2013-01-06 00:47:50 +01:00
|
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
2018-06-08 10:56:19 +02:00
|
|
|
|
;;; Copyright © 2012, 2013, 2014, 2015, 2016, 2017, 2018 Ludovic Courtès <ludo@gnu.org>
|
2012-12-09 23:52:59 +01:00
|
|
|
|
;;;
|
2013-01-06 00:47:50 +01:00
|
|
|
|
;;; This file is part of GNU Guix.
|
2012-12-09 23:52:59 +01:00
|
|
|
|
;;;
|
2013-01-06 00:47:50 +01:00
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
2012-12-09 23:52:59 +01:00
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
|
;;; your option) any later version.
|
|
|
|
|
;;;
|
2013-01-06 00:47:50 +01:00
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
2012-12-09 23:52:59 +01:00
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
|
;;;
|
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
2013-01-06 00:47:50 +01:00
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
2012-12-09 23:52:59 +01:00
|
|
|
|
|
|
|
|
|
(define-module (test-store)
|
2014-08-23 19:18:01 +02:00
|
|
|
|
#:use-module (guix tests)
|
2012-12-09 23:52:59 +01:00
|
|
|
|
#:use-module (guix store)
|
|
|
|
|
#:use-module (guix utils)
|
2015-10-31 22:37:23 +01:00
|
|
|
|
#:use-module (guix monads)
|
Switch to Guile-Gcrypt.
This removes (guix hash) and (guix pk-crypto), which now live as part of
Guile-Gcrypt (version 0.1.0.)
* guix/gcrypt.scm, guix/hash.scm, guix/pk-crypto.scm,
tests/hash.scm, tests/pk-crypto.scm: Remove.
* configure.ac: Test for Guile-Gcrypt. Remove LIBGCRYPT and
LIBGCRYPT_LIBDIR assignments.
* m4/guix.m4 (GUIX_ASSERT_LIBGCRYPT_USABLE): Remove.
* README: Add Guile-Gcrypt to the dependencies; move libgcrypt as
"required unless --disable-daemon".
* doc/guix.texi (Requirements): Likewise.
* gnu/packages/bash.scm, guix/derivations.scm, guix/docker.scm,
guix/git.scm, guix/http-client.scm, guix/import/cpan.scm,
guix/import/cran.scm, guix/import/crate.scm, guix/import/elpa.scm,
guix/import/gnu.scm, guix/import/hackage.scm,
guix/import/texlive.scm, guix/import/utils.scm, guix/nar.scm,
guix/pki.scm, guix/scripts/archive.scm,
guix/scripts/authenticate.scm, guix/scripts/download.scm,
guix/scripts/hash.scm, guix/scripts/pack.scm,
guix/scripts/publish.scm, guix/scripts/refresh.scm,
guix/scripts/substitute.scm, guix/store.scm,
guix/store/deduplication.scm, guix/tests.scm, tests/base32.scm,
tests/builders.scm, tests/challenge.scm, tests/cpan.scm,
tests/crate.scm, tests/derivations.scm, tests/gem.scm,
tests/nar.scm, tests/opam.scm, tests/pki.scm,
tests/publish.scm, tests/pypi.scm, tests/store-deduplication.scm,
tests/store.scm, tests/substitute.scm: Adjust imports.
* gnu/system/vm.scm: Likewise.
(guile-sqlite3&co): Rename to...
(gcrypt-sqlite3&co): ... this. Add GUILE-GCRYPT.
(expression->derivation-in-linux-vm)[config]: Remove.
(iso9660-image)[config]: Remove.
(qemu-image)[config]: Remove.
(system-docker-image)[config]: Remove.
* guix/scripts/pack.scm: Adjust imports.
(guile-sqlite3&co): Rename to...
(gcrypt-sqlite3&co): ... this. Add GUILE-GCRYPT.
(self-contained-tarball)[build]: Call 'make-config.scm' without
#:libgcrypt argument.
(squashfs-image)[libgcrypt]: Remove.
[build]: Call 'make-config.scm' without #:libgcrypt.
(docker-image)[config, json]: Remove.
[build]: Add GUILE-GCRYPT to the extensions Remove (guix config) from
the imported modules.
* guix/self.scm (specification->package): Remove "libgcrypt", add
"guile-gcrypt".
(compiled-guix): Remove #:libgcrypt.
[guile-gcrypt]: New variable.
[dependencies]: Add it.
[*core-modules*]: Remove #:libgcrypt from 'make-config.scm' call.
Add #:extensions.
[*config*]: Remove #:libgcrypt from 'make-config.scm' call.
(%dependency-variables): Remove %libgcrypt.
(make-config.scm): Remove #:libgcrypt.
* build-aux/build-self.scm (guile-gcrypt): New variable.
(make-config.scm): Remove #:libgcrypt.
(build-program)[fake-gcrypt-hash]: New variable.
Add (gcrypt hash) to the imported modules. Adjust load path
assignments.
* gnu/packages/package-management.scm (guix)[propagated-inputs]: Add
GUILE-GCRYPT.
[arguments]: In 'wrap-program' phase, add GUILE-GCRYPT to the search
path.
2018-08-31 17:07:07 +02:00
|
|
|
|
#:use-module (gcrypt hash)
|
2012-12-09 23:52:59 +01:00
|
|
|
|
#:use-module (guix base32)
|
2013-02-03 23:24:25 +01:00
|
|
|
|
#:use-module (guix packages)
|
|
|
|
|
#:use-module (guix derivations)
|
Break module cycle involving (guix store) and (guix ui).
Before, there was a cycle along the lines of:
(guix store) -> (guix nar) -> (guix ui) -> (guix store)
This caused problems, as discussed at:
http://lists.gnu.org/archive/html/guix-devel/2014-10/msg00109.html
This patch removes cycles in the (guix ...) modules.
* guix/nar.scm (&nar-error, &nar-read-error, dump, write-contents,
read-contents, %archive-version-1, write-file, restore-file): Move to...
* guix/serialization.scm: ... here.
* guix/store.scm: Remove dependency on (guix nar).
* guix/scripts/hash.scm, guix/scripts/offload.scm,
guix/scripts/substitute-binary.scm, tests/nar.scm, tests/store.scm,
tests/substitute-binary.scm: Adjust accordingly.
2014-10-09 23:46:13 +02:00
|
|
|
|
#:use-module (guix serialization)
|
2015-07-13 15:52:29 +02:00
|
|
|
|
#:use-module (guix build utils)
|
2015-03-05 22:00:11 +01:00
|
|
|
|
#:use-module (guix gexp)
|
2013-02-27 22:40:35 +01:00
|
|
|
|
#:use-module (gnu packages)
|
2013-01-18 01:06:24 +01:00
|
|
|
|
#:use-module (gnu packages bootstrap)
|
2012-12-09 23:52:59 +01:00
|
|
|
|
#:use-module (ice-9 match)
|
2018-10-15 22:40:35 +02:00
|
|
|
|
#:use-module (ice-9 regex)
|
2013-12-20 17:17:42 +01:00
|
|
|
|
#:use-module (rnrs bytevectors)
|
2013-04-12 17:30:27 +02:00
|
|
|
|
#:use-module (rnrs io ports)
|
2013-04-02 10:44:20 +02:00
|
|
|
|
#:use-module (web uri)
|
2012-12-09 23:52:59 +01:00
|
|
|
|
#:use-module (srfi srfi-1)
|
|
|
|
|
#:use-module (srfi srfi-11)
|
2013-12-20 17:17:42 +01:00
|
|
|
|
#:use-module (srfi srfi-26)
|
2013-05-29 23:04:15 +02:00
|
|
|
|
#:use-module (srfi srfi-34)
|
2012-12-09 23:52:59 +01:00
|
|
|
|
#:use-module (srfi srfi-64))
|
|
|
|
|
|
|
|
|
|
;; Test the (guix store) module.
|
|
|
|
|
|
|
|
|
|
(define %store
|
2014-08-23 19:18:01 +02:00
|
|
|
|
(open-connection-for-tests))
|
2012-12-09 23:52:59 +01:00
|
|
|
|
|
2018-09-05 13:58:07 +02:00
|
|
|
|
(define %shell
|
|
|
|
|
(or (getenv "SHELL") (getenv "CONFIG_SHELL")))
|
|
|
|
|
|
2012-12-09 23:52:59 +01:00
|
|
|
|
|
|
|
|
|
(test-begin "store")
|
|
|
|
|
|
2017-04-21 11:39:49 +02:00
|
|
|
|
(test-assert "open-connection with file:// URI"
|
|
|
|
|
(let ((store (open-connection (string-append "file://"
|
|
|
|
|
(%daemon-socket-uri)))))
|
|
|
|
|
(and (add-text-to-store store "foo" "bar")
|
|
|
|
|
(begin
|
|
|
|
|
(close-connection store)
|
|
|
|
|
#t))))
|
|
|
|
|
|
2016-12-08 14:03:33 +01:00
|
|
|
|
(test-equal "connection handshake error"
|
|
|
|
|
EPROTO
|
|
|
|
|
(let ((port (%make-void-port "rw")))
|
|
|
|
|
(guard (c ((nix-connection-error? c)
|
|
|
|
|
(and (eq? port (nix-connection-error-file c))
|
|
|
|
|
(nix-connection-error-code c))))
|
|
|
|
|
(open-connection #f #:port port)
|
|
|
|
|
'broken)))
|
|
|
|
|
|
2013-04-01 16:08:31 +02:00
|
|
|
|
(test-equal "store-path-hash-part"
|
|
|
|
|
"283gqy39v3g9dxjy26rynl0zls82fmcg"
|
|
|
|
|
(store-path-hash-part
|
|
|
|
|
(string-append (%store-prefix)
|
|
|
|
|
"/283gqy39v3g9dxjy26rynl0zls82fmcg-guile-2.0.7")))
|
|
|
|
|
|
|
|
|
|
(test-equal "store-path-hash-part #f"
|
|
|
|
|
#f
|
|
|
|
|
(store-path-hash-part
|
|
|
|
|
(string-append (%store-prefix)
|
|
|
|
|
"/foo/bar/283gqy39v3g9dxjy26rynl0zls82fmcg-guile-2.0.7")))
|
|
|
|
|
|
2013-12-11 00:18:07 +01:00
|
|
|
|
(test-equal "store-path-package-name"
|
|
|
|
|
"guile-2.0.7"
|
|
|
|
|
(store-path-package-name
|
|
|
|
|
(string-append (%store-prefix)
|
|
|
|
|
"/283gqy39v3g9dxjy26rynl0zls82fmcg-guile-2.0.7")))
|
|
|
|
|
|
|
|
|
|
(test-equal "store-path-package-name #f"
|
|
|
|
|
#f
|
|
|
|
|
(store-path-package-name
|
|
|
|
|
"/foo/bar/283gqy39v3g9dxjy26rynl0zls82fmcg-guile-2.0.7"))
|
|
|
|
|
|
2013-11-12 23:36:29 +01:00
|
|
|
|
(test-assert "direct-store-path?"
