guix-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

04/10: guix/store/build-derivations.scm: new module.


From: guix-commits
Subject: 04/10: guix/store/build-derivations.scm: new module.
Date: Sun, 17 Feb 2019 17:37:07 -0500 (EST)

reepca pushed a commit to branch guile-daemon
in repository guix.

commit adbc0ef3a889fc9925166844afa2e7e865abdf2e
Author: Caleb Ristvedt <address@hidden>
Date:   Wed Jan 30 17:10:05 2019 -0600

    guix/store/build-derivations.scm: new module.
    
    * guix/store/build-derivations.scm: new module (note: WIP).
      (get-output-specs, builtin-download, build-directory-name,
      make-build-directory, parse-delimited, build-environment-vars, 
default-/dev,
      format-file, mkdir-new, add-core-files, prepare-build-environment,
      all-transitive-inputs, octal-escaped, current-mounts,
      make-current-mounts-private, touch, bind-mount, add-special-filesystems,
      initialize-loopback, enact-build-environment, super-chroot,
      start-builder-child, inputs-closure, attempt-substitute, 
maybe-use-builtin,
      add-to-trie, make-search-trie, remove-from-trie!, scanning-wrapper-port,
      scan-for-references, do-derivation-build, %build-derivation,
      ensure-input-outputs-exist, build-derivation): new procedures.
      (%default-chroot-dirs, builtins, %temp-directory): new variables.
      (<build-environment>, <trie-node>): new record types.
    
    * guix/build/syscalls.scm: (MS_PRIVATE): new variable.
    
    * guix/store/database.scm:
      (output-path-id-sql, references-sql): new variables.
      (outputs-exist?, file-closure): new procedures.
---
 guix/build/syscalls.scm          |   2 +
 guix/store/build-derivations.scm | 818 +++++++++++++++++++++++++++++++++++++++
 guix/store/database.scm          |  64 ++-
 3 files changed, 883 insertions(+), 1 deletion(-)

diff --git a/guix/build/syscalls.scm b/guix/build/syscalls.scm
index 66d63a2..e3450f3 100644
--- a/guix/build/syscalls.scm
+++ b/guix/build/syscalls.scm
@@ -42,6 +42,7 @@
             MS_BIND
             MS_MOVE
             MS_STRICTATIME
+            MS_PRIVATE
             MNT_FORCE
             MNT_DETACH
             MNT_EXPIRE
@@ -453,6 +454,7 @@ the returned procedure is called."
 (define MS_REMOUNT           32)
 (define MS_BIND            4096)
 (define MS_MOVE            8192)
+(define MS_PRIVATE       262144)
 (define MS_STRICTATIME 16777216)
 
 (define MNT_FORCE       1)
diff --git a/guix/store/build-derivations.scm b/guix/store/build-derivations.scm
new file mode 100644
index 0000000..7b3a4d0
--- /dev/null
+++ b/guix/store/build-derivations.scm
@@ -0,0 +1,818 @@
+;;; GNU Guix --- Functional package management for GNU
+;;; Copyright © 2017 Caleb Ristvedt <address@hidden>
+;;;
+;;; This file is part of GNU Guix.
+;;;
+;;; GNU Guix is free software; you can redistribute it and/or modify it
+;;; under the terms of the GNU General Public License as published by
+;;; the Free Software Foundation; either version 3 of the License, or (at
+;;; your option) any later version.
+;;;
+;;; GNU Guix is distributed in the hope that it will be useful, but
+;;; WITHOUT ANY WARRANTY; without even the implied warranty of
+;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+;;; GNU General Public License for more details.
+;;;
+;;; You should have received a copy of the GNU General Public License
+;;; along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.
+
+;;; For building derivations.
+
+(define-module (guix store build-derivations)
+  #:use-module (guix derivations)
+  #:use-module (guix store)
+  #:use-module (guix store database)
+  #:use-module (guix config)
+  #:use-module (guix build syscalls)
+  #:use-module (ice-9 vlist)
+  #:use-module (ice-9 popen)
+  #:use-module (srfi srfi-1)
+  #:use-module (srfi srfi-9)
+  #:use-module (srfi srfi-26)
+  #:use-module (srfi srfi-11)
+  #:use-module (gcrypt hash)
+  #:use-module (guix serialization)
+  #:use-module ((guix build utils) #:select (delete-file-recursively
+                                             mkdir-p
+                                             copy-recursively))
+  #:use-module (guix build store-copy)
+  #:use-module (ice-9 textual-ports)
+  #:use-module (ice-9 match)
+  #:use-module (rnrs io ports)
+  #:use-module (ice-9 rdelim)
+  #:use-module (ice-9 ftw)
+  #:use-module (ice-9 q)
+  #:use-module (srfi srfi-43)
+  #:use-module (rnrs bytevectors)
+  #:export (build-derivation))
+
+
+(define-record-type <build-environment>
+  (make-build-environment drv chroot-dir build-dir env-vars input-paths)
+  build-environment?
