::get_if<placeholder_t>(&cachedValue->second))) { if (v.type() == nString) cachedValue = {root->db->setString(getKey(), v.c_str(), v.context()), string_t{v.c_str(), {}}}; else if (v.type() == nPath) { auto path = v.path().path; cachedValue = {root->db->setString(getKey(), path.abs()), string_t{path.abs(), {}}}; } else if (v.type() == nBool) cachedValue = {root->db->setBool(getKey(), v.boolean()), v.boolean()}; else if (v.type() == nInt) cachedValue = {root->db->setInt(getKey(), v.integer().value), int_t{v.integer()}}; else if (v.type() == nAttrs) ; // FIXME: do something? else cachedValue = {root->db->setMisc(getKey()), misc_t()}; } return v; } Suggestions AttrCursor::getSuggestionsForAttr(Symbol name) { auto attrNames = getAttrs(); std::set<std::string> strAttrNames; for (auto & name : attrNames) strAttrNames.insert(std::string(root->state.symbols[name])); return Suggestions::bestMatches(strAttrNames, root->state.symbols[name]); } std::shared_ptr<AttrCursor> AttrCursor::maybeGetAttr(Symbol name) { if (root->db) { if (!cachedValue) cachedValue = root->db->getAttr(getKey()); if (cachedValue) { if (auto attrs = std::get_if<std::vector<Symbol>>(&cachedValue->second)) { for (auto & attr : *attrs) if (attr == name) return std::make_shared<AttrCursor>(root, std::make_pair(shared_from_this(), attr)); return nullptr; } else if (std::get_if<placeholder_t>(&cachedValue->second)) { auto attr = root->db->getAttr({cachedValue->first, name}); if (attr) { if (std::get_if<missing_t>(&attr->second)) return nullptr; else if (std::get_if<failed_t>(&attr->second)) throw CachedEvalError(ref(shared_from_this()), name); else return std::make_shared<AttrCursor>(root, std::make_pair(shared_from_this(), name), nullptr, std::move(attr)); } // Incomplete attrset, so need to fall thru and // evaluate to see whether 'name' exists } else return nullptr; //error<TypeError>("'%s' is not an attribute set", getAttrPathStr()).debugThrow(); } } auto & v = forceValue(); if (v.type() != nAttrs) return nullptr; //error<TypeError>("'%s' is not an attribute set", getAttrPathStr()).debugThrow(); auto attr = v.attrs()->get(name); if (!attr) { if (root->db) { if (!cachedValue) cachedValue = {root->db->setPlaceholder(getKey()), placeholder_t()}; root->db->setMissing({cachedValue->first, name}); } return nullptr; } std::optional<std::pair<AttrId, AttrValue>> cachedValue2; if (root->db) { if (!cachedValue) cachedValue = {root->db->setPlaceholder(getKey()), placeholder_t()}; cachedValue2 = {root->db->setPlaceholder({cachedValue->first, name}), placeholder_t()}; } return make_ref<AttrCursor>( root, std::make_pair(shared_from_this(), name), attr->value, std::move(cachedValue2)); } std::shared_ptr<AttrCursor> AttrCursor::maybeGetAttr(std::string_view name) { return maybeGetAttr(root->state.symbols.create(name)); } ref<AttrCursor> AttrCursor::getAttr(Symbol name) { auto p = maybeGetAttr(name); if (!p) throw Error("attribute '%s' does not exist", getAttrPathStr(name)); return ref(p); } ref<AttrCursor> AttrCursor::getAttr(std::string_view name) { return getAttr(root->state.symbols.create(name)); } OrSuggestions<ref<AttrCursor>> AttrCursor::findAlongAttrPath(const std::vector<Symbol> & attrPath) { auto res = shared_from_this(); for (auto & attr : attrPath) { auto child = res->maybeGetAttr(attr); if (!child) { auto suggestions = res->getSuggestionsForAttr(attr); return OrSuggestions<ref<AttrCursor>>::failed(suggestions); } res = child; } return ref(res); } std::string AttrCursor::getString() { if (root->db) { if (!cachedValue) cachedValue = root->db->getAttr(getKey()); if (cachedValue && !std::get_if<placeholder_t>(&cachedValue->second)) { if (auto s = std::get_if<string_t>(&cachedValue->second)) { debug("using cached string attribute '%s'", getAttrPathStr()); return s->first; } else root->state.error<TypeError>("'%s' is not a string", getAttrPathStr()).debugThrow(); } } auto & v = forceValue(); if (v.type() != nString && v.type() != nPath) root->state.error<TypeError>("'%s' is not a string but %s", getAttrPathStr(), showType(v)).debugThrow(); return v.type() == nString ? v.c_str() : v.path().to_string(); } string_t AttrCursor::getStringWithContext() { if (root->db) { if (!cachedValue) cachedValue = root->db->getAttr(getKey()); if (cachedValue && !std::get_if<placeholder_t>(&cachedValue->second)) { if (auto s = std::get_if<string_t>(&cachedValue->second)) { bool valid = true; for (auto & c : s->second) { const StorePath & path = std::visit(overloaded { [&](const NixStringContextElem::DrvDeep & d) -> const StorePath & { return d.drvPath; }, [&](const NixStringContextElem::Built & b) -> const StorePath & { return b.drvPath->getBaseStorePath(); }, [&](const NixStringContextElem::Opaque & o) -> const StorePath & { return o.path; }, }, c.raw); if (!root->state.store->isValidPath(path)) { valid = false; break; } } if (valid) { debug("using cached string attribute '%s'", getAttrPathStr()); return *s; } } else root->state.error<TypeError>("'%s' is not a string", getAttrPathStr()).debugThrow(); } } auto & v = forceValue(); if (v.type() == nString) { NixStringContext context; copyContext(v, context); return {v.c_str(), std::move(context)}; } else if (v.type() == nPath) return {v.path().to_string(), {}}; else root->state.error<TypeError>("'%s' is not a string but %s", getAttrPathStr(), showType(v)).debugThrow(); } bool AttrCursor::getBool() { if (root->db) { if (!cachedValue) cachedValue = root->db->getAttr(getKey()); if (cachedValue && !std::get_if<placeholder_t>(&cachedValue->second)) { if (auto b = std::get_if<bool>(&cachedValue->second)) { debug("using cached Boolean attribute '%s'", getAttrPathStr()); return *b; } else root->state.error<TypeError>("'%s' is not a Boolean", getAttrPathStr()).debugThrow(); } } auto & v = forceValue(); if (v.type() != nBool) root->state.error<TypeError>("'%s' is not a Boolean", getAttrPathStr()).debugThrow(); return v.boolean(); } NixInt AttrCursor::getInt() { if (root->db) { if (!cachedValue) cachedValue = root->db->getAttr(getKey()); if (cachedValue && !std::get_if<placeholder_t>(&cachedValue->second)) { if (auto i = std::get_if<int_t>(&cachedValue->second)) { debug("using cached integer attribute '%s'", getAttrPathStr()); return i->x; } else root->state.error<TypeError>("'%s' is not an integer", getAttrPathStr()).debugThrow(); } } auto & v = forceValue(); if (v.type() != nInt) root->state.error<TypeError>("'%s' is not an integer", getAttrPathStr()).debugThrow(); return v.integer(); } std::vector<std::string> AttrCursor::getListOfStrings() { if (root->db) { if (!cachedValue) cachedValue = root->db->getAttr(getKey()); if (cachedValue && !std::get_if<placeholder_t>(&cachedValue->second)) { if (auto l = std::get_if<std::vector<std::string>>(&cachedValue->second)) { debug("using cached list of strings attribute '%s'", getAttrPathStr()); return *l; } else root->state.error<TypeError>("'%s' is not a list of strings", getAttrPathStr()).debugThrow(); } } debug("evaluating uncached attribute '%s'", getAttrPathStr()); auto & v = getValue(); root->state.forceValue(v, noPos); if (v.type() != nList) root->state.error<TypeError>("'%s' is not a list", getAttrPathStr()).debugThrow(); std::vector<std::string> res; for (auto & elem : v.listItems()) res.push_back(std::string(root->state.forceStringNoCtx(*elem, noPos, "while evaluating an attribute for caching"))); if (root->db) cachedValue = {root->db->setListOfStrings(getKey(), res), res}; return res; } std::vector<Symbol> AttrCursor::getAttrs() { if (root->db) { if (!cachedValue) cachedValue = root->db->getAttr(getKey()); if (cachedValue && !std::get_if<placeholder_t>(&cachedValue->second)) { if (auto attrs = std::get_if<std::vector<Symbol>>(&cachedValue->second)) { debug("using cached attrset attribute '%s'", getAttrPathStr()); return *attrs; } else root->state.error<TypeError>("'%s' is not an attribute set", getAttrPathStr()).debugThrow(); } } auto & v = forceValue(); if (v.type() != nAttrs) root->state.error<TypeError>("'%s' is not an attribute set", getAttrPathStr()).debugThrow(); std::vector<Symbol> attrs; for (auto & attr : *getValue().attrs()) attrs.push_back(attr.name); std::sort(attrs.begin(), attrs.end(), [&](Symbol a, Symbol b) { std::string_view sa = root->state.symbols[a], sb = root->state.symbols[b]; return sa < sb; }); if (root->db) cachedValue = {root->db->setAttrs(getKey(), attrs), attrs}; return attrs; } bool AttrCursor::isDerivation() { auto aType = maybeGetAttr("type"); return aType && aType->getString() == "derivation"; } StorePath AttrCursor::forceDerivation() { auto aDrvPath = getAttr(root->state.sDrvPath); auto drvPath = root->state.store->parseStorePath(aDrvPath->getString()); drvPath.requireDerivation(); if (!root->state.store->isValidPath(drvPath) && !settings.readOnlyMode) { /* The eval cache contains 'drvPath', but the actual path has been garbage-collected. So force it to be regenerated. */ aDrvPath->forceValue(); if (!root->state.store->isValidPath(drvPath)) throw Error("don't know how to recreate store derivation '%s'!", root->state.store->printStorePath(drvPath)); } return drvPath; } }
24,256
C++
.cc
668
26.814371
126
0.554623
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
11,024
search-path.cc
NixOS_nix/src/libexpr/search-path.cc
#include "search-path.hh" namespace nix { std::optional<std::string_view> LookupPath::Prefix::suffixIfPotentialMatch( std::string_view path) const { auto n = s.size(); /* Non-empty prefix and suffix must be separated by a /, or the prefix is not a valid path prefix. */ bool needSeparator = n > 0 && n < path.size(); if (needSeparator && path[n] != '/') { return std::nullopt; } /* Prefix must be prefix of this path. */ if (path.compare(0, n, s) != 0) { return std::nullopt; } /* Skip next path separator. */ return { path.substr(needSeparator ? n + 1 : n) }; } LookupPath::Elem LookupPath::Elem::parse(std::string_view rawElem) { size_t pos = rawElem.find('='); return LookupPath::Elem { .prefix = Prefix { .s = pos == std::string::npos ? std::string { "" } : std::string { rawElem.substr(0, pos) }, }, .path = Path { .s = std::string { rawElem.substr(pos + 1) }, }, }; } LookupPath LookupPath::parse(const Strings & rawElems) { LookupPath res; for (auto & rawElem : rawElems) res.elements.emplace_back(LookupPath::Elem::parse(rawElem)); return res; } }
1,267
C++
.cc
43
23.55814
75
0.580858
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,025
context.cc
NixOS_nix/src/libexpr/value/context.cc
#include "util.hh" #include "value/context.hh" #include <optional> namespace nix { NixStringContextElem NixStringContextElem::parse( std::string_view s0, const ExperimentalFeatureSettings & xpSettings) { std::string_view s = s0; std::function<SingleDerivedPath()> parseRest; parseRest = [&]() -> SingleDerivedPath { // Case on whether there is a '!' size_t index = s.find("!"); if (index == std::string_view::npos) { return SingleDerivedPath::Opaque { .path = StorePath { s }, }; } else { std::string output { s.substr(0, index) }; // Advance string to parse after the '!' s = s.substr(index + 1); auto drv = make_ref<SingleDerivedPath>(parseRest()); drvRequireExperiment(*drv, xpSettings); return SingleDerivedPath::Built { .drvPath = std::move(drv), .output = std::move(output), }; } }; if (s.size() == 0) { throw BadNixStringContextElem(s0, "String context element should never be an empty string"); } switch (s.at(0)) { case '!': { // Advance string to parse after the '!' s = s.substr(1); // Find *second* '!' if (s.find("!") == std::string_view::npos) { throw BadNixStringContextElem(s0, "String content element beginning with '!' should have a second '!'"); } return std::visit( [&](auto x) -> NixStringContextElem { return std::move(x); }, parseRest()); } case '=': { return NixStringContextElem::DrvDeep { .drvPath = StorePath { s.substr(1) }, }; } default: { // Ensure no '!' if (s.find("!") != std::string_view::npos) { throw BadNixStringContextElem(s0, "String content element not beginning with '!' should not have a second '!'"); } return std::visit( [&](auto x) -> NixStringContextElem { return std::move(x); }, parseRest()); } } } std::string NixStringContextElem::to_string() const { std::string res; std::function<void(const SingleDerivedPath &)> toStringRest; toStringRest = [&](auto & p) { std::visit(overloaded { [&](const SingleDerivedPath::Opaque & o) { res += o.path.to_string(); }, [&](const SingleDerivedPath::Built & o) { res += o.output; res += '!'; toStringRest(*o.drvPath); }, }, p.raw()); }; std::visit(overloaded { [&](const NixStringContextElem::Built & b) { res += '!'; toStringRest(b); }, [&](const NixStringContextElem::Opaque & o) { toStringRest(o); }, [&](const NixStringContextElem::DrvDeep & d) { res += '='; res += d.drvPath.to_string(); }, }, raw); return res; } }
3,076
C++
.cc
95
23.284211
94
0.518868
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,026
fetchTree.cc
NixOS_nix/src/libexpr/primops/fetchTree.cc
#include "attrs.hh" #include "primops.hh" #include "eval-inline.hh" #include "eval-settings.hh" #include "store-api.hh" #include "fetchers.hh" #include "filetransfer.hh" #include "registry.hh" #include "tarball.hh" #include "url.hh" #include "value-to-json.hh" #include "fetch-to-store.hh" #include <nlohmann/json.hpp> #include <ctime> #include <iomanip> #include <regex> namespace nix { void emitTreeAttrs( EvalState & state, const StorePath & storePath, const fetchers::Input & input, Value & v, bool emptyRevFallback, bool forceDirty) { auto attrs = state.buildBindings(100); state.mkStorePathString(storePath, attrs.alloc(state.sOutPath)); // FIXME: support arbitrary input attributes. auto narHash = input.getNarHash(); assert(narHash); attrs.alloc("narHash").mkString(narHash->to_string(HashFormat::SRI, true)); if (input.getType() == "git") attrs.alloc("submodules").mkBool( fetchers::maybeGetBoolAttr(input.attrs, "submodules").value_or(false)); if (!forceDirty) { if (auto rev = input.getRev()) { attrs.alloc("rev").mkString(rev->gitRev()); attrs.alloc("shortRev").mkString(rev->gitShortRev()); } else if (emptyRevFallback) { // Backwards compat for `builtins.fetchGit`: dirty repos return an empty sha1 as rev auto emptyHash = Hash(HashAlgorithm::SHA1); attrs.alloc("rev").mkString(emptyHash.gitRev()); attrs.alloc("shortRev").mkString(emptyHash.gitShortRev()); } if (auto revCount = input.getRevCount()) attrs.alloc("revCount").mkInt(*revCount); else if (emptyRevFallback) attrs.alloc("revCount").mkInt(0); } if (auto dirtyRev = fetchers::maybeGetStrAttr(input.attrs, "dirtyRev")) { attrs.alloc("dirtyRev").mkString(*dirtyRev); attrs.alloc("dirtyShortRev").mkString(*fetchers::maybeGetStrAttr(input.attrs, "dirtyShortRev")); } if (auto lastModified = input.getLastModified()) { attrs.alloc("lastModified").mkInt(*lastModified); attrs.alloc("lastModifiedDate").mkString( fmt("%s", std::put_time(std::gmtime(&*lastModified), "%Y%m%d%H%M%S"))); } v.mkAttrs(attrs); } struct FetchTreeParams { bool emptyRevFallback = false; bool allowNameArgument = false; bool isFetchGit = false; bool isFinal = false; }; static void fetchTree( EvalState & state, const PosIdx pos, Value * * args, Value & v, const FetchTreeParams & params = FetchTreeParams{} ) { fetchers::Input input { state.fetchSettings }; NixStringContext context; std::optional<std::string> type; if (params.isFetchGit) type = "git"; state.forceValue(*args[0], pos); if (args[0]->type() == nAttrs) { state.forceAttrs(*args[0], pos, "while evaluating the argument passed to builtins.fetchTree"); fetchers::Attrs attrs; if (auto aType = args[0]->attrs()->get(state.sType)) { if (type) state.error<EvalError>( "unexpected attribute 'type'" ).atPos(pos).debugThrow(); type = state.forceStringNoCtx(*aType->value, aType->pos, "while evaluating the `type` attribute passed to builtins.fetchTree"); } else if (!type) state.error<EvalError>( "attribute 'type' is missing in call to 'fetchTree'" ).atPos(pos).debugThrow(); attrs.emplace("type", type.value()); for (auto & attr : *args[0]->attrs()) { if (attr.name == state.sType) continue; state.forceValue(*attr.value, attr.pos); if (attr.value->type() == nPath || attr.value->type() == nString) { auto s = state.coerceToString(attr.pos, *attr.value, context, "", false, false).toOwned(); attrs.emplace(state.symbols[attr.name], params.isFetchGit && state.symbols[attr.name] == "url" ? fixGitURL(s) : s); } else if (attr.value->type() == nBool) attrs.emplace(state.symbols[attr.name], Explicit<bool>{attr.value->boolean()}); else if (attr.value->type() == nInt) { auto intValue = attr.value->integer().value; if (intValue < 0) { state.error<EvalError>("negative value given for fetchTree attr %1%: %2%", state.symbols[attr.name], intValue).atPos(pos).debugThrow(); } attrs.emplace(state.symbols[attr.name], uint64_t(intValue)); } else if (state.symbols[attr.name] == "publicKeys") { experimentalFeatureSettings.require(Xp::VerifiedFetches); attrs.emplace(state.symbols[attr.name], printValueAsJSON(state, true, *attr.value, pos, context).dump()); } else state.error<TypeError>("fetchTree argument '%s' is %s while a string, Boolean or integer is expected", state.symbols[attr.name], showType(*attr.value)).debugThrow(); } if (params.isFetchGit && !attrs.contains("exportIgnore") && (!attrs.contains("submodules") || !*fetchers::maybeGetBoolAttr(attrs, "submodules"))) { attrs.emplace("exportIgnore", Explicit<bool>{true}); } // fetchTree should fetch git repos with shallow = true by default if (type == "git" && !params.isFetchGit && !attrs.contains("shallow")) { attrs.emplace("shallow", Explicit<bool>{true}); } if (!params.allowNameArgument) if (auto nameIter = attrs.find("name"); nameIter != attrs.end()) state.error<EvalError>( "attribute 'name' isn’t supported in call to 'fetchTree'" ).atPos(pos).debugThrow(); input = fetchers::Input::fromAttrs(state.fetchSettings, std::move(attrs)); } else { auto url = state.coerceToString(pos, *args[0], context, "while evaluating the first argument passed to the fetcher", false, false).toOwned(); if (params.isFetchGit) { fetchers::Attrs attrs; attrs.emplace("type", "git"); attrs.emplace("url", fixGitURL(url)); if (!attrs.contains("exportIgnore") && (!attrs.contains("submodules") || !*fetchers::maybeGetBoolAttr(attrs, "submodules"))) { attrs.emplace("exportIgnore", Explicit<bool>{true}); } input = fetchers::Input::fromAttrs(state.fetchSettings, std::move(attrs)); } else { if (!experimentalFeatureSettings.isEnabled(Xp::Flakes)) state.error<EvalError>( "passing a string argument to 'fetchTree' requires the 'flakes' experimental feature" ).atPos(pos).debugThrow(); input = fetchers::Input::fromURL(state.fetchSettings, url); } } if (!state.settings.pureEval && !input.isDirect() && experimentalFeatureSettings.isEnabled(Xp::Flakes)) input = lookupInRegistries(state.store, input).first; if (state.settings.pureEval && !input.isLocked()) { auto fetcher = "fetchTree"; if (params.isFetchGit) fetcher = "fetchGit"; state.error<EvalError>( "in pure evaluation mode, '%s' will not fetch unlocked input '%s'", fetcher, input.to_string() ).atPos(pos).debugThrow(); } state.checkURI(input.toURLString()); if (params.isFinal) { input.attrs.insert_or_assign("__final", Explicit<bool>(true)); } else { if (input.isFinal()) throw Error("input '%s' is not allowed to use the '__final' attribute", input.to_string()); } auto [storePath, input2] = input.fetchToStore(state.store); state.allowPath(storePath); emitTreeAttrs(state, storePath, input2, v, params.emptyRevFallback, false); } static void prim_fetchTree(EvalState & state, const PosIdx pos, Value * * args, Value & v) { fetchTree(state, pos, args, v, { }); } static RegisterPrimOp primop_fetchTree({ .name = "fetchTree", .args = {"input"}, .doc = R"( Fetch a file system tree or a plain file using one of the supported backends and return an attribute set with: - the resulting fixed-output [store path](@docroot@/store/store-path.md) - the corresponding [NAR](@docroot@/store/file-system-object/content-address.md#serial-nix-archive) hash - backend-specific metadata (currently not documented). <!-- TODO: document output attributes --> *input* must be an attribute set with the following attributes: - `type` (String, required) One of the [supported source types](#source-types). This determines other required and allowed input attributes. - `narHash` (String, optional) The `narHash` parameter can be used to substitute the source of the tree. It also allows for verification of tree contents that may not be provided by the underlying transfer mechanism. If `narHash` is set, the source is first looked up is the Nix store and [substituters](@docroot@/command-ref/conf-file.md#conf-substituters), and only fetched if not available. A subset of the output attributes of `fetchTree` can be re-used for subsequent calls to `fetchTree` to produce the same result again. That is, `fetchTree` is idempotent. Downloads are cached in `$XDG_CACHE_HOME/nix`. The remote source will be fetched from the network if both are true: - A NAR hash is supplied and the corresponding store path is not [valid](@docroot@/glossary.md#gloss-validity), that is, not available in the store > **Note** > > [Substituters](@docroot@/command-ref/conf-file.md#conf-substituters) are not used in fetching. - There is no cache entry or the cache entry is older than [`tarball-ttl`](@docroot@/command-ref/conf-file.md#conf-tarball-ttl) ## Source types The following source types and associated input attributes are supported. <!