1
1
Fork 0
mirror of https://github.com/NixOS/nix.git synced 2025-11-09 12:06:01 +01:00

Create a second Store::getFSAccessor for a single store object

This is sometimes easier / more performant to implement, and
independently it is also a more convenient interface for many callers.

The existing store-wide `getFSAccessor` is only used for

 - `nix why-depends`
 - the evaluator

I hope we can get rid of it for those, too, and then we have the option
of getting rid of the store-wide method.

Co-authored-by: Sergei Zimmerman <sergei@zimmerman.foo>
This commit is contained in:
John Ericson 2025-09-22 14:49:29 -04:00
parent 0175f7e836
commit a97d6d89d8
26 changed files with 125 additions and 57 deletions

View file

@ -3,7 +3,6 @@
#include "nix/util/source-path.hh" #include "nix/util/source-path.hh"
#include "nix/fetchers/fetch-to-store.hh" #include "nix/fetchers/fetch-to-store.hh"
#include "nix/util/json-utils.hh" #include "nix/util/json-utils.hh"
#include "nix/fetchers/store-path-accessor.hh"
#include "nix/fetchers/fetch-settings.hh" #include "nix/fetchers/fetch-settings.hh"
#include <nlohmann/json.hpp> #include <nlohmann/json.hpp>
@ -332,7 +331,8 @@ std::pair<ref<SourceAccessor>, Input> Input::getAccessorUnchecked(ref<Store> sto
debug("using substituted/cached input '%s' in '%s'", to_string(), store->printStorePath(storePath)); debug("using substituted/cached input '%s' in '%s'", to_string(), store->printStorePath(storePath));
auto accessor = makeStorePathAccessor(store, storePath); // We just ensured the store object was there
auto accessor = ref{store->getFSAccessor(storePath)};
accessor->fingerprint = getFingerprint(store); accessor->fingerprint = getFingerprint(store);

View file

@ -398,9 +398,8 @@ struct GitHubInputScheme : GitArchiveInputScheme
Headers headers = makeHeadersWithAuthTokens(*input.settings, host, input); Headers headers = makeHeadersWithAuthTokens(*input.settings, host, input);
auto accessor = store->getFSAccessor();
auto downloadResult = downloadFile(store, *input.settings, url, "source", headers); auto downloadResult = downloadFile(store, *input.settings, url, "source", headers);
auto json = nlohmann::json::parse(accessor->readFile(CanonPath(downloadResult.storePath.to_string()))); auto json = nlohmann::json::parse(store->getFSAccessor(downloadResult.storePath)->readFile(CanonPath::root));
return RefInfo{ return RefInfo{
.rev = Hash::parseAny(std::string{json["sha"]}, HashAlgorithm::SHA1), .rev = Hash::parseAny(std::string{json["sha"]}, HashAlgorithm::SHA1),
@ -473,9 +472,8 @@ struct GitLabInputScheme : GitArchiveInputScheme
Headers headers = makeHeadersWithAuthTokens(*input.settings, host, input); Headers headers = makeHeadersWithAuthTokens(*input.settings, host, input);
auto accessor = store->getFSAccessor();
auto downloadResult = downloadFile(store, *input.settings, url, "source", headers); auto downloadResult = downloadFile(store, *input.settings, url, "source", headers);
auto json = nlohmann::json::parse(accessor->readFile(CanonPath(downloadResult.storePath.to_string()))); auto json = nlohmann::json::parse(store->getFSAccessor(downloadResult.storePath)->readFile(CanonPath::root));
if (json.is_array() && json.size() >= 1 && json[0]["id"] != nullptr) { if (json.is_array() && json.size() >= 1 && json[0]["id"] != nullptr) {
return RefInfo{.rev = Hash::parseAny(std::string(json[0]["id"]), HashAlgorithm::SHA1)}; return RefInfo{.rev = Hash::parseAny(std::string(json[0]["id"]), HashAlgorithm::SHA1)};

View file

@ -11,6 +11,5 @@ headers = files(
'git-utils.hh', 'git-utils.hh',
'input-cache.hh', 'input-cache.hh',
'registry.hh', 'registry.hh',
'store-path-accessor.hh',
'tarball.hh', 'tarball.hh',
) )

