767 lines
27 KiB
C++
767 lines
27 KiB
C++
#include "primops.hh"
|
||
#include "eval-inline.hh"
|
||
#include "eval-settings.hh"
|
||
#include "store-api.hh"
|
||
#include "fetchers.hh"
|
||
#include "filetransfer.hh"
|
||
#include "registry.hh"
|
||
#include "tarball.hh"
|
||
#include "url.hh"
|
||
#include "value-to-json.hh"
|
||
|
||
#include <ctime>
|
||
#include <iomanip>
|
||
#include <regex>
|
||
|
||
namespace nix {
|
||
|
||
void emitTreeAttrs(
|
||
EvalState & state,
|
||
const StorePath & storePath,
|
||
const fetchers::Input & input,
|
||
Value & v,
|
||
bool emptyRevFallback,
|
||
bool forceDirty)
|
||
{
|
||
assert(input.isLocked());
|
||
|
||
auto attrs = state.buildBindings(100);
|
||
|
||
state.mkStorePathString(storePath, attrs.alloc(state.sOutPath));
|
||
|
||
// FIXME: support arbitrary input attributes.
|
||
|
||
auto narHash = input.getNarHash();
|
||
assert(narHash);
|
||
attrs.alloc("narHash").mkString(narHash->to_string(HashFormat::SRI, true));
|
||
|
||
if (input.getType() == "git")
|
||
attrs.alloc("submodules").mkBool(
|
||
fetchers::maybeGetBoolAttr(input.attrs, "submodules").value_or(false));
|
||
|
||
if (input.getType() == "git")
|
||
attrs.alloc("exportIgnore").mkBool(
|
||
fetchers::maybeGetBoolAttr(input.attrs, "exportIgnore").value_or(false));
|
||
|
||
if (!forceDirty) {
|
||
|
||
if (auto rev = input.getRev()) {
|
||
attrs.alloc("rev").mkString(rev->gitRev());
|
||
attrs.alloc("shortRev").mkString(rev->gitShortRev());
|
||
} else if (emptyRevFallback) {
|
||
// Backwards compat for `builtins.fetchGit`: dirty repos return an empty sha1 as rev
|
||
auto emptyHash = Hash(HashAlgorithm::SHA1);
|
||
attrs.alloc("rev").mkString(emptyHash.gitRev());
|
||
attrs.alloc("shortRev").mkString(emptyHash.gitShortRev());
|
||
}
|
||
|
||
if (auto revCount = input.getRevCount())
|
||
attrs.alloc("revCount").mkInt(*revCount);
|
||
else if (emptyRevFallback)
|
||
attrs.alloc("revCount").mkInt(0);
|
||
|
||
}
|
||
|
||
if (auto dirtyRev = fetchers::maybeGetStrAttr(input.attrs, "dirtyRev")) {
|
||
attrs.alloc("dirtyRev").mkString(*dirtyRev);
|
||
attrs.alloc("dirtyShortRev").mkString(*fetchers::maybeGetStrAttr(input.attrs, "dirtyShortRev"));
|
||
}
|
||
|
||
if (auto lastModified = input.getLastModified()) {
|
||
attrs.alloc("lastModified").mkInt(*lastModified);
|
||
attrs.alloc("lastModifiedDate").mkString(
|
||
fmt("%s", std::put_time(std::gmtime(&*lastModified), "%Y%m%d%H%M%S")));
|
||
}
|
||
|
||
v.mkAttrs(attrs);
|
||
}
|
||
|
||
struct FetchTreeParams {
|
||
bool emptyRevFallback = false;
|
||
bool allowNameArgument = false;
|
||
bool isFetchGit = false;
|
||
};
|
||
|
||
static void fetchTree(
|
||
EvalState & state,
|
||
const PosIdx pos,
|
||
Value * * args,
|
||
Value & v,
|
||
const FetchTreeParams & params = FetchTreeParams{}
|
||
) {
|
||
fetchers::Input input;
|
||
NixStringContext context;
|
||
std::optional<std::string> type;
|
||
if (params.isFetchGit) type = "git";
|
||
|
||
state.forceValue(*args[0], pos);
|
||
|
||
if (args[0]->type() == nAttrs) {
|
||
state.forceAttrs(*args[0], pos, "while evaluating the argument passed to builtins.fetchTree");
|
||
|
||
fetchers::Attrs attrs;
|
||
|
||
if (auto aType = args[0]->attrs->get(state.sType)) {
|
||
if (type)
|
||
state.debugThrowLastTrace(EvalError({
|
||
.msg = hintfmt("unexpected attribute 'type'"),
|
||
.errPos = state.positions[pos]
|
||
}));
|
||
type = state.forceStringNoCtx(*aType->value, aType->pos, "while evaluating the `type` attribute passed to builtins.fetchTree");
|
||
} else if (!type)
|
||
state.debugThrowLastTrace(EvalError({
|
||
.msg = hintfmt("attribute 'type' is missing in call to 'fetchTree'"),
|
||
.errPos = state.positions[pos]
|
||
}));
|
||
|
||
attrs.emplace("type", type.value());
|
||
|
||
if (params.isFetchGit) {
|
||
// Default value; user attrs are assigned later.
