2024-05-28 19:43:04 +03:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
2022-07-13 15:40:39 +03:00
|
|
|
source ./common.sh
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2024-06-16 13:51:46 +03:00
|
|
|
TODO_NixOS
|
|
|
|
|
2022-07-13 21:16:39 +03:00
|
|
|
requireGit
|
2019-05-08 00:22:47 +03:00
|
|
|
|
|
|
|
clearStore
|
2020-01-21 17:27:53 +02:00
|
|
|
rm -rf $TEST_HOME/.cache $TEST_HOME/.config
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2019-05-01 12:38:48 +03:00
|
|
|
flake1Dir=$TEST_ROOT/flake1
|
2022-06-04 13:07:08 +03:00
|
|
|
flake2Dir=$TEST_ROOT/flake\ 2
|
|
|
|
percentEncodedFlake2Dir=$TEST_ROOT/flake%202
|
|
|
|
flake3Dir=$TEST_ROOT/flake%20
|
|
|
|
percentEncodedFlake3Dir=$TEST_ROOT/flake%2520
|
2020-01-27 14:45:49 +02:00
|
|
|
flake5Dir=$TEST_ROOT/flake5
|
2019-06-19 15:48:40 +03:00
|
|
|
flake7Dir=$TEST_ROOT/flake7
|
2019-05-28 11:51:45 +03:00
|
|
|
nonFlakeDir=$TEST_ROOT/nonFlake
|
2021-02-22 22:05:37 +02:00
|
|
|
badFlakeDir=$TEST_ROOT/badFlake
|
2021-02-21 17:41:46 +02:00
|
|
|
flakeGitBare=$TEST_ROOT/flakeGitBare
|
2024-06-29 00:30:43 +03:00
|
|
|
lockfileSummaryFlake=$TEST_ROOT/lockfileSummaryFlake
|
2021-03-03 03:13:20 +02:00
|
|
|
|
2024-06-29 00:30:43 +03:00
|
|
|
for repo in "$flake1Dir" "$flake2Dir" "$flake3Dir" "$flake7Dir" "$nonFlakeDir" "$lockfileSummaryFlake"; do
|
2022-06-02 18:01:28 +03:00
|
|
|
# Give one repo a non-main initial branch.
|
2021-03-03 03:13:20 +02:00
|
|
|
extraArgs=
|
2022-06-04 13:07:08 +03:00
|
|
|
if [[ "$repo" == "$flake2Dir" ]]; then
|
2021-03-03 03:13:20 +02:00
|
|
|
extraArgs="--initial-branch=main"
|
|
|
|
fi
|
2024-06-29 00:30:43 +03:00
|
|
|
if [[ "$repo" == "$lockfileSummaryFlake" ]]; then
|
|
|
|
extraArgs="--initial-branch=main"
|
|
|
|
fi
|
2021-03-03 03:13:20 +02:00
|
|
|
|
2022-07-13 21:16:39 +03:00
|
|
|
createGitRepo "$repo" "$extraArgs"
|
2019-05-08 00:22:47 +03:00
|
|
|
done
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
createSimpleGitFlake "$flake1Dir"
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake2Dir/flake.nix" <<EOF
|
2019-05-08 00:22:47 +03:00
|
|
|
{
|
|
|
|
description = "Fnord";
|
|
|
|
|
2019-08-30 14:11:33 +03:00
|
|
|
outputs = { self, flake1 }: rec {
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
packages.$system.bar = flake1.packages.$system.foo;
|
2019-05-08 00:22:47 +03:00
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$flake2Dir" add flake.nix
|
|
|
|
git -C "$flake2Dir" commit -m 'Initial'
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
2019-05-09 14:59:50 +03:00
|
|
|
{
|
|
|
|
description = "Fnord";
|
|
|
|
|
2019-08-30 14:11:33 +03:00
|
|
|
outputs = { self, flake2 }: rec {
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
packages.$system.xyzzy = flake2.packages.$system.bar;
|
2019-06-19 15:48:40 +03:00
|
|
|
|
|
|
|
checks = {
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
xyzzy = packages.$system.xyzzy;
|
2019-06-19 15:48:40 +03:00
|
|
|
};
|
2019-05-09 14:59:50 +03:00
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/default.nix" <<EOF
|
2022-12-07 13:58:58 +02:00
|
|
|
{ x = 123; }
|
|
|
|
EOF
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$flake3Dir" add flake.nix default.nix
|
|
|
|
git -C "$flake3Dir" commit -m 'Initial'
|
2019-05-09 14:59:50 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$nonFlakeDir/README.md" <<EOF
|
2019-06-04 21:56:13 +03:00
|
|
|
FNORD
|
2019-05-28 11:51:45 +03:00
|
|
|
EOF
|
|
|
|
|
2021-08-28 23:26:53 +03:00
|
|
|
cat > "$nonFlakeDir/shebang.sh" <<EOF
|
|
|
|
#! $(type -P env) nix
|
|
|
|
#! nix --offline shell
|
|
|
|
#! nix flake1#fooScript
|
|
|
|
#! nix --no-write-lock-file --command bash
|
2022-11-15 02:40:01 +02:00
|
|
|
set -ex
|
2021-08-28 23:26:53 +03:00
|
|
|
foo
|
2022-11-15 02:40:01 +02:00
|
|
|
echo "\$@"
|
2021-08-28 23:26:53 +03:00
|
|
|
EOF
|
|
|
|
chmod +x "$nonFlakeDir/shebang.sh"
|
|
|
|
|
|
|
|
git -C "$nonFlakeDir" add README.md shebang.sh
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$nonFlakeDir" commit -m 'Initial'
|
2019-05-28 11:51:45 +03:00
|
|
|
|
2023-05-12 20:46:37 +03:00
|
|
|
# this also tests a fairly trivial double backtick quoted string, ``--command``
|
2022-11-26 16:06:39 +02:00
|
|
|
cat > $nonFlakeDir/shebang-comments.sh <<EOF
|
2022-11-15 06:58:58 +02:00
|
|
|
#! $(type -P env) nix
|
2022-11-26 16:06:39 +02:00
|
|
|
# some comments
|
|
|
|
# some comments
|
|
|
|
# some comments
|
|
|
|
#! nix --offline shell