View file

@ -1,14 +0,0 @@
#pragma once
#include "nix/util/source-path.hh"
namespace nix {
class StorePath;
class Store;
ref<SourceAccessor> makeStorePathAccessor(ref<Store> store, const StorePath & storePath);
SourcePath getUnfilteredRootPath(CanonPath path);
} // namespace nix

View file

@ -6,7 +6,6 @@
#include "nix/util/tarfile.hh" #include "nix/util/tarfile.hh"
#include "nix/store/store-api.hh" #include "nix/store/store-api.hh"
#include "nix/util/url-parts.hh" #include "nix/util/url-parts.hh"
#include "nix/fetchers/store-path-accessor.hh"
#include "nix/fetchers/fetch-settings.hh" #include "nix/fetchers/fetch-settings.hh"
#include <sys/time.h> #include <sys/time.h>
@ -331,7 +330,8 @@ struct MercurialInputScheme : InputScheme
auto storePath = fetchToStore(store, input); auto storePath = fetchToStore(store, input);
auto accessor = makeStorePathAccessor(store, storePath); // We just added it, it should be there.
auto accessor = ref{store->getFSAccessor(storePath)};
accessor->setPathDisplay("«" + input.to_string() + "»"); accessor->setPathDisplay("«" + input.to_string() + "»");

View file

@ -50,7 +50,6 @@ sources = files(
'mercurial.cc', 'mercurial.cc',
'path.cc', 'path.cc',
'registry.cc', 'registry.cc',
'store-path-accessor.cc',
'tarball.cc', 'tarball.cc',
) )

View file

@ -1,7 +1,6 @@
#include "nix/fetchers/fetchers.hh" #include "nix/fetchers/fetchers.hh"
#include "nix/store/store-api.hh" #include "nix/store/store-api.hh"
#include "nix/util/archive.hh" #include "nix/util/archive.hh"
#include "nix/fetchers/store-path-accessor.hh"
#include "nix/fetchers/cache.hh" #include "nix/fetchers/cache.hh"
#include "nix/fetchers/fetch-to-store.hh" #include "nix/fetchers/fetch-to-store.hh"
#include "nix/fetchers/fetch-settings.hh" #include "nix/fetchers/fetch-settings.hh"
@ -153,7 +152,7 @@ struct PathInputScheme : InputScheme
if (!input.getLastModified()) if (!input.getLastModified())
input.attrs.insert_or_assign("lastModified", uint64_t(mtime)); input.attrs.insert_or_assign("lastModified", uint64_t(mtime));
return {makeStorePathAccessor(store, *storePath), std::move(input)}; return {ref{store->getFSAccessor(*storePath)}, std::move(input)};
} }
std::optional<std::string> getFingerprint(ref<Store> store, const Input & input) const override std::optional<std::string> getFingerprint(ref<Store> store, const Input & input) const override

View file

@ -1,11 +0,0 @@
#include "nix/fetchers/store-path-accessor.hh"
#include "nix/store/store-api.hh"
namespace nix {
ref<SourceAccessor> makeStorePathAccessor(ref<Store> store, const StorePath & storePath)
{
return projectSubdirSourceAccessor(store->getFSAccessor(), storePath.to_string());
}
} // namespace nix

View file

@ -6,7 +6,6 @@
#include "nix/util/archive.hh" #include "nix/util/archive.hh"
#include "nix/util/tarfile.hh" #include "nix/util/tarfile.hh"
#include "nix/util/types.hh" #include "nix/util/types.hh"
#include "nix/fetchers/store-path-accessor.hh"
#include "nix/store/store-api.hh" #include "nix/store/store-api.hh"
#include "nix/fetchers/git-utils.hh" #include "nix/fetchers/git-utils.hh"
#include "nix/fetchers/fetch-settings.hh" #include "nix/fetchers/fetch-settings.hh"
@ -354,7 +353,7 @@ struct FileInputScheme : CurlInputScheme
auto narHash = store->queryPathInfo(file.storePath)->narHash; auto narHash = store->queryPathInfo(file.storePath)->narHash;
input.attrs.insert_or_assign("narHash", narHash.to_string(HashFormat::SRI, true)); input.attrs.insert_or_assign("narHash", narHash.to_string(HashFormat::SRI, true));
auto accessor = makeStorePathAccessor(store, file.storePath); auto accessor = ref{store->getFSAccessor(file.storePath)};
accessor->setPathDisplay("«" + input.to_string() + "»"); accessor->setPathDisplay("«" + input.to_string() + "»");

