2024-03-14 20:35:36 +00:00
|
|
|
|
{ lib, config, stdenv, stdenvNoCC, jq, lndir, runtimeShell, shellcheck-minimal }:
|
2009-11-19 16:07:47 +00:00
|
|
|
|
|
2022-08-13 08:31:18 +00:00
|
|
|
|
let
|
|
|
|
|
inherit (lib)
|
|
|
|
|
optionalAttrs
|
|
|
|
|
warn
|
|
|
|
|
;
|
|
|
|
|
in
|
|
|
|
|
|
2016-09-27 14:36:16 +00:00
|
|
|
|
rec {
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# Docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-runCommand
|
2021-08-15 15:21:15 +00:00
|
|
|
|
runCommand = name: env: runCommandWith {
|
2021-03-18 17:49:40 +00:00
|
|
|
|
stdenv = stdenvNoCC;
|
|
|
|
|
runLocal = false;
|
|
|
|
|
inherit name;
|
|
|
|
|
derivationArgs = env;
|
|
|
|
|
};
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# Docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-runCommandLocal
|
2021-08-15 15:21:15 +00:00
|
|
|
|
runCommandLocal = name: env: runCommandWith {
|
2021-03-18 17:49:40 +00:00
|
|
|
|
stdenv = stdenvNoCC;
|
|
|
|
|
runLocal = true;
|
|
|
|
|
inherit name;
|
|
|
|
|
derivationArgs = env;
|
|
|
|
|
};
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# Docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-runCommandCC
|
2021-03-18 17:49:40 +00:00
|
|
|
|
runCommandCC = name: env: runCommandWith {
|
|
|
|
|
stdenv = stdenv;
|
|
|
|
|
runLocal = false;
|
|
|
|
|
inherit name;
|
|
|
|
|
derivationArgs = env;
|
|
|
|
|
};
|
2019-12-03 18:09:58 +00:00
|
|
|
|
# `runCommandCCLocal` left out on purpose.
|
|
|
|
|
# We shouldn’t force the user to have a cc in scope.
|
2009-11-19 16:07:47 +00:00
|
|
|
|
|
2024-08-08 16:17:13 +00:00
|
|
|
|
# Docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-runCommandWith
|
2021-03-18 17:49:40 +00:00
|
|
|
|
runCommandWith =
|
|
|
|
|
let
|
|
|
|
|
# prevent infinite recursion for the default stdenv value
|
|
|
|
|
defaultStdenv = stdenv;
|
|
|
|
|
in
|
2022-12-19 07:47:54 +00:00
|
|
|
|
{
|
2023-11-13 20:23:34 +00:00
|
|
|
|
# which stdenv to use, defaults to a stdenv with a C compiler, pkgs.stdenv
|
2022-12-19 07:47:54 +00:00
|
|
|
|
stdenv ? defaultStdenv
|
2023-11-13 20:23:34 +00:00
|
|
|
|
# whether to build this derivation locally instead of substituting
|
2022-12-19 07:47:54 +00:00
|
|
|
|
, runLocal ? false
|
2023-11-13 20:23:34 +00:00
|
|
|
|
# extra arguments to pass to stdenv.mkDerivation
|
|
|
|
|
, derivationArgs ? { }
|
|
|
|
|
# name of the resulting derivation
|
2022-12-19 07:47:54 +00:00
|
|
|
|
, name
|
2023-11-13 20:23:34 +00:00
|
|
|
|
# TODO(@Artturin): enable strictDeps always
|
2021-03-18 17:49:40 +00:00
|
|
|
|
}: buildCommand:
|
2023-11-13 20:23:34 +00:00
|
|
|
|
stdenv.mkDerivation ({
|
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
inherit buildCommand name;
|
|
|
|
|
passAsFile = [ "buildCommand" ]
|
|
|
|
|
++ (derivationArgs.passAsFile or [ ]);
|
|
|
|
|
}
|
|
|
|
|
// lib.optionalAttrs (! derivationArgs?meta) {
|
|
|
|
|
pos = let args = builtins.attrNames derivationArgs; in
|
|
|
|
|
if builtins.length args > 0
|
|
|
|
|
then builtins.unsafeGetAttrPos (builtins.head args) derivationArgs
|
|
|
|
|
else null;
|
|
|
|
|
}
|
|
|
|
|
// (lib.optionalAttrs runLocal {
|
|
|
|
|
preferLocalBuild = true;
|
|
|
|
|
allowSubstitutes = false;
|
|
|
|
|
})
|
|
|
|
|
// builtins.removeAttrs derivationArgs [ "passAsFile" ]);
|
2021-03-18 17:49:40 +00:00
|
|
|
|
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# Docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-writeTextFile
|
2009-11-19 16:07:47 +00:00
|
|
|
|
writeTextFile =
|
2024-03-11 10:33:14 +00:00
|
|
|
|
{ name
|
2009-11-19 16:07:47 +00:00
|
|
|
|
, text
|
2024-03-11 10:33:14 +00:00
|
|
|
|
, executable ? false
|
|
|
|
|
, destination ? ""
|
|
|
|
|
, checkPhase ? ""
|
2021-11-08 17:28:58 +00:00
|
|
|
|
, meta ? { }
|
2024-06-20 12:28:54 +00:00
|
|
|
|
, passthru ? { }
|
2023-03-20 04:00:18 +00:00
|
|
|
|
, allowSubstitutes ? false
|
|
|
|
|
, preferLocalBuild ? true
|
2024-03-11 10:33:14 +00:00
|
|
|
|
, derivationArgs ? { }
|
2009-11-19 16:07:47 +00:00
|
|
|
|
}:
|
2024-09-21 21:54:48 +00:00
|
|
|
|
assert lib.assertMsg (destination != "" -> (lib.hasPrefix "/" destination && destination != "/")) ''
|
|
|
|
|
destination must be an absolute path, relative to the derivation's out path,
|
|
|
|
|
got '${destination}' instead.
|
|
|
|
|
|
|
|
|
|
Ensure that the path starts with a / and specifies at least the filename.
