2019-06-04 20:45:16 +03:00
|
|
|
#pragma once
|
2023-04-01 06:18:41 +03:00
|
|
|
///@file
|
2019-06-04 20:45:16 +03:00
|
|
|
|
2019-02-12 19:23:11 +02:00
|
|
|
#include "types.hh"
|
|
|
|
#include "flakeref.hh"
|
2019-06-04 21:01:21 +03:00
|
|
|
#include "lockfile.hh"
|
2020-04-16 17:54:34 +03:00
|
|
|
#include "value.hh"
|
2019-02-12 19:23:11 +02:00
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
2019-05-29 16:31:07 +03:00
|
|
|
class EvalState;
|
|
|
|
|
2020-01-21 17:27:53 +02:00
|
|
|
namespace flake {
|
2019-03-10 08:05:05 +02:00
|
|
|
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
struct FlakeInput;
|
|
|
|
|
|
|
|
typedef std::map<FlakeId, FlakeInput> FlakeInputs;
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* FlakeInput is the 'Flake'-level parsed form of the "input" entries
|
2020-09-28 19:37:26 +03:00
|
|
|
* in the flake file.
|
|
|
|
*
|
|
|
|
* A FlakeInput is normally constructed by the 'parseFlakeInput'
|
|
|
|
* function which parses the input specification in the '.flake' file
|
|
|
|
* to create a 'FlakeRef' (a fetcher, the fetcher-specific
|
|
|
|
* representation of the input specification, and possibly the fetched
|
|
|
|
* local store path result) and then creating this FlakeInput to hold
|
|
|
|
* that FlakeRef, along with anything that might override that
|
|
|
|
* FlakeRef (like command-line overrides or "follows" specifications).
|
|
|
|
*
|
|
|
|
* A FlakeInput is also sometimes constructed directly from a FlakeRef
|
|
|
|
* instead of starting at the flake-file input specification
|
|
|
|
* (e.g. overrides, follows, and implicit inputs).
|
|
|
|
*
|
|
|
|
* A FlakeInput will usually have one of either "ref" or "follows"
|
|
|
|
* set. If not otherwise specified, a "ref" will be generated to a
|
|
|
|
* 'type="indirect"' flake, which is treated as simply the name of a
|
|
|
|
* flake to be resolved in the registry.
|
|
|
|
*/
|
2020-09-27 00:32:58 +03:00
|
|
|
|
2019-08-30 17:27:51 +03:00
|
|
|
struct FlakeInput
|
|
|
|
{
|
2020-06-11 15:40:21 +03:00
|
|
|
std::optional<FlakeRef> ref;
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* true = process flake to get outputs
|
|
|
|
*
|
|
|
|
* false = (fetched) static source path
|
|
|
|
*/
|
|
|
|
bool isFlake = true;
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
std::optional<InputPath> follows;
|
|
|
|
FlakeInputs overrides;
|
2019-08-30 17:27:51 +03:00
|
|
|
};
|
|
|
|
|
2020-10-26 21:45:39 +02:00
|
|
|
struct ConfigFile
|
|
|
|
{
|
|
|
|
using ConfigValue = std::variant<std::string, int64_t, Explicit<bool>, std::vector<std::string>>;
|
|
|
|
|
2020-11-26 13:34:43 +02:00
|
|
|
std::map<std::string, ConfigValue> settings;
|
2020-10-26 21:45:39 +02:00
|
|
|
|
|
|
|
void apply();
|
|
|
|
};
|
2020-09-27 00:32:58 +03:00
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* The contents of a flake.nix file.
|
|
|
|
*/
|
2019-02-21 07:53:01 +02:00
|
|
|
struct Flake
|
|
|
|
{
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* The original flake specification (by the user)
|
|
|
|
*/
|
|
|
|
FlakeRef originalRef;
|
|
|
|
/**
|
|
|
|
* registry references and caching resolved to the specific underlying flake
|
|
|
|
*/
|
|
|
|
FlakeRef resolvedRef;
|
|
|
|
/**
|
|
|
|
* the specific local store result of invoking the fetcher
|
|
|
|
*/
|
|
|
|
FlakeRef lockedRef;
|
|
|
|
/**
|
|
|
|
* pretend that 'lockedRef' is dirty
|
|
|
|
*/
|
|
|
|
bool forceDirty = false;
|
2020-01-22 18:20:21 +02:00
|
|
|
std::optional<std::string> description;
|
2023-10-20 20:50:21 +03:00
|
|
|
StorePath storePath;
|
Respect lock files of inputs + fine-grained lock file control
When computing a lock file, we now respect the lock files of flake
inputs. This is important for usability / reproducibility. For
example, the 'nixops' flake depends on the 'nixops-aws' and
'nixops-hetzner' repositories. So when the 'nixops' flake is used in
another flake, we want the versions of 'nixops-aws' and
'nixops-hetzner' locked by the the 'nixops' flake because those
presumably have been tested.