View file

@ -539,11 +539,21 @@ void BinaryCacheStore::registerDrvOutput(const Realisation & info)
upsertFile(filePath, static_cast<nlohmann::json>(info).dump(), "application/json"); upsertFile(filePath, static_cast<nlohmann::json>(info).dump(), "application/json");
} }
ref<SourceAccessor> BinaryCacheStore::getFSAccessor(bool requireValidPath) ref<RemoteFSAccessor> BinaryCacheStore::getRemoteFSAccessor(bool requireValidPath)
{ {
return make_ref<RemoteFSAccessor>(ref<Store>(shared_from_this()), requireValidPath, config.localNarCache); return make_ref<RemoteFSAccessor>(ref<Store>(shared_from_this()), requireValidPath, config.localNarCache);
} }
ref<SourceAccessor> BinaryCacheStore::getFSAccessor(bool requireValidPath)
{
return getRemoteFSAccessor(requireValidPath);
}
std::shared_ptr<SourceAccessor> BinaryCacheStore::getFSAccessor(const StorePath & storePath, bool requireValidPath)
{
return getRemoteFSAccessor(requireValidPath)->accessObject(storePath);
}
void BinaryCacheStore::addSignatures(const StorePath & storePath, const StringSet & sigs) void BinaryCacheStore::addSignatures(const StorePath & storePath, const StringSet & sigs)
{ {
/* Note: this is inherently racy since there is no locking on /* Note: this is inherently racy since there is no locking on

View file

@ -276,7 +276,14 @@ struct DummyStore : virtual Store
callback(nullptr); callback(nullptr);
} }
virtual ref<SourceAccessor> getFSAccessor(bool requireValidPath) override std::shared_ptr<SourceAccessor> getFSAccessor(const StorePath & path, bool requireValidPath) override
{
std::shared_ptr<SourceAccessor> res;
contents.cvisit(path, [&](const auto & kv) { res = kv.second.contents.get_ptr(); });
return res;
}
ref<SourceAccessor> getFSAccessor(bool requireValidPath) override
{ {
return wholeStoreView; return wholeStoreView;
} }

View file

@ -12,6 +12,7 @@
namespace nix { namespace nix {
struct NarInfo; struct NarInfo;
class RemoteFSAccessor;
struct BinaryCacheStoreConfig : virtual StoreConfig struct BinaryCacheStoreConfig : virtual StoreConfig
{ {
@ -136,6 +137,11 @@ private:
CheckSigsFlag checkSigs, CheckSigsFlag checkSigs,
std::function<ValidPathInfo(HashResult)> mkInfo); std::function<ValidPathInfo(HashResult)> mkInfo);
/**
* Same as `getFSAccessor`, but with a more preceise return type.
*/
ref<RemoteFSAccessor> getRemoteFSAccessor(bool requireValidPath = true);
public: public:
bool isValidPathUncached(const StorePath & path) override; bool isValidPathUncached(const StorePath & path) override;
@ -175,6 +181,8 @@ public:
ref<SourceAccessor> getFSAccessor(bool requireValidPath = true) override; ref<SourceAccessor> getFSAccessor(bool requireValidPath = true) override;
std::shared_ptr<SourceAccessor> getFSAccessor(const StorePath &, bool requireValidPath = true) override;
void addSignatures(const StorePath & storePath, const StringSet & sigs) override; void addSignatures(const StorePath & storePath, const StringSet & sigs) override;
std::optional<std::string> getBuildLogExact(const StorePath & path) override; std::optional<std::string> getBuildLogExact(const StorePath & path) override;

View file

@ -142,7 +142,12 @@ public:
unsupported("ensurePath"); unsupported("ensurePath");
} }
virtual ref<SourceAccessor> getFSAccessor(bool requireValidPath) override ref<SourceAccessor> getFSAccessor(bool requireValidPath) override
{
unsupported("getFSAccessor");
}
std::shared_ptr<SourceAccessor> getFSAccessor(const StorePath & path, bool requireValidPath) override
{ {
unsupported("getFSAccessor"); unsupported("getFSAccessor");
} }

