Signed-off-by: NotAShelf <raf@notashelf.dev> Change-Id: If4fd0511087dbaa65afc56a34d7c2f166a6a6964
372 lines
10 KiB
Rust
372 lines
10 KiB
Rust
use axum::{
|
|
Router,
|
|
body::Body,
|
|
extract::{Path, State},
|
|
http::StatusCode,
|
|
response::{IntoResponse, Response},
|
|
routing::get,
|
|
};
|
|
use tokio::process::Command;
|
|
|
|
use crate::{error::ApiError, state::AppState};
|
|
|
|
/// Serve `NARInfo` for a store path hash.
|
|
/// GET /nix-cache/{hash}.narinfo
|
|
async fn narinfo(
|
|
State(state): State<AppState>,
|
|
Path(hash): Path<String>,
|
|
) -> Result<Response, ApiError> {
|
|
if !state.config.cache.enabled {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
// Strip .narinfo suffix if present
|
|
let hash = hash.strip_suffix(".narinfo").unwrap_or(&hash);
|
|
|
|
if !fc_common::validate::is_valid_nix_hash(hash) {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
// Look up the store path from build_products by matching the hash prefix
|
|
let product = sqlx::query_as::<_, fc_common::models::BuildProduct>(
|
|
"SELECT * FROM build_products WHERE path LIKE $1 LIMIT 1",
|
|
)
|
|
.bind(format!("/nix/store/{hash}-%"))
|
|
.fetch_optional(&state.pool)
|
|
.await
|
|
.map_err(|e| ApiError(fc_common::CiError::Database(e)))?;
|
|
|
|
let product = match product {
|
|
Some(p) => p,
|
|
None => return Ok(StatusCode::NOT_FOUND.into_response()),
|
|
};
|
|
|
|
if !fc_common::validate::is_valid_store_path(&product.path) {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
// Get narinfo from nix path-info
|
|
let output = Command::new("nix")
|
|
.args(["path-info", "--json", &product.path])
|
|
.output()
|
|
.await;
|
|
|
|
let output = match output {
|
|
Ok(o) if o.status.success() => o,
|
|
_ => return Ok(StatusCode::NOT_FOUND.into_response()),
|
|
};
|
|
|
|
let stdout = String::from_utf8_lossy(&output.stdout);
|
|
let parsed: serde_json::Value = match serde_json::from_str(&stdout) {
|
|
Ok(v) => v,
|
|
Err(_) => return Ok(StatusCode::NOT_FOUND.into_response()),
|
|
};
|
|
|
|
let entry = match parsed.as_array().and_then(|a| a.first()) {
|
|
Some(e) => e,
|
|
None => return Ok(StatusCode::NOT_FOUND.into_response()),
|
|
};
|
|
|
|
let nar_hash = entry.get("narHash").and_then(|v| v.as_str()).unwrap_or("");
|
|
let nar_size = entry
|
|
.get("narSize")
|
|
.and_then(serde_json::Value::as_u64)
|
|
.unwrap_or(0);
|
|
let store_path = entry
|
|
.get("path")
|
|
.and_then(|v| v.as_str())
|
|
.unwrap_or(&product.path);
|
|
|
|
let refs: Vec<&str> = entry
|
|
.get("references")
|
|
.and_then(|v| v.as_array())
|
|
.map(|arr| {
|
|
arr
|
|
.iter()
|
|
.filter_map(|r| r.as_str())
|
|
.map(|s| s.strip_prefix("/nix/store/").unwrap_or(s))
|
|
.collect()
|
|
})
|
|
.unwrap_or_default();
|
|
|
|
// Extract deriver
|
|
let deriver = entry
|
|
.get("deriver")
|
|
.and_then(|v| v.as_str())
|
|
.map(|d| d.strip_prefix("/nix/store/").unwrap_or(d));
|
|
|
|
// Extract content-addressable hash
|
|
let ca = entry.get("ca").and_then(|v| v.as_str());
|
|
|
|
let file_hash = nar_hash;
|
|
|
|
let mut narinfo_text = format!(
|
|
"StorePath: {store_path}\nURL: nar/{hash}.nar.zst\nCompression: \
|
|
zstd\nFileHash: {file_hash}\nFileSize: {nar_size}\nNarHash: \
|
|
{nar_hash}\nNarSize: {nar_size}\nReferences: {refs}\n",
|
|
store_path = store_path,
|
|
hash = hash,
|
|
file_hash = file_hash,
|
|
nar_size = nar_size,
|
|
nar_hash = nar_hash,
|
|
refs = refs.join(" "),
|
|
);
|
|
|
|
if let Some(deriver) = deriver {
|
|
narinfo_text.push_str(&format!("Deriver: {deriver}\n"));
|
|
}
|
|
if let Some(ca) = ca {
|
|
narinfo_text.push_str(&format!("CA: {ca}\n"));
|
|
}
|
|
|
|
// Optionally sign if secret key is configured
|
|
let narinfo_text =
|
|
if let Some(ref key_file) = state.config.cache.secret_key_file {
|
|
if key_file.exists() {
|
|
sign_narinfo(&narinfo_text, key_file).await
|
|
} else {
|
|
narinfo_text
|
|
}
|
|