|
|
|
|
|
'';
|
|
|
|
|
|
2023-05-27 15:09:44 +00:00
|
|
|
|
let
|
|
|
|
|
matches = builtins.match "/bin/([^/]+)" destination;
|
|
|
|
|
in
|
2012-04-26 15:01:41 +00:00
|
|
|
|
runCommand name
|
2024-01-29 18:03:51 +00:00
|
|
|
|
({
|
2023-11-13 20:23:34 +00:00
|
|
|
|
inherit text executable checkPhase allowSubstitutes preferLocalBuild;
|
2024-01-29 18:03:51 +00:00
|
|
|
|
passAsFile = [ "text" ]
|
|
|
|
|
++ derivationArgs.passAsFile or [ ];
|
2023-11-13 20:23:34 +00:00
|
|
|
|
meta = lib.optionalAttrs (executable && matches != null)
|
|
|
|
|
{
|
|
|
|
|
mainProgram = lib.head matches;
|
2024-01-29 18:03:51 +00:00
|
|
|
|
} // meta // derivationArgs.meta or {};
|
2024-06-20 12:28:54 +00:00
|
|
|
|
passthru = passthru // derivationArgs.passthru or {};
|
|
|
|
|
} // removeAttrs derivationArgs [ "passAsFile" "meta" "passthru" ])
|
2009-11-19 16:07:47 +00:00
|
|
|
|
''
|
2022-02-28 16:51:03 +00:00
|
|
|
|
target=$out${lib.escapeShellArg destination}
|
2021-12-19 22:29:07 +00:00
|
|
|
|
mkdir -p "$(dirname "$target")"
|
2015-12-31 21:14:44 +00:00
|
|
|
|
|
2015-02-18 00:08:03 +00:00
|
|
|
|
if [ -e "$textPath" ]; then
|
2021-12-19 22:29:07 +00:00
|
|
|
|
mv "$textPath" "$target"
|
2015-02-18 00:08:03 +00:00
|
|
|
|
else
|
2021-12-19 22:29:07 +00:00
|
|
|
|
echo -n "$text" > "$target"
|
2015-02-18 00:08:03 +00:00
|
|
|
|
fi
|
2015-12-31 21:14:44 +00:00
|
|
|
|
|
2023-03-29 12:06:45 +00:00
|
|
|
|
if [ -n "$executable" ]; then
|
|
|
|
|
chmod +x "$target"
|
|
|
|
|
fi
|
2016-01-27 22:26:40 +00:00
|
|
|
|
|
2023-03-29 12:06:45 +00:00
|
|
|
|
eval "$checkPhase"
|
2009-11-19 16:07:47 +00:00
|
|
|
|
'';
|
|
|
|
|
|
2024-01-15 08:02:45 +00:00
|
|
|
|
# See doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# or https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-text-writing
|
2024-06-14 19:06:29 +00:00
|
|
|
|
writeText = name: text:
|
|
|
|
|
# TODO: To fully deprecate, replace the assertion with `lib.isString` and remove the warning
|
|
|
|
|
assert lib.assertMsg (lib.strings.isConvertibleWithToString text) ''
|
|
|
|
|
pkgs.writeText ${lib.strings.escapeNixString name}: The second argument should be a string, but it's a ${builtins.typeOf text} instead.'';
|
|
|
|
|
lib.warnIf (! lib.isString text) ''
|
|
|
|
|
pkgs.writeText ${lib.strings.escapeNixString name}: The second argument should be a string, but it's a ${builtins.typeOf text} instead, which is deprecated. Use `toString` to convert the value to a string first.''
|
2024-06-28 06:01:31 +00:00
|
|
|
|
writeTextFile { inherit name text; };
|
2019-05-06 17:08:23 +00:00
|
|
|
|
|
2024-01-15 08:02:45 +00:00
|
|
|
|
# See doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# or https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-text-writing
|
2019-07-07 19:18:37 +00:00
|
|
|
|
writeTextDir = path: text: writeTextFile {
|
|
|
|
|
inherit text;
|
|
|
|
|
name = builtins.baseNameOf path;
|
|
|
|
|
destination = "/${path}";
|
|
|
|
|
};
|
2019-05-06 17:08:23 +00:00
|
|
|
|
|
2024-01-15 08:02:45 +00:00
|
|
|
|
# See doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# or https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-text-writing
|
2023-11-13 20:23:34 +00:00
|
|
|
|
writeScript = name: text: writeTextFile { inherit name text; executable = true; };
|
2019-05-06 17:08:23 +00:00
|
|
|
|
|
2024-01-15 08:02:45 +00:00
|
|
|
|
# See doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# or https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-text-writing
|
2023-07-26 11:46:42 +00:00
|
|
|
|
writeScriptBin = name: text: writeTextFile {
|
|
|
|
|
inherit name text;
|
|
|
|
|
executable = true;
|
|
|
|
|
destination = "/bin/${name}";
|
|
|
|
|
};
|
2009-11-19 16:07:47 +00:00
|
|
|
|
|
2024-01-15 08:02:45 +00:00
|
|
|
|
# See doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# or https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-text-writing
|
2019-05-06 17:08:23 +00:00
|
|
|
|
writeShellScript = name: text:
|
|
|
|
|
writeTextFile {
|
|
|
|
|
inherit name;
|
|
|
|
|
executable = true;
|
|
|
|
|
text = ''
|
|
|
|
|
#!${runtimeShell}
|
|
|
|
|
${text}
|
2023-11-13 20:23:34 +00:00
|
|
|
|
'';
|
2019-05-06 17:08:23 +00:00
|
|
|
|
checkPhase = ''
|
2021-12-19 22:29:07 +00:00
|
|
|
|
${stdenv.shellDryRun} "$target"
|
2019-05-06 17:08:23 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2024-01-15 08:02:45 +00:00
|
|
|
|
# See doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# or https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-text-writing
|
2023-11-13 20:23:34 +00:00
|
|
|
|
writeShellScriptBin = name: text:
|
2016-01-27 22:26:40 +00:00
|
|
|
|
writeTextFile {
|
|
|
|
|
inherit name;
|
|
|
|
|
executable = true;
|
|
|
|
|
destination = "/bin/${name}";
|
|
|
|
|
text = ''
|
2019-02-26 11:45:54 +00:00
|
|
|
|
#!${runtimeShell}
|
2016-01-27 22:26:40 +00:00
|
|
|
|
${text}
|
2023-11-13 20:23:34 +00:00
|
|
|
|
'';
|
2016-01-27 22:26:40 +00:00
|
|
|
|
checkPhase = ''
|
2021-12-19 22:29:07 +00:00
|
|
|
|
${stdenv.shellDryRun} "$target"
|
2016-01-27 22:26:40 +00:00
|
|
|
|
'';
|
2023-08-11 05:09:11 +00:00
|
|
|
|
meta.mainProgram = name;
|
2016-01-27 22:26:40 +00:00
|
|
|
|
};
|
2009-11-19 16:07:47 +00:00
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move parameter documentation to the Nixpkgs manual
|
2024-01-12 21:42:53 +00:00
|
|
|
|
# See doc/build-helpers/trivial-build-helpers.chapter.md
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# or https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-writeShellApplication
|
2021-10-12 19:31:02 +00:00
|
|
|
|
writeShellApplication =
|
2024-01-12 21:42:53 +00:00
|
|
|
|
{
|
|
|
|
|
/*
|
|
|
|
|
The name of the script to write.
|
|
|
|
|
|
|
|
|
|
Type: String
|
|
|
|
|
*/
|
|
|
|
|
name,
|
|
|
|
|
/*
|
|
|
|
|
The shell script's text, not including a shebang.
|
|
|
|
|
|
|
|
|
|
Type: String
|
|
|
|
|
*/
|
|
|
|
|
text,
|
|
|
|
|
/*
|
|
|
|
|
Inputs to add to the shell script's `$PATH` at runtime.
|
|
|
|
|
|
|
|
|
|
Type: [String|Derivation]
|
|
|
|
|
*/
|
|
|
|
|
runtimeInputs ? [ ],
|
|
|
|
|
/*
|
|
|
|
|
Extra environment variables to set at runtime.
|
|
|
|
|
|
|
|
|
|
Type: AttrSet
|
|
|
|
|
*/
|
|
|
|
|
runtimeEnv ? null,
|
|
|
|
|
/*
|
|
|
|
|
`stdenv.mkDerivation`'s `meta` argument.