View file

@ -68,6 +68,7 @@ struct LocalFSStore : virtual Store, virtual GcStore, virtual LogStore
void narFromPath(const StorePath & path, Sink & sink) override; void narFromPath(const StorePath & path, Sink & sink) override;
ref<SourceAccessor> getFSAccessor(bool requireValidPath = true) override; ref<SourceAccessor> getFSAccessor(bool requireValidPath = true) override;
std::shared_ptr<SourceAccessor> getFSAccessor(const StorePath & path, bool requireValidPath = true) override;
/** /**
* Creates symlink from the `gcRoot` to the `storePath` and * Creates symlink from the `gcRoot` to the `storePath` and

View file

@ -27,6 +27,11 @@ class RemoteFSAccessor : public SourceAccessor
public: public:
/**
* @return nullptr if the store does not contain any object at that path.
*/
std::shared_ptr<SourceAccessor> accessObject(const StorePath & path);
RemoteFSAccessor( RemoteFSAccessor(
ref<Store> store, bool requireValidPath = true, const /* FIXME: use std::optional */ Path & cacheDir = ""); ref<Store> store, bool requireValidPath = true, const /* FIXME: use std::optional */ Path & cacheDir = "");

View file

@ -16,6 +16,7 @@ struct FdSink;
struct FdSource; struct FdSource;
template<typename T> template<typename T>
class Pool; class Pool;
class RemoteFSAccessor;
struct RemoteStoreConfig : virtual StoreConfig struct RemoteStoreConfig : virtual StoreConfig
{ {
@ -176,10 +177,18 @@ protected:
virtual ref<SourceAccessor> getFSAccessor(bool requireValidPath = true) override; virtual ref<SourceAccessor> getFSAccessor(bool requireValidPath = true) override;
virtual std::shared_ptr<SourceAccessor>
getFSAccessor(const StorePath & path, bool requireValidPath = true) override;
virtual void narFromPath(const StorePath & path, Sink & sink) override; virtual void narFromPath(const StorePath & path, Sink & sink) override;
private: private:
/**
* Same as the default implemenation of `RemoteStore::getFSAccessor`, but with a more preceise return type.
*/
ref<RemoteFSAccessor> getRemoteFSAccessor(bool requireValidPath = true);
std::atomic_bool failed{false}; std::atomic_bool failed{false};
void copyDrvsFromEvalStore(const std::vector<DerivedPath> & paths, std::shared_ptr<Store> evalStore); void copyDrvsFromEvalStore(const std::vector<DerivedPath> & paths, std::shared_ptr<Store> evalStore);

View file

@ -717,10 +717,20 @@ public:
}; };
/** /**
* @return An object to access files in the Nix store. * @return An object to access files in the Nix store, across all
* store objects.
*/ */
virtual ref<SourceAccessor> getFSAccessor(bool requireValidPath = true) = 0; virtual ref<SourceAccessor> getFSAccessor(bool requireValidPath = true) = 0;
/**
* @return An object to access files for a specific store object in
* the Nix store.
*
* @return nullptr if the store doesn't contain an object at the
* givine path.
*/
virtual std::shared_ptr<SourceAccessor> getFSAccessor(const StorePath & path, bool requireValidPath = true) = 0;
/** /**
* Repair the contents of the given path by redownloading it using * Repair the contents of the given path by redownloading it using
* a substituter (if available). * a substituter (if available).

View file

@ -61,6 +61,11 @@ struct UDSRemoteStore : virtual IndirectRootStore, virtual RemoteStore
return LocalFSStore::getFSAccessor(requireValidPath); return LocalFSStore::getFSAccessor(requireValidPath);
} }
std::shared_ptr<SourceAccessor> getFSAccessor(const StorePath & path, bool requireValidPath = true) override
{
return LocalFSStore::getFSAccessor(path, requireValidPath);
}
void narFromPath(const StorePath & path, Sink & sink) override void narFromPath(const StorePath & path, Sink & sink) override
{ {
LocalFSStore::narFromPath(path, sink); LocalFSStore::narFromPath(path, sink);

