//! This module implements logic required for persisting known paths
//! during an evaluation.
//!
//! Tvix needs to be able to keep track of each Nix store path that it
//! knows about during the scope of a single evaluation and its
//! related builds.
//!
//! This data is required to find the derivation needed to actually trigger the
//! build, if necessary.
use nix_compat::{
derivation::Derivation,
store_path::{BuildStorePathError, StorePath, StorePathRef},
};
use std::collections::HashMap;
use crate::fetchers::Fetch;
/// Struct keeping track of all known Derivations in the current evaluation.
/// This keeps both the Derivation struct, as well as the "Hash derivation
/// modulo".
#[derive(Debug, Default)]
pub struct KnownPaths {
/// All known derivation or FOD hashes.
///
/// Keys are derivation paths, values are a tuple of the "hash derivation
/// modulo" and the Derivation struct itself.
derivations: HashMap<StorePath<String>, ([u8; 32], Derivation)>,
/// A map from output path to (one) drv path.
/// Note that in the case of FODs, multiple drvs can produce the same output
/// path. We use one of them.
outputs_to_drvpath: HashMap<StorePath<String>, StorePath<String>>,
/// A map from output path to fetches (and their names).
outputs_to_fetches: HashMap<StorePath<String>, (String, Fetch)>,
}
impl KnownPaths {
/// Fetch the opaque "hash derivation modulo" for a given derivation path.
pub fn get_hash_derivation_modulo(&self, drv_path: &StorePath<String>) -> Option<&[u8; 32]> {
self.derivations
.get(drv_path)
.map(|(hash_derivation_modulo, _derivation)| hash_derivation_modulo)
}
/// Return a reference to the Derivation for a given drv path.
pub fn get_drv_by_drvpath(&self, drv_path: &StorePath<String>) -> Option<&Derivation> {
self.derivations
.get(drv_path)
.map(|(_hash_derivation_modulo, derivation)| derivation)
}
/// Return the drv path of the derivation producing the passed output path.
/// Note there can be multiple Derivations producing the same output path in
/// flight; this function will only return one of them.
pub fn get_drv_path_for_output_path(
&self,
output_path: &StorePath<String>,
) -> Option<&StorePath<String>> {
self.outputs_to_drvpath.get(output_path)
}
/// Insert a new [Derivation] into this struct.
/// The Derivation struct must pass validation, and its output paths need to
/// be fully calculated.
/// All input derivations this refers to must also be inserted to this
/// struct.
pub fn add_derivation(&mut self, drv_path: StorePath<String>, drv: Derivation) {
// check input derivations to have been inserted.
#[cfg(debug_assertions)]
{
for input_drv_path in drv.input_derivations.keys() {
debug_assert!(self.derivations.contains_key(input_drv_path));
}
}
// compute the hash derivation modulo
let hash_derivation_modulo = drv.hash_derivation_modulo(|drv_path| {
self.get_hash_derivation_modulo(&drv_path.to_owned())
.unwrap_or_else(|| panic!("{} not found", drv_path))
.to_owned()
});
// For all output paths, update our lookup table.
// We only write into the lookup table once.
for output in drv.outputs.values() {
self.outputs_to_drvpath
.entry(output.path.as_ref().expect("missing store path").clone())
.or_insert(drv_path.to_owned());
}
// insert the derivation itself
#[allow(unused_variables)] // assertions on this only compiled in debug builds
let old = self
.derivations
.insert(drv_path.to_owned(), (hash_derivation_modulo, drv));
#[cfg(debug_assertions)]
{
if let Some(old) = old {
debug_assert!(
old.0 == hash_derivation_modulo,
"hash derivation modulo for a given derivation should always be calculated the same"
);
}
}
}
/// Insert a new [Fetch] into this struct, which *must* have an expected
/// hash (otherwise we wouldn't be able to calculate the store path).
/// Fetches without a known hash need to be fetched inside builtins.
pub fn add_fetch<'a>(
&mut self,
fetch: Fetch,
name: &'a str,
) -> Result<StorePathRef<'a>, BuildStorePathError> {
let store_path = fetch
.store_path(name)?
