2019-04-08 18:28:05 +03:00
|
|
|
|
{
|
|
|
|
|
description = "The purely functional package manager";
|
|
|
|
|
|
2021-12-15 14:49:05 +02:00
|
|
|
|
inputs.nixpkgs.url = "nixpkgs/nixos-21.05-small";
|
2022-01-25 01:02:48 +02:00
|
|
|
|
inputs.nixpkgs-regression.url = "nixpkgs/215d4d0fd80ca5163643b03a33fde804a29cc1e2";
|
2021-09-24 16:21:41 +03:00
|
|
|
|
inputs.lowdown-src = { url = "github:kristapsdz/lowdown"; flake = false; };
|
2019-04-08 18:28:05 +03:00
|
|
|
|
|
2022-01-25 01:02:48 +02:00
|
|
|
|
outputs = { self, nixpkgs, nixpkgs-regression, lowdown-src }:
|
2019-04-08 18:28:05 +03:00
|
|
|
|
|
2019-10-04 11:45:33 +03:00
|
|
|
|
let
|
2019-05-29 18:25:41 +03:00
|
|
|
|
|
2020-04-01 01:20:12 +03:00
|
|
|
|
version = builtins.readFile ./.version + versionSuffix;
|
|
|
|
|
versionSuffix =
|
|
|
|
|
if officialRelease
|
|
|
|
|
then ""
|
2020-10-21 22:31:19 +03:00
|
|
|
|
else "pre${builtins.substring 0 8 (self.lastModifiedDate or self.lastModified or "19700101")}_${self.shortRev or "dirty"}";
|
2020-03-13 19:28:01 +02:00
|
|
|
|
|
2019-10-04 11:45:33 +03:00
|
|
|
|
officialRelease = false;
|
2019-04-08 18:28:05 +03:00
|
|
|
|
|
2020-10-28 07:13:18 +02:00
|
|
|
|
linux64BitSystems = [ "x86_64-linux" "aarch64-linux" ];
|
|
|
|
|
linuxSystems = linux64BitSystems ++ [ "i686-linux" ];
|
2021-05-29 20:40:56 +03:00
|
|
|
|
systems = linuxSystems ++ [ "x86_64-darwin" "aarch64-darwin" ];
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2021-02-06 02:22:34 +02:00
|
|
|
|
crossSystems = [ "armv6l-linux" "armv7l-linux" ];
|
2021-02-06 02:07:48 +02:00
|
|
|
|
|
2021-07-08 18:01:51 +03:00
|
|
|
|
stdenvs = [ "gccStdenv" "clangStdenv" "clang11Stdenv" "stdenv" ];
|
|
|
|
|
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
|
forAllSystems = f: nixpkgs.lib.genAttrs systems (system: f system);
|
2021-07-08 18:01:51 +03:00
|
|
|
|
forAllSystemsAndStdenvs = f: forAllSystems (system:
|
|
|
|
|
nixpkgs.lib.listToAttrs
|
|
|
|
|
(map
|
|
|
|
|
(n:
|
|
|
|
|
nixpkgs.lib.nameValuePair "${n}Packages" (
|
|
|
|
|
f system n
|
|
|
|
|
)) stdenvs
|
|
|
|
|
)
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
forAllStdenvs = stdenvs: f: nixpkgs.lib.genAttrs stdenvs (stdenv: f stdenv);
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
|
|
2019-10-04 11:45:33 +03:00
|
|
|
|
# Memoize nixpkgs for different platforms for efficiency.
|
2021-07-08 18:01:51 +03:00
|
|
|
|
nixpkgsFor =
|
|
|
|
|
let stdenvsPackages = forAllSystemsAndStdenvs
|
|
|
|
|
(system: stdenv:
|
|
|
|
|
import nixpkgs {
|
|
|
|
|
inherit system;
|
|
|
|
|
overlays = [
|
|
|
|
|
(overlayFor (p: p.${stdenv}))
|
|
|
|
|
];
|
|
|
|
|
}
|
|
|
|
|
);
|
|
|
|
|
in
|
|
|
|
|
# Add the `stdenvPackages` at toplevel, both because these are the ones
|
|
|
|
|
# we want most of the time and for backwards compatibility
|
|
|
|
|
forAllSystems (system: stdenvsPackages.${system} // stdenvsPackages.${system}.stdenvPackages);