View file

@ -91,6 +91,23 @@ ref<SourceAccessor> LocalFSStore::getFSAccessor(bool requireValidPath)
ref<LocalFSStore>(std::dynamic_pointer_cast<LocalFSStore>(shared_from_this())), requireValidPath); ref<LocalFSStore>(std::dynamic_pointer_cast<LocalFSStore>(shared_from_this())), requireValidPath);
} }
std::shared_ptr<SourceAccessor> LocalFSStore::getFSAccessor(const StorePath & path, bool requireValidPath)
{
auto absPath = std::filesystem::path{config.realStoreDir.get()} / path.to_string();
if (requireValidPath) {
/* Only return non-null if the store object is a fully-valid
member of the store. */
if (!isValidPath(path))
return nullptr;
} else {
/* Return non-null as long as the some file system data exists,
even if the store object is not fully registered. */
if (!pathExists(absPath))
return nullptr;
}
return std::make_shared<PosixSourceAccessor>(std::move(absPath));
}
void LocalFSStore::narFromPath(const StorePath & path, Sink & sink) void LocalFSStore::narFromPath(const StorePath & path, Sink & sink)
{ {
if (!isValidPath(path)) if (!isValidPath(path))

View file

@ -51,15 +51,17 @@ ref<SourceAccessor> RemoteFSAccessor::addToCache(std::string_view hashPart, std:
std::pair<ref<SourceAccessor>, CanonPath> RemoteFSAccessor::fetch(const CanonPath & path) std::pair<ref<SourceAccessor>, CanonPath> RemoteFSAccessor::fetch(const CanonPath & path)
{ {
auto [storePath, restPath_] = store->toStorePath(store->storeDir + path.abs()); auto [storePath, restPath] = store->toStorePath(store->storeDir + path.abs());
auto restPath = CanonPath(restPath_);
if (requireValidPath && !store->isValidPath(storePath)) if (requireValidPath && !store->isValidPath(storePath))
throw InvalidPath("path '%1%' is not a valid store path", store->printStorePath(storePath)); throw InvalidPath("path '%1%' is not a valid store path", store->printStorePath(storePath));
return {ref{accessObject(storePath)}, CanonPath{restPath}};
}
std::shared_ptr<SourceAccessor> RemoteFSAccessor::accessObject(const StorePath & storePath)
{
auto i = nars.find(std::string(storePath.hashPart())); auto i = nars.find(std::string(storePath.hashPart()));
if (i != nars.end()) if (i != nars.end())
return {i->second, restPath}; return i->second;
std::string listing; std::string listing;
Path cacheFile; Path cacheFile;
@ -90,7 +92,7 @@ std::pair<ref<SourceAccessor>, CanonPath> RemoteFSAccessor::fetch(const CanonPat
}); });
nars.emplace(storePath.hashPart(), narAccessor); nars.emplace(storePath.hashPart(), narAccessor);
return {narAccessor, restPath}; return narAccessor;
} catch (SystemError &) { } catch (SystemError &) {
} }
@ -98,14 +100,14 @@ std::pair<ref<SourceAccessor>, CanonPath> RemoteFSAccessor::fetch(const CanonPat
try { try {
auto narAccessor = makeNarAccessor(nix::readFile(cacheFile)); auto narAccessor = makeNarAccessor(nix::readFile(cacheFile));
nars.emplace(storePath.hashPart(), narAccessor); nars.emplace(storePath.hashPart(), narAccessor);
return {narAccessor, restPath}; return narAccessor;
} catch (SystemError &) { } catch (SystemError &) {
} }
} }
StringSink sink; StringSink sink;
store->narFromPath(storePath, sink); store->narFromPath(storePath, sink);
return {addToCache(storePath.hashPart(), std::move(sink.s)), restPath}; return addToCache(storePath.hashPart(), std::move(sink.s));
} }
std::optional<SourceAccessor::Stat> RemoteFSAccessor::maybeLstat(const CanonPath & path) std::optional<SourceAccessor::Stat> RemoteFSAccessor::maybeLstat(const CanonPath & path)

