#include "affinity.hh" // FIXME #include "command.hh" #include "progress-bar.hh" #include "shared.hh" #include "store-api.hh" #include "sync.hh" #include "thread-pool.hh" #include using namespace nix; struct CmdVerify : StorePathsCommand { bool noContents = false; bool noTrust = false; Strings substituterUris; size_t sigsNeeded; CmdVerify() { mkFlag(0, "no-contents", "do not verify the contents of each store path", &noContents); mkFlag(0, "no-trust", "do not verify whether each store path is trusted", &noTrust); mkFlag('s', "substituter", {"store-uri"}, "use signatures from specified store", 1, [&](Strings ss) { substituterUris.push_back(ss.front()); }); mkIntFlag('n', "sigs-needed", "require that each path has at least N valid signatures", &sigsNeeded); } std::string name() override { return "verify"; } std::string description() override { return "verify the integrity of store paths"; } Examples examples() override { return { Example{ "To verify the entire Nix store:", "nix verify --all" }, Example{ "To check whether each path in the closure of Firefox has at least 2 signatures:", "nix verify -r -n2 --no-contents $(type -p firefox)" }, }; } void run(ref store, Paths storePaths) override { restoreAffinity(); // FIXME std::vector> substituters; for (auto & s : substituterUris) substituters.push_back(openStoreAt(s)); auto publicKeys = getDefaultPublicKeys(); std::atomic untrusted{0}; std::atomic corrupted{0}; std::atomic done{0}; std::atomic failed{0}; ProgressBar progressBar; auto showProgress = [&](bool final) { std::string s; if (final) s = (format("checked %d paths") % storePaths.size()).str(); else s = (format("[%d/%d checked") % done % storePaths.size()).str(); if (corrupted > 0) s += (format(", %d corrupted") % corrupted).str(); if (untrusted > 0) s += (format(", %d untrusted") % untrusted).str(); if (failed > 0) s += (format(", %d failed") % failed).str(); if (!final) s += "]"; return s; }; progressBar.updateStatus(showProgress(false)); ThreadPool pool; auto doPath = [&](const Path & storePath) { try { checkInterrupt(); auto activity(progressBar.startActivity(format("checking ‘%s’") % storePath)); auto info = store->queryPathInfo(storePath); if (!noContents) { HashSink sink(info->narHash.type); store->narFromPath(info->path, sink); auto hash = sink.finish(); if (hash.first != info->narHash) { corrupted = 1; printMsg(lvlError, format("path ‘%s’ was modified! expected hash ‘%s’, got ‘%s’") % info->path % printHash(info->narHash) % printHash(hash.first)); } } if (!noTrust) { bool good = false; if (info->ultimate && !sigsNeeded) good = true; else { StringSet sigsSeen; size_t actualSigsNeeded = sigsNeeded ? sigsNeeded : 1; size_t validSigs = 0; auto doSigs = [&](StringSet sigs) { for (auto sig : sigs) { if (sigsSeen.count(sig)) continue; sigsSeen.insert(sig); if (info->checkSignature(publicKeys, sig)) validSigs++; } }; doSigs(info->sigs); for (auto & store2 : substituters) { if (validSigs >= actualSigsNeeded) break; try { doSigs(store2->queryPathInfo(info->path)->sigs); } catch (InvalidPath &) { } catch (Error & e) { printMsg(lvlError, format(ANSI_RED "error:" ANSI_NORMAL " %s") % e.what()); } } if (validSigs >= actualSigsNeeded) good = true; } if (!good) { untrusted++; printMsg(lvlError, format("path ‘%s’ is untrusted") % info->path); } } done++; progressBar.updateStatus(showProgress(false)); } catch (Error & e) { printMsg(lvlError, format(ANSI_RED "error:" ANSI_NORMAL " %s") % e.what()); failed++; } }; for (auto & storePath : storePaths) pool.enqueue(std::bind(doPath, storePath)); pool.process(); progressBar.done(); printMsg(lvlInfo, showProgress(true)); throw Exit( (corrupted ? 1 : 0) | (untrusted ? 2 : 0) | (failed ? 4 : 0)); } }; static RegisterCommand r1(make_ref());