summary refs log tree commit diff
diff options
context:
space:
mode:
authorGergely Risko <errge@nilcons.com>2014-08-27 16:46:02 +0200
committerLudovic Courtès <ludo@gnu.org>2015-05-11 17:29:11 +0200
commitabd9d61e6201ddbde3305dd27c286e883e950bec (patch)
tree2319e2eb0a93df61f94ecaa79544bc1d340a4843
parent8c766e48d5c4741b63a4f24dc91138f587c04a5a (diff)
downloadguix-abd9d61e6201ddbde3305dd27c286e883e950bec.tar.gz
Introduce allowedRequisites feature
-rw-r--r--nix/libstore/build.cc19
1 files changed, 18 insertions, 1 deletions
diff --git a/nix/libstore/build.cc b/nix/libstore/build.cc
index 5c605a7bd7..133ea6dbf6 100644
--- a/nix/libstore/build.cc
+++ b/nix/libstore/build.cc
@@ -2358,7 +2358,24 @@ void DerivationGoal::registerOutputs()
             PathSet allowed = parseReferenceSpecifiers(drv, get(drv.env, "allowedReferences"));
             foreach (PathSet::iterator, i, references)
                 if (allowed.find(*i) == allowed.end())
-                    throw BuildError(format("output is not allowed to refer to path `%1%'") % *i);
+                    throw BuildError(format("output (`%1%') is not allowed to refer to path `%2%'") % actualPath % *i);
+        }
+
+        /* If the derivation specifies an `allowedRequisites'
+           attribute (containing a list of paths that the output may
+           refer to), check that all requisites are in that list.  !!!
+           allowedRequisites should really be per-output. */
+        if (drv.env.find("allowedRequisites") != drv.env.end()) {
+            PathSet allowed = parseReferenceSpecifiers(drv, get(drv.env, "allowedRequisites"));
+            PathSet requisites;
+            /* Our requisites are the union of the closures of our references. */
+            foreach (PathSet::iterator, i, references)
+                /* Don't call computeFSClosure on ourselves. */
+                if (actualPath != *i)
+                    computeFSClosure(worker.store, *i, requisites);
+            foreach (PathSet::iterator, i, requisites)
+                if (allowed.find(*i) == allowed.end())
+                    throw BuildError(format("output (`%1%') is not allowed to refer to requisite path `%2%'") % actualPath % *i);
         }
 
         worker.store.optimisePath(path); // FIXME: combine with scanForReferences()