2017-03-20 19:41:37 +00:00
---
title: Rust
author: Matthias Beyer
date: 2017-03-05
---
# User's Guide to the Rust Infrastructure
To install the rust compiler and cargo put
```
2017-11-24 06:12:02 +00:00
rustc
cargo
2017-03-20 19:41:37 +00:00
```
2017-08-05 14:38:48 +00:00
into the `environment.systemPackages` or bring them into
2017-11-24 06:12:02 +00:00
scope with `nix-shell -p rustc cargo` .
2017-03-20 19:41:37 +00:00
2018-03-28 01:07:19 +00:00
> If you are using NixOS and you want to use rust without a nix expression you
> probably want to add the following in your `configuration.nix` to build
> crates with C dependencies.
>
> environment.systemPackages = [binutils gcc gnumake openssl pkgconfig]
2017-08-05 14:38:48 +00:00
For daily builds (beta and nightly) use either rustup from
nixpkgs or use the [Rust nightlies
overlay](#using-the-rust-nightlies-overlay).
2017-03-20 19:41:37 +00:00
2017-12-12 10:55:15 +00:00
## Compiling Rust applications with Cargo
2017-03-20 19:41:37 +00:00
Rust applications are packaged by using the `buildRustPackage` helper from `rustPlatform` :
```
2017-11-17 07:26:51 +00:00
rustPlatform.buildRustPackage rec {
2017-03-20 19:41:37 +00:00
name = "ripgrep-${version}";
version = "0.4.0";
src = fetchFromGitHub {
owner = "BurntSushi";
repo = "ripgrep";
rev = "${version}";
sha256 = "0y5d1n6hkw85jb3rblcxqas2fp82h3nghssa4xqrhqnz25l799pj";
};
2017-08-05 14:38:48 +00:00
cargoSha256 = "0q68qyl2h6i0qsz82z840myxlnjay8p1w5z7hfyr8fqp7wgwa9cx";
2019-08-24 12:29:47 +00:00
verifyCargoDeps = true;
2017-03-20 19:41:37 +00:00
meta = with stdenv.lib; {
2017-11-17 07:26:51 +00:00
description = "A fast line-oriented regex search tool, similar to ag and ack";
2017-03-20 19:41:37 +00:00
homepage = https://github.com/BurntSushi/ripgrep;
2017-11-17 07:26:51 +00:00
license = licenses.unlicense;
2017-03-20 19:41:37 +00:00
maintainers = [ maintainers.tailhook ];
platforms = platforms.all;
};
}
```
2017-08-05 14:38:48 +00:00
`buildRustPackage` requires a `cargoSha256` attribute which is computed over
2017-03-20 19:41:37 +00:00
all crate sources of this package. Currently it is obtained by inserting a
fake checksum into the expression and building the package once. The correct
checksum can be then take from the failed build.
2018-08-14 02:20:30 +00:00
When the `Cargo.lock` , provided by upstream, is not in sync with the
`Cargo.toml` , it is possible to use `cargoPatches` to update it. All patches
added in `cargoPatches` will also be prepended to the patches in `patches` at
build-time.
2019-08-24 12:29:47 +00:00
When `verifyCargoDeps` is set to `true` , the build will also verify that the
`cargoSha256` is not out of date by comparing the `Cargo.lock` file in both the `cargoDeps` and `src` . Note that this option changes the value of `cargoSha256` since it also copies the `Cargo.lock` in it. To avoid breaking backward-compatibility this option is not enabled by default but hopefully will be in the future.
2017-12-12 10:55:15 +00:00
## Compiling Rust crates using Nix instead of Cargo
2018-02-20 07:55:04 +00:00
### Simple operation
2017-12-12 10:55:15 +00:00
When run, `cargo build` produces a file called `Cargo.lock` ,
containing pinned versions of all dependencies. Nixpkgs contains a
tool called `carnix` (`nix-env -iA nixos.carnix`), which can be used
to turn a `Cargo.lock` into a Nix expression.
