aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorEelco Dolstra <edolstra@gmail.com>2017-05-11 13:26:03 +0200
committerEelco Dolstra <edolstra@gmail.com>2017-05-11 13:26:03 +0200
commit45d7b1a9e9018a2be5add1dc6d983e6b7b339c61 (patch)
tree754e96286544bbdf055099712fe19523c61f46cf
parent1fd59447d56a88add8874f9a8b0885a1acd13606 (diff)
LocalStore::addToStore(): Check info.narSize
It allowed the client to specify bogus narSize values. In particular, Downloader::downloadCached wasn't setting narSize at all.
-rw-r--r--src/libstore/download.cc1
-rw-r--r--src/libstore/local-store.cc8
2 files changed, 7 insertions, 2 deletions
diff --git a/src/libstore/download.cc b/src/libstore/download.cc
index 4d502219e..93519ec66 100644
--- a/src/libstore/download.cc
+++ b/src/libstore/download.cc
@@ -652,6 +652,7 @@ Path Downloader::downloadCached(ref<Store> store, const string & url_, bool unpa
Hash hash = hashString(expectedHash ? expectedHash.type : htSHA256, *res.data);
info.path = store->makeFixedOutputPath(false, hash, name);
info.narHash = hashString(htSHA256, *sink.s);
+ info.narSize = sink.s->size();
info.ca = makeFixedOutputCA(false, hash);
store->addToStore(info, sink.s, false, true);
storePath = info.path;
diff --git a/src/libstore/local-store.cc b/src/libstore/local-store.cc
index c8e61126c..ed03c3f42 100644
--- a/src/libstore/local-store.cc
+++ b/src/libstore/local-store.cc
@@ -919,8 +919,12 @@ void LocalStore::addToStore(const ValidPathInfo & info, const ref<std::string> &
Hash h = hashString(htSHA256, *nar);
if (h != info.narHash)
- throw Error(format("hash mismatch importing path ‘%s’; expected hash ‘%s’, got ‘%s’") %
- info.path % info.narHash.to_string() % h.to_string());
+ throw Error("hash mismatch importing path ‘%s’; expected hash ‘%s’, got ‘%s’",
+ info.path, info.narHash.to_string(), h.to_string());
+
+ if (nar->size() != info.narSize)
+ throw Error("szie mismatch importing path ‘%s’; expected %s, got %s",
+ info.path, info.narSize, nar->size());
if (requireSigs && !dontCheckSigs && !info.checkSignatures(*this, publicKeys))
throw Error("cannot add path ‘%s’ because it lacks a valid signature", info.path);