+  (drv        build-environment-derivation) ; <derivation> this is for.
+  (chroot-dir build-chroot-dir)             ; path of chroot directory.
+  (build-dir  build-directory)              ; build dir (outside chroot).
+  (env-vars   build-environment-variables)  ; alist of environment variables.
+  (input-paths build-input-paths))          ; list of paths or pairs of paths.
+
+;;; The derivation building process:
+;;; 1. Build inputs if necessary.
+;;; 2. Make a build directory under TMPDIR or /tmp
+;;; 3. Gather all the inputs, the inputs of the inputs, the inputs of the
+;;; inputs of the inputs, and so on. Copy them to /gnu/store under the build
+;;; directory.
+;;; 4. Gather all the sources and plop them in the build directory
+;;; 5. Make an output directory for the build under /gnu/store in the build
+;;; directory.
+;;; 6. Set all the environment variables listed in the derivation, some of
+;;; which we have to honor ourselves, like "preferLocalBuild",
+;;; "allowSubstitutes", "allowedReferences", "disallowedReferences", and
+;;; "impureEnvVars".
+;;; 7. Run the builder in a chroot where the build directory is the root.
+
+;; Add this to (guix config) later
+(define %temp-directory "/tmp")
+
+
+(define (output-paths drv)
+  "Returns all store output paths produced by DRV."
+  (match (derivation-outputs drv)
+    (((outid . ($ <derivation-output> output-path)) ...)
+     output-path)))
+
+(define (get-output-specs drv possible-references)
+  "Returns a list of <store-info> objects, one for each output of DRV."
+  (map (match-lambda
+         ((outid . ($ <derivation-output> output-path))
+          (let ((references
+                 (scan-for-references output-path
+                                      ;; outputs can reference
+                                      ;; themselves or other outputs of
+                                      ;; the same derivation.
+                                      (append (output-paths drv)
+                                              possible-references))))
+            (store-info output-path (derivation-file-name drv) references))))
+       (derivation-outputs drv)))
+
+(define (builtin-download drv)
+  ((@@ (guix scripts perform-download) perform-download) drv)
+  (get-output-specs drv (all-transitive-inputs drv)))
+
+
+;; if a derivation builder name is in here, it is a builtin. For normal
+;; behavior, make sure everything starts with "builtin:". Also, the procedures
+;; stored in here should take a single argument, the derivation.
+
+(define builtins
+  (let ((builtins-table (make-hash-table 10)))
+    (hash-set! builtins-table
+               "builtin:download"
+               builtin-download)
+    builtins-table))
+
+;; We might want to add to this sometime.
+(define %default-chroot-dirs
+  '())
+
+(define* (build-directory-name drv #:optional
+                               (attempt 0)
+                               (temp-directory %temp-directory))
+  (string-append temp-directory
+                 "/guix-build-"
+                 (store-path-package-name (derivation-file-name drv))
+                 "-"
+                 (number->string attempt)))
+
+(define* (make-build-directory drv #:optional (temp-directory %temp-directory))
+  (let try-again ((attempt-number 0))
+    (catch 'system-error
+      (lambda ()
+        (let ((build-dir (build-directory-name drv
+                                               attempt-number
+                                               temp-directory)))
+          (mkdir build-dir #o0700)
+          build-dir))
+      (lambda args
+        (if (= (system-error-errno args) EEXIST)
+            (try-again (+ attempt-number 1))
+            (throw args))))))
+
+(define* (parse-delimited str #:optional (delimiter #\space))
+  "Returns a list of strings gathered by parsing STR and separating each group
+of characters separated by DELIMITER."
+  (let next ((strings '())
+             (index (string-skip str delimiter 0)))
+    (if index
+        (let ((next-index (string-index str delimiter index)))
+          (if next-index
+              (next (cons (substring str index next-index)
+                          strings)
+                    (string-skip str delimiter next-index))
+              ;; last thing
+              (reverse! (cons (substring str index)
+                              strings))))
+        ;; it's probably expected that this will be parsed
+        ;; left-to-right... which it is, but that means the start of the list
+        ;; has the rightmost thing. So it should be reversed.
+        (reverse! strings))))
+
+
+(define (build-environment-vars drv)
+  "Returns an alist of environment variable / value pairs for every
+environment variable that should be set during the build execution."