|
|
|
|
|
|
|
|
|
|
Type: AttrSet
|
|
|
|
|
*/
|
|
|
|
|
meta ? { },
|
2024-06-20 13:38:17 +00:00
|
|
|
|
/*
|
|
|
|
|
`stdenv.mkDerivation`'s `passthru` argument.
|
|
|
|
|
|
|
|
|
|
Type: AttrSet
|
|
|
|
|
*/
|
|
|
|
|
passthru ? { },
|
2024-01-12 21:42:53 +00:00
|
|
|
|
/*
|
|
|
|
|
The `checkPhase` to run. Defaults to `shellcheck` on supported
|
|
|
|
|
platforms and `bash -n`.
|
|
|
|
|
|
|
|
|
|
The script path will be given as `$target` in the `checkPhase`.
|
|
|
|
|
|
|
|
|
|
Type: String
|
|
|
|
|
*/
|
|
|
|
|
checkPhase ? null,
|
|
|
|
|
/*
|
|
|
|
|
Checks to exclude when running `shellcheck`, e.g. `[ "SC2016" ]`.
|
|
|
|
|
|
|
|
|
|
See <https://www.shellcheck.net/wiki/> for a list of checks.
|
|
|
|
|
|
|
|
|
|
Type: [String]
|
|
|
|
|
*/
|
|
|
|
|
excludeShellChecks ? [ ],
|
2024-03-31 19:31:24 +00:00
|
|
|
|
/*
|
|
|
|
|
Extra command-line flags to pass to ShellCheck.
|
|
|
|
|
|
|
|
|
|
Type: [String]
|
|
|
|
|
*/
|
|
|
|
|
extraShellCheckFlags ? [ ],
|
2024-01-12 21:42:53 +00:00
|
|
|
|
/*
|
|
|
|
|
Bash options to activate with `set -o` at the start of the script.
|
|
|
|
|
|
|
|
|
|
Defaults to `[ "errexit" "nounset" "pipefail" ]`.
|
|
|
|
|
|
|
|
|
|
Type: [String]
|
|
|
|
|
*/
|
|
|
|
|
bashOptions ? [ "errexit" "nounset" "pipefail" ],
|
|
|
|
|
/* Extra arguments to pass to `stdenv.mkDerivation`.
|
|
|
|
|
|
|
|
|
|
:::{.caution}
|
|
|
|
|
Certain derivation attributes are used internally,
|
|
|
|
|
overriding those could cause problems.
|
|
|
|
|
:::
|
|
|
|
|
|
|
|
|
|
Type: AttrSet
|
|
|
|
|
*/
|
|
|
|
|
derivationArgs ? { },
|
2021-10-12 19:31:02 +00:00
|
|
|
|
}:
|
|
|
|
|
writeTextFile {
|
2024-06-20 13:38:17 +00:00
|
|
|
|
inherit name meta passthru derivationArgs;
|
2021-10-12 19:31:02 +00:00
|
|
|
|
executable = true;
|
|
|
|
|
destination = "/bin/${name}";
|
2023-03-20 04:00:18 +00:00
|
|
|
|
allowSubstitutes = true;
|
|
|
|
|
preferLocalBuild = false;
|
2021-10-12 19:31:02 +00:00
|
|
|
|
text = ''
|
|
|
|
|
#!${runtimeShell}
|
2024-01-12 21:02:17 +00:00
|
|
|
|
${lib.concatMapStringsSep "\n" (option: "set -o ${option}") bashOptions}
|
2024-01-12 21:30:36 +00:00
|
|
|
|
'' + lib.optionalString (runtimeEnv != null)
|
|
|
|
|
(lib.concatStrings
|
|
|
|
|
(lib.mapAttrsToList
|
|
|
|
|
(name: value: ''
|
|
|
|
|
${lib.toShellVar name value}
|
|
|
|
|
export ${name}
|
|
|
|
|
'')
|
|
|
|
|
runtimeEnv))
|
|
|
|
|
+ lib.optionalString (runtimeInputs != [ ]) ''
|
2021-10-12 19:31:02 +00:00
|
|
|
|
|
2021-10-12 19:53:02 +00:00
|
|
|
|
export PATH="${lib.makeBinPath runtimeInputs}:$PATH"
|
2022-08-22 18:52:27 +00:00
|
|
|
|
'' + ''
|
2021-10-12 19:31:02 +00:00
|
|
|
|
|
|
|
|
|
${text}
|
|
|
|
|
'';
|
|
|
|
|
|
2021-11-08 17:29:14 +00:00
|
|
|
|
checkPhase =
|
2023-06-28 14:07:13 +00:00
|
|
|
|
# GHC (=> shellcheck) isn't supported on some platforms (such as risc-v)
|
|
|
|
|
# but we still want to use writeShellApplication on those platforms
|
|
|
|
|
let
|
2023-10-31 21:48:22 +00:00
|
|
|
|
shellcheckSupported = lib.meta.availableOn stdenv.buildPlatform shellcheck-minimal.compiler;
|
2024-03-31 19:31:24 +00:00
|
|
|
|
excludeFlags = lib.optionals (excludeShellChecks != [ ]) [ "--exclude" (lib.concatStringsSep "," excludeShellChecks) ];
|
2023-06-28 14:07:13 +00:00
|
|
|
|
shellcheckCommand = lib.optionalString shellcheckSupported ''
|
|
|
|
|
# use shellcheck which does not include docs
|
|
|
|
|
# pandoc takes long to build and documentation isn't needed for just running the cli
|
2024-03-31 19:31:24 +00:00
|
|
|
|
${lib.getExe shellcheck-minimal} ${lib.escapeShellArgs (excludeFlags ++ extraShellCheckFlags)} "$target"
|
2023-06-28 14:07:13 +00:00
|
|
|
|
'';
|
|
|
|
|
in
|
2021-11-08 17:29:14 +00:00
|
|
|
|
if checkPhase == null then ''
|
|
|
|
|
runHook preCheck
|
2021-12-19 22:29:07 +00:00
|
|
|
|
${stdenv.shellDryRun} "$target"
|
2023-06-28 14:07:13 +00:00
|
|
|
|
${shellcheckCommand}
|
2021-11-08 17:29:14 +00:00
|
|
|
|
runHook postCheck
|
|
|
|
|
''
|
|
|
|
|
else checkPhase;
|
2021-10-12 19:31:02 +00:00
|
|
|
|
};
|
|
|
|
|
|
2018-05-23 07:18:44 +00:00
|
|
|
|
# Create a C binary
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: add to writers? pkgs/build-support/writers
|
2023-09-21 01:09:34 +00:00
|
|
|
|
writeCBin = pname: code:
|
|
|
|
|
runCommandCC pname
|
2023-11-13 20:23:34 +00:00
|
|
|
|
{
|
|
|
|
|
inherit pname code;
|
|
|
|
|
executable = true;
|
|
|
|
|
passAsFile = [ "code" ];
|
|
|
|
|
# Pointless to do this on a remote machine.
|
|
|
|
|
preferLocalBuild = true;
|
|
|
|
|
allowSubstitutes = false;
|
|
|
|
|
meta = {
|
|
|
|
|
mainProgram = pname;
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
''
|
|
|
|
|
n=$out/bin/${pname}
|
|
|
|
|
mkdir -p "$(dirname "$n")"
|
|
|
|
|
mv "$codePath" code.c
|
|
|
|
|
$CC -x c code.c -o "$n"
|
|
|
|
|
'';
|
2018-05-23 07:18:44 +00:00
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: deduplicate with documentation in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# see also https://github.com/NixOS/nixpkgs/pull/249721
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-concatText
|
2021-11-28 00:28:11 +00:00
|
|
|
|
/* concat a list of files to the nix store.