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
|
|
|
|
commonDeps = pkgs: with pkgs; rec {
|
|
|
|
|
# Use "busybox-sandbox-shell" if present,
|
|
|
|
|
# if not (legacy) fallback and hope it's sufficient.
|
|
|
|
|
sh = pkgs.busybox-sandbox-shell or (busybox.override {
|
|
|
|
|
useMusl = true;
|
|
|
|
|
enableStatic = true;
|
|
|
|
|
enableMinimal = true;
|
|
|
|
|
extraConfig = ''
|
|
|
|
|
CONFIG_FEATURE_FANCY_ECHO y
|
|
|
|
|
CONFIG_FEATURE_SH_MATH y
|
|
|
|
|
CONFIG_FEATURE_SH_MATH_64 y
|
|
|
|
|
|
|
|
|
|
CONFIG_ASH y
|
|
|
|
|
CONFIG_ASH_OPTIMIZE_FOR_SIZE y
|
|
|
|
|
|
|
|
|
|
CONFIG_ASH_ALIAS y
|
|
|
|
|
CONFIG_ASH_BASH_COMPAT y
|
|
|
|
|
CONFIG_ASH_CMDCMD y
|
|
|
|
|
CONFIG_ASH_ECHO y
|
|
|
|
|
CONFIG_ASH_GETOPTS y
|
|
|
|
|
CONFIG_ASH_INTERNAL_GLOB y
|
|
|
|
|
CONFIG_ASH_JOB_CONTROL y
|
|
|
|
|
CONFIG_ASH_PRINTF y
|
|
|
|
|
CONFIG_ASH_TEST y
|
|
|
|
|
'';
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
configureFlags =
|
2019-11-06 11:44:21 +02:00
|
|
|
|
lib.optionals stdenv.isLinux [
|
2021-10-23 16:32:48 +03:00
|
|
|
|
"--with-boost=${boost}/lib"
|
2019-10-04 11:45:33 +03:00
|
|
|
|
"--with-sandbox-shell=${sh}/bin/busybox"
|
2020-09-23 17:05:47 +03:00
|
|
|
|
"LDFLAGS=-fuse-ld=gold"
|
2019-10-04 11:45:33 +03:00
|
|
|
|
];
|
|
|
|
|
|
2020-07-30 22:59:57 +03:00
|
|
|
|
|
|
|
|
|
nativeBuildDeps =
|
|
|
|
|
[
|
|
|
|
|
buildPackages.bison
|
|
|
|
|
buildPackages.flex
|
2021-09-27 11:31:13 +03:00
|
|
|
|
(lib.getBin buildPackages.lowdown-nix)
|
2020-09-04 05:40:36 +03:00
|
|
|
|
buildPackages.mdbook
|
2020-09-04 05:30:12 +03:00
|
|
|
|
buildPackages.autoconf-archive
|
2020-07-30 22:59:57 +03:00
|
|
|
|
buildPackages.autoreconfHook
|
2021-12-15 20:13:06 +02:00
|
|
|
|
buildPackages.pkg-config
|
2020-07-30 22:59:57 +03:00
|
|
|
|
|
|
|
|
|
# Tests
|
|
|
|
|
buildPackages.git
|
2021-10-06 19:29:20 +03:00
|
|
|
|
buildPackages.mercurial # FIXME: remove? only needed for tests
|
2020-07-30 23:49:45 +03:00
|
|
|
|
buildPackages.jq
|
2021-03-24 15:50:15 +02:00
|
|
|
|
]
|
2021-06-25 23:51:02 +03:00
|
|
|
|
++ lib.optionals stdenv.hostPlatform.isLinux [(buildPackages.util-linuxMinimal or buildPackages.utillinuxMinimal)];
|
2020-07-30 22:59:57 +03:00
|
|
|
|
|
2020-03-13 19:28:01 +02:00
|
|
|
|
buildDeps =
|
2020-09-04 05:30:12 +03:00
|
|
|
|
[ curl
|
2021-04-15 14:51:00 +03:00
|
|
|
|
bzip2 xz brotli editline
|
2020-09-04 05:30:12 +03:00
|
|
|
|
openssl sqlite
|
2019-12-20 13:45:58 +02:00
|
|
|
|
libarchive
|
2019-10-04 11:45:33 +03:00
|
|
|
|
boost
|
2021-09-27 11:31:13 +03:00
|
|
|
|
lowdown-nix
|
2021-11-22 18:57:30 +02:00
|
|
|
|
gtest
|
2019-10-04 11:45:33 +03:00
|
|
|
|
]
|
2021-03-24 15:50:15 +02:00
|
|
|
|
++ lib.optionals stdenv.isLinux [libseccomp]
|
2021-02-16 15:32:12 +02:00
|
|
|
|
++ lib.optional (stdenv.isLinux || stdenv.isDarwin) libsodium
|
2021-03-09 19:40:16 +02:00
|
|
|
|
++ lib.optional stdenv.hostPlatform.isx86_64 libcpuid;
|
2020-07-30 22:59:57 +03:00
|
|
|
|
|
|
|
|
|
awsDeps = lib.optional (stdenv.isLinux || stdenv.isDarwin)
|
|
|
|
|
(aws-sdk-cpp.override {
|
|
|
|
|
apis = ["s3" "transfer"];
|
|
|
|
|
customMemoryManagement = false;
|
|
|
|
|
});
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2020-02-15 22:48:28 +02:00
|
|
|
|
propagatedDeps =
|
2021-06-24 19:02:51 +03:00
|
|
|
|
[ ((boehmgc.override {
|
|
|
|
|
enableLargeConfig = true;
|
|
|
|
|
}).overrideAttrs(o: {
|
|
|
|
|
patches = (o.patches or []) ++ [
|
|
|
|
|
./boehmgc-coroutine-sp-fallback.diff
|
|
|
|
|
];
|
|
|
|
|
}))
|
2020-02-15 22:48:28 +02:00
|
|
|
|
];
|
|
|
|
|
|
2019-10-04 11:45:33 +03:00
|
|
|
|
perlDeps =
|
|
|
|
|
[ perl
|
|
|
|
|
perlPackages.DBDSQLite
|
|
|
|
|
];
|
|
|
|
|
};
|
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
installScriptFor = systems:
|
|
|
|
|
with nixpkgsFor.x86_64-linux;
|
2021-02-15 12:20:54 +02:00
|
|
|
|
runCommand "installer-script"
|
|
|
|
|
{ buildInputs = [ nix ];
|
|
|
|
|
}
|
|
|
|
|
''
