2013-09-02 16:18:15 +03:00
|
|
|
#include <iostream>
|
|
|
|
#include <cstdlib>
|
2018-10-29 15:44:58 +02:00
|
|
|
#include <cstring>
|
|
|
|
#include <climits>
|
2013-09-02 16:18:15 +03:00
|
|
|
|
2013-09-06 14:01:02 +03:00
|
|
|
#include <setjmp.h>
|
|
|
|
|
2018-11-15 22:15:11 +02:00
|
|
|
#ifdef READLINE
|
|
|
|
#include <readline/history.h>
|
|
|
|
#include <readline/readline.h>
|
|
|
|
#else
|
2019-07-03 02:46:07 +03:00
|
|
|
// editline < 1.15.2 don't wrap their API for C++ usage
|
|
|
|
// (added in https://github.com/troglobit/editline/commit/91398ceb3427b730995357e9d120539fb9bb7461).
|
|
|
|
// This results in linker errors due to to name-mangling of editline C symbols.
|
|
|
|
// For compatibility with these versions, we wrap the API here
|
|
|
|
// (wrapping multiple times on newer versions is no problem).
|
|
|
|
extern "C" {
|
2018-10-29 15:44:58 +02:00
|
|
|
#include <editline.h>
|
2019-07-03 02:46:07 +03:00
|
|
|
}
|
2018-11-15 22:15:11 +02:00
|
|
|
#endif
|
2018-10-29 15:44:58 +02:00
|
|
|
|
2023-02-04 05:42:36 +02:00
|
|
|
#include "repl.hh"
|
|
|
|
|
2020-06-17 18:13:00 +03:00
|
|
|
#include "ansicolor.hh"
|
2013-09-02 16:18:15 +03:00
|
|
|
#include "shared.hh"
|
|
|
|
#include "eval.hh"
|
2022-02-19 01:33:03 +02:00
|
|
|
#include "eval-cache.hh"
|
2013-09-02 18:53:58 +03:00
|
|
|
#include "eval-inline.hh"
|
2023-07-31 16:19:19 +03:00
|
|
|
#include "eval-settings.hh"
|
2019-10-23 16:29:16 +03:00
|
|
|
#include "attr-path.hh"
|
2013-09-02 18:53:58 +03:00
|
|
|
#include "store-api.hh"
|
2022-03-08 20:20:39 +02:00
|
|
|
#include "log-store.hh"
|
2017-10-24 13:45:11 +03:00
|
|
|
#include "common-eval-args.hh"
|
2013-09-06 15:58:53 +03:00
|
|
|
#include "get-drvs.hh"
|
|
|
|
#include "derivations.hh"
|
2016-03-19 15:52:39 +02:00
|
|
|
#include "globals.hh"
|
2023-02-04 05:42:36 +02:00
|
|
|
#include "flake/flake.hh"
|
|
|
|
#include "flake/lockfile.hh"
|
|
|
|
#include "editor-for.hh"
|
2017-05-10 19:34:18 +03:00
|
|
|
#include "finally.hh"
|
2020-08-24 19:10:33 +03:00
|
|
|
#include "markdown.hh"
|
2022-04-18 20:21:47 +03:00
|
|
|
#include "local-fs-store.hh"
|
2022-08-22 15:27:36 +03:00
|
|
|
#include "progress-bar.hh"
|
2023-04-16 14:10:45 +03:00
|
|
|
#include "print.hh"
|
2017-05-10 19:34:18 +03:00
|
|
|
|
2020-08-06 12:40:41 +03:00
|
|
|
#if HAVE_BOEHMGC
|
2020-03-19 14:50:01 +02:00
|
|
|
#define GC_INCLUDE_NEW
|
|
|
|
#include <gc/gc_cpp.h>
|
2020-08-06 12:40:41 +03:00
|
|
|
#endif
|
2020-03-19 14:50:01 +02:00
|
|
|
|
2017-04-25 19:48:40 +03:00
|
|
|
namespace nix {
|
2013-09-02 16:18:15 +03:00
|
|
|
|
2020-08-06 12:40:41 +03:00
|
|
|
struct NixRepl
|
2023-02-21 16:38:46 +02:00
|
|
|
: AbstractNixRepl
|
2020-08-06 12:40:41 +03:00
|
|
|
#if HAVE_BOEHMGC
|
2023-02-21 16:38:46 +02:00
|
|
|
, gc
|
2020-08-06 12:40:41 +03:00
|
|
|
#endif
|
2013-09-02 18:53:58 +03:00
|
|
|
{
|
2022-05-05 13:29:14 +03:00
|
|
|
size_t debugTraceIndex;
|
2021-12-20 21:32:21 +02:00
|
|
|
|
2013-09-09 17:02:46 +03:00
|
|
|
Strings loadedFiles;
|
2022-02-19 01:33:03 +02:00
|
|
|
std::function<AnnotatedValues()> getValues;
|
2013-09-09 17:02:46 +03:00
|
|
|
|
2013-09-09 18:06:14 +03:00
|
|
|
const static int envSize = 32768;
|
2021-09-14 19:49:22 +03:00
|
|
|
std::shared_ptr<StaticEnv> staticEnv;
|
2013-09-02 18:53:58 +03:00
|
|
|
Env * env;
|
|
|
|
int displ;
|
2013-09-06 20:51:59 +03:00
|
|
|
StringSet varNames;
|
|
|
|
|
2017-04-25 19:56:29 +03:00
|
|
|
const Path historyFile;
|
|
|
|
|
2023-06-23 20:51:25 +03:00
|
|
|
NixRepl(const SearchPath & searchPath, nix::ref<Store> store,ref<EvalState> state,
|
2022-02-19 01:33:03 +02:00
|
|
|
std::function<AnnotatedValues()> getValues);
|
2023-02-04 05:42:36 +02:00
|
|
|
virtual ~NixRepl();
|
|
|
|
|
|
|
|
void mainLoop() override;
|
|
|
|
void initEnv() override;
|
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
StringSet completePrefix(const std::string & prefix);
|
2022-05-25 13:32:22 +03:00
|
|
|
bool getLine(std::string & input, const std::string & prompt);
|
2020-06-17 06:56:48 +03:00
|
|
|
StorePath getDerivationPath(Value & v);
|
2022-02-25 17:00:00 +02:00
|
|
|
bool processLine(std::string line);
|
2022-02-19 01:33:03 +02:00
|
|
|
|
2013-09-06 16:20:06 +03:00
|
|
|
void loadFile(const Path & path);
|
2021-07-19 18:47:03 +03:00
|
|
|
void loadFlake(const std::string & flakeRef);
|
2021-12-20 21:32:21 +02:00
|
|
|
void loadFiles();
|
2013-09-09 17:02:46 +03:00
|
|
|
void reloadFiles();
|
2013-09-02 19:18:27 +03:00
|
|
|
void addAttrsToScope(Value & attrs);
|
2022-04-22 22:45:39 +03:00
|
|
|
void addVarToScope(const Symbol name, Value & v);
|
2022-02-25 17:00:00 +02:00
|
|
|
Expr * parseString(std::string s);
|
|
|
|
void evalString(std::string s, Value & v);
|
2022-05-05 13:29:14 +03:00
|
|
|
void loadDebugTraceEnv(DebugTrace & dt);
|
2013-09-09 12:14:43 +03:00
|
|
|
|
2022-02-21 17:28:23 +02:00
|
|
|
typedef std::set<Value *> ValuesSeen;
|
2020-08-05 22:26:17 +03:00
|
|
|
std::ostream & printValue(std::ostream & str, Value & v, unsigned int maxDepth);
|
|
|
|
std::ostream & printValue(std::ostream & str, Value & v, unsigned int maxDepth, ValuesSeen & seen);
|
2013-09-02 18:53:58 +03:00
|
|
|
};
|
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
std::string removeWhitespace(std::string s)
|
2013-09-02 19:18:27 +03:00
|
|
|
{
|
|
|
|
s = chomp(s);
|
|
|
|
size_t n = s.find_first_not_of(" \n\r\t");
|
2022-02-25 17:00:00 +02:00
|
|
|
if (n != std::string::npos) s = std::string(s, n);
|
2013-09-02 19:18:27 +03:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-06-23 20:51:25 +03:00
|
|
|
NixRepl::NixRepl(const SearchPath & searchPath, nix::ref<Store> store, ref<EvalState> state,
|
2022-02-19 01:33:03 +02:00
|
|
|
std::function<NixRepl::AnnotatedValues()> getValues)
|
2023-02-04 05:42:36 +02:00
|
|
|
: AbstractNixRepl(state)
|
2022-03-28 21:09:21 +03:00
|
|
|
, debugTraceIndex(0)
|
2022-02-19 01:33:03 +02:00
|
|
|
, getValues(getValues)
|
2022-05-25 19:21:20 +03:00
|
|
|
, staticEnv(new StaticEnv(false, state->staticBaseEnv.get()))
|
2017-04-25 19:56:29 +03:00
|
|
|
, historyFile(getDataDir() + "/nix/repl-history")
|
2013-09-02 16:18:15 +03:00
|
|
|
{
|
2013-09-02 18:53:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-04-25 19:48:40 +03:00
|
|
|
NixRepl::~NixRepl()
|
|
|
|
{
|
2018-10-29 15:44:58 +02:00
|
|
|
write_history(historyFile.c_str());
|
2017-05-10 19:34:18 +03:00
|
|
|
}
|
|
|
|
|
2022-06-15 19:49:12 +03:00
|
|
|
void runNix(Path program, const Strings & args,
|
2021-06-29 15:52:46 +03:00
|
|
|
const std::optional<std::string> & input = {})
|
|
|
|
{
|
|
|
|
auto subprocessEnv = getEnv();
|
2021-07-15 19:17:18 +03:00
|
|
|
subprocessEnv["NIX_CONFIG"] = globalConfig.toKeyValue();
|
2021-06-29 15:52:46 +03:00
|
|
|
|
2022-06-15 19:49:12 +03:00
|
|
|
runProgram2(RunOptions {
|
2021-09-14 00:22:09 +03:00
|
|
|
.program = settings.nixBinDir+ "/" + program,
|
|
|
|
.args = args,
|
|
|
|
.environment = subprocessEnv,
|
|
|
|
.input = input,
|
|
|
|
});
|
2021-06-29 15:52:46 +03:00
|
|
|
|
2022-06-15 19:49:12 +03:00
|
|
|
return;