View file

@ -794,9 +794,19 @@ void RemoteStore::narFromPath(const StorePath & path, Sink & sink)
conn->narFromPath(*this, &conn.daemonException, path, [&](Source & source) { copyNAR(conn->from, sink); }); conn->narFromPath(*this, &conn.daemonException, path, [&](Source & source) { copyNAR(conn->from, sink); });
} }
ref<RemoteFSAccessor> RemoteStore::getRemoteFSAccessor(bool requireValidPath)
{
return make_ref<RemoteFSAccessor>(ref<Store>(shared_from_this()), requireValidPath);
}
ref<SourceAccessor> RemoteStore::getFSAccessor(bool requireValidPath) ref<SourceAccessor> RemoteStore::getFSAccessor(bool requireValidPath)
{ {
return make_ref<RemoteFSAccessor>(ref<Store>(shared_from_this())); return getRemoteFSAccessor(requireValidPath);
}
std::shared_ptr<SourceAccessor> RemoteStore::getFSAccessor(const StorePath & path, bool requireValidPath)
{
return getRemoteFSAccessor(requireValidPath)->accessObject(path);
} }
void RemoteStore::ConnectionHandle::withFramedSink(std::function<void(Sink & sink)> fun) void RemoteStore::ConnectionHandle::withFramedSink(std::function<void(Sink & sink)> fun)

View file

@ -151,6 +151,11 @@ struct MountedSSHStore : virtual SSHStore, virtual LocalFSStore
return LocalFSStore::getFSAccessor(requireValidPath); return LocalFSStore::getFSAccessor(requireValidPath);
} }
std::shared_ptr<SourceAccessor> getFSAccessor(const StorePath & path, bool requireValidPath) override
{
return LocalFSStore::getFSAccessor(path, requireValidPath);
}
std::optional<std::string> getBuildLogExact(const StorePath & path) override std::optional<std::string> getBuildLogExact(const StorePath & path) override
{ {
return LocalFSStore::getBuildLogExact(path); return LocalFSStore::getBuildLogExact(path);

View file

@ -1120,10 +1120,9 @@ Derivation Store::derivationFromPath(const StorePath & drvPath)
static Derivation readDerivationCommon(Store & store, const StorePath & drvPath, bool requireValidPath) static Derivation readDerivationCommon(Store & store, const StorePath & drvPath, bool requireValidPath)
{ {
auto accessor = store.getFSAccessor(requireValidPath); auto accessor = store.getFSAccessor(drvPath, requireValidPath);
try { try {
return parseDerivation( return parseDerivation(store, accessor->readFile(CanonPath::root), Derivation::nameFromPath(drvPath));
store, accessor->readFile(CanonPath(drvPath.to_string())), Derivation::nameFromPath(drvPath));
} catch (FormatError & e) { } catch (FormatError & e) {
throw Error("error parsing derivation '%s': %s", store.printStorePath(drvPath), e.msg()); throw Error("error parsing derivation '%s': %s", store.printStorePath(drvPath), e.msg());
} }

View file

@ -41,7 +41,10 @@ struct CmdCatStore : StoreCommand, MixCat
void run(ref<Store> store) override void run(ref<Store> store) override
{ {
auto [storePath, rest] = store->toStorePath(path); auto [storePath, rest] = store->toStorePath(path);
cat(store->getFSAccessor(), CanonPath{storePath.to_string()} / CanonPath{rest}); auto accessor = store->getFSAccessor(storePath);
if (!accessor)
throw InvalidPath("path '%1%' is not a valid store path", store->printStorePath(storePath));
cat(ref{std::move(accessor)}, CanonPath{rest});
} }
}; };

View file

@ -115,7 +115,10 @@ struct CmdLsStore : StoreCommand, MixLs
void run(ref<Store> store) override void run(ref<Store> store) override
{ {
auto [storePath, rest] = store->toStorePath(path); auto [storePath, rest] = store->toStorePath(path);
list(store->getFSAccessor(), CanonPath{storePath.to_string()} / CanonPath{rest}); auto accessor = store->getFSAccessor(storePath);
if (!accessor)
throw InvalidPath("path '%1%' is not a valid store path", store->printStorePath(storePath));
list(ref{std::move(accessor)}, CanonPath{rest});
} }
}; };

View file

@ -603,7 +603,7 @@ static void registerValidity(bool reregister, bool hashGiven, bool canonicalise)
#endif #endif
if (!hashGiven) { if (!hashGiven) {
HashResult hash = hashPath( HashResult hash = hashPath(
{store->getFSAccessor(false), CanonPath{info->path.to_string()}}, {ref{store->getFSAccessor(info->path, false)}},
FileSerialisationMethod::NixArchive, FileSerialisationMethod::NixArchive,
HashAlgorithm::SHA256); HashAlgorithm::SHA256);
info->narHash = hash.hash; info->narHash = hash.hash;