|
|
|
|
|
mkdir -p $out/nix-support
|
|
|
|
|
|
2021-10-05 15:50:55 +03:00
|
|
|
|
# Converts /nix/store/50p3qk8k...-nix-2.4pre20201102_550e11f/bin/nix to 50p3qk8k.../bin/nix.
|
2021-02-15 12:20:54 +02:00
|
|
|
|
tarballPath() {
|
|
|
|
|
# Remove the store prefix
|
|
|
|
|
local path=''${1#${builtins.storeDir}/}
|
|
|
|
|
# Get the path relative to the derivation root
|
|
|
|
|
local rest=''${path#*/}
|
|
|
|
|
# Get the derivation hash
|
|
|
|
|
local drvHash=''${path%%-*}
|
|
|
|
|
echo "$drvHash/$rest"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
substitute ${./scripts/install.in} $out/install \
|
|
|
|
|
${pkgs.lib.concatMapStrings
|
2021-06-26 08:12:03 +03:00
|
|
|
|
(system: let
|
|
|
|
|
tarball = if builtins.elem system crossSystems then self.hydraJobs.binaryTarballCross.x86_64-linux.${system} else self.hydraJobs.binaryTarball.${system};
|
|
|
|
|
in '' \
|
|
|
|
|
--replace '@tarballHash_${system}@' $(nix --experimental-features nix-command hash-file --base16 --type sha256 ${tarball}/*.tar.xz) \
|
|
|
|
|
--replace '@tarballPath_${system}@' $(tarballPath ${tarball}/*.tar.xz) \
|
2021-02-15 12:20:54 +02:00
|
|
|
|
''
|
|
|
|
|
)
|
|
|
|
|
systems
|
|
|
|
|
} --replace '@nixVersion@' ${version}
|
|
|
|
|
|
|
|
|
|
echo "file installer $out/install" >> $out/nix-support/hydra-build-products
|
|
|
|
|
'';
|
|
|
|
|
|
2021-10-05 15:50:55 +03:00
|
|
|
|
testNixVersions = pkgs: client: daemon: with commonDeps pkgs; with pkgs.lib; pkgs.stdenv.mkDerivation {
|
2021-03-16 14:43:08 +02:00
|
|
|
|
NIX_DAEMON_PACKAGE = daemon;
|
|
|
|
|
NIX_CLIENT_PACKAGE = client;
|
2021-10-05 15:50:55 +03:00
|
|
|
|
name =
|
|
|
|
|
"nix-tests"
|
|
|
|
|
+ optionalString
|
|
|
|
|
(versionAtLeast daemon.version "2.4pre20211005" &&
|
|
|
|
|
versionAtLeast client.version "2.4pre20211005")
|
|
|
|
|
"-${client.version}-against-${daemon.version}";
|
2021-03-16 14:43:08 +02:00
|
|
|
|
inherit version;
|
|
|
|
|
|
|
|
|
|
src = self;
|
|
|
|
|
|
|
|
|
|
VERSION_SUFFIX = versionSuffix;
|
|
|
|
|
|
|
|
|
|
nativeBuildInputs = nativeBuildDeps;
|
|
|
|
|
buildInputs = buildDeps ++ awsDeps;
|
|
|
|
|
propagatedBuildInputs = propagatedDeps;
|
|
|
|
|
|
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
|
|
|
|
|
dontBuild = true;
|
|
|
|
|
doInstallCheck = true;
|
|
|
|
|
|
|
|
|
|
installPhase = ''
|
|
|
|
|
mkdir -p $out
|
|
|
|
|
'';
|
|
|
|
|
|
2021-09-14 12:34:17 +03:00
|
|
|
|
installCheckPhase = "make installcheck -j$NIX_BUILD_CORES -l$NIX_BUILD_CORES";
|
2021-03-16 14:43:08 +02:00
|
|
|
|
};
|
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
binaryTarball = buildPackages: nix: pkgs:
|
|
|
|
|
let
|
|
|
|
|
inherit (pkgs) cacert;
|
|
|
|
|
installerClosureInfo = buildPackages.closureInfo { rootPaths = [ nix cacert ]; };
|
|
|
|
|
in
|
|
|
|
|
|
|
|
|
|
buildPackages.runCommand "nix-binary-tarball-${version}"
|
|
|
|
|
{ #nativeBuildInputs = lib.optional (system != "aarch64-linux") shellcheck;
|
|
|
|
|
meta.description = "Distribution-independent Nix bootstrap binaries for ${pkgs.system}";
|
|
|
|
|
}
|
|
|
|
|
''
|
|
|
|
|
cp ${installerClosureInfo}/registration $TMPDIR/reginfo
|
|
|
|
|
cp ${./scripts/create-darwin-volume.sh} $TMPDIR/create-darwin-volume.sh
|
|
|
|
|
substitute ${./scripts/install-nix-from-closure.sh} $TMPDIR/install \
|
|
|
|
|
--subst-var-by nix ${nix} \
|
|
|
|
|
--subst-var-by cacert ${cacert}
|
|
|
|
|
|
|
|
|
|
substitute ${./scripts/install-darwin-multi-user.sh} $TMPDIR/install-darwin-multi-user.sh \
|
|
|
|
|
--subst-var-by nix ${nix} \
|
|
|
|
|
--subst-var-by cacert ${cacert}
|
|
|
|
|
substitute ${./scripts/install-systemd-multi-user.sh} $TMPDIR/install-systemd-multi-user.sh \
|
