mirror of
https://github.com/NixOS/nix.git
synced 2025-11-08 19:46:02 +01:00
647 lines
22 KiB
C++
647 lines
22 KiB
C++
#include <fstream>
|
|
|
|
#include "nix_api_util.h"
|
|
#include "nix_api_store.h"
|
|
|
|
#include "nix/store/tests/nix_api_store.hh"
|
|
#include "nix/store/globals.hh"
|
|
#include "nix/util/tests/string_callback.hh"
|
|
#include "nix/util/url.hh"
|
|
|
|
#include "store-tests-config.hh"
|
|
|
|
namespace nixC {
|
|
|
|
std::string PATH_SUFFIX = "/g1w7hy3qg1w7hy3qg1w7hy3qg1w7hy3q-name";
|
|
|
|
TEST_F(nix_api_util_context, nix_libstore_init)
|
|
{
|
|
auto ret = nix_libstore_init(ctx);
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, nix_store_get_uri)
|
|
{
|
|
std::string str;
|
|
auto ret = nix_store_get_uri(ctx, store, OBSERVE_STRING(str));
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
auto expectedStoreURI = "local://?"
|
|
+ nix::encodeQuery({
|
|
{"log", nixLogDir},
|
|
{"state", nixStateDir},
|
|
{"store", nixStoreDir},
|
|
});
|
|
ASSERT_EQ(expectedStoreURI, str);
|
|
}
|
|
|
|
TEST_F(nix_api_util_context, nix_store_get_storedir_default)
|
|
{
|
|
nix_libstore_init(ctx);
|
|
Store * store = nix_store_open(ctx, nullptr, nullptr);
|
|
assert_ctx_ok();
|
|
ASSERT_NE(store, nullptr);
|
|
|
|
std::string str;
|
|
auto ret = nix_store_get_storedir(ctx, store, OBSERVE_STRING(str));
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
|
|
// These tests run with a unique storeDir, but not a relocated store
|
|
ASSERT_STREQ(NIX_STORE_DIR, str.c_str());
|
|
|
|
nix_store_free(store);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, nix_store_get_storedir)
|
|
{
|
|
std::string str;
|
|
auto ret = nix_store_get_storedir(ctx, store, OBSERVE_STRING(str));
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
|
|
// These tests run with a unique storeDir, but not a relocated store
|
|
ASSERT_STREQ(nixStoreDir.c_str(), str.c_str());
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, InvalidPathFails)
|
|
{
|
|
nix_store_parse_path(ctx, store, "invalid-path");
|
|
ASSERT_EQ(nix_err_code(ctx), NIX_ERR_NIX_ERROR);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, ReturnsValidStorePath)
|
|
{
|
|
StorePath * result = nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str());
|
|
ASSERT_NE(result, nullptr);
|
|
ASSERT_STREQ("name", result->path.name().data());
|
|
ASSERT_STREQ(PATH_SUFFIX.substr(1).c_str(), result->path.to_string().data());
|
|
nix_store_path_free(result);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, SetsLastErrCodeToNixOk)
|
|
{
|
|
StorePath * path = nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str());
|
|
ASSERT_EQ(nix_err_code(ctx), NIX_OK);
|
|
nix_store_path_free(path);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, DoesNotCrashWhenContextIsNull)
|
|
{
|
|
StorePath * path = nullptr;
|
|
ASSERT_NO_THROW(path = nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str()));
|
|
nix_store_path_free(path);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, get_version)
|
|
{
|
|
std::string str;
|
|
auto ret = nix_store_get_version(ctx, store, OBSERVE_STRING(str));
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
ASSERT_STREQ(PACKAGE_VERSION, str.c_str());
|
|
}
|
|
|
|
TEST_F(nix_api_util_context, nix_store_open_dummy)
|