|
2021-06-29 15:52:46 +03:00
|
|
|
}
|
|
|
|
|
2017-05-10 19:34:18 +03:00
|
|
|
static NixRepl * curRepl; // ugly
|
|
|
|
|
2018-10-29 15:44:58 +02:00
|
|
|
static char * completionCallback(char * s, int *match) {
|
2020-06-24 22:10:41 +03:00
|
|
|
auto possible = curRepl->completePrefix(s);
|
|
|
|
if (possible.size() == 1) {
|
2020-06-24 22:14:49 +03:00
|
|
|
*match = 1;
|
|
|
|
auto *res = strdup(possible.begin()->c_str() + strlen(s));
|
|
|
|
if (!res) throw Error("allocation failure");
|
|
|
|
return res;
|
|
|
|
} else if (possible.size() > 1) {
|
|
|
|
auto checkAllHaveSameAt = [&](size_t pos) {
|
|
|
|
auto &first = *possible.begin();
|
|
|
|
for (auto &p : possible) {
|
|
|
|
if (p.size() <= pos || p[pos] != first[pos])
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
};
|
|
|
|
size_t start = strlen(s);
|
|
|
|
size_t len = 0;
|
|
|
|
while (checkAllHaveSameAt(start + len)) ++len;
|
|
|
|
if (len > 0) {
|
2020-06-24 22:10:41 +03:00
|
|
|
*match = 1;
|
2020-06-24 22:14:49 +03:00
|
|
|
auto *res = strdup(std::string(*possible.begin(), start, len).c_str());
|
2020-06-24 22:10:41 +03:00
|
|
|
if (!res) throw Error("allocation failure");
|
|
|
|
return res;
|
2020-06-24 22:14:49 +03:00
|
|
|
}
|
2020-06-24 22:10:41 +03:00
|
|
|
}
|
2018-10-29 15:44:58 +02:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
*match = 0;
|
|
|
|
return nullptr;
|
2018-10-29 15:44:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static int listPossibleCallback(char *s, char ***avp) {
|
2020-06-24 22:10:41 +03:00
|
|
|
auto possible = curRepl->completePrefix(s);
|
|
|
|
|
|
|
|
if (possible.size() > (INT_MAX / sizeof(char*)))
|
|
|
|
throw Error("too many completions");
|
|
|
|
|
|
|
|
int ac = 0;
|
|
|
|
char **vp = nullptr;
|
|
|
|
|
|
|
|
auto check = [&](auto *p) {
|
|
|
|
if (!p) {
|
|
|
|
if (vp) {
|
|
|
|
while (--ac >= 0)
|
|
|
|
free(vp[ac]);
|
|
|
|
free(vp);
|
|
|
|
}
|
|
|
|
throw Error("allocation failure");
|
|
|
|
}
|
|
|
|
return p;
|
|
|
|
};
|
2018-10-29 15:44:58 +02:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
vp = check((char **)malloc(possible.size() * sizeof(char*)));
|
2018-10-29 15:44:58 +02:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
for (auto & p : possible)
|
2020-06-24 22:14:49 +03:00
|
|
|
vp[ac++] = check(strdup(p.c_str()));
|
2018-10-29 15:44:58 +02:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
*avp = vp;
|
2018-10-29 15:44:58 +02:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
return ac;
|
2017-04-25 19:48:40 +03:00
|
|
|
}
|
|
|
|
|
2019-03-24 11:39:48 +02:00
|
|
|
namespace {
|
2020-06-24 22:10:41 +03:00
|
|
|
// Used to communicate to NixRepl::getLine whether a signal occurred in ::readline.
|
|
|
|
volatile sig_atomic_t g_signal_received = 0;
|
2019-03-24 11:39:48 +02:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
void sigintHandler(int signo) {
|
|
|
|
g_signal_received = signo;
|
|
|
|
}
|
2019-03-24 11:39:48 +02:00
|
|
|
}
|
2017-04-25 19:48:40 +03:00
|
|
|
|
2022-05-05 13:29:14 +03:00
|
|
|
static std::ostream & showDebugTrace(std::ostream & out, const PosTable & positions, const DebugTrace & dt)
|
2022-04-07 21:09:47 +03:00
|
|
|
{
|
2022-05-05 13:29:14 +03:00
|
|
|
if (dt.isError)
|
2022-04-07 21:09:47 +03:00
|
|
|
out << ANSI_RED "error: " << ANSI_NORMAL;
|
|
|
|
out << dt.hint.str() << "\n";
|
|
|
|
|
|
|
|
// prefer direct pos, but if noPos then try the expr.
|
2022-12-13 01:48:04 +02:00
|
|
|
auto pos = dt.pos
|
|
|
|
? dt.pos
|
2022-12-13 13:38:33 +02:00
|
|
|
: static_cast<std::shared_ptr<AbstractPos>>(positions[dt.expr.getPos() ? dt.expr.getPos() : noPos]);
|
2022-04-07 21:09:47 +03:00
|
|
|
|
|
|
|
if (pos) {
|
2022-12-13 01:48:04 +02:00
|
|
|
out << pos;
|
|
|
|
if (auto loc = pos->getCodeLines()) {
|
2022-04-07 21:09:47 +03:00
|
|
|
out << "\n";
|
2022-12-13 01:48:04 +02:00
|
|
|
printCodeLines(out, "", *pos, *loc);
|
2022-04-07 21:09:47 +03:00
|
|
|
out << "\n";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return out;
|
|
|
|
}
|
|
|
|
|
2022-02-19 01:33:03 +02:00
|
|
|
void NixRepl::mainLoop()
|
2013-09-02 18:53:58 +03:00
|
|
|
{
|
2022-02-25 17:00:00 +02:00
|
|
|
std::string error = ANSI_RED "error:" ANSI_NORMAL " ";
|
2021-10-12 16:36:45 +03:00
|
|
|
notice("Welcome to Nix " + nixVersion + ". Type :? for help.\n");
|
2013-09-06 16:20:06 +03:00
|
|
|
|
2021-12-20 21:32:21 +02:00
|
|
|
loadFiles();
|
2013-09-02 16:18:15 +03:00
|
|
|
|
2018-10-29 15:44:58 +02:00
|
|
|
// Allow nix-repl specific settings in .inputrc
|
|
|
|
rl_readline_name = "nix-repl";
|
2022-09-20 14:01:40 +03:00
|
|
|
try {
|
|
|
|
createDirs(dirOf(historyFile));
|
|
|
|
} catch (SysError & e) {
|
|
|
|
logWarning(e.info());
|
|
|
|
}
|
2018-11-15 22:15:11 +02:00
|
|
|
#ifndef READLINE
|
2018-10-29 15:44:58 +02:00
|
|
|
el_hist_size = 1000;
|
2018-11-15 22:15:11 +02:00
|
|
|
#endif
|
2018-10-29 15:44:58 +02:00
|
|
|
read_history(historyFile.c_str());
|
2023-03-02 18:24:58 +02:00
|
|
|
auto oldRepl = curRepl;
|
2017-05-10 19:34:18 +03:00
|
|
|
curRepl = this;
|
2023-03-02 18:24:58 +02:00
|
|
|
Finally restoreRepl([&] { curRepl = oldRepl; });
|
2018-11-15 22:15:11 +02:00
|
|
|
#ifndef READLINE
|
2018-10-29 15:44:58 +02:00
|
|
|
rl_set_complete_func(completionCallback);
|
|
|
|
rl_set_list_possib_func(listPossibleCallback);
|
2018-11-15 22:15:11 +02:00
|
|
|
#endif
|
2017-05-10 19:34:18 +03:00
|
|
|
|
2022-08-22 15:27:36 +03:00
|
|
|
/* Stop the progress bar because it interferes with the display of
|
|
|
|
the repl. */
|
|
|
|
stopProgressBar();
|
|
|
|
|
2017-05-10 19:34:18 +03:00
|
|
|
std::string input;
|
2016-02-18 14:27:39 +02:00
|
|
|
|
2013-09-02 16:18:15 +03:00
|
|
|
while (true) {
|
2016-02-18 15:04:55 +02:00
|
|
|
// When continuing input from previous lines, don't print a prompt, just align to the same
|
2016-02-18 14:27:39 +02:00
|
|
|
// number of chars as the prompt.
|
2022-05-05 13:29:14 +03:00
|
|
|
if (!getLine(input, input.empty() ? "nix-repl> " : " ")) {
|
2022-02-15 18:49:25 +02:00
|
|
|
// ctrl-D should exit the debugger.
|
2022-05-25 19:21:20 +03:00
|
|
|
state->debugStop = false;
|
|
|
|
state->debugQuit = true;
|
2022-11-28 15:59:06 +02:00
|
|
|
logger->cout("");
|
2013-09-09 16:02:56 +03:00
|
|
|
break;
|
2022-02-15 18:49:25 +02:00
|
|
|
}
|
2013-09-02 16:18:15 +03:00
|
|
|
try {
|
2016-02-24 02:30:21 +02:00
|
|
|
if (!removeWhitespace(input).empty() && !processLine(input)) return;
|
2016-02-18 14:27:39 +02:00
|
|
|
} catch (ParseError & e) {
|
2020-11-02 20:07:37 +02:00
|
|
|
if (e.msg().find("unexpected end of file") != std::string::npos) {
|
2016-02-18 14:27:39 +02:00
|
|
|
// For parse errors on incomplete input, we continue waiting for the next line of
|
|
|
|
// input without clearing the input so far.
|
|
|
|
continue;
|
|
|
|
} else {
|
2020-06-24 22:14:49 +03:00
|
|
|
printMsg(lvlError, e.msg());
|
2016-02-18 14:27:39 +02:00
|
|
|
}
|
2022-04-07 21:09:47 +03:00
|
|
|
} catch (EvalError & e) {
|
2022-04-29 20:24:54 +03:00
|
|
|
// in debugger mode, an EvalError should trigger another repl session.