-- TODO: It would be soooo much more predictable to work with (and document) if `fetchTree` was a curried call with the first parameter for `type` or an attribute like `builtins.fetchTree.git`! --> - `"file"` Place a plain file into the Nix store. This is similar to [`builtins.fetchurl`](@docroot@/language/builtins.md#builtins-fetchurl) - `url` (String, required) Supported protocols: - `https` > **Example** > > ```nix > fetchTree { > type = "file"; > url = "https://example.com/index.html"; > } > ``` - `http` Insecure HTTP transfer for legacy sources. > **Warning** > > HTTP performs no encryption or authentication. > Use a `narHash` known in advance to ensure the output has expected contents. - `file` A file on the local file system. > **Example** > > ```nix > fetchTree { > type = "file"; > url = "file:///home/eelco/nix/README.md"; > } > ``` - `"tarball"` Download a tar archive and extract it into the Nix store. This has the same underyling implementation as [`builtins.fetchTarball`](@docroot@/language/builtins.md#builtins-fetchTarball) - `url` (String, required) > **Example** > > ```nix > fetchTree { > type = "tarball"; > url = "https://github.com/NixOS/nixpkgs/tarball/nixpkgs-23.11"; > } > ``` - `"git"` Fetch a Git tree and copy it to the Nix store. This is similar to [`builtins.fetchGit`](@docroot@/language/builtins.md#builtins-fetchGit). - `url` (String, required) The URL formats supported are the same as for Git itself. > **Example** > > ```nix > fetchTree { > type = "git"; > url = "git@github.com:NixOS/nixpkgs.git"; > } > ``` > **Note** > > If the URL points to a local directory, and no `ref` or `rev` is given, Nix will only consider files added to the Git index, as listed by `git ls-files` but use the *current file contents* of the Git working directory. - `ref` (String, optional) By default, this has no effect. This becomes relevant only once `shallow` cloning is disabled. A [Git reference](https://git-scm.com/book/en/v2/Git-Internals-Git-References), such as a branch or tag name. Default: `"HEAD"` - `rev` (String, optional) A Git revision; a commit hash. Default: the tip of `ref` - `shallow` (Bool, optional) Make a shallow clone when fetching the Git tree. When this is enabled, the options `ref` and `allRefs` have no effect anymore. Default: `true` - `submodules` (Bool, optional) Also fetch submodules if available. Default: `false` - `allRefs` (Bool, optional) By default, this has no effect. This becomes relevant only once `shallow` cloning is disabled. Whether to fetch all references (eg. branches and tags) of the repository. With this argument being true, it's possible to load a `rev` from *any* `ref`. (Without setting this option, only `rev`s from the specified `ref` are supported). Default: `false` - `lastModified` (Integer, optional) Unix timestamp of the fetched commit. If set, pass through the value to the output attribute set. Otherwise, generated from the fetched Git tree. - `revCount` (Integer, optional) Number of revisions in the history of the Git repository before the fetched commit. If set, pass through the value to the output attribute set. Otherwise, generated from the fetched Git tree. The following input types are still subject to change: - `"path"` - `"github"` - `"gitlab"` - `"sourcehut"` - `"mercurial"` *input* can also be a [URL-like reference](@docroot@/command-ref/new-cli/nix3-flake.md#flake-references). The additional input types and the URL-like syntax requires the [`flakes` experimental feature](@docroot@/development/experimental-features.md#xp-feature-flakes) to be enabled. > **Example** > > Fetch a GitHub repository using the attribute set representation: > > ```nix > builtins.fetchTree { > type = "github"; > owner = "NixOS"; > repo = "nixpkgs"; > rev = "ae2e6b3958682513d28f7d633734571fb18285dd"; > } > ``` > > This evaluates to the following attribute set: > > ```nix > { > lastModified = 1686503798; > lastModifiedDate = "20230611171638"; > narHash = "sha256-rA9RqKP9OlBrgGCPvfd5HVAXDOy8k2SmPtB/ijShNXc="; > outPath = "/nix/store/l5m6qlvfs9sdw14ja3qbzpglcjlb6j1x-source"; > rev = "ae2e6b3958682513d28f7d633734571fb18285dd"; > shortRev = "ae2e6b3"; > } > ``` > **Example** > > Fetch the same GitHub repository using the URL-like syntax: > > ```nix > builtins.fetchTree "github:NixOS/nixpkgs/ae2e6b3958682513d28f7d633734571fb18285dd" > ``` )", .fun = prim_fetchTree, .experimentalFeature = Xp::FetchTree, }); void prim_fetchFinalTree(EvalState & state, const PosIdx pos, Value * * args, Value & v) { fetchTree(state, pos, args, v, {.isFinal = true}); } static RegisterPrimOp primop_fetchFinalTree({ .name = "fetchFinalTree", .args = {"input"}, .fun = prim_fetchFinalTree, .internal = true, }); static void fetch(EvalState & state, const PosIdx pos, Value * * args, Value & v, const std::string & who, bool unpack, std::string name) { std::optional<std::string> url; std::optional<Hash> expectedHash; state.forceValue(*args[0], pos); bool isArgAttrs = args[0]->type() == nAttrs; bool nameAttrPassed = false; if (isArgAttrs) { for (auto & attr : *args[0]->attrs()) { std::string_view n(state.symbols[attr.name]); if (n == "url") url = state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the url we should fetch"); else if (n == "sha256") expectedHash = newHashAllowEmpty(state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the sha256 of the content we should fetch"), HashAlgorithm::SHA256); else if (n == "name") { nameAttrPassed = true; name = state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the name of the content we should fetch"); } else state.error<EvalError>("unsupported argument '%s' to '%s'", n, who) .atPos(pos).debugThrow(); } if (!url) state.error<EvalError>( "'url' argument required").atPos(pos).debugThrow(); } else url = state.forceStringNoCtx(*args[0], pos, "while evaluating the url we should fetch"); if (who == "fetchTarball") url = state.settings.resolvePseudoUrl(*url); state.checkURI(*url); if (name == "") name = baseNameOf(*url); try { checkName(name); } catch (BadStorePathName & e) { auto resolution = nameAttrPassed ? HintFmt("Please change the value for the 'name' attribute passed to '%s', so that it can create a valid store path.", who) : isArgAttrs ? HintFmt("Please add a valid 'name' attribute to the argument for '%s', so that it can create a valid store path.", who) : HintFmt("Please pass an attribute set with 'url' and 'name' attributes to '%s', so that it can create a valid store path.", who); state.error<EvalError>( std::string("invalid store path name when fetching URL '%s': %s. %s"), *url, Uncolored(e.message()), Uncolored(resolution.str())) .atPos(pos).debugThrow(); } if (state.settings.pureEval && !expectedHash) state.error<EvalError>("in pure evaluation mode, '%s' requires a 'sha256' argument", who).atPos(pos).debugThrow(); // early exit if pinned and already in the store if (expectedHash && expectedHash->algo == HashAlgorithm::SHA256) { auto expectedPath = state.store->makeFixedOutputPath( name, FixedOutputInfo { .method = unpack ? FileIngestionMethod::NixArchive : FileIngestionMethod::Flat, .hash = *expectedHash, .references = {} }); if (state.store->isValidPath(expectedPath)) { state.allowAndSetStorePathString(expectedPath, v); return; } } // TODO: fetching may fail, yet the path may be substitutable. // https://github.com/NixOS/nix/issues/4313 auto storePath = unpack ? fetchToStore( *state.store, fetchers::downloadTarball(state.store, state.fetchSettings, *url), FetchMode::Copy, name) : fetchers::downloadFile(state.store, *url, name).storePath; if (expectedHash) { auto hash = unpack ? state.store->queryPathInfo(storePath)->narHash : hashFile(HashAlgorithm::SHA256, state.store->toRealPath(storePath)); if (hash != *expectedHash) { state.error<EvalError>( "hash mismatch in file downloaded from '%s':\n specified: %s\n got: %s", *url, expectedHash->to_string(HashFormat::Nix32, true), hash.to_string(HashFormat::Nix32, true) ).withExitStatus(102) .debugThrow(); } } state.allowAndSetStorePathString(storePath, v); } static void prim_fetchurl(EvalState & state, const PosIdx pos, Value * * args, Value & v) { fetch(state, pos, args, v, "fetchurl", false, ""); } static RegisterPrimOp primop_fetchurl({ .name = "__fetchurl", .args = {"arg"}, .doc = R"( Download the specified URL and return the path of the downloaded file. `arg` can be either a string denoting the URL, or an attribute set with the following attributes: - `url` The URL of the file to download. - `name` (default: the last path component of the URL) A name for the file in the store. This can be useful if the URL has any characters that are invalid for the store. Not available in [restricted evaluation mode](@docroot@/command-ref/conf-file.md#conf-restrict-eval). )", .fun = prim_fetchurl, }); static void prim_fetchTarball(EvalState & state, const PosIdx pos, Value * * args, Value & v) { fetch(state, pos, args, v, "fetchTarball", true, "source"); } static RegisterPrimOp primop_fetchTarball({ .name = "fetchTarball", .args = {"args"}, .doc = R"( Download the specified URL, unpack it and return the path of the unpacked tree. The file must be a tape archive (`.tar`) compressed with `gzip`, `bzip2` or `xz`. If the tarball consists of a single directory, then the top-level path component of the files in the tarball is removed. The typical use of the function is to obtain external Nix expression dependencies, such as a particular version of Nixpkgs, e.g. ```nix with import (fetchTarball https://github.com/NixOS/nixpkgs/archive/nixos-14.12.tar.gz) {}; stdenv.mkDerivation { … } ``` The fetched tarball is cached for a certain amount of time (1 hour by default) in `~/.cache/nix/tarballs/`. You can change the cache timeout either on the command line with `--tarball-ttl` *number-of-seconds* or in the Nix configuration file by adding the line `tarball-ttl = ` *number-of-seconds*. Note that when obtaining the hash with `nix-prefetch-url` the option `--unpack` is required. This function can also verify the contents against a hash. In that case, the function takes a set instead of a URL. The set requires the attribute `url` and the attribute `sha256`, e.g. ```nix with import (fetchTarball { url = "https://github.com/NixOS/nixpkgs/archive/nixos-14.12.tar.gz"; sha256 = "1jppksrfvbk5ypiqdz4cddxdl8z6zyzdb2srq8fcffr327ld5jj2"; }) {}; stdenv.mkDerivation { … } ``` Not available in [restricted evaluation mode](@docroot@/command-ref/conf-file.md#conf-restrict-eval). )", .fun = prim_fetchTarball, }); static void prim_fetchGit(EvalState & state, const PosIdx pos, Value * * args, Value & v) { fetchTree(state, pos, args, v, FetchTreeParams { .emptyRevFallback = true, .allowNameArgument = true, .isFetchGit = true }); } static RegisterPrimOp primop_fetchGit({ .name = "fetchGit", .args = {"args"}, .doc = R"( Fetch a path from git. *args* can be a URL, in which case the HEAD of the repo at that URL is fetched. Otherwise, it can be an attribute with the following attributes (all except `url` optional): - `url` The URL of the repo. - `name` (default: `source`) The name of the directory the repo should be exported to in the store. - `rev` (default: *the tip of `ref`*) The [Git revision] to fetch. This is typically a commit hash. [Git revision]: https://git-scm.com/docs/git-rev-parse#_specifying_revisions - `ref` (default: `HEAD`) The [Git reference] under which to look for the requested revision. This is often a branch or tag name. [Git reference]: https://git-scm.com/book/en/v2/Git-Internals-Git-References This option has no effect once `shallow` cloning is enabled. By default, the `ref` value is prefixed with `refs/heads/`. As of 2.3.0, Nix will not prefix `refs/heads/` if `ref` starts with `refs/`. - `submodules` (default: `false`) A Boolean parameter that specifies whether submodules should be checked out. - `exportIgnore` (default: `true`) A Boolean parameter that specifies whether `export-ignore` from `.gitattributes` should be applied. This approximates part of the `git archive` behavior. Enabling this option is not recommended because it is unknown whether the Git developers commit to the reproducibility of `export-ignore` in newer Git versions. - `shallow` (default: `false`) Make a shallow clone when fetching the Git tree. When this is enabled, the options `ref` and `allRefs` have no effect anymore. - `allRefs` Whether to fetch all references (eg. branches and tags) of the repository. With this argument being true, it's possible to load a `rev` from *any* `ref`. (by default only `rev`s from the specified `ref` are supported). This option has no effect once `shallow` cloning is enabled. - `verifyCommit` (default: `true` if `publicKey` or `publicKeys` are provided, otherwise `false`) Whether to check `rev` for a signature matching `publicKey` or `publicKeys`. If `verifyCommit` is enabled, then `fetchGit` cannot use a local repository with uncommitted changes. Requires the [`verified-fetches` experimental feature](@docroot@/development/experimental-features.md#xp-feature-verified-fetches). - `publicKey` The public key against which `rev` is verified if `verifyCommit` is enabled. Requires the [`verified-fetches` experimental feature](@docroot@/development/experimental-features.md#xp-feature-verified-fetches). - `keytype` (default: `"ssh-ed25519"`) The key type of `publicKey`. Possible values: - `"ssh-dsa"` - `"ssh-ecdsa"` - `"ssh-ecdsa-sk"` - `"ssh-ed25519"` - `"ssh-ed25519-sk"` - `"ssh-rsa"` Requires the [`verified-fetches` experimental feature](@docroot@/development/experimental-features.md#xp-feature-verified-fetches). - `publicKeys` The public keys against which `rev` is verified if `verifyCommit` is enabled. Must be given as a list of attribute sets with the following form: ```nix { key = "<public key>"; type = "<key type>"; # optional, default: "ssh-ed25519" } ``` Requires the [`verified-fetches` experimental feature](@docroot@/development/experimental-features.md#xp-feature-verified-fetches). Here are some examples of how to use `fetchGit`. - To fetch a private repository over SSH: ```nix builtins.fetchGit { url = "git@github.com:my-secret/repository.git"; ref = "master"; rev = "adab8b916a45068c044658c4158d81878f9ed1c3"; } ``` - To fetch an arbitrary reference: ```nix builtins.fetchGit { url = "https://github.com/NixOS/nix.git"; ref = "refs/heads/0.5-release"; } ``` - If the revision you're looking for is in the default branch of the git repository you don't strictly need to specify the branch name in the `ref` attribute. However, if the revision you're looking for is in a future branch for the non-default branch you will need to specify the the `ref` attribute as well. ```nix builtins.fetchGit { url = "https://github.com/nixos/nix.git"; rev = "841fcbd04755c7a2865c51c1e2d3b045976b7452"; ref = "1.11-maintenance"; } ``` > **Note** > > It is nice to always specify the branch which a revision > belongs to. Without the branch being specified, the fetcher > might fail if the default branch changes. Additionally, it can > be confusing to try a commit from a non-default branch and see > the fetch fail. If the branch is specified the fault is much > more obvious. - If the revision you're looking for is in the default branch of the git repository you may omit the `ref` attribute. ```nix builtins.fetchGit { url = "https://github.com/nixos/nix.git"; rev = "841fcbd04755c7a2865c51c1e2d3b045976b7452"; } ``` - To fetch a specific tag: ```nix builtins.fetchGit { url = "https://github.com/nixos/nix.git"; ref = "refs/tags/1.9"; } ``` - To fetch the latest version of a remote branch: ```nix builtins.fetchGit { url = "ssh://git@github.com/nixos/nix.git"; ref = "master"; } ``` - To verify the commit signature: ```nix builtins.fetchGit { url = "ssh://git@github.com/nixos/nix.git"; verifyCommit = true; publicKeys = [ { type = "ssh-ed25519"; key = "AAAAC3NzaC1lZDI1NTE5AAAAIArPKULJOid8eS6XETwUjO48/HKBWl7FTCK0Z//fplDi"; } ]; } ``` Nix will refetch the branch according to the [`tarball-ttl`](@docroot@/command-ref/conf-file.md#conf-tarball-ttl) setting. This behavior is disabled in [pure evaluation mode](@docroot@/command-ref/conf-file.md#conf-pure-eval). - To fetch the content of a checked-out work directory: ```nix builtins.fetchGit ./work-dir ``` If the URL points to a local directory, and no `ref` or `rev` is given, `fetchGit` will use the current content of the checked-out files, even if they are not committed or added to Git's index. It will only consider files added to the Git repository, as listed by `git ls-files`. )", .fun = prim_fetchGit, }); }
30,472
C++
.cc
650
37.630769
230
0.619311
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,027
context.cc
NixOS_nix/src/libexpr/primops/context.cc
#include "primops.hh" #include "eval-inline.hh" #include "derivations.hh" #include "store-api.hh" namespace nix { static void prim_unsafeDiscardStringContext(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto s = state.coerceToString(pos, *args[0], context, "while evaluating the argument passed to builtins.unsafeDiscardStringContext"); v.mkString(*s); } static RegisterPrimOp primop_unsafeDiscardStringContext({ .name = "__unsafeDiscardStringContext", .args = {"s"}, .doc = R"( Discard the [string context](@docroot@/language/string-context.md) from a value that can be coerced to a string. )", .fun = prim_unsafeDiscardStringContext, }); static void prim_hasContext(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; state.forceString(*args[0], context, pos, "while evaluating the argument passed to builtins.hasContext"); v.mkBool(!context.empty()); } static RegisterPrimOp primop_hasContext({ .name = "__hasContext", .args = {"s"}, .doc = R"( Return `true` if string *s* has a non-empty context. The context can be obtained with [`getContext`](#builtins-getContext). > **Example** > > Many operations require a string context to be empty because they are intended only to work with "regular" strings, and also to help users avoid unintentionally loosing track of string context elements. > `builtins.hasContext` can help create better domain-specific errors in those case. > > ```nix > name: meta: > > if builtins.hasContext name > then throw "package name cannot contain string context" > else { ${name} = meta; } > ``` )", .fun = prim_hasContext }); static void prim_unsafeDiscardOutputDependency(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto s = state.coerceToString(pos, *args[0], context, "while evaluating the argument passed to builtins.unsafeDiscardOutputDependency"); NixStringContext context2; for (auto && c : context) { if (auto * ptr = std::get_if<NixStringContextElem::DrvDeep>(&c.raw)) { context2.emplace(NixStringContextElem::Opaque { .path = ptr->drvPath }); } else { /* Can reuse original item */ context2.emplace(std::move(c).raw); } } v.mkString(*s, context2); } static RegisterPrimOp primop_unsafeDiscardOutputDependency({ .name = "__unsafeDiscardOutputDependency", .args = {"s"}, .doc = R"( Create a copy of the given string where every [derivation deep](@docroot@/language/string-context.md#string-context-element-derivation-deep) string context element is turned into a [constant](@docroot@/language/string-context.md#string-context-element-constant) string context element. This is the opposite of [`builtins.addDrvOutputDependencies`](#builtins-addDrvOutputDependencies). This is unsafe because it allows us to "forget" store objects we would have otherwise referred to with the string context, whereas Nix normally tracks all dependencies consistently. Safe operations "grow" but never "shrink" string contexts. [`builtins.addDrvOutputDependencies`] in contrast is safe because "derivation deep" string context element always refers to the underlying derivation (among many more things). Replacing a constant string context element with a "derivation deep" element is a safe operation that just enlargens the string context without forgetting anything. [`builtins.addDrvOutputDependencies`]: #builtins-addDrvOutputDependencies )", .fun = prim_unsafeDiscardOutputDependency }); static void prim_addDrvOutputDependencies(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto s = state.coerceToString(pos, *args[0], context, "while evaluating the argument passed to builtins.addDrvOutputDependencies"); auto contextSize = context.size(); if (contextSize != 1) { state.error<EvalError>( "context of string '%s' must have exactly one element, but has %d", *s, contextSize ).atPos(pos).debugThrow(); } NixStringContext context2 { (NixStringContextElem { std::visit(overloaded { [&](const NixStringContextElem::Opaque & c) -> NixStringContextElem::DrvDeep { if (!c.path.isDerivation()) { state.error<EvalError>( "path '%s' is not a derivation", state.store->printStorePath(c.path) ).atPos(pos).debugThrow(); } return NixStringContextElem::DrvDeep { .drvPath = c.path, }; }, [&](const NixStringContextElem::Built & c) -> NixStringContextElem::DrvDeep { state.error<EvalError>( "`addDrvOutputDependencies` can only act on derivations, not on a derivation output such as '%1%'", c.output ).atPos(pos).debugThrow(); }, [&](const NixStringContextElem::DrvDeep & c) -> NixStringContextElem::DrvDeep { /* Reuse original item because we want this to be idempotent. */ return std::move(c); }, }, context.begin()->raw) }), }; v.mkString(*s, context2); } static RegisterPrimOp primop_addDrvOutputDependencies({ .name = "__addDrvOutputDependencies", .args = {"s"}, .doc = R"( Create a copy of the given string where a single [constant](@docroot@/language/string-context.md#string-context-element-constant) string context element is turned into a [derivation deep](@docroot@/language/string-context.md#string-context-element-derivation-deep) string context element. The store path that is the constant string context element should point to a valid derivation, and end in `.drv`. The original string context element must not be empty or have multiple elements, and it must not have any other type of element other than a constant or derivation deep element. The latter is supported so this function is idempotent. This is the opposite of [`builtins.unsafeDiscardOutputDependency`](#builtins-unsafeDiscardOutputDependency). )", .fun = prim_addDrvOutputDependencies }); /* Extract the context of a string as a structured Nix value. The context is represented as an attribute set whose keys are the paths in the context set and whose values are attribute sets with the following keys: path: True if the relevant path is in the context as a plain store path (i.e. the kind of context you get when interpolating a Nix path (e.g. ./.) into a string). False if missing. allOutputs: True if the relevant path is a derivation and it is in the context as a drv file with all of its outputs (i.e. the kind of context you get when referencing .drvPath of some derivation). False if missing. outputs: If a non-empty list, the relevant path is a derivation and the provided outputs are referenced in the context (i.e. the kind of context you get when referencing .outPath of some derivation). Empty list if missing. Note that for a given path any combination of the above attributes may be present. */ static void prim_getContext(EvalState & state, const PosIdx pos, Value * * args, Value & v) { struct ContextInfo { bool path = false; bool allOutputs = false; Strings outputs; }; NixStringContext context; state.forceString(*args[0], context, pos, "while evaluating the argument passed to builtins.getContext"); auto contextInfos = std::map<StorePath, ContextInfo>(); for (auto && i : context) { std::visit(overloaded { [&](NixStringContextElem::DrvDeep && d) { contextInfos[std::move(d.drvPath)].allOutputs = true; }, [&](NixStringContextElem::Built && b) { // FIXME should eventually show string context as is, no // resolving here. auto drvPath = resolveDerivedPath(*state.store, *b.drvPath); contextInfos[std::move(drvPath)].outputs.emplace_back(std::move(b.output)); }, [&](NixStringContextElem::Opaque && o) { contextInfos[std::move(o.path)].path = true; }, }, ((NixStringContextElem &&) i).raw); } auto attrs = state.buildBindings(contextInfos.size()); auto sPath = state.symbols.create("path"); auto sAllOutputs = state.symbols.create("allOutputs"); for (const auto & info : contextInfos) { auto infoAttrs = state.buildBindings(3); if (info.second.path) infoAttrs.alloc(sPath).mkBool(true); if (info.second.allOutputs) infoAttrs.alloc(sAllOutputs).mkBool(true); if (!info.second.outputs.empty()) { auto list = state.buildList(info.second.outputs.size()); for (const auto & [i, output] : enumerate(info.second.outputs)) (list[i] = state.allocValue())->mkString(output); infoAttrs.alloc(state.sOutputs).mkList(list); } attrs.alloc(state.store->printStorePath(info.first)).mkAttrs(infoAttrs); } v.mkAttrs(attrs); } static RegisterPrimOp primop_getContext({ .name = "__getContext", .args = {"s"}, .doc = R"( Return the string context of *s*. The string context tracks references to derivations within a string. It is represented as an attribute set of [store derivation](@docroot@/glossary.md#gloss-store-derivation) paths mapping to output names. Using [string interpolation](@docroot@/language/string-interpolation.md) on a derivation will add that derivation to the string context. For example, ```nix builtins.getContext "${derivation { name = "a"; builder = "b"; system = "c"; }}" ``` evaluates to ``` { "/nix/store/arhvjaf6zmlyn8vh8fgn55rpwnxq0n7l-a.drv" = { outputs = [ "out" ]; }; } ``` )", .fun = prim_getContext }); /* Append the given context to a given string. See the commentary above getContext for details of the context representation. */ static void prim_appendContext(EvalState & state, const PosIdx pos, Value * * args, Value & v) { NixStringContext context; auto orig = state.forceString(*args[0], context, noPos, "while evaluating the first argument passed to builtins.appendContext"); state.forceAttrs(*args[1], pos, "while evaluating the second argument passed to builtins.appendContext"); auto sPath = state.symbols.create("path"); auto sAllOutputs = state.symbols.create("allOutputs"); for (auto & i : *args[1]->attrs()) { const auto & name = state.symbols[i.name]; if (!state.store->isStorePath(name)) state.error<EvalError>( "context key '%s' is not a store path", name ).atPos(i.pos).debugThrow(); auto namePath = state.store->parseStorePath(name); if (!settings.readOnlyMode) state.store->ensurePath(namePath); state.forceAttrs(*i.value, i.pos, "while evaluating the value of a string context"); if (auto attr = i.value->attrs()->get(sPath)) { if (state.forceBool(*attr->value, attr->pos, "while evaluating the `path` attribute of a string context")) context.emplace(NixStringContextElem::Opaque { .path = namePath, }); } if (auto attr = i.value->attrs()->get(sAllOutputs)) { if (state.forceBool(*attr->value, attr->pos, "while evaluating the `allOutputs` attribute of a string context")) { if (!isDerivation(name)) { state.error<EvalError>( "tried to add all-outputs context of %s, which is not a derivation, to a string", name ).atPos(i.pos).debugThrow(); } context.emplace(NixStringContextElem::DrvDeep { .drvPath = namePath, }); } } if (auto attr = i.value->attrs()->get(state.sOutputs)) { state.forceList(*attr->value, attr->pos, "while evaluating the `outputs` attribute of a string context"); if (attr->value->listSize() && !isDerivation(name)) { state.error<EvalError>( "tried to add derivation output context of %s, which is not a derivation, to a string", name ).atPos(i.pos).debugThrow(); } for (auto elem : attr->value->listItems()) { auto outputName = state.forceStringNoCtx(*elem, attr->pos, "while evaluating an output name within a string context"); context.emplace(NixStringContextElem::Built { .drvPath = makeConstantStorePathRef(namePath), .output = std::string { outputName }, }); } } } v.mkString(orig, context); } static RegisterPrimOp primop_appendContext({ .name = "__appendContext", .arity = 2, .fun = prim_appendContext }); }
13,606
C++
.cc
286
38.737762
210
0.64148
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,028
fetchMercurial.cc
NixOS_nix/src/libexpr/primops/fetchMercurial.cc
#include "primops.hh" #include "eval-inline.hh" #include "eval-settings.hh" #include "store-api.hh" #include "fetchers.hh" #include "url.hh" #include "url-parts.hh" namespace nix { static void prim_fetchMercurial(EvalState & state, const PosIdx pos, Value * * args, Value & v) { std::string url; std::optional<Hash> rev; std::optional<std::string> ref; std::string_view name = "source"; NixStringContext context; state.forceValue(*args[0], pos); if (args[0]->type() == nAttrs) { for (auto & attr : *args[0]->attrs()) { std::string_view n(state.symbols[attr.name]); if (n == "url") url = state.coerceToString(attr.pos, *attr.value, context, "while evaluating the `url` attribute passed to builtins.fetchMercurial", false, false).toOwned(); else if (n == "rev") { // Ugly: unlike fetchGit, here the "rev" attribute can // be both a revision or a branch/tag name. auto value = state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the `rev` attribute passed to builtins.fetchMercurial"); if (std::regex_match(value.begin(), value.end(), revRegex)) rev = Hash::parseAny(value, HashAlgorithm::SHA1); else ref = value; } else if (n == "name") name = state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the `name` attribute passed to builtins.fetchMercurial"); else state.error<EvalError>("unsupported argument '%s' to 'fetchMercurial'", state.symbols[attr.name]).atPos(attr.pos).debugThrow(); } if (url.empty()) state.error<EvalError>("'url' argument required").atPos(pos).debugThrow(); } else url = state.coerceToString(pos, *args[0], context, "while evaluating the first argument passed to builtins.fetchMercurial", false, false).toOwned(); // FIXME: git externals probably can be used to bypass the URI // whitelist. Ah well. state.checkURI(url); if (state.settings.pureEval && !rev) throw Error("in pure evaluation mode, 'fetchMercurial' requires a Mercurial revision"); fetchers::Attrs attrs; attrs.insert_or_assign("type", "hg"); attrs.insert_or_assign("url", url.find("://") != std::string::npos ? url : "file://" + url); attrs.insert_or_assign("name", std::string(name)); if (ref) attrs.insert_or_assign("ref", *ref); if (rev) attrs.insert_or_assign("rev", rev->gitRev()); auto input = fetchers::Input::fromAttrs(state.fetchSettings, std::move(attrs)); auto [storePath, input2] = input.fetchToStore(state.store); auto attrs2 = state.buildBindings(8); state.mkStorePathString(storePath, attrs2.alloc(state.sOutPath)); if (input2.getRef()) attrs2.alloc("branch").mkString(*input2.getRef()); // Backward compatibility: set 'rev' to // 0000000000000000000000000000000000000000 for a dirty tree. auto rev2 = input2.getRev().value_or(Hash(HashAlgorithm::SHA1)); attrs2.alloc("rev").mkString(rev2.gitRev()); attrs2.alloc("shortRev").mkString(rev2.gitRev().substr(0, 12)); if (auto revCount = input2.getRevCount()) attrs2.alloc("revCount").mkInt(*revCount); v.mkAttrs(attrs2); state.allowPath(storePath); } static RegisterPrimOp r_fetchMercurial({ .name = "fetchMercurial", .arity = 1, .fun = prim_fetchMercurial }); }
3,574
C++
.cc
76
38.934211
149
0.632214
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
11,029
fromTOML.cc
NixOS_nix/src/libexpr/primops/fromTOML.cc
#include "primops.hh" #include "eval-inline.hh" #include <sstream> #include <toml.hpp> namespace nix { static void prim_fromTOML(EvalState & state, const PosIdx pos, Value * * args, Value & val) { auto toml = state.forceStringNoCtx(*args[0], pos, "while evaluating the argument passed to builtins.fromTOML"); std::istringstream tomlStream(std::string{toml}); std::function<void(Value &, toml::value)> visit; visit = [&](Value & v, toml::value t) { switch(t.type()) { case toml::value_t::table: { auto table = toml::get<toml::table>(t); size_t size = 0; for (auto & i : table) { (void) i; size++; } auto attrs = state.buildBindings(size); for(auto & elem : table) visit(attrs.alloc(elem.first), elem.second); v.mkAttrs(attrs); } break;; case toml::value_t::array: { auto array = toml::get<std::vector<toml::value>>(t); auto list = state.buildList(array.size()); for (const auto & [n, v] : enumerate(list)) visit(*(v = state.allocValue()), array[n]); v.mkList(list); } break;; case toml::value_t::boolean: v.mkBool(toml::get<bool>(t)); break;; case toml::value_t::integer: v.mkInt(toml::get<int64_t>(t)); break;; case toml::value_t::floating: v.mkFloat(toml::get<NixFloat>(t)); break;; case toml::value_t::string: v.mkString(toml::get<std::string>(t)); break;; case toml::value_t::local_datetime: case toml::value_t::offset_datetime: case toml::value_t::local_date: case toml::value_t::local_time: { if (experimentalFeatureSettings.isEnabled(Xp::ParseTomlTimestamps)) { auto attrs = state.buildBindings(2); attrs.alloc("_type").mkString("timestamp"); std::ostringstream s; s << t; attrs.alloc("value").mkString(toView(s)); v.mkAttrs(attrs); } else { throw std::runtime_error("Dates and times are not supported"); } } break;; case toml::value_t::empty: v.mkNull(); break;; } }; try { visit(val, toml::parse(tomlStream, "fromTOML" /* the "filename" */)); } catch (std::exception & e) { // TODO: toml::syntax_error state.error<EvalError>("while parsing TOML: %s", e.what()).atPos(pos).debugThrow(); } } static RegisterPrimOp primop_fromTOML({ .name = "fromTOML", .args = {"e"}, .doc = R"( Convert a TOML string to a Nix value. For example, ```nix builtins.fromTOML '' x=1 s="a" [table] y=2 '' ``` returns the value `{ s = "a"; table = { y = 2; }; x = 1; }`. )", .fun = prim_fromTOML }); }
3,375
C++
.cc
91
24.098901
115
0.47075
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
true
false
false
11,030
fetchClosure.cc
NixOS_nix/src/libexpr/primops/fetchClosure.cc
#include "primops.hh" #include "store-api.hh" #include "realisation.hh" #include "make-content-addressed.hh" #include "url.hh" namespace nix { /** * Handler for the content addressed case. * * @param state Evaluator state and store to write to. * @param fromStore Store containing the path to rewrite. * @param fromPath Source path to be rewritten. * @param toPathMaybe Path to write the rewritten path to. If empty, the error shows the actual path. * @param v Return `Value` */ static void runFetchClosureWithRewrite(EvalState & state, const PosIdx pos, Store & fromStore, const StorePath & fromPath, const std::optional<StorePath> & toPathMaybe, Value &v) { // establish toPath or throw if (!toPathMaybe || !state.store->isValidPath(*toPathMaybe)) { auto rewrittenPath = makeContentAddressed(fromStore, *state.store, fromPath); if (toPathMaybe && *toPathMaybe != rewrittenPath) throw Error({ .msg = HintFmt("rewriting '%s' to content-addressed form yielded '%s', while '%s' was expected", state.store->printStorePath(fromPath), state.store->printStorePath(rewrittenPath), state.store->printStorePath(*toPathMaybe)), .pos = state.positions[pos] }); if (!toPathMaybe) throw Error({ .msg = HintFmt( "rewriting '%s' to content-addressed form yielded '%s'\n" "Use this value for the 'toPath' attribute passed to 'fetchClosure'", state.store->printStorePath(fromPath), state.store->printStorePath(rewrittenPath)), .pos = state.positions[pos] }); } auto toPath = *toPathMaybe; // check and return auto resultInfo = state.store->queryPathInfo(toPath); if (!resultInfo->isContentAddressed(*state.store)) { // We don't perform the rewriting when outPath already exists, as an optimisation. // However, we can quickly detect a mistake if the toPath is input addressed. throw Error({ .msg = HintFmt( "The 'toPath' value '%s' is input-addressed, so it can't possibly be the result of rewriting to a content-addressed path.\n\n" "Set 'toPath' to an empty string to make Nix report the correct content-addressed path.", state.store->printStorePath(toPath)), .pos = state.positions[pos] }); } state.mkStorePathString(toPath, v); } /** * Fetch the closure and make sure it's content addressed. */ static void runFetchClosureWithContentAddressedPath(EvalState & state, const PosIdx pos, Store & fromStore, const StorePath & fromPath, Value & v) { if (!state.store->isValidPath(fromPath)) copyClosure(fromStore, *state.store, RealisedPath::Set { fromPath }); auto info = state.store->queryPathInfo(fromPath); if (!info->isContentAddressed(*state.store)) { throw Error({ .msg = HintFmt( "The 'fromPath' value '%s' is input-addressed, but 'inputAddressed' is set to 'false' (default).\n\n" "If you do intend to fetch an input-addressed store path, add\n\n" " inputAddressed = true;\n\n" "to the 'fetchClosure' arguments.\n\n" "Note that to ensure authenticity input-addressed store paths, users must configure a trusted binary cache public key on their systems. This is not needed for content-addressed paths.", state.store->printStorePath(fromPath)), .pos = state.positions[pos] }); } state.mkStorePathString(fromPath, v); } /** * Fetch the closure and make sure it's input addressed. */ static void runFetchClosureWithInputAddressedPath(EvalState & state, const PosIdx pos, Store & fromStore, const StorePath & fromPath, Value & v) { if (!state.store->isValidPath(fromPath)) copyClosure(fromStore, *state.store, RealisedPath::Set { fromPath }); auto info = state.store->queryPathInfo(fromPath); if (info->isContentAddressed(*state.store)) { throw Error({ .msg = HintFmt( "The store object referred to by 'fromPath' at '%s' is not input-addressed, but 'inputAddressed' is set to 'true'.\n\n" "Remove the 'inputAddressed' attribute (it defaults to 'false') to expect 'fromPath' to be content-addressed", state.store->printStorePath(fromPath)), .pos = state.positions[pos] }); } state.mkStorePathString(fromPath, v); } typedef std::optional<StorePath> StorePathOrGap; static void prim_fetchClosure(EvalState & state, const PosIdx pos, Value * * args, Value & v) { state.forceAttrs(*args[0], pos, "while evaluating the argument passed to builtins.fetchClosure"); std::optional<std::string> fromStoreUrl; std::optional<StorePath> fromPath; std::optional<StorePathOrGap> toPath; std::optional<bool> inputAddressedMaybe; for (auto & attr : *args[0]->attrs()) { const auto & attrName = state.symbols[attr.name]; auto attrHint = [&]() -> std::string { return "while evaluating the '" + attrName + "' attribute passed to builtins.fetchClosure"; }; if (attrName == "fromPath") { NixStringContext context; fromPath = state.coerceToStorePath(attr.pos, *attr.value, context, attrHint()); } else if (attrName == "toPath") { state.forceValue(*attr.value, attr.pos); bool isEmptyString = attr.value->type() == nString && attr.value->string_view() == ""; if (isEmptyString) { toPath = StorePathOrGap {}; } else { NixStringContext context; toPath = state.coerceToStorePath(attr.pos, *attr.value, context, attrHint()); } } else if (attrName == "fromStore") fromStoreUrl = state.forceStringNoCtx(*attr.value, attr.pos, attrHint()); else if (attrName == "inputAddressed") inputAddressedMaybe = state.forceBool(*attr.value, attr.pos, attrHint()); else throw Error({ .msg = HintFmt("attribute '%s' isn't supported in call to 'fetchClosure'", attrName), .pos = state.positions[pos] }); } if (!fromPath) throw Error({ .msg = HintFmt("attribute '%s' is missing in call to 'fetchClosure'", "fromPath"), .pos = state.positions[pos] }); bool inputAddressed = inputAddressedMaybe.value_or(false); if (inputAddressed) { if (toPath) throw Error({ .msg = HintFmt("attribute '%s' is set to true, but '%s' is also set. Please remove one of them", "inputAddressed", "toPath"), .pos = state.positions[pos] }); } if (!fromStoreUrl) throw Error({ .msg = HintFmt("attribute '%s' is missing in call to 'fetchClosure'", "fromStore"), .pos = state.positions[pos] }); auto parsedURL = parseURL(*fromStoreUrl); if (parsedURL.scheme != "http" && parsedURL.scheme != "https" && !(getEnv("_NIX_IN_TEST").has_value() && parsedURL.scheme == "file")) throw Error({ .msg = HintFmt("'fetchClosure' only supports http:// and https:// stores"), .pos = state.positions[pos] }); if (!parsedURL.query.empty()) throw Error({ .msg = HintFmt("'fetchClosure' does not support URL query parameters (in '%s')", *fromStoreUrl), .pos = state.positions[pos] }); auto fromStore = openStore(parsedURL.to_string()); if (toPath) runFetchClosureWithRewrite(state, pos, *fromStore, *fromPath, *toPath, v); else if (inputAddressed) runFetchClosureWithInputAddressedPath(state, pos, *fromStore, *fromPath, v); else runFetchClosureWithContentAddressedPath(state, pos, *fromStore, *fromPath, v); } static RegisterPrimOp primop_fetchClosure({ .name = "__fetchClosure", .args = {"args"}, .doc = R"( Fetch a store path [closure](@docroot@/glossary.md#gloss-closure) from a binary cache, and return the store path as a string with context. This function can be invoked in three ways, that we will discuss in order of preference. **Fetch a content-addressed store path** Example: ```nix builtins.fetchClosure { fromStore = "https://cache.nixos.org"; fromPath = /nix/store/ldbhlwhh39wha58rm61bkiiwm6j7211j-git-2.33.1; } ``` This is the simplest invocation, and it does not require the user of the expression to configure [`trusted-public-keys`](@docroot@/command-ref/conf-file.md#conf-trusted-public-keys) to ensure their authenticity. If your store path is [input addressed](@docroot@/glossary.md#gloss-input-addressed-store-object) instead of content addressed, consider the other two invocations. **Fetch any store path and rewrite it to a fully content-addressed store path** Example: ```nix builtins.fetchClosure { fromStore = "https://cache.nixos.org"; fromPath = /nix/store/r2jd6ygnmirm2g803mksqqjm4y39yi6i-git-2.33.1; toPath = /nix/store/ldbhlwhh39wha58rm61bkiiwm6j7211j-git-2.33.1; } ``` This example fetches `/nix/store/r2jd...` from the specified binary cache, and rewrites it into the content-addressed store path `/nix/store/ldbh...`. Like the previous example, no extra configuration or privileges are required. To find out the correct value for `toPath` given a `fromPath`, use [`nix store make-content-addressed`](@docroot@/command-ref/new-cli/nix3-store-make-content-addressed.md): ```console # nix store make-content-addressed --from https://cache.nixos.org /nix/store/r2jd6ygnmirm2g803mksqqjm4y39yi6i-git-2.33.1 rewrote '/nix/store/r2jd6ygnmirm2g803mksqqjm4y39yi6i-git-2.33.1' to '/nix/store/ldbhlwhh39wha58rm61bkiiwm6j7211j-git-2.33.1' ``` Alternatively, set `toPath = ""` and find the correct `toPath` in the error message. **Fetch an input-addressed store path as is** Example: ```nix builtins.fetchClosure { fromStore = "https://cache.nixos.org"; fromPath = /nix/store/r2jd6ygnmirm2g803mksqqjm4y39yi6i-git-2.33.1; inputAddressed = true; } ``` It is possible to fetch an [input-addressed store path](@docroot@/glossary.md#gloss-input-addressed-store-object) and return it as is. However, this is the least preferred way of invoking `fetchClosure`, because it requires that the input-addressed paths are trusted by the Nix configuration. **`builtins.storePath`** `fetchClosure` is similar to [`builtins.storePath`](#builtins-storePath) in that it allows you to use a previously built store path in a Nix expression. However, `fetchClosure` is more reproducible because it specifies a binary cache from which the path can be fetched. Also, using content-addressed store paths does not require users to configure [`trusted-public-keys`](@docroot@/command-ref/conf-file.md#conf-trusted-public-keys) to ensure their authenticity. )", .fun = prim_fetchClosure, .experimentalFeature = Xp::FetchClosure, }); }