+  (let ((leaked-vars (and
+                      (fixed-output-derivation? drv)
+                      (let ((leak-string
+                             (assoc-ref (derivation-builder-environment-vars 
drv)
+                                        "impureEnvVars")))
+                        (and leak-string
+                             (parse-delimited leak-string)))))
+        (in-chroot-build-dir (build-directory-name drv 0 "/tmp")))
+    (append `(("PATH"             .  "/path-not-set")
+              ("HOME"             .  "/homeless-shelter")
+              ("NIX_STORE"        .  ,%store-directory)
+              ;; XXX: make this configurable
+              ("NIX_BUILD_CORES"  .  "1")
+              ("NIX_BUILD_TOP"    .  ,in-chroot-build-dir)
+              ;; why yes that is something like /tmp/guix-build-<drv>-0, yes
+              ;; indeed it does not make much sense to make that the TMPDIR
+              ;; instead of /tmp, and no I do not know why the C++ code does it
+              ;; that way.
+              ("TMPDIR"           .  ,in-chroot-build-dir)
+              ("TEMPDIR"          .  ,in-chroot-build-dir)
+              ("TMP"              .  ,in-chroot-build-dir)
+              ("TEMP"             .  ,in-chroot-build-dir)
+              ("PWD"              .  ,in-chroot-build-dir)
+              ("GUILE_AUTO_COMPILE" . "0"))
+            (if (fixed-output-derivation? drv)
+                '(("NIX_OUTPUT_CHECKED" . "1"))
+                '())
+            (if leaked-vars
+                (map (lambda (leaked-var)
+                       (cons leaked-var (getenv leaked-var)))
+                     leaked-vars)
+                '())
+            (map (match-lambda
+                   ((outid . output)
+                    (cons outid (derivation-output-path output))))
+                 (derivation-outputs drv))
+            (derivation-builder-environment-vars drv))))
+
+(define (default-/dev chroot-dir)
+  "Sets up the default /dev environment in CHROOT-DIR and returns the
+files/directories from the host /dev that should be in the chroot."
+  (define (in-chroot file-name)
+    (string-append chroot-dir file-name))
+  (mkdir (in-chroot "/dev"))
+  (symlink "/proc/self/fd" (in-chroot "/dev/fd"))
+  (symlink "/proc/self/fd/0" (in-chroot "/dev/stdin"))
+  (symlink "/proc/self/fd/1" (in-chroot "/dev/stdout"))
+  (symlink "/proc/self/fd/2" (in-chroot "/dev/stderr"))
+  (append '("/dev/full"
+            "/dev/null"
+            "/dev/random"
+            "/dev/tty"
+            "/dev/urandom"
+            "/dev/zero")
+          (if (file-exists? "/dev/kvm")
+              '("/dev/kvm")
+              '())))
+
+;; yes, there is most likely already something that does this.
+(define (format-file file-name . args)
+  (call-with-output-file file-name
+    (lambda (port)
+      (apply simple-format port args))))
+
+(define* (mkdir-new dir-name #:optional mode)
+  (when (file-exists? dir-name)
+    (delete-file-recursively dir-name))
+  (if mode
+      (mkdir dir-name mode)
+      (mkdir dir-name)))
+
+(define (add-core-files chroot-dir drv)
+  "Creates core files that will not vary when the derivation is constant. That
+is, whether these files are present or not is influenced solely by the
+derivation itself."
+  (define (in-chroot file-name)
+    (string-append chroot-dir file-name))
+  
+  (mkdir-new chroot-dir #o0750)
+  (mkdir-p (in-chroot %store-directory))
+  (chmod (in-chroot %store-directory) #o1775)
+  (mkdir (in-chroot "/tmp") #o1777)
+  (mkdir (in-chroot "/etc"))
+
+  ;; The output can be a file or a directory (!) so let the builder pick
+  ;; whatever it wants and then just copy the thing to the real store after.
+  ;; (for-each (lambda (output-pair)
+  ;;             (mkdir-new (derivation-output-path (cdr output-pair))))
+  ;;           (derivation-outputs drv))
+  (format-file (in-chroot "/etc/passwd")
+               (string-append "nixblkd:x:~a:~a:Nix build user:/:/noshell~%"
+                              "nobody:x:65535:65534:Nobody:/:/noshell~%")
+               (getuid)
+               (getgid))
+  (format-file (in-chroot "/etc/group")
+               "nixbld:!:~a:~%"
+               (getgid))
+  (unless (fixed-output-derivation? drv)
+    (format-file (in-chroot "/etc/hosts")
+                 "127.0.0.1 localhost~%")))
+
+(define* (prepare-build-environment drv #:key
+                                    build-chroot-dirs 
+                                    (extra-chroot-dirs '()))
+  "Creates a <build-environment> for the derivation DRV. BUILD-CHROOT-DIRS
+will override the default chroot directories, EXTRA-CHROOT-DIRS will
+not. Those two arguments should be lists of either file names or pairs of file
+names of the form (outside . inside). Returns the <build-environment> and a
+list of all the files to be added from the store (useful for scanning for
+references to them)."