|
|
|
|
--subst-var-by nix ${nix} \
|
|
|
|
|
--subst-var-by cacert ${cacert}
|
|
|
|
|
substitute ${./scripts/install-multi-user.sh} $TMPDIR/install-multi-user \
|
|
|
|
|
--subst-var-by nix ${nix} \
|
|
|
|
|
--subst-var-by cacert ${cacert}
|
|
|
|
|
|
|
|
|
|
if type -p shellcheck; then
|
|
|
|
|
# SC1090: Don't worry about not being able to find
|
|
|
|
|
# $nix/etc/profile.d/nix.sh
|
|
|
|
|
shellcheck --exclude SC1090 $TMPDIR/install
|
|
|
|
|
shellcheck $TMPDIR/create-darwin-volume.sh
|
|
|
|
|
shellcheck $TMPDIR/install-darwin-multi-user.sh
|
|
|
|
|
shellcheck $TMPDIR/install-systemd-multi-user.sh
|
|
|
|
|
|
|
|
|
|
# SC1091: Don't panic about not being able to source
|
|
|
|
|
# /etc/profile
|
|
|
|
|
# SC2002: Ignore "useless cat" "error", when loading
|
|
|
|
|
# .reginfo, as the cat is a much cleaner
|
|
|
|
|
# implementation, even though it is "useless"
|
|
|
|
|
# SC2116: Allow ROOT_HOME=$(echo ~root) for resolving
|
|
|
|
|
# root's home directory
|
|
|
|
|
shellcheck --external-sources \
|
|
|
|
|
--exclude SC1091,SC2002,SC2116 $TMPDIR/install-multi-user
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
chmod +x $TMPDIR/install
|
|
|
|
|
chmod +x $TMPDIR/create-darwin-volume.sh
|
|
|
|
|
chmod +x $TMPDIR/install-darwin-multi-user.sh
|
|
|
|
|
chmod +x $TMPDIR/install-systemd-multi-user.sh
|
|
|
|
|
chmod +x $TMPDIR/install-multi-user
|
|
|
|
|
dir=nix-${version}-${pkgs.system}
|
|
|
|
|
fn=$out/$dir.tar.xz
|
|
|
|
|
mkdir -p $out/nix-support
|
|
|
|
|
echo "file binary-dist $fn" >> $out/nix-support/hydra-build-products
|
|
|
|
|
tar cvfJ $fn \
|
|
|
|
|
--owner=0 --group=0 --mode=u+rw,uga+r \
|
|
|
|
|
--absolute-names \
|
|
|
|
|
--hard-dereference \
|
|
|
|
|
--transform "s,$TMPDIR/install,$dir/install," \
|
|
|
|
|
--transform "s,$TMPDIR/create-darwin-volume.sh,$dir/create-darwin-volume.sh," \
|
|
|
|
|
--transform "s,$TMPDIR/reginfo,$dir/.reginfo," \
|
|
|
|
|
--transform "s,$NIX_STORE,$dir/store,S" \
|
|
|
|
|
$TMPDIR/install \
|
|
|
|
|
$TMPDIR/create-darwin-volume.sh \
|
|
|
|
|
$TMPDIR/install-darwin-multi-user.sh \
|
|
|
|
|
$TMPDIR/install-systemd-multi-user.sh \
|
|
|
|
|
$TMPDIR/install-multi-user \
|
|
|
|
|
$TMPDIR/reginfo \
|
|
|
|
|
$(cat ${installerClosureInfo}/store-paths)
|
|
|
|
|
'';
|
2021-06-26 08:12:03 +03:00
|
|
|
|
|
2021-07-08 18:01:51 +03:00
|
|
|
|
overlayFor = getStdenv: final: prev:
|
2022-01-25 02:28:44 +02:00
|
|
|
|
let currentStdenv = getStdenv final; in
|
|
|
|
|
{
|
|
|
|
|
nixStable = prev.nix;
|
2020-11-10 11:43:33 +02:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
# Forward from the previous stage as we don’t want it to pick the lowdown override
|
|
|
|
|
nixUnstable = prev.nixUnstable;
|
2021-09-20 15:37:09 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
nix = with final; with commonDeps pkgs; currentStdenv.mkDerivation {
|
|
|
|
|
name = "nix-${version}";
|
|
|
|
|
inherit version;
|
2020-03-13 19:28:01 +02:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
src = self;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
VERSION_SUFFIX = versionSuffix;
|
2020-04-01 01:20:12 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
outputs = [ "out" "dev" "doc" ];
|
2019-10-07 15:02:52 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
nativeBuildInputs = nativeBuildDeps;
|
|
|
|
|
buildInputs = buildDeps ++ awsDeps;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
propagatedBuildInputs = propagatedDeps;
|
2020-02-15 22:48:28 +02:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
disallowedReferences = [ boost ];
|
2022-01-14 16:41:14 +02:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
preConfigure =
|
|
|
|
|
''