|
||
attrs.emplace("exportIgnore", Explicit<bool>{true});
|
||
}
|
||
|
||
for (auto & attr : *args[0]->attrs) {
|
||
if (attr.name == state.sType) continue;
|
||
state.forceValue(*attr.value, attr.pos);
|
||
if (attr.value->type() == nPath || attr.value->type() == nString) {
|
||
auto s = state.coerceToString(attr.pos, *attr.value, context, "", false, false).toOwned();
|
||
attrs.emplace(state.symbols[attr.name],
|
||
params.isFetchGit && state.symbols[attr.name] == "url"
|
||
? fixGitURL(s)
|
||
: s);
|
||
}
|
||
else if (attr.value->type() == nBool)
|
||
attrs.emplace(state.symbols[attr.name], Explicit<bool>{attr.value->boolean});
|
||
else if (attr.value->type() == nInt)
|
||
attrs.emplace(state.symbols[attr.name], uint64_t(attr.value->integer));
|
||
else if (state.symbols[attr.name] == "publicKeys") {
|
||
experimentalFeatureSettings.require(Xp::VerifiedFetches);
|
||
attrs.emplace(state.symbols[attr.name], printValueAsJSON(state, true, *attr.value, pos, context).dump());
|
||
}
|
||
else
|
||
state.debugThrowLastTrace(TypeError("fetchTree argument '%s' is %s while a string, Boolean or integer is expected",
|
||
state.symbols[attr.name], showType(*attr.value)));
|
||
}
|
||
|
||
if (!params.allowNameArgument)
|
||
if (auto nameIter = attrs.find("name"); nameIter != attrs.end())
|
||
state.debugThrowLastTrace(EvalError({
|
||
.msg = hintfmt("attribute 'name' isn’t supported in call to 'fetchTree'"),
|
||
.errPos = state.positions[pos]
|
||
}));
|
||
|
||
input = fetchers::Input::fromAttrs(std::move(attrs));
|
||
} else {
|
||
auto url = state.coerceToString(pos, *args[0], context,
|
||
"while evaluating the first argument passed to the fetcher",
|
||
false, false).toOwned();
|
||
|
||
if (params.isFetchGit) {
|
||
fetchers::Attrs attrs;
|
||
attrs.emplace("type", "git");
|
||
attrs.emplace("url", fixGitURL(url));
|
||
input = fetchers::Input::fromAttrs(std::move(attrs));
|
||
} else {
|
||
if (!experimentalFeatureSettings.isEnabled(Xp::Flakes))
|
||
state.debugThrowLastTrace(EvalError({
|
||
.msg = hintfmt("passing a string argument to 'fetchTree' requires the 'flakes' experimental feature"),
|
||
.errPos = state.positions[pos]
|
||
}));
|
||
input = fetchers::Input::fromURL(url);
|
||
}
|
||
}
|
||
|
||
if (!evalSettings.pureEval && !input.isDirect() && experimentalFeatureSettings.isEnabled(Xp::Flakes))
|
||
input = lookupInRegistries(state.store, input).first;
|
||
|
||
if (evalSettings.pureEval && !input.isLocked())
|
||
state.debugThrowLastTrace(EvalError("in pure evaluation mode, 'fetchTree' requires a locked input, at %s", state.positions[pos]));
|
||
|
||
state.checkURI(input.toURLString());
|
||
|
||
auto [storePath, input2] = input.fetch(state.store);
|
||
|
||
state.allowPath(storePath);
|
||
|
||
emitTreeAttrs(state, storePath, input2, v, params.emptyRevFallback, false);
|
||
}
|
||
|
||
static void prim_fetchTree(EvalState & state, const PosIdx pos, Value * * args, Value & v)
|
||
{
|
||