|
2022-04-07 21:09:47 +03:00
|
|
|
// when that session returns the exception will land here. No need to show it again;
|
|
|
|
// show the error for this repl session instead.
|
2022-05-25 19:21:20 +03:00
|
|
|
if (state->debugRepl && !state->debugTraces.empty())
|
|
|
|
showDebugTrace(std::cout, state->positions, state->debugTraces.front());
|
2022-04-07 21:09:47 +03:00
|
|
|
else
|
|
|
|
printMsg(lvlError, e.msg());
|
2013-09-02 16:18:15 +03:00
|
|
|
} catch (Error & e) {
|
2020-11-02 20:07:37 +02:00
|
|
|
printMsg(lvlError, e.msg());
|
2013-09-06 14:20:35 +03:00
|
|
|
} catch (Interrupted & e) {
|
2020-11-02 20:07:37 +02:00
|
|
|
printMsg(lvlError, e.msg());
|
2013-09-02 16:18:15 +03:00
|
|
|
}
|
|
|
|
|
2017-05-10 19:34:18 +03:00
|
|
|
// We handled the current input fully, so we should clear it
|
|
|
|
// and read brand new input.
|
2016-02-18 14:27:39 +02:00
|
|
|
input.clear();
|
2013-09-02 16:18:15 +03:00
|
|
|
std::cout << std::endl;
|
|
|
|
}
|
|
|
|
}
|
2013-09-02 18:53:58 +03:00
|
|
|
|
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
bool NixRepl::getLine(std::string & input, const std::string & prompt)
|
2013-09-06 20:51:59 +03:00
|
|
|
{
|
2019-03-24 11:39:48 +02:00
|
|
|
struct sigaction act, old;
|
|
|
|
sigset_t savedSignalMask, set;
|
|
|
|
|
|
|
|
auto setupSignals = [&]() {
|
2020-06-24 22:10:41 +03:00
|
|
|
act.sa_handler = sigintHandler;
|
|
|
|
sigfillset(&act.sa_mask);
|
|
|
|
act.sa_flags = 0;
|
|
|
|
if (sigaction(SIGINT, &act, &old))
|
|
|
|
throw SysError("installing handler for SIGINT");
|
|
|
|
|
|
|
|
sigemptyset(&set);
|
|
|
|
sigaddset(&set, SIGINT);
|
|
|
|
if (sigprocmask(SIG_UNBLOCK, &set, &savedSignalMask))
|
|
|
|
throw SysError("unblocking SIGINT");
|
|
|
|
};
|
2019-03-24 11:39:48 +02:00
|
|
|
auto restoreSignals = [&]() {
|
2020-06-24 22:10:41 +03:00
|
|
|
if (sigprocmask(SIG_SETMASK, &savedSignalMask, nullptr))
|
|
|
|
throw SysError("restoring signals");
|
2019-03-24 11:39:48 +02:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
if (sigaction(SIGINT, &old, 0))
|
|
|
|
throw SysError("restoring handler for SIGINT");
|
|
|
|
};
|
2019-03-24 11:39:48 +02:00
|
|
|
|
|
|
|
setupSignals();
|
2021-11-26 14:10:28 +02:00
|
|
|
Finally resetTerminal([&]() { rl_deprep_terminal(); });
|
2018-10-29 15:44:58 +02:00
|
|
|
char * s = readline(prompt.c_str());
|
2017-11-28 02:30:05 +02:00
|
|
|
Finally doFree([&]() { free(s); });
|
2019-03-24 11:39:48 +02:00
|
|
|
restoreSignals();
|
|
|
|
|
|
|
|
if (g_signal_received) {
|
|
|
|
g_signal_received = 0;
|
|
|
|
input.clear();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-10-29 15:44:58 +02:00
|
|
|
if (!s)
|
2020-06-24 22:10:41 +03:00
|
|
|
return false;
|
2017-05-10 19:34:18 +03:00
|
|
|
input += s;
|
2018-04-11 12:42:17 +03:00
|
|
|
input += '\n';
|
2017-05-10 19:34:18 +03:00
|
|
|
return true;
|
2013-09-06 20:51:59 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
StringSet NixRepl::completePrefix(const std::string & prefix)
|
2013-09-06 20:51:59 +03:00
|
|
|
{
|
2017-05-10 19:34:18 +03:00
|
|
|
StringSet completions;
|
2017-04-25 20:19:15 +03:00
|
|
|
|
2017-05-10 19:34:18 +03:00
|
|
|
size_t start = prefix.find_last_of(" \n\r\t(){}[]");
|
|
|
|
std::string prev, cur;
|
|
|
|
if (start == std::string::npos) {
|
|
|
|
prev = "";
|
|
|
|
cur = prefix;
|
2016-02-18 14:50:52 +02:00
|
|
|
} else {
|
2017-05-10 19:34:18 +03:00
|
|
|
prev = std::string(prefix, 0, start + 1);
|
|
|
|
cur = std::string(prefix, start + 1);
|
2013-09-06 20:51:59 +03:00
|
|
|
}
|
|
|
|
|
2017-05-10 19:34:18 +03:00
|
|
|
size_t slash, dot;
|
2013-09-09 13:00:33 +03:00
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
if ((slash = cur.rfind('/')) != std::string::npos) {
|
2017-05-10 19:34:18 +03:00
|
|
|
try {
|
|
|
|
auto dir = std::string(cur, 0, slash);
|
|
|
|
auto prefix2 = std::string(cur, slash + 1);
|
|
|
|
for (auto & entry : readDirectory(dir == "" ? "/" : dir)) {
|
|
|
|
if (entry.name[0] != '.' && hasPrefix(entry.name, prefix2))
|
|
|
|
completions.insert(prev + dir + "/" + entry.name);
|
|
|
|
}
|
|
|
|
} catch (Error &) {
|
|
|
|
}
|
2022-02-25 17:00:00 +02:00
|
|
|
} else if ((dot = cur.rfind('.')) == std::string::npos) {
|
2013-09-09 13:00:33 +03:00
|
|
|
/* This is a variable name; look it up in the current scope. */
|
2017-05-10 19:34:18 +03:00
|
|
|
StringSet::iterator i = varNames.lower_bound(cur);
|
2013-09-09 13:00:33 +03:00
|
|
|
while (i != varNames.end()) {
|
2022-02-25 17:00:00 +02:00
|
|
|
if (i->substr(0, cur.size()) != cur) break;
|
2017-05-10 19:34:18 +03:00
|
|
|
completions.insert(prev + *i);
|
2013-09-09 13:00:33 +03:00
|
|
|
i++;
|
|
|
|
}
|
|
|
|
} else {
|
2022-10-05 13:09:57 +03:00
|
|
|
/* Temporarily disable the debugger, to avoid re-entering readline. */
|
|
|
|
auto debug_repl = state->debugRepl;
|
|
|
|
state->debugRepl = nullptr;
|
|
|
|
Finally restoreDebug([&]() { state->debugRepl = debug_repl; });
|
2013-09-09 13:00:33 +03:00
|
|
|
try {
|
|
|
|
/* This is an expression that should evaluate to an
|
|
|
|
attribute set. Evaluate it to get the names of the
|
|
|
|
attributes. */
|
2022-02-25 17:00:00 +02:00
|
|
|
auto expr = cur.substr(0, dot);
|
|
|
|
auto cur2 = cur.substr(dot + 1);
|
2013-09-09 13:00:33 +03:00
|
|
|
|
|
|
|
Expr * e = parseString(expr);
|
|
|
|
Value v;
|
2020-03-19 14:52:28 +02:00
|
|
|
e->eval(*state, *env, v);
|
2023-01-20 14:01:03 +02:00
|
|
|
state->forceAttrs(v, noPos, "while evaluating an attrset for the purpose of completion (this error should not be displayed; file an issue?)");
|
2013-09-09 13:00:33 +03:00
|
|
|
|
2015-09-07 14:05:58 +03:00
|
|
|
for (auto & i : *v.attrs) {
|
2022-03-05 15:40:24 +02:00
|
|
|
std::string_view name = state->symbols[i.name];
|
2022-02-25 17:00:00 +02:00
|
|
|
if (name.substr(0, cur2.size()) != cur2) continue;
|
2022-03-05 15:40:24 +02:00
|
|
|
completions.insert(concatStrings(prev, expr, ".", name));
|
2013-09-09 13:00:33 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
} catch (ParseError & e) {
|
|
|
|
// Quietly ignore parse errors.
|
2014-04-11 13:51:15 +03:00
|
|
|
} catch (EvalError & e) {
|
2013-09-09 13:00:33 +03:00
|
|
|
// Quietly ignore evaluation errors.
|
2014-04-11 13:51:15 +03:00
|
|
|
} catch (UndefinedVarError & e) {
|
|
|
|
// Quietly ignore undefined variable errors.
|
2021-11-26 12:03:48 +02:00
|
|
|
} catch (BadURL & e) {
|
|
|
|
// Quietly ignore BadURL flake-related errors.