+  (let* ((build-dir (make-build-directory drv))
+         (build-chroot (string-append (derivation-file-name drv) ".chroot"))
+         (env-vars (build-environment-vars drv))
+         (additional-files (append (or build-chroot-dirs
+                                       %default-chroot-dirs)
+                                   extra-chroot-dirs
+                                   (if (fixed-output-derivation? drv)
+                                       '("/etc/resolv.conf"
+                                         "/etc/nsswitch.conf"
+                                         "/etc/services"
+                                         "/etc/hosts")
+                                       '())))
+         (inputs-from-store (all-transitive-inputs drv)))
+    (define (in-chroot file)
+      (string-append build-chroot file))
+    ;; 4. Honor "environment variables" passed through the derivation.
+    ;;    these include "impureEnvVars", "exportReferencesGraph",
+    ;;    "build-chroot-dirs", "build-extra-chroot-dirs", "preferLocalBuild"
+    
+    (add-core-files build-chroot drv)
+    (values
+     (make-build-environment drv build-chroot build-dir env-vars
+                             `(,@(if (member "/dev" additional-files)
+                                     '()
+                                     (default-/dev build-chroot))
+                               ,(cons build-dir
+                                      (build-directory-name drv 0 "/tmp"))
+                               ,@inputs-from-store
+                               ,@(derivation-sources drv)
+                               ,@additional-files))
+     inputs-from-store)))
+
+(define (all-transitive-inputs drv)
+  "Produces a list of all inputs and all of their references."
+  (let ((input-paths (inputs-closure drv)))
+    (vhash-fold (lambda (key val prev)
+                  (cons key prev))
+                input-paths
+                (fold (lambda (input list-so-far)
+                        (file-closure input #:list-so-far list-so-far))
+                      vlist-null
+                      ;; include the derivation's references as well
+                      (cons (derivation-file-name drv)
+                            input-paths)))))
+
+;; Sigh... I just HAD to go and ask "what if there are spaces in the mountinfo
+;; entries"... I couldn't find the behavior documented anywhere, but
+;; experimentally it appears to be octal-escaped.
+(define (octal-escaped str)
+  "Converts octal escapes of the form \\abc to the corresponding character
+code points."
+  (define (octal-triplet->char octet1 octet2 octet3) 
+    ;; I'm using "octet" here like I would normally use "digit".
+    (integer->char (string->number (string octet1 octet2 octet3)
+                                   8)))
+
+  (let next-char ((result-list '())
+                  (to-convert (string->list str)))
+    (match to-convert
+      ((#\\ octet1 octet2 octet3 . others)
+       (next-char (cons (octal-triplet->char octet1 octet2 octet3)
+                        result-list)
+                  others))
+      ((char . others)
+       (next-char (cons char result-list)
+                  others))
+      (()
+       (list->string (reverse! result-list))))))
+
+(define (current-mounts)
+  "Returns a list of mounts obtained by reading /proc/self/mountinfo"
+  (call-with-input-file "/proc/self/mountinfo"
+    (lambda (mountinfo)
+      (let next-mount ((mounts '()))
+        (if (port-eof? mountinfo)
+            mounts
+            (next-mount (cons (octal-escaped
+                               (list-ref (parse-delimited
+                                          (read-line mountinfo))
+                                         4))
+                              mounts)))))))
+
+(define (make-current-mounts-private)
+  "Makes all mounts in the current process's namespace be of MS_PRIVATE
+propagation type."
+  (for-each (lambda (some-mount)
+              (mount "none" some-mount "none" MS_PRIVATE))
+            (current-mounts)))
+
+
+(define (touch file)
+  (call-with-output-file file noop))
+
+(define (bind-mount from to)
+  (unless (file-exists? to)
+    (if (file-is-directory? from)
+        (mkdir-p to)
+        (touch to)))
+  (mount from to "none" MS_BIND))
+
+(define (add-special-filesystems environment)
+  (define (in-chroot file)
+    (string-append (build-chroot-dir environment) file))
+  
+  (when (file-exists? "/dev/shm")
+    (mkdir-p (in-chroot "/dev/shm"))
+    (mount "none" (in-chroot "/dev/shm") "tmpfs"))
+  
+  (mkdir-p (in-chroot "/proc"))
+  (mount "none" (in-chroot "/proc") "proc")
+
+  ;; Indicates CONFIG_DEVPTS_MULTIPLE_INSTANCES=y in the kernel.
+  (when (and (file-exists? "/dev/pts/ptmx")
+             (not (file-exists?
+                   (in-chroot "/dev/ptmx")))
+             (not (member "/dev/pts"
+                          (build-input-paths environment))))
+    (mkdir-p (in-chroot "/dev/pts"))
+    (mount "none" (in-chroot "/dev/pts") "devpts"
+           0 "newinstance,mode=0620")
+    (symlink "/dev/pts/ptmx" (in-chroot "/dev/ptmx"))
+    (chmod (in-chroot "/dev/pts/ptmx") #o0666)))
+
+(define (initialize-loopback)
+  ;; XXX: Implement this. I couldn't find anything in the manual about ioctl,
+  ;; which we need to use, soo...