|
2023-02-02 10:20:02 +00:00
|
|
|
|
The contents of files are added to the file in the store.
|
|
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# Writes my-file to /nix/store/<store path>
|
|
|
|
|
concatTextFile {
|
|
|
|
|
name = "my-file";
|
|
|
|
|
files = [ drv1 "${drv2}/path/to/file" ];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
See also the `concatText` helper function below.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# Writes executable my-file to /nix/store/<store path>/bin/my-file
|
|
|
|
|
concatTextFile {
|
|
|
|
|
name = "my-file";
|
|
|
|
|
files = [ drv1 "${drv2}/path/to/file" ];
|
|
|
|
|
executable = true;
|
|
|
|
|
destination = "/bin/my-file";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2021-11-28 00:28:11 +00:00
|
|
|
|
*/
|
|
|
|
|
concatTextFile =
|
|
|
|
|
{ name # the name of the derivation
|
|
|
|
|
, files
|
|
|
|
|
, executable ? false # run chmod +x ?
|
|
|
|
|
, destination ? "" # relative path appended to $out eg "/bin/foo"
|
|
|
|
|
, checkPhase ? "" # syntax checks, e.g. for scripts
|
|
|
|
|
, meta ? { }
|
2024-06-20 13:38:01 +00:00
|
|
|
|
, passthru ? { }
|
2021-11-28 00:28:11 +00:00
|
|
|
|
}:
|
|
|
|
|
runCommandLocal name
|
2024-06-20 13:38:01 +00:00
|
|
|
|
{ inherit files executable checkPhase meta passthru destination; }
|
2021-11-28 00:28:11 +00:00
|
|
|
|
''
|
2021-11-28 18:33:22 +00:00
|
|
|
|
file=$out$destination
|
|
|
|
|
mkdir -p "$(dirname "$file")"
|
|
|
|
|
cat $files > "$file"
|
2021-11-28 00:28:11 +00:00
|
|
|
|
|
2023-03-29 12:06:45 +00:00
|
|
|
|
if [ -n "$executable" ]; then
|
|
|
|
|
chmod +x "$file"
|
|
|
|
|
fi
|
|
|
|
|
|
2021-11-28 00:28:11 +00:00
|
|
|
|
eval "$checkPhase"
|
|
|
|
|
'';
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: deduplicate with documentation in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# see also https://github.com/NixOS/nixpkgs/pull/249721
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-concatText
|
2021-11-28 00:28:11 +00:00
|
|
|
|
/*
|
2023-02-02 10:20:02 +00:00
|
|
|
|
Writes a text file to nix store with no optional parameters available.
|
|
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# Writes contents of files to /nix/store/<store path>
|
|
|
|
|
concatText "my-file" [ file1 file2 ]
|
|
|
|
|
|
|
|
|
|
|
2021-11-28 00:28:11 +00:00
|
|
|
|
*/
|
|
|
|
|
concatText = name: files: concatTextFile { inherit name files; };
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: deduplicate with documentation in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# see also https://github.com/NixOS/nixpkgs/pull/249721
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-concatText
|
2023-02-02 10:20:02 +00:00
|
|
|
|
/*
|
|
|
|
|
Writes a text file to nix store with and mark it as executable.
|
|
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
# Writes contents of files to /nix/store/<store path>
|
|
|
|
|
concatScript "my-file" [ file1 file2 ]
|
|
|
|
|
|
2021-11-28 00:28:11 +00:00
|
|
|
|
*/
|
2021-11-28 20:43:17 +00:00
|
|
|
|
concatScript = name: files: concatTextFile { inherit name files; executable = true; };
|
2021-11-28 00:28:11 +00:00
|
|
|
|
|
|
|
|
|
|
2017-10-30 17:13:50 +00:00
|
|
|
|
/*
|
2024-03-11 10:33:14 +00:00
|
|
|
|
TODO: Deduplicate this documentation.
|
|
|
|
|
More docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-symlinkJoin
|
|
|
|
|
|
2024-01-15 22:03:14 +00:00
|
|
|
|
Create a forest of symlinks to the files in `paths`.
|
2023-02-02 10:20:02 +00:00
|
|
|
|
|
|
|
|
|
This creates a single derivation that replicates the directory structure
|
|
|
|
|
of all the input paths.
|
|
|
|
|
|
|
|
|
|
BEWARE: it may not "work right" when the passed paths contain symlinks to directories.
|
|
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# adds symlinks of hello to current build.
|
|
|
|
|
symlinkJoin { name = "myhello"; paths = [ pkgs.hello ]; }
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# adds symlinks of hello and stack to current build and prints "links added"
|
|
|
|
|
symlinkJoin { name = "myexample"; paths = [ pkgs.hello pkgs.stack ]; postBuild = "echo links added"; }
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This creates a derivation with a directory structure like the following:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/nix/store/sglsr5g079a5235hy29da3mq3hv8sjmm-myexample
|
|
|
|
|
|-- bin
|
|
|
|
|
| |-- hello -> /nix/store/qy93dp4a3rqyn2mz63fbxjg228hffwyw-hello-2.10/bin/hello
|
|
|
|
|
| `-- stack -> /nix/store/6lzdpxshx78281vy056lbk553ijsdr44-stack-2.1.3.1/bin/stack
|
|
|
|
|
`-- share
|
|
|
|
|
|-- bash-completion
|
|
|
|
|
| `-- completions
|
|
|
|
|
| `-- stack -> /nix/store/6lzdpxshx78281vy056lbk553ijsdr44-stack-2.1.3.1/share/bash-completion/completions/stack
|
|
|
|
|
|-- fish
|
|
|
|
|
| `-- vendor_completions.d
|
|
|
|
|
| `-- stack.fish -> /nix/store/6lzdpxshx78281vy056lbk553ijsdr44-stack-2.1.3.1/share/fish/vendor_completions.d/stack.fish
|
|
|
|
|
...
