mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-22 23:13:19 +00:00
36bb7be495
The tarball that contains the statically-linked stack package has changed paths. See the release notes for more details: https://github.com/commercialhaskell/stack/releases/tag/v2.13.1
153 lines
6.2 KiB
Nix
153 lines
6.2 KiB
Nix
|
|
# This derivation confirms that the version of hpack used by stack in Nixpkgs
|
|
# is the exact same version as the upstream stack release.
|
|
#
|
|
# It is important to make sure the version of hpack used by stack in Nixpkgs
|
|
# matches with the version of hpack used by the upstream stack release. This
|
|
# is because hpack works slightly differently based on the version, and it can
|
|
# be frustrating to use hpack in a team setting when members are using different
|
|
# versions. See for more info: https://github.com/NixOS/nixpkgs/issues/223390
|
|
#
|
|
# This test is written as a fixed-output derivation, because we need to access
|
|
# accesses the internet to download the upstream stack release.
|
|
|
|
{ cacert, curl, lib, stack, stdenv }:
|
|
|
|
let
|
|
# Find the hpack derivation that is a dependency of stack. Throw exception
|
|
# if hpack cannot be found.
|
|
hpack =
|
|
lib.findFirst
|
|
(v: v.pname or "" == "hpack")
|
|
(throw "could not find stack's hpack dependency")
|
|
stack.passthru.getCabalDeps.executableHaskellDepends;
|
|
|
|
# This is a statically linked version of stack, so it should be usable within
|
|
# the Nixpkgs builder (at least on x86_64-linux).
|
|
stackDownloadUrl =
|
|
"https://github.com/commercialhaskell/stack/releases/download/v${stack.version}/stack-${stack.version}-linux-x86_64.tar.gz";
|
|
|
|
# This test code has been explicitly pulled out of the derivation below so
|
|
# that it can be hashed and added to the `name` of the derivation. This is
|
|
# so that this test derivation won't be cached if the body of the test is
|
|
# modified.
|
|
#
|
|
# WARNING: When modifying this script, make sure you don't introduce any
|
|
# paths to the Nix store within it. We only want this derivation to be re-run
|
|
# when the stack version (or the version of its hpack dependency) changes in
|
|
# Nixpkgs.
|
|
testScript = ''
|
|
curl=(
|
|
curl
|
|
--location
|
|
--max-redirs 20
|
|
--retry 3
|
|
--disable-epsv
|
|
--cookie-jar cookies
|
|
--user-agent "curl "
|
|
--insecure
|
|
)
|
|
|
|
# Fetch the statically-linked upstream Stack binary.
|
|
echo "Trying to download a statically linked stack binary from ${stackDownloadUrl} to ./stack.tar.gz ..."
|
|
"''${curl[@]}" "${stackDownloadUrl}" > ./stack.tar.gz
|
|
tar xf ./stack.tar.gz
|
|
|
|
upstream_stack_version_output="$(./stack-${stack.version}-linux-x86_64/stack --version)"
|
|
echo "upstream \`stack --version\` output: $upstream_stack_version_output"
|
|
|
|
nixpkgs_stack_version_output="$(stack --version)"
|
|
echo "nixpkgs \`stack --version\` output: $nixpkgs_stack_version_output"
|
|
|
|
# Confirm that the upstream stack version is the same as the stack version
|
|
# in Nixpkgs. This check isn't strictly necessary, but it is a good sanity
|
|
# check.
|
|
|
|
if [[ "$upstream_stack_version_output" =~ "Version "([0-9]+((\.[0-9]+)+)) ]]; then
|
|
upstream_stack_version="''${BASH_REMATCH[1]}"
|
|
|
|
echo "parsed upstream stack version: $upstream_stack_version"
|
|
echo "stack version from nixpkgs: ${stack.version}"
|
|
|
|
if [[ "${stack.version}" != "$upstream_stack_version" ]]; then
|
|
echo "ERROR: stack version in Nixpkgs (${stack.version}) does not match the upstream version for some reason: $upstream_stack_version"
|
|
exit 1
|
|
fi
|
|
else
|
|
echo "ERROR: Upstream stack version cannot be found in --version output: $upstream_stack_version"