|
|
|
|
|
# Copy libboost_context so we don't get all of Boost in our closure.
|
|
|
|
|
# https://github.com/NixOS/nixpkgs/issues/45462
|
|
|
|
|
mkdir -p $out/lib
|
|
|
|
|
cp -pd ${boost}/lib/{libboost_context*,libboost_thread*,libboost_system*} $out/lib
|
|
|
|
|
rm -f $out/lib/*.a
|
|
|
|
|
${lib.optionalString currentStdenv.isLinux ''
|
|
|
|
|
chmod u+w $out/lib/*.so.*
|
|
|
|
|
patchelf --set-rpath $out/lib:${currentStdenv.cc.cc.lib}/lib $out/lib/libboost_thread.so.*
|
|
|
|
|
''}
|
|
|
|
|
${lib.optionalString currentStdenv.isDarwin ''
|
|
|
|
|
for LIB in $out/lib/*.dylib; do
|
|
|
|
|
chmod u+w $LIB
|
|
|
|
|
install_name_tool -id $LIB $LIB
|
|
|
|
|
done
|
|
|
|
|
install_name_tool -change ${boost}/lib/libboost_system.dylib $out/lib/libboost_system.dylib $out/lib/libboost_thread.dylib
|
|
|
|
|
''}
|
|
|
|
|
'';
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
configureFlags = configureFlags ++
|
|
|
|
|
[ "--sysconfdir=/etc" ];
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
enableParallelBuilding = true;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
makeFlags = "profiledir=$(out)/etc/profile.d PRECOMPILE_HEADERS=1";
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
doCheck = true;
|
2020-03-13 19:28:01 +02:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
installFlags = "sysconfdir=$(out)/etc";
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
postInstall = ''
|
|
|
|
|
mkdir -p $doc/nix-support
|
|
|
|
|
echo "doc manual $doc/share/doc/nix/manual" >> $doc/nix-support/hydra-build-products
|
|
|
|
|
${lib.optionalString currentStdenv.isDarwin ''
|
|
|
|
|
install_name_tool \
|
|
|
|
|
-change ${boost}/lib/libboost_context.dylib \
|
|
|
|
|
$out/lib/libboost_context.dylib \
|
|
|
|
|
$out/lib/libnixutil.dylib
|
|
|
|
|
''}
|
|
|
|
|
'';
|
2020-05-28 13:55:24 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
doInstallCheck = true;
|
|
|
|
|
installCheckFlags = "sysconfdir=$(out)/etc";
|
2020-02-15 22:30:26 +02:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
separateDebugInfo = true;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
strictDeps = true;
|
2021-03-23 13:06:43 +02:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
passthru.perl-bindings = with final; currentStdenv.mkDerivation {
|
|
|
|
|
name = "nix-perl-${version}";
|
2020-03-13 19:28:01 +02:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
src = self;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
nativeBuildInputs =
|
|
|
|
|
[ buildPackages.autoconf-archive
|
|
|
|
|
buildPackages.autoreconfHook
|
|
|
|
|
buildPackages.pkg-config
|
|
|
|
|
];
|
2020-09-04 05:30:12 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
buildInputs =
|
|
|
|
|
[ nix
|
|
|
|
|
curl
|
|
|
|
|
bzip2
|
|
|
|
|
xz
|
|
|
|
|
pkgs.perl
|
|
|
|
|
boost
|
|
|
|
|
]
|
|
|
|
|
++ lib.optional (currentStdenv.isLinux || currentStdenv.isDarwin) libsodium
|
|
|
|
|
++ lib.optional currentStdenv.isDarwin darwin.apple_sdk.frameworks.Security;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
configureFlags = ''
|
|
|
|
|
--with-dbi=${perlPackages.DBI}/${pkgs.perl.libPrefix}
|
|
|
|
|
--with-dbd-sqlite=${perlPackages.DBDSQLite}/${pkgs.perl.libPrefix}
|
|
|
|
|
'';
|
2019-10-04 18:25:59 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
enableParallelBuilding = true;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
postUnpack = "sourceRoot=$sourceRoot/perl";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
};
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
lowdown-nix = with final; currentStdenv.mkDerivation rec {
|
|
|
|
|
name = "lowdown-0.9.0";
|
2020-07-22 14:51:11 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
src = lowdown-src;
|
2020-07-22 14:51:11 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
outputs = [ "out" "bin" "dev" ];
|
2020-07-22 14:51:11 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
nativeBuildInputs = [ buildPackages.which ];
|
2020-07-22 14:51:11 +03:00
|
|
|
|
|
2022-01-25 02:28:44 +02:00
|
|
|
|
configurePhase = ''
|
|
|
|
|
${if (currentStdenv.isDarwin && currentStdenv.isAarch64) then "echo \"HAVE_SANDBOX_INIT=false\" > configure.local" else ""}
|
|
|
|
|
./configure \
|
|
|
|
|
PREFIX=${placeholder "dev"} \
|
|
|
|
|
BINDIR=${placeholder "bin"}/bin
|
|
|
|
|
'';
|
|
|
|
|
};
|
2020-07-22 14:51:11 +03:00
|
|
|
|
};
|
2020-03-13 19:31:16 +02:00
|
|
|
|
|
2021-07-08 18:01:51 +03:00
|
|
|
|
in {
|
|
|
|
|
|
|
|
|
|
# A Nixpkgs overlay that overrides the 'nix' and
|
|
|
|
|
# 'nix.perl-bindings' packages.
|
|
|
|
|
overlay = overlayFor (p: p.stdenv);
|
|
|
|
|
|
2020-03-13 19:31:16 +02:00
|
|
|
|
hydraJobs = {
|
|
|
|
|
|
2019-10-04 11:45:33 +03:00
|
|
|
|
# Binary package for various platforms.
|
2020-07-30 22:59:57 +03:00
|
|
|
|
build = nixpkgs.lib.genAttrs systems (system: self.packages.${system}.nix);
|
|
|
|
|
|
2020-10-28 07:13:18 +02:00
|
|
|
|
buildStatic = nixpkgs.lib.genAttrs linux64BitSystems (system: self.packages.${system}.nix-static);
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2021-02-06 02:07:48 +02:00
|
|
|
|
buildCross = nixpkgs.lib.genAttrs crossSystems (crossSystem:
|
2021-06-30 05:46:54 +03:00
|
|
|
|
nixpkgs.lib.genAttrs ["x86_64-linux"] (system: self.packages.${system}."nix-${crossSystem}"));
|
2021-02-06 02:07:48 +02:00
|
|
|
|
|
2019-10-04 11:45:33 +03:00
|
|
|
|
# Perl bindings for various platforms.
|
2020-07-30 22:59:57 +03:00
|
|
|
|
perlBindings = nixpkgs.lib.genAttrs systems (system: self.packages.${system}.nix.perl-bindings);