|
|
|
|
#! nix flake1#fooScript
|
2023-05-12 20:46:37 +03:00
|
|
|
#! nix --no-write-lock-file ``--command`` bash
|
2022-11-26 16:06:39 +02:00
|
|
|
foo
|
2022-11-15 06:58:58 +02:00
|
|
|
EOF
|
2022-11-26 16:06:39 +02:00
|
|
|
chmod +x $nonFlakeDir/shebang-comments.sh
|
2022-11-15 06:58:58 +02:00
|
|
|
|
2024-03-27 15:55:02 +02:00
|
|
|
cat > $nonFlakeDir/shebang-different-comments.sh <<EOF
|
|
|
|
#! $(type -P env) nix
|
|
|
|
# some comments
|
|
|
|
// some comments
|
2024-03-27 16:03:54 +02:00
|
|
|
/* some comments
|
2024-03-27 15:55:02 +02:00
|
|
|
* some comments
|
|
|
|
\ some comments
|
|
|
|
% some comments
|
|
|
|
@ some comments
|
|
|
|
-- some comments
|
2024-03-27 16:03:54 +02:00
|
|
|
(* some comments
|
2024-03-27 15:55:02 +02:00
|
|
|
#! nix --offline shell
|
|
|
|
#! nix flake1#fooScript
|
|
|
|
#! nix --no-write-lock-file --command cat
|
|
|
|
foo
|
|
|
|
EOF
|
|
|
|
chmod +x $nonFlakeDir/shebang-different-comments.sh
|
|
|
|
|
2023-05-12 20:46:37 +03:00
|
|
|
cat > $nonFlakeDir/shebang-reject.sh <<EOF
|
|
|
|
#! $(type -P env) nix
|
|
|
|
# some comments
|
|
|
|
# some comments
|
|
|
|
# some comments
|
|
|
|
#! nix --offline shell *
|
|
|
|
#! nix flake1#fooScript
|
|
|
|
#! nix --no-write-lock-file --command bash
|
|
|
|
foo
|
|
|
|
EOF
|
|
|
|
chmod +x $nonFlakeDir/shebang-reject.sh
|
|
|
|
|
2023-05-12 20:54:54 +03:00
|
|
|
cat > $nonFlakeDir/shebang-inline-expr.sh <<EOF
|
|
|
|
#! $(type -P env) nix
|
|
|
|
EOF
|
|
|
|
cat >> $nonFlakeDir/shebang-inline-expr.sh <<"EOF"
|
|
|
|
#! nix --offline shell
|
|
|
|
#! nix --impure --expr ``
|
|
|
|
#! nix let flake = (builtins.getFlake (toString ../flake1)).packages;
|
|
|
|
#! nix fooScript = flake.${builtins.currentSystem}.fooScript;
|
|
|
|
#! nix /* just a comment !@#$%^&*()__+ # */
|
|
|
|
#! nix in fooScript
|
|
|
|
#! nix ``
|
|
|
|
#! nix --no-write-lock-file --command bash
|
|
|
|
set -ex
|
|
|
|
foo
|
|
|
|
echo "$@"
|
|
|
|
EOF
|
|
|
|
chmod +x $nonFlakeDir/shebang-inline-expr.sh
|
|
|
|
|
2023-05-12 20:56:04 +03:00
|
|
|
cat > $nonFlakeDir/fooScript.nix <<"EOF"
|
|
|
|
let flake = (builtins.getFlake (toString ../flake1)).packages;
|
|
|
|
fooScript = flake.${builtins.currentSystem}.fooScript;
|
|
|
|
in fooScript
|
|
|
|
EOF
|
|
|
|
|
|
|
|
cat > $nonFlakeDir/shebang-file.sh <<EOF
|
|
|
|
#! $(type -P env) nix
|
|
|
|
EOF
|
|
|
|
cat >> $nonFlakeDir/shebang-file.sh <<"EOF"
|
|
|
|
#! nix --offline shell
|
|
|
|
#! nix --impure --file ./fooScript.nix
|
|
|
|
#! nix --no-write-lock-file --command bash
|
|
|
|
set -ex
|
|
|
|
foo
|
|
|
|
echo "$@"
|
|
|
|
EOF
|
|
|
|
chmod +x $nonFlakeDir/shebang-file.sh
|
|
|
|
|
2021-07-02 16:10:57 +03:00
|
|
|
# Construct a custom registry, additionally test the --registry flag
|
2022-06-04 13:07:08 +03:00
|
|
|
nix registry add --registry "$registry" flake1 "git+file://$flake1Dir"
|
|
|
|
nix registry add --registry "$registry" flake2 "git+file://$percentEncodedFlake2Dir"
|
|
|
|
nix registry add --registry "$registry" flake3 "git+file://$percentEncodedFlake3Dir"
|
|
|
|
nix registry add --registry "$registry" flake4 flake3
|
|
|
|
nix registry add --registry "$registry" nixpkgs flake1
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2021-10-28 01:56:36 +03:00
|
|
|
# Test 'nix registry list'.
|
2022-07-13 21:36:11 +03:00
|
|
|
[[ $(nix registry list | wc -l) == 5 ]]
|
2021-12-09 17:26:46 +02:00
|
|
|
nix registry list | grep '^global'
|
|
|
|
nix registry list | grepInverse '^user' # nothing in user registry
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2021-03-16 18:19:04 +02:00
|
|
|
# Test 'nix flake metadata'.
|
|
|
|
nix flake metadata flake1
|
2021-12-09 17:26:46 +02:00
|
|
|
nix flake metadata flake1 | grepQuiet 'Locked URL:.*flake1.*'
|
2019-05-17 00:14:27 +03:00
|
|
|
|
2024-09-09 16:41:38 +03:00
|
|
|
# Test 'nix flake metadata' on a chroot store.
|
|
|
|
nix flake metadata --store $TEST_ROOT/chroot-store flake1
|
|
|
|
|
2021-03-16 18:19:04 +02:00
|
|
|
# Test 'nix flake metadata' on a local flake.
|
2022-06-04 13:07:08 +03:00
|
|
|
(cd "$flake1Dir" && nix flake metadata) | grepQuiet 'URL:.*flake1.*'
|
|
|
|
(cd "$flake1Dir" && nix flake metadata .) | grepQuiet 'URL:.*flake1.*'
|
|
|
|
nix flake metadata "$flake1Dir" | grepQuiet 'URL:.*flake1.*'
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2021-03-16 18:19:04 +02:00
|
|
|
# Test 'nix flake metadata --json'.
|
|
|
|
json=$(nix flake metadata flake1 --json | jq .)