|
|
|
|
|
(and (direct-store-path?
|
|
|
|
|
(string-append (%store-prefix)
|
|
|
|
|
"/283gqy39v3g9dxjy26rynl0zls82fmcg-guile-2.0.7"))
|
|
|
|
|
(not (direct-store-path?
|
|
|
|
|
(string-append
|
|
|
|
|
(%store-prefix)
|
2014-04-26 16:38:38 +02:00
|
|
|
|
"/283gqy39v3g9dxjy26rynl0zls82fmcg-guile-2.0.7/bin/guile")))
|
|
|
|
|
(not (direct-store-path? (%store-prefix)))))
|
2013-11-12 23:36:29 +01:00
|
|
|
|
|
2014-03-18 23:59:57 +01:00
|
|
|
|
(test-skip (if %store 0 13))
|
|
|
|
|
|
2017-01-29 12:55:24 +01:00
|
|
|
|
(test-equal "add-data-to-store"
|
|
|
|
|
#vu8(1 2 3 4 5)
|
|
|
|
|
(call-with-input-file (add-data-to-store %store "data" #vu8(1 2 3 4 5))
|
|
|
|
|
get-bytevector-all))
|
|
|
|
|
|
2014-03-18 23:59:57 +01:00
|
|
|
|
(test-assert "valid-path? live"
|
|
|
|
|
(let ((p (add-text-to-store %store "hello" "hello, world")))
|
|
|
|
|
(valid-path? %store p)))
|
|
|
|
|
|
|
|
|
|
(test-assert "valid-path? false"
|
|
|
|
|
(not (valid-path? %store
|
|
|
|
|
(string-append (%store-prefix) "/"
|
|
|
|
|
(make-string 32 #\e) "-foobar"))))
|
|
|
|
|
|
|
|
|
|
(test-assert "valid-path? error"
|
|
|
|
|
(with-store s
|
|
|
|
|
(guard (c ((nix-protocol-error? c) #t))
|
|
|
|
|
(valid-path? s "foo")
|
|
|
|
|
#f)))
|
|
|
|
|
|
|
|
|
|
(test-assert "valid-path? recovery"
|
|
|
|
|
;; Prior to Nix commit 51800e0 (18 Mar. 2014), the daemon would immediately
|
|
|
|
|
;; close the connection after receiving a 'valid-path?' RPC with a non-store
|
|
|
|
|
;; file name. See
|
|
|
|
|
;; <http://article.gmane.org/gmane.linux.distributions.nixos/12411> for
|
|
|
|
|
;; details.
|
|
|
|
|
(with-store s
|
|
|
|
|
(let-syntax ((true-if-error (syntax-rules ()
|
|
|
|
|
((_ exp)
|
|
|
|
|
(guard (c ((nix-protocol-error? c) #t))
|
|
|
|
|
exp #f)))))
|
|
|
|
|
(and (true-if-error (valid-path? s "foo"))
|
|
|
|
|
(true-if-error (valid-path? s "bar"))
|
|
|
|
|
(true-if-error (valid-path? s "baz"))
|
|
|
|
|
(true-if-error (valid-path? s "chbouib"))
|
|
|
|
|
(valid-path? s (add-text-to-store s "valid" "yeah"))))))
|
2014-03-14 17:16:10 +01:00
|
|
|
|
|
|
|
|
|
(test-assert "hash-part->path"
|
|
|
|
|
(let ((p (add-text-to-store %store "hello" "hello, world")))
|
|
|
|
|
(equal? (hash-part->path %store (store-path-hash-part p))
|
|
|
|
|
p)))
|
2012-12-09 23:52:59 +01:00
|
|
|
|
|
|
|
|
|
(test-assert "dead-paths"
|
2013-09-10 22:36:41 +02:00
|
|
|
|
(let ((p (add-text-to-store %store "random-text" (random-text))))
|
2015-02-02 12:29:12 +01:00
|
|
|
|
(->bool (member p (dead-paths %store)))))
|
2012-12-09 23:52:59 +01:00
|
|
|
|
|
|
|
|
|
;; FIXME: Find a test for `live-paths'.
|
|
|
|
|
;;
|
|
|
|
|
;; (test-assert "temporary root is in live-paths"
|
|
|
|
|
;; (let* ((p1 (add-text-to-store %store "random-text"
|
|
|
|
|
;; (random-text) '()))
|
|
|
|
|
;; (b (add-text-to-store %store "link-builder"
|
|
|
|
|
;; (format #f "echo ~a > $out" p1)
|
|
|
|
|
;; '()))
|
2013-08-26 22:11:04 +02:00
|
|
|
|
;; (d1 (derivation %store "link"
|
|
|
|
|
;; "/bin/sh" `("-e" ,b)
|
|
|
|
|
;; #:inputs `((,b) (,p1))))
|
derivations: 'derivation' and related procedures return a single value.
* guix/derivations.scm (derivation->output-path,
derivation->output-paths): New procedures.
(derivation-path->output-path): Use 'derivation->output-path'.
(derivation-path->output-paths): Use 'derivation->output-paths'.
(derivation): Accept 'derivation?' objects as inputs. Return a single
value.
(build-derivations): New procedure.
(compiled-modules): Use 'derivation->output-paths'.
(build-expression->derivation)[source-path]: Add case for when the
input matches 'derivation?'.
[prologue]: Accept 'derivation?' objects in INPUTS.
[mod-dir, go-dir]: Use 'derivation->output-path'.
* guix/download.scm (url-fetch): Adjust to the single-value return.
* guix/packages.scm (package-output): Use 'derivation->output-path'.
* guix/scripts/build.scm (guix-build): When the argument is
'derivation-path?', pass it through 'read-derivation'.
Use 'derivation-file-name' to print out the .drv file names, and to
register them. Use 'derivation->output-path' instead of
'derivation-path->output-path'.
* guix/scripts/package.scm (roll-back): Adjust to the single-value
return.
(guix-package): Use 'derivation->output-path'.
* guix/ui.scm (show-what-to-build): Adjust to deal with 'derivation?'
objects instead of .drv file names.
* gnu/system/grub.scm (grub-configuration-file): Use
'derivation->output-path' instead of 'derivation-path->output-path'.
* gnu/system/vm.scm (qemu-image, system-qemu-image): Likewise.
* tests/builders.scm, tests/derivations.scm, tests/packages.scm,
tests/store.scm, tests/union.scm: Adjust to the new calling
convention.
* doc/guix.texi (Defining Packages, The Store, Derivations): Adjust
accordingly.
2013-09-18 17:01:40 +02:00
|
|
|
|
;; (p2 (derivation->output-path d1)))
|
2012-12-09 23:52:59 +01:00
|
|
|
|
;; (and (add-temp-root %store p2)
|
|
|
|
|
;; (build-derivations %store (list d1))
|
|
|
|
|
;; (valid-path? %store p1)
|
|
|
|
|
;; (member (pk p2) (live-paths %store)))))
|
|
|
|
|
|
2014-04-12 22:32:10 +02:00
|
|
|
|
(test-assert "permanent root"
|
|
|
|
|
(let* ((p (with-store store
|
|
|
|
|
(let ((p (add-text-to-store store "random-text"
|
|
|
|
|
(random-text))))
|
|
|
|
|
(add-permanent-root p)
|
|
|
|
|
(add-permanent-root p) ; should not throw
|
|
|
|
|
p))))
|
|
|
|
|
(and (member p (live-paths %store))
|
|
|
|
|
(begin
|
|
|
|
|
(remove-permanent-root p)
|
|
|
|
|
(->bool (member p (dead-paths %store)))))))
|
|
|
|
|
|
2012-12-09 23:52:59 +01:00
|
|
|
|
(test-assert "dead path can be explicitly collected"
|
|
|
|
|
(let ((p (add-text-to-store %store "random-text"
|
|
|
|
|
(random-text) '())))
|
|
|
|
|
(let-values (((paths freed) (delete-paths %store (list p))))
|
|
|
|
|
(and (equal? paths (list p))
|
2017-11-21 22:42:56 +01:00
|
|
|
|
;; XXX: On some file systems (notably Btrfs), freed
|
|
|
|
|
;; may return 0. See <https://bugs.gnu.org/29363>.
|
|
|
|
|
;;(> freed 0)
|
2012-12-09 23:52:59 +01:00
|
|
|
|
(not (file-exists? p))))))
|
|
|
|
|
|
2014-11-04 20:55:48 +01:00
|
|
|
|
(test-assert "add-text-to-store vs. delete-paths"
|
|
|
|
|
;; Before, 'add-text-to-store' would return PATH2 without noticing that it
|
|
|
|
|
;; is no longer valid.
|
|
|
|
|
(with-store store
|
|
|
|
|
(let* ((text (random-text))
|
|
|
|
|
(path (add-text-to-store store "delete-me" text))
|
|
|
|
|
(deleted (delete-paths store (list path)))
|
|
|
|
|
(path2 (add-text-to-store store "delete-me" text)))
|
|
|
|
|
(and (string=? path path2)
|
|
|
|
|
(equal? deleted (list path))
|
|
|
|
|
(valid-path? store path)
|
|
|
|
|
(file-exists? path)))))
|
|
|
|
|
|
|
|
|
|
(test-assert "add-to-store vs. delete-paths"
|
|
|
|
|
;; Same as above.
|
|
|
|
|
(with-store store
|
|
|
|
|
(let* ((file (search-path %load-path "guix.scm"))
|
|
|
|
|
(path (add-to-store store "delete-me" #t "sha256" file))
|
|
|
|
|
(deleted (delete-paths store (list path)))
|
|
|
|
|
(path2 (add-to-store store "delete-me" #t "sha256" file)))
|
|
|
|
|
(and (string=? path path2)
|
|
|
|
|
(equal? deleted (list path))
|
|
|
|
|
(valid-path? store path)
|
|
|
|
|
(file-exists? path)))))
|
|
|
|
|
|
2018-07-16 09:55:49 +02:00
|
|
|
|
(test-equal "add-file-tree-to-store"
|
|
|
|
|
`(42
|
|
|
|
|
("." directory #t)
|
|
|
|
|
("./bar" directory #t)
|
|
|
|
|
("./foo" directory #t)
|
|
|
|
|
("./foo/a" regular "file a")
|
|
|
|
|
("./foo/b" symlink "a")
|
|
|
|
|
("./foo/c" directory #t)
|
|
|
|
|
("./foo/c/p" regular "file p")
|
|
|
|
|
("./foo/c/q" directory #t)
|
2018-09-05 13:58:07 +02:00
|
|
|
|
("./foo/c/q/x" regular
|
|
|
|
|
,(string-append "#!" %shell "\nexit 42"))
|
2018-07-16 09:55:49 +02:00
|
|
|
|
("./foo/c/q/y" symlink "..")