|
2013-09-09 13:00:33 +03:00
|
|
|
}
|
2013-09-06 20:51:59 +03:00
|
|
|
}
|
2017-05-10 19:34:18 +03:00
|
|
|
|
|
|
|
return completions;
|
2013-09-06 20:51:59 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-04-16 15:07:35 +03:00
|
|
|
// FIXME: DRY and match or use the parser
|
2022-02-25 17:00:00 +02:00
|
|
|
static bool isVarName(std::string_view s)
|
2013-09-09 14:56:53 +03:00
|
|
|
{
|
2016-02-14 09:50:47 +02:00
|
|
|
if (s.size() == 0) return false;
|
|
|
|
char c = s[0];
|
|
|
|
if ((c >= '0' && c <= '9') || c == '-' || c == '\'') return false;
|
2015-09-07 14:05:58 +03:00
|
|
|
for (auto & i : s)
|
|
|
|
if (!((i >= 'a' && i <= 'z') ||
|
|
|
|
(i >= 'A' && i <= 'Z') ||
|
|
|
|
(i >= '0' && i <= '9') ||
|
2016-02-14 09:16:30 +02:00
|
|
|
i == '_' || i == '-' || i == '\''))
|
2013-09-09 14:56:53 +03:00
|
|
|
return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-06-17 06:56:48 +03:00
|
|
|
StorePath NixRepl::getDerivationPath(Value & v) {
|
2020-03-19 14:52:28 +02:00
|
|
|
auto drvInfo = getDerivation(*state, v, false);
|
2017-07-20 14:32:01 +03:00
|
|
|
if (!drvInfo)
|
2016-02-18 04:31:30 +02:00
|
|
|
throw Error("expression does not evaluate to a derivation, so I can't build it");
|
2022-03-02 11:57:19 +02:00
|
|
|
auto drvPath = drvInfo->queryDrvPath();
|
|
|
|
if (!drvPath)
|
|
|
|
throw Error("expression did not evaluate to a valid derivation (no 'drvPath' attribute)");
|
|
|
|
if (!state->store->isValidPath(*drvPath))
|
|
|
|
throw Error("expression evaluated to invalid derivation '%s'", state->store->printStorePath(*drvPath));
|
|
|
|
return *drvPath;
|
2016-02-18 04:31:30 +02:00
|
|
|
}
|
|
|
|
|
2022-05-05 13:29:14 +03:00
|
|
|
void NixRepl::loadDebugTraceEnv(DebugTrace & dt)
|
2022-03-29 00:28:59 +03:00
|
|
|
{
|
2022-05-05 13:29:14 +03:00
|
|
|
initEnv();
|
2022-03-29 00:28:59 +03:00
|
|
|
|
2022-05-25 19:21:20 +03:00
|
|
|
auto se = state->getStaticEnv(dt.expr);
|
2022-05-19 19:48:10 +03:00
|
|
|
if (se) {
|
2022-05-25 19:21:20 +03:00
|
|
|
auto vm = mapStaticEnvBindings(state->symbols, *se.get(), dt.env);
|
2022-03-29 00:28:59 +03:00
|
|
|
|
|
|
|
// add staticenv vars.
|
2022-05-05 13:29:14 +03:00
|
|
|
for (auto & [name, value] : *(vm.get()))
|
2022-05-25 19:21:20 +03:00
|
|
|
addVarToScope(state->symbols.create(name), *value);
|
2022-03-29 00:28:59 +03:00
|
|
|
}
|
|
|
|
}
|
2016-02-18 04:31:30 +02:00
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
bool NixRepl::processLine(std::string line)
|
2013-09-02 18:53:58 +03:00
|
|
|
{
|
2022-03-20 17:39:36 +02:00
|
|
|
line = trim(line);
|
2013-09-09 16:02:56 +03:00
|
|
|
if (line == "") return true;
|
|
|
|
|
2021-10-08 00:58:02 +03:00
|
|
|
_isInterrupted = false;
|
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
std::string command, arg;
|
2013-09-06 14:01:02 +03:00
|
|
|
|
2013-09-09 16:02:56 +03:00
|
|
|
if (line[0] == ':') {
|
2016-02-18 14:59:51 +02:00
|
|
|
size_t p = line.find_first_of(" \n\r\t");
|
2022-02-25 17:00:00 +02:00
|
|
|
command = line.substr(0, p);
|
|
|
|
if (p != std::string::npos) arg = removeWhitespace(line.substr(p));
|
2013-09-09 16:02:56 +03:00
|
|
|
} else {
|
|
|
|
arg = line;
|
|
|
|
}
|
2013-09-06 16:05:18 +03:00
|
|
|
|
2013-09-09 17:02:46 +03:00
|
|
|
if (command == ":?" || command == ":help") {
|
2020-12-09 14:07:01 +02:00
|
|
|
// FIXME: convert to Markdown, include in the 'nix repl' manpage.
|
2017-04-25 19:58:02 +03:00
|
|
|
std::cout
|
2020-06-24 22:14:49 +03:00
|
|
|
<< "The following commands are available:\n"
|
|
|
|
<< "\n"
|
2023-01-23 12:50:44 +02:00
|
|
|
<< " <expr> Evaluate and print expression\n"
|
|
|
|
<< " <x> = <expr> Bind expression to variable\n"
|
|
|
|
<< " :a, :add <expr> Add attributes from resulting set to scope\n"
|
|
|
|
<< " :b <expr> Build a derivation\n"
|
|
|
|
<< " :bl <expr> Build a derivation, creating GC roots in the\n"
|
|
|
|
<< " working directory\n"
|
|
|
|
<< " :e, :edit <expr> Open package or function in $EDITOR\n"
|
|
|
|
<< " :i <expr> Build derivation, then install result into\n"
|
|
|
|
<< " current profile\n"
|
|
|
|
<< " :l, :load <path> Load Nix expression and add it to scope\n"
|
|
|
|
<< " :lf, :load-flake <ref> Load Nix flake and add it to scope\n"
|
|
|
|
<< " :p, :print <expr> Evaluate and print expression recursively\n"
|
|
|
|
<< " :q, :quit Exit nix-repl\n"
|
|
|
|
<< " :r, :reload Reload all files\n"
|
|
|
|
<< " :sh <expr> Build dependencies of derivation, then start\n"
|
|
|
|
<< " nix-shell\n"
|
|
|
|
<< " :t <expr> Describe result of evaluation\n"
|
|
|
|
<< " :u <expr> Build derivation, then start nix-shell\n"
|
|
|
|
<< " :doc <expr> Show documentation of a builtin function\n"
|
|
|
|
<< " :log <expr> Show logs for a derivation\n"
|
|
|
|
<< " :te, :trace-enable [bool] Enable, disable or toggle showing traces for\n"
|
|
|
|
<< " errors\n"
|
|
|
|
<< " :?, :help Brings up this help menu\n"
|
2022-02-03 22:15:21 +02:00
|
|
|
;
|
2022-05-25 19:21:20 +03:00
|
|
|
if (state->debugRepl) {
|
2022-05-06 00:24:57 +03:00
|
|
|
std::cout
|
|
|
|
<< "\n"
|
|
|
|
<< " Debug mode commands\n"
|
2023-01-23 12:50:44 +02:00
|
|
|
<< " :env Show env stack\n"
|
|
|
|
<< " :bt, :backtrace Show trace stack\n"
|
|
|
|
<< " :st Show current trace\n"
|
|
|
|
<< " :st <idx> Change to another trace in the stack\n"
|
|
|
|
<< " :c, :continue Go until end of program, exception, or builtins.break\n"
|
|
|
|
<< " :s, :step Go one step\n"
|
2022-05-06 00:24:57 +03:00
|
|
|
;
|
|
|
|
}
|
2022-02-03 22:15:21 +02:00
|
|
|
|
2021-12-20 21:32:21 +02:00
|
|
|
}
|
|
|
|
|
2022-05-25 19:21:20 +03:00
|
|
|
else if (state->debugRepl && (command == ":bt" || command == ":backtrace")) {
|
|
|
|
for (const auto & [idx, i] : enumerate(state->debugTraces)) {
|
2022-05-06 06:23:03 +03:00
|
|
|
std::cout << "\n" << ANSI_BLUE << idx << ANSI_NORMAL << ": ";
|
2022-05-25 19:21:20 +03:00
|
|
|
showDebugTrace(std::cout, state->positions, i);
|
2022-05-06 00:24:57 +03:00
|
|
|
}
|
2022-05-06 06:23:03 +03:00
|
|
|
}
|
2022-05-06 00:24:57 +03:00
|
|
|
|
2022-05-25 19:21:20 +03:00
|
|
|
else if (state->debugRepl && (command == ":env")) {
|
|
|
|
for (const auto & [idx, i] : enumerate(state->debugTraces)) {
|
2022-05-06 06:23:03 +03:00
|
|
|
if (idx == debugTraceIndex) {
|
2022-05-25 19:21:20 +03:00
|
|
|
printEnvBindings(*state, i.expr, i.env);
|
2022-05-06 06:23:03 +03:00
|
|
|
break;
|
2022-03-28 21:09:21 +03:00
|
|
|
}
|
|
|
|
}
|
2022-05-06 06:23:03 +03:00
|
|
|
}
|
2022-05-06 00:24:57 +03:00
|
|
|
|
2022-05-25 19:21:20 +03:00
|
|
|
else if (state->debugRepl && (command == ":st")) {
|
2022-05-06 06:23:03 +03:00
|
|
|
try {
|
|
|
|
// change the DebugTrace index.
|
|
|
|
debugTraceIndex = stoi(arg);
|
|
|
|
} catch (...) { }
|
|
|
|
|
2022-05-25 19:21:20 +03:00
|
|
|
for (const auto & [idx, i] : enumerate(state->debugTraces)) {
|
2022-05-06 06:23:03 +03:00
|
|
|
if (idx == debugTraceIndex) {
|
|
|
|
std::cout << "\n" << ANSI_BLUE << idx << ANSI_NORMAL << ": ";
|
2022-05-25 19:21:20 +03:00
|
|
|
showDebugTrace(std::cout, state->positions, i);
|
2022-05-06 06:23:03 +03:00
|
|
|
std::cout << std::endl;
|
2022-05-25 19:21:20 +03:00
|
|
|
printEnvBindings(*state, i.expr, i.env);
|
2022-05-06 06:23:03 +03:00
|
|
|
loadDebugTraceEnv(i);
|
|
|
|
break;
|
|
|
|
}
|
2021-12-20 21:32:21 +02:00
|
|
|
}
|
2022-05-06 06:23:03 +03:00
|
|
|
}
|
2022-05-06 00:24:57 +03:00
|
|
|
|
2022-05-25 19:21:20 +03:00
|
|
|
else if (state->debugRepl && (command == ":s" || command == ":step")) {
|
2022-05-06 06:23:03 +03:00
|
|
|
// set flag to stop at next DebugTrace; exit repl.