|
2019-05-08 00:22:47 +03:00
|
|
|
[[ $(echo "$json" | jq -r .description) = 'Bla bla' ]]
|
|
|
|
[[ -d $(echo "$json" | jq -r .path) ]]
|
2022-06-04 13:07:08 +03:00
|
|
|
[[ $(echo "$json" | jq -r .lastModified) = $(git -C "$flake1Dir" log -n1 --format=%ct) ]]
|
2020-01-29 15:57:57 +02:00
|
|
|
hash1=$(echo "$json" | jq -r .revision)
|
2024-07-03 17:37:26 +03:00
|
|
|
[[ -n $(echo "$json" | jq -r .fingerprint) ]]
|
2020-01-29 15:57:57 +02:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
echo foo > "$flake1Dir/foo"
|
|
|
|
git -C "$flake1Dir" add $flake1Dir/foo
|
2021-10-14 15:44:45 +03:00
|
|
|
[[ $(nix flake metadata flake1 --json --refresh | jq -r .dirtyRevision) == "$hash1-dirty" ]]
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
echo -n '# foo' >> "$flake1Dir/flake.nix"
|
|
|
|
flake1OriginalCommit=$(git -C "$flake1Dir" rev-parse HEAD)
|
|
|
|
git -C "$flake1Dir" commit -a -m 'Foo'
|
|
|
|
flake1NewCommit=$(git -C "$flake1Dir" rev-parse HEAD)
|
2021-03-16 18:19:04 +02:00
|
|
|
hash2=$(nix flake metadata flake1 --json --refresh | jq -r .revision)
|
2021-10-14 15:44:45 +03:00
|
|
|
[[ $(nix flake metadata flake1 --json --refresh | jq -r .dirtyRevision) == "null" ]]
|
2020-01-29 15:57:57 +02:00
|
|
|
[[ $hash1 != $hash2 ]]
|
2019-05-08 00:22:47 +03:00
|
|
|
|
|
|
|
# Test 'nix build' on a flake.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" flake1#foo
|
|
|
|
[[ -e "$TEST_ROOT/result/hello" ]]
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2022-02-11 19:11:08 +02:00
|
|
|
# Test packages.default.
|
2023-10-12 21:09:14 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" flake1#
|
2022-06-04 13:07:08 +03:00
|
|
|
[[ -e "$TEST_ROOT/result/hello" ]]
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" "$flake1Dir"
|
|
|
|
nix build -o "$TEST_ROOT/result" "git+file://$flake1Dir"
|
2019-05-31 23:17:39 +03:00
|
|
|
|
2023-12-11 17:05:34 +02:00
|
|
|
# Test explicit packages.default.
|
|
|
|
nix build -o "$TEST_ROOT/result" "$flake1Dir#default"
|
|
|
|
nix build -o "$TEST_ROOT/result" "git+file://$flake1Dir#default"
|
|
|
|
|
|
|
|
# Test explicit packages.default with query.
|
|
|
|
nix build -o "$TEST_ROOT/result" "$flake1Dir?ref=HEAD#default"
|
|
|
|
nix build -o "$TEST_ROOT/result" "git+file://$flake1Dir?ref=HEAD#default"
|
|
|
|
|
2020-01-21 17:27:53 +02:00
|
|
|
# Check that store symlinks inside a flake are not interpreted as flakes.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$flake1Dir/result" "git+file://$flake1Dir"
|
|
|
|
nix path-info "$flake1Dir/result"
|
2019-06-21 16:29:05 +03:00
|
|
|
|
2022-12-07 13:58:58 +02:00
|
|
|
# 'getFlake' on an unlocked flakeref should fail in pure mode, but
|
|
|
|
# succeed in impure mode.
|
2022-06-04 13:07:08 +03:00
|
|
|
(! nix build -o "$TEST_ROOT/result" --expr "(builtins.getFlake \"$flake1Dir\").packages.$system.default")
|
|
|
|
nix build -o "$TEST_ROOT/result" --expr "(builtins.getFlake \"$flake1Dir\").packages.$system.default" --impure
|
2020-04-03 14:07:05 +03:00
|
|
|
|
2022-12-07 13:58:58 +02:00
|
|
|
# 'getFlake' on a locked flakeref should succeed even in pure mode.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" --expr "(builtins.getFlake \"git+file://$flake1Dir?rev=$hash2\").packages.$system.default"
|
2020-04-03 14:07:05 +03:00
|
|
|
|
2024-04-30 16:34:38 +03:00
|
|
|
# Regression test for dirOf on the root of the flake.
|
|
|
|
[[ $(nix eval --json flake1#parent) = \""$NIX_STORE_DIR"\" ]]
|
|
|
|
|
2024-04-30 16:43:33 +03:00
|
|
|
# Regression test for baseNameOf on the root of the flake.
|
2024-04-30 17:46:36 +03:00
|
|
|
[[ $(nix eval --raw flake1#baseName) =~ ^[a-z0-9]+-source$ ]]
|
|
|
|
|
2024-04-30 19:10:16 +03:00
|
|
|
# Test that the root of a tree returns a path named /nix/store/<hash1>-<hash2>-source.
|
|
|
|
# This behavior is *not* desired, but has existed for a while.
|
|
|
|
# Issue #10627 what to do about it.
|
2024-04-30 17:46:36 +03:00
|
|
|
[[ $(nix eval --raw flake1#root) =~ ^.*/[a-z0-9]+-[a-z0-9]+-source$ ]]
|
2024-04-30 16:43:33 +03:00
|
|
|
|
2019-05-08 00:22:47 +03:00
|
|
|
# Building a flake with an unlocked dependency should fail in pure mode.
|
2022-06-04 13:07:08 +03:00
|
|
|
(! nix build -o "$TEST_ROOT/result" flake2#bar --no-registries)
|
|
|
|
(! nix build -o "$TEST_ROOT/result" flake2#bar --no-use-registries)
|
2020-01-27 14:45:49 +02:00
|
|
|
(! nix eval --expr "builtins.getFlake \"$flake2Dir\"")