fetchTree(state, pos, args, v, { });
|
||
}
|
||
|
||
static RegisterPrimOp primop_fetchTree({
|
||
.name = "fetchTree",
|
||
.args = {"input"},
|
||
.doc = R"(
|
||
Fetch a file system tree or a plain file using one of the supported backends and return an attribute set with:
|
||
|
||
- the resulting fixed-output [store path](@docroot@/glossary.md#gloss-store-path)
|
||
- the corresponding [NAR](@docroot@/glossary.md#gloss-nar) hash
|
||
- backend-specific metadata (currently not documented). <!-- TODO: document output attributes -->
|
||
|
||
*input* must be an attribute set with the following attributes:
|
||
|
||
- `type` (String, required)
|
||
|
||
One of the [supported source types](#source-types).
|
||
This determines other required and allowed input attributes.
|
||
|
||
- `narHash` (String, optional)
|
||
|
||
The `narHash` parameter can be used to substitute the source of the tree.
|
||
It also allows for verification of tree contents that may not be provided by the underlying transfer mechanism.
|
||
If `narHash` is set, the source is first looked up is the Nix store and [substituters](@docroot@/command-ref/conf-file.md#conf-substituters), and only fetched if not available.
|
||
|
||
A subset of the output attributes of `fetchTree` can be re-used for subsequent calls to `fetchTree` to produce the same result again.
|
||
That is, `fetchTree` is idempotent.
|
||
|
||
Downloads are cached in `$XDG_CACHE_HOME/nix`.
|
||
The remote source will be fetched from the network if both are true:
|
||
- A NAR hash is supplied and the corresponding store path is not [valid](@docroot@/glossary.md#gloss-validity), that is, not available in the store
|
||
|
||
> **Note**
|
||
>
|
||
> [Substituters](@docroot@/command-ref/conf-file.md#conf-substituters) are not used in fetching.
|
||
|
||
- There is no cache entry or the cache entry is older than [`tarball-ttl`](@docroot@/command-ref/conf-file.md#conf-tarball-ttl)
|
||
|
||
## Source types
|
||
|
||
The following source types and associated input attributes are supported.
|
||
|
||
<!-- TODO: It would be soooo much more predictable to work with (and
|
||
document) if `fetchTree` was a curried call with the first paramter for
|
||
`type` or an attribute like `builtins.fetchTree.git`! -->
|
||
|
||
- `"file"`
|
||
|
||
Place a plain file into the Nix store.
|
||
This is similar to [`builtins.fetchurl`](@docroot@/language/builtins.md#builtins-fetchurl)
|
||
|
||
- `url` (String, required)
|
||
|
||
Supported protocols:
|
||
|
||
- `https`
|
||
|
||
> **Example**
|
||
>
|
||
> ```nix
|
||
> fetchTree {
|
||
> type = "file";
|
||
> url = "https://example.com/index.html";
|
||
> }
|
||
> ```
|
||
|
||
- `http`
|
||
|
||
Insecure HTTP transfer for legacy sources.
|
||
|
||
> **Warning**
|
||
>
|
||
> HTTP performs no encryption or authentication.
|
||
> Use a `narHash` known in advance to ensure the output has expected contents.
|
||
|
||
- `file`
|
||
|
||
A file on the local file system.