11,531
C++
.cc
228
41.657895
217
0.646567
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,031
nix_api_value.cc
NixOS_nix/src/libexpr-tests/nix_api_value.cc
#include "nix_api_store.h" #include "nix_api_store_internal.h" #include "nix_api_util.h" #include "nix_api_util_internal.h" #include "nix_api_expr.h" #include "nix_api_value.h" #include "nix_api_expr_internal.h" #include "tests/nix_api_expr.hh" #include "tests/string_callback.hh" #include "gmock/gmock.h" #include <cstddef> #include <cstdlib> #include <gtest/gtest.h> namespace nixC { TEST_F(nix_api_expr_test, as_nix_value_ptr) { // nix_alloc_value casts nix::Value to nix_value // It should be obvious from the decl that that works, but if it doesn't, // the whole implementation would be utterly broken. ASSERT_EQ(sizeof(nix::Value), sizeof(nix_value)); } TEST_F(nix_api_expr_test, nix_value_get_int_invalid) { ASSERT_EQ(0, nix_get_int(ctx, nullptr)); assert_ctx_err(); ASSERT_EQ(0, nix_get_int(ctx, value)); assert_ctx_err(); } TEST_F(nix_api_expr_test, nix_value_set_get_int) { int myInt = 1; nix_init_int(ctx, value, myInt); ASSERT_EQ(myInt, nix_get_int(ctx, value)); ASSERT_STREQ("an integer", nix_get_typename(ctx, value)); ASSERT_EQ(NIX_TYPE_INT, nix_get_type(ctx, value)); } TEST_F(nix_api_expr_test, nix_value_set_get_float_invalid) { ASSERT_DOUBLE_EQ(0.0, nix_get_float(ctx, nullptr)); assert_ctx_err(); ASSERT_DOUBLE_EQ(0.0, nix_get_float(ctx, value)); assert_ctx_err(); } TEST_F(nix_api_expr_test, nix_value_set_get_float) { double myDouble = 1.0; nix_init_float(ctx, value, myDouble); ASSERT_DOUBLE_EQ(myDouble, nix_get_float(ctx, value)); ASSERT_STREQ("a float", nix_get_typename(ctx, value)); ASSERT_EQ(NIX_TYPE_FLOAT, nix_get_type(ctx, value)); } TEST_F(nix_api_expr_test, nix_value_set_get_bool_invalid) { ASSERT_EQ(false, nix_get_bool(ctx, nullptr)); assert_ctx_err(); ASSERT_EQ(false, nix_get_bool(ctx, value)); assert_ctx_err(); } TEST_F(nix_api_expr_test, nix_value_set_get_bool) { bool myBool = true; nix_init_bool(ctx, value, myBool); ASSERT_EQ(myBool, nix_get_bool(ctx, value)); ASSERT_STREQ("a Boolean", nix_get_typename(ctx, value)); ASSERT_EQ(NIX_TYPE_BOOL, nix_get_type(ctx, value)); } TEST_F(nix_api_expr_test, nix_value_set_get_string_invalid) { std::string string_value; ASSERT_EQ(NIX_ERR_UNKNOWN, nix_get_string(ctx, nullptr, OBSERVE_STRING(string_value))); assert_ctx_err(); ASSERT_EQ(NIX_ERR_UNKNOWN, nix_get_string(ctx, value, OBSERVE_STRING(string_value))); assert_ctx_err(); } TEST_F(nix_api_expr_test, nix_value_set_get_string) { std::string string_value; const char * myString = "some string"; nix_init_string(ctx, value, myString); nix_get_string(ctx, value, OBSERVE_STRING(string_value)); ASSERT_STREQ(myString, string_value.c_str()); ASSERT_STREQ("a string", nix_get_typename(ctx, value)); ASSERT_EQ(NIX_TYPE_STRING, nix_get_type(ctx, value)); } TEST_F(nix_api_expr_test, nix_value_set_get_null_invalid) { ASSERT_EQ(NULL, nix_get_typename(ctx, value)); assert_ctx_err(); } TEST_F(nix_api_expr_test, nix_value_set_get_null) { nix_init_null(ctx, value); ASSERT_STREQ("null", nix_get_typename(ctx, value)); ASSERT_EQ(NIX_TYPE_NULL, nix_get_type(ctx, value)); } TEST_F(nix_api_expr_test, nix_value_set_get_path_invalid) { ASSERT_EQ(nullptr, nix_get_path_string(ctx, nullptr)); assert_ctx_err(); ASSERT_EQ(nullptr, nix_get_path_string(ctx, value)); assert_ctx_err(); } TEST_F(nix_api_expr_test, nix_value_set_get_path) { const char * p = "/nix/store/40s0qmrfb45vlh6610rk29ym318dswdr-myname"; nix_init_path_string(ctx, state, value, p); ASSERT_STREQ(p, nix_get_path_string(ctx, value)); ASSERT_STREQ("a path", nix_get_typename(ctx, value)); ASSERT_EQ(NIX_TYPE_PATH, nix_get_type(ctx, value)); } TEST_F(nix_api_expr_test, nix_build_and_init_list_invalid) { ASSERT_EQ(nullptr, nix_get_list_byidx(ctx, nullptr, state, 0)); assert_ctx_err(); ASSERT_EQ(0, nix_get_list_size(ctx, nullptr)); assert_ctx_err(); ASSERT_EQ(nullptr, nix_get_list_byidx(ctx, value, state, 0)); assert_ctx_err(); ASSERT_EQ(0, nix_get_list_size(ctx, value)); assert_ctx_err(); } TEST_F(nix_api_expr_test, nix_build_and_init_list) { int size = 10; ListBuilder * builder = nix_make_list_builder(ctx, state, size); nix_value * intValue = nix_alloc_value(ctx, state); nix_value * intValue2 = nix_alloc_value(ctx, state); // `init` and `insert` can be called in any order nix_init_int(ctx, intValue, 42); nix_list_builder_insert(ctx, builder, 0, intValue); nix_list_builder_insert(ctx, builder, 1, intValue2); nix_init_int(ctx, intValue2, 43); nix_make_list(ctx, builder, value); nix_list_builder_free(builder); ASSERT_EQ(42, nix_get_int(ctx, nix_get_list_byidx(ctx, value, state, 0))); ASSERT_EQ(43, nix_get_int(ctx, nix_get_list_byidx(ctx, value, state, 1))); ASSERT_EQ(nullptr, nix_get_list_byidx(ctx, value, state, 2)); ASSERT_EQ(10, nix_get_list_size(ctx, value)); ASSERT_STREQ("a list", nix_get_typename(ctx, value)); ASSERT_EQ(NIX_TYPE_LIST, nix_get_type(ctx, value)); // Clean up nix_gc_decref(ctx, intValue); } TEST_F(nix_api_expr_test, nix_build_and_init_attr_invalid) { ASSERT_EQ(nullptr, nix_get_attr_byname(ctx, nullptr, state, 0)); assert_ctx_err(); ASSERT_EQ(nullptr, nix_get_attr_byidx(ctx, nullptr, state, 0, nullptr)); assert_ctx_err(); ASSERT_EQ(nullptr, nix_get_attr_name_byidx(ctx, nullptr, state, 0)); assert_ctx_err(); ASSERT_EQ(0, nix_get_attrs_size(ctx, nullptr)); assert_ctx_err(); ASSERT_EQ(false, nix_has_attr_byname(ctx, nullptr, state, "no-value")); assert_ctx_err(); ASSERT_EQ(nullptr, nix_get_attr_byname(ctx, value, state, 0)); assert_ctx_err(); ASSERT_EQ(nullptr, nix_get_attr_byidx(ctx, value, state, 0, nullptr)); assert_ctx_err(); ASSERT_EQ(nullptr, nix_get_attr_name_byidx(ctx, value, state, 0)); assert_ctx_err(); ASSERT_EQ(0, nix_get_attrs_size(ctx, value)); assert_ctx_err(); ASSERT_EQ(false, nix_has_attr_byname(ctx, value, state, "no-value")); assert_ctx_err(); } TEST_F(nix_api_expr_test, nix_build_and_init_attr) { int size = 10; const char ** out_name = (const char **) malloc(sizeof(char *)); BindingsBuilder * builder = nix_make_bindings_builder(ctx, state, size); nix_value * intValue = nix_alloc_value(ctx, state); nix_init_int(ctx, intValue, 42); nix_value * stringValue = nix_alloc_value(ctx, state); nix_init_string(ctx, stringValue, "foo"); nix_bindings_builder_insert(ctx, builder, "a", intValue); nix_bindings_builder_insert(ctx, builder, "b", stringValue); nix_make_attrs(ctx, value, builder); nix_bindings_builder_free(builder); ASSERT_EQ(2, nix_get_attrs_size(ctx, value)); nix_value * out_value = nix_get_attr_byname(ctx, value, state, "a"); ASSERT_EQ(42, nix_get_int(ctx, out_value)); nix_gc_decref(ctx, out_value); out_value = nix_get_attr_byidx(ctx, value, state, 0, out_name); ASSERT_EQ(42, nix_get_int(ctx, out_value)); ASSERT_STREQ("a", *out_name); nix_gc_decref(ctx, out_value); ASSERT_STREQ("a", nix_get_attr_name_byidx(ctx, value, state, 0)); ASSERT_EQ(true, nix_has_attr_byname(ctx, value, state, "b")); ASSERT_EQ(false, nix_has_attr_byname(ctx, value, state, "no-value")); out_value = nix_get_attr_byname(ctx, value, state, "b"); std::string string_value; nix_get_string(ctx, out_value, OBSERVE_STRING(string_value)); ASSERT_STREQ("foo", string_value.c_str()); nix_gc_decref(nullptr, out_value); out_value = nix_get_attr_byidx(ctx, value, state, 1, out_name); nix_get_string(ctx, out_value, OBSERVE_STRING(string_value)); ASSERT_STREQ("foo", string_value.c_str()); ASSERT_STREQ("b", *out_name); nix_gc_decref(nullptr, out_value); ASSERT_STREQ("b", nix_get_attr_name_byidx(ctx, value, state, 1)); ASSERT_STREQ("a set", nix_get_typename(ctx, value)); ASSERT_EQ(NIX_TYPE_ATTRS, nix_get_type(ctx, value)); // Clean up nix_gc_decref(ctx, intValue); nix_gc_decref(ctx, stringValue); free(out_name); } TEST_F(nix_api_expr_test, nix_value_init) { // Setup // two = 2; // f = a: a * a; nix_value * two = nix_alloc_value(ctx, state); nix_init_int(ctx, two, 2); nix_value * f = nix_alloc_value(ctx, state); nix_expr_eval_from_string( ctx, state, R"( a: a * a )", "<test>", f); // Test // r = f two; nix_value * r = nix_alloc_value(ctx, state); nix_init_apply(ctx, r, f, two); assert_ctx_ok(); ValueType t = nix_get_type(ctx, r); assert_ctx_ok(); ASSERT_EQ(t, NIX_TYPE_THUNK); nix_value_force(ctx, state, r); t = nix_get_type(ctx, r); assert_ctx_ok(); ASSERT_EQ(t, NIX_TYPE_INT); int n = nix_get_int(ctx, r); assert_ctx_ok(); ASSERT_EQ(n, 4); // Clean up nix_gc_decref(ctx, two); nix_gc_decref(ctx, f); nix_gc_decref(ctx, r); } TEST_F(nix_api_expr_test, nix_value_init_apply_error) { nix_value * some_string = nix_alloc_value(ctx, state); nix_init_string(ctx, some_string, "some string"); assert_ctx_ok(); nix_value * v = nix_alloc_value(ctx, state); nix_init_apply(ctx, v, some_string, some_string); assert_ctx_ok(); // All ok. Call has not been evaluated yet. // Evaluate it nix_value_force(ctx, state, v); ASSERT_EQ(ctx->last_err_code, NIX_ERR_NIX_ERROR); ASSERT_THAT(ctx->last_err.value(), testing::HasSubstr("attempt to call something which is not a function but")); // Clean up nix_gc_decref(ctx, some_string); nix_gc_decref(ctx, v); } TEST_F(nix_api_expr_test, nix_value_init_apply_lazy_arg) { // f is a lazy function: it does not evaluate its argument before returning its return value // g is a helper to produce e // e is a thunk that throws an exception // // r = f e // r should not throw an exception, because e is not evaluated nix_value * f = nix_alloc_value(ctx, state); nix_expr_eval_from_string( ctx, state, R"( a: { foo = a; } )", "<test>", f); assert_ctx_ok(); nix_value * e = nix_alloc_value(ctx, state); { nix_value * g = nix_alloc_value(ctx, state); nix_expr_eval_from_string( ctx, state, R"( _ignore: throw "error message for test case nix_value_init_apply_lazy_arg" )", "<test>", g); assert_ctx_ok(); nix_init_apply(ctx, e, g, g); assert_ctx_ok(); nix_gc_decref(ctx, g); } nix_value * r = nix_alloc_value(ctx, state); nix_init_apply(ctx, r, f, e); assert_ctx_ok(); nix_value_force(ctx, state, r); assert_ctx_ok(); auto n = nix_get_attrs_size(ctx, r); assert_ctx_ok(); ASSERT_EQ(1, n); // nix_get_attr_byname isn't lazy (it could have been) so it will throw the exception nix_value * foo = nix_get_attr_byname(ctx, r, state, "foo"); ASSERT_EQ(nullptr, foo); ASSERT_THAT(ctx->last_err.value(), testing::HasSubstr("error message for test case nix_value_init_apply_lazy_arg")); // Clean up nix_gc_decref(ctx, f); nix_gc_decref(ctx, e); } TEST_F(nix_api_expr_test, nix_copy_value) { nix_value * source = nix_alloc_value(ctx, state); nix_init_int(ctx, source, 42); nix_copy_value(ctx, value, source); ASSERT_EQ(42, nix_get_int(ctx, value)); // Clean up nix_gc_decref(ctx, source); } }
11,643
C++
.cc
321
31.604361
120
0.650565
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,032
primops.cc
NixOS_nix/src/libexpr-tests/primops.cc
#include <gmock/gmock.h> #include <gtest/gtest.h> #include "eval-settings.hh" #include "memory-source-accessor.hh" #include "tests/libexpr.hh" namespace nix { class CaptureLogger : public Logger { std::ostringstream oss; public: CaptureLogger() {} std::string get() const { return oss.str(); } void log(Verbosity lvl, std::string_view s) override { oss << s << std::endl; } void logEI(const ErrorInfo & ei) override { showErrorInfo(oss, ei, loggerSettings.showTrace.get()); } }; class CaptureLogging { Logger * oldLogger; std::unique_ptr<CaptureLogger> tempLogger; public: CaptureLogging() : tempLogger(std::make_unique<CaptureLogger>()) { oldLogger = logger; logger = tempLogger.get(); } ~CaptureLogging() { logger = oldLogger; } std::string get() const { return tempLogger->get(); } }; // Testing eval of PrimOp's class PrimOpTest : public LibExprTest {}; TEST_F(PrimOpTest, throw) { ASSERT_THROW(eval("throw \"foo\""), ThrownError); } TEST_F(PrimOpTest, abort) { ASSERT_THROW(eval("abort \"abort\""), Abort); } TEST_F(PrimOpTest, ceil) { auto v = eval("builtins.ceil 1.9"); ASSERT_THAT(v, IsIntEq(2)); } TEST_F(PrimOpTest, floor) { auto v = eval("builtins.floor 1.9"); ASSERT_THAT(v, IsIntEq(1)); } TEST_F(PrimOpTest, tryEvalFailure) { auto v = eval("builtins.tryEval (throw \"\")"); ASSERT_THAT(v, IsAttrsOfSize(2)); auto s = createSymbol("success"); auto p = v.attrs()->get(s); ASSERT_NE(p, nullptr); ASSERT_THAT(*p->value, IsFalse()); } TEST_F(PrimOpTest, tryEvalSuccess) { auto v = eval("builtins.tryEval 123"); ASSERT_THAT(v, IsAttrs()); auto s = createSymbol("success"); auto p = v.attrs()->get(s); ASSERT_NE(p, nullptr); ASSERT_THAT(*p->value, IsTrue()); s = createSymbol("value"); p = v.attrs()->get(s); ASSERT_NE(p, nullptr); ASSERT_THAT(*p->value, IsIntEq(123)); } TEST_F(PrimOpTest, getEnv) { setEnv("_NIX_UNIT_TEST_ENV_VALUE", "test value"); auto v = eval("builtins.getEnv \"_NIX_UNIT_TEST_ENV_VALUE\""); ASSERT_THAT(v, IsStringEq("test value")); } TEST_F(PrimOpTest, seq) { ASSERT_THROW(eval("let x = throw \"test\"; in builtins.seq x { }"), ThrownError); } TEST_F(PrimOpTest, seqNotDeep) { auto v = eval("let x = { z = throw \"test\"; }; in builtins.seq x { }"); ASSERT_THAT(v, IsAttrs()); } TEST_F(PrimOpTest, deepSeq) { ASSERT_THROW(eval("let x = { z = throw \"test\"; }; in builtins.deepSeq x { }"), ThrownError); } TEST_F(PrimOpTest, trace) { CaptureLogging l; auto v = eval("builtins.trace \"test string 123\" 123"); ASSERT_THAT(v, IsIntEq(123)); auto text = l.get(); ASSERT_NE(text.find("test string 123"), std::string::npos); } TEST_F(PrimOpTest, placeholder) { auto v = eval("builtins.placeholder \"out\""); ASSERT_THAT(v, IsStringEq("/1rz4g4znpzjwh1xymhjpm42vipw92pr73vdgl6xs1hycac8kf2n9")); } TEST_F(PrimOpTest, baseNameOf) { auto v = eval("builtins.baseNameOf /some/path"); ASSERT_THAT(v, IsStringEq("path")); } TEST_F(PrimOpTest, dirOf) { auto v = eval("builtins.dirOf /some/path"); ASSERT_THAT(v, IsPathEq("/some")); } TEST_F(PrimOpTest, attrValues) { auto v = eval("builtins.attrValues { x = \"foo\"; a = 1; }"); ASSERT_THAT(v, IsListOfSize(2)); ASSERT_THAT(*v.listElems()[0], IsIntEq(1)); ASSERT_THAT(*v.listElems()[1], IsStringEq("foo")); } TEST_F(PrimOpTest, getAttr) { auto v = eval("builtins.getAttr \"x\" { x = \"foo\"; }"); ASSERT_THAT(v, IsStringEq("foo")); } TEST_F(PrimOpTest, getAttrNotFound) { // FIXME: TypeError is really bad here, also the error wording is worse // than on Nix <=2.3 ASSERT_THROW(eval("builtins.getAttr \"y\" { }"), TypeError); } TEST_F(PrimOpTest, unsafeGetAttrPos) { state.corepkgsFS->addFile(CanonPath("foo.nix"), "\n\r\n\r{ y = \"x\"; }"); auto expr = "builtins.unsafeGetAttrPos \"y\" (import <nix/foo.nix>)"; auto v = eval(expr); ASSERT_THAT(v, IsAttrsOfSize(3)); auto file = v.attrs()->find(createSymbol("file")); ASSERT_NE(file, nullptr); ASSERT_THAT(*file->value, IsString()); auto s = baseNameOf(file->value->string_view()); ASSERT_EQ(s, "foo.nix"); auto line = v.attrs()->find(createSymbol("line")); ASSERT_NE(line, nullptr); state.forceValue(*line->value, noPos); ASSERT_THAT(*line->value, IsIntEq(4)); auto column = v.attrs()->find(createSymbol("column")); ASSERT_NE(column, nullptr); state.forceValue(*column->value, noPos); ASSERT_THAT(*column->value, IsIntEq(3)); } TEST_F(PrimOpTest, hasAttr) { auto v = eval("builtins.hasAttr \"x\" { x = 1; }"); ASSERT_THAT(v, IsTrue()); } TEST_F(PrimOpTest, hasAttrNotFound) { auto v = eval("builtins.hasAttr \"x\" { }"); ASSERT_THAT(v, IsFalse()); } TEST_F(PrimOpTest, isAttrs) { auto v = eval("builtins.isAttrs {}"); ASSERT_THAT(v, IsTrue()); } TEST_F(PrimOpTest, isAttrsFalse) { auto v = eval("builtins.isAttrs null"); ASSERT_THAT(v, IsFalse()); } TEST_F(PrimOpTest, removeAttrs) { auto v = eval("builtins.removeAttrs { x = 1; } [\"x\"]"); ASSERT_THAT(v, IsAttrsOfSize(0)); } TEST_F(PrimOpTest, removeAttrsRetains) { auto v = eval("builtins.removeAttrs { x = 1; y = 2; } [\"x\"]"); ASSERT_THAT(v, IsAttrsOfSize(1)); ASSERT_NE(v.attrs()->find(createSymbol("y")), nullptr); } TEST_F(PrimOpTest, listToAttrsEmptyList) { auto v = eval("builtins.listToAttrs []"); ASSERT_THAT(v, IsAttrsOfSize(0)); ASSERT_EQ(v.type(), nAttrs); ASSERT_EQ(v.attrs()->size(), 0); } TEST_F(PrimOpTest, listToAttrsNotFieldName) { ASSERT_THROW(eval("builtins.listToAttrs [{}]"), Error); } TEST_F(PrimOpTest, listToAttrs) { auto v = eval("builtins.listToAttrs [ { name = \"key\"; value = 123; } ]"); ASSERT_THAT(v, IsAttrsOfSize(1)); auto key = v.attrs()->find(createSymbol("key")); ASSERT_NE(key, nullptr); ASSERT_THAT(*key->value, IsIntEq(123)); } TEST_F(PrimOpTest, intersectAttrs) { auto v = eval("builtins.intersectAttrs { a = 1; b = 2; } { b = 3; c = 4; }"); ASSERT_THAT(v, IsAttrsOfSize(1)); auto b = v.attrs()->find(createSymbol("b")); ASSERT_NE(b, nullptr); ASSERT_THAT(*b->value, IsIntEq(3)); } TEST_F(PrimOpTest, catAttrs) { auto v = eval("builtins.catAttrs \"a\" [{a = 1;} {b = 0;} {a = 2;}]"); ASSERT_THAT(v, IsListOfSize(2)); ASSERT_THAT(*v.listElems()[0], IsIntEq(1)); ASSERT_THAT(*v.listElems()[1], IsIntEq(2)); } TEST_F(PrimOpTest, functionArgs) { auto v = eval("builtins.functionArgs ({ x, y ? 123}: 1)"); ASSERT_THAT(v, IsAttrsOfSize(2)); auto x = v.attrs()->find(createSymbol("x")); ASSERT_NE(x, nullptr); ASSERT_THAT(*x->value, IsFalse()); auto y = v.attrs()->find(createSymbol("y")); ASSERT_NE(y, nullptr); ASSERT_THAT(*y->value, IsTrue()); } TEST_F(PrimOpTest, mapAttrs) { auto v = eval("builtins.mapAttrs (name: value: value * 10) { a = 1; b = 2; }"); ASSERT_THAT(v, IsAttrsOfSize(2)); auto a = v.attrs()->find(createSymbol("a")); ASSERT_NE(a, nullptr); ASSERT_THAT(*a->value, IsThunk()); state.forceValue(*a->value, noPos); ASSERT_THAT(*a->value, IsIntEq(10)); auto b = v.attrs()->find(createSymbol("b")); ASSERT_NE(b, nullptr); ASSERT_THAT(*b->value, IsThunk()); state.forceValue(*b->value, noPos); ASSERT_THAT(*b->value, IsIntEq(20)); } TEST_F(PrimOpTest, isList) { auto v = eval("builtins.isList []"); ASSERT_THAT(v, IsTrue()); } TEST_F(PrimOpTest, isListFalse) { auto v = eval("builtins.isList null"); ASSERT_THAT(v, IsFalse()); } TEST_F(PrimOpTest, elemtAt) { auto v = eval("builtins.elemAt [0 1 2 3] 3"); ASSERT_THAT(v, IsIntEq(3)); } TEST_F(PrimOpTest, elemtAtOutOfBounds) { ASSERT_THROW(eval("builtins.elemAt [0 1 2 3] 5"), Error); } TEST_F(PrimOpTest, head) { auto v = eval("builtins.head [ 3 2 1 0 ]"); ASSERT_THAT(v, IsIntEq(3)); } TEST_F(PrimOpTest, headEmpty) { ASSERT_THROW(eval("builtins.head [ ]"), Error); } TEST_F(PrimOpTest, headWrongType) { ASSERT_THROW(eval("builtins.head { }"), Error); } TEST_F(PrimOpTest, tail) { auto v = eval("builtins.tail [ 3 2 1 0 ]"); ASSERT_THAT(v, IsListOfSize(3)); for (const auto [n, elem] : enumerate(v.listItems())) ASSERT_THAT(*elem, IsIntEq(2 - static_cast<int>(n))); } TEST_F(PrimOpTest, tailEmpty) { ASSERT_THROW(eval("builtins.tail []"), Error); } TEST_F(PrimOpTest, map) { auto v = eval("map (x: \"foo\" + x) [ \"bar\" \"bla\" \"abc\" ]"); ASSERT_THAT(v, IsListOfSize(3)); auto elem = v.listElems()[0]; ASSERT_THAT(*elem, IsThunk()); state.forceValue(*elem, noPos); ASSERT_THAT(*elem, IsStringEq("foobar")); elem = v.listElems()[1]; ASSERT_THAT(*elem, IsThunk()); state.forceValue(*elem, noPos); ASSERT_THAT(*elem, IsStringEq("foobla")); elem = v.listElems()[2]; ASSERT_THAT(*elem, IsThunk()); state.forceValue(*elem, noPos); ASSERT_THAT(*elem, IsStringEq("fooabc")); } TEST_F(PrimOpTest, filter) { auto v = eval("builtins.filter (x: x == 2) [ 3 2 3 2 3 2 ]"); ASSERT_THAT(v, IsListOfSize(3)); for (const auto elem : v.listItems()) ASSERT_THAT(*elem, IsIntEq(2)); } TEST_F(PrimOpTest, elemTrue) { auto v = eval("builtins.elem 3 [ 1 2 3 4 5 ]"); ASSERT_THAT(v, IsTrue()); } TEST_F(PrimOpTest, elemFalse) { auto v = eval("builtins.elem 6 [ 1 2 3 4 5 ]"); ASSERT_THAT(v, IsFalse()); } TEST_F(PrimOpTest, concatLists) { auto v = eval("builtins.concatLists [[1 2] [3 4]]"); ASSERT_THAT(v, IsListOfSize(4)); for (const auto [i, elem] : enumerate(v.listItems())) ASSERT_THAT(*elem, IsIntEq(static_cast<int>(i)+1)); } TEST_F(PrimOpTest, length) { auto v = eval("builtins.length [ 1 2 3 ]"); ASSERT_THAT(v, IsIntEq(3)); } TEST_F(PrimOpTest, foldStrict) { auto v = eval("builtins.foldl' (a: b: a + b) 0 [1 2 3]"); ASSERT_THAT(v, IsIntEq(6)); } TEST_F(PrimOpTest, anyTrue) { auto v = eval("builtins.any (x: x == 2) [ 1 2 3 ]"); ASSERT_THAT(v, IsTrue()); } TEST_F(PrimOpTest, anyFalse) { auto v = eval("builtins.any (x: x == 5) [ 1 2 3 ]"); ASSERT_THAT(v, IsFalse()); } TEST_F(PrimOpTest, allTrue) { auto v = eval("builtins.all (x: x > 0) [ 1 2 3 ]"); ASSERT_THAT(v, IsTrue()); } TEST_F(PrimOpTest, allFalse) { auto v = eval("builtins.all (x: x <= 0) [ 1 2 3 ]"); ASSERT_THAT(v, IsFalse()); } TEST_F(PrimOpTest, genList) { auto v = eval("builtins.genList (x: x + 1) 3"); ASSERT_EQ(v.type(), nList); ASSERT_EQ(v.listSize(), 3); for (const auto [i, elem] : enumerate(v.listItems())) { ASSERT_THAT(*elem, IsThunk()); state.forceValue(*elem, noPos); ASSERT_THAT(*elem, IsIntEq(static_cast<int>(i)+1)); } } TEST_F(PrimOpTest, sortLessThan) { auto