|
2019-05-08 00:22:47 +03:00
|
|
|
|
|
|
|
# But should succeed in impure mode.
|
2022-06-04 13:07:08 +03:00
|
|
|
(! nix build -o "$TEST_ROOT/result" flake2#bar --impure)
|
|
|
|
nix build -o "$TEST_ROOT/result" flake2#bar --impure --no-write-lock-file
|
2022-05-18 12:33:04 +03:00
|
|
|
nix eval --expr "builtins.getFlake \"$flake2Dir\"" --impure
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2020-01-29 22:01:34 +02:00
|
|
|
# Building a local flake with an unlocked dependency should fail with --no-update-lock-file.
|
2022-06-04 13:07:08 +03:00
|
|
|
expect 1 nix build -o "$TEST_ROOT/result" "$flake2Dir#bar" --no-update-lock-file 2>&1 | grep 'requires lock file changes'
|
2020-01-29 22:01:34 +02:00
|
|
|
|
|
|
|
# But it should succeed without that flag.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" "$flake2Dir#bar" --no-write-lock-file
|
|
|
|
expect 1 nix build -o "$TEST_ROOT/result" "$flake2Dir#bar" --no-update-lock-file 2>&1 | grep 'requires lock file changes'
|
|
|
|
nix build -o "$TEST_ROOT/result" "$flake2Dir#bar" --commit-lock-file
|
|
|
|
[[ -e "$flake2Dir/flake.lock" ]]
|
|
|
|
[[ -z $(git -C "$flake2Dir" diff main || echo failed) ]]
|
2019-05-08 00:22:47 +03:00
|
|
|
|
2019-05-09 14:55:33 +03:00
|
|
|
# Rerunning the build should not change the lockfile.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" "$flake2Dir#bar"
|
|
|
|
[[ -z $(git -C "$flake2Dir" diff main || echo failed) ]]
|
2019-05-09 14:55:33 +03:00
|
|
|
|
2019-06-21 19:34:43 +03:00
|
|
|
# Building with a lockfile should not require a fetch of the registry.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" --flake-registry file:///no-registry.json "$flake2Dir#bar" --refresh
|
|
|
|
nix build -o "$TEST_ROOT/result" --no-registries "$flake2Dir#bar" --refresh
|
|
|
|
nix build -o "$TEST_ROOT/result" --no-use-registries "$flake2Dir#bar" --refresh
|
2019-06-21 19:34:43 +03:00
|
|
|
|
2019-06-19 15:48:40 +03:00
|
|
|
# Updating the flake should not change the lockfile.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake2Dir"
|
|
|
|
[[ -z $(git -C "$flake2Dir" diff main || echo failed) ]]
|
2019-06-19 15:48:40 +03:00
|
|
|
|
2019-05-08 00:22:47 +03:00
|
|
|
# Now we should be able to build the flake in pure mode.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" flake2#bar
|
2019-05-08 00:22:47 +03:00
|
|
|
|
|
|
|
# Or without a registry.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" --no-registries "git+file://$percentEncodedFlake2Dir#bar" --refresh
|
|
|
|
nix build -o "$TEST_ROOT/result" --no-use-registries "git+file://$percentEncodedFlake2Dir#bar" --refresh
|
2019-05-09 14:59:50 +03:00
|
|
|
|
|
|
|
# Test whether indirect dependencies work.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" "$flake3Dir#xyzzy"
|
|
|
|
git -C "$flake3Dir" add flake.lock
|
2019-05-14 12:34:45 +03:00
|
|
|
|
2019-05-22 15:31:40 +03:00
|
|
|
# Add dependency to flake3.
|
2022-06-04 13:07:08 +03:00
|
|
|
rm "$flake3Dir/flake.nix"
|
2019-05-14 12:34:45 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
2019-05-14 12:34:45 +03:00
|
|
|
{
|
|
|
|
description = "Fnord";
|
|
|
|
|
2019-08-30 14:11:33 +03:00
|
|
|
outputs = { self, flake1, flake2 }: rec {
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
packages.$system.xyzzy = flake2.packages.$system.bar;
|
|
|
|
packages.$system."sth sth" = flake1.packages.$system.foo;
|
2019-05-14 12:34:45 +03:00
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$flake3Dir" add flake.nix
|
|
|
|
git -C "$flake3Dir" commit -m 'Update flake.nix'
|
2019-05-14 12:34:45 +03:00
|
|
|
|
|
|
|
# Check whether `nix build` works with an incomplete lockfile
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o $TEST_ROOT/result "$flake3Dir#sth sth"
|
|
|
|
nix build -o $TEST_ROOT/result "$flake3Dir#sth%20sth"
|
2019-05-14 12:34:45 +03:00
|
|
|
|
|
|
|
# Check whether it saved the lockfile
|
2022-06-04 13:07:08 +03:00
|
|
|
[[ -n $(git -C "$flake3Dir" diff master) ]]
|
2019-05-22 15:31:40 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$flake3Dir" add flake.lock
|
2019-07-12 15:37:45 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$flake3Dir" commit -m 'Add lockfile'
|
2019-06-04 20:10:35 +03:00
|
|
|
|
2019-05-23 00:52:29 +03:00
|
|
|
# Test whether registry caching works.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix registry list --flake-registry "file://$registry" | grepQuiet flake3
|
|
|
|
mv "$registry" "$registry.tmp"
|
2021-01-11 00:20:02 +02:00
|
|
|
nix store gc
|
2022-06-04 13:07:08 +03:00
|
|
|
nix registry list --flake-registry "file://$registry" --refresh | grepQuiet flake3
|
|
|
|
mv "$registry.tmp" "$registry"
