2018-11-29 20:18:36 +02:00
|
|
|
#include "command.hh"
|
|
|
|
#include "common-args.hh"
|
|
|
|
#include "shared.hh"
|
|
|
|
#include "eval.hh"
|
2019-05-29 18:25:41 +03:00
|
|
|
#include "eval-inline.hh"
|
2019-06-05 17:51:54 +03:00
|
|
|
#include "flake/flake.hh"
|
2019-05-29 18:25:41 +03:00
|
|
|
#include "get-drvs.hh"
|
|
|
|
#include "store-api.hh"
|
2019-06-17 18:59:57 +03:00
|
|
|
#include "derivations.hh"
|
2021-03-02 05:50:41 +02:00
|
|
|
#include "path-with-outputs.hh"
|
2019-09-19 21:15:42 +03:00
|
|
|
#include "attr-path.hh"
|
2020-03-30 15:03:28 +03:00
|
|
|
#include "fetchers.hh"
|
|
|
|
#include "registry.hh"
|
2020-01-30 01:58:55 +02:00
|
|
|
#include "json.hh"
|
2020-04-20 14:14:59 +03:00
|
|
|
#include "eval-cache.hh"
|
2019-04-16 15:10:05 +03:00
|
|
|
|
2019-02-27 20:54:18 +02:00
|
|
|
#include <nlohmann/json.hpp>
|
2019-03-29 17:18:25 +02:00
|
|
|
#include <queue>
|
2019-05-28 21:34:02 +03:00
|
|
|
#include <iomanip>
|
2018-11-29 20:18:36 +02:00
|
|
|
|
|
|
|
using namespace nix;
|
2019-05-29 16:31:07 +03:00
|
|
|
using namespace nix::flake;
|
2018-11-29 20:18:36 +02:00
|
|
|
|
2020-06-08 17:20:00 +03:00
|
|
|
class FlakeCommand : virtual Args, public MixFlakeOptions
|
2019-05-16 23:48:16 +03:00
|
|
|
{
|
2019-10-08 17:30:04 +03:00
|
|
|
std::string flakeUrl = ".";
|
2019-05-16 23:48:16 +03:00
|
|
|
|
|
|
|
public:
|
|
|
|
|
|
|
|
FlakeCommand()
|
|
|
|
{
|
2020-05-11 23:10:33 +03:00
|
|
|
expectArgs({
|
|
|
|
.label = "flake-url",
|
|
|
|
.optional = true,
|
|
|
|
.handler = {&flakeUrl},
|
|
|
|
.completer = {[&](size_t, std::string_view prefix) {
|
2020-06-05 15:09:12 +03:00
|
|
|
completeFlakeRef(getStore(), prefix);
|
2020-05-11 23:10:33 +03:00
|
|
|
}}
|
|
|
|
});
|
2019-05-16 23:48:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
FlakeRef getFlakeRef()
|
|
|
|
{
|
2020-01-21 17:27:53 +02:00
|
|
|
return parseFlakeRef(flakeUrl, absPath(".")); //FIXME
|
2019-05-16 23:48:16 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 21:59:59 +02:00
|
|
|
LockedFlake lockFlake()
|
2019-05-22 14:46:07 +03:00
|
|
|
{
|
2020-01-29 22:01:34 +02:00
|
|
|
return flake::lockFlake(*getEvalState(), getFlakeRef(), lockFlags);
|
2019-05-16 23:48:16 +03:00
|
|
|
}
|
2020-06-08 17:20:00 +03:00
|
|
|
|
|
|
|
std::optional<FlakeRef> getFlakeRefForCompletion() override
|
|
|
|
{
|
|
|
|
return getFlakeRef();
|
|
|
|
}
|
2019-05-16 23:48:16 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
struct CmdFlakeUpdate : FlakeCommand
|
2019-02-21 07:53:01 +02:00
|
|
|
{
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "update flake lock file";
|
|
|
|
}
|
|
|
|
|
2021-02-26 15:55:54 +02:00
|
|
|
CmdFlakeUpdate()
|
|
|
|
{
|
|
|
|
/* Remove flags that don't make sense. */
|
|
|
|
removeFlag("recreate-lock-file");
|
|
|
|
removeFlag("update-input");
|
|
|
|
removeFlag("no-update-lock-file");
|
2021-03-16 17:53:39 +02:00
|
|
|
removeFlag("no-write-lock-file");
|
2021-02-26 15:55:54 +02:00
|
|
|
}
|
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-update.md"
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
2019-02-21 07:53:01 +02:00
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
2021-02-26 15:55:54 +02:00
|
|
|
settings.tarballTtl = 0;
|
|
|
|
|
|
|
|
lockFlags.recreateLockFile = true;
|
2021-03-16 17:53:39 +02:00
|
|
|
lockFlags.writeLockFile = true;
|
2021-02-26 15:55:54 +02:00
|
|
|
|
|
|
|
lockFlake();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
struct CmdFlakeLock : FlakeCommand
|
|
|
|
{
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "create missing lock file entries";
|
|
|
|
}
|
|
|
|
|
2021-03-16 17:53:39 +02:00
|
|
|
CmdFlakeLock()
|
|
|
|
{
|
|
|
|
/* Remove flags that don't make sense. */
|
|
|
|
removeFlag("no-write-lock-file");
|
|
|
|
}
|
|
|
|
|
2021-02-26 15:55:54 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-lock.md"
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
2020-02-01 13:26:05 +02:00
|
|
|
settings.tarballTtl = 0;
|
|
|
|
|
2021-03-16 17:53:39 +02:00
|
|
|
lockFlags.writeLockFile = true;
|
|
|
|
|
2020-01-22 21:59:59 +02:00
|
|
|
lockFlake();
|
2019-02-21 07:53:01 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-05-30 00:09:23 +03:00
|
|
|
static void enumerateOutputs(EvalState & state, Value & vFlake,
|
2019-09-10 16:25:10 +03:00
|
|
|
std::function<void(const std::string & name, Value & vProvide, const Pos & pos)> callback)
|
nix flake info --json: List the "provides"
It also lists the contents of "checks" and "packages".
For example:
$ nix flake info --json | jq
{
"branch": "HEAD",
"description": "The purely functional package manager",
"epoch": 2019,
"id": "nix",
"lastModified": 1559161142,
"path": "/nix/store/2w2qla8735dbxah8gai8r1nsbf5x4f5d-source",
"provides": {
"checks": {
"binaryTarball": {},
"nix-copy-closure": {},
"perlBindings": {},
"remoteBuilds": {},
"setuid": {}
},
"defaultPackage": {},
"devShell": {},
"hydraJobs": {},
"packages": {
"nix": {},
"nix-perl-bindings": {}
}
},
"revCount": 6955,
"revision": "8cb24e04e8b6cc60e2504733afe78e0eadafcd98",
"uri": "/home/eelco/Dev/nix"
}
Fixes #2820.
2019-05-29 23:17:08 +03:00
|
|
|
{
|
|
|
|
state.forceAttrs(vFlake);
|
|
|
|
|
2019-09-22 22:53:01 +03:00
|
|
|
auto aOutputs = vFlake.attrs->get(state.symbols.create("outputs"));
|
|
|
|
assert(aOutputs);
|
nix flake info --json: List the "provides"
It also lists the contents of "checks" and "packages".
For example:
$ nix flake info --json | jq
{
"branch": "HEAD",
"description": "The purely functional package manager",
"epoch": 2019,
"id": "nix",
"lastModified": 1559161142,
"path": "/nix/store/2w2qla8735dbxah8gai8r1nsbf5x4f5d-source",
"provides": {
"checks": {
"binaryTarball": {},
"nix-copy-closure": {},
"perlBindings": {},
"remoteBuilds": {},
"setuid": {}
},
"defaultPackage": {},
"devShell": {},
"hydraJobs": {},
"packages": {
"nix": {},
"nix-perl-bindings": {}
}
},
"revCount": 6955,
"revision": "8cb24e04e8b6cc60e2504733afe78e0eadafcd98",
"uri": "/home/eelco/Dev/nix"
}
Fixes #2820.