|
||
|
||
> **Example**
|
||
>
|
||
> ```nix
|
||
> fetchTree {
|
||
> type = "file";
|
||
> url = "file:///home/eelco/nix/README.md";
|
||
> }
|
||
> ```
|
||
|
||
- `"tarball"`
|
||
|
||
Download a tar archive and extract it into the Nix store.
|
||
This has the same underyling implementation as [`builtins.fetchTarball`](@docroot@/language/builtins.md#builtins-fetchTarball)
|
||
|
||
- `url` (String, required)
|
||
|
||
> **Example**
|
||
>
|
||
> ```nix
|
||
> fetchTree {
|
||
> type = "tarball";
|
||
> url = "https://github.com/NixOS/nixpkgs/tarball/nixpkgs-23.11";
|
||
> }
|
||
> ```
|
||
|
||
- `"git"`
|
||
|
||
Fetch a Git tree and copy it to the Nix store.
|
||
This is similar to [`builtins.fetchGit`](@docroot@/language/builtins.md#builtins-fetchGit).
|
||
|
||
- `url` (String, required)
|
||
|
||
The URL formats supported are the same as for Git itself.
|
||
|
||
> **Example**
|
||
>
|
||
> ```nix
|
||
> fetchTree {
|
||
> type = "git";
|
||
> url = "git@github.com:NixOS/nixpkgs.git";
|
||
> }
|
||
> ```
|
||
|
||
> **Note**
|
||
>
|
||
> If the URL points to a local directory, and no `ref` or `rev` is given, Nix will only consider files added to the Git index, as listed by `git ls-files` but use the *current file contents* of the Git working directory.
|
||
|
||
- `ref` (String, optional)
|
||
|
||
A [Git reference](https://git-scm.com/book/en/v2/Git-Internals-Git-References), such as a branch or tag name.
|
||
|
||
Default: `"HEAD"`
|
||
|
||
- `rev` (String, optional)
|
||
|
||
A Git revision; a commit hash.
|
||
|
||
Default: the tip of `ref`
|
||
|
||
- `shallow` (Bool, optional)
|
||
|
||
Make a shallow clone when fetching the Git tree.
|
||
|
||
Default: `false`
|
||
|
||
- `submodules` (Bool, optional)
|
||
|
||
Also fetch submodules if available.
|
||
|
||
Default: `false`
|
||
|
||
- `allRefs` (Bool, optional)
|
||
|
||
If set to `true`, always fetch the entire repository, even if the latest commit is still in the cache.
|
||
Otherwise, only the latest commit is fetched if it is not already cached.
|
||
|
||
Default: `false`
|
||
|
||
- `lastModified` (Integer, optional)
|
||
|
||
Unix timestamp of the fetched commit.
|
||
|
||
If set, pass through the value to the output attribute set.
|
||
Otherwise, generated from the fetched Git tree.
|
||
|
||
- `revCount` (Integer, optional)
|
||
|
||
Number of revisions in the history of the Git repository before the fetched commit.
|
||
|
||
If set, pass through the value to the output attribute set.
|
||
Otherwise, generated from the fetched Git tree.
|
||
|
||
The following input types are still subject to change:
|
||
|
||
- `"path"`
|
||
- `"github"`
|
||
- `"gitlab"`
|
||
- `"sourcehut"`
|
||
- `"mercurial"`
|
||
|
||
*input* can also be a [URL-like reference](@docroot@/command-ref/new-cli/nix3-flake.md#flake-references).
|
||
The additional input types and the URL-like syntax requires the [`flakes` experimental feature](@docroot@/contributing/experimental-features.md#xp-feature-flakes) to be enabled.