|
2019-05-24 00:42:13 +03:00
|
|
|
|
|
|
|
# Test whether flakes are registered as GC roots for offline use.
|
2019-06-04 20:45:16 +03:00
|
|
|
# FIXME: use tarballs rather than git.
|
2022-06-04 13:07:08 +03:00
|
|
|
rm -rf "$TEST_HOME/.cache"
|
2021-01-11 00:20:02 +02:00
|
|
|
nix store gc # get rid of copies in the store to ensure they get fetched to our git cache
|
2022-06-04 13:07:08 +03:00
|
|
|
_NIX_FORCE_HTTP=1 nix build -o "$TEST_ROOT/result" "git+file://$percentEncodedFlake2Dir#bar"
|
|
|
|
mv "$flake1Dir" "$flake1Dir.tmp"
|
|
|
|
mv "$flake2Dir" "$flake2Dir.tmp"
|
2021-01-11 00:20:02 +02:00
|
|
|
nix store gc
|
2022-06-04 13:07:08 +03:00
|
|
|
_NIX_FORCE_HTTP=1 nix build -o "$TEST_ROOT/result" "git+file://$percentEncodedFlake2Dir#bar"
|
|
|
|
_NIX_FORCE_HTTP=1 nix build -o "$TEST_ROOT/result" "git+file://$percentEncodedFlake2Dir#bar" --refresh
|
|
|
|
mv "$flake1Dir.tmp" "$flake1Dir"
|
|
|
|
mv "$flake2Dir.tmp" "$flake2Dir"
|
2019-05-28 11:51:45 +03:00
|
|
|
|
2019-05-30 00:09:23 +03:00
|
|
|
# Add nonFlakeInputs to flake3.
|
2022-06-04 13:07:08 +03:00
|
|
|
rm "$flake3Dir/flake.nix"
|
2019-05-28 11:51:45 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
2019-05-28 11:51:45 +03:00
|
|
|
{
|
2019-08-30 17:27:51 +03:00
|
|
|
inputs = {
|
|
|
|
flake1 = {};
|
|
|
|
flake2 = {};
|
|
|
|
nonFlake = {
|
2020-01-21 17:27:53 +02:00
|
|
|
url = git+file://$nonFlakeDir;
|
2019-08-30 17:27:51 +03:00
|
|
|
flake = false;
|
|
|
|
};
|
2021-12-13 21:54:43 +02:00
|
|
|
nonFlakeFile = {
|
|
|
|
url = path://$nonFlakeDir/README.md;
|
|
|
|
flake = false;
|
|
|
|
};
|
|
|
|
nonFlakeFile2 = {
|
|
|
|
url = "$nonFlakeDir/README.md";
|
|
|
|
flake = false;
|
|
|
|
};
|
2019-05-28 11:51:45 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
description = "Fnord";
|
|
|
|
|
2019-05-30 00:09:23 +03:00
|
|
|
outputs = inputs: rec {
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
packages.$system.xyzzy = inputs.flake2.packages.$system.bar;
|
|
|
|
packages.$system.sth = inputs.flake1.packages.$system.foo;
|
|
|
|
packages.$system.fnord =
|
2019-06-04 21:56:13 +03:00
|
|
|
with import ./config.nix;
|
|
|
|
mkDerivation {
|
|
|
|
inherit system;
|
|
|
|
name = "fnord";
|
2021-10-06 21:53:29 +03:00
|
|
|
dummy = builtins.readFile (builtins.path { name = "source"; path = ./.; filter = path: type: baseNameOf path == "config.nix"; } + "/config.nix");
|
2021-10-07 14:43:17 +03:00
|
|
|
dummy2 = builtins.readFile (builtins.path { name = "source"; path = inputs.flake1; filter = path: type: baseNameOf path == "simple.nix"; } + "/simple.nix");
|
2019-06-04 21:56:13 +03:00
|
|
|
buildCommand = ''
|
|
|
|
cat \${inputs.nonFlake}/README.md > \$out
|
2021-12-13 21:54:43 +02:00
|
|
|
[[ \$(cat \${inputs.nonFlake}/README.md) = \$(cat \${inputs.nonFlakeFile}) ]]
|
|
|
|
[[ \${inputs.nonFlakeFile} = \${inputs.nonFlakeFile2} ]]
|
2019-06-04 21:56:13 +03:00
|
|
|
'';
|
|
|
|
};
|
2019-05-28 11:51:45 +03:00
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2024-11-01 15:56:50 +02:00
|
|
|
cp "${config_nix}" "$flake3Dir"
|
2019-06-04 21:56:13 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$flake3Dir" add flake.nix config.nix
|
|
|
|
git -C "$flake3Dir" commit -m 'Add nonFlakeInputs'
|
2019-05-28 11:51:45 +03:00
|
|
|
|
2019-06-04 21:56:13 +03:00
|
|
|
# Check whether `nix build` works with a lockfile which is missing a
|
|
|
|
# nonFlakeInputs.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" "$flake3Dir#sth" --commit-lock-file
|
2019-06-04 21:33:49 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" flake3#fnord
|
2019-06-04 21:56:13 +03:00
|
|
|
[[ $(cat $TEST_ROOT/result) = FNORD ]]