.expect("Tvix bug: fetch must have an expected hash");
// insert the fetch.
self.outputs_to_fetches
.insert(store_path.to_owned(), (name.to_owned(), fetch));
Ok(store_path)
}
/// Return the name and fetch producing the passed output path.
/// Note there can also be (multiple) Derivations producing the same output path.
pub fn get_fetch_for_output_path(
&self,
output_path: &StorePath<String>,
) -> Option<(String, Fetch)> {
self.outputs_to_fetches
.get(output_path)
.map(|(name, fetch)| (name.to_owned(), fetch.to_owned()))
}
/// Returns an iterator over all known derivations and their store path.
pub fn get_derivations(&self) -> impl Iterator<Item = (&StorePath<String>, &Derivation)> {
self.derivations.iter().map(|(k, v)| (k, &v.1))
}
}
#[cfg(test)]
mod tests {
use std::sync::LazyLock;
use hex_literal::hex;
use nix_compat::{derivation::Derivation, nixbase32, nixhash, store_path::StorePath};
use url::Url;
use super::KnownPaths;
use crate::fetchers::Fetch;
static BAR_DRV: LazyLock<Derivation> = LazyLock::new(|| {
Derivation::from_aterm_bytes(include_bytes!(
"tests/ss2p4wmxijn652haqyd7dckxwl4c7hxx-bar.drv"
))
.expect("must parse")
});
static FOO_DRV: LazyLock<Derivation> = LazyLock::new(|| {
Derivation::from_aterm_bytes(include_bytes!(
"tests/ch49594n9avinrf8ip0aslidkc4lxkqv-foo.drv"
))
.expect("must parse")
});
static BAR_DRV_PATH: LazyLock<StorePath<String>> = LazyLock::new(|| {
StorePath::from_bytes(b"ss2p4wmxijn652haqyd7dckxwl4c7hxx-bar.drv").expect("must parse")
});
static FOO_DRV_PATH: LazyLock<StorePath<String>> = LazyLock::new(|| {
StorePath::from_bytes(b"ch49594n9avinrf8ip0aslidkc4lxkqv-foo.drv").expect("must parse")
});
static BAR_OUT_PATH: LazyLock<StorePath<String>> = LazyLock::new(|| {
StorePath::from_bytes(b"mp57d33657rf34lzvlbpfa1gjfv5gmpg-bar").expect("must parse")
});
static FOO_OUT_PATH: LazyLock<StorePath<String>> = LazyLock::new(|| {
StorePath::from_bytes(b"fhaj6gmwns62s6ypkcldbaj2ybvkhx3p-foo").expect("must parse")
});
static FETCH_URL: LazyLock<Fetch> = LazyLock::new(|| {
Fetch::URL {
url: Url::parse("https://raw.githubusercontent.com/aaptel/notmuch-extract-patch/f732a53e12a7c91a06755ebfab2007adc9b3063b/notmuch-extract-patch").unwrap(),
exp_hash: Some(nixhash::from_sri_str("sha256-Xa1Jbl2Eq5+L0ww+Ph1osA3Z/Dxe/RkN1/dITQCdXFk=").unwrap())
}
});
static FETCH_URL_OUT_PATH: LazyLock<StorePath<String>> = LazyLock::new(|| {
StorePath::from_bytes(b"06qi00hylriyfm0nl827crgjvbax84mz-notmuch-extract-patch").unwrap()
});
static FETCH_TARBALL: LazyLock<Fetch> = LazyLock::new(|| {
Fetch::Tarball {
url: Url::parse("https://github.com/NixOS/nixpkgs/archive/91050ea1e57e50388fa87a3302ba12d188ef723a.tar.gz").unwrap(),
exp_nar_sha256: Some(nixbase32::decode_fixed("1hf6cgaci1n186kkkjq106ryf8mmlq9vnwgfwh625wa8hfgdn4dm").unwrap())
}
});
static FETCH_TARBALL_OUT_PATH: LazyLock<StorePath<String>> = LazyLock::new(|| {
StorePath::from_bytes(b"7adgvk5zdfq4pwrhsm3n9lzypb12gw0g-source").unwrap()
});
/// Ensure that we don't allow adding a derivation that depends on another,
/// not-yet-added derivation.