That Nix expression calls `rustc` directly (hence bypassing Cargo),
and can be used to compile a crate and all its dependencies. Here is
an example for a minimal `hello` crate:
$ cargo new hello
$ cd hello
$ cargo build
Compiling hello v0.1.0 (file:///tmp/hello)
Finished dev [unoptimized + debuginfo] target(s) in 0.20 secs
$ carnix -o hello.nix --src ./. Cargo.lock --standalone
2018-03-28 01:07:19 +00:00
$ nix-build hello.nix -A hello_0_1_0
2017-12-12 10:55:15 +00:00
Now, the file produced by the call to `carnix` , called `hello.nix` , looks like:
```
2018-01-28 19:29:09 +00:00
# Generated by carnix 0.6.5: carnix -o hello.nix --src ./. Cargo.lock --standalone
2018-08-20 18:43:41 +00:00
{ lib, stdenv, buildRustCrate, fetchgit }:
let kernel = stdenv.buildPlatform.parsed.kernel.name;
2017-12-12 10:55:15 +00:00
# ... (content skipped)
in
rec {
2018-01-28 19:29:09 +00:00
hello = f: hello_0_1_0 { features = hello_0_1_0_features { hello_0_1_0 = f; }; };
hello_0_1_0_ = { dependencies?[], buildDependencies?[], features?[] }: buildRustCrate {
crateName = "hello";
version = "0.1.0";
authors = [ "pe@pijul.org < pe @ pijul . org > " ];
src = ./.;
inherit dependencies buildDependencies features;
};
hello_0_1_0 = { features?(hello_0_1_0_features {}) }: hello_0_1_0_ {};
hello_0_1_0_features = f: updateFeatures f (rec {
hello_0_1_0.default = (f.hello_0_1_0.default or true);
}) [ ];
2017-12-12 10:55:15 +00:00
}
```
In particular, note that the argument given as `--src` is copied
verbatim to the source. If we look at a more complicated
dependencies, for instance by adding a single line `libc="*"` to our
`Cargo.toml` , we first need to run `cargo build` to update the
`Cargo.lock` . Then, `carnix` needs to be run again, and produces the
following nix file:
```
2018-01-28 19:29:09 +00:00
# Generated by carnix 0.6.5: carnix -o hello.nix --src ./. Cargo.lock --standalone
2018-08-20 18:43:41 +00:00
{ lib, stdenv, buildRustCrate, fetchgit }:
let kernel = stdenv.buildPlatform.parsed.kernel.name;
2017-12-12 10:55:15 +00:00
# ... (content skipped)
in
rec {
2018-01-28 19:29:09 +00:00
hello = f: hello_0_1_0 { features = hello_0_1_0_features { hello_0_1_0 = f; }; };
hello_0_1_0_ = { dependencies?[], buildDependencies?[], features?[] }: buildRustCrate {
crateName = "hello";
version = "0.1.0";
authors = [ "pe@pijul.org < pe @ pijul . org > " ];
src = ./.;
inherit dependencies buildDependencies features;
};
libc_0_2_36_ = { dependencies?[], buildDependencies?[], features?[] }: buildRustCrate {
crateName = "libc";
version = "0.2.36";
authors = [ "The Rust Project Developers" ];
sha256 = "01633h4yfqm0s302fm0dlba469bx8y6cs4nqc8bqrmjqxfxn515l";
inherit dependencies buildDependencies features;
2017-12-12 10:55:15 +00:00
};
2018-01-28 19:29:09 +00:00
hello_0_1_0 = { features?(hello_0_1_0_features {}) }: hello_0_1_0_ {
dependencies = mapFeatures features ([ libc_0_2_36 ]);
2017-12-12 10:55:15 +00:00
};
2018-01-28 19:29:09 +00:00
hello_0_1_0_features = f: updateFeatures f (rec {
hello_0_1_0.default = (f.hello_0_1_0.default or true);
libc_0_2_36.default = true;
}) [ libc_0_2_36_features ];
libc_0_2_36 = { features?(libc_0_2_36_features {}) }: libc_0_2_36_ {
features = mkFeatures (features.libc_0_2_36 or {});
};
libc_0_2_36_features = f: updateFeatures f (rec {
libc_0_2_36.default = (f.libc_0_2_36.default or true);
libc_0_2_36.use_std =
(f.libc_0_2_36.use_std or false) ||
(f.libc_0_2_36.default or false) ||
(libc_0_2_36.default or false);
}) [];
2017-12-12 10:55:15 +00:00
}
```
Here, the `libc` crate has no `src` attribute, so `buildRustCrate`
will fetch it from [crates.io ](https://crates.io ). A `sha256`
attribute is still needed for Nix purity.