+  ;; (let ((sock (socket PF_INET SOCK_DGRAM IPPROTO_IP)))
+  ;;   )
+  #f)
+
+(define (enact-build-environment build-environment)
+  "Makes the <build-environment> BUILD-ENVIRONMENT current by setting the
+environment variables and bind-mounting the listed files. Importantly, this
+assumes that it is in a separate namespace at this point."
+  ;; warning: the order in which a lot of this happens is significant and
+  ;; partially based on guesswork / copying what the c++ does.
+  (define (in-chroot file-name)
+    (string-append (build-chroot-dir build-environment)
+                   file-name))
+  ;; local communication within the build environment should still be
+  ;; possible.
+  (initialize-loopback)
+  (make-current-mounts-private)
+  ;; "new_root and put_old must not be on the same filesystem as the current
+  ;; root" - man pivot_root(2). This has to happen before special filesystems
+  ;; are added.
+  (bind-mount (build-chroot-dir build-environment)
+              (build-chroot-dir build-environment))
+  (environ (map (lambda (env-pair)
+                  (string-append (car env-pair) "=" (cdr env-pair)))
+                (build-environment-variables build-environment)))
+  (for-each (match-lambda
+              ((outside . inside)
+               (bind-mount outside
+                           (in-chroot inside)))
+              (file
+               (bind-mount file
+                           (in-chroot file))))
+            (build-input-paths build-environment))
+  (add-special-filesystems build-environment))
+
+(define (super-chroot new-root)
+  "Whereas a normal chroot makes everything outside a directory invisible,
+this makes it not exist at all! Namespace-local, be careful. If more than one
+process is in this namespace, weird stuff might happen."
+  (let ((real-root (string-append new-root "/real-root")))
+    (mkdir real-root)
+    (pivot-root new-root real-root)
+    (chdir "/")
+    (umount "real-root" MNT_DETACH)
+    (rmdir "real-root")))
+
+(define (start-builder-child environment)
+  "Clones the process and sets the child to work building the build described
+by the <build-environment> ENVIRONMENT in a new namespace of many sorts."
+  (let* ((drv (build-environment-derivation environment))
+         (ret (clone (logior CLONE_NEWPID
+                             CLONE_NEWNS
+                             CLONE_NEWIPC
+                             CLONE_NEWUTS
+                             (if (fixed-output-derivation? drv)
+                                 0
+                                        ;CLONE_NEWNET
+                                 0
+                                 )
+                             SIGCHLD))))
+    (if (= ret 0)
+        (catch
+          #t
+          (lambda ()
+            (enact-build-environment environment)
+            (super-chroot (build-chroot-dir environment))
+            ;; DROP PRIVILEGES HERE
+            (chdir (build-directory-name drv 0 "/tmp"))
+            (format #t "command line: ~a~%"
+                    (cons (derivation-builder drv)
+                          (derivation-builder-arguments drv)))
+            (if (zero? (status:exit-val
+                        (apply execl
+                               (derivation-builder drv)
+                               (basename (derivation-builder drv))
+                               (derivation-builder-arguments drv))))
+                (quit 0)
+                (throw 'build-failed-but-lets-debug)))
+          (lambda (type . args)
+            (format #t "Something went wrong in the child...~%")
+            (display type)
+            (display args)
+            (format #t "Here was the top-level directory:~a~%" (scandir "/"))
+            (apply throw type args)
+            (quit)))
+        (status:exit-val (cdr (waitpid ret))))))
+
+;; I want to be able to test if a derivation's outputs exist without reading
+;; it in. The database makes this possible. But we can't figure out WHICH
+;; outputs it even has without reading it in. For most of the derivations, we
+;; don't need to know which outputs it has, as long as we know the outputs we
+;; want. Okay, okay, new plan: build-derivation takes a <derivation>, but
+;; ensure-input-outputs-exist takes <derivation-input>
+;; objects. build-derivation is only called when we know it needs to be built
+
+(define (inputs-closure drv)
+  "Given a <derivation> DRV, finds all store paths needed to build it."
+  (fold (lambda (input prev)
+          (fold (lambda (output outputs-list)
+                  (cons output outputs-list))
+                prev
+                (derivation-input-output-paths input)))
+        '()
+        (derivation-prerequisites drv)))
+
+(define (attempt-substitute drv)
+  #f)
+
+(define (maybe-use-builtin drv)
+  "Uses a builtin builder to build DRV if it exists. Returns #f if there is no
+builtin builder for DRV or it failed."
+  (let ((builder (hash-ref builtins
+                           (derivation-builder drv))))
+    (if builder
+        (builder drv)
+        #f)))
+
+
+
+(define-record-type <trie-node>
+  (make-trie-node table string-exists?)