2019-05-29 23:17:08 +03:00
|
|
|
|
2020-02-14 23:45:33 +02:00
|
|
|
state.forceAttrs(*aOutputs->value);
|
nix flake info --json: List the "provides"
It also lists the contents of "checks" and "packages".
For example:
$ nix flake info --json | jq
{
"branch": "HEAD",
"description": "The purely functional package manager",
"epoch": 2019,
"id": "nix",
"lastModified": 1559161142,
"path": "/nix/store/2w2qla8735dbxah8gai8r1nsbf5x4f5d-source",
"provides": {
"checks": {
"binaryTarball": {},
"nix-copy-closure": {},
"perlBindings": {},
"remoteBuilds": {},
"setuid": {}
},
"defaultPackage": {},
"devShell": {},
"hydraJobs": {},
"packages": {
"nix": {},
"nix-perl-bindings": {}
}
},
"revCount": 6955,
"revision": "8cb24e04e8b6cc60e2504733afe78e0eadafcd98",
"uri": "/home/eelco/Dev/nix"
}
Fixes #2820.
2019-05-29 23:17:08 +03:00
|
|
|
|
2020-02-14 23:45:33 +02:00
|
|
|
for (auto & attr : *aOutputs->value->attrs)
|
2019-09-10 16:25:10 +03:00
|
|
|
callback(attr.name, *attr.value, *attr.pos);
|
nix flake info --json: List the "provides"
It also lists the contents of "checks" and "packages".
For example:
$ nix flake info --json | jq
{
"branch": "HEAD",
"description": "The purely functional package manager",
"epoch": 2019,
"id": "nix",
"lastModified": 1559161142,
"path": "/nix/store/2w2qla8735dbxah8gai8r1nsbf5x4f5d-source",
"provides": {
"checks": {
"binaryTarball": {},
"nix-copy-closure": {},
"perlBindings": {},
"remoteBuilds": {},
"setuid": {}
},
"defaultPackage": {},
"devShell": {},
"hydraJobs": {},
"packages": {
"nix": {},
"nix-perl-bindings": {}
}
},
"revCount": 6955,
"revision": "8cb24e04e8b6cc60e2504733afe78e0eadafcd98",
"uri": "/home/eelco/Dev/nix"
}
Fixes #2820.
2019-05-29 23:17:08 +03:00
|
|
|
}
|
|
|
|
|
2021-03-16 18:19:04 +02:00
|
|
|
struct CmdFlakeMetadata : FlakeCommand, MixJSON
|
2019-02-21 07:53:01 +02:00
|
|
|
{
|
|
|
|
std::string description() override
|
|
|
|
{
|
2021-03-16 18:19:04 +02:00
|
|
|
return "show flake metadata";
|
2019-02-21 07:53:01 +02:00
|
|
|
}
|
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
2021-03-16 18:19:04 +02:00
|
|
|
#include "flake-metadata.md"
|
2020-12-23 14:19:53 +02:00
|
|
|
;
|
|
|
|
}
|
|
|
|
|
2019-02-21 07:53:01 +02:00
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
2021-03-16 18:19:04 +02:00
|
|
|
auto lockedFlake = lockFlake();
|
|
|
|
auto & flake = lockedFlake.flake;
|
nix flake info --json: List the "provides"
It also lists the contents of "checks" and "packages".
For example:
$ nix flake info --json | jq
{
"branch": "HEAD",
"description": "The purely functional package manager",
"epoch": 2019,
"id": "nix",
"lastModified": 1559161142,
"path": "/nix/store/2w2qla8735dbxah8gai8r1nsbf5x4f5d-source",
"provides": {
"checks": {
"binaryTarball": {},
"nix-copy-closure": {},
"perlBindings": {},
"remoteBuilds": {},
"setuid": {}
},
"defaultPackage": {},
"devShell": {},
"hydraJobs": {},
"packages": {
"nix": {},
"nix-perl-bindings": {}
}
},
"revCount": 6955,
"revision": "8cb24e04e8b6cc60e2504733afe78e0eadafcd98",
"uri": "/home/eelco/Dev/nix"
}
Fixes #2820.
2019-05-29 23:17:08 +03:00
|
|
|
|
2020-04-06 15:39:47 +03:00
|
|
|
if (json) {
|
2021-03-16 18:19:04 +02:00
|
|
|
nlohmann::json j;
|
|
|
|
if (flake.description)
|
|
|
|
j["description"] = *flake.description;
|
|
|
|
j["originalUrl"] = flake.originalRef.to_string();
|
|
|
|
j["original"] = fetchers::attrsToJSON(flake.originalRef.toAttrs());
|
|
|
|
j["resolvedUrl"] = flake.resolvedRef.to_string();
|
|
|
|
j["resolved"] = fetchers::attrsToJSON(flake.resolvedRef.toAttrs());
|
|
|
|
j["url"] = flake.lockedRef.to_string(); // FIXME: rename to lockedUrl
|
|
|
|
j["locked"] = fetchers::attrsToJSON(flake.lockedRef.toAttrs());
|
|
|
|
if (auto rev = flake.lockedRef.input.getRev())
|
|
|
|
j["revision"] = rev->to_string(Base16, false);
|
|
|
|
if (auto revCount = flake.lockedRef.input.getRevCount())
|
|
|
|
j["revCount"] = *revCount;
|
|
|
|
if (auto lastModified = flake.lockedRef.input.getLastModified())
|
|
|
|
j["lastModified"] = *lastModified;
|
|
|
|
j["path"] = store->printStorePath(flake.sourceInfo->storePath);
|
|
|
|
j["locks"] = lockedFlake.lockFile.toJSON();
|
|
|
|
logger->cout("%s", j.dump());
|
|
|
|
} else {
|
|
|
|
logger->cout(
|
|
|
|
ANSI_BOLD "Resolved URL:" ANSI_NORMAL " %s",
|
|
|
|
flake.resolvedRef.to_string());
|
|
|
|
logger->cout(
|
|
|
|
ANSI_BOLD "Locked URL:" ANSI_NORMAL " %s",
|
|
|
|
flake.lockedRef.to_string());
|
|
|
|
if (flake.description)
|
|
|
|
logger->cout(
|
|
|
|
ANSI_BOLD "Description:" ANSI_NORMAL " %s",
|
|
|
|
*flake.description);
|
|
|
|
logger->cout(
|
|
|
|
ANSI_BOLD "Path:" ANSI_NORMAL " %s",
|
|
|
|
store->printStorePath(flake.sourceInfo->storePath));
|
|
|
|
if (auto rev = flake.lockedRef.input.getRev())
|
|
|
|
logger->cout(
|
|
|
|
ANSI_BOLD "Revision:" ANSI_NORMAL " %s",
|
|
|
|
rev->to_string(Base16, false));
|
|
|
|
if (auto revCount = flake.lockedRef.input.getRevCount())
|
|
|
|
logger->cout(
|
|
|
|
ANSI_BOLD "Revisions:" ANSI_NORMAL " %s",
|
|
|
|
*revCount);
|
|
|
|
if (auto lastModified = flake.lockedRef.input.getLastModified())
|
|
|
|
logger->cout(
|
|
|
|
ANSI_BOLD "Last modified:" ANSI_NORMAL " %s",
|
|
|
|
std::put_time(std::localtime(&*lastModified), "%F %T"));
|
|
|
|
|
|
|
|
logger->cout(ANSI_BOLD "Inputs:" ANSI_NORMAL);
|
2020-01-31 13:54:52 +02:00
|
|
|
|
2020-05-22 01:58:02 +03:00
|
|
|
std::unordered_set<std::shared_ptr<Node>> visited;
|
|
|
|
|
2020-03-12 23:06:57 +02:00
|
|
|
std::function<void(const Node & node, const std::string & prefix)> recurse;
|
2020-01-31 13:54:52 +02:00
|
|
|
|
2020-03-12 23:06:57 +02:00
|
|
|
recurse = [&](const Node & node, const std::string & prefix)
|
2020-01-31 13:54:52 +02:00
|
|
|
{
|
2020-03-12 23:06:57 +02:00
|
|
|
for (const auto & [i, input] : enumerate(node.inputs)) {
|
|
|
|
bool last = i + 1 == node.inputs.size();
|
2020-05-22 01:58:02 +03:00
|
|
|
|
2020-06-11 15:40:21 +03:00
|
|
|
if (auto lockedNode = std::get_if<0>(&input.second)) {
|
2020-09-25 18:30:04 +03:00
|
|
|
logger->cout("%s" ANSI_BOLD "%s" ANSI_NORMAL ": %s",
|
2020-06-11 15:40:21 +03:00
|
|
|
prefix + (last ? treeLast : treeConn), input.first,
|
2021-03-16 18:19:04 +02:00
|
|
|
*lockedNode ? (*lockedNode)->lockedRef : flake.lockedRef);
|
Remove TreeInfo
The attributes previously stored in TreeInfo (narHash, revCount,
lastModified) are now stored in Input. This makes it less arbitrary
what attributes are stored where.