|
|
|
|
|
("./foo/c/q/z" directory #t))
|
|
|
|
|
(let* ((tree `("file-tree" directory
|
|
|
|
|
("foo" directory
|
|
|
|
|
("a" regular (data "file a"))
|
|
|
|
|
("b" symlink "a")
|
|
|
|
|
("c" directory
|
|
|
|
|
("p" regular (data ,(string->utf8 "file p")))
|
|
|
|
|
("q" directory
|
|
|
|
|
("x" executable
|
2018-09-05 13:58:07 +02:00
|
|
|
|
(data ,(string-append "#!" %shell "\nexit 42")))
|
2018-07-16 09:55:49 +02:00
|
|
|
|
("y" symlink "..")
|
|
|
|
|
("z" directory))))
|
|
|
|
|
("bar" directory)))
|
|
|
|
|
(result (add-file-tree-to-store %store tree)))
|
|
|
|
|
(cons (status:exit-val (system* (string-append result "/foo/c/q/x")))
|
|
|
|
|
(with-directory-excursion result
|
|
|
|
|
(map (lambda (file)
|
|
|
|
|
(let ((type (stat:type (lstat file))))
|
|
|
|
|
`(,file ,type
|
|
|
|
|
,(match type
|
|
|
|
|
((or 'regular 'executable)
|
|
|
|
|
(call-with-input-file file
|
|
|
|
|
get-string-all))
|
|
|
|
|
('symlink (readlink file))
|
|
|
|
|
('directory #t)))))
|
|
|
|
|
(find-files "." #:directories? #t))))))
|
|
|
|
|
|
|
|
|
|
(test-equal "add-file-tree-to-store, flat"
|
|
|
|
|
"Hello, world!"
|
|
|
|
|
(let* ((tree `("flat-file" regular (data "Hello, world!")))
|
|
|
|
|
(result (add-file-tree-to-store %store tree)))
|
|
|
|
|
(and (file-exists? result)
|
|
|
|
|
(call-with-input-file result get-string-all))))
|
|
|
|
|
|
2013-02-27 22:40:35 +01:00
|
|
|
|
(test-assert "references"
|
|
|
|
|
(let* ((t1 (add-text-to-store %store "random1"
|
2013-09-10 22:36:41 +02:00
|
|
|
|
(random-text)))
|
2013-02-27 22:40:35 +01:00
|
|
|
|
(t2 (add-text-to-store %store "random2"
|
|
|
|
|
(random-text) (list t1))))
|
|
|
|
|
(and (equal? (list t1) (references %store t2))
|
|
|
|
|
(equal? (list t2) (referrers %store t1))
|
|
|
|
|
(null? (references %store t1))
|
|
|
|
|
(null? (referrers %store t2)))))
|
|
|
|
|
|
2016-03-04 17:57:04 +01:00
|
|
|
|
(test-assert "references/substitutes missing reference info"
|
|
|
|
|
(with-store s
|
|
|
|
|
(set-build-options s #:use-substitutes? #f)
|
|
|
|
|
(guard (c ((nix-protocol-error? c) #t))
|
|
|
|
|
(let* ((b (add-to-store s "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(d (derivation s "the-thing" b '("--help")
|
|
|
|
|
#:inputs `((,b)))))
|
2016-05-31 17:58:46 +02:00
|
|
|
|
(references/substitutes s (list (derivation->output-path d) b))
|
|
|
|
|
#f))))
|
2016-03-04 17:57:04 +01:00
|
|
|
|
|
|
|
|
|
(test-assert "references/substitutes with substitute info"
|
|
|
|
|
(with-store s
|
|
|
|
|
(set-build-options s #:use-substitutes? #t)
|
|
|
|
|
(let* ((t1 (add-text-to-store s "random1" (random-text)))
|
|
|
|
|
(t2 (add-text-to-store s "random2" (random-text)
|
|
|
|
|
(list t1)))
|
|
|
|
|
(t3 (add-text-to-store s "build" "echo -n $t2 > $out"))
|
|
|
|
|
(b (add-to-store s "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(d (derivation s "the-thing" b `("-e" ,t3)
|
|
|
|
|
#:inputs `((,b) (,t3) (,t2))
|
|
|
|
|
#:env-vars `(("t2" . ,t2))))
|
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(with-derivation-narinfo d
|
|
|
|
|
(sha256 => (sha256 (string->utf8 t2)))
|
|
|
|
|
(references => (list t2))
|
|
|
|
|
|
|
|
|
|
(equal? (references/substitutes s (list o t3 t2 t1))
|
|
|
|
|
`((,t2) ;refs of O
|
|
|
|
|
() ;refs of T3
|
|
|
|
|
(,t1) ;refs of T2
|
|
|
|
|
())))))) ;refs of T1
|
|
|
|
|
|
2016-05-31 17:58:46 +02:00
|
|
|
|
(test-equal "substitutable-path-info when substitutes are turned off"
|
|
|
|
|
'()
|
|
|
|
|
(with-store s
|
|
|
|
|
(set-build-options s #:use-substitutes? #f)
|
|
|
|
|
(let* ((b (add-to-store s "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(d (derivation s "the-thing" b '("--version")
|
|
|
|
|
#:inputs `((,b))))
|
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(with-derivation-narinfo d
|
|
|
|
|
(substitutable-path-info s (list o))))))
|
|
|
|
|
|
|
|
|
|
(test-equal "substitutable-paths when substitutes are turned off"
|
|
|
|
|
'()
|
|
|
|
|
(with-store s
|
|
|
|
|
(set-build-options s #:use-substitutes? #f)
|
|
|
|
|
(let* ((b (add-to-store s "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(d (derivation s "the-thing" b '("--version")
|
|
|
|
|
#:inputs `((,b))))
|
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(with-derivation-narinfo d
|
|
|
|
|
(substitutable-paths s (list o))))))
|
|
|
|
|
|
2013-06-13 22:03:42 +02:00
|
|
|
|
(test-assert "requisites"
|
|
|
|
|
(let* ((t1 (add-text-to-store %store "random1"
|
|
|
|
|
(random-text) '()))
|
|
|
|
|
(t2 (add-text-to-store %store "random2"
|
|
|
|
|
(random-text) (list t1)))
|
|
|
|
|
(t3 (add-text-to-store %store "random3"
|
|
|
|
|
(random-text) (list t2)))
|
|
|
|
|
(t4 (add-text-to-store %store "random4"
|
|
|
|
|
(random-text) (list t1 t3))))
|
|
|
|
|
(define (same? x y)
|
|
|
|
|
(and (= (length x) (length y))
|
|
|
|
|
(lset= equal? x y)))
|
|
|
|
|
|
2016-05-24 23:27:07 +02:00
|
|
|
|
(and (same? (requisites %store (list t1)) (list t1))
|
|
|
|
|
(same? (requisites %store (list t2)) (list t1 t2))
|
|
|
|
|
(same? (requisites %store (list t3)) (list t1 t2 t3))
|
|
|
|
|
(same? (requisites %store (list t4)) (list t1 t2 t3 t4))
|
|
|
|
|
(same? (requisites %store (list t1 t2 t3 t4))
|
|
|
|
|
(list t1 t2 t3 t4)))))
|
2013-06-13 22:03:42 +02:00
|
|
|
|
|
2013-02-27 22:40:35 +01:00
|
|
|
|
(test-assert "derivers"
|
|
|
|
|
(let* ((b (add-text-to-store %store "build" "echo $foo > $out" '()))
|
|
|
|
|
(s (add-to-store %store "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
2013-08-26 22:11:04 +02:00
|
|
|
|
(d (derivation %store "the-thing"
|
|
|
|
|
s `("-e" ,b)
|
|
|
|
|
#:env-vars `(("foo" . ,(random-text)))
|
|
|
|
|
#:inputs `((,b) (,s))))
|
derivations: 'derivation' and related procedures return a single value.
* guix/derivations.scm (derivation->output-path,
derivation->output-paths): New procedures.
(derivation-path->output-path): Use 'derivation->output-path'.
(derivation-path->output-paths): Use 'derivation->output-paths'.
(derivation): Accept 'derivation?' objects as inputs. Return a single
value.
(build-derivations): New procedure.
(compiled-modules): Use 'derivation->output-paths'.
(build-expression->derivation)[source-path]: Add case for when the
input matches 'derivation?'.
[prologue]: Accept 'derivation?' objects in INPUTS.
[mod-dir, go-dir]: Use 'derivation->output-path'.
* guix/download.scm (url-fetch): Adjust to the single-value return.
* guix/packages.scm (package-output): Use 'derivation->output-path'.
* guix/scripts/build.scm (guix-build): When the argument is
'derivation-path?', pass it through 'read-derivation'.
Use 'derivation-file-name' to print out the .drv file names, and to
register them. Use 'derivation->output-path' instead of
'derivation-path->output-path'.
* guix/scripts/package.scm (roll-back): Adjust to the single-value
return.
(guix-package): Use 'derivation->output-path'.
* guix/ui.scm (show-what-to-build): Adjust to deal with 'derivation?'
objects instead of .drv file names.
* gnu/system/grub.scm (grub-configuration-file): Use
'derivation->output-path' instead of 'derivation-path->output-path'.
* gnu/system/vm.scm (qemu-image, system-qemu-image): Likewise.
* tests/builders.scm, tests/derivations.scm, tests/packages.scm,
tests/store.scm, tests/union.scm: Adjust to the new calling
convention.
* doc/guix.texi (Defining Packages, The Store, Derivations): Adjust
accordingly.
2013-09-18 17:01:40 +02:00
|
|
|
|
(o (derivation->output-path d)))
|
2013-02-27 22:40:35 +01:00
|
|
|
|
(and (build-derivations %store (list d))
|
derivations: 'derivation' and related procedures return a single value.
* guix/derivations.scm (derivation->output-path,
derivation->output-paths): New procedures.
(derivation-path->output-path): Use 'derivation->output-path'.
(derivation-path->output-paths): Use 'derivation->output-paths'.
(derivation): Accept 'derivation?' objects as inputs. Return a single
value.
(build-derivations): New procedure.
(compiled-modules): Use 'derivation->output-paths'.
(build-expression->derivation)[source-path]: Add case for when the
input matches 'derivation?'.
[prologue]: Accept 'derivation?' objects in INPUTS.
[mod-dir, go-dir]: Use 'derivation->output-path'.
* guix/download.scm (url-fetch): Adjust to the single-value return.
* guix/packages.scm (package-output): Use 'derivation->output-path'.
* guix/scripts/build.scm (guix-build): When the argument is
'derivation-path?', pass it through 'read-derivation'.