|
||
|
||
> **Example**
|
||
>
|
||
> Fetch a GitHub repository using the attribute set representation:
|
||
>
|
||
> ```nix
|
||
> builtins.fetchTree {
|
||
> type = "github";
|
||
> owner = "NixOS";
|
||
> repo = "nixpkgs";
|
||
> rev = "ae2e6b3958682513d28f7d633734571fb18285dd";
|
||
> }
|
||
> ```
|
||
>
|
||
> This evaluates to the following attribute set:
|
||
>
|
||
> ```nix
|
||
> {
|
||
> lastModified = 1686503798;
|
||
> lastModifiedDate = "20230611171638";
|
||
> narHash = "sha256-rA9RqKP9OlBrgGCPvfd5HVAXDOy8k2SmPtB/ijShNXc=";
|
||
> outPath = "/nix/store/l5m6qlvfs9sdw14ja3qbzpglcjlb6j1x-source";
|
||
> rev = "ae2e6b3958682513d28f7d633734571fb18285dd";
|
||
> shortRev = "ae2e6b3";
|
||
> }
|
||
> ```
|
||
|
||
> **Example**
|
||
>
|
||
> Fetch the same GitHub repository using the URL-like syntax:
|
||
>
|
||
> ```nix
|
||
> builtins.fetchTree "github:NixOS/nixpkgs/ae2e6b3958682513d28f7d633734571fb18285dd"
|
||
> ```
|
||
)",
|
||
.fun = prim_fetchTree,
|
||
.experimentalFeature = Xp::FetchTree,
|
||
});
|
||
|
||
static void fetch(EvalState & state, const PosIdx pos, Value * * args, Value & v,
|
||
const std::string & who, bool unpack, std::string name)
|
||
{
|
||
std::optional<std::string> url;
|
||
std::optional<Hash> expectedHash;
|
||
|
||
state.forceValue(*args[0], pos);
|
||
|
||
if (args[0]->type() == nAttrs) {
|
||
|
||
for (auto & attr : *args[0]->attrs) {
|
||
std::string_view n(state.symbols[attr.name]);
|
||
if (n == "url")
|
||
url = state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the url we should fetch");
|
||
else if (n == "sha256")
|
||
expectedHash = newHashAllowEmpty(state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the sha256 of the content we should fetch"), HashAlgorithm::SHA256);
|
||
else if (n == "name")
|
||
name = state.forceStringNoCtx(*attr.value, attr.pos, "while evaluating the name of the content we should fetch");
|
||
else
|
||
state.debugThrowLastTrace(EvalError({
|
||
.msg = hintfmt("unsupported argument '%s' to '%s'", n, who),
|
||
.errPos = state.positions[attr.pos]
|
||
}));
|
||
}
|
||
|
||
if (!url)
|
||
state.debugThrowLastTrace(EvalError({
|
||
.msg = hintfmt("'url' argument required"),
|
||
.errPos = state.positions[pos]
|
||
}));
|
||
} else
|
||
url = state.forceStringNoCtx(*args[0], pos, "while evaluating the url we should fetch");
|
||
|
||
if (who == "fetchTarball")
|
||
url = evalSettings.resolvePseudoUrl(*url);
|
||
|
||
state.checkURI(*url);
|
||
|
||
if (name == "")
|
||
name = baseNameOf(*url);
|
||
|
||
if (evalSettings.pureEval && !expectedHash)
|
||
state.debugThrowLastTrace(EvalError("in pure evaluation mode, '%s' requires a 'sha256' argument", who));
|
||
|
||
// early exit if pinned and already in the store
|
||
if (expectedHash && expectedHash->algo == HashAlgorithm::SHA256) {
|
||
auto expectedPath = state.store->makeFixedOutputPath(
|
||
name,
|
||
FixedOutputInfo {
|
||
.method = unpack ? FileIngestionMethod::Recursive : FileIngestionMethod::Flat,
|
||
.hash = *expectedHash,
|
||
.references = {}
|
||
});
|
||
|
||
if (state.store->isValidPath(expectedPath)) {
|
||
state.allowAndSetStorePathString(expectedPath, v);
|
||
return;
|
||
}
|
||
}
|
||
|
||
// TODO: fetching may fail, yet the path may be substitutable.