v = eval("builtins.sort builtins.lessThan [ 483 249 526 147 42 77 ]"); ASSERT_EQ(v.type(), nList); ASSERT_EQ(v.listSize(), 6); const std::vector<int> numbers = { 42, 77, 147, 249, 483, 526 }; for (const auto [n, elem] : enumerate(v.listItems())) ASSERT_THAT(*elem, IsIntEq(numbers[n])); } TEST_F(PrimOpTest, partition) { auto v = eval("builtins.partition (x: x > 10) [1 23 9 3 42]"); ASSERT_THAT(v, IsAttrsOfSize(2)); auto right = v.attrs()->get(createSymbol("right")); ASSERT_NE(right, nullptr); ASSERT_THAT(*right->value, IsListOfSize(2)); ASSERT_THAT(*right->value->listElems()[0], IsIntEq(23)); ASSERT_THAT(*right->value->listElems()[1], IsIntEq(42)); auto wrong = v.attrs()->get(createSymbol("wrong")); ASSERT_NE(wrong, nullptr); ASSERT_EQ(wrong->value->type(), nList); ASSERT_EQ(wrong->value->listSize(), 3); ASSERT_THAT(*wrong->value, IsListOfSize(3)); ASSERT_THAT(*wrong->value->listElems()[0], IsIntEq(1)); ASSERT_THAT(*wrong->value->listElems()[1], IsIntEq(9)); ASSERT_THAT(*wrong->value->listElems()[2], IsIntEq(3)); } TEST_F(PrimOpTest, concatMap) { auto v = eval("builtins.concatMap (x: x ++ [0]) [ [1 2] [3 4] ]"); ASSERT_EQ(v.type(), nList); ASSERT_EQ(v.listSize(), 6); const std::vector<int> numbers = { 1, 2, 0, 3, 4, 0 }; for (const auto [n, elem] : enumerate(v.listItems())) ASSERT_THAT(*elem, IsIntEq(numbers[n])); } TEST_F(PrimOpTest, addInt) { auto v = eval("builtins.add 3 5"); ASSERT_THAT(v, IsIntEq(8)); } TEST_F(PrimOpTest, addFloat) { auto v = eval("builtins.add 3.0 5.0"); ASSERT_THAT(v, IsFloatEq(8.0)); } TEST_F(PrimOpTest, addFloatToInt) { auto v = eval("builtins.add 3.0 5"); ASSERT_THAT(v, IsFloatEq(8.0)); v = eval("builtins.add 3 5.0"); ASSERT_THAT(v, IsFloatEq(8.0)); } TEST_F(PrimOpTest, subInt) { auto v = eval("builtins.sub 5 2"); ASSERT_THAT(v, IsIntEq(3)); } TEST_F(PrimOpTest, subFloat) { auto v = eval("builtins.sub 5.0 2.0"); ASSERT_THAT(v, IsFloatEq(3.0)); } TEST_F(PrimOpTest, subFloatFromInt) { auto v = eval("builtins.sub 5.0 2"); ASSERT_THAT(v, IsFloatEq(3.0)); v = eval("builtins.sub 4 2.0"); ASSERT_THAT(v, IsFloatEq(2.0)); } TEST_F(PrimOpTest, mulInt) { auto v = eval("builtins.mul 3 5"); ASSERT_THAT(v, IsIntEq(15)); } TEST_F(PrimOpTest, mulFloat) { auto v = eval("builtins.mul 3.0 5.0"); ASSERT_THAT(v, IsFloatEq(15.0)); } TEST_F(PrimOpTest, mulFloatMixed) { auto v = eval("builtins.mul 3 5.0"); ASSERT_THAT(v, IsFloatEq(15.0)); v = eval("builtins.mul 2.0 5"); ASSERT_THAT(v, IsFloatEq(10.0)); } TEST_F(PrimOpTest, divInt) { auto v = eval("builtins.div 5 (-1)"); ASSERT_THAT(v, IsIntEq(-5)); } TEST_F(PrimOpTest, divIntZero) { ASSERT_THROW(eval("builtins.div 5 0"), EvalError); } TEST_F(PrimOpTest, divFloat) { auto v = eval("builtins.div 5.0 (-1)"); ASSERT_THAT(v, IsFloatEq(-5.0)); } TEST_F(PrimOpTest, divFloatZero) { ASSERT_THROW(eval("builtins.div 5.0 0.0"), EvalError); } TEST_F(PrimOpTest, bitOr) { auto v = eval("builtins.bitOr 1 2"); ASSERT_THAT(v, IsIntEq(3)); } TEST_F(PrimOpTest, bitXor) { auto v = eval("builtins.bitXor 3 2"); ASSERT_THAT(v, IsIntEq(1)); } TEST_F(PrimOpTest, lessThanFalse) { auto v = eval("builtins.lessThan 3 1"); ASSERT_THAT(v, IsFalse()); } TEST_F(PrimOpTest, lessThanTrue) { auto v = eval("builtins.lessThan 1 3"); ASSERT_THAT(v, IsTrue()); } TEST_F(PrimOpTest, toStringAttrsThrows) { ASSERT_THROW(eval("builtins.toString {}"), EvalError); } TEST_F(PrimOpTest, toStringLambdaThrows) { ASSERT_THROW(eval("builtins.toString (x: x)"), EvalError); } class ToStringPrimOpTest : public PrimOpTest, public testing::WithParamInterface<std::tuple<std::string, std::string_view>> {}; TEST_P(ToStringPrimOpTest, toString) { const auto [input, output] = GetParam(); auto v = eval(input); ASSERT_THAT(v, IsStringEq(output)); } #define CASE(input, output) (std::make_tuple(std::string_view("builtins.toString " input), std::string_view(output))) INSTANTIATE_TEST_SUITE_P( toString, ToStringPrimOpTest, testing::Values( CASE(R"("foo")", "foo"), CASE(R"(1)", "1"), CASE(R"([1 2 3])", "1 2 3"), CASE(R"(.123)", "0.123000"), CASE(R"(true)", "1"), CASE(R"(false)", ""), CASE(R"(null)", ""), CASE(R"({ v = "bar"; __toString = self: self.v; })", "bar"), CASE(R"({ v = "bar"; __toString = self: self.v; outPath = "foo"; })", "bar"), CASE(R"({ outPath = "foo"; })", "foo"), CASE(R"(./test)", "/test") ) ); #undef CASE TEST_F(PrimOpTest, substring){ auto v = eval("builtins.substring 0 3 \"nixos\""); ASSERT_THAT(v, IsStringEq("nix")); } TEST_F(PrimOpTest, substringSmallerString){ auto v = eval("builtins.substring 0 3 \"n\""); ASSERT_THAT(v, IsStringEq("n")); } TEST_F(PrimOpTest, substringEmptyString){ auto v = eval("builtins.substring 1 3 \"\""); ASSERT_THAT(v, IsStringEq("")); } TEST_F(PrimOpTest, stringLength) { auto v = eval("builtins.stringLength \"123\""); ASSERT_THAT(v, IsIntEq(3)); } TEST_F(PrimOpTest, hashStringMd5) { auto v = eval("builtins.hashString \"md5\" \"asdf\""); ASSERT_THAT(v, IsStringEq("912ec803b2ce49e4a541068d495ab570")); } TEST_F(PrimOpTest, hashStringSha1) { auto v = eval("builtins.hashString \"sha1\" \"asdf\""); ASSERT_THAT(v, IsStringEq("3da541559918a808c2402bba5012f6c60b27661c")); } TEST_F(PrimOpTest, hashStringSha256) { auto v = eval("builtins.hashString \"sha256\" \"asdf\""); ASSERT_THAT(v, IsStringEq("f0e4c2f76c58916ec258f246851bea091d14d4247a2fc3e18694461b1816e13b")); } TEST_F(PrimOpTest, hashStringSha512) { auto v = eval("builtins.hashString \"sha512\" \"asdf\""); ASSERT_THAT(v, IsStringEq("401b09eab3c013d4ca54922bb802bec8fd5318192b0a75f201d8b3727429080fb337591abd3e44453b954555b7a0812e1081c39b740293f765eae731f5a65ed1")); } TEST_F(PrimOpTest, hashStringInvalidHashAlgorithm) { ASSERT_THROW(eval("builtins.hashString \"foobar\" \"asdf\""), Error); } TEST_F(PrimOpTest, nixPath) { auto v = eval("builtins.nixPath"); ASSERT_EQ(v.type(), nList); // We can't test much more as currently the EvalSettings are a global // that we can't easily swap / replace } TEST_F(PrimOpTest, langVersion) { auto v = eval("builtins.langVersion"); ASSERT_EQ(v.type(), nInt); } TEST_F(PrimOpTest, storeDir) { auto v = eval("builtins.storeDir"); ASSERT_THAT(v, IsStringEq(settings.nixStore)); } TEST_F(PrimOpTest, nixVersion) { auto v = eval("builtins.nixVersion"); ASSERT_THAT(v, IsStringEq(nixVersion)); } TEST_F(PrimOpTest, currentSystem) { auto v = eval("builtins.currentSystem"); ASSERT_THAT(v, IsStringEq(evalSettings.getCurrentSystem())); } TEST_F(PrimOpTest, derivation) { auto v = eval("derivation"); ASSERT_EQ(v.type(), nFunction); ASSERT_TRUE(v.isLambda()); ASSERT_NE(v.payload.lambda.fun, nullptr); ASSERT_TRUE(v.payload.lambda.fun->hasFormals()); } TEST_F(PrimOpTest, currentTime) { auto v = eval("builtins.currentTime"); ASSERT_EQ(v.type(), nInt); ASSERT_TRUE(v.integer() > 0); } TEST_F(PrimOpTest, splitVersion) { auto v = eval("builtins.splitVersion \"1.2.3git\""); ASSERT_THAT(v, IsListOfSize(4)); const std::vector<std::string_view> strings = { "1", "2", "3", "git" }; for (const auto [n, p] : enumerate(v.listItems())) ASSERT_THAT(*p, IsStringEq(strings[n])); } class CompareVersionsPrimOpTest : public PrimOpTest, public testing::WithParamInterface<std::tuple<std::string, const int>> {}; TEST_P(CompareVersionsPrimOpTest, compareVersions) { auto [expression, expectation] = GetParam(); auto v = eval(expression); ASSERT_THAT(v, IsIntEq(expectation)); } #define CASE(a, b, expected) (std::make_tuple("builtins.compareVersions \"" #a "\" \"" #b "\"", expected)) INSTANTIATE_TEST_SUITE_P( compareVersions, CompareVersionsPrimOpTest, testing::Values( // The first two are weird cases. Intuition tells they should // be the same but they aren't. CASE(1.0, 1.0.0, -1), CASE(1.0.0, 1.0, 1), // the following are from the nix-env manual: CASE(1.0, 2.3, -1), CASE(2.1, 2.3, -1), CASE(2.3, 2.3, 0), CASE(2.5, 2.3, 1), CASE(3.1, 2.3, 1), CASE(2.3.1, 2.3, 1), CASE(2.3.1, 2.3a, 1), CASE(2.3pre1, 2.3, -1), CASE(2.3pre3, 2.3pre12, -1), CASE(2.3a, 2.3c, -1), CASE(2.3pre1, 2.3c, -1), CASE(2.3pre1, 2.3q, -1) ) ); #undef CASE class ParseDrvNamePrimOpTest : public PrimOpTest, public testing::WithParamInterface<std::tuple<std::string, std::string_view, std::string_view>> {}; TEST_P(ParseDrvNamePrimOpTest, parseDrvName) { auto [input, expectedName, expectedVersion] = GetParam(); const auto expr = fmt("builtins.parseDrvName \"%1%\"", input); auto v = eval(expr); ASSERT_THAT(v, IsAttrsOfSize(2)); auto name = v.attrs()->find(createSymbol("name")); ASSERT_TRUE(name); ASSERT_THAT(*name->value, IsStringEq(expectedName)); auto version = v.attrs()->find(createSymbol("version")); ASSERT_TRUE(version); ASSERT_THAT(*version->value, IsStringEq(expectedVersion)); } INSTANTIATE_TEST_SUITE_P( parseDrvName, ParseDrvNamePrimOpTest, testing::Values( std::make_tuple("nix-0.12pre12876", "nix", "0.12pre12876"), std::make_tuple("a-b-c-1234pre5+git", "a-b-c", "1234pre5+git") ) ); TEST_F(PrimOpTest, replaceStrings) { // FIXME: add a test that verifies the string context is as expected auto v = eval("builtins.replaceStrings [\"oo\" \"a\"] [\"a\" \"i\"] \"foobar\""); ASSERT_EQ(v.type(), nString); ASSERT_EQ(v.string_view(), "fabir"); } TEST_F(PrimOpTest, concatStringsSep) { // FIXME: add a test that verifies the string context is as expected auto v = eval("builtins.concatStringsSep \"%\" [\"foo\" \"bar\" \"baz\"]"); ASSERT_EQ(v.type(), nString); ASSERT_EQ(v.string_view(), "foo%bar%baz"); } TEST_F(PrimOpTest, split1) { // v = [ "" [ "a" ] "c" ] auto v = eval("builtins.split \"(a)b\" \"abc\""); ASSERT_THAT(v, IsListOfSize(3)); ASSERT_THAT(*v.listElems()[0], IsStringEq("")); ASSERT_THAT(*v.listElems()[1], IsListOfSize(1)); ASSERT_THAT(*v.listElems()[1]->listElems()[0], IsStringEq("a")); ASSERT_THAT(*v.listElems()[2], IsStringEq("c")); } TEST_F(PrimOpTest, split2) { // v is expected to be a list [ "" [ "a" ] "b" [ "c"] "" ] auto v = eval("builtins.split \"([ac])\" \"abc\""); ASSERT_THAT(v, IsListOfSize(5)); ASSERT_THAT(*v.listElems()[0], IsStringEq("")); ASSERT_THAT(*v.listElems()[1], IsListOfSize(1)); ASSERT_THAT(*v.listElems()[1]->listElems()[0], IsStringEq("a")); ASSERT_THAT(*v.listElems()[2], IsStringEq("b")); ASSERT_THAT(*v.listElems()[3], IsListOfSize(1)); ASSERT_THAT(*v.listElems()[3]->listElems()[0], IsStringEq("c")); ASSERT_THAT(*v.listElems()[4], IsStringEq("")); } TEST_F(PrimOpTest, split3) { auto v = eval("builtins.split \"(a)|(c)\" \"abc\""); ASSERT_THAT(v, IsListOfSize(5)); // First list element ASSERT_THAT(*v.listElems()[0], IsStringEq("")); // 2nd list element is a list [ "" null ] ASSERT_THAT(*v.listElems()[1], IsListOfSize(2)); ASSERT_THAT(*v.listElems()[1]->listElems()[0], IsStringEq("a")); ASSERT_THAT(*v.listElems()[1]->listElems()[1], IsNull()); // 3rd element ASSERT_THAT(*v.listElems()[2], IsStringEq("b")); // 4th element is a list: [ null "c" ] ASSERT_THAT(*v.listElems()[3], IsListOfSize(2)); ASSERT_THAT(*v.listElems()[3]->listElems()[0], IsNull()); ASSERT_THAT(*v.listElems()[3]->listElems()[1], IsStringEq("c")); // 5th element is the empty string ASSERT_THAT(*v.listElems()[4], IsStringEq("")); } TEST_F(PrimOpTest, split4) { auto v = eval("builtins.split \"([[:upper:]]+)\" \" FOO \""); ASSERT_THAT(v, IsListOfSize(3)); auto first = v.listElems()[0]; auto second = v.listElems()[1]; auto third = v.listElems()[2]; ASSERT_THAT(*first, IsStringEq(" ")); ASSERT_THAT(*second, IsListOfSize(1)); ASSERT_THAT(*second->listElems()[0], IsStringEq("FOO")); ASSERT_THAT(*third, IsStringEq(" ")); } TEST_F(PrimOpTest, match1) { auto v = eval("builtins.match \"ab\" \"abc\""); ASSERT_THAT(v, IsNull()); } TEST_F(PrimOpTest, match2) { auto v = eval("builtins.match \"abc\" \"abc\""); ASSERT_THAT(v, IsListOfSize(0)); } TEST_F(PrimOpTest, match3) { auto v = eval("builtins.match \"a(b)(c)\" \"abc\""); ASSERT_THAT(v, IsListOfSize(2)); ASSERT_THAT(*v.listElems()[0], IsStringEq("b")); ASSERT_THAT(*v.listElems()[1], IsStringEq("c")); } TEST_F(PrimOpTest, match4) { auto v = eval("builtins.match \"[[:space:]]+([[:upper:]]+)[[:space:]]+\" \" FOO \""); ASSERT_THAT(v, IsListOfSize(1)); ASSERT_THAT(*v.listElems()[0], IsStringEq("FOO")); } TEST_F(PrimOpTest, match5) { // The regex "\\{}" is valid and matches the string "{}". // Caused a regression before when trying to switch from std::regex to boost::regex. // See https://github.com/NixOS/nix/pull/7762#issuecomment-1834303659 auto v = eval("builtins.match \"\\\\{}\" \"{}\""); ASSERT_THAT(v, IsListOfSize(0)); } TEST_F(PrimOpTest, attrNames) { auto v = eval("builtins.attrNames { x = 1; y = 2; z = 3; a = 2; }"); ASSERT_THAT(v, IsListOfSize(4)); // ensure that the list is sorted const std::vector<std::string_view> expected { "a", "x", "y", "z" }; for (const auto [n, elem] : enumerate(v.listItems())) ASSERT_THAT(*elem, IsStringEq(expected[n])); } TEST_F(PrimOpTest, genericClosure_not_strict) { // Operator should not be used when startSet is empty auto v = eval("builtins.genericClosure { startSet = []; }"); ASSERT_THAT(v, IsListOfSize(0)); } } /* namespace nix */
28,025
C++
.cc
697
31.806313
167
0.564145
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,033
json.cc
NixOS_nix/src/libexpr-tests/json.cc
#include "tests/libexpr.hh" #include "value-to-json.hh" namespace nix { // Testing the conversion to JSON class JSONValueTest : public LibExprTest { protected: std::string getJSONValue(Value& value) { std::stringstream ss; NixStringContext ps; printValueAsJSON(state, true, value, noPos, ss, ps); return ss.str(); } }; TEST_F(JSONValueTest, null) { Value v; v.mkNull(); ASSERT_EQ(getJSONValue(v), "null"); } TEST_F(JSONValueTest, BoolFalse) { Value v; v.mkBool(false); ASSERT_EQ(getJSONValue(v),"false"); } TEST_F(JSONValueTest, BoolTrue) { Value v; v.mkBool(true); ASSERT_EQ(getJSONValue(v), "true"); } TEST_F(JSONValueTest, IntPositive) { Value v; v.mkInt(100); ASSERT_EQ(getJSONValue(v), "100"); } TEST_F(JSONValueTest, IntNegative) { Value v; v.mkInt(-100); ASSERT_EQ(getJSONValue(v), "-100"); } TEST_F(JSONValueTest, String) { Value v; v.mkString("test"); ASSERT_EQ(getJSONValue(v), "\"test\""); } TEST_F(JSONValueTest, StringQuotes) { Value v; v.mkString("test\""); ASSERT_EQ(getJSONValue(v), "\"test\\\"\""); } // The dummy store doesn't support writing files. Fails with this exception message: // C++ exception with description "error: operation 'addToStoreFromDump' is // not supported by store 'dummy'" thrown in the test body. TEST_F(JSONValueTest, DISABLED_Path) { Value v; v.mkPath(state.rootPath(CanonPath("/test"))); ASSERT_EQ(getJSONValue(v), "\"/nix/store/g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-x\""); } } /* namespace nix */
1,821
C++
.cc
57
24.22807
88
0.586423
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,034
trivial.cc
NixOS_nix/src/libexpr-tests/trivial.cc
#include "tests/libexpr.hh" namespace nix { // Testing of trivial expressions class TrivialExpressionTest : public LibExprTest {}; TEST_F(TrivialExpressionTest, true) { auto v = eval("true"); ASSERT_THAT(v, IsTrue()); } TEST_F(TrivialExpressionTest, false) { auto v = eval("false"); ASSERT_THAT(v, IsFalse()); } TEST_F(TrivialExpressionTest, null) { auto v = eval("null"); ASSERT_THAT(v, IsNull()); } TEST_F(TrivialExpressionTest, 1) { auto v = eval("1"); ASSERT_THAT(v, IsIntEq(1)); } TEST_F(TrivialExpressionTest, 1plus1) { auto v = eval("1+1"); ASSERT_THAT(v, IsIntEq(2)); } TEST_F(TrivialExpressionTest, minus1) { auto v = eval("-1"); ASSERT_THAT(v, IsIntEq(-1)); } TEST_F(TrivialExpressionTest, 1minus1) { auto v = eval("1-1"); ASSERT_THAT(v, IsIntEq(0)); } TEST_F(TrivialExpressionTest, lambdaAdd) { auto v = eval("let add = a: b: a + b; in add 1 2"); ASSERT_THAT(v, IsIntEq(3)); } TEST_F(TrivialExpressionTest, list) { auto v = eval("[]"); ASSERT_THAT(v, IsListOfSize(0)); } TEST_F(TrivialExpressionTest, attrs) { auto v = eval("{}"); ASSERT_THAT(v, IsAttrsOfSize(0)); } TEST_F(TrivialExpressionTest, float) { auto v = eval("1.234"); ASSERT_THAT(v, IsFloatEq(1.234)); } TEST_F(TrivialExpressionTest, updateAttrs) { auto v = eval("{ a = 1; } // { b = 2; a = 3; }"); ASSERT_THAT(v, IsAttrsOfSize(2)); auto a = v.attrs()->find(createSymbol("a")); ASSERT_NE(a, nullptr); ASSERT_THAT(*a->value, IsIntEq(3)); auto b = v.attrs()->find(createSymbol("b")); ASSERT_NE(b, nullptr); ASSERT_THAT(*b->value, IsIntEq(2)); } TEST_F(TrivialExpressionTest, hasAttrOpFalse) { auto v = eval("{} ? a"); ASSERT_THAT(v, IsFalse()); } TEST_F(TrivialExpressionTest, hasAttrOpTrue) { auto v = eval("{ a = 123; } ? a"); ASSERT_THAT(v, IsTrue()); } TEST_F(TrivialExpressionTest, withFound) { auto v = eval("with { a = 23; }; a"); ASSERT_THAT(v, IsIntEq(23)); } TEST_F(TrivialExpressionTest, withNotFound) { ASSERT_THROW(eval("with {}; a"), Error); } TEST_F(TrivialExpressionTest, withOverride) { auto v = eval("with { a = 23; }; with { a = 42; }; a"); ASSERT_THAT(v, IsIntEq(42)); } TEST_F(TrivialExpressionTest, letOverWith) { auto v = eval("let a = 23; in with { a = 1; }; a"); ASSERT_THAT(v, IsIntEq(23)); } TEST_F(TrivialExpressionTest, multipleLet) { auto v = eval("let a = 23; in let a = 42; in a"); ASSERT_THAT(v, IsIntEq(42)); } TEST_F(TrivialExpressionTest, defaultFunctionArgs) { auto v = eval("({ a ? 123 }: a) {}"); ASSERT_THAT(v, IsIntEq(123)); } TEST_F(TrivialExpressionTest, defaultFunctionArgsOverride) { auto v = eval("({ a ? 123 }: a) { a = 5; }"); ASSERT_THAT(v, IsIntEq(5)); } TEST_F(TrivialExpressionTest, defaultFunctionArgsCaptureBack) { auto v = eval("({ a ? 123 }@args: args) {}"); ASSERT_THAT(v, IsAttrsOfSize(0)); } TEST_F(TrivialExpressionTest, defaultFunctionArgsCaptureFront) { auto v = eval("(args@{ a ? 123 }: args) {}"); ASSERT_THAT(v, IsAttrsOfSize(0)); } TEST_F(TrivialExpressionTest, assertThrows) { ASSERT_THROW(eval("let x = arg: assert arg == 1; 123; in x 2"), Error); } TEST_F(TrivialExpressionTest, assertPassed) { auto v = eval("let x = arg: assert arg == 1; 123; in x 1"); ASSERT_THAT(v, IsIntEq(123)); } class AttrSetMergeTrvialExpressionTest : public TrivialExpressionTest, public testing::WithParamInterface<const char*> {}; TEST_P(AttrSetMergeTrvialExpressionTest, attrsetMergeLazy) { // Usually Nix rejects duplicate keys in an attrset but it does allow // so if it is an attribute set that contains disjoint sets of keys. // The below is equivalent to `{a.b = 1; a.c = 2; }`. // The attribute set `a` will be a Thunk at first as the attribuets // have to be merged (or otherwise computed) and that is done in a lazy // manner. auto expr = GetParam(); auto v = eval(expr); ASSERT_THAT(v, IsAttrsOfSize(1)); auto a = v.attrs()->find(createSymbol("a")); ASSERT_NE(a, nullptr); ASSERT_THAT(*a->value, IsThunk()); state.forceValue(*a->value, noPos); ASSERT_THAT(*a->value, IsAttrsOfSize(2)); auto b = a->value->attrs()->find(createSymbol("b")); ASSERT_NE(b, nullptr); ASSERT_THAT(*b->value, IsIntEq(1)); auto c = a->value->attrs()->find(createSymbol("c")); ASSERT_NE(c, nullptr); ASSERT_THAT(*c->value, IsIntEq(2)); } INSTANTIATE_TEST_SUITE_P( attrsetMergeLazy, AttrSetMergeTrvialExpressionTest, testing::Values( "{ a.b = 1; a.c = 2; }", "{ a = { b = 1; }; a = { c = 2; }; }" ) ); TEST_F(TrivialExpressionTest, functor) { auto v = eval("{ __functor = self: arg: self.v + arg; v = 10; } 5"); ASSERT_THAT(v, IsIntEq(15)); } TEST_F(TrivialExpressionTest, forwardPipe) { auto v = eval("1 |> builtins.add 2 |> builtins.mul 3"); ASSERT_THAT(v, IsIntEq(9)); } TEST_F(TrivialExpressionTest, backwardPipe) { auto v = eval("builtins.add 1 <| builtins.mul 2 <| 3"); ASSERT_THAT(v, IsIntEq(7)); } TEST_F(TrivialExpressionTest, forwardPipeEvaluationOrder) { auto v = eval("1 |> null |> (x: 2)"); ASSERT_THAT(v, IsIntEq(2)); } TEST_F(TrivialExpressionTest, backwardPipeEvaluationOrder) { auto v = eval("(x: 1) <| null <| 2"); ASSERT_THAT(v, IsIntEq(1)); } TEST_F(TrivialExpressionTest, differentPipeOperatorsDoNotAssociate) { ASSERT_THROW(eval("(x: 1) <| 2 |> (x: 3)"), ParseError); } TEST_F(TrivialExpressionTest, differentPipeOperatorsParensLeft) { auto v = eval("((x: 1) <| 2) |> (x: 3)"); ASSERT_THAT(v, IsIntEq(3)); } TEST_F(TrivialExpressionTest, differentPipeOperatorsParensRight) { auto v = eval("(x: 1) <| (2 |> (x: 3))"); ASSERT_THAT(v, IsIntEq(1)); } TEST_F(TrivialExpressionTest, forwardPipeLowestPrecedence) { auto v = eval("false -> true |> (x: !x)"); ASSERT_THAT(v, IsFalse()); } TEST_F(TrivialExpressionTest, backwardPipeLowestPrecedence) { auto v = eval("(x: !x) <| false -> true"); ASSERT_THAT(v, IsFalse()); } TEST_F(TrivialExpressionTest, forwardPipeStrongerThanElse) { auto v = eval("if true then 1 else 2 |> 3"); ASSERT_THAT(v, IsIntEq(1)); } TEST_F(TrivialExpressionTest, backwardPipeStrongerThanElse) { auto v = eval("if true then 1 else 2 <| 3"); ASSERT_THAT(v, IsIntEq(1)); } TEST_F(TrivialExpressionTest, bindOr) { auto v = eval("{ or = 1; }"); ASSERT_THAT(v, IsAttrsOfSize(1)); auto b = v.attrs()->find(createSymbol("or")); ASSERT_NE(b, nullptr); ASSERT_THAT(*b->value, IsIntEq(1)); } TEST_F(TrivialExpressionTest, orCantBeUsed) { ASSERT_THROW(eval("let or = 1; in or"), Error); } } /* namespace nix */
7,558
C++
.cc
200
30.2
79
0.577176
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,035
eval.cc
NixOS_nix/src/libexpr-tests/eval.cc