#[test]
#[should_panic]
fn drv_reject_if_missing_input_drv() {
let mut known_paths = KnownPaths::default();
// FOO_DRV depends on BAR_DRV, which wasn't added.
known_paths.add_derivation(FOO_DRV_PATH.clone(), FOO_DRV.clone());
}
#[test]
fn drv_happy_path() {
let mut known_paths = KnownPaths::default();
// get_drv_by_drvpath should return None for non-existing Derivations,
// same as get_hash_derivation_modulo and get_drv_path_for_output_path
assert_eq!(None, known_paths.get_drv_by_drvpath(&BAR_DRV_PATH));
assert_eq!(None, known_paths.get_hash_derivation_modulo(&BAR_DRV_PATH));
assert_eq!(
None,
known_paths.get_drv_path_for_output_path(&BAR_OUT_PATH)
);
// Add BAR_DRV
known_paths.add_derivation(BAR_DRV_PATH.clone(), BAR_DRV.clone());
// We should get it back
assert_eq!(
Some(&BAR_DRV.clone()),
known_paths.get_drv_by_drvpath(&BAR_DRV_PATH)
);
// Test get_drv_path_for_output_path
assert_eq!(
Some(&BAR_DRV_PATH.clone()),
known_paths.get_drv_path_for_output_path(&BAR_OUT_PATH)
);
// It should be possible to get the hash derivation modulo.
assert_eq!(
Some(&hex!(
"c79aebd0ce3269393d4a1fde2cbd1d975d879b40f0bf40a48f550edc107fd5df"
)),
known_paths.get_hash_derivation_modulo(&BAR_DRV_PATH.clone())
);
// Now insert FOO_DRV too. It shouldn't panic, as BAR_DRV is already
// added.
known_paths.add_derivation(FOO_DRV_PATH.clone(), FOO_DRV.clone());
assert_eq!(
Some(&FOO_DRV.clone()),
known_paths.get_drv_by_drvpath(&FOO_DRV_PATH)
);
assert_eq!(
Some(&hex!(
"af030d36d63d3d7f56a71adaba26b36f5fa1f9847da5eed953ed62e18192762f"
)),
known_paths.get_hash_derivation_modulo(&FOO_DRV_PATH.clone())
);
// Test get_drv_path_for_output_path
assert_eq!(
Some(&FOO_DRV_PATH.clone()),
known_paths.get_drv_path_for_output_path(&FOO_OUT_PATH)
);
}
#[test]
fn fetch_happy_path() {
let mut known_paths = KnownPaths::default();
// get_fetch_for_output_path should return None for new fetches.
assert!(known_paths
.get_fetch_for_output_path(&FETCH_TARBALL_OUT_PATH)
.is_none());
// add_fetch should return the properly calculated store paths.
assert_eq!(
*FETCH_TARBALL_OUT_PATH,
known_paths
.add_fetch(FETCH_TARBALL.clone(), "source")
.unwrap()
.to_owned()
);
assert_eq!(
*FETCH_URL_OUT_PATH,
known_paths
.add_fetch(FETCH_URL.clone(), "notmuch-extract-patch")
.unwrap()
.to_owned()
);
}
#[test]
fn get_derivations_working() {
let mut known_paths = KnownPaths::default();
// Add BAR_DRV
known_paths.add_derivation(BAR_DRV_PATH.clone(), BAR_DRV.clone());
// We should be able to find BAR_DRV_PATH and BAR_DRV as a pair in get_derivations.
assert_eq!(
Some((&BAR_DRV_PATH.clone(), &BAR_DRV.clone())),
known_paths
.get_derivations()
.find(|(s, d)| (*s, *d) == (&BAR_DRV_PATH, &BAR_DRV))
);
}
// TODO: add test panicking about missing digest
}