|
{
|
|
nix_libstore_init(ctx);
|
|
Store * store = nix_store_open(ctx, "dummy://", nullptr);
|
|
ASSERT_EQ(NIX_OK, nix_err_code(ctx));
|
|
ASSERT_STREQ("dummy://", store->ptr->config.getReference().render(/*withParams=*/true).c_str());
|
|
|
|
std::string str;
|
|
nix_store_get_version(ctx, store, OBSERVE_STRING(str));
|
|
ASSERT_STREQ("", str.c_str());
|
|
|
|
nix_store_free(store);
|
|
}
|
|
|
|
TEST_F(nix_api_util_context, nix_store_open_invalid)
|
|
{
|
|
nix_libstore_init(ctx);
|
|
Store * store = nix_store_open(ctx, "invalid://", nullptr);
|
|
ASSERT_EQ(NIX_ERR_NIX_ERROR, nix_err_code(ctx));
|
|
ASSERT_EQ(nullptr, store);
|
|
nix_store_free(store);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, nix_store_is_valid_path_not_in_store)
|
|
{
|
|
StorePath * path = nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str());
|
|
ASSERT_EQ(false, nix_store_is_valid_path(ctx, store, path));
|
|
nix_store_path_free(path);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test, nix_store_real_path)
|
|
{
|
|
StorePath * path = nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str());
|
|
std::string rp;
|
|
auto ret = nix_store_real_path(ctx, store, path, OBSERVE_STRING(rp));
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
// Assumption: we're not testing with a relocated store
|
|
ASSERT_STREQ((nixStoreDir + PATH_SUFFIX).c_str(), rp.c_str());
|
|
|
|
nix_store_path_free(path);
|
|
}
|
|
|
|
TEST_F(nix_api_util_context, nix_store_real_path_relocated)
|
|
{
|
|
auto tmp = nix::createTempDir();
|
|
std::string storeRoot = tmp + "/store";
|
|
std::string stateDir = tmp + "/state";
|
|
std::string logDir = tmp + "/log";
|
|
const char * rootkv[] = {"root", storeRoot.c_str()};
|
|
const char * statekv[] = {"state", stateDir.c_str()};
|
|
const char * logkv[] = {"log", logDir.c_str()};
|
|
// const char * rokv[] = {"read-only", "true"};
|
|
const char ** kvs[] = {rootkv, statekv, logkv, NULL};
|
|
|
|
nix_libstore_init(ctx);
|
|
assert_ctx_ok();
|
|
|
|
Store * store = nix_store_open(ctx, "local", kvs);
|
|
assert_ctx_ok();
|
|
ASSERT_NE(store, nullptr);
|
|
|
|
std::string nixStoreDir;
|
|
auto ret = nix_store_get_storedir(ctx, store, OBSERVE_STRING(nixStoreDir));
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
ASSERT_STREQ(NIX_STORE_DIR, nixStoreDir.c_str());
|
|
|
|
StorePath * path = nix_store_parse_path(ctx, store, (nixStoreDir + PATH_SUFFIX).c_str());
|
|
assert_ctx_ok();
|
|
ASSERT_NE(path, nullptr);
|
|
|
|
std::string rp;
|
|
ret = nix_store_real_path(ctx, store, path, OBSERVE_STRING(rp));
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
|
|
// Assumption: we're not testing with a relocated store
|
|
ASSERT_STREQ((storeRoot + NIX_STORE_DIR + PATH_SUFFIX).c_str(), rp.c_str());
|
|
|
|
nix_store_path_free(path);
|
|
}
|
|
|
|
TEST_F(nix_api_util_context, nix_store_real_path_binary_cache)
|
|
{
|
|
Store * store = nix_store_open(ctx, nix::fmt("file://%s/binary-cache", nix::createTempDir()).c_str(), nullptr);
|
|
assert_ctx_ok();
|
|
ASSERT_NE(store, nullptr);
|
|
|
|
std::string path_raw = std::string(NIX_STORE_DIR) + PATH_SUFFIX;
|
|
StorePath * path = nix_store_parse_path(ctx, store, path_raw.c_str());
|
|
assert_ctx_ok();
|
|
ASSERT_NE(path, nullptr);
|
|
|
|
std::string rp;
|
|