#include <gmock/gmock.h> #include <gtest/gtest.h> #include "eval.hh" #include "tests/libexpr.hh" namespace nix { TEST(nix_isAllowedURI, http_example_com) { Strings allowed; allowed.push_back("http://example.com"); ASSERT_TRUE(isAllowedURI("http://example.com", allowed)); ASSERT_TRUE(isAllowedURI("http://example.com/foo", allowed)); ASSERT_TRUE(isAllowedURI("http://example.com/foo/", allowed)); ASSERT_FALSE(isAllowedURI("/", allowed)); ASSERT_FALSE(isAllowedURI("http://example.co", allowed)); ASSERT_FALSE(isAllowedURI("http://example.como", allowed)); ASSERT_FALSE(isAllowedURI("http://example.org", allowed)); ASSERT_FALSE(isAllowedURI("http://example.org/foo", allowed)); } TEST(nix_isAllowedURI, http_example_com_foo) { Strings allowed; allowed.push_back("http://example.com/foo"); ASSERT_TRUE(isAllowedURI("http://example.com/foo", allowed)); ASSERT_TRUE(isAllowedURI("http://example.com/foo/", allowed)); ASSERT_FALSE(isAllowedURI("/foo", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com", allowed)); ASSERT_FALSE(isAllowedURI("http://example.como", allowed)); ASSERT_FALSE(isAllowedURI("http://example.org/foo", allowed)); // Broken? // ASSERT_TRUE(isAllowedURI("http://example.com/foo?ok=1", allowed)); } TEST(nix_isAllowedURI, http) { Strings allowed; allowed.push_back("http://"); ASSERT_TRUE(isAllowedURI("http://", allowed)); ASSERT_TRUE(isAllowedURI("http://example.com", allowed)); ASSERT_TRUE(isAllowedURI("http://example.com/foo", allowed)); ASSERT_TRUE(isAllowedURI("http://example.com/foo/", allowed)); ASSERT_TRUE(isAllowedURI("http://example.com", allowed)); ASSERT_FALSE(isAllowedURI("/", allowed)); ASSERT_FALSE(isAllowedURI("https://", allowed)); ASSERT_FALSE(isAllowedURI("http:foo", allowed)); } TEST(nix_isAllowedURI, https) { Strings allowed; allowed.push_back("https://"); ASSERT_TRUE(isAllowedURI("https://example.com", allowed)); ASSERT_TRUE(isAllowedURI("https://example.com/foo", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com/https:", allowed)); } TEST(nix_isAllowedURI, absolute_path) { Strings allowed; allowed.push_back("/var/evil"); // bad idea ASSERT_TRUE(isAllowedURI("/var/evil", allowed)); ASSERT_TRUE(isAllowedURI("/var/evil/", allowed)); ASSERT_TRUE(isAllowedURI("/var/evil/foo", allowed)); ASSERT_TRUE(isAllowedURI("/var/evil/foo/", allowed)); ASSERT_FALSE(isAllowedURI("/", allowed)); ASSERT_FALSE(isAllowedURI("/var/evi", allowed)); ASSERT_FALSE(isAllowedURI("/var/evilo", allowed)); ASSERT_FALSE(isAllowedURI("/var/evilo/", allowed)); ASSERT_FALSE(isAllowedURI("/var/evilo/foo", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com/var/evil", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com//var/evil", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com//var/evil/foo", allowed)); } TEST(nix_isAllowedURI, file_url) { Strings allowed; allowed.push_back("file:///var/evil"); // bad idea ASSERT_TRUE(isAllowedURI("file:///var/evil", allowed)); ASSERT_TRUE(isAllowedURI("file:///var/evil/", allowed)); ASSERT_TRUE(isAllowedURI("file:///var/evil/foo", allowed)); ASSERT_TRUE(isAllowedURI("file:///var/evil/foo/", allowed)); ASSERT_FALSE(isAllowedURI("/", allowed)); ASSERT_FALSE(isAllowedURI("/var/evi", allowed)); ASSERT_FALSE(isAllowedURI("/var/evilo", allowed)); ASSERT_FALSE(isAllowedURI("/var/evilo/", allowed)); ASSERT_FALSE(isAllowedURI("/var/evilo/foo", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com/var/evil", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com//var/evil", allowed)); ASSERT_FALSE(isAllowedURI("http://example.com//var/evil/foo", allowed)); ASSERT_FALSE(isAllowedURI("http://var/evil", allowed)); ASSERT_FALSE(isAllowedURI("http:///var/evil", allowed)); ASSERT_FALSE(isAllowedURI("http://var/evil/", allowed)); ASSERT_FALSE(isAllowedURI("file:///var/evi", allowed)); ASSERT_FALSE(isAllowedURI("file:///var/evilo", allowed)); ASSERT_FALSE(isAllowedURI("file:///var/evilo/", allowed)); ASSERT_FALSE(isAllowedURI("file:///var/evilo/foo", allowed)); ASSERT_FALSE(isAllowedURI("file:///", allowed)); ASSERT_FALSE(isAllowedURI("file://", allowed)); } TEST(nix_isAllowedURI, github_all) { Strings allowed; allowed.push_back("github:"); ASSERT_TRUE(isAllowedURI("github:", allowed)); ASSERT_TRUE(isAllowedURI("github:foo/bar", allowed)); ASSERT_TRUE(isAllowedURI("github:foo/bar/feat-multi-bar", allowed)); ASSERT_TRUE(isAllowedURI("github:foo/bar?ref=refs/heads/feat-multi-bar", allowed)); ASSERT_TRUE(isAllowedURI("github://foo/bar", allowed)); ASSERT_FALSE(isAllowedURI("https://github:443/foo/bar/archive/master.tar.gz", allowed)); ASSERT_FALSE(isAllowedURI("file://github:foo/bar/archive/master.tar.gz", allowed)); ASSERT_FALSE(isAllowedURI("file:///github:foo/bar/archive/master.tar.gz", allowed)); ASSERT_FALSE(isAllowedURI("github", allowed)); } TEST(nix_isAllowedURI, github_org) { Strings allowed; allowed.push_back("github:foo"); ASSERT_FALSE(isAllowedURI("github:", allowed)); ASSERT_TRUE(isAllowedURI("github:foo/bar", allowed)); ASSERT_TRUE(isAllowedURI("github:foo/bar/feat-multi-bar", allowed)); ASSERT_TRUE(isAllowedURI("github:foo/bar?ref=refs/heads/feat-multi-bar", allowed)); ASSERT_FALSE(isAllowedURI("github://foo/bar", allowed)); ASSERT_FALSE(isAllowedURI("https://github:443/foo/bar/archive/master.tar.gz", allowed)); ASSERT_FALSE(isAllowedURI("file://github:foo/bar/archive/master.tar.gz", allowed)); ASSERT_FALSE(isAllowedURI("file:///github:foo/bar/archive/master.tar.gz", allowed)); } TEST(nix_isAllowedURI, non_scheme_colon) { Strings allowed; allowed.push_back("https://foo/bar:"); ASSERT_TRUE(isAllowedURI("https://foo/bar:", allowed)); ASSERT_TRUE(isAllowedURI("https://foo/bar:/baz", allowed)); ASSERT_FALSE(isAllowedURI("https://foo/bar:baz", allowed)); } } // namespace nix
6,199
C++
.cc
123
46.04065
92
0.701931
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,036
derived-path.cc
NixOS_nix/src/libexpr-tests/derived-path.cc
#include <nlohmann/json.hpp> #include <gtest/gtest.h> #include <rapidcheck/gtest.h> #include "tests/derived-path.hh" #include "tests/libexpr.hh" namespace nix { // Testing of trivial expressions class DerivedPathExpressionTest : public LibExprTest {}; // FIXME: `RC_GTEST_FIXTURE_PROP` isn't calling `SetUpTestSuite` because it is // no a real fixture. // // See https://github.com/emil-e/rapidcheck/blob/master/doc/gtest.md#rc_gtest_fixture_propfixture-name-args TEST_F(DerivedPathExpressionTest, force_init) { } #ifndef COVERAGE RC_GTEST_FIXTURE_PROP( DerivedPathExpressionTest, prop_opaque_path_round_trip, (const SingleDerivedPath::Opaque & o)) { auto * v = state.allocValue(); state.mkStorePathString(o.path, *v); auto d = state.coerceToSingleDerivedPath(noPos, *v, ""); RC_ASSERT(SingleDerivedPath { o } == d); } // TODO use DerivedPath::Built for parameter once it supports a single output // path only. RC_GTEST_FIXTURE_PROP( DerivedPathExpressionTest, prop_derived_path_built_placeholder_round_trip, (const SingleDerivedPath::Built & b)) { /** * We set these in tests rather than the regular globals so we don't have * to worry about race conditions if the tests run concurrently. */ ExperimentalFeatureSettings mockXpSettings; mockXpSettings.set("experimental-features", "ca-derivations"); auto * v = state.allocValue(); state.mkOutputString(*v, b, std::nullopt, mockXpSettings); auto [d, _] = state.coerceToSingleDerivedPathUnchecked(noPos, *v, ""); RC_ASSERT(SingleDerivedPath { b } == d); } RC_GTEST_FIXTURE_PROP( DerivedPathExpressionTest, prop_derived_path_built_out_path_round_trip, (const SingleDerivedPath::Built & b, const StorePath & outPath)) { auto * v = state.allocValue(); state.mkOutputString(*v, b, outPath); auto [d, _] = state.coerceToSingleDerivedPathUnchecked(noPos, *v, ""); RC_ASSERT(SingleDerivedPath { b } == d); } #endif } /* namespace nix */
2,001
C++
.cc
56
32.535714
107
0.728401
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,037
nix_api_expr.cc
NixOS_nix/src/libexpr-tests/nix_api_expr.cc
#include "nix_api_store.h" #include "nix_api_store_internal.h" #include "nix_api_util.h" #include "nix_api_util_internal.h" #include "nix_api_expr.h" #include "nix_api_value.h" #include "tests/nix_api_expr.hh" #include "tests/string_callback.hh" #include <gmock/gmock.h> #include <gtest/gtest.h> namespace nixC { TEST_F(nix_api_expr_test, nix_expr_eval_from_string) { nix_expr_eval_from_string(nullptr, state, "builtins.nixVersion", ".", value); nix_value_force(nullptr, state, value); std::string result; nix_get_string(nullptr, value, OBSERVE_STRING(result)); ASSERT_STREQ(PACKAGE_VERSION, result.c_str()); } TEST_F(nix_api_expr_test, nix_expr_eval_add_numbers) { nix_expr_eval_from_string(nullptr, state, "1 + 1", ".", value); nix_value_force(nullptr, state, value); auto result = nix_get_int(nullptr, value); ASSERT_EQ(2, result); } TEST_F(nix_api_expr_test, nix_expr_eval_drv) { auto expr = R"(derivation { name = "myname"; builder = "mybuilder"; system = "mysystem"; })"; nix_expr_eval_from_string(nullptr, state, expr, ".", value); ASSERT_EQ(NIX_TYPE_ATTRS, nix_get_type(nullptr, value)); EvalState * stateFn = nix_state_create(nullptr, nullptr, store); nix_value * valueFn = nix_alloc_value(nullptr, state); nix_expr_eval_from_string(nullptr, stateFn, "builtins.toString", ".", valueFn); ASSERT_EQ(NIX_TYPE_FUNCTION, nix_get_type(nullptr, valueFn)); EvalState * stateResult = nix_state_create(nullptr, nullptr, store); nix_value * valueResult = nix_alloc_value(nullptr, stateResult); nix_value_call(ctx, stateResult, valueFn, value, valueResult); ASSERT_EQ(NIX_TYPE_STRING, nix_get_type(nullptr, valueResult)); std::string p; nix_get_string(nullptr, valueResult, OBSERVE_STRING(p)); std::string pEnd = "-myname"; ASSERT_EQ(pEnd, p.substr(p.size() - pEnd.size())); // Clean up nix_gc_decref(nullptr, valueFn); nix_state_free(stateFn); nix_gc_decref(nullptr, valueResult); nix_state_free(stateResult); } TEST_F(nix_api_expr_test, nix_build_drv) { auto expr = R"(derivation { name = "myname"; system = builtins.currentSystem; builder = "/bin/sh"; args = [ "-c" "echo foo > $out" ]; })"; nix_expr_eval_from_string(nullptr, state, expr, ".", value); nix_value * drvPathValue = nix_get_attr_byname(nullptr, value, state, "drvPath"); std::string drvPath; nix_get_string(nullptr, drvPathValue, OBSERVE_STRING(drvPath)); std::string p = drvPath; std::string pEnd = "-myname.drv"; ASSERT_EQ(pEnd, p.substr(p.size() - pEnd.size())); // NOTE: .drvPath should be usually be ignored. Output paths are more versatile. // See https://github.com/NixOS/nix/issues/6507 // Use e.g. nix_string_realise to realise the output. StorePath * drvStorePath = nix_store_parse_path(ctx, store, drvPath.c_str()); ASSERT_EQ(true, nix_store_is_valid_path(ctx, store, drvStorePath)); nix_value * outPathValue = nix_get_attr_byname(ctx, value, state, "outPath"); std::string outPath; nix_get_string(ctx, outPathValue, OBSERVE_STRING(outPath)); p = outPath; pEnd = "-myname"; ASSERT_EQ(pEnd, p.substr(p.size() - pEnd.size())); ASSERT_EQ(true, drvStorePath->path.isDerivation()); StorePath * outStorePath = nix_store_parse_path(ctx, store, outPath.c_str()); ASSERT_EQ(false, nix_store_is_valid_path(ctx, store, outStorePath)); nix_store_realise(ctx, store, drvStorePath, nullptr, nullptr); auto is_valid_path = nix_store_is_valid_path(ctx, store, outStorePath); ASSERT_EQ(true, is_valid_path); // Clean up nix_store_path_free(drvStorePath); nix_store_path_free(outStorePath); } TEST_F(nix_api_expr_test, nix_expr_realise_context_bad_value) { auto expr = "true"; nix_expr_eval_from_string(ctx, state, expr, ".", value); assert_ctx_ok(); auto r = nix_string_realise(ctx, state, value, false); ASSERT_EQ(nullptr, r); ASSERT_EQ(ctx->last_err_code, NIX_ERR_NIX_ERROR); ASSERT_THAT(ctx->last_err, testing::Optional(testing::HasSubstr("cannot coerce"))); } TEST_F(nix_api_expr_test, nix_expr_realise_context_bad_build) { auto expr = R"( derivation { name = "letsbuild"; system = builtins.currentSystem; builder = "/bin/sh"; args = [ "-c" "echo failing a build for testing purposes; exit 1;" ]; } )"; nix_expr_eval_from_string(ctx, state, expr, ".", value); assert_ctx_ok(); auto r = nix_string_realise(ctx, state, value, false); ASSERT_EQ(nullptr, r); ASSERT_EQ(ctx->last_err_code, NIX_ERR_NIX_ERROR); ASSERT_THAT(ctx->last_err, testing::Optional(testing::HasSubstr("failed with exit code 1"))); } TEST_F(nix_api_expr_test, nix_expr_realise_context) { // TODO (ca-derivations): add a content-addressed derivation output, which produces a placeholder auto expr = R"( '' a derivation output: ${ derivation { name = "letsbuild"; system = builtins.currentSystem; builder = "/bin/sh"; args = [ "-c" "echo foo > $out" ]; }} a path: ${builtins.toFile "just-a-file" "ooh file good"} a derivation path by itself: ${ builtins.unsafeDiscardOutputDependency (derivation { name = "not-actually-built-yet"; system = builtins.currentSystem; builder = "/bin/sh"; args = [ "-c" "echo foo > $out" ]; }).drvPath} '' )"; nix_expr_eval_from_string(ctx, state, expr, ".", value); assert_ctx_ok(); auto r = nix_string_realise(ctx, state, value, false); assert_ctx_ok(); ASSERT_NE(nullptr, r); auto s = std::string(nix_realised_string_get_buffer_start(r), nix_realised_string_get_buffer_size(r)); EXPECT_THAT(s, testing::StartsWith("a derivation output:")); EXPECT_THAT(s, testing::HasSubstr("-letsbuild\n")); EXPECT_THAT(s, testing::Not(testing::HasSubstr("-letsbuild.drv"))); EXPECT_THAT(s, testing::HasSubstr("a path:")); EXPECT_THAT(s, testing::HasSubstr("-just-a-file")); EXPECT_THAT(s, testing::Not(testing::HasSubstr("-just-a-file.drv"))); EXPECT_THAT(s, testing::Not(testing::HasSubstr("ooh file good"))); EXPECT_THAT(s, testing::HasSubstr("a derivation path by itself:")); EXPECT_THAT(s, testing::EndsWith("-not-actually-built-yet.drv\n")); std::vector<std::string> names; size_t n = nix_realised_string_get_store_path_count(r); for (size_t i = 0; i < n; ++i) { const StorePath * p = nix_realised_string_get_store_path(r, i); ASSERT_NE(nullptr, p); std::string name; nix_store_path_name(p, OBSERVE_STRING(name)); names.push_back(name); } std::sort(names.begin(), names.end()); ASSERT_EQ(3, names.size()); EXPECT_THAT(names[0], testing::StrEq("just-a-file")); EXPECT_THAT(names[1], testing::StrEq("letsbuild")); EXPECT_THAT(names[2], testing::StrEq("not-actually-built-yet.drv")); nix_realised_string_free(r); } const char * SAMPLE_USER_DATA = "whatever"; static void primop_square(void * user_data, nix_c_context * context, EvalState * state, nix_value ** args, nix_value * ret) { assert(context); assert(state); assert(user_data == SAMPLE_USER_DATA); auto i = nix_get_int(context, args[0]); nix_init_int(context, ret, i * i); } TEST_F(nix_api_expr_test, nix_expr_primop) { PrimOp * primop = nix_alloc_primop(ctx, primop_square, 1, "square", nullptr, "square an integer", (void *) SAMPLE_USER_DATA); assert_ctx_ok(); nix_value * primopValue = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_primop(ctx, primopValue, primop); assert_ctx_ok(); nix_value * three = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_int(ctx, three, 3); assert_ctx_ok(); nix_value * result = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_value_call(ctx, state, primopValue, three, result); assert_ctx_ok(); auto r = nix_get_int(ctx, result); ASSERT_EQ(9, r); } static void primop_repeat(void * user_data, nix_c_context * context, EvalState * state, nix_value ** args, nix_value * ret) { assert(context); assert(state); assert(user_data == SAMPLE_USER_DATA); // Get the string to repeat std::string s; if (nix_get_string(context, args[0], OBSERVE_STRING(s)) != NIX_OK) return; // Get the number of times to repeat auto n = nix_get_int(context, args[1]); if (nix_err_code(context) != NIX_OK) return; // Repeat the string std::string result; for (int i = 0; i < n; ++i) result += s; nix_init_string(context, ret, result.c_str()); } TEST_F(nix_api_expr_test, nix_expr_primop_arity_2_multiple_calls) { PrimOp * primop = nix_alloc_primop(ctx, primop_repeat, 2, "repeat", nullptr, "repeat a string", (void *) SAMPLE_USER_DATA); assert_ctx_ok(); nix_value * primopValue = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_primop(ctx, primopValue, primop); assert_ctx_ok(); nix_value * hello = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_string(ctx, hello, "hello"); assert_ctx_ok(); nix_value * three = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_int(ctx, three, 3); assert_ctx_ok(); nix_value * partial = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_value_call(ctx, state, primopValue, hello, partial); assert_ctx_ok(); nix_value * result = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_value_call(ctx, state, partial, three, result); assert_ctx_ok(); std::string r; nix_get_string(ctx, result, OBSERVE_STRING(r)); ASSERT_STREQ("hellohellohello", r.c_str()); } TEST_F(nix_api_expr_test, nix_expr_primop_arity_2_single_call) { PrimOp * primop = nix_alloc_primop(ctx, primop_repeat, 2, "repeat", nullptr, "repeat a string", (void *) SAMPLE_USER_DATA); assert_ctx_ok(); nix_value * primopValue = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_primop(ctx, primopValue, primop); assert_ctx_ok(); nix_value * hello = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_string(ctx, hello, "hello"); assert_ctx_ok(); nix_value * three = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_int(ctx, three, 3); assert_ctx_ok(); nix_value * result = nix_alloc_value(ctx, state); assert_ctx_ok(); NIX_VALUE_CALL(ctx, state, result, primopValue, hello, three); assert_ctx_ok(); std::string r; nix_get_string(ctx, result, OBSERVE_STRING(r)); assert_ctx_ok(); ASSERT_STREQ("hellohellohello", r.c_str()); } static void primop_bad_no_return(void * user_data, nix_c_context * context, EvalState * state, nix_value ** args, nix_value * ret) { } TEST_F(nix_api_expr_test, nix_expr_primop_bad_no_return) { PrimOp * primop = nix_alloc_primop(ctx, primop_bad_no_return, 1, "badNoReturn", nullptr, "a broken primop", nullptr); assert_ctx_ok(); nix_value * primopValue = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_primop(ctx, primopValue, primop); assert_ctx_ok(); nix_value * three = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_int(ctx, three, 3); assert_ctx_ok(); nix_value * result = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_value_call(ctx, state, primopValue, three, result); ASSERT_EQ(ctx->last_err_code, NIX_ERR_NIX_ERROR); ASSERT_THAT( ctx->last_err, testing::Optional( testing::HasSubstr("Implementation error in custom function: return value was not initialized"))); ASSERT_THAT(ctx->last_err, testing::Optional(testing::HasSubstr("badNoReturn"))); } static void primop_bad_return_thunk( void * user_data, nix_c_context * context, EvalState * state, nix_value ** args, nix_value * ret) { nix_init_apply(context, ret, args[0], args[1]); } TEST_F(nix_api_expr_test, nix_expr_primop_bad_return_thunk) { PrimOp * primop = nix_alloc_primop(ctx, primop_bad_return_thunk, 2, "badReturnThunk", nullptr, "a broken primop", nullptr); assert_ctx_ok(); nix_value * primopValue = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_primop(ctx, primopValue, primop); assert_ctx_ok(); nix_value * toString = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_expr_eval_from_string(ctx, state, "builtins.toString", ".", toString); assert_ctx_ok(); nix_value * four = nix_alloc_value(ctx, state); assert_ctx_ok(); nix_init_int(ctx, four, 4); assert_ctx_ok(); nix_value * result = nix_alloc_value(ctx, state); assert_ctx_ok(); NIX_VALUE_CALL(ctx, state, result, primopValue, toString, four); ASSERT_EQ(ctx->last_err_code, NIX_ERR_NIX_ERROR); ASSERT_THAT( ctx->last_err, testing::Optional( testing::HasSubstr("Implementation error in custom function: return value must not be a thunk"))); ASSERT_THAT(ctx->last_err, testing::Optional(testing::HasSubstr("badReturnThunk"))); } TEST_F(nix_api_expr_test, nix_value_call_multi_no_args) { nix_value * n = nix_alloc_value(ctx, state); nix_init_int(ctx, n, 3); assert_ctx_ok(); nix_value * r = nix_alloc_value(ctx, state); nix_value_call_multi(ctx, state, n, 0, nullptr, r); assert_ctx_ok(); auto rInt = nix_get_int(ctx, r); assert_ctx_ok(); ASSERT_EQ(3, rInt); } } // namespace nixC
13,851
C++
.cc
340
34.955882
118
0.640663
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,038
main.cc
NixOS_nix/src/libexpr-tests/main.cc
#include <gtest/gtest.h> #include <cstdlib> #include "globals.hh" #include "logging.hh" using namespace nix; int main (int argc, char **argv) { if (argc > 1 && std::string_view(argv[1]) == "__build-remote") { printError("test-build-remote: not supported in libexpr unit tests"); return 1; } // Disable build hook. We won't be testing remote builds in these unit tests. If we do, fix the above build hook. settings.buildHook = {}; #if __linux__ // should match the conditional around sandboxBuildDir declaration. // When building and testing nix within the host's Nix sandbox, our store dir will be located in the host's sandboxBuildDir, e.g.: // Host // storeDir = /nix/store // sandboxBuildDir = /build // This process // storeDir = /build/foo/bar/store // sandboxBuildDir = /build // However, we have a rule that the store dir must not be inside the storeDir, so we need to pick a different sandboxBuildDir. settings.sandboxBuildDir = "/test-build-dir-instead-of-usual-build-dir"; #endif #if __APPLE__ // Avoid this error, when already running in a sandbox: // sandbox-exec: sandbox_apply: Operation not permitted settings.sandboxMode = smDisabled; setEnv("_NIX_TEST_NO_SANDBOX", "1"); #endif // For pipe operator tests in trivial.cc experimentalFeatureSettings.set("experimental-features", "pipe-operators"); ::testing::InitGoogleTest(&argc, argv); return RUN_ALL_TESTS(); }
1,510
C++
.cc
34
39.764706
134
0.689373
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,039