This can lead to a proliferation of versions of flakes like 'nixpkgs'
(since every flake's lock file could depend on a different version of
'nixpkgs'). This is not a major issue when using Nixpkgs overlays or
NixOS modules, since then the top-level flake composes those
overlays/modules into *its* version of Nixpkgs and all other versions
are ignored. Lock file computation has been made a bit more lazy so it
won't try to fetch all those versions of 'nixpkgs'.
However, in case it's necessary to minimize flake versions, there now
are two input attributes that allow this. First, you can copy an input
from another flake, as follows:
inputs.nixpkgs.follows = "dwarffs/nixpkgs";
This states that the calling flake's 'nixpkgs' input shall be the same
as the 'nixpkgs' input of the 'dwarffs' input.
Second, you can override inputs of inputs:
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
or equivalently, using 'follows':
inputs.nixpkgs.url = github:edolstra/nixpkgs/<hash>;
inputs.nixops.inputs.nixpkgs.follows = "nixpkgs";
This states that the 'nixpkgs' input of the 'nixops' input shall be
the same as the calling flake's 'nixpkgs' input.
Finally, at '-v' Nix now prints the changes to the lock file, e.g.
$ nix flake update ~/Misc/eelco-configurations/hagbard
inputs of flake 'git+file:///home/eelco/Misc/eelco-configurations?subdir=hagbard' changed:
updated 'nixpkgs': 'github:edolstra/nixpkgs/7845bf5f4b3013df1cf036e9c9c3a55a30331db9' -> 'github:edolstra/nixpkgs/03f3def66a104a221aac8b751eeb7075374848fd'
removed 'nixops'
removed 'nixops/nixops-aws'
removed 'nixops/nixops-hetzner'
removed 'nixops/nixpkgs'
2020-01-24 23:05:11 +02:00
|
|
|
FlakeInputs inputs;
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* 'nixConfig' attribute
|
|
|
|
*/
|
|
|
|
ConfigFile config;
|
2020-01-21 17:27:53 +02:00
|
|
|
~Flake();
|
2019-03-21 10:30:16 +02:00
|
|
|
};
|
|
|
|
|
2019-09-18 22:17:27 +03:00
|
|
|
Flake getFlake(EvalState & state, const FlakeRef & flakeRef, bool allowLookup);
|
2019-06-21 20:04:58 +03:00
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Fingerprint of a locked flake; used as a cache key.
|
|
|
|
*/
|
2019-06-07 23:25:48 +03:00
|
|
|
typedef Hash Fingerprint;
|
|
|
|
|
2020-01-22 21:59:59 +02:00
|
|
|
struct LockedFlake
|
2019-03-21 10:30:16 +02:00
|
|
|
{
|
2019-03-29 17:18:25 +02:00
|
|
|
Flake flake;
|
2019-06-04 20:10:35 +03:00
|
|
|
LockFile lockFile;
|
2019-06-07 23:25:48 +03:00
|
|
|
|
|
|
|
Fingerprint getFingerprint() const;
|
2019-03-21 10:30:16 +02:00
|
|
|
};
|
|
|
|
|
2020-01-29 15:57:57 +02:00
|
|
|
struct LockFlags
|
|
|
|
{
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Whether to ignore the existing lock file, creating a new one
|
|
|
|
* from scratch.
|
|
|
|
*/
|
2020-01-29 22:01:34 +02:00
|
|
|
bool recreateLockFile = false;
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Whether to update the lock file at all. If set to false, if any
|
|
|
|
* change to the lock file is needed (e.g. when an input has been
|
|
|
|
* added to flake.nix), you get a fatal error.
|
|
|
|
*/
|
2020-01-29 22:01:34 +02:00
|
|
|
bool updateLockFile = true;
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Whether to write the lock file to disk. If set to true, if the
|
|
|
|
* any changes to the lock file are needed and the flake is not
|
|
|
|
* writable (i.e. is not a local Git working tree or similar), you
|
|
|
|
* get a fatal error. If set to false, Nix will use the modified
|
|
|
|
* lock file in memory only, without writing it to disk.
|
|
|
|
*/
|
2020-01-29 22:01:34 +02:00
|
|
|
bool writeLockFile = true;
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Whether to use the registries to lookup indirect flake
|
|
|
|
* references like 'nixpkgs'.
