about summary refs log tree commit diff
path: root/tvix/store
diff options
context:
space:
mode:
authorFlorian Klink <flokli@flokli.de>2024-10-15T23·41+0300
committerclbot <clbot@tvl.fyi>2024-10-17T18·16+0000
commita94414e7ffc5c21874fa0ea6e92aa63fcc55cb7d (patch)
tree6e7f31f92fa5cbf78bfeaa75d411ce50e9d1fbe6 /tvix/store
parent1277b0c08891e8fd82c4a504193f43f635a7be18 (diff)
refactor(nix-compat/store_path): drop build_nar_based_store_path r/8822
This is the only (remaining) occurence of it, and not really
more code than just calling store_path::build_ca_path with
`CAHash::Nar(NixHash::Sha256(…))`, especially considering we need the
CAHash in the PathInfo struct later anyways - so let's remove this
function.

Change-Id: Ia82212086062c366e0280ca0823d9e68a3f91d3a
Reviewed-on: https://cl.tvl.fyi/c/depot/+/12632
Reviewed-by: edef <edef@edef.eu>
Autosubmit: flokli <flokli@flokli.de>
Tested-by: BuildkiteCI
Diffstat (limited to 'tvix/store')
-rw-r--r--tvix/store/src/import.rs8
1 files changed, 5 insertions, 3 deletions
diff --git a/tvix/store/src/import.rs b/tvix/store/src/import.rs
index 8101b6635a89..4c1bd51eeb61 100644
--- a/tvix/store/src/import.rs
+++ b/tvix/store/src/import.rs
@@ -99,11 +99,13 @@ where
     // Ask for the NAR size and sha256
     let (nar_size, nar_sha256) = nar_calculation_service.calculate_nar(&root_node).await?;
 
+    let ca = CAHash::Nar(NixHash::Sha256(nar_sha256));
+
     // Calculate the output path. This might still fail, as some names are illegal.
     // FUTUREWORK: express the `name` at the type level to be valid and move the conversion
     // at the caller level.
-    let output_path: StorePath<String> = store_path::build_nar_based_store_path(&nar_sha256, name)
-        .map_err(|_| {
+    let output_path: StorePath<String> =
+        store_path::build_ca_path(name, &ca, std::iter::empty::<&str>(), false).map_err(|_| {
             std::io::Error::new(
                 std::io::ErrorKind::InvalidData,
                 format!("invalid name: {}", name),
@@ -122,7 +124,7 @@ where
             nar_sha256,
             signatures: vec![],
             deriver: None,
-            ca: Some(CAHash::Nar(NixHash::Sha256(nar_sha256))),
+            ca: Some(ca),
         })
         .await?)
 }