|
|
|
|
|
2019-09-20 17:01:40 +03:00
|
|
|
# Check whether flake input fetching is lazy: flake3#sth does not
|
2019-06-04 20:10:35 +03:00
|
|
|
# depend on flake2, so this shouldn't fail.
|
2022-06-04 13:07:08 +03:00
|
|
|
rm -rf "$TEST_HOME/.cache"
|
2019-06-04 20:10:35 +03:00
|
|
|
clearStore
|
2022-06-04 13:07:08 +03:00
|
|
|
mv "$flake2Dir" "$flake2Dir.tmp"
|
|
|
|
mv "$nonFlakeDir" "$nonFlakeDir.tmp"
|
|
|
|
nix build -o "$TEST_ROOT/result" flake3#sth
|
|
|
|
(! nix build -o "$TEST_ROOT/result" flake3#xyzzy)
|
|
|
|
(! nix build -o "$TEST_ROOT/result" flake3#fnord)
|
|
|
|
mv "$flake2Dir.tmp" "$flake2Dir"
|
|
|
|
mv "$nonFlakeDir.tmp" "$nonFlakeDir"
|
|
|
|
nix build -o "$TEST_ROOT/result" flake3#xyzzy flake3#fnord
|
2019-06-11 14:09:06 +03:00
|
|
|
|
|
|
|
# Test doing multiple `lookupFlake`s
|
2022-06-04 13:07:08 +03:00
|
|
|
nix build -o "$TEST_ROOT/result" flake4#xyzzy
|
2019-06-11 14:09:06 +03:00
|
|
|
|
2020-01-22 21:00:58 +02:00
|
|
|
# Test 'nix flake update' and --override-flake.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir"
|
|
|
|
[[ -z $(git -C "$flake3Dir" diff master || echo failed) ]]
|
2020-01-22 21:00:58 +02:00
|
|
|
|
2023-08-12 21:51:19 +03:00
|
|
|
nix flake update --flake "$flake3Dir" --override-flake flake2 nixpkgs
|
2022-06-04 13:07:08 +03:00
|
|
|
[[ ! -z $(git -C "$flake3Dir" diff master || echo failed) ]]
|
2020-01-22 21:00:58 +02:00
|
|
|
|
2019-06-11 14:09:06 +03:00
|
|
|
# Make branch "removeXyzzy" where flake3 doesn't have xyzzy anymore
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$flake3Dir" checkout -b removeXyzzy
|
|
|
|
rm "$flake3Dir/flake.nix"
|
2019-06-11 14:09:06 +03:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
2019-06-11 14:09:06 +03:00
|
|
|
{
|
2019-08-30 17:27:51 +03:00
|
|
|
inputs = {
|
|
|
|
nonFlake = {
|
2019-10-08 17:30:04 +03:00
|
|
|
url = "$nonFlakeDir";
|
2019-08-30 17:27:51 +03:00
|
|
|
flake = false;
|
|
|
|
};
|
2019-06-11 14:09:06 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
description = "Fnord";
|
|
|
|
|
2019-08-30 17:27:51 +03:00
|
|
|
outputs = { self, flake1, flake2, nonFlake }: rec {
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
packages.$system.sth = flake1.packages.$system.foo;
|
|
|
|
packages.$system.fnord =
|
2019-06-11 14:09:06 +03:00
|
|
|
with import ./config.nix;
|
|
|
|
mkDerivation {
|
|
|
|
inherit system;
|
|
|
|
name = "fnord";
|
|
|
|
buildCommand = ''
|
2019-08-30 17:27:51 +03:00
|
|
|
cat \${nonFlake}/README.md > \$out
|
2019-06-11 14:09:06 +03:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir"
|
|
|
|
git -C "$flake3Dir" add flake.nix flake.lock
|
|
|
|
git -C "$flake3Dir" commit -m 'Remove packages.xyzzy'
|
|
|
|
git -C "$flake3Dir" checkout master
|
2019-06-11 14:09:06 +03:00
|
|
|
|
2020-07-17 15:54:21 +03:00
|
|
|
# Test whether fuzzy-matching works for registry entries.
|
2022-06-04 13:07:08 +03:00
|
|
|
(! nix build -o "$TEST_ROOT/result" flake4/removeXyzzy#xyzzy)
|
|
|
|
nix build -o "$TEST_ROOT/result" flake4/removeXyzzy#sth
|
2019-06-19 15:48:40 +03:00
|
|
|
|
|
|
|
# Testing the nix CLI
|
2020-05-15 15:38:10 +03:00
|
|
|
nix registry add flake1 flake3
|
2022-07-13 21:36:11 +03:00
|
|
|
[[ $(nix registry list | wc -l) == 6 ]]
|
2020-05-15 15:38:10 +03:00
|
|
|
nix registry pin flake1
|
2022-07-13 21:36:11 +03:00
|
|
|
[[ $(nix registry list | wc -l) == 6 ]]
|
2021-07-02 16:10:57 +03:00
|
|
|
nix registry pin flake1 flake3
|
2022-07-13 15:40:39 +03:00
|
|
|
[[ $(nix registry list | wc -l) == 6 ]]
|
2020-05-15 15:38:10 +03:00
|
|
|
nix registry remove flake1
|
2022-07-13 21:36:11 +03:00
|
|
|
[[ $(nix registry list | wc -l) == 5 ]]
|
2020-06-04 21:02:50 +03:00
|
|
|
|
2021-10-28 01:56:36 +03:00
|
|
|
# Test 'nix registry list' with a disabled global registry.
|
|
|
|
nix registry add user-flake1 git+file://$flake1Dir
|
2022-06-04 13:07:08 +03:00
|
|
|
nix registry add user-flake2 "git+file://$percentEncodedFlake2Dir"
|
2021-10-28 01:56:36 +03:00
|
|
|
[[ $(nix --flake-registry "" registry list | wc -l) == 2 ]]
|
2021-12-09 17:26:46 +02:00
|
|
|
nix --flake-registry "" registry list | grepQuietInverse '^global' # nothing in global registry
|
|
|
|
nix --flake-registry "" registry list | grepQuiet '^user'
|
2021-10-28 01:56:36 +03:00
|
|
|
nix registry remove user-flake1
|
|
|
|
nix registry remove user-flake2
|
|
|
|
[[ $(nix registry list | wc -l) == 5 ]]
|
|
|
|
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
# Test 'nix flake clone'.
|
2019-08-30 14:11:33 +03:00
|
|
|
rm -rf $TEST_ROOT/flake1-v2
|
2020-01-28 17:34:37 +02:00
|
|
|
nix flake clone flake1 --dest $TEST_ROOT/flake1-v2
|
2020-01-21 17:27:53 +02:00
|
|
|
[ -e $TEST_ROOT/flake1-v2/flake.nix ]
|
2019-09-10 17:03:03 +03:00
|
|
|
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
# Test 'follows' inputs.
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
{
|
2020-01-31 21:50:46 +02:00
|
|
|
inputs.foo = {
|
|
|
|
type = "indirect";
|
|
|
|
id = "flake1";
|
|
|
|
};
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
inputs.bar.follows = "foo";
|
|
|
|
|
|
|
|
outputs = { self, foo, bar }: {
|
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir"
|
|
|
|
[[ $(jq -c .nodes.root.inputs.bar "$flake3Dir/flake.lock") = '["foo"]' ]]
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
{
|
|
|
|
inputs.bar.follows = "flake2/flake1";
|
|
|
|
|
|
|
|
outputs = { self, flake2, bar }: {
|
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir"
|
|
|
|
[[ $(jq -c .nodes.root.inputs.bar "$flake3Dir/flake.lock") = '["flake2","flake1"]' ]]
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
{
|
|
|
|
inputs.bar.follows = "flake2";
|
|
|
|
|
|
|
|
outputs = { self, flake2, bar }: {
|
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir"
|
|
|
|
[[ $(jq -c .nodes.root.inputs.bar "$flake3Dir/flake.lock") = '["flake2"]' ]]