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
|
|
|
|
# Binary tarball for various platforms, containing a Nix store
|
|
|
|
|
# with the closure of 'nix' package, and the second half of
|
|
|
|
|
# the installation script.
|
2021-06-28 23:08:17 +03:00
|
|
|
|
binaryTarball = nixpkgs.lib.genAttrs systems (system: binaryTarball nixpkgsFor.${system} nixpkgsFor.${system}.nix nixpkgsFor.${system});
|
2021-06-26 08:12:03 +03:00
|
|
|
|
|
2021-06-30 05:46:54 +03:00
|
|
|
|
binaryTarballCross = nixpkgs.lib.genAttrs ["x86_64-linux"] (system: builtins.listToAttrs (map (crossSystem: {
|
2021-06-26 08:12:03 +03:00
|
|
|
|
name = crossSystem;
|
|
|
|
|
value = let
|
|
|
|
|
nixpkgsCross = import nixpkgs {
|
|
|
|
|
inherit system crossSystem;
|
|
|
|
|
overlays = [ self.overlay ];
|
|
|
|
|
};
|
|
|
|
|
in binaryTarball nixpkgsFor.${system} self.packages.${system}."nix-${crossSystem}" nixpkgsCross;
|
|
|
|
|
}) crossSystems));
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
|
|
|
|
# The first half of the installation script. This is uploaded
|
|
|
|
|
# to https://nixos.org/nix/install. It downloads the binary
|
|
|
|
|
# tarball for the user's system and calls the second half of the
|
|
|
|
|
# installation script.
|
2021-06-26 08:12:03 +03:00
|
|
|
|
installerScript = installScriptFor [ "x86_64-linux" "i686-linux" "aarch64-linux" "x86_64-darwin" "aarch64-darwin" "armv6l-linux" "armv7l-linux" ];
|
2021-06-26 08:14:54 +03:00
|
|
|
|
installerScriptForGHA = installScriptFor [ "x86_64-linux" "x86_64-darwin" "armv6l-linux" "armv7l-linux"];
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2021-10-31 01:22:35 +03:00
|
|
|
|
# docker image with Nix inside
|
|
|
|
|
dockerImage = nixpkgs.lib.genAttrs linux64BitSystems (system:
|
2021-11-23 12:31:05 +02:00
|
|
|
|
let
|
2021-10-31 01:22:35 +03:00
|
|
|
|
pkgs = nixpkgsFor.${system};
|
2021-11-23 12:31:05 +02:00
|
|
|
|
image = import ./docker.nix { inherit pkgs; tag = version; };
|
|
|
|
|
in pkgs.runCommand "docker-image-tarball-${version}"
|
|
|
|
|
{ meta.description = "Docker image with Nix for ${system}";
|
|
|
|
|
}
|
|
|
|
|
''
|
|
|
|
|
mkdir -p $out/nix-support
|
|
|
|
|
image=$out/image.tar.gz
|
2021-11-24 10:18:33 +02:00
|
|
|
|
ln -s ${image} $image
|
2021-11-23 12:31:05 +02:00
|
|
|
|
echo "file binary-dist $image" >> $out/nix-support/hydra-build-products
|
|
|
|
|
'');
|
2021-10-31 01:22:35 +03:00
|
|
|
|
|
2019-10-04 11:45:33 +03:00
|
|
|
|
# Line coverage analysis.
|
|
|
|
|
coverage =
|
|
|
|
|
with nixpkgsFor.x86_64-linux;
|
|
|
|
|
with commonDeps pkgs;
|
|
|
|
|
|
|
|
|
|
releaseTools.coverageAnalysis {
|
2020-03-13 19:28:01 +02:00
|
|
|
|
name = "nix-coverage-${version}";
|
|
|
|
|
|
|
|
|
|
src = self;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2020-01-21 22:18:52 +02:00
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
|
2020-07-30 22:59:57 +03:00
|
|
|
|
nativeBuildInputs = nativeBuildDeps;
|
|
|
|
|
buildInputs = buildDeps ++ propagatedDeps ++ awsDeps;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
|
|
|
|
dontInstall = false;
|
|
|
|
|
|
|
|
|
|
doInstallCheck = true;
|
|
|
|
|
|
2019-11-08 15:29:10 +02:00
|
|
|
|
lcovFilter = [ "*/boost/*" "*-tab.*" ];
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
|
|
|
|
# We call `dot', and even though we just use it to
|
|
|
|
|
# syntax-check generated dot files, it still requires some
|
|
|
|
|
# fonts. So provide those.
|
|
|
|
|
FONTCONFIG_FILE = texFunctions.fontsConf;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
# System tests.
|
|
|
|
|
tests.remoteBuilds = import ./tests/remote-builds.nix {
|
|
|
|
|
system = "x86_64-linux";
|
|
|
|
|
inherit nixpkgs;
|
|
|
|
|
inherit (self) overlay;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
tests.nix-copy-closure = import ./tests/nix-copy-closure.nix {
|
|
|
|
|
system = "x86_64-linux";
|
|
|
|
|
inherit nixpkgs;
|
|
|
|
|
inherit (self) overlay;
|
|
|
|
|
};
|
|
|
|
|
|
2021-10-07 19:58:15 +03:00
|
|
|
|
tests.nssPreload = (import ./tests/nss-preload.nix rec {
|
|
|
|
|
system = "x86_64-linux";
|
|
|
|
|
inherit nixpkgs;
|
|
|
|
|
inherit (self) overlay;
|
|
|
|
|
});
|
|
|
|
|
|
2019-10-04 11:45:33 +03:00
|
|
|
|
tests.githubFlakes = (import ./tests/github-flakes.nix rec {
|
|
|
|
|
system = "x86_64-linux";
|
|
|
|
|
inherit nixpkgs;
|
|
|
|
|
inherit (self) overlay;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
tests.setuid = nixpkgs.lib.genAttrs
|
|
|
|
|
["i686-linux" "x86_64-linux"]
|
|
|
|
|
(system:
|
|
|
|
|
import ./tests/setuid.nix rec {
|
|
|
|
|
inherit nixpkgs system;
|
|
|
|
|
inherit (self) overlay;
|
|
|
|
|
});