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
symlinkJoin and linkFarm are similar functions, but they output
|
|
|
|
|
derivations with different structure.
|
|
|
|
|
|
|
|
|
|
symlinkJoin is used to create a derivation with a familiar directory
|
|
|
|
|
structure (top-level bin/, share/, etc), but with all actual files being symlinks to
|
|
|
|
|
the files in the input derivations.
|
|
|
|
|
|
|
|
|
|
symlinkJoin is used many places in nixpkgs to create a single derivation
|
|
|
|
|
that appears to contain binaries, libraries, documentation, etc from
|
|
|
|
|
multiple input derivations.
|
|
|
|
|
|
|
|
|
|
linkFarm is instead used to create a simple derivation with symlinks to
|
|
|
|
|
other derivations. A derivation created with linkFarm is often used in CI
|
|
|
|
|
as a easy way to build multiple derivations at once.
|
2020-02-14 04:46:49 +00:00
|
|
|
|
*/
|
2016-04-26 12:10:42 +00:00
|
|
|
|
symlinkJoin =
|
2024-09-26 12:52:50 +00:00
|
|
|
|
args_@{
|
|
|
|
|
name ?
|
|
|
|
|
assert lib.assertMsg (args_ ? pname && args_ ? version)
|
|
|
|
|
"symlinkJoin requires either a `name` OR `pname` and `version`";
|
|
|
|
|
"${args_.pname}-${args_.version}"
|
2023-11-13 20:23:34 +00:00
|
|
|
|
, paths
|
|
|
|
|
, preferLocalBuild ? true
|
|
|
|
|
, allowSubstitutes ? false
|
|
|
|
|
, postBuild ? ""
|
|
|
|
|
, ...
|
|
|
|
|
}:
|
2016-07-14 13:30:30 +00:00
|
|
|
|
let
|
|
|
|
|
args = removeAttrs args_ [ "name" "postBuild" ]
|
2020-02-17 10:45:44 +00:00
|
|
|
|
// {
|
2023-11-13 20:23:34 +00:00
|
|
|
|
inherit preferLocalBuild allowSubstitutes;
|
|
|
|
|
passAsFile = [ "paths" ];
|
|
|
|
|
}; # pass the defaults
|
|
|
|
|
in
|
|
|
|
|
runCommand name args
|
2009-11-19 16:07:47 +00:00
|
|
|
|
''
|
|
|
|
|
mkdir -p $out
|
2020-02-17 10:45:44 +00:00
|
|
|
|
for i in $(cat $pathsPath); do
|
2023-03-29 12:34:08 +00:00
|
|
|
|
${lndir}/bin/lndir -silent $i $out
|
|
|
|
|
done
|
2016-04-26 12:10:42 +00:00
|
|
|
|
${postBuild}
|
2009-11-19 16:07:47 +00:00
|
|
|
|
'';
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move linkFarm docs to the Nixpkgs manual
|
2020-02-14 04:46:49 +00:00
|
|
|
|
/*
|
2023-02-02 10:20:02 +00:00
|
|
|
|
Quickly create a set of symlinks to derivations.
|
|
|
|
|
|
|
|
|
|
This creates a simple derivation with symlinks to all inputs.
|
|
|
|
|
|
|
|
|
|
entries can be a list of attribute sets like
|
|
|
|
|
|
|
|
|
|
[ { name = "name" ; path = "/nix/store/..."; } ]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
or an attribute set name -> path like:
|
|
|
|
|
|
|
|
|
|
{ name = "/nix/store/..."; other = "/nix/store/..."; }
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
|
|
# Symlinks hello and stack paths in store to current $out/hello-test and
|
|
|
|
|
# $out/foobar.
|
|
|
|
|
linkFarm "myexample" [ { name = "hello-test"; path = pkgs.hello; } { name = "foobar"; path = pkgs.stack; } ]
|
|
|
|
|
|
|
|
|
|
This creates a derivation with a directory structure like the following:
|
|
|
|
|
|
|
|
|
|
/nix/store/qc5728m4sa344mbks99r3q05mymwm4rw-myexample
|
|
|
|
|
|-- foobar -> /nix/store/6lzdpxshx78281vy056lbk553ijsdr44-stack-2.1.3.1
|
|
|
|
|
`-- hello-test -> /nix/store/qy93dp4a3rqyn2mz63fbxjg228hffwyw-hello-2.10
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
See the note on symlinkJoin for the difference between linkFarm and symlinkJoin.
|
2020-02-14 04:46:49 +00:00
|
|
|
|
*/
|
2022-04-25 23:17:21 +00:00
|
|
|
|
linkFarm = name: entries:
|
2023-11-13 20:23:34 +00:00
|
|
|
|
let
|
|
|
|
|
entries' =
|
|
|
|
|
if (lib.isAttrs entries) then entries
|
|
|
|
|
# We do this foldl to have last-wins semantics in case of repeated entries
|
|
|
|
|
else if (lib.isList entries) then lib.foldl (a: b: a // { "${b.name}" = b.path; }) { } entries
|
|
|
|
|
else throw "linkFarm entries must be either attrs or a list!";
|
|
|
|
|
|
|
|
|
|
linkCommands = lib.mapAttrsToList
|
|
|
|
|
(name: path: ''
|
|
|
|
|
mkdir -p "$(dirname ${lib.escapeShellArg "${name}"})"
|
|
|
|
|
ln -s ${lib.escapeShellArg "${path}"} ${lib.escapeShellArg "${name}"}
|
|
|
|
|
'')
|
|
|
|
|
entries';
|
|
|
|
|
in
|
|
|
|
|
runCommand name
|
|
|
|
|
{
|
|
|
|
|
preferLocalBuild = true;
|
|
|
|
|
allowSubstitutes = false;
|
|
|
|
|
passthru.entries = entries';
|
|
|
|
|
} ''
|
|
|
|
|
mkdir -p $out
|
|
|
|
|
cd $out
|
|
|
|
|
${lib.concatStrings linkCommands}
|
|
|
|
|
'';
|
2020-02-14 04:46:49 +00:00
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move linkFarmFromDrvs docs to the Nixpkgs manual
|
2020-02-14 04:46:49 +00:00
|
|
|
|
/*
|
2023-02-02 10:20:02 +00:00
|
|
|
|
Easily create a linkFarm from a set of derivations.
|
|
|
|
|
|
|
|
|
|
This calls linkFarm with a list of entries created from the list of input
|
|
|
|
|
derivations. It turns each input derivation into an attribute set
|
|
|
|
|
like { name = drv.name ; path = drv }, and passes this to linkFarm.
|
|
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
|
|
# Symlinks the hello, gcc, and ghc derivations in $out
|
|
|
|
|
linkFarmFromDrvs "myexample" [ pkgs.hello pkgs.gcc pkgs.ghc ]
|
|
|
|
|
|
|
|
|
|
This creates a derivation with a directory structure like the following:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/nix/store/m3s6wkjy9c3wy830201bqsb91nk2yj8c-myexample
|
|
|
|
|
|-- gcc-wrapper-9.2.0 -> /nix/store/fqhjxf9ii4w4gqcsx59fyw2vvj91486a-gcc-wrapper-9.2.0
|
|
|
|
|
|-- ghc-8.6.5 -> /nix/store/gnf3s07bglhbbk4y6m76sbh42siym0s6-ghc-8.6.5
|
|
|
|
|
`-- hello-2.10 -> /nix/store/k0ll91c4npk4lg8lqhx00glg2m735g74-hello-2.10
|
|
|
|
|
|
|
|
|
|
*/
|
2020-02-14 04:46:49 +00:00
|
|
|
|
linkFarmFromDrvs = name: drvs:
|
|
|
|
|
let mkEntryFromDrv = drv: { name = drv.name; path = drv; };
|
|
|
|
|
in linkFarm name (map mkEntryFromDrv drvs);
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move onlyBin docs to the Nixpkgs manual
|
2023-11-09 22:08:19 +00:00
|
|
|
|
/*
|
|
|
|
|
Produce a derivation that links to the target derivation's `/bin`,
|
|
|
|
|
and *only* `/bin`.