Use 'derivation-file-name' to print out the .drv file names, and to
register them. Use 'derivation->output-path' instead of
'derivation-path->output-path'.
* guix/scripts/package.scm (roll-back): Adjust to the single-value
return.
(guix-package): Use 'derivation->output-path'.
* guix/ui.scm (show-what-to-build): Adjust to deal with 'derivation?'
objects instead of .drv file names.
* gnu/system/grub.scm (grub-configuration-file): Use
'derivation->output-path' instead of 'derivation-path->output-path'.
* gnu/system/vm.scm (qemu-image, system-qemu-image): Likewise.
* tests/builders.scm, tests/derivations.scm, tests/packages.scm,
tests/store.scm, tests/union.scm: Adjust to the new calling
convention.
* doc/guix.texi (Defining Packages, The Store, Derivations): Adjust
accordingly.
2013-09-18 17:01:40 +02:00
|
|
|
|
(equal? (query-derivation-outputs %store (derivation-file-name d))
|
2013-02-27 22:40:35 +01:00
|
|
|
|
(list o))
|
|
|
|
|
(equal? (valid-derivers %store o)
|
derivations: 'derivation' and related procedures return a single value.
* guix/derivations.scm (derivation->output-path,
derivation->output-paths): New procedures.
(derivation-path->output-path): Use 'derivation->output-path'.
(derivation-path->output-paths): Use 'derivation->output-paths'.
(derivation): Accept 'derivation?' objects as inputs. Return a single
value.
(build-derivations): New procedure.
(compiled-modules): Use 'derivation->output-paths'.
(build-expression->derivation)[source-path]: Add case for when the
input matches 'derivation?'.
[prologue]: Accept 'derivation?' objects in INPUTS.
[mod-dir, go-dir]: Use 'derivation->output-path'.
* guix/download.scm (url-fetch): Adjust to the single-value return.
* guix/packages.scm (package-output): Use 'derivation->output-path'.
* guix/scripts/build.scm (guix-build): When the argument is
'derivation-path?', pass it through 'read-derivation'.
Use 'derivation-file-name' to print out the .drv file names, and to
register them. Use 'derivation->output-path' instead of
'derivation-path->output-path'.
* guix/scripts/package.scm (roll-back): Adjust to the single-value
return.
(guix-package): Use 'derivation->output-path'.
* guix/ui.scm (show-what-to-build): Adjust to deal with 'derivation?'
objects instead of .drv file names.
* gnu/system/grub.scm (grub-configuration-file): Use
'derivation->output-path' instead of 'derivation-path->output-path'.
* gnu/system/vm.scm (qemu-image, system-qemu-image): Likewise.
* tests/builders.scm, tests/derivations.scm, tests/packages.scm,
tests/store.scm, tests/union.scm: Adjust to the new calling
convention.
* doc/guix.texi (Defining Packages, The Store, Derivations): Adjust
accordingly.
2013-09-18 17:01:40 +02:00
|
|
|
|
(list (derivation-file-name d))))))
|
2013-02-27 22:40:35 +01:00
|
|
|
|
|
2014-01-23 22:13:27 +01:00
|
|
|
|
(test-assert "topologically-sorted, one item"
|
|
|
|
|
(let* ((a (add-text-to-store %store "a" "a"))
|
|
|
|
|
(b (add-text-to-store %store "b" "b" (list a)))
|
|
|
|
|
(c (add-text-to-store %store "c" "c" (list b)))
|
|
|
|
|
(d (add-text-to-store %store "d" "d" (list c)))
|
|
|
|
|
(s (topologically-sorted %store (list d))))
|
|
|
|
|
(equal? s (list a b c d))))
|
|
|
|
|
|
|
|
|
|
(test-assert "topologically-sorted, several items"
|
|
|
|
|
(let* ((a (add-text-to-store %store "a" "a"))
|
|
|
|
|
(b (add-text-to-store %store "b" "b" (list a)))
|
|
|
|
|
(c (add-text-to-store %store "c" "c" (list b)))
|
|
|
|
|
(d (add-text-to-store %store "d" "d" (list c)))
|
|
|
|
|
(s1 (topologically-sorted %store (list d a c b)))
|
|
|
|
|
(s2 (topologically-sorted %store (list b d c a b d))))
|
|
|
|
|
(equal? s1 s2 (list a b c d))))
|
|
|
|
|
|
|
|
|
|
(test-assert "topologically-sorted, more difficult"
|
|
|
|
|
(let* ((a (add-text-to-store %store "a" "a"))
|
|
|
|
|
(b (add-text-to-store %store "b" "b" (list a)))
|
|
|
|
|
(c (add-text-to-store %store "c" "c" (list b)))
|
|
|
|
|
(d (add-text-to-store %store "d" "d" (list c)))
|
|
|
|
|
(w (add-text-to-store %store "w" "w"))
|
|
|
|
|
(x (add-text-to-store %store "x" "x" (list w)))
|
|
|
|
|
(y (add-text-to-store %store "y" "y" (list x d)))
|
|
|
|
|
(s1 (topologically-sorted %store (list y)))
|
|
|
|
|
(s2 (topologically-sorted %store (list c y)))
|
|
|
|
|
(s3 (topologically-sorted %store (cons y (references %store y)))))
|
2014-03-10 23:02:43 +01:00
|
|
|
|
;; The order in which 'references' returns the references of Y is
|
|
|
|
|
;; unspecified, so accommodate.
|
|
|
|
|
(let* ((x-then-d? (equal? (references %store y) (list x d))))
|
|
|
|
|
(and (equal? s1
|
|
|
|
|
(if x-then-d?
|
|
|
|
|
(list w x a b c d y)
|
|
|
|
|
(list a b c d w x y)))
|
|
|
|
|
(equal? s2
|
|
|
|
|
(if x-then-d?
|
|
|
|
|
(list a b c w x d y)
|
|
|
|
|
(list a b c d w x y)))
|
|
|
|
|
(lset= string=? s1 s3)))))
|
2014-01-23 22:13:27 +01:00
|
|
|
|
|
2015-03-05 22:00:11 +01:00
|
|
|
|
(test-assert "current-build-output-port, UTF-8"
|
|
|
|
|
;; Are UTF-8 strings in the build log properly interpreted?
|
|
|
|
|
(string-contains
|
|
|
|
|
(with-fluids ((%default-port-encoding "UTF-8")) ;for the string port
|
|
|
|
|
(call-with-output-string
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(parameterize ((current-build-output-port port))
|
|
|
|
|
(let* ((s "Here’s a Greek letter: λ.")
|
|
|
|
|
(d (build-expression->derivation
|
|
|
|
|
%store "foo" `(display ,s)
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation s %bootstrap-guile (%current-system)))))
|
|
|
|
|
(guard (c ((nix-protocol-error? c) #t))
|
|
|
|
|
(build-derivations %store (list d))))))))
|
|
|
|
|
"Here’s a Greek letter: λ."))
|
|
|
|
|
|
|
|
|
|
(test-assert "current-build-output-port, UTF-8 + garbage"
|
|
|
|
|
;; What about a mixture of UTF-8 + garbage?
|
|
|
|
|
(string-contains
|
|
|
|
|
(with-fluids ((%default-port-encoding "UTF-8")) ;for the string port
|
|
|
|
|
(call-with-output-string
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(parameterize ((current-build-output-port port))
|
|
|
|
|
(let ((d (build-expression->derivation
|
|
|
|
|
%store "foo"
|
|
|
|
|
`(begin
|
|
|
|
|
(use-modules (rnrs io ports))
|
|
|
|
|
(display "garbage: ")
|
|
|
|
|
(put-bytevector (current-output-port) #vu8(128))
|
|
|
|
|
(display "lambda: λ\n"))
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation %store %bootstrap-guile))))
|
|
|
|
|
(guard (c ((nix-protocol-error? c) #t))
|
|
|
|
|
(build-derivations %store (list d))))))))
|
2017-03-15 13:54:29 +01:00
|
|
|
|
(cond-expand
|
2017-03-22 14:40:51 +01:00
|
|
|
|
(guile-2.2 "garbage: <20>lambda: λ")
|
|
|
|
|
(else "garbage: ?lambda: λ"))))
|
2015-03-05 22:00:11 +01:00
|
|
|
|
|
2013-11-12 00:10:10 +01:00
|
|
|
|
(test-assert "log-file, derivation"
|
|
|
|
|
(let* ((b (add-text-to-store %store "build" "echo $foo > $out" '()))
|
|
|
|
|
(s (add-to-store %store "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(d (derivation %store "the-thing"
|
|
|
|
|
s `("-e" ,b)
|
|
|
|
|
#:env-vars `(("foo" . ,(random-text)))
|
|
|
|
|
#:inputs `((,b) (,s)))))
|
|
|
|
|
(and (build-derivations %store (list d))
|
|
|
|
|
(file-exists? (pk (log-file %store (derivation-file-name d)))))))
|
|
|
|
|
|
|
|
|
|
(test-assert "log-file, output file name"
|
|
|
|
|
(let* ((b (add-text-to-store %store "build" "echo $foo > $out" '()))
|
|
|
|
|
(s (add-to-store %store "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(d (derivation %store "the-thing"
|
|
|
|
|
s `("-e" ,b)
|
|
|
|
|
#:env-vars `(("foo" . ,(random-text)))
|
|
|
|
|
#:inputs `((,b) (,s))))
|
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(and (build-derivations %store (list d))
|
|
|
|
|
(file-exists? (pk (log-file %store o)))
|
|
|
|
|
(string=? (log-file %store (derivation-file-name d))
|
|
|
|
|
(log-file %store o)))))
|
|
|
|
|
|
2013-02-03 23:24:25 +01:00
|
|
|
|
(test-assert "no substitutes"
|
2015-02-01 23:16:11 +01:00
|
|
|
|
(with-store s
|
|
|
|
|
(let* ((d1 (package-derivation s %bootstrap-guile (%current-system)))
|
|
|
|
|
(d2 (package-derivation s %bootstrap-glibc (%current-system)))
|
|
|
|
|
(o (map derivation->output-path (list d1 d2))))
|
|
|
|
|
(set-build-options s #:use-substitutes? #f)
|
|
|
|
|
(and (not (has-substitutes? s (derivation-file-name d1)))
|
|
|
|
|
(not (has-substitutes? s (derivation-file-name d2)))
|
|
|
|
|
(null? (substitutable-paths s o))
|
|
|
|
|
(null? (substitutable-path-info s o))))))
|
2013-02-03 23:24:25 +01:00
|
|
|
|
|
2015-02-02 12:25:34 +01:00
|
|
|
|
(test-assert "build-things with output path"
|
|
|
|
|
(with-store s
|
|
|
|
|
(let* ((c (random-text)) ;contents of the output
|
|
|
|
|
(d (build-expression->derivation
|
|
|
|
|
s "substitute-me"
|
|
|
|
|
`(call-with-output-file %output
|
|
|
|
|
(lambda (p)
|
|
|
|
|
(display ,c p)))
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation s %bootstrap-guile (%current-system))))
|
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(set-build-options s #:use-substitutes? #f)
|
|
|
|
|
|
|
|
|
|
;; Pass 'build-things' the output file name, O. However, since there
|
|
|
|
|
;; are no substitutes for O, it will just do nothing.