As a result, the lock file format has changed. An entry like
"info": {
"lastModified": 1585405475,
"narHash": "sha256-bESW0n4KgPmZ0luxvwJ+UyATrC6iIltVCsGdLiphVeE="
},
"locked": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b88ff468e9850410070d4e0ccd68c7011f15b2be",
"type": "github"
},
is now stored as
"locked": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b88ff468e9850410070d4e0ccd68c7011f15b2be",
"type": "github",
"lastModified": 1585405475,
"narHash": "sha256-bESW0n4KgPmZ0luxvwJ+UyATrC6iIltVCsGdLiphVeE="
},
The 'Input' class is now a dumb set of attributes. All the fetcher
implementations subclass InputScheme, not Input. This simplifies the
API.
Also, fix substitution of flake inputs. This was broken since lazy
flake fetching started using fetchTree internally.
2020-05-30 01:44:11 +03:00
|
|
|
|
2020-06-11 15:40:21 +03:00
|
|
|
bool firstVisit = visited.insert(*lockedNode).second;
|
|
|
|
|
|
|
|
if (firstVisit) recurse(**lockedNode, prefix + (last ? treeNull : treeLine));
|
|
|
|
} else if (auto follows = std::get_if<1>(&input.second)) {
|
2020-09-25 18:30:04 +03:00
|
|
|
logger->cout("%s" ANSI_BOLD "%s" ANSI_NORMAL " follows input '%s'",
|
2020-06-11 15:40:21 +03:00
|
|
|
prefix + (last ? treeLast : treeConn), input.first,
|
|
|
|
printInputPath(*follows));
|
|
|
|
}
|
2020-01-31 13:54:52 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-03-16 18:19:04 +02:00
|
|
|
visited.insert(lockedFlake.lockFile.root);
|
|
|
|
recurse(*lockedFlake.lockFile.root, "");
|
2020-01-31 13:54:52 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-03-19 18:21:37 +02:00
|
|
|
struct CmdFlakeInfo : CmdFlakeMetadata
|
|
|
|
{
|
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
|
|
|
warn("'nix flake info' is a deprecated alias for 'nix flake metadata'");
|
|
|
|
CmdFlakeMetadata::run(store);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-01-30 01:58:55 +02:00
|
|
|
struct CmdFlakeCheck : FlakeCommand
|
2019-05-29 18:25:41 +03:00
|
|
|
{
|
|
|
|
bool build = true;
|
|
|
|
|
|
|
|
CmdFlakeCheck()
|
|
|
|
{
|
2020-05-05 19:59:33 +03:00
|
|
|
addFlag({
|
|
|
|
.longName = "no-build",
|
2021-01-13 15:18:04 +02:00
|
|
|
.description = "Do not build checks.",
|
2020-05-05 19:59:33 +03:00
|
|
|
.handler = {&build, false}
|
|
|
|
});
|
2019-05-29 18:25:41 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "check whether the flake evaluates and run its tests";
|
|
|
|
}
|
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-check.md"
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
2019-05-29 18:25:41 +03:00
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
2019-05-29 22:00:44 +03:00
|
|
|
settings.readOnlyMode = !build;
|
|
|
|
|
2019-05-29 18:25:41 +03:00
|
|
|
auto state = getEvalState();
|
2020-01-22 21:59:59 +02:00
|
|
|
auto flake = lockFlake();
|
2019-05-29 18:25:41 +03:00
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
// FIXME: rewrite to use EvalCache.
|
|
|
|
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
auto checkSystemName = [&](const std::string & system, const Pos & pos) {
|
|
|
|
// FIXME: what's the format of "system"?
|
|
|
|
if (system.find('-') == std::string::npos)
|
|
|
|
throw Error("'%s' is not a valid system type, at %s", system, pos);
|
|
|
|
};
|
|
|
|
|
2019-09-10 16:25:10 +03:00
|
|
|
auto checkDerivation = [&](const std::string & attrPath, Value & v, const Pos & pos) {
|
2019-05-29 21:57:08 +03:00
|
|
|
try {
|
|
|
|
auto drvInfo = getDerivation(*state, v, false);
|
|
|
|
if (!drvInfo)
|
|
|
|
throw Error("flake attribute '%s' is not a derivation", attrPath);
|
|
|
|
// FIXME: check meta attributes
|
2019-12-11 15:53:30 +02:00
|
|
|
return store->parseStorePath(drvInfo->queryDrvPath());
|
2019-05-29 21:57:08 +03:00
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(pos, hintfmt("while checking the derivation '%s'", attrPath));
|
2019-05-29 21:57:08 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-03-02 05:50:41 +02:00
|
|
|
std::vector<BuildableReq> drvPaths;
|
2019-05-29 18:25:41 +03:00
|
|
|
|
2019-09-10 16:25:10 +03:00
|
|
|
auto checkApp = [&](const std::string & attrPath, Value & v, const Pos & pos) {
|
2019-06-17 18:59:57 +03:00
|
|
|
try {
|
2020-06-29 20:08:50 +03:00
|
|
|
#if 0
|
|
|
|
// FIXME
|
2019-06-17 18:59:57 +03:00
|
|
|
auto app = App(*state, v);
|
|
|
|
for (auto & i : app.context) {
|
2019-12-11 15:53:30 +02:00
|
|
|
auto [drvPathS, outputName] = decodeContext(i);
|
2020-06-22 12:31:07 +03:00
|
|
|
store->parseStorePath(drvPathS);
|
2019-06-17 18:59:57 +03:00
|
|
|
}
|
2020-06-29 20:08:50 +03:00
|
|
|
#endif
|
2019-06-17 18:59:57 +03:00
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(pos, hintfmt("while checking the app definition '%s'", attrPath));
|
2019-06-17 18:59:57 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-09-10 16:25:10 +03:00
|
|
|
auto checkOverlay = [&](const std::string & attrPath, Value & v, const Pos & pos) {
|
2019-09-10 15:52:22 +03:00
|
|
|
try {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceValue(v, pos);
|
2020-12-12 03:15:11 +02:00
|
|
|
if (!v.isLambda() || v.lambda.fun->matchAttrs || std::string(v.lambda.fun->arg) != "final")
|
2019-09-10 15:52:22 +03:00
|
|
|
throw Error("overlay does not take an argument named 'final'");
|
|
|
|
auto body = dynamic_cast<ExprLambda *>(v.lambda.fun->body);
|
|
|
|
if (!body || body->matchAttrs || std::string(body->arg) != "prev")
|
|
|
|
throw Error("overlay does not take an argument named 'prev'");
|
|
|
|
// FIXME: if we have a 'nixpkgs' input, use it to
|
|
|
|
// evaluate the overlay.