|
|
|
|
*/
|
2021-07-02 15:36:14 +03:00
|
|
|
std::optional<bool> useRegistries = std::nullopt;
|
2020-01-29 22:01:34 +02:00
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Whether to apply flake's nixConfig attribute to the configuration
|
|
|
|
*/
|
2021-07-01 17:54:22 +03:00
|
|
|
|
|
|
|
bool applyNixConfig = false;
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Whether unlocked flake references (i.e. those without a Git
|
|
|
|
* revision or similar) without a corresponding lock are
|
|
|
|
* allowed. Unlocked flake references with a lock are always
|
|
|
|
* allowed.
|
|
|
|
*/
|
2022-12-07 13:58:58 +02:00
|
|
|
bool allowUnlocked = true;
|
2020-01-29 22:01:34 +02:00
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Whether to commit changes to flake.lock.
|
|
|
|
*/
|
2020-02-05 15:48:49 +02:00
|
|
|
bool commitLockFile = false;
|
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* The path to a lock file to read instead of the `flake.lock` file in the top-level flake
|
|
|
|
*/
|
2023-03-14 13:02:03 +02:00
|
|
|
std::optional<std::string> referenceLockFilePath;
|
2023-03-13 22:08:52 +02:00
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* The path to a lock file to write to instead of the `flake.lock` file in the top-level flake
|
|
|
|
*/
|
2023-03-14 13:02:03 +02:00
|
|
|
std::optional<Path> outputLockFilePath;
|
2023-03-13 22:08:52 +02:00
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Flake inputs to be overridden.
|
|
|
|
*/
|
2020-01-29 15:57:57 +02:00
|
|
|
std::map<InputPath, FlakeRef> inputOverrides;
|
2020-01-30 00:12:58 +02:00
|
|
|
|
2023-04-07 16:55:28 +03:00
|
|
|
/**
|
|
|
|
* Flake inputs to be updated. This means that any existing lock
|
|
|
|
* for those inputs will be ignored.
|
|
|
|
*/
|
2020-01-30 00:12:58 +02:00
|
|
|
std::set<InputPath> inputUpdates;
|
2020-01-29 15:57:57 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
LockedFlake lockFlake(
|
2020-01-29 22:01:34 +02:00
|
|
|
EvalState & state,
|
|
|
|
const FlakeRef & flakeRef,
|
|
|
|
const LockFlags & lockFlags);
|
2019-04-16 15:27:54 +03:00
|
|
|
|
2020-01-29 22:01:34 +02:00
|
|
|
void callFlake(
|
|
|
|
EvalState & state,
|
2020-03-12 23:06:57 +02:00
|
|
|
const LockedFlake & lockedFlake,
|
2019-06-04 20:10:35 +03:00
|
|
|
Value & v);
|
2019-05-24 00:42:13 +03:00
|
|
|
|
2019-02-12 19:23:11 +02:00
|
|
|
}
|
2019-05-29 16:31:07 +03:00
|
|
|
|
2020-03-09 16:28:41 +02:00
|
|
|
void emitTreeAttrs(
|
|
|
|
EvalState & state,
|
2023-10-20 20:50:21 +03:00
|
|
|
const StorePath & storePath,
|
Remove TreeInfo
The attributes previously stored in TreeInfo (narHash, revCount,
lastModified) are now stored in Input. This makes it less arbitrary
what attributes are stored where.
As a result, the lock file format has changed. An entry like
"info": {
"lastModified": 1585405475,
"narHash": "sha256-bESW0n4KgPmZ0luxvwJ+UyATrC6iIltVCsGdLiphVeE="
},
"locked": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b88ff468e9850410070d4e0ccd68c7011f15b2be",
"type": "github"
},
is now stored as
"locked": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b88ff468e9850410070d4e0ccd68c7011f15b2be",
"type": "github",
"lastModified": 1585405475,
"narHash": "sha256-bESW0n4KgPmZ0luxvwJ+UyATrC6iIltVCsGdLiphVeE="
},
The 'Input' class is now a dumb set of attributes. All the fetcher
implementations subclass InputScheme, not Input. This simplifies the
API.
Also, fix substitution of flake inputs. This was broken since lazy
flake fetching started using fetchTree internally.
2020-05-30 01:44:11 +03:00
|
|
|
const fetchers::Input & input,
|
2021-09-15 19:31:42 +03:00
|
|
|
Value & v,
|
|
|
|
bool emptyRevFallback = false,
|
|
|
|
bool forceDirty = false);
|
2020-03-09 16:28:41 +02:00
|
|
|
|
2019-05-29 16:31:07 +03:00
|
|
|
}
|