|
|
|
|
|
|
2022-01-25 01:02:48 +02:00
|
|
|
|
# Make sure that nix-env still produces the exact same result
|
|
|
|
|
# on a particular version of Nixpkgs.
|
2019-10-04 11:45:33 +03:00
|
|
|
|
tests.evalNixpkgs =
|
|
|
|
|
with nixpkgsFor.x86_64-linux;
|
|
|
|
|
runCommand "eval-nixos" { buildInputs = [ nix ]; }
|
|
|
|
|
''
|
2022-01-25 01:02:48 +02:00
|
|
|
|
type -p nix-env
|
|
|
|
|
# Note: we're filtering out nixos-install-tools because https://github.com/NixOS/nixpkgs/pull/153594#issuecomment-1020530593.
|
|
|
|
|
time nix-env --store dummy:// -f ${nixpkgs-regression} -qaP --drv-path | sort | grep -v nixos-install-tools > packages
|
|
|
|
|
[[ $(sha1sum < packages | cut -c1-40) = ff451c521e61e4fe72bdbe2d0ca5d1809affa733 ]]
|
|
|
|
|
mkdir $out
|
2019-10-04 11:45:33 +03:00
|
|
|
|
'';
|
2022-01-25 01:02:48 +02:00
|
|
|
|
|
|
|
|
|
metrics.nixpkgs = import "${nixpkgs-regression}/pkgs/top-level/metrics.nix" {
|
|
|
|
|
pkgs = nixpkgsFor.x86_64-linux;
|
|
|
|
|
nixpkgs = nixpkgs-regression;
|
|
|
|
|
};
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2021-10-15 13:36:29 +03:00
|
|
|
|
installTests = forAllSystems (system:
|
2021-03-16 14:43:08 +02:00
|
|
|
|
let pkgs = nixpkgsFor.${system}; in
|
|
|
|
|
pkgs.runCommand "install-tests" {
|
|
|
|
|
againstSelf = testNixVersions pkgs pkgs.nix pkgs.pkgs.nix;
|
2021-10-06 14:17:39 +03:00
|
|
|
|
againstCurrentUnstable =
|
|
|
|
|
# FIXME: temporarily disable this on macOS because of #3605.
|
|
|
|
|
if system == "x86_64-linux"
|
|
|
|
|
then testNixVersions pkgs pkgs.nix pkgs.nixUnstable
|
|
|
|
|
else null;
|
2021-03-16 14:43:08 +02:00
|
|
|
|
# Disabled because the latest stable version doesn't handle
|
|
|
|
|
# `NIX_DAEMON_SOCKET_PATH` which is required for the tests to work
|
|
|
|
|
# againstLatestStable = testNixVersions pkgs pkgs.nix pkgs.nixStable;
|
2021-10-15 13:36:29 +03:00
|
|
|
|
} "touch $out");
|
|
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
checks = forAllSystems (system: {
|
|
|
|
|
binaryTarball = self.hydraJobs.binaryTarball.${system};
|
|
|
|
|
perlBindings = self.hydraJobs.perlBindings.${system};
|
|
|
|
|
installTests = self.hydraJobs.installTests.${system};
|
2021-12-21 23:42:47 +02:00
|
|
|
|
} // (nixpkgs.lib.optionalAttrs (builtins.elem system linux64BitSystems)) {
|
2021-11-24 10:19:29 +02:00
|
|
|
|
dockerImage = self.hydraJobs.dockerImage.${system};
|
2021-12-21 23:42:47 +02:00
|
|
|
|
});
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
|
packages = forAllSystems (system: {
|
|
|
|
|
inherit (nixpkgsFor.${system}) nix;
|
2021-02-06 02:07:48 +02:00
|
|
|
|
} // (nixpkgs.lib.optionalAttrs (builtins.elem system linux64BitSystems) {
|
2020-07-30 22:59:57 +03:00
|
|
|
|
nix-static = let
|
|
|
|
|
nixpkgs = nixpkgsFor.${system}.pkgsStatic;
|
|
|
|
|
in with commonDeps nixpkgs; nixpkgs.stdenv.mkDerivation {
|
|
|
|
|
name = "nix-${version}";
|
|
|
|
|
|
|
|
|
|
src = self;
|
|
|
|
|
|
|
|
|
|
VERSION_SUFFIX = versionSuffix;
|
|
|
|
|
|
|
|
|
|
outputs = [ "out" "dev" "doc" ];
|
|
|
|
|
|
|
|
|
|
nativeBuildInputs = nativeBuildDeps;
|
|
|
|
|
buildInputs = buildDeps ++ propagatedDeps;
|
|
|
|
|
|
|
|
|
|
configureFlags = [ "--sysconfdir=/etc" ];
|
|
|
|
|
|
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
|
|
|
|
|
makeFlags = "profiledir=$(out)/etc/profile.d";
|
|
|
|
|
|
|
|
|
|
doCheck = true;
|
|
|
|
|
|
|
|
|
|
installFlags = "sysconfdir=$(out)/etc";
|
|
|
|
|
|
|
|
|
|
postInstall = ''
|
|
|
|
|
mkdir -p $doc/nix-support
|
|
|
|
|
echo "doc manual $doc/share/doc/nix/manual" >> $doc/nix-support/hydra-build-products
|
2020-12-04 02:03:30 +02:00
|
|
|
|
mkdir -p $out/nix-support
|
|
|
|
|