auto ret = nix_store_real_path(ctx, store, path, OBSERVE_STRING(rp));
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(NIX_OK, ret);
|
|
ASSERT_STREQ(path_raw.c_str(), rp.c_str());
|
|
}
|
|
|
|
template<typename F>
|
|
struct LambdaAdapter
|
|
{
|
|
F fun;
|
|
|
|
template<typename... Args>
|
|
static inline auto call(LambdaAdapter<F> * ths, Args... args)
|
|
{
|
|
return ths->fun(args...);
|
|
}
|
|
|
|
template<typename... Args>
|
|
static auto call_void(void * ths, Args... args)
|
|
{
|
|
return call(static_cast<LambdaAdapter<F> *>(ths), args...);
|
|
}
|
|
};
|
|
|
|
class NixApiStoreTestWithRealisedPath : public nix_api_store_test_base
|
|
{
|
|
public:
|
|
StorePath * drvPath = nullptr;
|
|
nix_derivation * drv = nullptr;
|
|
Store * store = nullptr;
|
|
StorePath * outPath = nullptr;
|
|
|
|
void SetUp() override
|
|
{
|
|
nix_api_store_test_base::SetUp();
|
|
|
|
nix::experimentalFeatureSettings.set("extra-experimental-features", "ca-derivations");
|
|
nix::settings.substituters = {};
|
|
|
|
store = open_local_store();
|
|
|
|
std::filesystem::path unitTestData{getenv("_NIX_TEST_UNIT_DATA")};
|
|
std::ifstream t{unitTestData / "derivation/ca/self-contained.json"};
|
|
std::stringstream buffer;
|
|
buffer << t.rdbuf();
|
|
|
|
// Replace the hardcoded system with the current system
|
|
std::string jsonStr = nix::replaceStrings(buffer.str(), "x86_64-linux", nix::settings.thisSystem.get());
|
|
|
|
drv = nix_derivation_from_json(ctx, store, jsonStr.c_str());
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drv, nullptr);
|
|
|
|
drvPath = nix_add_derivation(ctx, store, drv);
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drvPath, nullptr);
|
|
|
|
auto cb = LambdaAdapter{.fun = [&](const char * outname, const StorePath * outPath_) {
|
|
ASSERT_NE(outname, nullptr) << "Output name should not be NULL";
|
|
auto is_valid_path = nix_store_is_valid_path(ctx, store, outPath_);
|
|
ASSERT_EQ(is_valid_path, true);
|
|
ASSERT_STREQ(outname, "out") << "Expected single 'out' output";
|
|
ASSERT_EQ(outPath, nullptr) << "Output path callback should only be called once";
|
|
outPath = nix_store_path_clone(outPath_);
|
|
}};
|
|
|
|
auto ret = nix_store_realise(
|
|
ctx, store, drvPath, static_cast<void *>(&cb), decltype(cb)::call_void<const char *, const StorePath *>);
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(ret, NIX_OK);
|
|
ASSERT_NE(outPath, nullptr) << "Derivation should have produced an output";
|
|
}
|
|
|
|
void TearDown() override
|
|
{
|
|
if (drvPath)
|
|
nix_store_path_free(drvPath);
|
|
if (outPath)
|
|
nix_store_path_free(outPath);
|
|
if (drv)
|
|
nix_derivation_free(drv);
|
|
if (store)
|
|
nix_store_free(store);
|
|
|
|
nix_api_store_test_base::TearDown();
|
|
}
|
|
};
|
|
|
|
TEST_F(nix_api_store_test_base, build_from_json)
|
|
{
|
|
// FIXME get rid of these
|
|
nix::experimentalFeatureSettings.set("extra-experimental-features", "ca-derivations");
|
|
nix::settings.substituters = {};
|
|
|
|
auto * store = open_local_store();
|
|
|
|
std::filesystem::path unitTestData{getenv("_NIX_TEST_UNIT_DATA")};
|
|
|
|
std::ifstream t{unitTestData / "derivation/ca/self-contained.json"};
|
|
std::stringstream buffer;
|
|
buffer << t.rdbuf();
|
|
|
|
// Replace the hardcoded system with the current system