|
|
|
|
|
(build-things s (list o))
|
|
|
|
|
(not (valid-path? s o)))))
|
|
|
|
|
|
2013-04-02 10:44:20 +02:00
|
|
|
|
(test-skip (if (getenv "GUIX_BINARY_SUBSTITUTE_URL") 0 1))
|
|
|
|
|
|
|
|
|
|
(test-assert "substitute query"
|
2015-02-01 23:16:11 +01:00
|
|
|
|
(with-store s
|
2015-02-02 10:37:23 +01:00
|
|
|
|
(let* ((d (package-derivation s %bootstrap-guile (%current-system)))
|
|
|
|
|
(o (derivation->output-path d)))
|
2015-03-25 10:34:27 +01:00
|
|
|
|
;; Create fake substituter data, to be read by 'guix substitute'.
|
2015-02-02 10:37:23 +01:00
|
|
|
|
(with-derivation-narinfo d
|
|
|
|
|
;; Remove entry from the local cache.
|
|
|
|
|
(false-if-exception
|
2015-07-13 15:52:29 +02:00
|
|
|
|
(delete-file-recursively (string-append (getenv "XDG_CACHE_HOME")
|
|
|
|
|
"/guix/substitute")))
|
2015-02-02 10:37:23 +01:00
|
|
|
|
|
2015-03-25 10:34:27 +01:00
|
|
|
|
;; Make sure 'guix substitute' correctly communicates the above
|
2015-02-02 10:37:23 +01:00
|
|
|
|
;; data.
|
substitute: Honor "substitute-urls" option passed by "untrusted" clients.
* guix/scripts/substitute.scm (or*): New macro.
(%cache-url): Honor "untrusted-substitute-urls".
* guix/tests.scm (%test-substitute-urls): New variable.
(open-connection-for-tests): Use it.
* tests/derivations.scm ("derivation-prerequisites-to-build and substitutes",
"derivation-prerequisites-to-build and substitutes, non-substitutable
build", "derivation-prerequisites-to-build and substitutes, local build"):
Pass it to 'set-build-options'.
* tests/guix-daemon.sh: Likewise.
* tests/store.scm ("substitute query, alternating URLs"): New test.
("substitute query", "substitute", "substitute + build-things with output
path", "substitute, corrupt output hash", "substitute --fallback"): Pass
#:substitute-urls to 'set-build-options'.
2015-07-13 15:46:12 +02:00
|
|
|
|
(set-build-options s #:use-substitutes? #t
|
|
|
|
|
#:substitute-urls (%test-substitute-urls))
|
2015-02-02 10:37:23 +01:00
|
|
|
|
(and (has-substitutes? s o)
|
|
|
|
|
(equal? (list o) (substitutable-paths s (list o)))
|
|
|
|
|
(match (pk 'spi (substitutable-path-info s (list o)))
|
|
|
|
|
(((? substitutable? s))
|
|
|
|
|
(and (string=? (substitutable-deriver s)
|
|
|
|
|
(derivation-file-name d))
|
|
|
|
|
(null? (substitutable-references s))
|
|
|
|
|
(equal? (substitutable-nar-size s) 1234)))))))))
|
2013-04-02 10:44:20 +02:00
|
|
|
|
|
substitute: Honor "substitute-urls" option passed by "untrusted" clients.
* guix/scripts/substitute.scm (or*): New macro.
(%cache-url): Honor "untrusted-substitute-urls".
* guix/tests.scm (%test-substitute-urls): New variable.
(open-connection-for-tests): Use it.
* tests/derivations.scm ("derivation-prerequisites-to-build and substitutes",
"derivation-prerequisites-to-build and substitutes, non-substitutable
build", "derivation-prerequisites-to-build and substitutes, local build"):
Pass it to 'set-build-options'.
* tests/guix-daemon.sh: Likewise.
* tests/store.scm ("substitute query, alternating URLs"): New test.
("substitute query", "substitute", "substitute + build-things with output
path", "substitute, corrupt output hash", "substitute --fallback"): Pass
#:substitute-urls to 'set-build-options'.
2015-07-13 15:46:12 +02:00
|
|
|
|
(test-assert "substitute query, alternating URLs"
|
|
|
|
|
(let* ((d (with-store s
|
|
|
|
|
(package-derivation s %bootstrap-guile (%current-system))))
|
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(with-derivation-narinfo d
|
|
|
|
|
;; Remove entry from the local cache.
|
|
|
|
|
(false-if-exception
|
|
|
|
|
(delete-file-recursively (string-append (getenv "XDG_CACHE_HOME")
|
|
|
|
|
"/guix/substitute")))
|
|
|
|
|
|
|
|
|
|
;; Note: We reconnect to the daemon to force a new instance of 'guix
|
|
|
|
|
;; substitute' to be used; otherwise the #:substitute-urls of
|
|
|
|
|
;; 'set-build-options' would have no effect.
|
|
|
|
|
|
|
|
|
|
(and (with-store s ;the right substitute URL
|
|
|
|
|
(set-build-options s #:use-substitutes? #t
|
|
|
|
|
#:substitute-urls (%test-substitute-urls))
|
|
|
|
|
(has-substitutes? s o))
|
|
|
|
|
(with-store s ;the wrong one
|
|
|
|
|
(set-build-options s #:use-substitutes? #t
|
|
|
|
|
#:substitute-urls (list
|
|
|
|
|
"http://does-not-exist"))
|
|
|
|
|
(not (has-substitutes? s o)))
|
|
|
|
|
(with-store s ;the right one again
|
|
|
|
|
(set-build-options s #:use-substitutes? #t
|
|
|
|
|
#:substitute-urls (%test-substitute-urls))
|
2016-03-16 18:13:02 +01:00
|
|
|
|
(has-substitutes? s o))
|
|
|
|
|
(with-store s ;empty list of URLs
|
|
|
|
|
(set-build-options s #:use-substitutes? #t
|
|
|
|
|
#:substitute-urls '())
|
|
|
|
|
(not (has-substitutes? s o)))))))
|
substitute: Honor "substitute-urls" option passed by "untrusted" clients.
* guix/scripts/substitute.scm (or*): New macro.
(%cache-url): Honor "untrusted-substitute-urls".
* guix/tests.scm (%test-substitute-urls): New variable.
(open-connection-for-tests): Use it.
* tests/derivations.scm ("derivation-prerequisites-to-build and substitutes",
"derivation-prerequisites-to-build and substitutes, non-substitutable
build", "derivation-prerequisites-to-build and substitutes, local build"):
Pass it to 'set-build-options'.
* tests/guix-daemon.sh: Likewise.
* tests/store.scm ("substitute query, alternating URLs"): New test.
("substitute query", "substitute", "substitute + build-things with output
path", "substitute, corrupt output hash", "substitute --fallback"): Pass
#:substitute-urls to 'set-build-options'.
2015-07-13 15:46:12 +02:00
|
|
|
|
|
2013-04-12 17:30:27 +02:00
|
|
|
|
(test-assert "substitute"
|
2015-02-01 23:16:11 +01:00
|
|
|
|
(with-store s
|
|
|
|
|
(let* ((c (random-text)) ; contents of the output
|
|
|
|
|
(d (build-expression->derivation
|
|
|
|
|
s "substitute-me"
|
|
|
|
|
`(call-with-output-file %output
|
|
|
|
|
(lambda (p)
|
|
|
|
|
(exit 1) ; would actually fail
|
|
|
|
|
(display ,c p)))
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation s %bootstrap-guile (%current-system))))
|
2015-02-02 11:24:24 +01:00
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(with-derivation-substitute d c
|
substitute: Honor "substitute-urls" option passed by "untrusted" clients.
* guix/scripts/substitute.scm (or*): New macro.
(%cache-url): Honor "untrusted-substitute-urls".
* guix/tests.scm (%test-substitute-urls): New variable.
(open-connection-for-tests): Use it.
* tests/derivations.scm ("derivation-prerequisites-to-build and substitutes",
"derivation-prerequisites-to-build and substitutes, non-substitutable
build", "derivation-prerequisites-to-build and substitutes, local build"):
Pass it to 'set-build-options'.
* tests/guix-daemon.sh: Likewise.
* tests/store.scm ("substitute query, alternating URLs"): New test.
("substitute query", "substitute", "substitute + build-things with output
path", "substitute, corrupt output hash", "substitute --fallback"): Pass
#:substitute-urls to 'set-build-options'.
2015-07-13 15:46:12 +02:00
|
|
|
|
(set-build-options s #:use-substitutes? #t
|
|
|
|
|
#:substitute-urls (%test-substitute-urls))
|
2015-02-02 11:24:24 +01:00
|
|
|
|
(and (has-substitutes? s o)
|
|
|
|
|
(build-derivations s (list d))
|
|
|
|
|
(equal? c (call-with-input-file o get-string-all)))))))
|
2013-04-12 17:30:27 +02:00
|
|
|
|
|
2015-02-02 12:25:34 +01:00
|
|
|
|
(test-assert "substitute + build-things with output path"
|
|
|
|
|
(with-store s
|
|
|
|
|
(let* ((c (random-text)) ;contents of the output
|
|
|
|
|
(d (build-expression->derivation
|
|
|
|
|
s "substitute-me"
|
|
|
|
|
`(call-with-output-file %output
|
|
|
|
|
(lambda (p)
|
|
|
|
|
(exit 1) ;would actually fail
|
|
|
|
|
(display ,c p)))
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation s %bootstrap-guile (%current-system))))
|
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(with-derivation-substitute d c
|
substitute: Honor "substitute-urls" option passed by "untrusted" clients.
* guix/scripts/substitute.scm (or*): New macro.
(%cache-url): Honor "untrusted-substitute-urls".
* guix/tests.scm (%test-substitute-urls): New variable.
(open-connection-for-tests): Use it.
* tests/derivations.scm ("derivation-prerequisites-to-build and substitutes",
"derivation-prerequisites-to-build and substitutes, non-substitutable
build", "derivation-prerequisites-to-build and substitutes, local build"):
Pass it to 'set-build-options'.
* tests/guix-daemon.sh: Likewise.
* tests/store.scm ("substitute query, alternating URLs"): New test.
("substitute query", "substitute", "substitute + build-things with output
path", "substitute, corrupt output hash", "substitute --fallback"): Pass
#:substitute-urls to 'set-build-options'.