|
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(pos, hintfmt("while checking the overlay '%s'", attrPath));
|
2019-09-10 16:25:10 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
auto checkModule = [&](const std::string & attrPath, Value & v, const Pos & pos) {
|
|
|
|
try {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceValue(v, pos);
|
2020-12-12 03:15:11 +02:00
|
|
|
if (v.isLambda()) {
|
2019-09-10 16:25:10 +03:00
|
|
|
if (!v.lambda.fun->matchAttrs || !v.lambda.fun->formals->ellipsis)
|
|
|
|
throw Error("module must match an open attribute set ('{ config, ... }')");
|
2020-12-17 15:45:45 +02:00
|
|
|
} else if (v.type() == nAttrs) {
|
2019-09-10 16:25:10 +03:00
|
|
|
for (auto & attr : *v.attrs)
|
|
|
|
try {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceValue(*attr.value, *attr.pos);
|
2019-09-10 16:25:10 +03:00
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(*attr.pos, hintfmt("while evaluating the option '%s'", attr.name));
|
2019-09-10 16:25:10 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
throw Error("module must be a function or an attribute set");
|
|
|
|
// FIXME: if we have a 'nixpkgs' input, use it to
|
|
|
|
// check the module.
|
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(pos, hintfmt("while checking the NixOS module '%s'", attrPath));
|
2019-09-10 15:52:22 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-09-10 18:39:55 +03:00
|
|
|
std::function<void(const std::string & attrPath, Value & v, const Pos & pos)> checkHydraJobs;
|
|
|
|
|
|
|
|
checkHydraJobs = [&](const std::string & attrPath, Value & v, const Pos & pos) {
|
|
|
|
try {
|
|
|
|
state->forceAttrs(v, pos);
|
|
|
|
|
|
|
|
if (state->isDerivation(v))
|
|
|
|
throw Error("jobset should not be a derivation at top-level");
|
|
|
|
|
|
|
|
for (auto & attr : *v.attrs) {
|
|
|
|
state->forceAttrs(*attr.value, *attr.pos);
|
|
|
|
if (!state->isDerivation(*attr.value))
|
|
|
|
checkHydraJobs(attrPath + "." + (std::string) attr.name,
|
|
|
|
*attr.value, *attr.pos);
|
|
|
|
}
|
|
|
|
|
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(pos, hintfmt("while checking the Hydra jobset '%s'", attrPath));
|
2019-09-10 18:39:55 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-09-19 21:15:42 +03:00
|
|
|
auto checkNixOSConfiguration = [&](const std::string & attrPath, Value & v, const Pos & pos) {
|
|
|
|
try {
|
|
|
|
Activity act(*logger, lvlChatty, actUnknown,
|
|
|
|
fmt("checking NixOS configuration '%s'", attrPath));
|
|
|
|
Bindings & bindings(*state->allocBindings(0));
|
2020-02-07 15:08:24 +02:00
|
|
|
auto vToplevel = findAlongAttrPath(*state, "config.system.build.toplevel", bindings, v).first;
|
2019-09-19 21:15:42 +03:00
|
|
|
state->forceAttrs(*vToplevel, pos);
|
|
|
|
if (!state->isDerivation(*vToplevel))
|
|
|
|
throw Error("attribute 'config.system.build.toplevel' is not a derivation");
|
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(pos, hintfmt("while checking the NixOS configuration '%s'", attrPath));
|
2019-09-19 21:15:42 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
auto checkTemplate = [&](const std::string & attrPath, Value & v, const Pos & pos) {
|
|
|
|
try {
|
|
|
|
Activity act(*logger, lvlChatty, actUnknown,
|
|
|
|
fmt("checking template '%s'", attrPath));
|
|
|
|
|
|
|
|
state->forceAttrs(v, pos);
|
|
|
|
|
|
|
|
if (auto attr = v.attrs->get(state->symbols.create("path"))) {
|
|
|
|
if (attr->name == state->symbols.create("path")) {
|
|
|
|
PathSet context;
|
|
|
|
auto path = state->coerceToPath(*attr->pos, *attr->value, context);
|
|
|
|
if (!store->isInStore(path))
|
|
|
|
throw Error("template '%s' has a bad 'path' attribute");
|
|
|
|
// TODO: recursively check the flake in 'path'.
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
throw Error("template '%s' lacks attribute 'path'", attrPath);
|
|
|
|
|
|
|
|
if (auto attr = v.attrs->get(state->symbols.create("description")))
|
|
|
|
state->forceStringNoCtx(*attr->value, *attr->pos);
|
|
|
|
else
|
|
|
|
throw Error("template '%s' lacks attribute 'description'", attrPath);
|
|
|
|
|
|
|
|
for (auto & attr : *v.attrs) {
|
|
|
|
std::string name(attr.name);
|
|
|
|
if (name != "path" && name != "description")
|
|
|
|
throw Error("template '%s' has unsupported attribute '%s'", attrPath, name);
|
|
|
|
}
|
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(pos, hintfmt("while checking the template '%s'", attrPath));
|
2020-06-04 21:02:50 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-07-30 23:03:57 +03:00
|
|
|
auto checkBundler = [&](const std::string & attrPath, Value & v, const Pos & pos) {
|
2020-07-30 19:33:22 +03:00
|
|
|
try {
|
|
|
|
state->forceValue(v, pos);
|
2020-12-12 03:15:11 +02:00
|
|
|
if (!v.isLambda())
|
2020-07-30 23:03:57 +03:00
|
|
|
throw Error("bundler must be a function");
|
2020-07-30 19:33:22 +03:00
|
|
|
if (!v.lambda.fun->formals ||
|
2020-07-30 23:37:05 +03:00
|
|
|
v.lambda.fun->formals->argNames.find(state->symbols.create("program")) == v.lambda.fun->formals->argNames.end() ||
|
|
|
|
v.lambda.fun->formals->argNames.find(state->symbols.create("system")) == v.lambda.fun->formals->argNames.end())
|
|
|
|
throw Error("bundler must take formal arguments 'program' and 'system'");
|
2020-07-30 19:33:22 +03:00
|
|
|
} catch (Error & e) {
|
|
|
|
e.addTrace(pos, hintfmt("while checking the template '%s'", attrPath));
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-05-29 18:25:41 +03:00
|
|
|
{
|
|
|
|
Activity act(*logger, lvlInfo, actUnknown, "evaluating flake");
|
|
|
|
|
|
|
|
auto vFlake = state->allocValue();
|
|
|
|
flake::callFlake(*state, flake, *vFlake);
|
|
|
|
|
2019-05-30 00:09:23 +03:00
|
|
|
enumerateOutputs(*state,
|
2019-05-29 18:25:41 +03:00
|
|
|
*vFlake,
|
2019-09-10 16:25:10 +03:00
|
|
|
[&](const std::string & name, Value & vOutput, const Pos & pos) {
|
2019-05-29 18:25:41 +03:00
|
|
|
Activity act(*logger, lvlChatty, actUnknown,
