2020-04-28 04:08:48 +00:00
|
|
|
# Accumulate suffixes for taking in the right input parameters with the `mangle*`
|
2018-05-07 17:15:34 +00:00
|
|
|
# functions below. See setup-hook for details.
|
|
|
|
accumulateRoles() {
|
2020-04-28 04:08:48 +00:00
|
|
|
declare -ga role_suffixes=()
|
|
|
|
if [ "${NIX_@wrapperName@_TARGET_BUILD_@suffixSalt@:-}" ]; then
|
|
|
|
role_suffixes+=('_FOR_BUILD')
|
2018-05-07 17:15:34 +00:00
|
|
|
fi
|
2020-04-28 04:08:48 +00:00
|
|
|
if [ "${NIX_@wrapperName@_TARGET_HOST_@suffixSalt@:-}" ]; then
|
|
|
|
role_suffixes+=('')
|
2018-05-07 17:15:34 +00:00
|
|
|
fi
|
2020-04-28 04:08:48 +00:00
|
|
|
if [ "${NIX_@wrapperName@_TARGET_TARGET_@suffixSalt@:-}" ]; then
|
|
|
|
role_suffixes+=('_FOR_TARGET')
|
2018-05-07 17:15:34 +00:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2017-08-31 18:43:09 +00:00
|
|
|
mangleVarList() {
|
2017-08-31 19:29:03 +00:00
|
|
|
local var="$1"
|
2017-08-31 18:43:09 +00:00
|
|
|
shift
|
2020-04-28 04:08:48 +00:00
|
|
|
local -a role_suffixes=("$@")
|
2017-08-31 18:43:09 +00:00
|
|
|
|
2020-04-28 04:08:48 +00:00
|
|
|
local outputVar="${var}_@suffixSalt@"
|
2017-08-31 19:29:03 +00:00
|
|
|
declare -gx ${outputVar}+=''
|
2017-08-31 18:43:09 +00:00
|
|
|
# For each role we serve, we accumulate the input parameters into our own
|
|
|
|
# cc-wrapper-derivation-specific environment variables.
|
2020-04-28 04:08:48 +00:00
|
|
|
for suffix in "${role_suffixes[@]}"; do
|
|
|
|
local inputVar="${var}${suffix}"
|
2017-08-31 18:43:09 +00:00
|
|
|
if [ -v "$inputVar" ]; then
|
|
|
|
export ${outputVar}+="${!outputVar:+ }${!inputVar}"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2017-08-31 19:29:03 +00:00
|
|
|
mangleVarBool() {
|
|
|
|
local var="$1"
|
|
|
|
shift
|
2020-04-28 04:08:48 +00:00
|
|
|
local -a role_suffixes=("$@")
|
2017-08-31 19:29:03 +00:00
|
|
|
|
2020-04-28 04:08:48 +00:00
|
|
|
local outputVar="${var}_@suffixSalt@"
|
2017-08-31 19:29:03 +00:00
|
|
|
declare -gxi ${outputVar}+=0
|
2020-04-28 04:08:48 +00:00
|
|
|
for suffix in "${role_suffixes[@]}"; do
|
|
|
|
local inputVar="${var}${suffix}"
|
2017-08-31 19:29:03 +00:00
|
|
|
if [ -v "$inputVar" ]; then
|
2018-02-21 08:56:06 +00:00
|
|
|
# "1" in the end makes `let` return success error code when
|
|
|
|
# expression itself evaluates to zero.
|
|
|
|
# We don't use `|| true` because that would silence actual
|
|
|
|
# syntax errors from bad variable values.
|
|
|
|
let "${outputVar} |= ${!inputVar:-0}" "1"
|
2017-08-31 19:29:03 +00:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2021-04-10 04:11:28 +00:00