|
||
// https://github.com/NixOS/nix/issues/4313
|
||
auto storePath =
|
||
unpack
|
||
? fetchers::downloadTarball(state.store, *url, name, (bool) expectedHash).storePath
|
||
: fetchers::downloadFile(state.store, *url, name, (bool) expectedHash).storePath;
|
||
|
||
if (expectedHash) {
|
||
auto hash = unpack
|
||
? state.store->queryPathInfo(storePath)->narHash
|
||
: hashFile(HashAlgorithm::SHA256, state.store->toRealPath(storePath));
|
||
if (hash != *expectedHash)
|
||
state.debugThrowLastTrace(EvalError((unsigned int) 102, "hash mismatch in file downloaded from '%s':\n specified: %s\n got: %s",
|
||
*url, expectedHash->to_string(HashFormat::Nix32, true), hash.to_string(HashFormat::Nix32, true)));
|
||
}
|
||
|
||
state.allowAndSetStorePathString(storePath, v);
|
||
}
|
||
|
||
static void prim_fetchurl(EvalState & state, const PosIdx pos, Value * * args, Value & v)
|
||
{
|
||
fetch(state, pos, args, v, "fetchurl", false, "");
|
||
}
|
||
|
||
static RegisterPrimOp primop_fetchurl({
|
||
.name = "__fetchurl",
|
||
.args = {"url"},
|
||
.doc = R"(
|
||
Download the specified URL and return the path of the downloaded file.
|
||
|
||
Not available in [restricted evaluation mode](@docroot@/command-ref/conf-file.md#conf-restrict-eval).
|
||
)",
|
||
.fun = prim_fetchurl,
|
||
});
|
||
|
||
static void prim_fetchTarball(EvalState & state, const PosIdx pos, Value * * args, Value & v)
|
||
{
|
||
fetch(state, pos, args, v, "fetchTarball", true, "source");
|
||
}
|
||
|
||
static RegisterPrimOp primop_fetchTarball({
|
||
.name = "fetchTarball",
|
||
.args = {"args"},
|
||
.doc = R"(
|
||
Download the specified URL, unpack it and return the path of the
|
||
unpacked tree. The file must be a tape archive (`.tar`) compressed
|
||
with `gzip`, `bzip2` or `xz`. The top-level path component of the
|
||
files in the tarball is removed, so it is best if the tarball
|
||
contains a single directory at top level. The typical use of the
|
||
function is to obtain external Nix expression dependencies, such as
|
||
a particular version of Nixpkgs, e.g.
|
||
|
||
```nix
|
||
with import (fetchTarball https://github.com/NixOS/nixpkgs/archive/nixos-14.12.tar.gz) {};
|
||
|
||
stdenv.mkDerivation { … }
|
||
```
|
||
|
||
The fetched tarball is cached for a certain amount of time (1
|
||
hour by default) in `~/.cache/nix/tarballs/`. You can change the
|
||
cache timeout either on the command line with `--tarball-ttl`
|
||
*number-of-seconds* or in the Nix configuration file by adding
|
||
the line `tarball-ttl = ` *number-of-seconds*.
|
||
|
||
Note that when obtaining the hash with `nix-prefetch-url` the
|
||
option `--unpack` is required.
|
||
|
||
This function can also verify the contents against a hash. In that
|
||
case, the function takes a set instead of a URL. The set requires
|
||
the attribute `url` and the attribute `sha256`, e.g.
|
||
|
||
```nix
|
||
with import (fetchTarball {
|
||
url = "https://github.com/NixOS/nixpkgs/archive/nixos-14.12.tar.gz";
|
||
sha256 = "1jppksrfvbk5ypiqdz4cddxdl8z6zyzdb2srq8fcffr327ld5jj2";
|
||
}) {};
|
||
|
||
stdenv.mkDerivation { … }
|
||
```
|
||
|
||
Not available in [restricted evaluation mode](@docroot@/command-ref/conf-file.md#conf-restrict-eval).