|
|
|
|
fmt("checking flake output '%s'", name));
|
|
|
|
|
|
|
|
try {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceValue(vOutput, pos);
|
2019-05-29 18:25:41 +03:00
|
|
|
|
|
|
|
if (name == "checks") {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceAttrs(vOutput, pos);
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
for (auto & attr : *vOutput.attrs) {
|
|
|
|
checkSystemName(attr.name, *attr.pos);
|
|
|
|
state->forceAttrs(*attr.value, *attr.pos);
|
|
|
|
for (auto & attr2 : *attr.value->attrs) {
|
|
|
|
auto drvPath = checkDerivation(
|
|
|
|
fmt("%s.%s.%s", name, attr.name, attr2.name),
|
|
|
|
*attr2.value, *attr2.pos);
|
|
|
|
if ((std::string) attr.name == settings.thisSystem.get())
|
2021-03-02 05:50:41 +02:00
|
|
|
drvPaths.push_back(BuildableReqFromDrv{drvPath});
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
}
|
|
|
|
}
|
2019-05-29 21:57:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
else if (name == "packages") {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceAttrs(vOutput, pos);
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
for (auto & attr : *vOutput.attrs) {
|
|
|
|
checkSystemName(attr.name, *attr.pos);
|
|
|
|
state->forceAttrs(*attr.value, *attr.pos);
|
|
|
|
for (auto & attr2 : *attr.value->attrs)
|
|
|
|
checkDerivation(
|
|
|
|
fmt("%s.%s.%s", name, attr.name, attr2.name),
|
|
|
|
*attr2.value, *attr2.pos);
|
|
|
|
}
|
2019-05-29 18:25:41 +03:00
|
|
|
}
|
|
|
|
|
2019-06-17 18:59:57 +03:00
|
|
|
else if (name == "apps") {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceAttrs(vOutput, pos);
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
for (auto & attr : *vOutput.attrs) {
|
|
|
|
checkSystemName(attr.name, *attr.pos);
|
|
|
|
state->forceAttrs(*attr.value, *attr.pos);
|
|
|
|
for (auto & attr2 : *attr.value->attrs)
|
|
|
|
checkApp(
|
|
|
|
fmt("%s.%s.%s", name, attr.name, attr2.name),
|
|
|
|
*attr2.value, *attr2.pos);
|
|
|
|
}
|
2019-06-17 18:59:57 +03:00
|
|
|
}
|
|
|
|
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
else if (name == "defaultPackage" || name == "devShell") {
|
|
|
|
state->forceAttrs(vOutput, pos);
|
|
|
|
for (auto & attr : *vOutput.attrs) {
|
|
|
|
checkSystemName(attr.name, *attr.pos);
|
|
|
|
checkDerivation(
|
|
|
|
fmt("%s.%s", name, attr.name),
|
|
|
|
*attr.value, *attr.pos);
|
|
|
|
}
|
|
|
|
}
|
2019-05-29 21:57:08 +03:00
|
|
|
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
else if (name == "defaultApp") {
|
|
|
|
state->forceAttrs(vOutput, pos);
|
|
|
|
for (auto & attr : *vOutput.attrs) {
|
|
|
|
checkSystemName(attr.name, *attr.pos);
|
|
|
|
checkApp(
|
|
|
|
fmt("%s.%s", name, attr.name),
|
|
|
|
*attr.value, *attr.pos);
|
|
|
|
}
|
|
|
|
}
|
2019-06-17 18:59:57 +03:00
|
|
|
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
else if (name == "legacyPackages") {
|
|
|
|
state->forceAttrs(vOutput, pos);
|
|
|
|
for (auto & attr : *vOutput.attrs) {
|
|
|
|
checkSystemName(attr.name, *attr.pos);
|
|
|
|
// FIXME: do getDerivations?
|
|
|
|
}
|
|
|
|
}
|
2019-06-18 10:45:14 +03:00
|
|
|
|
2019-09-10 15:52:22 +03:00
|
|
|
else if (name == "overlay")
|
2019-09-10 16:25:10 +03:00
|
|
|
checkOverlay(name, vOutput, pos);
|
|
|
|
|
|
|
|
else if (name == "overlays") {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceAttrs(vOutput, pos);
|
2019-09-10 16:25:10 +03:00
|
|
|
for (auto & attr : *vOutput.attrs)
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
checkOverlay(fmt("%s.%s", name, attr.name),
|
2019-09-10 16:25:10 +03:00
|
|
|
*attr.value, *attr.pos);
|
|
|
|
}
|
|
|
|
|
|
|
|
else if (name == "nixosModule")
|
|
|
|
checkModule(name, vOutput, pos);
|
|
|
|
|
|
|
|
else if (name == "nixosModules") {
|
2019-09-10 18:39:55 +03:00
|
|
|
state->forceAttrs(vOutput, pos);
|
2019-09-10 16:25:10 +03:00
|
|
|
for (auto & attr : *vOutput.attrs)
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
checkModule(fmt("%s.%s", name, attr.name),
|
2019-09-10 16:25:10 +03:00
|
|
|
*attr.value, *attr.pos);
|
|
|
|
}
|
2019-09-10 15:52:22 +03:00
|
|
|
|
2019-09-19 21:15:42 +03:00
|
|
|
else if (name == "nixosConfigurations") {
|
|
|
|
state->forceAttrs(vOutput, pos);
|
|
|
|
for (auto & attr : *vOutput.attrs)
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 18:52:10 +03:00
|
|
|
checkNixOSConfiguration(fmt("%s.%s", name, attr.name),
|
2019-09-19 21:15:42 +03:00
|
|
|
*attr.value, *attr.pos);
|
|
|
|
}
|
|
|
|
|
2019-09-10 18:39:55 +03:00
|
|
|
else if (name == "hydraJobs")
|
|
|
|
checkHydraJobs(name, vOutput, pos);
|
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
else if (name == "defaultTemplate")
|
|
|
|
checkTemplate(name, vOutput, pos);
|
|
|
|
|
|
|
|
else if (name == "templates") {
|
|
|
|
state->forceAttrs(vOutput, pos);
|
|
|
|
for (auto & attr : *vOutput.attrs)
|
|
|
|
checkTemplate(fmt("%s.%s", name, attr.name),
|
|
|
|
*attr.value, *attr.pos);
|
|
|
|
}
|
|
|
|
|
2020-07-30 23:03:57 +03:00
|
|
|
else if (name == "defaultBundler")
|
2020-07-30 23:37:05 +03:00
|
|
|
checkBundler(name, vOutput, pos);
|
2020-07-30 19:33:22 +03:00
|
|
|
|
2020-07-30 23:03:57 +03:00
|
|
|
else if (name == "bundlers") {
|
2020-07-30 19:33:22 +03:00
|
|
|
state->forceAttrs(vOutput, pos);
|
2020-07-30 23:37:05 +03:00
|
|
|
for (auto & attr : *vOutput.attrs)
|
|
|
|
checkBundler(fmt("%s.%s", name, attr.name),
|
|
|
|
*attr.value, *attr.pos);
|
2020-07-30 19:33:22 +03:00
|
|
|
}
|
|
|
|
|
2019-06-17 19:05:32 +03:00
|
|
|
else
|
|
|
|
warn("unknown flake output '%s'", name);
|
|
|
|
|
2019-05-29 18:25:41 +03:00
|
|
|
} catch (Error & e) {
|
2020-07-06 17:40:10 +03:00
|
|
|
e.addTrace(pos, hintfmt("while checking flake output '%s'", name));
|
2019-05-29 18:25:41 +03:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2019-06-17 18:59:57 +03:00
|
|
|
if (build && !drvPaths.empty()) {
|
2019-05-29 18:25:41 +03:00
|
|
|
Activity act(*logger, lvlInfo, actUnknown, "running flake checks");
|
|
|
|