nix_api_external.cc
NixOS_nix/src/libexpr-tests/nix_api_external.cc
#include "nix_api_store.h" #include "nix_api_store_internal.h" #include "nix_api_util.h" #include "nix_api_util_internal.h" #include "nix_api_expr.h" #include "nix_api_expr_internal.h" #include "nix_api_value.h" #include "nix_api_external.h" #include "tests/nix_api_expr.hh" #include "tests/string_callback.hh" #include <gtest/gtest.h> namespace nixC { class MyExternalValueDesc : public NixCExternalValueDesc { public: MyExternalValueDesc(int x) : _x(x) { print = print_function; showType = show_type_function; typeOf = type_of_function; } private: int _x; static void print_function(void * self, nix_printer * printer) {} static void show_type_function(void * self, nix_string_return * res) {} static void type_of_function(void * self, nix_string_return * res) { MyExternalValueDesc * obj = static_cast<MyExternalValueDesc *>(self); std::string type_string = "nix-external<MyExternalValueDesc( "; type_string += std::to_string(obj->_x); type_string += " )>"; res->str = &*type_string.begin(); } }; TEST_F(nix_api_expr_test, nix_expr_eval_external) { MyExternalValueDesc * external = new MyExternalValueDesc(42); ExternalValue * val = nix_create_external_value(ctx, external, external); nix_init_external(ctx, value, val); EvalState * stateResult = nix_state_create(nullptr, nullptr, store); nix_value * valueResult = nix_alloc_value(nullptr, stateResult); EvalState * stateFn = nix_state_create(nullptr, nullptr, store); nix_value * valueFn = nix_alloc_value(nullptr, stateFn); nix_expr_eval_from_string(nullptr, state, "builtins.typeOf", ".", valueFn); ASSERT_EQ(NIX_TYPE_EXTERNAL, nix_get_type(nullptr, value)); nix_value_call(ctx, state, valueFn, value, valueResult); std::string string_value; nix_get_string(nullptr, valueResult, OBSERVE_STRING(string_value)); ASSERT_STREQ("nix-external<MyExternalValueDesc( 42 )>", string_value.c_str()); } }
2,026
C++
.cc
52
34.576923
82
0.696118
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,040
error_traces.cc
NixOS_nix/src/libexpr-tests/error_traces.cc
#include <gmock/gmock.h> #include <gtest/gtest.h> #include "tests/libexpr.hh" namespace nix { using namespace testing; // Testing eval of PrimOp's class ErrorTraceTest : public LibExprTest { }; TEST_F(ErrorTraceTest, TraceBuilder) { ASSERT_THROW( state.error<EvalError>("puppy").debugThrow(), EvalError ); ASSERT_THROW( state.error<EvalError>("puppy").withTrace(noPos, "doggy").debugThrow(), EvalError ); ASSERT_THROW( try { try { state.error<EvalError>("puppy").withTrace(noPos, "doggy").debugThrow(); } catch (Error & e) { e.addTrace(state.positions[noPos], "beans"); throw; } } catch (BaseError & e) { ASSERT_EQ(PrintToString(e.info().msg), PrintToString(HintFmt("puppy"))); auto trace = e.info().traces.rbegin(); ASSERT_EQ(e.info().traces.size(), 2); ASSERT_EQ(PrintToString(trace->hint), PrintToString(HintFmt("doggy"))); trace++; ASSERT_EQ(PrintToString(trace->hint), PrintToString(HintFmt("beans"))); throw; } , EvalError ); } TEST_F(ErrorTraceTest, NestedThrows) { try { state.error<EvalError>("puppy").withTrace(noPos, "doggy").debugThrow(); } catch (BaseError & e) { try { state.error<EvalError>("beans").debugThrow(); } catch (Error & e2) { e.addTrace(state.positions[noPos], "beans2"); //e2.addTrace(state.positions[noPos], "Something", ""); ASSERT_TRUE(e.info().traces.size() == 2); ASSERT_TRUE(e2.info().traces.size() == 0); ASSERT_FALSE(&e.info() == &e2.info()); } } } #define ASSERT_TRACE1(args, type, message) \ ASSERT_THROW( \ std::string expr(args); \ std::string name = expr.substr(0, expr.find(" ")); \ try { \ Value v = eval("builtins." args); \ state.forceValueDeep(v); \ } catch (BaseError & e) { \ ASSERT_EQ(PrintToString(e.info().msg), \ PrintToString(message)); \ ASSERT_EQ(e.info().traces.size(), 1) << "while testing " args << std::endl << e.what(); \ auto trace = e.info().traces.rbegin(); \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(HintFmt("while calling the '%s' builtin", name))); \ throw; \ } \ , type \ ) #define ASSERT_TRACE2(args, type, message, context) \ ASSERT_THROW( \ std::string expr(args); \ std::string name = expr.substr(0, expr.find(" ")); \ try { \ Value v = eval("builtins." args); \ state.forceValueDeep(v); \ } catch (BaseError & e) { \ ASSERT_EQ(PrintToString(e.info().msg), \ PrintToString(message)); \ ASSERT_EQ(e.info().traces.size(), 2) << "while testing " args << std::endl << e.what(); \ auto trace = e.info().traces.rbegin(); \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(context)); \ ++trace; \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(HintFmt("while calling the '%s' builtin", name))); \ throw; \ } \ , type \ ) #define ASSERT_TRACE3(args, type, message, context1, context2) \ ASSERT_THROW( \ std::string expr(args); \ std::string name = expr.substr(0, expr.find(" ")); \ try { \ Value v = eval("builtins." args); \ state.forceValueDeep(v); \ } catch (BaseError & e) { \ ASSERT_EQ(PrintToString(e.info().msg), \ PrintToString(message)); \ ASSERT_EQ(e.info().traces.size(), 3) << "while testing " args << std::endl << e.what(); \ auto trace = e.info().traces.rbegin(); \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(context1)); \ ++trace; \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(context2)); \ ++trace; \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(HintFmt("while calling the '%s' builtin", name))); \ throw; \ } \ , type \ ) #define ASSERT_TRACE4(args, type, message, context1, context2, context3) \ ASSERT_THROW( \ std::string expr(args); \ std::string name = expr.substr(0, expr.find(" ")); \ try { \ Value v = eval("builtins." args); \ state.forceValueDeep(v); \ } catch (BaseError & e) { \ ASSERT_EQ(PrintToString(e.info().msg), \ PrintToString(message)); \ ASSERT_EQ(e.info().traces.size(), 4) << "while testing " args << std::endl << e.what(); \ auto trace = e.info().traces.rbegin(); \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(context1)); \ ++trace; \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(context2)); \ ++trace; \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(context3)); \ ++trace; \ ASSERT_EQ(PrintToString(trace->hint), \ PrintToString(HintFmt("while calling the '%s' builtin", name))); \ throw; \ } \ , type \ ) // We assume that expr starts with "builtins.derivationStrict { name =", // otherwise the name attribute position (1, 29) would be invalid. #define DERIVATION_TRACE_HINTFMT(name) \ HintFmt("while evaluating derivation '%s'\n" \ " whose name attribute is located at %s", \ name, Pos(1, 29, Pos::String{.source = make_ref<std::string>(expr)})) // To keep things simple, we also assume that derivation name is "foo". #define ASSERT_DERIVATION_TRACE1(args, type, message) \ ASSERT_TRACE2(args, type, message, DERIVATION_TRACE_HINTFMT("foo")) #define ASSERT_DERIVATION_TRACE2(args, type, message, context) \ ASSERT_TRACE3(args, type, message, context, DERIVATION_TRACE_HINTFMT("foo")) #define ASSERT_DERIVATION_TRACE3(args, type, message, context1, context2) \ ASSERT_TRACE4(args, type, message, context1, context2, DERIVATION_TRACE_HINTFMT("foo")) TEST_F(ErrorTraceTest, genericClosure) { ASSERT_TRACE2("genericClosure 1", TypeError, HintFmt("expected a set but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.genericClosure")); ASSERT_TRACE2("genericClosure {}", TypeError, HintFmt("attribute '%s' missing", "startSet"), HintFmt("in the attrset passed as argument to builtins.genericClosure")); ASSERT_TRACE2("genericClosure { startSet = 1; }", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the 'startSet' attribute passed as argument to builtins.genericClosure")); ASSERT_TRACE2("genericClosure { startSet = [{ key = 1;}]; operator = true; }", TypeError, HintFmt("expected a function but found %s: %s", "a Boolean", Uncolored(ANSI_CYAN "true" ANSI_NORMAL)), HintFmt("while evaluating the 'operator' attribute passed as argument to builtins.genericClosure")); ASSERT_TRACE2("genericClosure { startSet = [{ key = 1;}]; operator = item: true; }", TypeError, HintFmt("expected a list but found %s: %s", "a Boolean", Uncolored(ANSI_CYAN "true" ANSI_NORMAL)), HintFmt("while evaluating the return value of the `operator` passed to builtins.genericClosure")); ASSERT_TRACE2("genericClosure { startSet = [{ key = 1;}]; operator = item: [ true ]; }", TypeError, HintFmt("expected a set but found %s: %s", "a Boolean", Uncolored(ANSI_CYAN "true" ANSI_NORMAL)), HintFmt("while evaluating one of the elements generated by (or initially passed to) builtins.genericClosure")); ASSERT_TRACE2("genericClosure { startSet = [{ key = 1;}]; operator = item: [ {} ]; }", TypeError, HintFmt("attribute '%s' missing", "key"), HintFmt("in one of the attrsets generated by (or initially passed to) builtins.genericClosure")); ASSERT_TRACE2("genericClosure { startSet = [{ key = 1;}]; operator = item: [{ key = ''a''; }]; }", EvalError, HintFmt("cannot compare %s with %s", "a string", "an integer"), HintFmt("while comparing the `key` attributes of two genericClosure elements")); ASSERT_TRACE2("genericClosure { startSet = [ true ]; operator = item: [{ key = ''a''; }]; }", TypeError, HintFmt("expected a set but found %s: %s", "a Boolean", Uncolored(ANSI_CYAN "true" ANSI_NORMAL)), HintFmt("while evaluating one of the elements generated by (or initially passed to) builtins.genericClosure")); } TEST_F(ErrorTraceTest, replaceStrings) { ASSERT_TRACE2("replaceStrings 0 0 {}", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "0" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.replaceStrings")); ASSERT_TRACE2("replaceStrings [] 0 {}", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "0" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.replaceStrings")); ASSERT_TRACE1("replaceStrings [ 0 ] [] {}", EvalError, HintFmt("'from' and 'to' arguments passed to builtins.replaceStrings have different lengths")); ASSERT_TRACE2("replaceStrings [ 1 ] [ \"new\" ] {}", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating one of the strings to replace passed to builtins.replaceStrings")); ASSERT_TRACE2("replaceStrings [ \"oo\" ] [ true ] \"foo\"", TypeError, HintFmt("expected a string but found %s: %s", "a Boolean", Uncolored(ANSI_CYAN "true" ANSI_NORMAL)), HintFmt("while evaluating one of the replacement strings passed to builtins.replaceStrings")); ASSERT_TRACE2("replaceStrings [ \"old\" ] [ \"new\" ] {}", TypeError, HintFmt("expected a string but found %s: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the third argument passed to builtins.replaceStrings")); } TEST_F(ErrorTraceTest, scopedImport) { } TEST_F(ErrorTraceTest, import) { } TEST_F(ErrorTraceTest, typeOf) { } TEST_F(ErrorTraceTest, isNull) { } TEST_F(ErrorTraceTest, isFunction) { } TEST_F(ErrorTraceTest, isInt) { } TEST_F(ErrorTraceTest, isFloat) { } TEST_F(ErrorTraceTest, isString) { } TEST_F(ErrorTraceTest, isBool) { } TEST_F(ErrorTraceTest, isPath) { } TEST_F(ErrorTraceTest, break) { } TEST_F(ErrorTraceTest, abort) { } TEST_F(ErrorTraceTest, throw) { } TEST_F(ErrorTraceTest, addErrorContext) { } TEST_F(ErrorTraceTest, ceil) { ASSERT_TRACE2("ceil \"foo\"", TypeError, HintFmt("expected a float but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.ceil")); } TEST_F(ErrorTraceTest, floor) { ASSERT_TRACE2("floor \"foo\"", TypeError, HintFmt("expected a float but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.floor")); } TEST_F(ErrorTraceTest, tryEval) { } TEST_F(ErrorTraceTest, getEnv) { ASSERT_TRACE2("getEnv [ ]", TypeError, HintFmt("expected a string but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.getEnv")); } TEST_F(ErrorTraceTest, seq) { } TEST_F(ErrorTraceTest, deepSeq) { } TEST_F(ErrorTraceTest, trace) { } TEST_F(ErrorTraceTest, placeholder) { ASSERT_TRACE2("placeholder []", TypeError, HintFmt("expected a string but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.placeholder")); } TEST_F(ErrorTraceTest, toPath) { ASSERT_TRACE2("toPath []", TypeError, HintFmt("cannot coerce %s to a string: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.toPath")); ASSERT_TRACE2("toPath \"foo\"", EvalError, HintFmt("string '%s' doesn't represent an absolute path", "foo"), HintFmt("while evaluating the first argument passed to builtins.toPath")); } TEST_F(ErrorTraceTest, storePath) { ASSERT_TRACE2("storePath true", TypeError, HintFmt("cannot coerce %s to a string: %s", "a Boolean", Uncolored(ANSI_CYAN "true" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to 'builtins.storePath'")); } TEST_F(ErrorTraceTest, pathExists) { ASSERT_TRACE2("pathExists []", TypeError, HintFmt("cannot coerce %s to a string: %s", "a list", Uncolored("[ ]")), HintFmt("while realising the context of a path")); ASSERT_TRACE2("pathExists \"zorglub\"", EvalError, HintFmt("string '%s' doesn't represent an absolute path", "zorglub"), HintFmt("while realising the context of a path")); } TEST_F(ErrorTraceTest, baseNameOf) { ASSERT_TRACE2("baseNameOf []", TypeError, HintFmt("cannot coerce %s to a string: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.baseNameOf")); } TEST_F(ErrorTraceTest, dirOf) { } TEST_F(ErrorTraceTest, readFile) { } TEST_F(ErrorTraceTest, findFile) { } TEST_F(ErrorTraceTest, hashFile) { } TEST_F(ErrorTraceTest, readDir) { } TEST_F(ErrorTraceTest, toXML) { } TEST_F(ErrorTraceTest, toJSON) { } TEST_F(ErrorTraceTest, fromJSON) { } TEST_F(ErrorTraceTest, toFile) { } TEST_F(ErrorTraceTest, filterSource) { ASSERT_TRACE2("filterSource [] []", TypeError, HintFmt("cannot coerce %s to a string: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the second argument (the path to filter) passed to 'builtins.filterSource'")); ASSERT_TRACE2("filterSource [] \"foo\"", EvalError, HintFmt("string '%s' doesn't represent an absolute path", "foo"), HintFmt("while evaluating the second argument (the path to filter) passed to 'builtins.filterSource'")); ASSERT_TRACE2("filterSource [] ./.", TypeError, HintFmt("expected a function but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.filterSource")); // Usupported by store "dummy" // ASSERT_TRACE2("filterSource (_: 1) ./.", // TypeError, // HintFmt("attempt to call something which is not a function but %s", "an integer"), // HintFmt("while adding path '/home/layus/projects/nix'")); // ASSERT_TRACE2("filterSource (_: _: 1) ./.", // TypeError, // HintFmt("expected a Boolean but found %s: %s", "an integer", "1"), // HintFmt("while evaluating the return value of the path filter function")); } TEST_F(ErrorTraceTest, path) { } TEST_F(ErrorTraceTest, attrNames) { ASSERT_TRACE2("attrNames []", TypeError, HintFmt("expected a set but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the argument passed to builtins.attrNames")); } TEST_F(ErrorTraceTest, attrValues) { ASSERT_TRACE2("attrValues []", TypeError, HintFmt("expected a set but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the argument passed to builtins.attrValues")); } TEST_F(ErrorTraceTest, getAttr) { ASSERT_TRACE2("getAttr [] []", TypeError, HintFmt("expected a string but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.getAttr")); ASSERT_TRACE2("getAttr \"foo\" []", TypeError, HintFmt("expected a set but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the second argument passed to builtins.getAttr")); ASSERT_TRACE2("getAttr \"foo\" {}", TypeError, HintFmt("attribute '%s' missing", "foo"), HintFmt("in the attribute set under consideration")); } TEST_F(ErrorTraceTest, unsafeGetAttrPos) { } TEST_F(ErrorTraceTest, hasAttr) { ASSERT_TRACE2("hasAttr [] []", TypeError, HintFmt("expected a string but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.hasAttr")); ASSERT_TRACE2("hasAttr \"foo\" []", TypeError, HintFmt("expected a set but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the second argument passed to builtins.hasAttr")); } TEST_F(ErrorTraceTest, isAttrs) { } TEST_F(ErrorTraceTest, removeAttrs) { ASSERT_TRACE2("removeAttrs \"\" \"\"", TypeError, HintFmt("expected a set but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.removeAttrs")); ASSERT_TRACE2("removeAttrs \"\" [ 1 ]", TypeError, HintFmt("expected a set but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.removeAttrs")); ASSERT_TRACE2("removeAttrs \"\" [ \"1\" ]", TypeError, HintFmt("expected a set but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.removeAttrs")); } TEST_F(ErrorTraceTest, listToAttrs) { ASSERT_TRACE2("listToAttrs 1", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the argument passed to builtins.listToAttrs")); ASSERT_TRACE2("listToAttrs [ 1 ]", TypeError, HintFmt("expected a set but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating an element of the list passed to builtins.listToAttrs")); ASSERT_TRACE2("listToAttrs [ {} ]", TypeError, HintFmt("attribute '%s' missing", "name"), HintFmt("in a {name=...; value=...;} pair")); ASSERT_TRACE2("listToAttrs [ { name = 1; } ]", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the `name` attribute of an element of the list passed to builtins.listToAttrs")); ASSERT_TRACE2("listToAttrs [ { name = \"foo\"; } ]", TypeError, HintFmt("attribute '%s' missing", "value"), HintFmt("in a {name=...; value=...;} pair")); } TEST_F(ErrorTraceTest, intersectAttrs) { ASSERT_TRACE2("intersectAttrs [] []", TypeError, HintFmt("expected a set but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.intersectAttrs")); ASSERT_TRACE2("intersectAttrs {} []", TypeError, HintFmt("expected a set but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the second argument passed to builtins.intersectAttrs")); } TEST_F(ErrorTraceTest, catAttrs) { ASSERT_TRACE2("catAttrs [] {}", TypeError, HintFmt("expected a string but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.catAttrs")); ASSERT_TRACE2("catAttrs \"foo\" {}", TypeError, HintFmt("expected a list but found %s: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the second argument passed to builtins.catAttrs")); ASSERT_TRACE2("catAttrs \"foo\" [ 1 ]", TypeError, HintFmt("expected a set but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating an element in the list passed as second argument to builtins.catAttrs")); ASSERT_TRACE2("catAttrs \"foo\" [ { foo = 1; } 1 { bar = 5;} ]", TypeError, HintFmt("expected a set but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating an element in the list passed as second argument to builtins.catAttrs")); } TEST_F(ErrorTraceTest, functionArgs) { ASSERT_TRACE1("functionArgs {}", TypeError, HintFmt("'functionArgs' requires a function")); } TEST_F(ErrorTraceTest, mapAttrs) { ASSERT_TRACE2("mapAttrs [] []", TypeError, HintFmt("expected a set but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the second argument passed to builtins.mapAttrs")); // XXX: defered // ASSERT_TRACE2("mapAttrs \"\" { foo.bar = 1; }", // TypeError, // HintFmt("attempt to call something which is not a function but %s", "a string"), // HintFmt("while evaluating the attribute 'foo'")); // ASSERT_TRACE2("mapAttrs (x: x + \"1\") { foo.bar = 1; }", // TypeError, // HintFmt("attempt to call something which is not a function but %s", "a string"), // HintFmt("while evaluating the attribute 'foo'")); // ASSERT_TRACE2("mapAttrs (x: y: x + 1) { foo.bar = 1; }", // TypeError, // HintFmt("cannot coerce %s to a string", "an integer"), // HintFmt("while evaluating a path segment")); } TEST_F(ErrorTraceTest, zipAttrsWith) { ASSERT_TRACE2("zipAttrsWith [] [ 1 ]", TypeError, HintFmt("expected a function but found %s: %s", "a list", Uncolored("[ ]")), HintFmt("while evaluating the first argument passed to builtins.zipAttrsWith")); ASSERT_TRACE2("zipAttrsWith (_: 1) [ 1 ]", TypeError, HintFmt("expected a set but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating a value of the list passed as second argument to builtins.zipAttrsWith")); // XXX: How to properly tell that the fucntion takes two arguments ? // The same question also applies to sort, and maybe others. // Due to lazyness, we only create a thunk, and it fails later on. // ASSERT_TRACE2("zipAttrsWith (_: 1) [ { foo = 1; } ]", // TypeError, // HintFmt("attempt to call something which is not a function but %s", "an integer"), // HintFmt("while evaluating the attribute 'foo'")); // XXX: Also deferred deeply // ASSERT_TRACE2("zipAttrsWith (a: b: a + b) [ { foo = 1; } { foo = 2; } ]", // TypeError, // HintFmt("cannot coerce %s to a string", "a list"), // HintFmt("while evaluating a path segment")); } TEST_F(ErrorTraceTest, isList) { } TEST_F(ErrorTraceTest, elemAt) { ASSERT_TRACE2("elemAt \"foo\" (-1)", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.elemAt")); ASSERT_TRACE1("elemAt [] (-1)", Error, HintFmt("list index %d is out of bounds", -1)); ASSERT_TRACE1("elemAt [\"foo\"] 3", Error, HintFmt("list index %d is out of bounds", 3)); } TEST_F(ErrorTraceTest, head) { ASSERT_TRACE2("head 1", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.elemAt")); ASSERT_TRACE1("head []", Error, HintFmt("list index %d is out of bounds", 0)); } TEST_F(ErrorTraceTest, tail) { ASSERT_TRACE2("tail 1", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.tail")); ASSERT_TRACE1("tail []", Error, HintFmt("'tail' called on an empty list")); } TEST_F(ErrorTraceTest, map) { ASSERT_TRACE2("map 1 \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.map")); ASSERT_TRACE2("map 1 [ 1 ]", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.map")); } TEST_F(ErrorTraceTest, filter) { ASSERT_TRACE2("filter 1 \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.filter")); ASSERT_TRACE2("filter 1 [ \"foo\" ]", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.filter")); ASSERT_TRACE2("filter (_: 5) [ \"foo\" ]", TypeError, HintFmt("expected a Boolean but found %s: %s", "an integer", Uncolored(ANSI_CYAN "5" ANSI_NORMAL)), HintFmt("while evaluating the return value of the filtering function passed to builtins.filter")); } TEST_F(ErrorTraceTest, elem) { ASSERT_TRACE2("elem 1 \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.elem")); } TEST_F(ErrorTraceTest, concatLists) { ASSERT_TRACE2("concatLists 1", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.concatLists")); ASSERT_TRACE2("concatLists [ 1 ]", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating a value of the list passed to builtins.concatLists")); ASSERT_TRACE2("concatLists [ [1] \"foo\" ]", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating a value of the list passed to builtins.concatLists")); } TEST_F(ErrorTraceTest, length) { ASSERT_TRACE2("length 1", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.length")); ASSERT_TRACE2("length \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.length")); } TEST_F(ErrorTraceTest, foldlPrime) { ASSERT_TRACE2("foldl' 1 \"foo\" true", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.foldlStrict")); ASSERT_TRACE2("foldl' (_: 1) \"foo\" true", TypeError, HintFmt("expected a list but found %s: %s", "a Boolean", Uncolored(ANSI_CYAN "true" ANSI_NORMAL)), HintFmt("while evaluating the third argument passed to builtins.foldlStrict")); ASSERT_TRACE1("foldl' (_: 1) \"foo\" [ true ]", TypeError, HintFmt("attempt to call something which is not a function but %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL))); ASSERT_TRACE2("foldl' (a: b: a && b) \"foo\" [ true ]", TypeError, HintFmt("expected a Boolean but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("in the left operand of the AND (&&) operator")); } TEST_F(ErrorTraceTest, any) { ASSERT_TRACE2("any 1 \"foo\"", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.any")); ASSERT_TRACE2("any (_: 1) \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.any")); ASSERT_TRACE2("any (_: 1) [ \"foo\" ]", TypeError, HintFmt("expected a Boolean but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the return value of the function passed to builtins.any")); } TEST_F(ErrorTraceTest, all) { ASSERT_TRACE2("all 1 \"foo\"", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.all")); ASSERT_TRACE2("all (_: 1) \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.all")); ASSERT_TRACE2("all (_: 1) [ \"foo\" ]", TypeError, HintFmt("expected a Boolean but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the return value of the function passed to builtins.all")); } TEST_F(ErrorTraceTest, genList) { ASSERT_TRACE2("genList 1 \"foo\"", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.genList")); ASSERT_TRACE2("genList 1 2", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.genList")); // XXX: defered // ASSERT_TRACE2("genList (x: x + \"foo\") 2 #TODO", // TypeError, // HintFmt("cannot add %s to an integer", "a string"), // HintFmt("while evaluating anonymous lambda")); ASSERT_TRACE1("genList false (-3)", EvalError, HintFmt("cannot create list of size %d", -3)); } TEST_F(ErrorTraceTest, sort) { ASSERT_TRACE2("sort 1 \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.sort")); ASSERT_TRACE2("sort 1 [ \"foo\" ]", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.sort")); ASSERT_TRACE1("sort (_: 1) [ \"foo\" \"bar\" ]", TypeError, HintFmt("attempt to call something which is not a function but %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL))); ASSERT_TRACE2("sort (_: _: 1) [ \"foo\" \"bar\" ]", TypeError, HintFmt("expected a Boolean but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the return value of the sorting function passed to builtins.sort")); // XXX: Trace too deep, need better asserts // ASSERT_TRACE1("sort (a: b: a <= b) [ \"foo\" {} ] # TODO", // TypeError, // HintFmt("cannot compare %s with %s", "a string", "a set")); // ASSERT_TRACE1("sort (a: b: a <= b) [ {} {} ] # TODO", // TypeError, // HintFmt("cannot compare %s with %s; values of that type are incomparable", "a set", "a set")); } TEST_F(ErrorTraceTest, partition) { ASSERT_TRACE2("partition 1 \"foo\"", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.partition")); ASSERT_TRACE2("partition (_: 1) \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.partition")); ASSERT_TRACE2("partition (_: 1) [ \"foo\" ]", TypeError, HintFmt("expected a Boolean but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the return value of the partition function passed to builtins.partition")); } TEST_F(ErrorTraceTest, groupBy) { ASSERT_TRACE2("groupBy 1 \"foo\"", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.groupBy")); ASSERT_TRACE2("groupBy (_: 1) \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.groupBy")); ASSERT_TRACE2("groupBy (x: x) [ \"foo\" \"bar\" 1 ]", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the return value of the grouping function passed to builtins.groupBy")); } TEST_F(ErrorTraceTest, concatMap) { ASSERT_TRACE2("concatMap 1 \"foo\"", TypeError, HintFmt("expected a function but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.concatMap")); ASSERT_TRACE2("concatMap (x: 1) \"foo\"", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.concatMap")); ASSERT_TRACE2("concatMap (x: 1) [ \"foo\" ] # TODO", TypeError, HintFmt("expected a list but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the return value of the function passed to builtins.concatMap")); ASSERT_TRACE2("concatMap (x: \"foo\") [ 1 2 ] # TODO", TypeError, HintFmt("expected a list but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the return value of the function passed to builtins.concatMap")); } TEST_F(ErrorTraceTest, add) { ASSERT_TRACE2("add \"foo\" 1", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument of the addition")); ASSERT_TRACE2("add 1 \"foo\"", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument of the addition")); } TEST_F(ErrorTraceTest, sub) { ASSERT_TRACE2("sub \"foo\" 1", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument of the subtraction")); ASSERT_TRACE2("sub 1 \"foo\"", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument of the subtraction")); } TEST_F(ErrorTraceTest, mul) { ASSERT_TRACE2("mul \"foo\" 1", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the first argument of the multiplication")); ASSERT_TRACE2("mul 1 \"foo\"", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument of the multiplication")); } TEST_F(ErrorTraceTest, div) { ASSERT_TRACE2("div \"foo\" 1 # TODO: an integer was expected -> a number", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the first operand of the division")); ASSERT_TRACE2("div 1 \"foo\"", TypeError, HintFmt("expected a float but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second operand of the division")); ASSERT_TRACE1("div \"foo\" 0", EvalError, HintFmt("division by zero")); } TEST_F(ErrorTraceTest, bitAnd) { ASSERT_TRACE2("bitAnd 1.1 2", TypeError, HintFmt("expected an integer but found %s: %s", "a float", Uncolored(ANSI_CYAN "1.1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.bitAnd")); ASSERT_TRACE2("bitAnd 1 2.2", TypeError, HintFmt("expected an integer but found %s: %s", "a float", Uncolored(ANSI_CYAN "2.2" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.bitAnd")); } TEST_F(ErrorTraceTest, bitOr) { ASSERT_TRACE2("bitOr 1.1 2", TypeError, HintFmt("expected an integer but found %s: %s", "a float", Uncolored(ANSI_CYAN "1.1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.bitOr")); ASSERT_TRACE2("bitOr 1 2.2", TypeError, HintFmt("expected an integer but found %s: %s", "a float", Uncolored(ANSI_CYAN "2.2" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.bitOr")); } TEST_F(ErrorTraceTest, bitXor) { ASSERT_TRACE2("bitXor 1.1 2", TypeError, HintFmt("expected an integer but found %s: %s", "a float", Uncolored(ANSI_CYAN "1.1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.bitXor")); ASSERT_TRACE2("bitXor 1 2.2", TypeError, HintFmt("expected an integer but found %s: %s", "a float", Uncolored(ANSI_CYAN "2.2" ANSI_NORMAL)), HintFmt("while evaluating the second argument passed to builtins.bitXor")); } TEST_F(ErrorTraceTest, lessThan) { ASSERT_TRACE1("lessThan 1 \"foo\"", EvalError, HintFmt("cannot compare %s with %s", "an integer", "a string")); ASSERT_TRACE1("lessThan {} {}", EvalError, HintFmt("cannot compare %s with %s; values of that type are incomparable", "a set", "a set")); ASSERT_TRACE2("lessThan [ 1 2 ] [ \"foo\" ]", EvalError, HintFmt("cannot compare %s with %s", "an integer", "a string"), HintFmt("while comparing two list elements")); } TEST_F(ErrorTraceTest, toString) { ASSERT_TRACE2("toString { a = 1; }", TypeError, HintFmt("cannot coerce %s to a string: %s", "a set", Uncolored("{ a = " ANSI_CYAN "1" ANSI_NORMAL "; }")), HintFmt("while evaluating the first argument passed to builtins.toString")); } TEST_F(ErrorTraceTest, substring) { ASSERT_TRACE2("substring {} \"foo\" true", TypeError, HintFmt("expected an integer but found %s: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the first argument (the start offset) passed to builtins.substring")); ASSERT_TRACE2("substring 3 \"foo\" true", TypeError, HintFmt("expected an integer but found %s: %s", "a string", Uncolored(ANSI_MAGENTA "\"foo\"" ANSI_NORMAL)), HintFmt("while evaluating the second argument (the substring length) passed to builtins.substring")); ASSERT_TRACE2("substring 0 3 {}", TypeError, HintFmt("cannot coerce %s to a string: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the third argument (the string) passed to builtins.substring")); ASSERT_TRACE1("substring (-3) 3 \"sometext\"", EvalError, HintFmt("negative start position in 'substring'")); } TEST_F(ErrorTraceTest, stringLength) { ASSERT_TRACE2("stringLength {} # TODO: context is missing ???", TypeError, HintFmt("cannot coerce %s to a string: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the argument passed to builtins.stringLength")); } TEST_F(ErrorTraceTest, hashString) { ASSERT_TRACE2("hashString 1 {}", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.hashString")); ASSERT_TRACE1("hashString \"foo\" \"content\"", UsageError, HintFmt("unknown hash algorithm '%s', expect 'md5', 'sha1', 'sha256', or 'sha512'", "foo")); ASSERT_TRACE2("hashString \"sha256\" {}", TypeError, HintFmt("expected a string but found %s: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the second argument passed to builtins.hashString")); } TEST_F(ErrorTraceTest, match) { ASSERT_TRACE2("match 1 {}", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.match")); ASSERT_TRACE2("match \"foo\" {}", TypeError, HintFmt("expected a string but found %s: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the second argument passed to builtins.match")); ASSERT_TRACE1("match \"(.*\" \"\"", EvalError, HintFmt("invalid regular expression '%s'", "(.*")); } TEST_F(ErrorTraceTest, split) { ASSERT_TRACE2("split 1 {}", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.split")); ASSERT_TRACE2("split \"foo\" {}", TypeError, HintFmt("expected a string but found %s: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the second argument passed to builtins.split")); ASSERT_TRACE1("split \"f(o*o\" \"1foo2\"", EvalError, HintFmt("invalid regular expression '%s'", "f(o*o")); } TEST_F(ErrorTraceTest, concatStringsSep) { ASSERT_TRACE2("concatStringsSep 1 {}", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument (the separator string) passed to builtins.concatStringsSep")); ASSERT_TRACE2("concatStringsSep \"foo\" {}", TypeError, HintFmt("expected a list but found %s: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the second argument (the list of strings to concat) passed to builtins.concatStringsSep")); ASSERT_TRACE2("concatStringsSep \"foo\" [ 1 2 {} ] # TODO: coerce to string is buggy", TypeError, HintFmt("cannot coerce %s to a string: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating one element of the list of strings to concat passed to builtins.concatStringsSep")); } TEST_F(ErrorTraceTest, parseDrvName) { ASSERT_TRACE2("parseDrvName 1", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.parseDrvName")); } TEST_F(ErrorTraceTest, compareVersions) { ASSERT_TRACE2("compareVersions 1 {}", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.compareVersions")); ASSERT_TRACE2("compareVersions \"abd\" {}", TypeError, HintFmt("expected a string but found %s: %s", "a set", Uncolored("{ }")), HintFmt("while evaluating the second argument passed to builtins.compareVersions")); } TEST_F(ErrorTraceTest, splitVersion) { ASSERT_TRACE2("splitVersion 1", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the first argument passed to builtins.splitVersion")); } TEST_F(ErrorTraceTest, traceVerbose) { } TEST_F(ErrorTraceTest, derivationStrict) { ASSERT_TRACE2("derivationStrict \"\"", TypeError, HintFmt("expected a set but found %s: %s", "a string", "\"\""), HintFmt("while evaluating the argument passed to builtins.derivationStrict")); ASSERT_TRACE2("derivationStrict {}", TypeError, HintFmt("attribute '%s' missing", "name"), HintFmt("in the attrset passed as argument to builtins.derivationStrict")); ASSERT_TRACE3("derivationStrict { name = 1; }", TypeError, HintFmt("expected a string but found %s: %s", "an integer", Uncolored(ANSI_CYAN "1" ANSI_NORMAL)), HintFmt("while evaluating the `name` attribute passed to builtins.derivationStrict"), HintFmt("while evaluating the derivation attribute 'name'")); ASSERT_DERIVATION_TRACE1("derivationStrict { name = \"foo\"; }", EvalError, HintFmt("required attribute 'builder' missing")); ASSERT_DERIVATION_TRACE2("derivationStrict { name = \"foo\"; builder = 1; __structuredAttrs = 15; }", TypeError, HintFmt("expected a Boolean but found %s: %s", "an integer", Uncolored(ANSI_CYAN "15" ANSI_NORMAL)), HintFmt("while evaluating the `__structuredAttrs` attribute passed to builtins.derivationStrict")); ASSERT_DERIVATION_TRACE2("derivationStrict { name = \"foo\"; builder = 1; __ignoreNulls = 15; }", TypeError, HintFmt("expected a Boolean but found %s: %s", "an integer", Uncolored(ANSI_CYAN "15" ANSI_NORMAL)), HintFmt("while evaluating the `__ignoreNulls` attribute passed to builtins.derivationStrict")); ASSERT_DERIVATION_TRACE2("derivationStrict { name = \"foo\"; builder = 1; outputHashMode = 15; }", EvalError, HintFmt("invalid value '%s' for 'outputHashMode' attribute", "15"), HintFmt("while evaluating attribute '%s' of derivation '%s'", "outputHashMode", "foo")); ASSERT_DERIVATION_TRACE2("derivationStrict { name = \"foo\"; builder = 1; outputHashMode = \"custom\"; }", EvalError, HintFmt("invalid value '%s' for 'outputHashMode' attribute", "custom"), HintFmt("while evaluating attribute '%s' of derivation '%s'", "outputHashMode", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = {}; }", TypeError, HintFmt("cannot coerce %s to a string: { }", "a set"), HintFmt(""), HintFmt("while evaluating attribute '%s' of derivation '%s'", "system", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = {}; }", TypeError, HintFmt("cannot coerce %s to a string: { }", "a set"), HintFmt(""), HintFmt("while evaluating attribute '%s' of derivation '%s'", "outputs", "foo")); ASSERT_DERIVATION_TRACE2("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = \"drvPath\"; }", EvalError, HintFmt("invalid derivation output name 'drvPath'"), HintFmt("while evaluating attribute '%s' of derivation '%s'", "outputs", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; outputs = \"out\"; __structuredAttrs = true; }", EvalError, HintFmt("expected a list but found %s: %s", "a string", "\"out\""), HintFmt(""), HintFmt("while evaluating attribute '%s' of derivation '%s'", "outputs", "foo")); ASSERT_DERIVATION_TRACE2("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = []; }", EvalError, HintFmt("derivation cannot have an empty set of outputs"), HintFmt("while evaluating attribute '%s' of derivation '%s'", "outputs", "foo")); ASSERT_DERIVATION_TRACE2("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = [ \"drvPath\" ]; }", EvalError, HintFmt("invalid derivation output name 'drvPath'"), HintFmt("while evaluating attribute '%s' of derivation '%s'", "outputs", "foo")); ASSERT_DERIVATION_TRACE2("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = [ \"out\" \"out\" ]; }", EvalError, HintFmt("duplicate derivation output '%s'", "out"), HintFmt("while evaluating attribute '%s' of derivation '%s'", "outputs", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = \"out\"; __contentAddressed = \"true\"; }", TypeError, HintFmt("expected a Boolean but found %s: %s", "a string", "\"true\""), HintFmt(""), HintFmt("while evaluating attribute '%s' of derivation '%s'", "__contentAddressed", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = \"out\"; __impure = \"true\"; }", TypeError, HintFmt("expected a Boolean but found %s: %s", "a string", "\"true\""), HintFmt(""), HintFmt("while evaluating attribute '%s' of derivation '%s'", "__impure", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = \"out\"; __impure = \"true\"; }", TypeError, HintFmt("expected a Boolean but found %s: %s", "a string", "\"true\""), HintFmt(""), HintFmt("while evaluating attribute '%s' of derivation '%s'", "__impure", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = \"out\"; args = \"foo\"; }", TypeError, HintFmt("expected a list but found %s: %s", "a string", "\"foo\""), HintFmt(""), HintFmt("while evaluating attribute '%s' of derivation '%s'", "args", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = \"out\"; args = [ {} ]; }", TypeError, HintFmt("cannot coerce %s to a string: { }", "a set"), HintFmt("while evaluating an element of the argument list"), HintFmt("while evaluating attribute '%s' of derivation '%s'", "args", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = \"out\"; args = [ \"a\" {} ]; }", TypeError, HintFmt("cannot coerce %s to a string: { }", "a set"), HintFmt("while evaluating an element of the argument list"), HintFmt("while evaluating attribute '%s' of derivation '%s'", "args", "foo")); ASSERT_DERIVATION_TRACE3("derivationStrict { name = \"foo\"; builder = 1; system = 1; outputs = \"out\"; FOO = {}; }", TypeError, HintFmt("cannot coerce %s to a string: { }", "a set"), HintFmt(""), HintFmt("while evaluating attribute '%s' of derivation '%s'", "FOO", "foo")); } } /* namespace nix */
64,039
C++
.cc
1,016
47.062008
147
0.511036
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false
11,041
search-path.cc
NixOS_nix/src/libexpr-tests/search-path.cc
#include <gtest/gtest.h> #include <gmock/gmock.h> #include "search-path.hh" namespace nix { TEST(LookupPathElem, parse_justPath) { ASSERT_EQ( LookupPath::Elem::parse("foo"), (LookupPath::Elem { .prefix = LookupPath::Prefix { .s = "" }, .path = LookupPath::Path { .s = "foo" }, })); } TEST(LookupPathElem, parse_emptyPrefix) { ASSERT_EQ( LookupPath::Elem::parse("=foo"), (LookupPath::Elem { .prefix = LookupPath::Prefix { .s = "" }, .path = LookupPath::Path { .s = "foo" }, })); } TEST(LookupPathElem, parse_oneEq) { ASSERT_EQ( LookupPath::Elem::parse("foo=bar"), (LookupPath::Elem { .prefix = LookupPath::Prefix { .s = "foo" }, .path = LookupPath::Path { .s = "bar" }, })); } TEST(LookupPathElem, parse_twoEqs) { ASSERT_EQ( LookupPath::Elem::parse("foo=bar=baz"), (LookupPath::Elem { .prefix = LookupPath::Prefix { .s = "foo" }, .path = LookupPath::Path { .s = "bar=baz" }, })); } TEST(LookupPathElem, suffixIfPotentialMatch_justPath) { LookupPath::Prefix prefix { .s = "" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("any/thing"), std::optional { "any/thing" }); } TEST(LookupPathElem, suffixIfPotentialMatch_misleadingPrefix1) { LookupPath::Prefix prefix { .s = "foo" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("fooX"), std::nullopt); } TEST(LookupPathElem, suffixIfPotentialMatch_misleadingPrefix2) { LookupPath::Prefix prefix { .s = "foo" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("fooX/bar"), std::nullopt); } TEST(LookupPathElem, suffixIfPotentialMatch_partialPrefix) { LookupPath::Prefix prefix { .s = "fooX" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("foo"), std::nullopt); } TEST(LookupPathElem, suffixIfPotentialMatch_exactPrefix) { LookupPath::Prefix prefix { .s = "foo" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("foo"), std::optional { "" }); } TEST(LookupPathElem, suffixIfPotentialMatch_multiKey) { LookupPath::Prefix prefix { .s = "foo/bar" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("foo/bar/baz"), std::optional { "baz" }); } TEST(LookupPathElem, suffixIfPotentialMatch_trailingSlash) { LookupPath::Prefix prefix { .s = "foo" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("foo/"), std::optional { "" }); } TEST(LookupPathElem, suffixIfPotentialMatch_trailingDoubleSlash) { LookupPath::Prefix prefix { .s = "foo" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("foo//"), std::optional { "/" }); } TEST(LookupPathElem, suffixIfPotentialMatch_trailingPath) { LookupPath::Prefix prefix { .s = "foo" }; ASSERT_EQ(prefix.suffixIfPotentialMatch("foo/bar/baz"), std::optional { "bar/baz" }); } }
2,794
C++
.cc
73
33.205479
89
0.651627
NixOS/nix
12,186
1,472
3,401
LGPL-2.1
9/20/2024, 9:26:25 PM (Europe/Amsterdam)
false
false
false
false
false
false
false
false