|
|
std::string jsonStr = nix::replaceStrings(buffer.str(), "x86_64-linux", nix::settings.thisSystem.get());
|
|
|
|
auto * drv = nix_derivation_from_json(ctx, store, jsonStr.c_str());
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drv, nullptr);
|
|
|
|
auto * drvPath = nix_add_derivation(ctx, store, drv);
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drv, nullptr);
|
|
|
|
int callbackCount = 0;
|
|
auto cb = LambdaAdapter{.fun = [&](const char * outname, const StorePath * outPath) {
|
|
ASSERT_NE(outname, nullptr);
|
|
ASSERT_STREQ(outname, "out");
|
|
ASSERT_NE(outPath, nullptr);
|
|
auto is_valid_path = nix_store_is_valid_path(ctx, store, outPath);
|
|
ASSERT_EQ(is_valid_path, true);
|
|
callbackCount++;
|
|
}};
|
|
|
|
auto ret = nix_store_realise(
|
|
ctx, store, drvPath, static_cast<void *>(&cb), decltype(cb)::call_void<const char *, const StorePath *>);
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(ret, NIX_OK);
|
|
ASSERT_EQ(callbackCount, 1) << "Callback should have been invoked exactly once";
|
|
|
|
// Clean up
|
|
nix_store_path_free(drvPath);
|
|
nix_derivation_free(drv);
|
|
nix_store_free(store);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test_base, nix_store_realise_invalid_system)
|
|
{
|
|
// Test that nix_store_realise properly reports errors when the system is invalid
|
|
nix::experimentalFeatureSettings.set("extra-experimental-features", "ca-derivations");
|
|
nix::settings.substituters = {};
|
|
|
|
auto * store = open_local_store();
|
|
|
|
std::filesystem::path unitTestData{getenv("_NIX_TEST_UNIT_DATA")};
|
|
std::ifstream t{unitTestData / "derivation/ca/self-contained.json"};
|
|
std::stringstream buffer;
|
|
buffer << t.rdbuf();
|
|
|
|
// Use an invalid system that cannot be built
|
|
std::string jsonStr = nix::replaceStrings(buffer.str(), "x86_64-linux", "bogus65-bogusos");
|
|
|
|
auto * drv = nix_derivation_from_json(ctx, store, jsonStr.c_str());
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drv, nullptr);
|
|
|
|
auto * drvPath = nix_add_derivation(ctx, store, drv);
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drvPath, nullptr);
|
|
|
|
int callbackCount = 0;
|
|
auto cb = LambdaAdapter{.fun = [&](const char * outname, const StorePath * outPath) { callbackCount++; }};
|
|
|
|
auto ret = nix_store_realise(
|
|
ctx, store, drvPath, static_cast<void *>(&cb), decltype(cb)::call_void<const char *, const StorePath *>);
|
|
|
|
// Should fail with an error
|
|
ASSERT_NE(ret, NIX_OK);
|
|
ASSERT_EQ(callbackCount, 0) << "Callback should not be invoked when build fails";
|
|
|
|
// Check that error message is set
|
|
std::string errMsg = nix_err_msg(nullptr, ctx, nullptr);
|
|
ASSERT_FALSE(errMsg.empty()) << "Error message should be set";
|
|
ASSERT_NE(errMsg.find("system"), std::string::npos) << "Error should mention system";
|
|
|
|
// Clean up
|
|
nix_store_path_free(drvPath);
|
|
nix_derivation_free(drv);
|
|
nix_store_free(store);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test_base, nix_store_realise_builder_fails)
|
|
{
|
|
// Test that nix_store_realise properly reports errors when the builder fails
|
|
nix::experimentalFeatureSettings.set("extra-experimental-features", "ca-derivations");
|
|
nix::settings.substituters = {};