|
|
exit 1
|
|
fi
|
|
|
|
# Confirm that the hpack version used in the upstream stack release is the
|
|
# same as the hpack version used by the Nixpkgs stack binary.
|
|
|
|
if [[ "$upstream_stack_version_output" =~ hpack-([0-9]+((\.[0-9]+)+)) ]]; then
|
|
upstream_hpack_version="''${BASH_REMATCH[1]}"
|
|
|
|
echo "parsed upstream stack's hpack version: $upstream_hpack_version"
|
|
echo "Nixpkgs stack's hpack version: ${hpack.version}"
|
|
|
|
if [[ "${hpack.version}" != "$upstream_hpack_version" ]]; then
|
|
echo "ERROR: stack's hpack version in Nixpkgs (${hpack.version}) does not match the upstream stack's hpack version: $upstream_hpack_version"
|
|
echo "The stack derivation in Nixpkgs needs to be fixed up so that it depends on hpack-$upstream_hpack_version, instead of ${hpack.name}"
|
|
exit 1
|
|
fi
|
|
else
|
|
echo "ERROR: Upstream stack's hpack version cannot be found in --version output: $upstream_hpack_version"
|
|
exit 1
|
|
fi
|
|
|
|
# Output a string with a known hash.
|
|
echo "success" > $out
|
|
'';
|
|
|
|
testScriptHash = builtins.hashString "sha256" testScript;
|
|
in
|
|
|
|
stdenv.mkDerivation {
|
|
|
|
# This name is very important.
|
|
#
|
|
# The idea here is that want this derivation to be re-run everytime the
|
|
# version of stack (or the version of its hpack dependency) changes in
|
|
# Nixpkgs. We also want to re-run this derivation whenever the test script
|
|
# is changed.
|
|
#
|
|
# Nix/Hydra will re-run derivations if their name changes (even if they are a
|
|
# FOD and they have the same hash).
|
|
#
|
|
# The name of this derivation contains the stack version string, the hpack
|
|
# version string, and a hash of the test script. So Nix will know to
|
|
# re-run this version when (and only when) one of those values change.
|
|
name = "upstream-stack-hpack-version-test-${stack.name}-${hpack.name}-${testScriptHash}";
|
|
|
|
# This is the sha256 hash for the string "success", which is output upon this
|
|
# test succeeding.
|
|
outputHash = "sha256-gbK9TqmMjbZlVPvI12N6GmmhMPMx/rcyt1yqtMSGj9U=";
|
|
outputHashMode = "flat";
|
|
outputHashAlgo = "sha256";
|
|
|
|
nativeBuildInputs = [ curl stack ];
|
|
|
|
impureEnvVars = lib.fetchers.proxyImpureEnvVars;
|
|
|
|
buildCommand = ''
|
|
# Make sure curl can access HTTPS sites, like GitHub.
|
|
#
|
|
# Note that we absolutely don't want the Nix store path of the cacert
|
|
# derivation in the testScript, because we don't want to rebuild this
|
|
# derivation when only the cacert derivation changes.
|
|
export SSL_CERT_FILE="${cacert}/etc/ssl/certs/ca-bundle.crt"
|
|
'' + testScript;
|
|
|
|
meta = with lib; {
|
|
description = "Test that the stack in Nixpkgs uses the same version of Hpack as the upstream stack release";
|
|
maintainers = with maintainers; [ cdepillabout ];
|
|
|
|
# This derivation internally runs a statically-linked version of stack from
|
|
# upstream. This statically-linked version of stack is only available for
|
|
# x86_64-linux, so this test can only be run on x86_64-linux.
|
|
platforms = [ "x86_64-linux" ];
|
|
};
|
|
}
|