2015-07-13 15:46:12 +02:00
|
|
|
|
(set-build-options s #:use-substitutes? #t
|
|
|
|
|
#:substitute-urls (%test-substitute-urls))
|
2015-02-02 12:25:34 +01:00
|
|
|
|
(and (has-substitutes? s o)
|
|
|
|
|
(build-things s (list o)) ;give the output path
|
|
|
|
|
(valid-path? s o)
|
|
|
|
|
(equal? c (call-with-input-file o get-string-all)))))))
|
|
|
|
|
|
2014-03-30 16:01:58 +02:00
|
|
|
|
(test-assert "substitute, corrupt output hash"
|
|
|
|
|
;; Tweak the substituter into installing a substitute whose hash doesn't
|
|
|
|
|
;; match the one announced in the narinfo. The daemon must notice this and
|
|
|
|
|
;; raise an error.
|
2015-02-01 23:16:11 +01:00
|
|
|
|
(with-store s
|
|
|
|
|
(let* ((c "hello, world") ; contents of the output
|
|
|
|
|
(d (build-expression->derivation
|
|
|
|
|
s "corrupt-substitute"
|
|
|
|
|
`(mkdir %output)
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation s %bootstrap-guile (%current-system))))
|
2015-02-02 11:24:24 +01:00
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(with-derivation-substitute d c
|
|
|
|
|
(sha256 => (make-bytevector 32 0)) ;select a hash that doesn't match C
|
|
|
|
|
|
2015-03-25 10:34:27 +01:00
|
|
|
|
;; Make sure we use 'guix substitute'.
|
2015-02-02 11:24:24 +01:00
|
|
|
|
(set-build-options s
|
|
|
|
|
#:use-substitutes? #t
|
substitute: Honor "substitute-urls" option passed by "untrusted" clients.
* guix/scripts/substitute.scm (or*): New macro.
(%cache-url): Honor "untrusted-substitute-urls".
* guix/tests.scm (%test-substitute-urls): New variable.
(open-connection-for-tests): Use it.
* tests/derivations.scm ("derivation-prerequisites-to-build and substitutes",
"derivation-prerequisites-to-build and substitutes, non-substitutable
build", "derivation-prerequisites-to-build and substitutes, local build"):
Pass it to 'set-build-options'.
* tests/guix-daemon.sh: Likewise.
* tests/store.scm ("substitute query, alternating URLs"): New test.
("substitute query", "substitute", "substitute + build-things with output
path", "substitute, corrupt output hash", "substitute --fallback"): Pass
#:substitute-urls to 'set-build-options'.
2015-07-13 15:46:12 +02:00
|
|
|
|
#:fallback? #f
|
|
|
|
|
#:substitute-urls (%test-substitute-urls))
|
2015-02-02 11:24:24 +01:00
|
|
|
|
(and (has-substitutes? s o)
|
|
|
|
|
(guard (c ((nix-protocol-error? c)
|
|
|
|
|
;; XXX: the daemon writes "hash mismatch in downloaded
|
|
|
|
|
;; path", but the actual error returned to the client
|
|
|
|
|
;; doesn't mention that.
|
|
|
|
|
(pk 'corrupt c)
|
|
|
|
|
(not (zero? (nix-protocol-error-status c)))))
|
|
|
|
|
(build-derivations s (list d))
|
|
|
|
|
#f))))))
|
2014-03-30 16:01:58 +02:00
|
|
|
|
|
2013-05-29 23:04:15 +02:00
|
|
|
|
(test-assert "substitute --fallback"
|
2015-02-01 23:16:11 +01:00
|
|
|
|
(with-store s
|
2015-02-02 10:37:23 +01:00
|
|
|
|
(let* ((t (random-text)) ; contents of the output
|
2015-02-01 23:16:11 +01:00
|
|
|
|
(d (build-expression->derivation
|
|
|
|
|
s "substitute-me-not"
|
|
|
|
|
`(call-with-output-file %output
|
|
|
|
|
(lambda (p)
|
|
|
|
|
(display ,t p)))
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation s %bootstrap-guile (%current-system))))
|
2015-02-02 10:37:23 +01:00
|
|
|
|
(o (derivation->output-path d)))
|
2015-03-25 10:34:27 +01:00
|
|
|
|
;; Create fake substituter data, to be read by 'guix substitute'.
|
2015-02-02 10:37:23 +01:00
|
|
|
|
(with-derivation-narinfo d
|
2015-03-25 10:34:27 +01:00
|
|
|
|
;; Make sure we use 'guix substitute'.
|
substitute: Honor "substitute-urls" option passed by "untrusted" clients.
* guix/scripts/substitute.scm (or*): New macro.
(%cache-url): Honor "untrusted-substitute-urls".
* guix/tests.scm (%test-substitute-urls): New variable.
(open-connection-for-tests): Use it.
* tests/derivations.scm ("derivation-prerequisites-to-build and substitutes",
"derivation-prerequisites-to-build and substitutes, non-substitutable
build", "derivation-prerequisites-to-build and substitutes, local build"):
Pass it to 'set-build-options'.
* tests/guix-daemon.sh: Likewise.
* tests/store.scm ("substitute query, alternating URLs"): New test.
("substitute query", "substitute", "substitute + build-things with output
path", "substitute, corrupt output hash", "substitute --fallback"): Pass
#:substitute-urls to 'set-build-options'.
2015-07-13 15:46:12 +02:00
|
|
|
|
(set-build-options s #:use-substitutes? #t
|
|
|
|
|
#:substitute-urls (%test-substitute-urls))
|
2015-02-02 10:37:23 +01:00
|
|
|
|
(and (has-substitutes? s o)
|
|
|
|
|
(guard (c ((nix-protocol-error? c)
|
|
|
|
|
;; The substituter failed as expected. Now make
|
|
|
|
|
;; sure that #:fallback? #t works correctly.
|
|
|
|
|
(set-build-options s
|
|
|
|
|
#:use-substitutes? #t
|
substitute: Honor "substitute-urls" option passed by "untrusted" clients.
* guix/scripts/substitute.scm (or*): New macro.
(%cache-url): Honor "untrusted-substitute-urls".
* guix/tests.scm (%test-substitute-urls): New variable.
(open-connection-for-tests): Use it.
* tests/derivations.scm ("derivation-prerequisites-to-build and substitutes",
"derivation-prerequisites-to-build and substitutes, non-substitutable
build", "derivation-prerequisites-to-build and substitutes, local build"):
Pass it to 'set-build-options'.
* tests/guix-daemon.sh: Likewise.
* tests/store.scm ("substitute query, alternating URLs"): New test.
("substitute query", "substitute", "substitute + build-things with output
path", "substitute, corrupt output hash", "substitute --fallback"): Pass
#:substitute-urls to 'set-build-options'.
2015-07-13 15:46:12 +02:00
|
|
|
|
#:substitute-urls
|
|
|
|
|
(%test-substitute-urls)
|
2015-02-02 10:37:23 +01:00
|
|
|
|
#:fallback? #t)
|
|
|
|
|
(and (build-derivations s (list d))
|
|
|
|
|
(equal? t (call-with-input-file o
|
|
|
|
|
get-string-all)))))
|
|
|
|
|
;; Should fail.
|
|
|
|
|
(build-derivations s (list d))
|
|
|
|
|
#f))))))
|
2013-05-29 23:04:15 +02:00
|
|
|
|
|
2013-12-20 17:17:42 +01:00
|
|
|
|
(test-assert "export/import several paths"
|
|
|
|
|
(let* ((texts (unfold (cut >= <> 10)
|
|
|
|
|
(lambda _ (random-text))
|
|
|
|
|
1+
|
|
|
|
|
0))
|
|
|
|
|
(files (map (cut add-text-to-store %store "text" <>) texts))
|
|
|
|
|
(dump (call-with-bytevector-output-port
|
|
|
|
|
(cut export-paths %store files <>))))
|
|
|
|
|
(delete-paths %store files)
|
|
|
|
|
(and (every (negate file-exists?) files)
|
|
|
|
|
(let* ((source (open-bytevector-input-port dump))
|
|
|
|
|
(imported (import-paths %store source)))
|
|
|
|
|
(and (equal? imported files)
|
|
|
|
|
(every file-exists? files)
|
|
|
|
|
(equal? texts
|
|
|
|
|
(map (lambda (file)
|
|
|
|
|
(call-with-input-file file
|
|
|
|
|
get-string-all))
|
|
|
|
|
files)))))))
|
|
|
|
|
|
2014-02-10 23:30:09 +01:00
|
|
|
|
(test-assert "export/import paths, ensure topological order"
|
2014-03-07 00:18:28 +01:00
|
|
|
|
(let* ((file0 (add-text-to-store %store "baz" (random-text)))
|
|
|
|
|
(file1 (add-text-to-store %store "foo" (random-text)
|
|
|
|
|
(list file0)))
|
2014-02-10 23:30:09 +01:00
|
|
|
|
(file2 (add-text-to-store %store "bar" (random-text)
|
|
|
|
|
(list file1)))
|
|
|
|
|
(files (list file1 file2))
|
|
|
|
|
(dump1 (call-with-bytevector-output-port
|
|
|
|
|
(cute export-paths %store (list file1 file2) <>)))
|
|
|
|
|
(dump2 (call-with-bytevector-output-port
|
|
|
|
|
(cute export-paths %store (list file2 file1) <>))))
|
|
|
|
|
(delete-paths %store files)
|
|
|
|
|
(and (every (negate file-exists?) files)
|
|
|
|
|
(bytevector=? dump1 dump2)
|
|
|
|
|
(let* ((source (open-bytevector-input-port dump1))
|
|
|
|
|
(imported (import-paths %store source)))
|
2014-03-07 00:18:28 +01:00
|
|
|
|
;; DUMP1 should contain exactly FILE1 and FILE2, not FILE0.
|
2014-02-10 23:30:09 +01:00
|
|
|
|
(and (equal? imported (list file1 file2))
|
|
|
|
|
(every file-exists? files)
|
2014-03-07 00:18:28 +01:00
|
|
|
|
(equal? (list file0) (references %store file1))
|
2014-02-10 23:30:09 +01:00
|
|
|
|
(equal? (list file1) (references %store file2)))))))
|
|
|
|
|
|
2015-01-17 15:59:00 +01:00
|
|
|
|
(test-assert "export/import incomplete"
|
|
|
|
|
(let* ((file0 (add-text-to-store %store "baz" (random-text)))
|
|
|
|
|
(file1 (add-text-to-store %store "foo" (random-text)
|
|
|
|
|
(list file0)))
|
|
|
|
|
(file2 (add-text-to-store %store "bar" (random-text)
|
|
|
|
|
(list file1)))
|
|
|
|
|
(dump (call-with-bytevector-output-port
|
|
|
|
|
(cute export-paths %store (list file2) <>))))
|
|
|
|
|
(delete-paths %store (list file0 file1 file2))
|
|
|
|
|
(guard (c ((nix-protocol-error? c)
|
|
|
|
|
(and (not (zero? (nix-protocol-error-status c)))
|
|
|
|
|
(string-contains (nix-protocol-error-message c)
|
|
|
|
|
"not valid"))))
|
|
|
|
|
;; Here we get an exception because DUMP does not include FILE0 and
|
|
|
|
|
;; FILE1, which are dependencies of FILE2.