} else {
|
|
narinfo_text
|
|
};
|
|
|
|
Ok(
|
|
(
|
|
StatusCode::OK,
|
|
[("content-type", "text/x-nix-narinfo")],
|
|
narinfo_text,
|
|
)
|
|
.into_response(),
|
|
)
|
|
}
|
|
|
|
/// Sign narinfo using nix store sign command
|
|
async fn sign_narinfo(narinfo: &str, key_file: &std::path::Path) -> String {
|
|
let store_path = narinfo
|
|
.lines()
|
|
.find(|l| l.starts_with("StorePath: "))
|
|
.and_then(|l| l.strip_prefix("StorePath: "));
|
|
|
|
let store_path = match store_path {
|
|
Some(p) => p,
|
|
None => return narinfo.to_string(),
|
|
};
|
|
|
|
let output = Command::new("nix")
|
|
.args([
|
|
"store",
|
|
"sign",
|
|
"--key-file",
|
|
&key_file.to_string_lossy(),
|
|
store_path,
|
|
])
|
|
.output()
|
|
.await;
|
|
|
|
match output {
|
|
Ok(o) if o.status.success() => {
|
|
let re_output = Command::new("nix")
|
|
.args(["path-info", "--json", store_path])
|
|
.output()
|
|
.await;
|
|
|
|
if let Ok(o) = re_output
|
|
&& let Ok(parsed) =
|
|
serde_json::from_slice::<serde_json::Value>(&o.stdout)
|
|
&& let Some(sigs) = parsed
|
|
.as_array()
|
|
.and_then(|a| a.first())
|
|
.and_then(|e| e.get("signatures"))
|
|
.and_then(|v| v.as_array())
|
|
{
|
|
let sig_lines: Vec<String> = sigs
|
|
.iter()
|
|
.filter_map(|s| s.as_str())
|
|
.map(|s| format!("Sig: {s}"))
|
|
.collect();
|
|
if !sig_lines.is_empty() {
|
|
return format!("{narinfo}{}\n", sig_lines.join("\n"));
|
|
}
|
|
}
|
|
narinfo.to_string()
|
|
},
|
|
_ => narinfo.to_string(),
|
|
}
|
|
}
|
|
|
|
/// Serve a compressed NAR file for a store path.
|
|
/// GET /nix-cache/nar/{hash}.nar.zst
|
|
async fn serve_nar_zst(
|
|
State(state): State<AppState>,
|
|
Path(hash): Path<String>,
|
|
) -> Result<Response, ApiError> {
|
|
if !state.config.cache.enabled {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
let hash = hash
|
|
.strip_suffix(".nar.zst")
|
|
.or_else(|| hash.strip_suffix(".nar"))
|
|
.unwrap_or(&hash);
|
|
|
|
if !fc_common::validate::is_valid_nix_hash(hash) {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
let product = sqlx::query_as::<_, fc_common::models::BuildProduct>(
|
|
"SELECT * FROM build_products WHERE path LIKE $1 LIMIT 1",
|
|
)
|
|
.bind(format!("/nix/store/{hash}-%"))
|
|
.fetch_optional(&state.pool)
|
|
.await
|
|
.map_err(|e| ApiError(fc_common::CiError::Database(e)))?;
|
|
|
|
let product = match product {
|
|
Some(p) => p,
|
|
None => return Ok(StatusCode::NOT_FOUND.into_response()),
|
|
};
|
|
|
|
if !fc_common::validate::is_valid_store_path(&product.path) {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
// Use two piped processes instead of sh -c to prevent command injection
|
|
let mut nix_child = std::process::Command::new("nix")
|
|
.args(["store", "dump-path", &product.path])
|
|
.stdout(std::process::Stdio::piped())
|
|
.stderr(std::process::Stdio::null())
|
|
.spawn()
|
|
.map_err(|_| {
|
|
ApiError(fc_common::CiError::Build(
|
|
"Failed to start nix store dump-path".to_string(),
|
|
))
|
|
})?;
|
|
|
|
let nix_stdout = match nix_child.stdout.take() {
|
|
Some(s) => s,
|
|
None => return Ok(StatusCode::INTERNAL_SERVER_ERROR.into_response()),
|
|
};
|
|
|
|
let mut zstd_child = Command::new("zstd")
|
|
.arg("-c")
|
|
.stdin(nix_stdout)
|
|
.stdout(std::process::Stdio::piped())
|
|
.stderr(std::process::Stdio::null())
|
|
.spawn()
|
|
.map_err(|_| {
|
|
ApiError(fc_common::CiError::Build(
|
|
"Failed to start zstd compression".to_string(),
|
|
))
|
|
})?;
|
|
|
|
let zstd_stdout = match zstd_child.stdout.take() {
|
|
Some(s) => s,
|
|
None => return Ok(StatusCode::INTERNAL_SERVER_ERROR.into_response()),
|
|
};
|
|
|
|
let stream = tokio_util::io::ReaderStream::new(zstd_stdout);
|
|
let body = Body::from_stream(stream);
|
|
|
|
Ok(
|
|
(StatusCode::OK, [("content-type", "application/zstd")], body)
|
|
.into_response(),
|
|
)
|
|
}
|
|
|
|
/// Serve an uncompressed NAR file for a store path (legacy).