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
|
|
|
|
# Test overriding inputs of inputs.
|
2022-07-13 21:36:11 +03:00
|
|
|
writeTrivialFlake $flake7Dir
|
|
|
|
git -C $flake7Dir add flake.nix
|
|
|
|
git -C $flake7Dir commit -m 'Initial'
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
{
|
2020-02-02 14:06:00 +02:00
|
|
|
inputs.flake2.inputs.flake1 = {
|
|
|
|
type = "git";
|
|
|
|
url = file://$flake7Dir;
|
|
|
|
};
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
|
|
|
|
outputs = { self, flake2 }: {
|
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir"
|
|
|
|
[[ $(jq .nodes.flake1.locked.url "$flake3Dir/flake.lock") =~ flake7 ]]
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
cat > "$flake3Dir/flake.nix" <<EOF
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
{
|
|
|
|
inputs.flake2.inputs.flake1.follows = "foo";
|
|
|
|
inputs.foo.url = git+file://$flake7Dir;
|
|
|
|
|
|
|
|
outputs = { self, flake2 }: {
|
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
2023-08-12 21:51:19 +03:00
|
|
|
nix flake update --flake "$flake3Dir"
|
2022-06-04 13:07:08 +03:00
|
|
|
[[ $(jq -c .nodes.flake2.inputs.flake1 "$flake3Dir/flake.lock") =~ '["foo"]' ]]
|
|
|
|
[[ $(jq .nodes.foo.locked.url "$flake3Dir/flake.lock") =~ flake7 ]]
|
2020-01-27 14:45:49 +02:00
|
|
|
|
2021-02-21 17:41:46 +02:00
|
|
|
# Test git+file with bare repo.
|
|
|
|
rm -rf $flakeGitBare
|
|
|
|
git clone --bare $flake1Dir $flakeGitBare
|
|
|
|
nix build -o $TEST_ROOT/result git+file://$flakeGitBare
|
|
|
|
|
2021-10-06 19:29:20 +03:00
|
|
|
# Test path flakes.
|
2022-07-13 15:40:39 +03:00
|
|
|
mkdir -p $flake5Dir
|
|
|
|
writeDependentFlake $flake5Dir
|
2021-10-06 19:29:20 +03:00
|
|
|
nix flake lock path://$flake5Dir
|
2020-01-28 14:11:02 +02:00
|
|
|
|
2021-10-06 19:29:20 +03:00
|
|
|
# Test tarball flakes.
|
|
|
|
tar cfz $TEST_ROOT/flake.tar.gz -C $TEST_ROOT flake5
|
2020-01-28 14:11:02 +02:00
|
|
|
|
|
|
|
nix build -o $TEST_ROOT/result file://$TEST_ROOT/flake.tar.gz
|
|
|
|
|
|
|
|
# Building with a tarball URL containing a SRI hash should also work.
|
2021-03-16 18:19:04 +02:00
|
|
|
url=$(nix flake metadata --json file://$TEST_ROOT/flake.tar.gz | jq -r .url)
|
2020-01-28 14:11:02 +02:00
|
|
|
[[ $url =~ sha256- ]]
|
|
|
|
|
|
|
|
nix build -o $TEST_ROOT/result $url
|
|
|
|
|
|
|
|
# Building with an incorrect SRI hash should fail.
|
2021-12-09 17:26:46 +02:00
|
|
|
expectStderr 102 nix build -o $TEST_ROOT/result "file://$TEST_ROOT/flake.tar.gz?narHash=sha256-qQ2Zz4DNHViCUrp6gTS7EE4+RMqFQtUfWF2UNUtJKS0=" | grep 'NAR hash mismatch'
|
2020-01-29 15:57:57 +02:00
|
|
|
|
|
|
|
# Test --override-input.
|
2022-06-04 13:07:08 +03:00
|
|
|
git -C "$flake3Dir" reset --hard
|
|
|
|
nix flake lock "$flake3Dir" --override-input flake2/flake1 file://$TEST_ROOT/flake.tar.gz -vvvvv
|
|
|
|
[[ $(jq .nodes.flake1_2.locked.url "$flake3Dir/flake.lock") =~ flake.tar.gz ]]
|
2020-01-29 15:57:57 +02:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir" --override-input flake2/flake1 flake1
|
|
|
|
[[ $(jq -r .nodes.flake1_2.locked.rev "$flake3Dir/flake.lock") =~ $hash2 ]]
|
2020-01-29 15:57:57 +02:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir" --override-input flake2/flake1 flake1/master/$hash1
|
|
|
|
[[ $(jq -r .nodes.flake1_2.locked.rev "$flake3Dir/flake.lock") =~ $hash1 ]]
|
2020-01-30 00:12:58 +02:00
|
|
|
|
|
|
|
# Test --update-input.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake3Dir"
|
|
|
|
[[ $(jq -r .nodes.flake1_2.locked.rev "$flake3Dir/flake.lock") = $hash1 ]]
|
2020-01-30 00:12:58 +02:00
|
|
|
|
2023-08-12 21:51:19 +03:00
|
|
|
nix flake update flake2/flake1 --flake "$flake3Dir"
|
2022-06-04 13:07:08 +03:00
|
|
|
[[ $(jq -r .nodes.flake1_2.locked.rev "$flake3Dir/flake.lock") =~ $hash2 ]]
|
2020-01-31 13:54:52 +02:00
|
|
|
|
2024-03-03 14:51:40 +02:00
|
|
|
# Test updating multiple inputs.
|
|
|
|
nix flake lock "$flake3Dir" --override-input flake1 flake1/master/$hash1
|
|
|
|
nix flake lock "$flake3Dir" --override-input flake2/flake1 flake1/master/$hash1
|
|
|
|
[[ $(jq -r .nodes.flake1.locked.rev "$flake3Dir/flake.lock") =~ $hash1 ]]
|
|
|
|
[[ $(jq -r .nodes.flake1_2.locked.rev "$flake3Dir/flake.lock") =~ $hash1 ]]
|
|
|
|
|
|
|
|
nix flake update flake1 flake2/flake1 --flake "$flake3Dir"
|
|
|
|
[[ $(jq -r .nodes.flake1.locked.rev "$flake3Dir/flake.lock") =~ $hash2 ]]
|
|
|
|
[[ $(jq -r .nodes.flake1_2.locked.rev "$flake3Dir/flake.lock") =~ $hash2 ]]
|
|
|
|
|
2021-03-16 18:19:04 +02:00
|
|
|
# Test 'nix flake metadata --json'.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake metadata "$flake3Dir" --json | jq .