store->buildPaths(drvPaths);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
struct CmdFlakeInitCommon : virtual Args, EvalCommand
|
2019-04-09 00:36:12 +03:00
|
|
|
{
|
2020-06-04 21:02:50 +03:00
|
|
|
std::string templateUrl = "templates";
|
|
|
|
Path destDir;
|
|
|
|
|
2020-06-05 15:09:12 +03:00
|
|
|
const Strings attrsPathPrefixes{"templates."};
|
|
|
|
const LockFlags lockFlags{ .writeLockFile = false };
|
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
CmdFlakeInitCommon()
|
2019-04-09 00:36:12 +03:00
|
|
|
{
|
2020-06-04 21:02:50 +03:00
|
|
|
addFlag({
|
|
|
|
.longName = "template",
|
|
|
|
.shortName = 't',
|
2021-01-13 15:18:04 +02:00
|
|
|
.description = "The template to use.",
|
2020-06-04 21:02:50 +03:00
|
|
|
.labels = {"template"},
|
|
|
|
.handler = {&templateUrl},
|
|
|
|
.completer = {[&](size_t, std::string_view prefix) {
|
2020-06-05 15:09:12 +03:00
|
|
|
completeFlakeRefWithFragment(
|
|
|
|
getEvalState(),
|
|
|
|
lockFlags,
|
|
|
|
attrsPathPrefixes,
|
|
|
|
{"defaultTemplate"},
|
|
|
|
prefix);
|
2020-06-04 21:02:50 +03:00
|
|
|
}}
|
|
|
|
});
|
2019-04-09 00:36:12 +03:00
|
|
|
}
|
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
|
|
|
auto flakeDir = absPath(destDir);
|
|
|
|
|
|
|
|
auto evalState = getEvalState();
|
|
|
|
|
|
|
|
auto [templateFlakeRef, templateName] = parseFlakeRefWithFragment(templateUrl, absPath("."));
|
|
|
|
|
2021-02-17 18:32:10 +02:00
|
|
|
auto installable = InstallableFlake(nullptr,
|
2020-06-04 21:02:50 +03:00
|
|
|
evalState, std::move(templateFlakeRef),
|
|
|
|
Strings{templateName == "" ? "defaultTemplate" : templateName},
|
2020-06-05 15:09:12 +03:00
|
|
|
Strings(attrsPathPrefixes), lockFlags);
|
2020-06-04 21:02:50 +03:00
|
|
|
|
2020-08-07 15:13:24 +03:00
|
|
|
auto [cursor, attrPath] = installable.getCursor(*evalState);
|
2020-06-04 21:02:50 +03:00
|
|
|
|
2020-06-29 20:08:50 +03:00
|
|
|
auto templateDir = cursor->getAttr("path")->getString();
|
2020-06-04 21:02:50 +03:00
|
|
|
|
|
|
|
assert(store->isInStore(templateDir));
|
|
|
|
|
|
|
|
std::vector<Path> files;
|
|
|
|
|
|
|
|
std::function<void(const Path & from, const Path & to)> copyDir;
|
|
|
|
copyDir = [&](const Path & from, const Path & to)
|
|
|
|
{
|
|
|
|
createDirs(to);
|
|
|
|
|
|
|
|
for (auto & entry : readDirectory(from)) {
|
|
|
|
auto from2 = from + "/" + entry.name;
|
|
|
|
auto to2 = to + "/" + entry.name;
|
|
|
|
auto st = lstat(from2);
|
|
|
|
if (S_ISDIR(st.st_mode))
|
|
|
|
copyDir(from2, to2);
|
|
|
|
else if (S_ISREG(st.st_mode)) {
|
|
|
|
auto contents = readFile(from2);
|
|
|
|
if (pathExists(to2)) {
|
|
|
|
auto contents2 = readFile(to2);
|
|
|
|
if (contents != contents2)
|
|
|
|
throw Error("refusing to overwrite existing file '%s'", to2);
|
|
|
|
} else
|
|
|
|
writeFile(to2, contents);
|
|
|
|
}
|
|
|
|
else if (S_ISLNK(st.st_mode)) {
|
|
|
|
auto target = readLink(from2);
|
|
|
|
if (pathExists(to2)) {
|
|
|
|
if (readLink(to2) != target)
|
|
|
|
throw Error("refusing to overwrite existing symlink '%s'", to2);
|
|
|
|
} else
|
|
|
|
createSymlink(target, to2);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
throw Error("file '%s' has unsupported type", from2);
|
|
|
|
files.push_back(to2);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
copyDir(templateDir, flakeDir);
|
|
|
|
|
|
|
|
if (pathExists(flakeDir + "/.git")) {
|
2020-06-23 17:25:32 +03:00
|
|
|
Strings args = { "-C", flakeDir, "add", "--intent-to-add", "--force", "--" };
|
2020-06-04 21:02:50 +03:00
|
|
|
for (auto & s : files) args.push_back(s);
|
|
|
|
runProgram("git", true, args);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
struct CmdFlakeInit : CmdFlakeInitCommon
|
|
|
|
{
|
|
|
|
std::string description() override
|
2019-04-09 00:36:12 +03:00
|
|
|
{
|
2020-06-04 21:02:50 +03:00
|
|
|
return "create a flake in the current directory from a template";
|
|
|
|
}
|
2019-04-09 00:36:12 +03:00
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-init.md"
|
|
|
|
;
|
2020-06-04 21:02:50 +03:00
|
|
|
}
|
2019-04-09 00:36:12 +03:00
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
CmdFlakeInit()
|
|
|
|
{
|
|
|
|
destDir = ".";
|
|
|
|
}
|
|
|
|
};
|
2019-04-09 00:36:12 +03:00
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
struct CmdFlakeNew : CmdFlakeInitCommon
|
|
|
|
{
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "create a flake in the specified directory from a template";
|
|
|
|
}
|
2020-04-27 23:53:11 +03:00
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-new.md"
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
CmdFlakeNew()
|
|
|
|
{
|
|
|
|
expectArgs({
|
|
|
|
.label = "dest-dir",
|
|
|
|
.handler = {&destDir},
|
|
|
|
.completer = completePath
|
|
|
|
});
|
2019-04-09 00:36:12 +03:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-05-16 23:48:16 +03:00
|
|
|
struct CmdFlakeClone : FlakeCommand
|
2019-03-21 10:30:16 +02:00
|
|
|
{
|
2019-05-22 14:46:07 +03:00
|
|
|
Path destDir;
|
2019-03-21 10:30:16 +02:00
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "clone flake repository";
|
|
|
|
}
|
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-clone.md"
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
2019-03-21 10:30:16 +02:00
|
|
|
CmdFlakeClone()
|
|
|
|
{
|
2020-05-05 19:59:33 +03:00
|
|
|
addFlag({
|
|
|
|
.longName = "dest",
|
|
|
|
.shortName = 'f',
|
2021-01-13 15:18:04 +02:00
|
|
|
.description = "Clone the flake to path *dest*.",
|
2020-05-05 19:59:33 +03:00
|
|
|
.labels = {"path"},
|
|
|
|
.handler = {&destDir}
|
|
|
|
});
|
2019-03-21 10:30:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
2020-01-21 17:27:53 +02:00
|
|
|
if (destDir.empty())
|
|
|
|
throw Error("missing flag '--dest'");
|
2019-03-21 10:30:16 +02:00
|
|
|
|
Remove TreeInfo
The attributes previously stored in TreeInfo (narHash, revCount,
lastModified) are now stored in Input. This makes it less arbitrary
what attributes are stored where.