|
2022-05-25 19:21:20 +03:00
|
|
|
state->debugStop = true;
|
2022-05-06 06:23:03 +03:00
|
|
|
return false;
|
|
|
|
}
|
2022-05-06 00:24:57 +03:00
|
|
|
|
2022-05-25 19:21:20 +03:00
|
|
|
else if (state->debugRepl && (command == ":c" || command == ":continue")) {
|
2022-05-06 06:23:03 +03:00
|
|
|
// set flag to run to next breakpoint or end of program; exit repl.
|
2022-05-25 19:21:20 +03:00
|
|
|
state->debugStop = false;
|
2022-05-06 06:23:03 +03:00
|
|
|
return false;
|
2013-09-09 14:22:33 +03:00
|
|
|
}
|
|
|
|
|
2013-09-09 17:02:46 +03:00
|
|
|
else if (command == ":a" || command == ":add") {
|
2013-09-02 18:53:58 +03:00
|
|
|
Value v;
|
2013-09-09 16:02:56 +03:00
|
|
|
evalString(arg, v);
|
2013-09-02 19:18:27 +03:00
|
|
|
addAttrsToScope(v);
|
|
|
|
}
|
|
|
|
|
2013-09-09 17:02:46 +03:00
|
|
|
else if (command == ":l" || command == ":load") {
|
2020-03-19 14:52:28 +02:00
|
|
|
state->resetFileCache();
|
2013-09-09 16:02:56 +03:00
|
|
|
loadFile(arg);
|
2013-09-02 18:53:58 +03:00
|
|
|
}
|
|
|
|
|
2021-07-19 18:47:03 +03:00
|
|
|
else if (command == ":lf" || command == ":load-flake") {
|
|
|
|
loadFlake(arg);
|
|
|
|
}
|
|
|
|
|
2013-09-09 17:02:46 +03:00
|
|
|
else if (command == ":r" || command == ":reload") {
|
2020-03-19 14:52:28 +02:00
|
|
|
state->resetFileCache();
|
2013-09-09 17:02:46 +03:00
|
|
|
reloadFiles();
|
|
|
|
}
|
|
|
|
|
2019-10-23 16:29:16 +03:00
|
|
|
else if (command == ":e" || command == ":edit") {
|
|
|
|
Value v;
|
|
|
|
evalString(arg, v);
|
|
|
|
|
2023-04-06 14:15:50 +03:00
|
|
|
const auto [path, line] = [&] () -> std::pair<SourcePath, uint32_t> {
|
2022-03-04 21:54:50 +02:00
|
|
|
if (v.type() == nPath || v.type() == nString) {
|
Use `std::set<StringContextElem>` not `PathSet` for string contexts
Motivation
`PathSet` is not correct because string contexts have other forms
(`Built` and `DrvDeep`) that are not rendered as plain store paths.
Instead of wrongly using `PathSet`, or "stringly typed" using
`StringSet`, use `std::std<StringContextElem>`.
-----
In support of this change, `NixStringContext` is now defined as
`std::std<StringContextElem>` not `std:vector<StringContextElem>`. The
old definition was just used by a `getContext` method which was only
used by the eval cache. It can be deleted altogether since the types are
now unified and the preexisting `copyContext` function already suffices.
Summarizing the previous paragraph:
Old:
- `value/context.hh`: `NixStringContext = std::vector<StringContextElem>`
- `value.hh`: `NixStringContext Value::getContext(...)`
- `value.hh`: `copyContext(...)`
New:
- `value/context.hh`: `NixStringContext = std::set<StringContextElem>`
- `value.hh`: `copyContext(...)`
----
The string representation of string context elements no longer contains
the store dir. The diff of `src/libexpr/tests/value/context.cc` should
make clear what the new representation is, so we recommend reviewing
that file first. This was done for two reasons:
Less API churn:
`Value::mkString` and friends did not take a `Store` before. But if
`NixStringContextElem::{parse, to_string}` *do* take a store (as they
did before), then we cannot have the `Value` functions use them (in
order to work with the fully-structured `NixStringContext`) without
adding that argument.
That would have been a lot of churn of threading the store, and this
diff is already large enough, so the easier and less invasive thing to
do was simply make the element `parse` and `to_string` functions not
take the `Store` reference, and the easiest way to do that was to simply
drop the store dir.
Space usage:
Dropping the `/nix/store/` (or similar) from the internal representation
will safe space in the heap of the Nix programming being interpreted. If
the heap contains many strings with non-trivial contexts, the saving
could add up to something significant.
----
The eval cache version is bumped.
The eval cache serialization uses `NixStringContextElem::{parse,
to_string}`, and since those functions are changed per the above, that
means the on-disk representation is also changed.
This is simply done by changing the name of the used for the eval cache
from `eval-cache-v4` to eval-cache-v5`.
----
To avoid some duplication `EvalCache::mkPathString` is added to abstract
over the simple case of turning a store path to a string with just that
string in the context.
Context
This PR picks up where #7543 left off. That one introduced the fully
structured `NixStringContextElem` data type, but kept `PathSet context`
as an awkward middle ground between internal `char[][]` interpreter heap
string contexts and `NixStringContext` fully parsed string contexts.
The infelicity of `PathSet context` was specifically called out during
Nix team group review, but it was agreeing that fixing it could be left
as future work. This is that future work.
A possible follow-up step would be to get rid of the `char[][]`
evaluator heap representation, too, but it is not yet clear how to do
that. To use `NixStringContextElem` there we would need to get the STL
containers to GC pointers in the GC build, and I am not sure how to do
that.
----
PR #7543 effectively is writing the inverse of a `mkPathString`,
`mkOutputString`, and one more such function for the `DrvDeep` case. I
would like that PR to have property tests ensuring it is actually the
inverse as expected.
This PR sets things up nicely so that reworking that PR to be in that
more elegant and better tested way is possible.
Co-authored-by: Théophane Hufschmitt <7226587+thufschmitt@users.noreply.github.com>
2023-01-29 03:31:10 +02:00
|
|
|
NixStringContext context;
|
2023-01-19 14:23:04 +02:00
|
|
|
auto path = state->coerceToPath(noPos, v, context, "while evaluating the filename to edit");
|
2022-12-13 01:48:04 +02:00
|
|
|
return {path, 0};
|
2022-03-04 21:54:50 +02:00
|
|
|
} else if (v.isLambda()) {
|
2022-03-04 20:31:59 +02:00
|
|
|
auto pos = state->positions[v.lambda.fun->pos];
|
2023-04-06 16:25:06 +03:00
|
|
|
if (auto path = std::get_if<SourcePath>(&pos.origin))
|
|
|
|
return {*path, pos.line};
|
2022-12-13 01:48:04 +02:00
|
|
|
else
|
|
|
|
throw Error("'%s' cannot be shown in an editor", pos);
|
2022-03-04 21:54:50 +02:00
|
|
|
} else {
|
|
|
|
// assume it's a derivation
|
|
|
|
return findPackageFilename(*state, v, arg);
|
|
|
|
}
|
|
|
|
}();
|
2019-10-23 16:29:16 +03:00
|
|
|
|
|
|
|
// Open in EDITOR
|
2022-12-13 01:48:04 +02:00
|
|
|
auto args = editorFor(path, line);
|
2019-10-23 17:48:28 +03:00
|
|
|
auto editor = args.front();
|
2019-10-23 16:29:16 +03:00
|
|
|
args.pop_front();
|
2021-11-17 17:38:03 +02:00
|
|
|
|
|
|
|
// runProgram redirects stdout to a StringSink,
|
|
|
|
// using runProgram2 to allow editors to display their UI
|
|
|
|
runProgram2(RunOptions { .program = editor, .searchPath = true, .args = args });
|
2019-10-23 16:29:16 +03:00
|
|
|
|
|
|
|
// Reload right after exiting the editor
|
2020-03-19 14:52:28 +02:00
|
|
|
state->resetFileCache();
|
2019-10-23 16:29:16 +03:00
|
|
|
reloadFiles();
|
|
|
|
}
|
|
|
|
|
2013-09-06 16:05:18 +03:00
|
|
|
else if (command == ":t") {
|
2013-09-02 19:00:48 +03:00
|
|
|
Value v;
|
2013-09-09 16:02:56 +03:00
|
|
|
evalString(arg, v);
|
2021-10-12 16:36:45 +03:00
|
|
|
logger->cout(showType(v));
|
|
|
|
}
|
2016-02-18 04:31:30 +02:00
|
|
|
|
2021-10-12 16:36:45 +03:00
|
|
|
else if (command == ":u") {
|
2016-02-18 04:31:30 +02:00
|
|
|
Value v, f, result;
|
|
|
|
evalString(arg, v);
|
|
|
|
evalString("drv: (import <nixpkgs> {}).runCommand \"shell\" { buildInputs = [ drv ]; } \"\"", f);
|
2022-03-04 20:31:59 +02:00
|
|
|
state->callFunction(f, v, result, PosIdx());
|
2016-02-18 04:31:30 +02:00
|
|
|
|
2020-06-17 06:56:48 +03:00
|
|
|
StorePath drvPath = getDerivationPath(result);
|
2021-06-29 15:52:46 +03:00
|
|
|
runNix("nix-shell", {state->store->printStorePath(drvPath)});
|
2013-09-02 19:00:48 +03:00
|
|
|
}
|
|
|
|
|
2022-05-06 00:24:57 +03:00
|
|
|
else if (command == ":b" || command == ":bl" || command == ":i" || command == ":sh" || command == ":log") {
|
2013-09-06 15:58:53 +03:00
|
|
|
Value v;
|
2013-09-09 16:02:56 +03:00
|
|
|
evalString(arg, v);
|
2020-06-17 06:56:48 +03:00
|
|
|
StorePath drvPath = getDerivationPath(v);
|
|
|
|
Path drvPathRaw = state->store->printStorePath(drvPath);
|
2013-09-06 16:05:18 +03:00
|
|
|
|
2022-04-18 20:21:47 +03:00
|
|
|
if (command == ":b" || command == ":bl") {
|
2023-01-11 23:32:30 +02:00
|
|
|
state->store->buildPaths({
|
|
|
|
DerivedPath::Built {
|
Make the Derived Path family of types inductive for dynamic derivations
We want to be able to write down `foo.drv^bar.drv^baz`:
`foo.drv^bar.drv` is the dynamic derivation (since it is itself a
derivation output, `bar.drv` from `foo.drv`).