|
|
/// GET /nix-cache/nar/{hash}.nar
|
|
async fn serve_nar(
|
|
State(state): State<AppState>,
|
|
Path(hash): Path<String>,
|
|
) -> Result<Response, ApiError> {
|
|
if !state.config.cache.enabled {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
let hash = hash.strip_suffix(".nar").unwrap_or(&hash);
|
|
|
|
if !fc_common::validate::is_valid_nix_hash(hash) {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
let product = sqlx::query_as::<_, fc_common::models::BuildProduct>(
|
|
"SELECT * FROM build_products WHERE path LIKE $1 LIMIT 1",
|
|
)
|
|
.bind(format!("/nix/store/{hash}-%"))
|
|
.fetch_optional(&state.pool)
|
|
.await
|
|
.map_err(|e| ApiError(fc_common::CiError::Database(e)))?;
|
|
|
|
let product = match product {
|
|
Some(p) => p,
|
|
None => return Ok(StatusCode::NOT_FOUND.into_response()),
|
|
};
|
|
|
|
if !fc_common::validate::is_valid_store_path(&product.path) {
|
|
return Ok(StatusCode::NOT_FOUND.into_response());
|
|
}
|
|
|
|
let child = Command::new("nix")
|
|
.args(["store", "dump-path", &product.path])
|
|
.stdout(std::process::Stdio::piped())
|
|
.stderr(std::process::Stdio::null())
|
|
.spawn();
|
|
|
|
let mut child = match child {
|
|
Ok(c) => c,
|
|
Err(_) => return Ok(StatusCode::INTERNAL_SERVER_ERROR.into_response()),
|
|
};
|
|
|
|
let stdout = match child.stdout.take() {
|
|
Some(s) => s,
|
|
None => return Ok(StatusCode::INTERNAL_SERVER_ERROR.into_response()),
|
|
};
|
|
|
|
let stream = tokio_util::io::ReaderStream::new(stdout);
|
|
let body = Body::from_stream(stream);
|
|
|
|
Ok(
|
|
(
|
|
StatusCode::OK,
|
|
[("content-type", "application/x-nix-nar")],
|
|
body,
|
|
)
|
|
.into_response(),
|
|
)
|
|
}
|
|
|
|
/// Combined NAR handler — dispatches to zstd or plain based on suffix.
|
|
/// GET /nix-cache/nar/{hash} where hash includes .nar.zst or .nar suffix
|
|
async fn serve_nar_combined(
|
|
state: State<AppState>,
|
|
path: Path<String>,
|
|
) -> Result<Response, ApiError> {
|
|
let hash_raw = path.0.clone();
|
|
if hash_raw.ends_with(".nar.zst") {
|
|
serve_nar_zst(state, path).await
|
|
} else if hash_raw.ends_with(".nar") {
|
|
serve_nar(state, path).await
|
|
} else {
|
|
Ok(StatusCode::NOT_FOUND.into_response())
|
|
}
|
|
}
|
|
|
|
/// Nix binary cache info endpoint.
|
|
/// GET /nix-cache/nix-cache-info
|
|
async fn cache_info(State(state): State<AppState>) -> Response {
|
|
if !state.config.cache.enabled {
|
|
return StatusCode::NOT_FOUND.into_response();
|
|
}
|
|
|
|
let info = "StoreDir: /nix/store\nWantMassQuery: 1\nPriority: 30\n";
|
|
|
|
(StatusCode::OK, [("content-type", "text/plain")], info).into_response()
|
|
}
|
|
|
|
pub fn router() -> Router<AppState> {
|
|
Router::new()
|
|
.route("/nix-cache/nix-cache-info", get(cache_info))
|
|
.route("/nix-cache/{hash}", get(narinfo))
|
|
.route("/nix-cache/nar/{hash}", get(serve_nar_combined))
|
|
}
|