2018-02-20 07:55:04 +00:00
### Handling external dependencies
2017-12-12 10:55:15 +00:00
Some crates require external libraries. For crates from
[crates.io ](https://crates.io ), such libraries can be specified in
`defaultCrateOverrides` package in nixpkgs itself.
Starting from that file, one can add more overrides, to add features
or build inputs by overriding the hello crate in a seperate file.
```
with import < nixpkgs > {};
2018-01-28 19:29:09 +00:00
((import ./hello.nix).hello {}).override {
2017-12-12 10:55:15 +00:00
crateOverrides = defaultCrateOverrides // {
hello = attrs: { buildInputs = [ openssl ]; };
};
}
```
Here, `crateOverrides` is expected to be a attribute set, where the
key is the crate name without version number and the value a function.
The function gets all attributes passed to `buildRustCrate` as first
argument and returns a set that contains all attribute that should be
overwritten.
For more complicated cases, such as when parts of the crate's
derivation depend on the the crate's version, the `attrs` argument of
the override above can be read, as in the following example, which
patches the derivation:
```
with import < nixpkgs > {};
2018-01-28 19:29:09 +00:00
((import ./hello.nix).hello {}).override {
2017-12-12 10:55:15 +00:00
crateOverrides = defaultCrateOverrides // {
hello = attrs: lib.optionalAttrs (lib.versionAtLeast attrs.version "1.0") {
postPatch = ''
substituteInPlace lib/zoneinfo.rs \
--replace "/usr/share/zoneinfo" "${tzdata}/share/zoneinfo"
'';
};
};
}
```
Another situation is when we want to override a nested
dependency. This actually works in the exact same way, since the
`crateOverrides` parameter is forwarded to the crate's
dependencies. For instance, to override the build inputs for crate
`libc` in the example above, where `libc` is a dependency of the main
crate, we could do:
```
with import < nixpkgs > {};
2018-01-28 19:29:09 +00:00
((import hello.nix).hello {}).override {
2017-12-12 10:55:15 +00:00
crateOverrides = defaultCrateOverrides // {
libc = attrs: { buildInputs = []; };
};
}
```
2018-02-20 07:55:04 +00:00
### Options and phases configuration
Actually, the overrides introduced in the previous section are more
general. A number of other parameters can be overridden:
2017-12-12 10:55:15 +00:00
- The version of rustc used to compile the crate:
```
2018-01-28 19:29:09 +00:00
(hello {}).override { rust = pkgs.rust; };
2017-12-12 10:55:15 +00:00
```
- Whether to build in release mode or debug mode (release mode by
default):
```
2018-01-28 19:29:09 +00:00
(hello {}).override { release = false; };
2017-12-12 10:55:15 +00:00
```
- Whether to print the commands sent to rustc when building
(equivalent to `--verbose` in cargo:
```
2018-01-28 19:29:09 +00:00
(hello {}).override { verbose = false; };
2017-12-12 10:55:15 +00:00
```
2018-02-20 07:55:04 +00:00
- Extra arguments to be passed to `rustc` :
```
(hello {}).override { extraRustcOpts = "-Z debuginfo=2"; };
```
- Phases, just like in any other derivation, can be specified using
the following attributes: `preUnpack` , `postUnpack` , `prePatch` ,
`patches` , `postPatch` , `preConfigure` (in the case of a Rust crate,
this is run before calling the "build" script), `postConfigure`
(after the "build" script),`preBuild`, `postBuild` , `preInstall` and
`postInstall` . As an example, here is how to create a new module
before running the build script:
```
(hello {}).override {
preConfigure = ''
echo "pub const PATH=\"${hi.out}\";" >> src/path.rs"
'';
};
```
### Features
2018-01-28 19:29:09 +00:00
One can also supply features switches. For example, if we want to
compile `diesel_cli` only with the `postgres` feature, and no default
features, we would write:
```
(callPackage ./diesel.nix {}).diesel {
default = false;
postgres = true;
}
```
2018-02-20 07:55:04 +00:00
Where `diesel.nix` is the file generated by Carnix, as explained above.