+  trie-node?
+  ;; TODO implement skip values. Probably not as big a speed gain as you think
+  ;; it is, since this is I/O-bound.
+  ;; (skip-value node-skip-value set-skip-value!)
+  (table node-table set-node-table!)
+  ;; Technically speaking, it's possible for both CAT and CATTLE to be in a
+  ;; trie at once. Of course, for our purposes, this is 
+  (string-exists? node-string-exists? set-string-exists?!))
+
+(define* (add-to-trie trie string #:optional (new-tables-size 2))
+  "Adds STR to TRIE."
+  (let ((str (string->utf8 string)))
+    (let next-node ((position 0)
+                    (current-node trie))
+      (if (= position (bytevector-length str))
+          ;; this is it. This is where we need to register that this string is
+          ;; present.
+          (set-string-exists?! current-node #t)
+          (let* ((current-table (node-table current-node))
+                 (node (hash-ref current-table
+                                 (bytevector-u8-ref str position))))
+            (if node
+                (next-node (1+ position)
+                           node)
+                (let ((new-node (make-trie-node (make-hash-table 
new-tables-size)
+                                                #f)))
+                  (hash-set! current-table
+                             (bytevector-u8-ref str position)
+                             new-node)
+                  (next-node (1+ position)
+                             new-node))))))))
+
+(define (make-search-trie strings)
+  ;; TODO: make the first few trie levels non-sparse tables to avoid hashing
+  ;; overhead. 
+  (let ((root (make-trie-node (make-hash-table) #f)))
+    (for-each (cut add-to-trie root <>)
+              strings)
+    root))
+
+
+(define (remove-from-trie! trie sequence)
+  "Removes SEQUENCE from TRIE. This means that any nodes that are only in the
+path of SEQUENCE are removed. It's an error to use this with a sequence not
+already in TRIE."
+  ;; Hm. Looks like we'll have to recurse all the way down, find where it
+  ;; ends, then stop at the first thing on the way back up that has anything
+  ;; with the same prefix. Or I could do this the right way with an explicit
+  ;; stack. Hm...
+  
+  (define (node-stack)
+    (let next ((nodes '())
+               (i 0)
+               (current-node trie))
+      (if (= (bytevector-length sequence) i)
+          (begin
+            ;; it's possible that even though this is the last node of this
+            ;; sequence it can't be deleted. So mark it as not denoting a
+            ;; string.
+            (set-string-exists?! current-node #f)
+            (cons current-node nodes))
+          (let ((next-node (hash-ref (node-table current-node)
+                                     (bytevector-u8-ref sequence i))))
+            (next (cons current-node nodes)
+                  (1+ i)
+                  next-node)))))
+
+  (let maybe-delete ((visited-nodes (node-stack))
+                     (i (1- (bytevector-length sequence))))
+    (match visited-nodes
+      ((current parent others ...)
+       (when (<= (hash-count (const #t)
+                             (node-table current))
+                 1)
+
+         (hash-remove! (node-table parent)
+                       (bytevector-u8-ref sequence i))
+         (maybe-delete (cdr visited-nodes)
+                       (1- i))))
+      ((current)
+       #f))))
+
+(define (scanning-wrapper-port output-port strings)
+  "Creates a wrapper port which passes through bytes to OUTPUT-PORT and
+returns it as well as a procedure which, when called, returns a list of all
+references out of the possibilities enumerated in STRINGS that were
+detected."
+  ;; Not sure if I should be using custom ports or soft ports...
+  (let* ((lookback-size (apply max (map string-length strings)))
+         (smallest-length (apply min (map string-length strings)))
+         (lookback-buffer (make-bytevector lookback-size))
+         (search-trie (make-search-trie strings))
+         (buffer-pos 0)
+         (references '()))
+    
+    (values
+     (make-custom-binary-output-port
+      "scanning-wrapper"
+      ;; write
+      (lambda (bytes offset count)
+        (define (in-lookback? n)
+          (< n buffer-pos))
+        ;; the "virtual" stuff provides a convenient interface that makes it
+        ;; look like we magically remember the end of the previous buffer.