|
|
|
|
auto * store = open_local_store();
|
|
|
|
std::filesystem::path unitTestData{getenv("_NIX_TEST_UNIT_DATA")};
|
|
std::ifstream t{unitTestData / "derivation/ca/self-contained.json"};
|
|
std::stringstream buffer;
|
|
buffer << t.rdbuf();
|
|
|
|
// Replace with current system and make builder command fail
|
|
std::string jsonStr = nix::replaceStrings(buffer.str(), "x86_64-linux", nix::settings.thisSystem.get());
|
|
jsonStr = nix::replaceStrings(jsonStr, "echo $name foo > $out", "exit 1");
|
|
|
|
auto * drv = nix_derivation_from_json(ctx, store, jsonStr.c_str());
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drv, nullptr);
|
|
|
|
auto * drvPath = nix_add_derivation(ctx, store, drv);
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drvPath, nullptr);
|
|
|
|
int callbackCount = 0;
|
|
auto cb = LambdaAdapter{.fun = [&](const char * outname, const StorePath * outPath) { callbackCount++; }};
|
|
|
|
auto ret = nix_store_realise(
|
|
ctx, store, drvPath, static_cast<void *>(&cb), decltype(cb)::call_void<const char *, const StorePath *>);
|
|
|
|
// Should fail with an error
|
|
ASSERT_NE(ret, NIX_OK);
|
|
ASSERT_EQ(callbackCount, 0) << "Callback should not be invoked when build fails";
|
|
|
|
// Check that error message is set
|
|
std::string errMsg = nix_err_msg(nullptr, ctx, nullptr);
|
|
ASSERT_FALSE(errMsg.empty()) << "Error message should be set";
|
|
|
|
// Clean up
|
|
nix_store_path_free(drvPath);
|
|
nix_derivation_free(drv);
|
|
nix_store_free(store);
|
|
}
|
|
|
|
TEST_F(nix_api_store_test_base, nix_store_realise_builder_no_output)
|
|
{
|
|
// Test that nix_store_realise properly reports errors when builder succeeds but produces no output
|
|
nix::experimentalFeatureSettings.set("extra-experimental-features", "ca-derivations");
|
|
nix::settings.substituters = {};
|
|
|
|
auto * store = open_local_store();
|
|
|
|
std::filesystem::path unitTestData{getenv("_NIX_TEST_UNIT_DATA")};
|
|
std::ifstream t{unitTestData / "derivation/ca/self-contained.json"};
|
|
std::stringstream buffer;
|
|
buffer << t.rdbuf();
|
|
|
|
// Replace with current system and make builder succeed but not produce output
|
|
std::string jsonStr = nix::replaceStrings(buffer.str(), "x86_64-linux", nix::settings.thisSystem.get());
|
|
jsonStr = nix::replaceStrings(jsonStr, "echo $name foo > $out", "true");
|
|
|
|
auto * drv = nix_derivation_from_json(ctx, store, jsonStr.c_str());
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drv, nullptr);
|
|
|
|
auto * drvPath = nix_add_derivation(ctx, store, drv);
|
|
assert_ctx_ok();
|
|
ASSERT_NE(drvPath, nullptr);
|
|
|
|
int callbackCount = 0;
|
|
auto cb = LambdaAdapter{.fun = [&](const char * outname, const StorePath * outPath) { callbackCount++; }};
|
|
|
|
auto ret = nix_store_realise(
|
|
ctx, store, drvPath, static_cast<void *>(&cb), decltype(cb)::call_void<const char *, const StorePath *>);
|
|
|
|
// Should fail with an error
|
|
ASSERT_NE(ret, NIX_OK);
|
|
ASSERT_EQ(callbackCount, 0) << "Callback should not be invoked when build produces no output";
|
|
|
|
// Check that error message is set
|
|
std::string errMsg = nix_err_msg(nullptr, ctx, nullptr);
|
|
ASSERT_FALSE(errMsg.empty()) << "Error message should be set";
|
|
|
|
// Clean up
|
|