To that end, we create `Single{Derivation,BuiltPath}` types, that are
very similar except instead of having multiple outputs (in a set or
map), they have a single one. This is for everything to the left of the
rightmost `^`.
`NixStringContextElem` has an analogous change, and now can reuse
`SingleDerivedPath` at the top level. In fact, if we ever get rid of
`DrvDeep`, `NixStringContextElem` could be replaced with
`SingleDerivedPath` entirely!
Important note: some JSON formats have changed.
We already can *produce* dynamic derivations, but we can't refer to them
directly. Today, we can merely express building or example at the top
imperatively over time by building `foo.drv^bar.drv`, and then with a
second nix invocation doing `<result-from-first>^baz`, but this is not
declarative. The ethos of Nix of being able to write down the full plan
everything you want to do, and then execute than plan with a single
command, and for that we need the new inductive form of these types.
Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
Co-authored-by: Valentin Gagarin <valentin.gagarin@tweag.io>
2023-01-16 00:39:04 +02:00
|
|
|
.drvPath = makeConstantStorePathRef(drvPath),
|
2023-01-11 23:32:30 +02:00
|
|
|
.outputs = OutputsSpec::All { },
|
|
|
|
},
|
|
|
|
});
|
2021-10-12 16:27:02 +03:00
|
|
|
auto drv = state->store->readDerivation(drvPath);
|
|
|
|
logger->cout("\nThis derivation produced the following outputs:");
|
2022-04-18 20:21:47 +03:00
|
|
|
for (auto & [outputName, outputPath] : state->store->queryDerivationOutputMap(drvPath)) {
|
|
|
|
auto localStore = state->store.dynamic_pointer_cast<LocalFSStore>();
|
|
|
|
if (localStore && command == ":bl") {
|
|
|
|
std::string symlink = "repl-result-" + outputName;
|
|
|
|
localStore->addPermRoot(outputPath, absPath(symlink));
|
|
|
|
logger->cout(" ./%s -> %s", symlink, state->store->printStorePath(outputPath));
|
|
|
|
} else {
|
|
|
|
logger->cout(" %s -> %s", outputName, state->store->printStorePath(outputPath));
|
|
|
|
}
|
|
|
|
}
|
2016-02-16 08:24:50 +02:00
|
|
|
} else if (command == ":i") {
|
2021-06-29 15:52:46 +03:00
|
|
|
runNix("nix-env", {"-i", drvPathRaw});
|
2021-11-26 17:03:07 +02:00
|
|
|
} else if (command == ":log") {
|
|
|
|
settings.readOnlyMode = true;
|
|
|
|
Finally roModeReset([&]() {
|
|
|
|
settings.readOnlyMode = false;
|
|
|
|
});
|
|
|
|
auto subs = getDefaultSubstituters();
|
|
|
|
|
|
|
|
subs.push_front(state->store);
|
|
|
|
|
|
|
|
bool foundLog = false;
|
|
|
|
RunPager pager;
|
|
|
|
for (auto & sub : subs) {
|
2022-03-08 20:20:39 +02:00
|
|
|
auto * logSubP = dynamic_cast<LogStore *>(&*sub);
|
|
|
|
if (!logSubP) {
|
|
|
|
printInfo("Skipped '%s' which does not support retrieving build logs", sub->getUri());
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
auto & logSub = *logSubP;
|
|
|
|
|
|
|
|
auto log = logSub.getBuildLog(drvPath);
|
2021-11-26 17:03:07 +02:00
|
|
|
if (log) {
|
2022-03-08 20:20:39 +02:00
|
|
|
printInfo("got build log for '%s' from '%s'", drvPathRaw, logSub.getUri());
|
2021-11-26 17:03:07 +02:00
|
|
|
logger->writeToStdout(*log);
|
|
|
|
foundLog = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!foundLog) throw Error("build log of '%s' is not available", drvPathRaw);
|
2016-02-16 08:24:50 +02:00
|
|
|
} else {
|
2021-06-29 15:52:46 +03:00
|
|
|
runNix("nix-shell", {drvPathRaw});
|
2016-02-16 08:24:50 +02:00
|
|
|
}
|
2013-09-02 18:53:58 +03:00
|
|
|
}
|
|
|
|
|
2013-09-09 17:02:46 +03:00
|
|
|
else if (command == ":p" || command == ":print") {
|
2013-09-07 01:35:54 +03:00
|
|
|
Value v;
|
2013-09-09 16:02:56 +03:00
|
|
|
evalString(arg, v);
|
2013-09-07 01:35:54 +03:00
|
|
|
printValue(std::cout, v, 1000000000) << std::endl;
|
|
|
|
}
|
|
|
|
|
2022-02-15 18:49:25 +02:00
|
|
|
else if (command == ":q" || command == ":quit") {
|
2022-05-25 19:21:20 +03:00
|
|
|
state->debugStop = false;
|
|
|
|
state->debugQuit = true;
|
2013-09-09 16:02:56 +03:00
|
|
|
return false;
|
2022-02-15 18:49:25 +02:00
|
|
|
}
|
2013-09-09 16:02:56 +03:00
|
|
|
|
2020-08-24 14:11:56 +03:00
|
|
|
else if (command == ":doc") {
|
|
|
|
Value v;
|
|
|
|
evalString(arg, v);
|
2020-08-25 14:31:11 +03:00
|
|
|
if (auto doc = state->getDoc(v)) {
|
|
|
|
std::string markdown;
|
|
|
|
|
|
|
|
if (!doc->args.empty() && doc->name) {
|
|
|
|
auto args = doc->args;
|
2020-08-24 19:10:33 +03:00
|
|
|
for (auto & arg : args)
|
|
|
|
arg = "*" + arg + "*";
|
|
|
|
|
2020-08-25 14:31:11 +03:00
|
|
|
markdown +=
|
|
|
|
"**Synopsis:** `builtins." + (std::string) (*doc->name) + "` "
|
|
|
|
+ concatStringsSep(" ", args) + "\n\n";
|
|
|
|
}
|
|
|
|
|
2021-10-12 16:36:45 +03:00
|
|
|
markdown += stripIndentation(doc->doc);
|
2020-08-24 19:10:33 +03:00
|
|
|
|
2021-10-12 16:36:45 +03:00
|
|
|
logger->cout(trim(renderMarkdownToTerminal(markdown)));
|
2020-08-24 14:11:56 +03:00
|
|
|
} else
|
|
|
|
throw Error("value does not have documentation");
|
|
|
|
}
|
|
|
|
|
2022-05-06 00:24:57 +03:00
|
|
|
else if (command == ":te" || command == ":trace-enable") {
|
2021-12-28 15:13:07 +02:00
|
|
|
if (arg == "false" || (arg == "" && loggerSettings.showTrace)) {
|
|
|
|
std::cout << "not showing error traces\n";
|
|
|
|
loggerSettings.showTrace = false;
|
|
|
|
} else if (arg == "true" || (arg == "" && !loggerSettings.showTrace)) {
|
|
|
|
std::cout << "showing error traces\n";
|
|
|
|
loggerSettings.showTrace = true;
|
|
|
|
} else {
|
|
|
|
throw Error("unexpected argument '%s' to %s", arg, command);
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2013-09-09 16:02:56 +03:00
|
|
|
else if (command != "")
|
2020-04-22 02:07:07 +03:00
|
|
|
throw Error("unknown command '%1%'", command);
|
2013-09-06 15:58:53 +03:00
|
|
|
|
2013-09-02 18:53:58 +03:00
|
|
|
else {
|
2013-09-09 14:56:53 +03:00
|
|
|
size_t p = line.find('=');
|
2022-02-25 17:00:00 +02:00
|
|
|
std::string name;
|
|
|
|
if (p != std::string::npos &&
|
2014-06-16 17:05:09 +03:00
|
|
|
p < line.size() &&
|
|
|
|
line[p + 1] != '=' &&
|
2022-02-25 17:00:00 +02:00
|
|
|
isVarName(name = removeWhitespace(line.substr(0, p))))
|
2013-09-09 14:56:53 +03:00
|
|
|
{
|
2022-02-25 17:00:00 +02:00
|
|
|
Expr * e = parseString(line.substr(p + 1));
|
2020-03-19 14:52:28 +02:00
|
|
|
Value & v(*state->allocValue());
|
2020-12-18 15:38:49 +02:00
|
|
|
v.mkThunk(env, e);
|
2020-03-19 14:52:28 +02:00
|
|
|
addVarToScope(state->symbols.create(name), v);
|
2013-09-09 14:56:53 +03:00
|
|
|
} else {
|
|
|
|
Value v;
|
|
|
|
evalString(line, v);
|
|
|
|
printValue(std::cout, v, 1) << std::endl;
|
|
|
|
}
|
2013-09-02 18:53:58 +03:00
|
|
|
}
|
2013-09-09 16:02:56 +03:00
|
|
|
|
|
|
|
return true;
|
2013-09-02 18:53:58 +03:00
|
|
|
}
|
|
|
|
|
2013-09-06 16:20:06 +03:00
|
|
|
void NixRepl::loadFile(const Path & path)
|
|
|
|
{
|
2013-09-09 17:02:46 +03:00
|
|
|
loadedFiles.remove(path);
|
|
|
|
loadedFiles.push_back(path);
|
2013-09-06 16:20:06 +03:00
|
|
|
Value v, v2;
|
2020-03-19 14:52:28 +02:00
|
|
|
state->evalFile(lookupFileArg(*state, path), v);
|
|
|
|
state->autoCallFunction(*autoArgs, v, v2);
|
2013-09-06 16:20:06 +03:00
|
|
|
addAttrsToScope(v2);
|
|
|
|
}
|
|
|
|
|
2021-07-19 18:47:03 +03:00
|
|
|
void NixRepl::loadFlake(const std::string & flakeRefS)
|
|
|
|
{
|
2022-02-07 01:28:21 +02:00
|
|
|
if (flakeRefS.empty())
|
2022-02-07 17:35:50 +02:00
|
|
|
throw Error("cannot use ':load-flake' without a path specified. (Use '.' for the current working directory.)");
|
2022-02-07 01:28:21 +02:00