echo "file binary-dist $out/bin/nix" >> $out/nix-support/hydra-build-products
|
2020-07-30 22:59:57 +03:00
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
doInstallCheck = true;
|
|
|
|
|
installCheckFlags = "sysconfdir=$(out)/etc";
|
|
|
|
|
|
|
|
|
|
stripAllList = ["bin"];
|
2021-03-23 13:06:43 +02:00
|
|
|
|
|
|
|
|
|
strictDeps = true;
|
2021-06-30 05:48:07 +03:00
|
|
|
|
|
|
|
|
|
hardeningDisable = [ "pie" ];
|
2020-07-30 22:59:57 +03:00
|
|
|
|
};
|
2021-02-06 02:07:48 +02:00
|
|
|
|
} // builtins.listToAttrs (map (crossSystem: {
|
|
|
|
|
name = "nix-${crossSystem}";
|
|
|
|
|
value = let
|
|
|
|
|
nixpkgsCross = import nixpkgs {
|
|
|
|
|
inherit system crossSystem;
|
|
|
|
|
overlays = [ self.overlay ];
|
|
|
|
|
};
|
|
|
|
|
in with commonDeps nixpkgsCross; nixpkgsCross.stdenv.mkDerivation {
|
|
|
|
|
name = "nix-${version}";
|
|
|
|
|
|
|
|
|
|
src = self;
|
|
|
|
|
|
|
|
|
|
VERSION_SUFFIX = versionSuffix;
|
|
|
|
|
|
|
|
|
|
outputs = [ "out" "dev" "doc" ];
|
|
|
|
|
|
|
|
|
|
nativeBuildInputs = nativeBuildDeps;
|
|
|
|
|
buildInputs = buildDeps ++ propagatedDeps;
|
|
|
|
|
|
|
|
|
|
configureFlags = [ "--sysconfdir=/etc" "--disable-doc-gen" ];
|
|
|
|
|
|
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
|
|
|
|
|
makeFlags = "profiledir=$(out)/etc/profile.d";
|
|
|
|
|
|
|
|
|
|
doCheck = true;
|
|
|
|
|
|
|
|
|
|
installFlags = "sysconfdir=$(out)/etc";
|
|
|
|
|
|
|
|
|
|
postInstall = ''
|
|
|
|
|
mkdir -p $doc/nix-support
|
|
|
|
|
echo "doc manual $doc/share/doc/nix/manual" >> $doc/nix-support/hydra-build-products
|
|
|
|
|
mkdir -p $out/nix-support
|
|
|
|
|
echo "file binary-dist $out/bin/nix" >> $out/nix-support/hydra-build-products
|
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
doInstallCheck = true;
|
|
|
|
|
installCheckFlags = "sysconfdir=$(out)/etc";
|
|
|
|
|
};
|
2021-07-08 18:01:51 +03:00
|
|
|
|
}) crossSystems)) // (builtins.listToAttrs (map (stdenvName:
|
|
|
|
|
nixpkgsFor.${system}.lib.nameValuePair
|
|
|
|
|
"nix-${stdenvName}"
|
|
|
|
|
nixpkgsFor.${system}."${stdenvName}Packages".nix
|
|
|
|
|
) stdenvs))
|
|
|
|
|
);
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
|
defaultPackage = forAllSystems (system: self.packages.${system}.nix);
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
2021-07-08 18:01:51 +03:00
|
|
|
|
devShell = forAllSystems (system: self.devShells.${system}.stdenvPackages);
|
|
|
|
|
|
|
|
|
|
devShells = forAllSystemsAndStdenvs (system: stdenv:
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
|
with nixpkgsFor.${system};
|
2019-10-04 11:45:33 +03:00
|
|
|
|
with commonDeps pkgs;
|
|
|
|
|
|
2021-07-08 18:01:51 +03:00
|
|
|
|
nixpkgsFor.${system}.${stdenv}.mkDerivation {
|
2019-10-04 11:45:33 +03:00
|
|
|
|
name = "nix";
|
|
|
|
|
|
2020-08-28 19:16:03 +03:00
|
|
|
|
outputs = [ "out" "dev" "doc" ];
|
|
|
|
|
|
2020-07-30 22:59:57 +03:00
|
|
|
|
nativeBuildInputs = nativeBuildDeps;
|
|
|
|
|
buildInputs = buildDeps ++ propagatedDeps ++ awsDeps ++ perlDeps;
|
2019-10-04 11:45:33 +03:00
|
|
|
|
|
|
|
|
|
inherit configureFlags;
|
|
|
|
|
|
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
|
|
|
|
|
installFlags = "sysconfdir=$(out)/etc";
|
|
|
|
|
|
|
|
|
|
shellHook =
|
|
|
|
|
''
|
|
|
|
|
PATH=$prefix/bin:$PATH
|
|
|
|
|
unset PYTHONPATH
|
2020-08-31 15:24:26 +03:00
|
|
|
|
export MANPATH=$out/share/man:$MANPATH
|
2021-12-22 14:21:45 +02:00
|
|
|
|
|
|
|
|
|
# Make bash completion work.
|
|
|
|
|
XDG_DATA_DIRS+=:$out/share
|
2019-10-04 11:45:33 +03:00
|
|
|
|
'';
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
|
});
|
2019-05-02 22:10:13 +03:00
|
|
|
|
|
2019-04-08 18:28:05 +03:00
|
|
|
|
};
|
|
|
|
|
}
|