|
||
)",
|
||
.fun = prim_fetchTarball,
|
||
});
|
||
|
||
static void prim_fetchGit(EvalState & state, const PosIdx pos, Value * * args, Value & v)
|
||
{
|
||
fetchTree(state, pos, args, v,
|
||
FetchTreeParams {
|
||
.emptyRevFallback = true,
|
||
.allowNameArgument = true,
|
||
.isFetchGit = true
|
||
});
|
||
}
|
||
|
||
static RegisterPrimOp primop_fetchGit({
|
||
.name = "fetchGit",
|
||
.args = {"args"},
|
||
.doc = R"(
|
||
Fetch a path from git. *args* can be a URL, in which case the HEAD
|
||
of the repo at that URL is fetched. Otherwise, it can be an
|
||
attribute with the following attributes (all except `url` optional):
|
||
|
||
- `url`
|
||
|
||
The URL of the repo.
|
||
|
||
- `name` (default: `source`)
|
||
|
||
The name of the directory the repo should be exported to in the store.
|
||
|
||
- `rev` (default: *the tip of `ref`*)
|
||
|
||
The [Git revision] to fetch.
|
||
This is typically a commit hash.
|
||
|
||
[Git revision]: https://git-scm.com/docs/git-rev-parse#_specifying_revisions
|
||
|
||
- `ref` (default: `HEAD`)
|
||
|
||
The [Git reference] under which to look for the requested revision.
|
||
This is often a branch or tag name.
|
||
|
||
[Git reference]: https://git-scm.com/book/en/v2/Git-Internals-Git-References
|
||
|
||
By default, the `ref` value is prefixed with `refs/heads/`.
|
||
As of 2.3.0, Nix will not prefix `refs/heads/` if `ref` starts with `refs/`.
|
||
|
||
- `submodules` (default: `false`)
|
||
|
||
A Boolean parameter that specifies whether submodules should be checked out.
|
||
|
||
- `exportIgnore` (default: `true`)
|
||
|
||
A Boolean parameter that specifies whether `export-ignore` from `.gitattributes` should be applied.
|
||
This approximates part of the `git archive` behavior.
|
||
|
||
Enabling this option is not recommended because it is unknown whether the Git developers commit to the reproducibility of `export-ignore` in newer Git versions.
|
||
|
||
- `shallow` (default: `false`)
|
||
|
||
A Boolean parameter that specifies whether fetching from a shallow remote repository is allowed.
|
||
This still performs a full clone of what is available on the remote.
|
||
|
||
- `allRefs`
|
||
|
||
Whether to fetch all references of the repository.
|
||
With this argument being true, it's possible to load a `rev` from *any* `ref`
|
||
(by default only `rev`s from the specified `ref` are supported).
|
||
|
||
- `verifyCommit` (default: `true` if `publicKey` or `publicKeys` are provided, otherwise `false`)
|
||
|
||
Whether to check `rev` for a signature matching `publicKey` or `publicKeys`.
|
||
If `verifyCommit` is enabled, then `fetchGit` cannot use a local repository with uncommitted changes.
|
||
Requires the [`verified-fetches` experimental feature](@docroot@/contributing/experimental-features.md#xp-feature-verified-fetches).
|
||
|
||
- `publicKey`
|
||
|
||
The public key against which `rev` is verified if `verifyCommit` is enabled.
|
||
Requires the [`verified-fetches` experimental feature](@docroot@/contributing/experimental-features.md#xp-feature-verified-fetches).
|
||
|
||
- `keytype` (default: `"ssh-ed25519"`)
|
||
|
||
The key type of `publicKey`.
|
||
Possible values:
|
||
- `"ssh-dsa"`
|
||
- `"ssh-ecdsa"`
|
||
- `"ssh-ecdsa-sk"`
|
||
- `"ssh-ed25519"`
|
||
- `"ssh-ed25519-sk"`
|
||
- `"ssh-rsa"`
|
||
Requires the [`verified-fetches` experimental feature](@docroot@/contributing/experimental-features.md#xp-feature-verified-fetches).
|
||
|
||
- `publicKeys`
|
||
|
||
The public keys against which `rev` is verified if `verifyCommit` is enabled.
|
||
Must be given as a list of attribute sets with the following form:
|
||
```nix
|
||
{
|
||
key = "<public key>";
|
||
type = "<key type>"; # optional, default: "ssh-ed25519"
|
||
}
|
||
```
|
||
Requires the [`verified-fetches` experimental feature](@docroot@/contributing/experimental-features.md#xp-feature-verified-fetches).