+        (define (virtual-ref n)
+          (if (in-lookback? n)
+              (bytevector-u8-ref lookback-buffer n)
+              (bytevector-u8-ref bytes (- (+ offset n)
+                                          buffer-pos))))
+        
+
+        (let ((total-length (+ buffer-pos count)))
+          
+          (define (virtual-copy! start end target)
+            (let* ((copy-size (- end start))
+                   (new-bytevector (make-bytevector copy-size)))
+              (let copy-next ((i 0))
+                (unless (= i copy-size)
+                  (bytevector-u8-set! new-bytevector
+                                      i
+                                      (virtual-ref (+ start i)))
+                  (copy-next (1+ i))))
+              new-bytevector))
+
+          ;; the gritty reality of that magic
+          (define (remember-end)
+            (let* ((copy-amount (min total-length
+                                     lookback-size))
+                   (start (- total-length copy-amount))
+                   (end total-length))
+              (virtual-copy! start end lookback-buffer)
+              (set! buffer-pos copy-amount)))
+          
+          (define (attempt-match n trie)
+            (let test-position ((i n)
+                                (current-node trie))
+              (if (node-string-exists? current-node)
+                  ;; MATCH
+                  (begin
+                    (format #t "Start:~a End: ~a~%" n i)
+                    (virtual-copy! n i (make-bytevector (- i n))))
+                  (if (>= i total-length)
+                      #f
+                      (let ((next-node (hash-ref (node-table current-node)
+                                                 (virtual-ref i))))
+                        (if next-node
+                            (test-position (1+ i)
+                                           next-node)
+                            #f))))))
+          
+          (define (scan)
+            (let next-char ((i 0))
+              (when (< i (- total-length smallest-length))
+                (let ((match-result (attempt-match i search-trie)))
+                  (if match-result
+                      (begin
+                        (set! references
+                          (cons (utf8->string match-result)
+                                references))
+                        ;; We're not interested in multiple references, it'd
+                        ;; just slow us down.
+                        (remove-from-trie! search-trie match-result)
+                        (next-char (+ i (bytevector-length match-result))))
+                      (next-char (1+ i)))))))
+          (scan)
+          (remember-end)
+          (put-bytevector output-port bytes offset count)
+          count))
+      #f ;; get-position
+      #f ;; set-position
+      (lambda ()
+        (close-port output-port)))
+     (lambda ()
+       references))))
+
+
+;; There are two main approaches we can use here: we can look for the entire
+;; store path of the form "/gnu/store/hashpart-name", which will yield no
+;; false positives and likely be faster due to being more quickly able to rule
+;; out sequences, and we can look for just hashpart, which will be faster to
+;; lookup and may both increase false positives and decrease false negatives
+;; as stuff that gets split up will likely still have the hash part all
+;; together, but adds a chance that 32 random base-32 characters could cause a
+;; false positive, but the chances of that are extremely slim, and an
+;; adversary couldn't really use that.
+(define (scan-for-references file possibilities)
+  "Scans for literal references in FILE as long as they happen to be in
+POSSIBILITIES. Returns the list of references found, the sha256 hash of the
+nar, and the length of the nar."
+  (let*-values (((scanning-port get-references)
+                 (scanning-wrapper-port (%make-void-port "w") possibilities)))
+    (write-file file scanning-port)
+    (force-output scanning-port)
+    (get-references)))
+
+;; every method of getting a derivation's outputs in the store needs to
+;; provide 3 pieces of metadata: the size of the nar, the references of each
+;; output, and the hash of each output. We happen to have ways of getting all
+;; of those as long as we know which references to be looking for.
+(define (topologically-sorted store-infos)
+  "Returns STORE-INFOS in topological order or throws CYCLE-DETECTED if no
+such order exists."
+  (define path->store-info
+    (let loop ((infos store-infos)
+               (mapping vlist-null))
+      (match infos
+        ((($ (@@ (guix build store-copy) <store-info>)
+             item deriver references) . tail)
+         (loop tail (vhash-cons item (car infos) mapping)))
+        (()
+         (lambda (path)
+           (let ((pair (vhash-assoc path mapping)))
+             (and pair
+                  (cdr pair))))))))
+
+  (define (references-of store-info)
+    ;; We need to pretend that self-references don't exist...
+    (fold (lambda (current prev)
+            (let ((info (path->store-info current)))
+              (or (and (not (equal? info store-info))
+                       info
+                       (cons info prev))
+                  prev)))
+          '()
+          (store-info-references store-info)))
+
+  (reverse
+   (let visit ((infos store-infos)
+               (visited (set))
+               (dependents (set))
+               (result '()))
+     (match infos
+       ((head . tail)
+        (if (set-contains? visited head)
+            (if (set-contains? dependents head)
+                (throw 'cycle-detected head)
+                (visit tail visited dependents result))
+            (call-with-values
+                (lambda ()
+                  (visit (references-of head)
+                         (set-insert head visited)
+                         (set-insert head dependents)
+                         result))
+              (lambda (result visited)
+                (visit tail
+                       visited
+                       dependents
+                       (cons head result))))))
+       (()
+        (values result visited))))))
+
+(define (do-derivation-build drv)
+  (ensure-input-outputs-exist (derivation-inputs drv))
+  (format #t "Starting build of derivation ~a~%~%" drv)
+  ;; inputs should all exist as of now
+  (let-values (((build-env store-inputs) (prepare-build-environment drv)))
+    (define (in-chroot file)
+      (string-append (build-chroot-dir build-env) file))
+    
+    (if (zero? (start-builder-child build-env))
+        (begin
+          (for-each (match-lambda
+                      ((outid . ($ <derivation-output> output-path))
+                       (copy-recursively (in-chroot output-path)
+                                         output-path)))
+                    (derivation-outputs drv))
+          (get-output-specs drv store-inputs))
+        #f)))
+
+(define (%build-derivation drv) 
+  "Given a <derivation> DRV, builds/substitutes the derivation unconditionally
+even if its outputs already exist."