nix_store_path_free(drvPath);
|
|
nix_derivation_free(drv);
|
|
nix_store_free(store);
|
|
}
|
|
|
|
TEST_F(NixApiStoreTestWithRealisedPath, nix_store_get_fs_closure_with_outputs)
|
|
{
|
|
// Test closure computation with include_outputs on a derivation path
|
|
struct CallbackData
|
|
{
|
|
std::set<std::string> * paths;
|
|
};
|
|
|
|
std::set<std::string> closure_paths;
|
|
CallbackData data{&closure_paths};
|
|
|
|
auto ret = nix_store_get_fs_closure(
|
|
ctx,
|
|
store,
|
|
drvPath, // Use derivation path
|
|
false, // flip_direction
|
|
true, // include_outputs - include the outputs in the closure
|
|
false, // include_derivers
|
|
&data,
|
|
[](nix_c_context * context, void * userdata, const StorePath * path) {
|
|
auto * data = static_cast<CallbackData *>(userdata);
|
|
std::string path_str;
|
|
nix_store_path_name(path, OBSERVE_STRING(path_str));
|
|
auto [it, inserted] = data->paths->insert(path_str);
|
|
ASSERT_TRUE(inserted) << "Duplicate path in closure: " << path_str;
|
|
});
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(ret, NIX_OK);
|
|
|
|
// The closure should contain the derivation and its outputs
|
|
ASSERT_GE(closure_paths.size(), 2);
|
|
|
|
// Verify the output path is in the closure
|
|
std::string outPathName;
|
|
nix_store_path_name(outPath, OBSERVE_STRING(outPathName));
|
|
ASSERT_EQ(closure_paths.count(outPathName), 1);
|
|
}
|
|
|
|
TEST_F(NixApiStoreTestWithRealisedPath, nix_store_get_fs_closure_without_outputs)
|
|
{
|
|
// Test closure computation WITHOUT include_outputs on a derivation path
|
|
struct CallbackData
|
|
{
|
|
std::set<std::string> * paths;
|
|
};
|
|
|
|
std::set<std::string> closure_paths;
|
|
CallbackData data{&closure_paths};
|
|
|
|
auto ret = nix_store_get_fs_closure(
|
|
ctx,
|
|
store,
|
|
drvPath, // Use derivation path
|
|
false, // flip_direction
|
|
false, // include_outputs - do NOT include the outputs
|
|
false, // include_derivers
|
|
&data,
|
|
[](nix_c_context * context, void * userdata, const StorePath * path) {
|
|
auto * data = static_cast<CallbackData *>(userdata);
|
|
std::string path_str;
|
|
nix_store_path_name(path, OBSERVE_STRING(path_str));
|
|
auto [it, inserted] = data->paths->insert(path_str);
|
|
ASSERT_TRUE(inserted) << "Duplicate path in closure: " << path_str;
|
|
});
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(ret, NIX_OK);
|
|
|
|
// Verify the output path is NOT in the closure
|
|
std::string outPathName;
|
|
nix_store_path_name(outPath, OBSERVE_STRING(outPathName));
|
|
ASSERT_EQ(closure_paths.count(outPathName), 0) << "Output path should not be in closure when includeOutputs=false";
|
|
}
|
|
|
|
TEST_F(NixApiStoreTestWithRealisedPath, nix_store_get_fs_closure_flip_direction)
|
|
{
|
|
// Test closure computation with flip_direction on a derivation path
|
|
// When flip_direction=true, we get the reverse dependencies (what depends on this path)
|
|
// For a derivation, this should NOT include outputs even with include_outputs=true
|
|
struct CallbackData
|
|
{
|
|
std::set<std::string> * paths;
|
|
};
|
|
|
|
std::set<std::string> closure_paths;
|
|
CallbackData data{&closure_paths};
|
|
|
|
auto ret = nix_store_get_fs_closure(
|
|
ctx,
|
|
store,
|
|
drvPath, // Use derivation path
|
|
true, // flip_direction - get reverse dependencies