As a result, the lock file format has changed. An entry like
"info": {
"lastModified": 1585405475,
"narHash": "sha256-bESW0n4KgPmZ0luxvwJ+UyATrC6iIltVCsGdLiphVeE="
},
"locked": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b88ff468e9850410070d4e0ccd68c7011f15b2be",
"type": "github"
},
is now stored as
"locked": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b88ff468e9850410070d4e0ccd68c7011f15b2be",
"type": "github",
"lastModified": 1585405475,
"narHash": "sha256-bESW0n4KgPmZ0luxvwJ+UyATrC6iIltVCsGdLiphVeE="
},
The 'Input' class is now a dumb set of attributes. All the fetcher
implementations subclass InputScheme, not Input. This simplifies the
API.
Also, fix substitution of flake inputs. This was broken since lazy
flake fetching started using fetchTree internally.
2020-05-30 01:44:11 +03:00
|
|
|
getFlakeRef().resolve(store).input.clone(destDir);
|
2019-03-21 10:30:16 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-01-30 01:58:55 +02:00
|
|
|
struct CmdFlakeArchive : FlakeCommand, MixJSON, MixDryRun
|
|
|
|
{
|
|
|
|
std::string dstUri;
|
|
|
|
|
|
|
|
CmdFlakeArchive()
|
|
|
|
{
|
2020-05-05 19:59:33 +03:00
|
|
|
addFlag({
|
|
|
|
.longName = "to",
|
|
|
|
.description = "URI of the destination Nix store",
|
|
|
|
.labels = {"store-uri"},
|
|
|
|
.handler = {&dstUri}
|
|
|
|
});
|
2020-01-30 01:58:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "copy a flake and all its inputs to a store";
|
|
|
|
}
|
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-archive.md"
|
|
|
|
;
|
2020-01-30 01:58:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
|
|
|
auto flake = lockFlake();
|
|
|
|
|
2020-01-30 02:10:26 +02:00
|
|
|
auto jsonRoot = json ? std::optional<JSONObject>(std::cout) : std::nullopt;
|
2020-01-30 01:58:55 +02:00
|
|
|
|
|
|
|
StorePathSet sources;
|
|
|
|
|
2020-06-17 11:26:52 +03:00
|
|
|
sources.insert(flake.flake.sourceInfo->storePath);
|
2020-01-30 01:58:55 +02:00
|
|
|
if (jsonRoot)
|
|
|
|
jsonRoot->attr("path", store->printStorePath(flake.flake.sourceInfo->storePath));
|
|
|
|
|
2020-03-12 23:06:57 +02:00
|
|
|
// FIXME: use graph output, handle cycles.
|
|
|
|
std::function<void(const Node & node, std::optional<JSONObject> & jsonObj)> traverse;
|
|
|
|
traverse = [&](const Node & node, std::optional<JSONObject> & jsonObj)
|
2020-01-30 01:58:55 +02:00
|
|
|
{
|
|
|
|
auto jsonObj2 = jsonObj ? jsonObj->object("inputs") : std::optional<JSONObject>();
|
2020-06-11 15:40:21 +03:00
|
|
|
for (auto & [inputName, input] : node.inputs) {
|
|
|
|
if (auto inputNode = std::get_if<0>(&input)) {
|
|
|
|
auto jsonObj3 = jsonObj2 ? jsonObj2->object(inputName) : std::optional<JSONObject>();
|
|
|
|
auto storePath =
|
|
|
|
dryRun
|
|
|
|
? (*inputNode)->lockedRef.input.computeStorePath(*store)
|
|
|
|
: (*inputNode)->lockedRef.input.fetch(store).first.storePath;
|
|
|
|
if (jsonObj3)
|
|
|
|
jsonObj3->attr("path", store->printStorePath(storePath));
|
|
|
|
sources.insert(std::move(storePath));
|
|
|
|
traverse(**inputNode, jsonObj3);
|
|
|
|
}
|
2020-01-30 01:58:55 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-03-12 23:06:57 +02:00
|
|
|
traverse(*flake.lockFile.root, jsonRoot);
|
2020-01-30 01:58:55 +02:00
|
|
|
|
|
|
|
if (!dryRun && !dstUri.empty()) {
|
|
|
|
ref<Store> dstStore = dstUri.empty() ? openStore() : openStore(dstUri);
|
|
|
|
copyPaths(store, dstStore, sources);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-04-16 16:36:15 +03:00
|
|
|
struct CmdFlakeShow : FlakeCommand
|
|
|
|
{
|
|
|
|
bool showLegacy = false;
|
|
|
|
|
|
|
|
CmdFlakeShow()
|
|
|
|
{
|
2020-05-05 19:59:33 +03:00
|
|
|
addFlag({
|
|
|
|
.longName = "legacy",
|
2021-01-13 15:18:04 +02:00
|
|
|
.description = "Show the contents of the `legacyPackages` output.",
|
2020-05-05 19:59:33 +03:00
|
|
|
.handler = {&showLegacy, true}
|
|
|
|
});
|
2020-04-16 16:36:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "show the outputs provided by a flake";
|
|
|
|
}
|
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-show.md"
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
2020-04-16 16:36:15 +03:00
|
|
|
void run(nix::ref<nix::Store> store) override
|
|
|
|
{
|
|
|
|
auto state = getEvalState();
|
2020-04-20 16:27:09 +03:00
|
|
|
auto flake = std::make_shared<LockedFlake>(lockFlake());
|
2020-04-16 16:36:15 +03:00
|
|
|
|
2020-04-20 14:13:52 +03:00
|
|
|
std::function<void(eval_cache::AttrCursor & visitor, const std::vector<Symbol> & attrPath, const std::string & headerPrefix, const std::string & nextPrefix)> visit;
|
2020-04-16 16:36:15 +03:00
|
|
|
|
2020-04-20 14:13:52 +03:00
|
|
|
visit = [&](eval_cache::AttrCursor & visitor, const std::vector<Symbol> & attrPath, const std::string & headerPrefix, const std::string & nextPrefix)
|
2020-04-16 16:36:15 +03:00
|
|
|
{
|
|
|
|
Activity act(*logger, lvlInfo, actUnknown,
|
|
|
|
fmt("evaluating '%s'", concatStringsSep(".", attrPath)));
|
|
|
|
try {
|
|
|
|
auto recurse = [&]()
|
|
|
|
{
|
2020-09-25 18:30:04 +03:00
|
|
|
logger->cout("%s", headerPrefix);
|
2020-04-16 16:36:15 +03:00
|
|
|
auto attrs = visitor.getAttrs();
|
|
|
|
for (const auto & [i, attr] : enumerate(attrs)) {
|
|
|
|
bool last = i + 1 == attrs.size();
|
|
|
|
auto visitor2 = visitor.getAttr(attr);
|
|
|
|
auto attrPath2(attrPath);
|
|
|
|
attrPath2.push_back(attr);
|
|
|
|
visit(*visitor2, attrPath2,
|
|
|
|
fmt(ANSI_GREEN "%s%s" ANSI_NORMAL ANSI_BOLD "%s" ANSI_NORMAL, nextPrefix, last ? treeLast : treeConn, attr),
|
|
|
|
nextPrefix + (last ? treeNull : treeLine));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
auto showDerivation = [&]()
|
|
|
|
{
|
2020-04-17 02:02:29 +03:00
|
|
|
auto name = visitor.getAttr(state->sName)->getString();
|
2020-04-16 16:36:15 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