|
2020-03-27 23:03:40 +02:00
|
|
|
|
2022-12-07 13:58:58 +02:00
|
|
|
# Test flake in store does not evaluate.
|
2021-09-02 15:01:07 +03:00
|
|
|
rm -rf $badFlakeDir
|
2021-02-22 22:05:37 +02:00
|
|
|
mkdir $badFlakeDir
|
|
|
|
echo INVALID > $badFlakeDir/flake.nix
|
|
|
|
nix store delete $(nix store add-path $badFlakeDir)
|
2021-09-02 15:01:07 +03:00
|
|
|
|
|
|
|
[[ $(nix path-info $(nix store add-path $flake1Dir)) =~ flake1 ]]
|
|
|
|
[[ $(nix path-info path:$(nix store add-path $flake1Dir)) =~ simple ]]
|
2022-12-07 16:23:01 +02:00
|
|
|
|
|
|
|
# Test fetching flakerefs in the legacy CLI.
|
|
|
|
[[ $(nix-instantiate --eval flake:flake3 -A x) = 123 ]]
|
2022-06-04 13:07:08 +03:00
|
|
|
[[ $(nix-instantiate --eval "flake:git+file://$percentEncodedFlake3Dir" -A x) = 123 ]]
|
2022-12-07 16:23:01 +02:00
|
|
|
[[ $(nix-instantiate -I flake3=flake:flake3 --eval '<flake3>' -A x) = 123 ]]
|
|
|
|
[[ $(NIX_PATH=flake3=flake:flake3 nix-instantiate --eval '<flake3>' -A x) = 123 ]]
|
2023-03-19 15:11:19 +02:00
|
|
|
|
|
|
|
# Test alternate lockfile paths.
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake2Dir" --output-lock-file $TEST_ROOT/flake2.lock
|
|
|
|
cmp "$flake2Dir/flake.lock" $TEST_ROOT/flake2.lock >/dev/null # lockfiles should be identical, since we're referencing flake2's original one
|
2023-03-19 15:11:19 +02:00
|
|
|
|
2022-06-04 13:07:08 +03:00
|
|
|
nix flake lock "$flake2Dir" --output-lock-file $TEST_ROOT/flake2-overridden.lock --override-input flake1 git+file://$flake1Dir?rev=$flake1OriginalCommit
|
|
|
|
expectStderr 1 cmp "$flake2Dir/flake.lock" $TEST_ROOT/flake2-overridden.lock
|
|
|
|
nix flake metadata "$flake2Dir" --reference-lock-file $TEST_ROOT/flake2-overridden.lock | grepQuiet $flake1OriginalCommit
|
2023-03-19 15:11:19 +02:00
|
|
|
|
|
|
|
# reference-lock-file can only be used if allow-dirty is set.
|
2022-06-04 13:07:08 +03:00
|
|
|
expectStderr 1 nix flake metadata "$flake2Dir" --no-allow-dirty --reference-lock-file $TEST_ROOT/flake2-overridden.lock
|
2021-08-28 23:26:53 +03:00
|
|
|
|
|
|
|
# Test shebang
|
|
|
|
[[ $($nonFlakeDir/shebang.sh) = "foo" ]]
|
2022-11-15 02:40:01 +02:00
|
|
|
[[ $($nonFlakeDir/shebang.sh "bar") = "foo"$'\n'"bar" ]]
|
2022-11-26 16:06:39 +02:00
|
|
|
[[ $($nonFlakeDir/shebang-comments.sh ) = "foo" ]]
|
2024-03-27 15:55:02 +02:00
|
|
|
[[ "$($nonFlakeDir/shebang-different-comments.sh)" = "$(cat $nonFlakeDir/shebang-different-comments.sh)" ]]
|
2023-05-12 20:54:54 +03:00
|
|
|
[[ $($nonFlakeDir/shebang-inline-expr.sh baz) = "foo"$'\n'"baz" ]]
|
2023-05-12 20:56:04 +03:00
|
|
|
[[ $($nonFlakeDir/shebang-file.sh baz) = "foo"$'\n'"baz" ]]
|
2023-05-12 20:46:37 +03:00
|
|
|
expect 1 $nonFlakeDir/shebang-reject.sh 2>&1 | grepQuiet -F 'error: unsupported unquoted character in nix shebang: *. Use double backticks to escape?'
|
2024-06-29 00:30:43 +03:00
|
|
|
|
|
|
|
# Test that the --commit-lock-file-summary flag and its alias work
|
|
|
|
cat > "$lockfileSummaryFlake/flake.nix" <<EOF
|
|
|
|
{
|
|
|
|
inputs = {
|
|
|
|
flake1.url = "git+file://$flake1Dir";
|
|
|
|
};
|
|
|
|
|
|
|
|
description = "lockfileSummaryFlake";
|
|
|
|
|
|
|
|
outputs = inputs: rec {
|
|
|
|
packages.$system.default = inputs.flake1.packages.$system.foo;
|
|
|
|
};
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
|
|
|
|
git -C "$lockfileSummaryFlake" add flake.nix
|
|
|
|
git -C "$lockfileSummaryFlake" commit -m 'Add lockfileSummaryFlake'
|
|
|
|
|
|
|
|
testSummary="test summary 1"
|
|
|
|
nix flake lock "$lockfileSummaryFlake" --commit-lock-file --commit-lock-file-summary "$testSummary"
|
|
|
|
[[ -e "$lockfileSummaryFlake/flake.lock" ]]
|
|
|
|
[[ -z $(git -C "$lockfileSummaryFlake" diff main || echo failed) ]]
|
|
|
|
[[ "$(git -C "$lockfileSummaryFlake" log --format=%s -n 1)" = "$testSummary" ]]
|
|
|
|
|
|
|
|
git -C "$lockfileSummaryFlake" rm :/:flake.lock
|
|
|
|
git -C "$lockfileSummaryFlake" commit -m "remove flake.lock"
|
|
|
|
testSummary="test summary 2"
|
|
|
|
# NOTE(cole-h): We use `--option` here because Nix settings do not currently support flag-ifying the
|
|
|
|
# alias of a setting: https://github.com/NixOS/nix/issues/10989
|
|
|
|
nix flake lock "$lockfileSummaryFlake" --commit-lock-file --option commit-lockfile-summary "$testSummary"
|
|
|
|
[[ -e "$lockfileSummaryFlake/flake.lock" ]]
|
|
|
|
[[ -z $(git -C "$lockfileSummaryFlake" diff main || echo failed) ]]
|
|
|
|
[[ "$(git -C "$lockfileSummaryFlake" log --format=%s -n 1)" = "$testSummary" ]]
|