|
|
true, // include_outputs
|
|
false, // include_derivers
|
|
&data,
|
|
[](nix_c_context * context, void * userdata, const StorePath * path) {
|
|
auto * data = static_cast<CallbackData *>(userdata);
|
|
std::string path_str;
|
|
nix_store_path_name(path, OBSERVE_STRING(path_str));
|
|
auto [it, inserted] = data->paths->insert(path_str);
|
|
ASSERT_TRUE(inserted) << "Duplicate path in closure: " << path_str;
|
|
});
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(ret, NIX_OK);
|
|
|
|
// Verify the output path is NOT in the closure when direction is flipped
|
|
std::string outPathName;
|
|
nix_store_path_name(outPath, OBSERVE_STRING(outPathName));
|
|
ASSERT_EQ(closure_paths.count(outPathName), 0) << "Output path should not be in closure when flip_direction=true";
|
|
}
|
|
|
|
TEST_F(NixApiStoreTestWithRealisedPath, nix_store_get_fs_closure_include_derivers)
|
|
{
|
|
// Test closure computation with include_derivers on an output path
|
|
// This should include the derivation that produced the output
|
|
struct CallbackData
|
|
{
|
|
std::set<std::string> * paths;
|
|
};
|
|
|
|
std::set<std::string> closure_paths;
|
|
CallbackData data{&closure_paths};
|
|
|
|
auto ret = nix_store_get_fs_closure(
|
|
ctx,
|
|
store,
|
|
outPath, // Use output path (not derivation)
|
|
false, // flip_direction
|
|
false, // include_outputs
|
|
true, // include_derivers - include the derivation
|
|
&data,
|
|
[](nix_c_context * context, void * userdata, const StorePath * path) {
|
|
auto * data = static_cast<CallbackData *>(userdata);
|
|
std::string path_str;
|
|
nix_store_path_name(path, OBSERVE_STRING(path_str));
|
|
auto [it, inserted] = data->paths->insert(path_str);
|
|
ASSERT_TRUE(inserted) << "Duplicate path in closure: " << path_str;
|
|
});
|
|
assert_ctx_ok();
|
|
ASSERT_EQ(ret, NIX_OK);
|
|
|
|
// Verify the derivation path is in the closure
|
|
// Deriver is nasty stateful, and this assertion is only guaranteed because
|
|
// we're using an empty store as our starting point. Otherwise, if the
|
|
// output happens to exist, the deriver could be anything.
|
|
std::string drvPathName;
|
|
nix_store_path_name(drvPath, OBSERVE_STRING(drvPathName));
|
|
ASSERT_EQ(closure_paths.count(drvPathName), 1) << "Derivation should be in closure when include_derivers=true";
|
|
}
|
|
|
|
TEST_F(NixApiStoreTestWithRealisedPath, nix_store_get_fs_closure_error_propagation)
|
|
{
|
|
// Test that errors in the callback abort the closure computation
|
|
struct CallbackData
|
|
{
|
|
int * count;
|
|
};
|
|
|
|
int call_count = 0;
|
|
CallbackData data{&call_count};
|
|
|
|
auto ret = nix_store_get_fs_closure(
|
|
ctx,
|
|
store,
|
|
drvPath, // Use derivation path
|
|
false, // flip_direction
|
|
true, // include_outputs
|
|
false, // include_derivers
|
|
&data,
|
|
[](nix_c_context * context, void * userdata, const StorePath * path) {
|
|
auto * data = static_cast<CallbackData *>(userdata);
|
|
(*data->count)++;
|
|
// Set an error immediately
|
|
nix_set_err_msg(context, NIX_ERR_UNKNOWN, "Test error");
|
|
});
|
|
|
|
// Should have aborted with error
|
|
ASSERT_EQ(ret, NIX_ERR_UNKNOWN);
|
|
ASSERT_EQ(call_count, 1); // Should have been called exactly once, then aborted
|
|
}
|
|
|
|
} // namespace nixC
|