|
|
|
# Combine a singular value from all roles. If multiple roles are being served,
|
|
|
|
# and the value differs in these roles then the request is impossible to
|
|
|
|
# satisfy and we abort immediately.
|
|
|
|
mangleVarSingle() {
|
|
|
|
local var="$1"
|
|
|
|
shift
|
|
|
|
local -a role_suffixes=("$@")
|
|
|
|
|
|
|
|
local outputVar="${var}_@suffixSalt@"
|
|
|
|
for suffix in "${role_suffixes[@]}"; do
|
|
|
|
local inputVar="${var}${suffix}"
|
|
|
|
if [ -v "$inputVar" ]; then
|
|
|
|
if [ -v "$outputVar" ]; then
|
|
|
|
if [ "${!outputVar}" != "${!inputVar}" ]; then
|
|
|
|
{
|
|
|
|
echo "Multiple conflicting values defined for $outputVar"
|
|
|
|
echo "Existing value is ${!outputVar}"
|
|
|
|
echo "Attempting to set to ${!inputVar} via $inputVar"
|
|
|
|
} >&2
|
|
|
|
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
declare -gx ${outputVar}="${!inputVar}"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2004-03-12 11:12:18 +00:00
|
|
|
skip () {
|
2017-09-19 23:10:49 +00:00
|
|
|
if (( "${NIX_DEBUG:-0}" >= 1 )); then
|
2004-03-12 11:12:18 +00:00
|
|
|
echo "skipping impure path $1" >&2
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2004-04-07 14:15:54 +00:00
|
|
|
|
|
|
|
# Checks whether a path is impure. E.g., `/lib/foo.so' is impure, but
|
|
|
|
# `/nix/store/.../lib/foo.so' isn't.
|
2004-03-12 11:12:18 +00:00
|
|
|
badPath() {
|
|
|
|
local p=$1
|
2014-10-10 12:25:23 +00:00
|
|
|
|
2004-04-07 14:15:54 +00:00
|
|
|
# Relative paths are okay (since they're presumably relative to
|
|
|
|
# the temporary build directory).
|
2014-10-10 12:25:23 +00:00
|
|
|
if [ "${p:0:1}" != / ]; then return 1; fi
|
|
|
|
|
2004-04-07 14:15:54 +00:00
|
|
|
# Otherwise, the path should refer to the store or some temporary
|
|
|
|
# directory (including the build directory).
|
2004-03-12 11:12:18 +00:00
|
|
|
test \
|
2012-07-02 15:04:56 +00:00
|
|
|
"$p" != "/dev/null" -a \
|
2020-07-20 21:46:08 +00:00
|
|
|
"${p#${NIX_STORE}}" = "$p" -a \
|
|
|
|
"${p#${NIX_BUILD_TOP}}" = "$p" -a \
|
|
|
|
"${p#/tmp}" = "$p" -a \
|
|
|
|
"${p#${TMP:-/tmp}}" = "$p" -a \
|
|
|
|
"${p#${TMPDIR:-/tmp}}" = "$p" -a \
|
|
|
|
"${p#${TEMP:-/tmp}}" = "$p" -a \
|
|
|
|
"${p#${TEMPDIR:-/tmp}}" = "$p"
|
2004-03-12 11:12:18 +00:00
|
|
|
}
|
2016-10-30 13:41:41 +00:00
|
|
|
|
|
|
|
expandResponseParams() {
|
2017-08-14 18:34:12 +00:00
|
|
|
declare -ga params=("$@")
|
2017-07-01 00:27:48 +00:00
|
|
|
local arg
|
|
|
|
for arg in "$@"; do
|
|
|
|
if [[ "$arg" == @* ]]; then
|
2017-08-02 16:48:51 +00:00
|
|
|
# phase separation makes this look useless
|
|
|
|
# shellcheck disable=SC2157
|
2017-08-23 20:39:15 +00:00
|
|
|
if [ -x "@expandResponseParams@" ]; then
|
2017-08-02 16:48:51 +00:00
|
|
|
# params is used by caller
|
|
|
|
#shellcheck disable=SC2034
|
2017-07-01 00:27:48 +00:00
|
|
|
readarray -d '' params < <("@expandResponseParams@" "$@")
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
fi
|
2016-10-30 13:41:41 +00:00
|
|
|
done
|
|
|
|
}
|