|
|
|
|
2021-07-19 18:47:03 +03:00
|
|
|
auto flakeRef = parseFlakeRef(flakeRefS, absPath("."), true);
|
2022-02-24 19:09:00 +02:00
|
|
|
if (evalSettings.pureEval && !flakeRef.input.isLocked())
|
|
|
|
throw Error("cannot use ':load-flake' on locked flake reference '%s' (use --impure to override)", flakeRefS);
|
2021-07-19 18:47:03 +03:00
|
|
|
|
|
|
|
Value v;
|
|
|
|
|
|
|
|
flake::callFlake(*state,
|
|
|
|
flake::lockFlake(*state, flakeRef,
|
|
|
|
flake::LockFlags {
|
|
|
|
.updateLockFile = false,
|
|
|
|
.useRegistries = !evalSettings.pureEval,
|
2022-12-07 13:58:58 +02:00
|
|
|
.allowUnlocked = !evalSettings.pureEval,
|
2021-07-19 18:47:03 +03:00
|
|
|
}),
|
|
|
|
v);
|
|
|
|
addAttrsToScope(v);
|
|
|
|
}
|
|
|
|
|
2013-09-06 16:20:06 +03:00
|
|
|
|
2013-09-09 18:06:14 +03:00
|
|
|
void NixRepl::initEnv()
|
|
|
|
{
|
2020-03-19 14:52:28 +02:00
|
|
|
env = &state->allocEnv(envSize);
|
|
|
|
env->up = &state->baseEnv;
|
2013-09-09 18:06:14 +03:00
|
|
|
displ = 0;
|
2021-09-14 19:49:22 +03:00
|
|
|
staticEnv->vars.clear();
|
2013-09-09 18:22:42 +03:00
|
|
|
|
|
|
|
varNames.clear();
|
2022-05-25 19:21:20 +03:00
|
|
|
for (auto & i : state->staticBaseEnv->vars)
|
2022-03-05 15:40:24 +02:00
|
|
|
varNames.emplace(state->symbols[i.first]);
|
2013-09-09 18:06:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-09 17:02:46 +03:00
|
|
|
void NixRepl::reloadFiles()
|
|
|
|
{
|
2013-09-09 18:06:14 +03:00
|
|
|
initEnv();
|
|
|
|
|
2021-12-20 21:32:21 +02:00
|
|
|
loadFiles();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void NixRepl::loadFiles()
|
|
|
|
{
|
2013-09-09 17:02:46 +03:00
|
|
|
Strings old = loadedFiles;
|
|
|
|
loadedFiles.clear();
|
|
|
|
|
2015-09-07 14:05:58 +03:00
|
|
|
for (auto & i : old) {
|
2021-10-12 16:36:45 +03:00
|
|
|
notice("Loading '%1%'...", i);
|
2015-09-07 14:05:58 +03:00
|
|
|
loadFile(i);
|
2013-09-09 17:02:46 +03:00
|
|
|
}
|
2021-12-23 00:36:08 +02:00
|
|
|
|
2022-05-20 08:28:20 +03:00
|
|
|
for (auto & [i, what] : getValues()) {
|
|
|
|
notice("Loading installable '%1%'...", what);
|
2022-02-19 01:33:03 +02:00
|
|
|
addAttrsToScope(*i);
|
2013-09-09 17:02:46 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-02 19:18:27 +03:00
|
|
|
void NixRepl::addAttrsToScope(Value & attrs)
|
|
|
|
{
|
2023-01-19 14:23:04 +02:00
|
|
|
state->forceAttrs(attrs, [&]() { return attrs.determinePos(noPos); }, "while evaluating an attribute set to be merged in the global scope");
|
2021-12-27 14:18:55 +02:00
|
|
|
if (displ + attrs.attrs->size() >= envSize)
|
|
|
|
throw Error("environment full; cannot add more variables");
|
|
|
|
|
|
|
|
for (auto & i : *attrs.attrs) {
|
2022-01-04 03:13:16 +02:00
|
|
|
staticEnv->vars.emplace_back(i.name, displ);
|
2021-12-27 14:18:55 +02:00
|
|
|
env->values[displ++] = i.value;
|
2022-03-05 15:40:24 +02:00
|
|
|
varNames.emplace(state->symbols[i.name]);
|
2021-12-27 14:18:55 +02:00
|
|
|
}
|
2022-01-04 03:13:16 +02:00
|
|
|
staticEnv->sort();
|
|
|
|
staticEnv->deduplicate();
|
2021-10-12 16:36:45 +03:00
|
|
|
notice("Added %1% variables.", attrs.attrs->size());
|
2013-09-02 19:18:27 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-04-22 22:45:39 +03:00
|
|
|
void NixRepl::addVarToScope(const Symbol name, Value & v)
|
2013-09-02 18:53:58 +03:00
|
|
|
{
|
2013-09-09 18:06:14 +03:00
|
|
|
if (displ >= envSize)
|
|
|
|
throw Error("environment full; cannot add more variables");
|
2021-12-20 21:32:21 +02:00
|
|
|
if (auto oldVar = staticEnv->find(name); oldVar != staticEnv->vars.end())
|
|
|
|
staticEnv->vars.erase(oldVar);
|
2021-11-25 17:53:59 +02:00
|
|
|
staticEnv->vars.emplace_back(name, displ);
|
|
|
|
staticEnv->sort();
|
2013-09-09 14:56:53 +03:00
|
|
|
env->values[displ++] = &v;
|
2022-03-05 15:40:24 +02:00
|
|
|
varNames.emplace(state->symbols[name]);
|
2013-09-02 18:53:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
Expr * NixRepl::parseString(std::string s)
|
2013-09-02 18:53:58 +03:00
|
|
|
{
|
2023-04-06 14:15:50 +03:00
|
|
|
return state->parseExprFromString(std::move(s), state->rootPath(CanonPath::fromCwd()), staticEnv);
|
2013-09-02 18:53:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
void NixRepl::evalString(std::string s, Value & v)
|
2013-09-02 19:00:48 +03:00
|
|
|
{
|
|
|
|
Expr * e = parseString(s);
|
2020-03-19 14:52:28 +02:00
|
|
|
e->eval(*state, *env, v);
|
2022-02-04 01:31:33 +02:00
|
|
|
state->forceValue(v, [&]() { return v.determinePos(noPos); });
|
2013-09-02 19:00:48 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-09 12:14:43 +03:00
|
|
|
std::ostream & NixRepl::printValue(std::ostream & str, Value & v, unsigned int maxDepth)
|
|
|
|
{
|
|
|
|
ValuesSeen seen;
|
|
|
|
return printValue(str, v, maxDepth, seen);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-02-20 09:10:06 +02:00
|
|
|
|
|
|
|
|
2013-09-07 01:35:54 +03:00
|
|
|
// FIXME: lot of cut&paste from Nix's eval.cc.
|
2013-09-09 12:14:43 +03:00
|
|
|
std::ostream & NixRepl::printValue(std::ostream & str, Value & v, unsigned int maxDepth, ValuesSeen & seen)
|
2013-09-07 01:35:54 +03:00
|
|
|
{
|
|
|
|
str.flush();
|
|
|
|
checkInterrupt();
|
|
|
|
|
2022-02-04 01:31:33 +02:00
|
|
|
state->forceValue(v, [&]() { return v.determinePos(noPos); });
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-12-17 15:45:45 +02:00
|
|
|
switch (v.type()) {
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nInt:
|
2020-06-24 22:10:41 +03:00
|
|
|
str << ANSI_CYAN << v.integer << ANSI_NORMAL;
|
|
|
|
break;
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nBool:
|
2023-04-09 23:42:20 +03:00
|
|
|
str << ANSI_CYAN;
|
2023-04-16 13:56:31 +03:00
|
|
|
printLiteralBool(str, v.boolean);
|
2023-04-09 23:42:20 +03:00
|
|
|
str << ANSI_NORMAL;
|
2020-06-24 22:10:41 +03:00
|
|
|
break;
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nString:
|
2021-09-14 11:38:10 +03:00
|
|
|
str << ANSI_WARNING;
|
2023-04-16 13:56:31 +03:00
|
|
|
printLiteralString(str, v.string.s);
|
2020-06-24 22:10:41 +03:00
|
|
|
str << ANSI_NORMAL;
|
|
|
|
break;
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nPath:
|
2023-04-06 14:15:50 +03:00
|
|
|
str << ANSI_GREEN << v.path().to_string() << ANSI_NORMAL; // !!! escaping?
|
2020-06-24 22:10:41 +03:00
|
|
|
break;
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nNull:
|
2020-06-24 22:10:41 +03:00
|
|
|
str << ANSI_CYAN "null" ANSI_NORMAL;
|
|
|
|
break;
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nAttrs: {
|
2020-06-24 22:10:41 +03:00
|
|
|
seen.insert(&v);
|
2013-09-09 12:14:43 +03:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
bool isDrv = state->isDerivation(v);
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
if (isDrv) {
|
|
|
|
str << "«derivation ";
|
|
|
|
Bindings::iterator i = v.attrs->find(state->sDrvPath);
|
Use `std::set<StringContextElem>` not `PathSet` for string contexts
Motivation
`PathSet` is not correct because string contexts have other forms
(`Built` and `DrvDeep`) that are not rendered as plain store paths.
Instead of wrongly using `PathSet`, or "stringly typed" using
`StringSet`, use `std::std<StringContextElem>`.
-----
In support of this change, `NixStringContext` is now defined as
`std::std<StringContextElem>` not `std:vector<StringContextElem>`. The
old definition was just used by a `getContext` method which was only
used by the eval cache. It can be deleted altogether since the types are
now unified and the preexisting `copyContext` function already suffices.