+  (let ((output-specs
+         (or (attempt-substitute drv)
+             (maybe-use-builtin drv)
+             (do-derivation-build drv))))
+    (if output-specs
+        (register-items (topologically-sorted output-specs))
+        (throw 'derivation-build-failed drv))))
+
+(define (ensure-input-outputs-exist inputs)
+  (for-each
+   (lambda (input)
+     (let ((input-drv-path (derivation-input-path input)))
+       (unless (outputs-exist? input-drv-path
+                               (derivation-input-sub-derivations input))
+         (%build-derivation (read-derivation-from-file input-drv-path)))))
+   inputs))
+
+(define* (build-derivation drv #:optional (outputs (derivation-output-names 
drv)))
+  "Given a <derivation> DRV with desired outputs OUTPUTS, builds DRV if the
+outputs don't already exist."
+  (unless (outputs-exist? (derivation-file-name drv)
+                          outputs)
+    (%build-derivation drv)))
+
+
+
diff --git a/guix/store/database.scm b/guix/store/database.scm
index b89d81d..56aa938 100644
--- a/guix/store/database.scm
+++ b/guix/store/database.scm
@@ -36,6 +36,7 @@
   #:use-module (srfi srfi-26)
   #:use-module (rnrs io ports)
   #:use-module (ice-9 match)
+  #:use-module (ice-9 vlist)
   #:use-module (system foreign)
   #:export (sql-schema
             %default-database-file
@@ -46,7 +47,9 @@
             register-items
             registered-derivation-outputs
             %epoch
-            reset-timestamps))
+            reset-timestamps
+            outputs-exist?
+            file-closure))
 
 ;;; Code for working with the store database directly.
 
@@ -403,3 +406,62 @@ it')."
                               (register db item)
                               (report))
                             items)))))))))
+
+(define output-path-id-sql
+  "SELECT id FROM ValidPaths WHERE path IN (SELECT path FROM DerivationOutputs
+WHERE DerivationOutputs.id = :id AND drv IN (SELECT id FROM ValidPaths WHERE
+path = :drvpath))")
+;; "SELECT id FROM ValidPaths WHERE ValidPaths.path IN (SELECT path FROM
+;; DerivationOutputs WHERE $drvpath IN (SELECT path FROM ValidPaths WHERE
+;; ValidPaths.id = DerivationOutputs.drv) AND id = $id)"
+
+
+(define* (outputs-exist? drv-path outputs
+                         #:optional (database %default-database-file))
+  "Determines whether all output labels in OUTPUTS exist as built outputs of
+DRV-PATH."
+  (with-database database db
+    (let ((stmt (sqlite-prepare db output-path-id-sql)))
+      (sqlite-bind-arguments stmt #:drvpath drv-path)
+      (let ((result (every (lambda (out-id)
+                             (sqlite-reset stmt)
+                             (sqlite-bind-arguments stmt #:id out-id)
+                             (sqlite-step stmt))
+                           outputs)))
+        (sqlite-finalize stmt)
+        result))))
+
+(define references-sql
+  "SELECT path FROM ValidPaths WHERE id IN (SELECT reference FROM Refs WHERE
+referrer IN (SELECT id FROM ValidPaths WHERE path = :path))")
+
+(define* (file-closure path #:key
+                       (database %default-database-file)
+                       (list-so-far vlist-null))
+  "Returns a vlist containing the store paths referenced by PATH, the store
+paths referenced by those paths, and so on."
+  (with-database database db
+    (let ((get-references (sqlite-prepare db references-sql)))
+      ;; to make it possible to go depth-first we need to get all the
+      ;; references of an item first or we'll have re-entrancy issues with
+      ;; the get-references statement.
+      (define (references-of path)
+        ;; There are no problems with resetting an already-reset
+        ;; statement.
+        (sqlite-reset get-references)
+        (sqlite-bind-arguments get-references #:path path)
+        (sqlite-fold (lambda (row prev)
+                       (cons (vector-ref row 0) prev))
+                     '()
+                     get-references))
+
+      (let ((result
+             (let %file-closure ((path path)
+                                 (references-vlist list-so-far))
+               (if (vhash-assoc path references-vlist)
+                   references-vlist
+                   (fold %file-closure
+                         (vhash-cons path #t references-vlist)
+                         (references-of path))))))
+        (sqlite-finalize get-references)
+        result))))



reply via email to

[Prev in Thread] Current Thread [Next in Thread]