|
|
|
|
|
(import-paths %store (open-bytevector-input-port dump)))))
|
|
|
|
|
|
|
|
|
|
(test-assert "export/import recursive"
|
|
|
|
|
(let* ((file0 (add-text-to-store %store "baz" (random-text)))
|
|
|
|
|
(file1 (add-text-to-store %store "foo" (random-text)
|
|
|
|
|
(list file0)))
|
|
|
|
|
(file2 (add-text-to-store %store "bar" (random-text)
|
|
|
|
|
(list file1)))
|
|
|
|
|
(dump (call-with-bytevector-output-port
|
|
|
|
|
(cute export-paths %store (list file2) <>
|
|
|
|
|
#:recursive? #t))))
|
|
|
|
|
(delete-paths %store (list file0 file1 file2))
|
|
|
|
|
(let ((imported (import-paths %store (open-bytevector-input-port dump))))
|
|
|
|
|
(and (equal? imported (list file0 file1 file2))
|
|
|
|
|
(every file-exists? (list file0 file1 file2))
|
|
|
|
|
(equal? (list file0) (references %store file1))
|
|
|
|
|
(equal? (list file1) (references %store file2))))))
|
|
|
|
|
|
2015-10-31 22:37:23 +01:00
|
|
|
|
(test-assert "write-file & export-path yield the same result"
|
|
|
|
|
;; Here we compare 'write-file' and the daemon's own implementation.
|
|
|
|
|
;; 'write-file' is the reference because we know it sorts file
|
|
|
|
|
;; deterministically. Conversely, the daemon uses 'readdir' and the entries
|
|
|
|
|
;; currently happen to be sorted as a side-effect of some unrelated
|
|
|
|
|
;; operation (search for 'unhacked' in archive.cc.) Make sure we detect any
|
|
|
|
|
;; changes there.
|
|
|
|
|
(run-with-store %store
|
|
|
|
|
(mlet* %store-monad ((drv1 (package->derivation %bootstrap-guile))
|
|
|
|
|
(out1 -> (derivation->output-path drv1))
|
|
|
|
|
(data -> (unfold (cut >= <> 26)
|
|
|
|
|
(lambda (i)
|
|
|
|
|
(random-bytevector 128))
|
|
|
|
|
1+ 0))
|
|
|
|
|
(build
|
|
|
|
|
-> #~(begin
|
|
|
|
|
(use-modules (rnrs io ports) (srfi srfi-1))
|
|
|
|
|
(let ()
|
|
|
|
|
(define letters
|
|
|
|
|
(map (lambda (i)
|
|
|
|
|
(string
|
|
|
|
|
(integer->char
|
|
|
|
|
(+ i (char->integer #\a)))))
|
|
|
|
|
(iota 26)))
|
|
|
|
|
(define (touch file data)
|
|
|
|
|
(call-with-output-file file
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(put-bytevector port data))))
|
|
|
|
|
|
|
|
|
|
(mkdir #$output)
|
|
|
|
|
(chdir #$output)
|
|
|
|
|
|
|
|
|
|
;; The files must be different so they have
|
|
|
|
|
;; different inode numbers, and the inode
|
|
|
|
|
;; order must differ from the lexicographic
|
|
|
|
|
;; order.
|
|
|
|
|
(for-each touch
|
|
|
|
|
(append (drop letters 10)
|
|
|
|
|
(take letters 10))
|
|
|
|
|
(list #$@data))
|
|
|
|
|
#t)))
|
|
|
|
|
(drv2 (gexp->derivation "bunch" build))
|
|
|
|
|
(out2 -> (derivation->output-path drv2))
|
|
|
|
|
(item-info -> (store-lift query-path-info)))
|
|
|
|
|
(mbegin %store-monad
|
|
|
|
|
(built-derivations (list drv1 drv2))
|
|
|
|
|
(foldm %store-monad
|
|
|
|
|
(lambda (item result)
|
|
|
|
|
(define ref-hash
|
|
|
|
|
(let-values (((port get) (open-sha256-port)))
|
|
|
|
|
(write-file item port)
|
|
|
|
|
(close-port port)
|
|
|
|
|
(get)))
|
|
|
|
|
|
|
|
|
|
;; 'query-path-info' returns a hash produced by using the
|
|
|
|
|
;; daemon's C++ 'dump' function, which is the implementation
|
|
|
|
|
;; under test.
|
|
|
|
|
(>>= (item-info item)
|
|
|
|
|
(lambda (info)
|
|
|
|
|
(return
|
|
|
|
|
(and result
|
|
|
|
|
(bytevector=? (path-info-hash info) ref-hash))))))
|
|
|
|
|
#t
|
|
|
|
|
(list out1 out2))))
|
|
|
|
|
#:guile-for-build (%guile-for-build)))
|
|
|
|
|
|
2013-12-20 17:17:42 +01:00
|
|
|
|
(test-assert "import corrupt path"
|
|
|
|
|
(let* ((text (random-text))
|
|
|
|
|
(file (add-text-to-store %store "text" text))
|
|
|
|
|
(dump (call-with-bytevector-output-port
|
|
|
|
|
(cut export-paths %store (list file) <>))))
|
|
|
|
|
(delete-paths %store (list file))
|
|
|
|
|
|
2017-05-07 00:16:01 +02:00
|
|
|
|
;; Flip a bit in the stream's payload. INDEX here falls in the middle of
|
|
|
|
|
;; the file contents in DUMP, regardless of the store prefix.
|
|
|
|
|
(let* ((index #x70)
|
2013-12-20 17:17:42 +01:00
|
|
|
|
(byte (bytevector-u8-ref dump index)))
|
|
|
|
|
(bytevector-u8-set! dump index (logxor #xff byte)))
|
|
|
|
|
|
|
|
|
|
(and (not (file-exists? file))
|
|
|
|
|
(guard (c ((nix-protocol-error? c)
|
|
|
|
|
(pk 'c c)
|
|
|
|
|
(and (not (zero? (nix-protocol-error-status c)))
|
|
|
|
|
(string-contains (nix-protocol-error-message c)
|
|
|
|
|
"corrupt"))))
|
|
|
|
|
(let* ((source (open-bytevector-input-port dump))
|
|
|
|
|
(imported (import-paths %store source)))
|
|
|
|
|
(pk 'corrupt-imported imported)
|
|
|
|
|
#f)))))
|
|
|
|
|
|
2015-06-06 19:05:25 +02:00
|
|
|
|
(test-assert "verify-store"
|
|
|
|
|
(let* ((text (random-text))
|
|
|
|
|
(file1 (add-text-to-store %store "foo" text))
|
|
|
|
|
(file2 (add-text-to-store %store "bar" (random-text)
|
|
|
|
|
(list file1))))
|
|
|
|
|
(and (pk 'verify1 (verify-store %store)) ;hopefully OK ;
|
|
|
|
|
(begin
|
|
|
|
|
(delete-file file1)
|
|
|
|
|
(not (pk 'verify2 (verify-store %store)))) ;bad! ;
|
|
|
|
|
(begin
|
|
|
|
|
;; Using 'add-text-to-store' here wouldn't work: It would succeed ;
|
|
|
|
|
;; without actually creating the file. ;
|
|
|
|
|
(call-with-output-file file1
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(display text port)))
|
|
|
|
|
(pk 'verify3 (verify-store %store)))))) ;OK again
|
|
|
|
|
|
|
|
|
|
(test-assert "verify-store + check-contents"
|
|
|
|
|
;; XXX: This test is I/O intensive.
|
|
|
|
|
(with-store s
|
|
|
|
|
(let* ((text (random-text))
|
|
|
|
|
(drv (build-expression->derivation
|
|
|
|
|
s "corrupt"
|
|
|
|
|
`(let ((out (assoc-ref %outputs "out")))
|
|
|
|
|
(call-with-output-file out
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(display ,text port)))
|
|
|
|
|
#t)
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation s %bootstrap-guile (%current-system))))
|
|
|
|
|
(file (derivation->output-path drv)))
|
|
|
|
|
(with-derivation-substitute drv text
|
|
|
|
|
(and (build-derivations s (list drv))
|
|
|
|
|
(verify-store s #:check-contents? #t) ;should be OK
|
|
|
|
|
(begin
|
|
|
|
|
(chmod file #o644)
|
|
|
|
|
(call-with-output-file file
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(display "corrupt!" port)))
|
|
|
|
|
#t)
|
|
|
|
|
|
|
|
|
|
;; Make sure the corruption is detected. We don't test repairing
|
|
|
|
|
;; because only "trusted" users are allowed to do it, but we
|
|
|
|
|
;; don't expose that notion of trusted users that nix-daemon
|
|
|
|
|
;; supports because it seems dubious and redundant with what the
|
|
|
|
|
;; OS provides (in Nix "trusted" users have additional
|
|
|
|
|
;; privileges, such as overriding the set of substitute URLs, but
|
|
|
|
|
;; we instead want to allow anyone to modify them, provided
|
|
|
|
|
;; substitutes are signed by a root-approved key.)
|
|
|
|
|
(not (verify-store s #:check-contents? #t))
|
|
|
|
|
|
|
|
|
|
;; Delete the corrupt item to leave the store in a clean state.
|
|
|
|
|
(delete-paths s (list file)))))))
|
|
|
|
|
|
2015-12-03 18:08:35 +01:00
|
|
|
|
(test-assert "build-things, check mode"
|
|
|
|
|
(with-store store
|
|
|
|
|
(call-with-temporary-output-file
|
|
|
|
|
(lambda (entropy entropy-port)
|
|
|
|
|
(write (random-text) entropy-port)
|
|
|
|
|
(force-output entropy-port)
|
|
|
|
|
(let* ((drv (build-expression->derivation
|
|
|
|
|
store "non-deterministic"
|
|
|
|
|
`(begin
|
|
|
|
|
(use-modules (rnrs io ports))
|
|
|
|
|
(let ((out (assoc-ref %outputs "out")))
|
|
|
|
|
(call-with-output-file out
|
|
|
|
|
(lambda (port)
|
2015-12-08 22:58:32 +01:00
|
|
|
|
;; Rely on the fact that tests do not use the
|
|
|
|
|
;; chroot, and thus ENTROPY is readable.