|
||
|
||
|
||
Here are some examples of how to use `fetchGit`.
|
||
|
||
- To fetch a private repository over SSH:
|
||
|
||
```nix
|
||
builtins.fetchGit {
|
||
url = "git@github.com:my-secret/repository.git";
|
||
ref = "master";
|
||
rev = "adab8b916a45068c044658c4158d81878f9ed1c3";
|
||
}
|
||
```
|
||
|
||
- To fetch an arbitrary reference:
|
||
|
||
```nix
|
||
builtins.fetchGit {
|
||
url = "https://github.com/NixOS/nix.git";
|
||
ref = "refs/heads/0.5-release";
|
||
}
|
||
```
|
||
|
||
- If the revision you're looking for is in the default branch of
|
||
the git repository you don't strictly need to specify the branch
|
||
name in the `ref` attribute.
|
||
|
||
However, if the revision you're looking for is in a future
|
||
branch for the non-default branch you will need to specify the
|
||
the `ref` attribute as well.
|
||
|
||
```nix
|
||
builtins.fetchGit {
|
||
url = "https://github.com/nixos/nix.git";
|
||
rev = "841fcbd04755c7a2865c51c1e2d3b045976b7452";
|
||
ref = "1.11-maintenance";
|
||
}
|
||
```
|
||
|
||
> **Note**
|
||
>
|
||
> It is nice to always specify the branch which a revision
|
||
> belongs to. Without the branch being specified, the fetcher
|
||
> might fail if the default branch changes. Additionally, it can
|
||
> be confusing to try a commit from a non-default branch and see
|
||
> the fetch fail. If the branch is specified the fault is much
|
||
> more obvious.
|
||
|
||
- If the revision you're looking for is in the default branch of
|
||
the git repository you may omit the `ref` attribute.
|
||
|
||
```nix
|
||
builtins.fetchGit {
|
||
url = "https://github.com/nixos/nix.git";
|
||
rev = "841fcbd04755c7a2865c51c1e2d3b045976b7452";
|
||
}
|
||
```
|
||
|
||
- To fetch a specific tag:
|
||
|
||
```nix
|
||
builtins.fetchGit {
|
||
url = "https://github.com/nixos/nix.git";
|
||
ref = "refs/tags/1.9";
|
||
}
|
||
```
|
||
|
||
- To fetch the latest version of a remote branch:
|
||
|
||
```nix
|
||
builtins.fetchGit {
|
||
url = "ssh://git@github.com/nixos/nix.git";
|
||
ref = "master";
|
||
}
|
||
```
|
||
|
||
- To verify the commit signature:
|
||
|
||
```nix
|
||
builtins.fetchGit {
|
||
url = "ssh://git@github.com/nixos/nix.git";
|
||
verifyCommit = true;
|
||
publicKeys = [
|
||
{
|
||
type = "ssh-ed25519";
|
||
key = "AAAAC3NzaC1lZDI1NTE5AAAAIArPKULJOid8eS6XETwUjO48/HKBWl7FTCK0Z//fplDi";
|
||
}
|
||
];
|
||
}
|
||
```
|
||
|
||
Nix will refetch the branch according to the [`tarball-ttl`](@docroot@/command-ref/conf-file.md#conf-tarball-ttl) setting.
|
||
|
||
This behavior is disabled in [pure evaluation mode](@docroot@/command-ref/conf-file.md#conf-pure-eval).
|
||
|
||
- To fetch the content of a checked-out work directory:
|
||
|
||
```nix
|
||
builtins.fetchGit ./work-dir
|
||
```
|
||
|
||
If the URL points to a local directory, and no `ref` or `rev` is
|
||
given, `fetchGit` will use the current content of the checked-out
|
||
files, even if they are not committed or added to Git's index. It will
|
||
only consider files added to the Git repository, as listed by `git ls-files`.
|
||
)",
|
||
.fun = prim_fetchGit,
|
||
});
|
||
|
||
}
|