|
|
|
|
|
|
|
|
|
|
This is useful when your favourite package doesn't have a separate
|
|
|
|
|
bin output and other contents of the package's output (e.g. setup
|
|
|
|
|
hooks) cause trouble when used in your environment.
|
|
|
|
|
*/
|
2023-11-13 20:23:34 +00:00
|
|
|
|
onlyBin = drv: runCommand "${drv.name}-only-bin" { } ''
|
2023-11-09 22:08:19 +00:00
|
|
|
|
mkdir -p $out
|
|
|
|
|
ln -s ${lib.getBin drv}/bin $out/bin
|
|
|
|
|
'';
|
|
|
|
|
|
2009-11-19 16:07:47 +00:00
|
|
|
|
|
2024-07-18 11:15:53 +00:00
|
|
|
|
# Docs in doc/build-helpers/special/makesetuphook.section.md
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#sec-pkgs.makeSetupHook
|
2023-01-18 16:30:55 +00:00
|
|
|
|
makeSetupHook =
|
|
|
|
|
{ name ? lib.warn "calling makeSetupHook without passing a name is deprecated." "hook"
|
2022-12-30 20:14:00 +00:00
|
|
|
|
, deps ? [ ]
|
2024-05-27 22:40:50 +00:00
|
|
|
|
# hooks go in nativeBuildInputs so these will be nativeBuildInputs
|
2022-12-30 20:14:00 +00:00
|
|
|
|
, propagatedBuildInputs ? [ ]
|
|
|
|
|
# these will be buildInputs
|
|
|
|
|
, depsTargetTargetPropagated ? [ ]
|
|
|
|
|
, meta ? { }
|
|
|
|
|
, passthru ? { }
|
|
|
|
|
, substitutions ? { }
|
2023-01-18 16:30:55 +00:00
|
|
|
|
}:
|
|
|
|
|
script:
|
2022-03-22 18:20:58 +00:00
|
|
|
|
runCommand name
|
|
|
|
|
(substitutions // {
|
2023-06-30 16:37:17 +00:00
|
|
|
|
# TODO(@Artturin:) substitutions should be inside the env attrset
|
|
|
|
|
# but users are likely passing non-substitution arguments through substitutions
|
|
|
|
|
# turn off __structuredAttrs to unbreak substituteAll
|
|
|
|
|
__structuredAttrs = false;
|
2022-03-22 18:20:58 +00:00
|
|
|
|
inherit meta;
|
2022-12-30 20:14:00 +00:00
|
|
|
|
inherit depsTargetTargetPropagated;
|
|
|
|
|
propagatedBuildInputs =
|
|
|
|
|
# remove list conditionals before 23.11
|
2023-01-01 20:27:28 +00:00
|
|
|
|
lib.warnIf (!lib.isList deps) "'deps' argument to makeSetupHook must be a list. content of deps: ${toString deps}"
|
|
|
|
|
(lib.warnIf (deps != [ ]) "'deps' argument to makeSetupHook is deprecated and will be removed in release 23.11., Please use propagatedBuildInputs instead. content of deps: ${toString deps}"
|
|
|
|
|
propagatedBuildInputs ++ (if lib.isList deps then deps else [ deps ]));
|
2022-05-21 16:58:22 +00:00
|
|
|
|
strictDeps = true;
|
2022-08-13 08:31:18 +00:00
|
|
|
|
# TODO 2023-01, no backport: simplify to inherit passthru;
|
|
|
|
|
passthru = passthru
|
|
|
|
|
// optionalAttrs (substitutions?passthru)
|
2023-11-13 20:23:34 +00:00
|
|
|
|
(warn "makeSetupHook (name = ${lib.strings.escapeNixString name}): `substitutions.passthru` is deprecated. Please set `passthru` directly."
|
|
|
|
|
substitutions.passthru);
|
2022-03-22 18:20:58 +00:00
|
|
|
|
})
|
2011-03-28 16:33:33 +00:00
|
|
|
|
(''
|
2012-01-18 20:16:00 +00:00
|
|
|
|
mkdir -p $out/nix-support
|
2009-11-19 16:07:47 +00:00
|
|
|
|
cp ${script} $out/nix-support/setup-hook
|
2022-12-30 20:14:00 +00:00
|
|
|
|
recordPropagatedDependencies
|
2023-11-13 20:23:34 +00:00
|
|
|
|
'' + lib.optionalString (substitutions != { }) ''
|
2011-03-29 15:19:59 +00:00
|
|
|
|
substituteAll ${script} $out/nix-support/setup-hook
|
2011-03-28 16:33:33 +00:00
|
|
|
|
'');
|
2009-11-19 16:07:47 +00:00
|
|
|
|
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# Docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-writeReferencesToFile
|
2024-03-14 20:35:36 +00:00
|
|
|
|
# TODO: Convert to throw after Nixpkgs 24.05 branch-off.
|
|
|
|
|
writeReferencesToFile = (if config.allowAliases then lib.warn else throw)
|
|
|
|
|
"writeReferencesToFile is deprecated in favour of writeClosure"
|
|
|
|
|
(path: writeClosure [ path ]);
|
|
|
|
|
|
|
|
|
|
# Docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-writeClosure
|
|
|
|
|
writeClosure = paths: runCommand "runtime-deps"
|
2009-11-19 16:07:47 +00:00
|
|
|
|
{
|
2024-03-14 20:35:36 +00:00
|
|
|
|
# Get the cleaner exportReferencesGraph interface
|
|
|
|
|
__structuredAttrs = true;
|
|
|
|
|
exportReferencesGraph.graph = paths;
|
|
|
|
|
nativeBuildInputs = [ jq ];
|
2009-11-19 16:07:47 +00:00
|
|
|
|
}
|
|
|
|
|
''
|
2024-03-14 20:35:36 +00:00
|
|
|
|
jq -r ".graph | map(.path) | sort | .[]" "$NIX_ATTRS_JSON_FILE" > "$out"
|
2009-11-19 16:07:47 +00:00
|
|
|
|
'';
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# Docs in doc/build-helpers/trivial-build-helpers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#trivial-builder-writeDirectReferencesToFile
|
2021-05-14 15:27:25 +00:00
|
|
|
|
writeDirectReferencesToFile = path: runCommand "runtime-references"
|
|
|
|
|
{
|
2023-11-13 20:23:34 +00:00
|
|
|
|
exportReferencesGraph = [ "graph" path ];
|
2021-05-14 15:27:25 +00:00
|
|
|
|
inherit path;
|
|
|
|
|
}
|
|
|
|
|
''
|
|
|
|
|
touch ./references
|
|
|
|
|
while read p; do
|
|
|
|
|
read dummy
|
|
|
|
|
read nrRefs
|
|
|
|
|
if [[ $p == $path ]]; then
|
|
|
|
|
for ((i = 0; i < nrRefs; i++)); do
|
|
|
|
|
read ref;
|
|
|
|
|
echo $ref >>./references
|
|
|
|
|
done
|
|
|
|
|
else
|
|
|
|
|
for ((i = 0; i < nrRefs; i++)); do
|
|
|
|
|
read ref;
|
|
|
|
|
done
|
|
|
|
|
fi
|
|
|
|
|
done < graph
|
|
|
|
|
sort ./references >$out
|
|
|
|
|
'';
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move writeStringReferencesToFile docs to the Nixpkgs manual
|
2021-10-15 15:22:37 +00:00
|
|
|
|
/*
|
2023-02-02 10:20:02 +00:00
|
|
|
|
Extract a string's references to derivations and paths (its
|
|
|
|
|
context) and write them to a text file, removing the input string
|
|
|
|
|
itself from the dependency graph. This is useful when you want to
|
|
|
|
|
make a derivation depend on the string's references, but not its
|
|
|
|
|
contents (to avoid unnecessary rebuilds, for example).