2017-12-12 10:55:15 +00:00
2018-03-28 01:07:19 +00:00
## Setting Up `nix-shell`
Oftentimes you want to develop code from within `nix-shell` . Unfortunately
`buildRustCrate` does not support common `nix-shell` operations directly
(see [this issue ](https://github.com/NixOS/nixpkgs/issues/37945 ))
so we will use `stdenv.mkDerivation` instead.
Using the example `hello` project above, we want to do the following:
- Have access to `cargo` and `rustc`
- Have the `openssl` library available to a crate through it's _normal_
compilation mechanism (`pkg-config`).
A typical `shell.nix` might look like:
```
with import < nixpkgs > {};
stdenv.mkDerivation {
name = "rust-env";
2018-12-13 07:05:30 +00:00
nativeBuildInputs = [
2018-03-28 01:07:19 +00:00
rustc cargo
2018-12-13 07:05:30 +00:00
# Example Build-time Additional Dependencies
pkgconfig
];
buildInputs = [
# Example Run-time Additional Dependencies
openssl
2018-03-28 01:07:19 +00:00
];
# Set Environment Variables
RUST_BACKTRACE = 1;
}
```
You should now be able to run the following:
```
$ nix-shell --pure
$ cargo build
$ cargo test
```
### Controlling Rust Version Inside `nix-shell`
To control your rust version (i.e. use nightly) from within `shell.nix` (or
other nix expressions) you can use the following `shell.nix`
```
# Latest Nightly
with import < nixpkgs > {};
let src = fetchFromGitHub {
owner = "mozilla";
repo = "nixpkgs-mozilla";
2019-06-08 14:15:32 +00:00
# commit from: 2019-05-15
rev = "9f35c4b09fd44a77227e79ff0c1b4b6a69dff533";
sha256 = "18h0nvh55b5an4gmlgfbvwbyqj91bklf1zymis6lbdh75571qaz0";
2018-03-28 01:07:19 +00:00
};
in
with import "${src.out}/rust-overlay.nix" pkgs pkgs;
stdenv.mkDerivation {
name = "rust-env";
buildInputs = [
# Note: to use use stable, just replace `nightly` with `stable`
latest.rustChannels.nightly.rust
# Add some extra dependencies from `pkgs`
pkgconfig openssl
];
# Set Environment Variables
RUST_BACKTRACE = 1;
}
```
Now run:
```
$ rustc --version
rustc 1.26.0-nightly (188e693b3 2018-03-26)
```
To see that you are using nightly.
2017-03-20 19:41:37 +00:00
## Using the Rust nightlies overlay
Mozilla provides an overlay for nixpkgs to bring a nightly version of Rust into scope.
This overlay can _also_ be used to install recent unstable or stable versions
of Rust, if desired.
To use this overlay, clone
[nixpkgs-mozilla ](https://github.com/mozilla/nixpkgs-mozilla ),
and create a symbolic link to the file
[rust-overlay.nix ](https://github.com/mozilla/nixpkgs-mozilla/blob/master/rust-overlay.nix )
in the `~/.config/nixpkgs/overlays` directory.
$ git clone https://github.com/mozilla/nixpkgs-mozilla.git
2017-03-20 19:59:43 +00:00
$ mkdir -p ~/.config/nixpkgs/overlays
2017-03-20 19:41:37 +00:00
$ ln -s $(pwd)/nixpkgs-mozilla/rust-overlay.nix ~/.config/nixpkgs/overlays/rust-overlay.nix
The latest version can be installed with the following command:
2017-08-05 14:38:48 +00:00
$ nix-env -Ai nixos.latest.rustChannels.stable.rust
2017-03-20 19:41:37 +00:00
Or using the attribute with nix-shell:
2017-08-05 14:38:48 +00:00
$ nix-shell -p nixos.latest.rustChannels.stable.rust
2017-03-20 19:41:37 +00:00
To install the beta or nightly channel, "stable" should be substituted by
"nightly" or "beta", or
use the function provided by this overlay to pull a version based on a
build date.
The overlay automatically updates itself as it uses the same source as
[rustup ](https://www.rustup.rs/ ).