|
2015-12-03 18:08:35 +01:00
|
|
|
|
(display (call-with-input-file ,entropy
|
|
|
|
|
get-string-all)
|
|
|
|
|
port)))
|
|
|
|
|
#t))
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation store %bootstrap-guile (%current-system))))
|
|
|
|
|
(file (derivation->output-path drv)))
|
|
|
|
|
(and (build-things store (list (derivation-file-name drv)))
|
|
|
|
|
(begin
|
|
|
|
|
(write (random-text) entropy-port)
|
|
|
|
|
(force-output entropy-port)
|
|
|
|
|
(guard (c ((nix-protocol-error? c)
|
|
|
|
|
(pk 'determinism-exception c)
|
|
|
|
|
(and (not (zero? (nix-protocol-error-status c)))
|
|
|
|
|
(string-contains (nix-protocol-error-message c)
|
|
|
|
|
"deterministic"))))
|
|
|
|
|
;; This one will produce a different result. Since we're in
|
|
|
|
|
;; 'check' mode, this must fail.
|
|
|
|
|
(build-things store (list (derivation-file-name drv))
|
|
|
|
|
(build-mode check))
|
|
|
|
|
#f))))))))
|
|
|
|
|
|
2015-12-08 22:58:32 +01:00
|
|
|
|
(test-assert "build multiple times"
|
|
|
|
|
(with-store store
|
|
|
|
|
;; Ask to build twice.
|
|
|
|
|
(set-build-options store #:rounds 2 #:use-substitutes? #f)
|
|
|
|
|
|
|
|
|
|
(call-with-temporary-output-file
|
|
|
|
|
(lambda (entropy entropy-port)
|
|
|
|
|
(write (random-text) entropy-port)
|
|
|
|
|
(force-output entropy-port)
|
|
|
|
|
(let* ((drv (build-expression->derivation
|
|
|
|
|
store "non-deterministic"
|
|
|
|
|
`(begin
|
|
|
|
|
(use-modules (rnrs io ports))
|
|
|
|
|
(let ((out (assoc-ref %outputs "out")))
|
|
|
|
|
(call-with-output-file out
|
|
|
|
|
(lambda (port)
|
|
|
|
|
;; Rely on the fact that tests do not use the
|
|
|
|
|
;; chroot, and thus ENTROPY is accessible.
|
|
|
|
|
(display (call-with-input-file ,entropy
|
|
|
|
|
get-string-all)
|
|
|
|
|
port)
|
|
|
|
|
(call-with-output-file ,entropy
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(write 'foobar port)))))
|
|
|
|
|
#t))
|
|
|
|
|
#:guile-for-build
|
|
|
|
|
(package-derivation store %bootstrap-guile (%current-system))))
|
|
|
|
|
(file (derivation->output-path drv)))
|
|
|
|
|
(guard (c ((nix-protocol-error? c)
|
|
|
|
|
(pk 'multiple-build c)
|
|
|
|
|
(and (not (zero? (nix-protocol-error-status c)))
|
|
|
|
|
(string-contains (nix-protocol-error-message c)
|
|
|
|
|
"deterministic"))))
|
|
|
|
|
;; This one will produce a different result on the second run.
|
|
|
|
|
(current-build-output-port (current-error-port))
|
|
|
|
|
(build-things store (list (derivation-file-name drv)))
|
|
|
|
|
#f))))))
|
|
|
|
|
|
2015-01-14 14:25:58 +01:00
|
|
|
|
(test-equal "store-lower"
|
|
|
|
|
"Lowered."
|
|
|
|
|
(let* ((add (store-lower text-file))
|
|
|
|
|
(file (add %store "foo" "Lowered.")))
|
|
|
|
|
(call-with-input-file file get-string-all)))
|
|
|
|
|
|
2016-02-12 18:59:11 +01:00
|
|
|
|
(test-equal "current-system"
|
|
|
|
|
"bar"
|
|
|
|
|
(parameterize ((%current-system "frob"))
|
|
|
|
|
(run-with-store %store
|
|
|
|
|
(mbegin %store-monad
|
|
|
|
|
(set-current-system "bar")
|
|
|
|
|
(current-system))
|
|
|
|
|
#:system "foo")))
|
|
|
|
|
|
2015-03-17 15:19:36 +01:00
|
|
|
|
(test-assert "query-path-info"
|
|
|
|
|
(let* ((ref (add-text-to-store %store "ref" "foo"))
|
|
|
|
|
(item (add-text-to-store %store "item" "bar" (list ref)))
|
|
|
|
|
(info (query-path-info %store item)))
|
|
|
|
|
(and (equal? (path-info-references info) (list ref))
|
|
|
|
|
(equal? (path-info-hash info)
|
|
|
|
|
(sha256
|
|
|
|
|
(string->utf8
|
|
|
|
|
(call-with-output-string (cut write-file item <>))))))))
|
|
|
|
|
|
2016-02-26 23:14:28 +01:00
|
|
|
|
(test-assert "path-info-deriver"
|
|
|
|
|
(let* ((b (add-text-to-store %store "build" "echo $foo > $out" '()))
|
|
|
|
|
(s (add-to-store %store "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(d (derivation %store "the-thing"
|
|
|
|
|
s `("-e" ,b)
|
|
|
|
|
#:env-vars `(("foo" . ,(random-text)))
|
|
|
|
|
#:inputs `((,b) (,s))))
|
|
|
|
|
(o (derivation->output-path d)))
|
|
|
|
|
(and (build-derivations %store (list d))
|
|
|
|
|
(not (path-info-deriver (query-path-info %store b)))
|
|
|
|
|
(string=? (derivation-file-name d)
|
|
|
|
|
(path-info-deriver (query-path-info %store o))))))
|
|
|
|
|
|
2017-01-15 15:13:07 +01:00
|
|
|
|
(test-equal "build-cores"
|
|
|
|
|
(list 0 42)
|
|
|
|
|
(with-store store
|
|
|
|
|
(let* ((build (add-text-to-store store "build.sh"
|
|
|
|
|
"echo $NIX_BUILD_CORES > $out"))
|
|
|
|
|
(bash (add-to-store store "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(drv1 (derivation store "the-thing" bash
|
|
|
|
|
`("-e" ,build)
|
|
|
|
|
#:inputs `((,bash) (,build))
|
|
|
|
|
#:env-vars `(("x" . ,(random-text)))))
|
|
|
|
|
(drv2 (derivation store "the-thing" bash
|
|
|
|
|
`("-e" ,build)
|
|
|
|
|
#:inputs `((,bash) (,build))
|
|
|
|
|
#:env-vars `(("x" . ,(random-text))))))
|
|
|
|
|
(and (build-derivations store (list drv1))
|
|
|
|
|
(begin
|
|
|
|
|
(set-build-options store #:build-cores 42)
|
|
|
|
|
(build-derivations store (list drv2)))
|
|
|
|
|
(list (call-with-input-file (derivation->output-path drv1)
|
|
|
|
|
read)
|
|
|
|
|
(call-with-input-file (derivation->output-path drv2)
|
|
|
|
|
read))))))
|
|
|
|
|
|
2018-10-15 22:40:35 +02:00
|
|
|
|
(test-equal "multiplexed-build-output"
|
|
|
|
|
'("Hello from first." "Hello from second.")
|
|
|
|
|
(with-store store
|
|
|
|
|
(let* ((build (add-text-to-store store "build.sh"
|
|
|
|
|
"echo Hello from $NAME.; echo > $out"))
|
|
|
|
|
(bash (add-to-store store "bash" #t "sha256"
|
|
|
|
|
(search-bootstrap-binary "bash"
|
|
|
|
|
(%current-system))))
|
|
|
|
|
(drv1 (derivation store "one" bash
|
|
|
|
|
`("-e" ,build)
|
|
|
|
|
#:inputs `((,bash) (,build))
|
|
|
|
|
#:env-vars `(("NAME" . "first")
|
|
|
|
|
("x" . ,(random-text)))))
|
|
|
|
|
(drv2 (derivation store "two" bash
|
|
|
|
|
`("-e" ,build)
|
|
|
|
|
#:inputs `((,bash) (,build))
|
|
|
|
|
#:env-vars `(("NAME" . "second")
|
|
|
|
|
("x" . ,(random-text))))))
|
|
|
|
|
(set-build-options store
|
|
|
|
|
#:print-build-trace #t
|
|
|
|
|
#:multiplexed-build-output? #t
|
|
|
|
|
#:max-build-jobs 10)
|
|
|
|
|
(let ((port (open-output-string)))
|
|
|
|
|
;; Send the build log to PORT.
|
|
|
|
|
(parameterize ((current-build-output-port port))
|
|
|
|
|
(build-derivations store (list drv1 drv2)))
|
|
|
|
|
|
|
|
|
|
;; Retrieve the build log; make sure it contains valid "@ build-log"
|
|
|
|
|
;; traces that allow us to retrieve each builder's output (we assume
|
|
|
|
|
;; there's exactly one "build-output" trace for each builder, which is
|
|
|
|
|
;; reasonable.)
|
|
|
|
|
(let* ((log (get-output-string port))
|
|
|
|
|
(started (fold-matches
|
|
|
|
|
(make-regexp "@ build-started ([^ ]+) - ([^ ]+) ([^ ]+) ([0-9]+)")
|
|
|
|
|
log '() cons))
|
|
|
|
|
(done (fold-matches
|
|
|
|
|
(make-regexp "@ build-succeeded (.*) - (.*) (.*) (.*)")
|
|
|
|
|
log '() cons))
|
|
|
|
|
(output (fold-matches
|
|
|
|
|
(make-regexp "@ build-log ([[:digit:]]+) ([[:digit:]]+)\n([A-Za-z .*]+)\n")
|
|
|
|
|
log '() cons))
|
|
|
|
|
(drv-pid (lambda (name)
|
|
|
|
|
(lambda (m)
|
|
|
|
|
(let ((drv (match:substring m 1))
|
|
|
|
|
(pid (string->number
|
|
|
|
|
(match:substring m 4))))
|
|
|
|
|
(and (string-suffix? name drv) pid)))))
|
|
|
|
|
(pid-log (lambda (pid)
|
|
|
|
|
(lambda (m)
|
|
|
|
|
(let ((n (string->number
|
|
|
|
|
(match:substring m 1)))
|
|
|
|
|
(len (string->number
|
|
|
|
|
(match:substring m 2)))
|
|
|
|
|
(str (match:substring m 3)))
|
|
|
|
|
(and (= pid n)
|
|
|
|
|
(= (string-length str) (- len 1))
|
|
|
|
|
str)))))
|
|
|
|
|
(pid1 (any (drv-pid "one.drv") started))
|
|
|
|
|
(pid2 (any (drv-pid "two.drv") started)))
|
|
|
|
|
(list (any (pid-log pid1) output)
|
|
|
|
|
(any (pid-log pid2) output)))))))
|
|
|
|
|
|
2012-12-09 23:52:59 +01:00
|
|
|
|
(test-end "store")
|