Summarizing the previous paragraph:
Old:
- `value/context.hh`: `NixStringContext = std::vector<StringContextElem>`
- `value.hh`: `NixStringContext Value::getContext(...)`
- `value.hh`: `copyContext(...)`
New:
- `value/context.hh`: `NixStringContext = std::set<StringContextElem>`
- `value.hh`: `copyContext(...)`
----
The string representation of string context elements no longer contains
the store dir. The diff of `src/libexpr/tests/value/context.cc` should
make clear what the new representation is, so we recommend reviewing
that file first. This was done for two reasons:
Less API churn:
`Value::mkString` and friends did not take a `Store` before. But if
`NixStringContextElem::{parse, to_string}` *do* take a store (as they
did before), then we cannot have the `Value` functions use them (in
order to work with the fully-structured `NixStringContext`) without
adding that argument.
That would have been a lot of churn of threading the store, and this
diff is already large enough, so the easier and less invasive thing to
do was simply make the element `parse` and `to_string` functions not
take the `Store` reference, and the easiest way to do that was to simply
drop the store dir.
Space usage:
Dropping the `/nix/store/` (or similar) from the internal representation
will safe space in the heap of the Nix programming being interpreted. If
the heap contains many strings with non-trivial contexts, the saving
could add up to something significant.
----
The eval cache version is bumped.
The eval cache serialization uses `NixStringContextElem::{parse,
to_string}`, and since those functions are changed per the above, that
means the on-disk representation is also changed.
This is simply done by changing the name of the used for the eval cache
from `eval-cache-v4` to eval-cache-v5`.
----
To avoid some duplication `EvalCache::mkPathString` is added to abstract
over the simple case of turning a store path to a string with just that
string in the context.
Context
This PR picks up where #7543 left off. That one introduced the fully
structured `NixStringContextElem` data type, but kept `PathSet context`
as an awkward middle ground between internal `char[][]` interpreter heap
string contexts and `NixStringContext` fully parsed string contexts.
The infelicity of `PathSet context` was specifically called out during
Nix team group review, but it was agreeing that fixing it could be left
as future work. This is that future work.
A possible follow-up step would be to get rid of the `char[][]`
evaluator heap representation, too, but it is not yet clear how to do
that. To use `NixStringContextElem` there we would need to get the STL
containers to GC pointers in the GC build, and I am not sure how to do
that.
----
PR #7543 effectively is writing the inverse of a `mkPathString`,
`mkOutputString`, and one more such function for the `DrvDeep` case. I
would like that PR to have property tests ensuring it is actually the
inverse as expected.
This PR sets things up nicely so that reworking that PR to be in that
more elegant and better tested way is possible.
Co-authored-by: Théophane Hufschmitt <7226587+thufschmitt@users.noreply.github.com>
2023-01-29 03:31:10 +02:00
|
|
|
NixStringContext context;
|
2022-03-02 11:57:19 +02:00
|
|
|
if (i != v.attrs->end())
|
2023-01-19 14:23:04 +02:00
|
|
|
str << state->store->printStorePath(state->coerceToStorePath(i->pos, *i->value, context, "while evaluating the drvPath of a derivation"));
|
2022-03-02 11:57:19 +02:00
|
|
|
else
|
|
|
|
str << "???";
|
|
|
|
str << "»";
|
2020-06-24 22:10:41 +03:00
|
|
|
}
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
else if (maxDepth > 0) {
|
|
|
|
str << "{ ";
|
|
|
|
|
2022-02-25 17:00:00 +02:00
|
|
|
typedef std::map<std::string, Value *> Sorted;
|
2020-06-24 22:10:41 +03:00
|
|
|
Sorted sorted;
|
|
|
|
for (auto & i : *v.attrs)
|
2022-03-05 15:40:24 +02:00
|
|
|
sorted.emplace(state->symbols[i.name], i.value);
|
2020-06-24 22:10:41 +03:00
|
|
|
|
|
|
|
for (auto & i : sorted) {
|
2023-04-16 15:07:35 +03:00
|
|
|
printAttributeName(str, i.first);
|
2020-06-24 22:10:41 +03:00
|
|
|
str << " = ";
|
2022-03-03 14:07:50 +02:00
|
|
|
if (seen.count(i.second))
|
2020-06-24 22:10:41 +03:00
|
|
|
str << "«repeated»";
|
|
|
|
else
|
|
|
|
try {
|
|
|
|
printValue(str, *i.second, maxDepth - 1, seen);
|
|
|
|
} catch (AssertionError & e) {
|
|
|
|
str << ANSI_RED "«error: " << e.msg() << "»" ANSI_NORMAL;
|
|
|
|
}
|
|
|
|
str << "; ";
|
|
|
|
}
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
str << "}";
|
|
|
|
} else
|
|
|
|
str << "{ ... }";
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-06-24 22:10:41 +03:00
|
|
|
break;
|
|
|
|
}
|
2013-09-07 01:35:54 +03:00
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nList:
|
2020-06-24 22:10:41 +03:00
|
|
|
seen.insert(&v);
|
|
|
|
|
|
|
|
str << "[ ";
|
|
|
|
if (maxDepth > 0)
|
2021-11-24 21:21:34 +02:00
|
|
|
for (auto elem : v.listItems()) {
|
|
|
|
if (seen.count(elem))
|
2020-06-24 22:10:41 +03:00
|
|
|
str << "«repeated»";
|
|
|
|
else
|
|
|
|
try {
|
2021-11-24 21:21:34 +02:00
|
|
|
printValue(str, *elem, maxDepth - 1, seen);
|
2020-06-24 22:10:41 +03:00
|
|
|
} catch (AssertionError & e) {
|
|
|
|
str << ANSI_RED "«error: " << e.msg() << "»" ANSI_NORMAL;
|
|
|
|
}
|
|
|
|
str << " ";
|
|
|
|
}
|
|
|
|
else
|
|
|
|
str << "... ";
|
|
|
|
str << "]";
|
|
|
|
break;
|
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nFunction:
|
2020-12-12 03:15:11 +02:00
|
|
|
if (v.isLambda()) {
|
2020-12-12 03:09:10 +02:00
|
|
|
std::ostringstream s;
|
2022-03-04 20:31:59 +02:00
|
|
|
s << state->positions[v.lambda.fun->pos];
|
2020-12-12 03:09:10 +02:00
|
|
|
str << ANSI_BLUE "«lambda @ " << filterANSIEscapes(s.str()) << "»" ANSI_NORMAL;
|
2020-12-12 03:15:11 +02:00
|
|
|
} else if (v.isPrimOp()) {
|
2020-12-12 03:09:10 +02:00
|
|
|
str << ANSI_MAGENTA "«primop»" ANSI_NORMAL;
|
2020-12-12 03:15:11 +02:00
|
|
|
} else if (v.isPrimOpApp()) {
|
2020-12-12 03:09:10 +02:00
|
|
|
str << ANSI_BLUE "«primop-app»" ANSI_NORMAL;
|
|
|
|
} else {
|
|
|
|
abort();
|
|
|
|
}
|
2020-06-24 22:10:41 +03:00
|
|
|
break;
|
2017-07-31 16:15:49 +03:00
|
|
|
|
2020-12-12 03:09:10 +02:00
|
|
|
case nFloat:
|
2020-06-24 22:10:41 +03:00
|
|
|
str << v.fpoint;
|
|
|
|
break;
|
2020-06-19 22:44:08 +03:00
|
|
|
|
2023-04-03 19:03:20 +03:00
|
|
|
case nThunk:
|
|
|
|
case nExternal:
|
2020-06-24 22:10:41 +03:00
|
|
|
default:
|
|
|
|
str << ANSI_RED "«unknown»" ANSI_NORMAL;
|
|
|
|
break;
|
2013-09-07 01:35:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return str;
|
|
|
|
}
|
|
|
|
|
2023-02-04 05:42:36 +02:00
|
|
|
|
|
|
|
std::unique_ptr<AbstractNixRepl> AbstractNixRepl::create(
|
2023-06-23 20:51:25 +03:00
|
|
|
const SearchPath & searchPath, nix::ref<Store> store, ref<EvalState> state,
|
2023-02-04 05:42:36 +02:00
|
|
|
std::function<AnnotatedValues()> getValues)
|
|
|
|
{
|
|
|
|
return std::make_unique<NixRepl>(
|
|
|
|
searchPath,
|
|
|
|
openStore(),
|
|
|
|
state,
|
|
|
|
getValues
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void AbstractNixRepl::runSimple(
|
|
|
|
ref<EvalState> evalState,
|
2022-05-06 05:26:10 +03:00
|
|
|
const ValMap & extraEnv)
|
2013-09-02 18:53:58 +03:00
|
|
|
{
|
2022-06-02 23:34:27 +03:00
|
|
|
auto getValues = [&]()->NixRepl::AnnotatedValues{
|
|
|
|
NixRepl::AnnotatedValues values;
|
|
|
|
return values;
|
|
|
|
};
|
2023-06-23 20:51:25 +03:00
|
|
|
SearchPath searchPath = {};
|
2022-06-02 23:34:27 +03:00
|
|
|
auto repl = std::make_unique<NixRepl>(
|
|
|
|
searchPath,
|
|
|
|
openStore(),
|
|
|
|
evalState,
|
|
|
|
getValues
|
|
|
|
);
|
2020-08-05 22:26:17 +03:00
|
|
|
|
|
|
|
repl->initEnv();
|
|
|
|
|
2021-12-27 23:06:04 +02:00
|
|
|
// add 'extra' vars.
|
2022-05-05 13:29:14 +03:00
|
|
|
for (auto & [name, value] : extraEnv)
|
2022-05-25 19:21:20 +03:00
|
|
|
repl->addVarToScope(repl->state->symbols.create(name), *value);
|
2020-08-05 22:26:17 +03:00
|
|
|
|
2022-06-02 23:34:27 +03:00
|
|
|
repl->mainLoop();
|
2020-08-05 22:26:17 +03:00
|
|
|
}
|
|
|
|
|
2013-09-02 18:53:58 +03:00
|
|
|
}
|