|
|
|
|
|
|
|
|
|
|
Note that this only works as intended on Nix >= 2.3.
|
2021-10-15 15:22:37 +00:00
|
|
|
|
*/
|
|
|
|
|
writeStringReferencesToFile = string:
|
|
|
|
|
/*
|
2023-11-13 20:23:34 +00:00
|
|
|
|
The basic operation this performs is to copy the string context
|
2024-01-15 22:03:14 +00:00
|
|
|
|
from `string` to a second string and wrap that string in a
|
2023-11-13 20:23:34 +00:00
|
|
|
|
derivation. However, that alone is not enough, since nothing in the
|
|
|
|
|
string refers to the output paths of the derivations/paths in its
|
|
|
|
|
context, meaning they'll be considered build-time dependencies and
|
|
|
|
|
removed from the wrapper derivation's closure. Putting the
|
|
|
|
|
necessary output paths in the new string is however not very
|
2024-01-15 22:03:14 +00:00
|
|
|
|
straightforward - the attrset returned by `getContext` contains
|
2023-11-13 20:23:34 +00:00
|
|
|
|
only references to derivations' .drv-paths, not their output
|
|
|
|
|
paths. In order to "convert" them, we try to extract the
|
|
|
|
|
corresponding paths from the original string using regex.
|
2021-10-15 15:22:37 +00:00
|
|
|
|
*/
|
|
|
|
|
let
|
|
|
|
|
# Taken from https://github.com/NixOS/nix/blob/130284b8508dad3c70e8160b15f3d62042fc730a/src/libutil/hash.cc#L84
|
|
|
|
|
nixHashChars = "0123456789abcdfghijklmnpqrsvwxyz";
|
|
|
|
|
context = builtins.getContext string;
|
|
|
|
|
derivations = lib.filterAttrs (n: v: v ? outputs) context;
|
|
|
|
|
# Objects copied from outside of the store, such as paths and
|
|
|
|
|
# `builtins.fetch*`ed ones
|
|
|
|
|
sources = lib.attrNames (lib.filterAttrs (n: v: v ? path) context);
|
|
|
|
|
packages =
|
|
|
|
|
lib.mapAttrs'
|
|
|
|
|
(name: value:
|
|
|
|
|
{
|
|
|
|
|
inherit value;
|
|
|
|
|
name = lib.head (builtins.match "${builtins.storeDir}/[${nixHashChars}]+-(.*)\.drv" name);
|
|
|
|
|
})
|
|
|
|
|
derivations;
|
|
|
|
|
# The syntax of output paths differs between outputs named `out`
|
|
|
|
|
# and other, explicitly named ones. For explicitly named ones,
|
|
|
|
|
# the output name is suffixed as `-name`, but `out` outputs
|
|
|
|
|
# aren't suffixed at all, and thus aren't easily distinguished
|
|
|
|
|
# from named output paths. Therefore, we find all the named ones
|
|
|
|
|
# first so we can use them to remove false matches when looking
|
|
|
|
|
# for `out` outputs (see the definition of `outputPaths`).
|
|
|
|
|
namedOutputPaths =
|
|
|
|
|
lib.flatten
|
|
|
|
|
(lib.mapAttrsToList
|
|
|
|
|
(name: value:
|
|
|
|
|
(map
|
|
|
|
|
(output:
|
|
|
|
|
lib.filter
|
|
|
|
|
lib.isList
|
|
|
|
|
(builtins.split "(${builtins.storeDir}/[${nixHashChars}]+-${name}-${output})" string))
|
|
|
|
|
(lib.remove "out" value.outputs)))
|
|
|
|
|
packages);
|
|
|
|
|
# Only `out` outputs
|
|
|
|
|
outputPaths =
|
|
|
|
|
lib.flatten
|
|
|
|
|
(lib.mapAttrsToList
|
|
|
|
|
(name: value:
|
|
|
|
|
if lib.elem "out" value.outputs then
|
|
|
|
|
lib.filter
|
|
|
|
|
(x: lib.isList x &&
|
2023-11-13 20:23:34 +00:00
|
|
|
|
# If the matched path is in `namedOutputPaths`,
|
|
|
|
|
# it's a partial match of an output path where
|
|
|
|
|
# the output name isn't `out`
|
|
|
|
|
lib.all (o: !lib.hasPrefix (lib.head x) o) namedOutputPaths)
|
2021-10-15 15:22:37 +00:00
|
|
|
|
(builtins.split "(${builtins.storeDir}/[${nixHashChars}]+-${name})" string)
|
|
|
|
|
else
|
2023-11-13 20:23:34 +00:00
|
|
|
|
[ ])
|
2021-10-15 15:22:37 +00:00
|
|
|
|
packages);
|
|
|
|
|
allPaths = lib.concatStringsSep "\n" (lib.unique (sources ++ namedOutputPaths ++ outputPaths));
|
|
|
|
|
allPathsWithContext = builtins.appendContext allPaths context;
|
|
|
|
|
in
|
2023-11-13 20:23:34 +00:00
|
|
|
|
if builtins ? getContext then
|
|
|
|
|
writeText "string-references" allPathsWithContext
|
|
|
|
|
else
|
|
|
|
|
writeDirectReferencesToFile (writeText "string-file" string);
|
2021-10-15 15:22:37 +00:00
|
|
|
|
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# Docs in doc/build-helpers/fetchers.chapter.md
|
|
|
|
|
# See https://nixos.org/manual/nixpkgs/unstable/#requirefile
|
2023-11-13 20:23:34 +00:00
|
|
|
|
requireFile =
|
|
|
|
|
{ name ? null
|
|
|
|
|
, sha256 ? null
|
|
|
|
|
, sha1 ? null
|
|
|
|
|
, hash ? null
|
|
|
|
|
, url ? null
|
|
|
|
|
, message ? null
|
|
|
|
|
, hashMode ? "flat"
|
|
|
|
|
}:
|
|
|
|
|
assert (message != null) || (url != null);
|
|
|
|
|
assert (sha256 != null) || (sha1 != null) || (hash != null);
|
|
|
|
|
assert (name != null) || (url != null);
|
|
|
|
|
let
|
|
|
|
|
msg =
|
|
|
|
|
if message != null then message
|
|
|
|
|
else ''
|
|
|
|
|
Unfortunately, we cannot download file ${name_} automatically.
|
|
|
|
|
Please go to ${url} to download it yourself, and add it to the Nix store
|
|
|
|
|
using either
|
|
|
|
|
nix-store --add-fixed ${hashAlgo} ${name_}
|
|
|
|
|
or
|
|
|
|
|
nix-prefetch-url --type ${hashAlgo} file:///path/to/${name_}
|
|
|
|
|
'';
|
|
|
|
|
hashAlgo =
|
|
|
|
|
if hash != null then (builtins.head (lib.strings.splitString "-" hash))
|
|
|
|
|
else if sha256 != null then "sha256"
|
|
|
|
|
else "sha1";
|
|
|
|
|
hashAlgo_ = if hash != null then "" else hashAlgo;
|
|
|
|
|
hash_ =
|
|
|
|
|
if hash != null then hash
|
|
|
|
|
else if sha256 != null then sha256
|
|
|
|
|
else sha1;
|
|
|
|
|
name_ = if name == null then baseNameOf (toString url) else name;
|
|
|
|
|
in
|
|
|
|
|
stdenvNoCC.mkDerivation {
|
|
|
|
|
name = name_;
|
|
|
|
|
outputHashMode = hashMode;
|
|
|
|
|
outputHashAlgo = hashAlgo_;
|
|
|
|
|
outputHash = hash_;
|
|
|
|
|
preferLocalBuild = true;
|
|
|
|
|
allowSubstitutes = false;
|
|
|
|
|
builder = writeScript "restrict-message" ''
|
|
|
|
|
source ${stdenvNoCC}/setup
|
|
|
|
|
cat <<_EOF_
|
|
|
|
|
|
|
|
|
|
***
|
|
|
|
|
${msg}
|
|
|
|
|
***
|
|
|
|
|
|
|
|
|
|
_EOF_
|
|
|
|
|
exit 1
|
|
|
|
|
'';
|
|
|
|
|
};
|
2010-05-03 09:13:17 +00:00
|
|
|
|
|
2016-09-27 12:10:36 +00:00
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move copyPathToStore docs to the Nixpkgs manual
|
2023-02-02 10:20:02 +00:00
|
|
|
|
/*
|
|
|
|
|
Copy a path to the Nix store.
|
|
|
|
|
Nix automatically copies files to the store before stringifying paths.
|
|
|
|
|
If you need the store path of a file, ${copyPathToStore <path>} can be
|
|
|
|
|
shortened to ${<path>}.
|
|
|
|
|
*/
|
2015-12-16 21:00:44 +00:00
|
|
|
|
copyPathToStore = builtins.filterSource (p: t: true);
|
|
|
|
|
|
2016-09-27 12:10:36 +00:00
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move copyPathsToStore docs to the Nixpkgs manual
|
2023-02-02 10:20:02 +00:00
|
|
|
|
/*
|
|
|
|
|
Copy a list of paths to the Nix store.
|
|
|
|
|
*/
|
2015-12-16 21:00:44 +00:00
|
|
|
|
copyPathsToStore = builtins.map copyPathToStore;
|
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move applyPatches docs to the Nixpkgs manual
|
2019-09-02 09:13:19 +00:00
|
|
|
|
/* Applies a list of patches to a source directory.
|
2023-02-02 10:20:02 +00:00
|
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
|
|
# Patching nixpkgs:
|
|
|
|
|
|
|
|
|
|
applyPatches {
|
|
|
|
|
src = pkgs.path;
|
|
|
|
|
patches = [
|
|
|
|
|
(pkgs.fetchpatch {
|
|
|
|
|
url = "https://github.com/NixOS/nixpkgs/commit/1f770d20550a413e508e081ddc08464e9d08ba3d.patch";
|
|
|
|
|
sha256 = "1nlzx171y3r3jbk0qhvnl711kmdk57jlq4na8f8bs8wz2pbffymr";
|
|
|
|
|
})
|
|
|
|
|
];
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-02 09:13:19 +00:00
|
|
|
|
*/
|
|
|
|
|
applyPatches =
|
|
|
|
|
{ src
|
|
|
|
|
, name ? (if builtins.typeOf src == "path"
|
2023-11-13 20:23:34 +00:00
|
|
|
|
then builtins.baseNameOf src
|
|
|
|
|
else
|
|
|
|
|
if builtins.isAttrs src && builtins.hasAttr "name" src
|
|
|
|
|
then src.name
|
|
|
|
|
else throw "applyPatches: please supply a `name` argument because a default name can only be computed when the `src` is a path or is an attribute set with a `name` attribute."
|
|
|
|
|
) + "-patched"
|
|
|
|
|
, patches ? [ ]
|
2024-02-29 00:29:48 +00:00
|
|
|
|
, prePatch ? ""
|
2019-09-02 09:13:19 +00:00
|
|
|
|
, postPatch ? ""
|
2023-06-18 12:12:25 +00:00
|
|
|
|
, ...
|
2023-06-01 17:48:58 +00:00
|
|
|
|
}@args:
|
2024-02-29 00:29:48 +00:00
|
|
|
|
if patches == [ ] && prePatch == "" && postPatch == ""
|
2023-06-01 17:48:58 +00:00
|
|
|
|
then src # nothing to do, so use original src to avoid additional drv
|
|
|
|
|
else stdenvNoCC.mkDerivation
|
2024-02-29 00:29:48 +00:00
|
|
|
|
({
|
|
|
|
|
inherit name src patches prePatch postPatch;
|
2023-11-13 20:23:34 +00:00
|
|
|
|
preferLocalBuild = true;
|
|
|
|
|
allowSubstitutes = false;
|
|
|
|
|
phases = "unpackPhase patchPhase installPhase";
|
|
|
|
|
installPhase = "cp -R ./ $out";
|
|
|
|
|
}
|
2024-02-29 00:29:48 +00:00
|
|
|
|
# Carry `meta` information from the underlying `src` if present.
|
|
|
|
|
// (optionalAttrs (src?meta) { inherit (src) meta; })
|
|
|
|
|
// (removeAttrs args [ "src" "name" "patches" "prePatch" "postPatch" ]));
|
2021-05-06 08:08:08 +00:00
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move docs to Nixpkgs manual
|
2021-06-12 15:28:00 +00:00
|
|
|
|
/* An immutable file in the store with a length of 0 bytes. */
|
2023-11-13 20:23:34 +00:00
|
|
|
|
emptyFile = runCommand "empty-file"
|
|
|
|
|
{
|
2024-08-08 20:06:21 +00:00
|
|
|
|
outputHash = "sha256-d6xi4mKdjkX2JFicDIv5niSzpyI0m/Hnm8GGAIU04kY=";
|
2023-11-13 20:23:34 +00:00
|
|
|
|
outputHashMode = "recursive";
|
|
|
|
|
preferLocalBuild = true;
|
|
|
|
|
} "touch $out";
|
2021-06-12 15:28:00 +00:00
|
|
|
|
|
2024-03-11 10:33:14 +00:00
|
|
|
|
# TODO: move docs to Nixpkgs manual
|
2021-06-12 15:28:00 +00:00
|
|
|
|
/* An immutable empty directory in the store. */
|
2023-11-13 20:23:34 +00:00
|
|
|
|
emptyDirectory = runCommand "empty-directory"
|
|
|
|
|
{
|
|
|
|
|
outputHashAlgo = "sha256";
|
|
|
|
|
outputHashMode = "recursive";
|
|
|
|
|
outputHash = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5";
|
|
|
|
|
preferLocalBuild = true;
|
|
|
|
|
} "mkdir $out";
|
2009-11-19 16:07:47 +00:00
|
|
|
|
}
|