std::string description;
|
|
|
|
|
|
|
|
if (auto aMeta = visitor.maybeGetAttr("meta")) {
|
|
|
|
if (auto aDescription = aMeta->maybeGetAttr("description"))
|
|
|
|
description = aDescription->getString();
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
2020-09-25 18:30:04 +03:00
|
|
|
logger->cout("%s: %s '%s'",
|
2020-04-16 16:36:15 +03:00
|
|
|
headerPrefix,
|
|
|
|
attrPath.size() == 2 && attrPath[0] == "devShell" ? "development environment" :
|
|
|
|
attrPath.size() == 3 && attrPath[0] == "checks" ? "derivation" :
|
|
|
|
attrPath.size() >= 1 && attrPath[0] == "hydraJobs" ? "derivation" :
|
|
|
|
"package",
|
|
|
|
name);
|
|
|
|
};
|
|
|
|
|
|
|
|
if (attrPath.size() == 0
|
|
|
|
|| (attrPath.size() == 1 && (
|
|
|
|
attrPath[0] == "defaultPackage"
|
|
|
|
|| attrPath[0] == "devShell"
|
|
|
|
|| attrPath[0] == "nixosConfigurations"
|
2020-04-17 02:21:24 +03:00
|
|
|
|| attrPath[0] == "nixosModules"
|
2020-06-04 21:02:50 +03:00
|
|
|
|| attrPath[0] == "defaultApp"
|
2021-02-17 17:53:19 +02:00
|
|
|
|| attrPath[0] == "templates"
|
|
|
|
|| attrPath[0] == "overlays"))
|
2020-04-16 16:36:15 +03:00
|
|
|
|| ((attrPath.size() == 1 || attrPath.size() == 2)
|
|
|
|
&& (attrPath[0] == "checks"
|
2020-04-17 02:21:24 +03:00
|
|
|
|| attrPath[0] == "packages"
|
|
|
|
|| attrPath[0] == "apps"))
|
2020-04-16 16:36:15 +03:00
|
|
|
)
|
|
|
|
{
|
|
|
|
recurse();
|
|
|
|
}
|
|
|
|
|
|
|
|
else if (
|
|
|
|
(attrPath.size() == 2 && (attrPath[0] == "defaultPackage" || attrPath[0] == "devShell"))
|
|
|
|
|| (attrPath.size() == 3 && (attrPath[0] == "checks" || attrPath[0] == "packages"))
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (visitor.isDerivation())
|
|
|
|
showDerivation();
|
|
|
|
else
|
|
|
|
throw Error("expected a derivation");
|
|
|
|
}
|
|
|
|
|
|
|
|
else if (attrPath.size() > 0 && attrPath[0] == "hydraJobs") {
|
|
|
|
if (visitor.isDerivation())
|
|
|
|
showDerivation();
|
|
|
|
else
|
|
|
|
recurse();
|
|
|
|
}
|
|
|
|
|
|
|
|
else if (attrPath.size() > 0 && attrPath[0] == "legacyPackages") {
|
|
|
|
if (attrPath.size() == 1)
|
|
|
|
recurse();
|
|
|
|
else if (!showLegacy)
|
2020-09-25 18:30:04 +03:00
|
|
|
logger->cout("%s: " ANSI_YELLOW "omitted" ANSI_NORMAL " (use '--legacy' to show)", headerPrefix);
|
2020-04-16 16:36:15 +03:00
|
|
|
else {
|
|
|
|
if (visitor.isDerivation())
|
|
|
|
showDerivation();
|
|
|
|
else if (attrPath.size() <= 2)
|
|
|
|
// FIXME: handle recurseIntoAttrs
|
|
|
|
recurse();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-17 02:21:24 +03:00
|
|
|
else if (
|
|
|
|
(attrPath.size() == 2 && attrPath[0] == "defaultApp") ||
|
|
|
|
(attrPath.size() == 3 && attrPath[0] == "apps"))
|
|
|
|
{
|
|
|
|
auto aType = visitor.maybeGetAttr("type");
|
|
|
|
if (!aType || aType->getString() != "app")
|
|
|
|
throw EvalError("not an app definition");
|
2020-09-25 18:30:04 +03:00
|
|
|
logger->cout("%s: app", headerPrefix);
|
2020-04-17 02:21:24 +03:00
|
|
|
}
|
|
|
|
|
2020-06-04 21:02:50 +03:00
|
|
|
else if (
|
|
|
|
(attrPath.size() == 1 && attrPath[0] == "defaultTemplate") ||
|
|
|
|
(attrPath.size() == 2 && attrPath[0] == "templates"))
|
|
|
|
{
|
|
|
|
auto description = visitor.getAttr("description")->getString();
|
2020-09-25 18:30:04 +03:00
|
|
|
logger->cout("%s: template: " ANSI_BOLD "%s" ANSI_NORMAL, headerPrefix, description);
|
2020-06-04 21:02:50 +03:00
|
|
|
}
|
|
|
|
|
2020-04-16 16:36:15 +03:00
|
|
|
else {
|
2020-09-25 18:30:04 +03:00
|
|
|
logger->cout("%s: %s",
|
2020-04-16 16:36:15 +03:00
|
|
|
headerPrefix,
|
2021-02-17 17:53:19 +02:00
|
|
|
(attrPath.size() == 1 && attrPath[0] == "overlay")
|
|
|
|
|| (attrPath.size() == 2 && attrPath[0] == "overlays") ? "Nixpkgs overlay" :
|
2020-04-16 16:36:15 +03:00
|
|
|
attrPath.size() == 2 && attrPath[0] == "nixosConfigurations" ? "NixOS configuration" :
|
|
|
|
attrPath.size() == 2 && attrPath[0] == "nixosModules" ? "NixOS module" :
|
|
|
|
ANSI_YELLOW "unknown" ANSI_NORMAL);
|
|
|
|
}
|
|
|
|
} catch (EvalError & e) {
|
|
|
|
if (!(attrPath.size() > 0 && attrPath[0] == "legacyPackages"))
|
2020-04-20 00:07:06 +03:00
|
|
|
throw;
|
2020-04-16 16:36:15 +03:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-08-07 15:13:24 +03:00
|
|
|
auto cache = openEvalCache(*state, flake);
|
2020-04-16 16:36:15 +03:00
|
|
|
|
2020-04-20 16:27:09 +03:00
|
|
|
visit(*cache->getRoot(), {}, fmt(ANSI_BOLD "%s" ANSI_NORMAL, flake->flake.lockedRef), "");
|
2020-04-16 16:36:15 +03:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-01-11 13:36:39 +02:00
|
|
|
struct CmdFlakePrefetch : FlakeCommand, MixJSON
|
|
|
|
{
|
|
|
|
CmdFlakePrefetch()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "download the source tree denoted by a flake reference into the Nix store";
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake-prefetch.md"
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
|
|
|
void run(ref<Store> store) override
|
|
|
|
{
|
|
|
|
auto originalRef = getFlakeRef();
|
|
|
|
auto resolvedRef = originalRef.resolve(store);
|
|
|
|
auto [tree, lockedRef] = resolvedRef.fetchTree(store);
|
|
|
|
auto hash = store->queryPathInfo(tree.storePath)->narHash;
|
|
|
|
|
|
|
|
if (json) {
|
|
|
|
auto res = nlohmann::json::object();
|
|
|
|
res["storePath"] = store->printStorePath(tree.storePath);
|
|
|
|
res["hash"] = hash.to_string(SRI, true);
|
|
|
|
logger->cout(res.dump());
|
|
|
|
} else {
|
|
|
|
notice("Downloaded '%s' to '%s' (hash '%s').",
|
|
|
|
lockedRef.to_string(),
|
|
|
|
store->printStorePath(tree.storePath),
|
|
|
|
hash.to_string(SRI, true));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-08-17 18:44:52 +03:00
|
|
|
struct CmdFlake : NixMultiCommand
|
2018-11-29 20:18:36 +02:00
|
|
|
{
|
|
|
|
CmdFlake()
|
2019-06-18 17:01:35 +03:00
|
|
|
: MultiCommand({
|
|
|
|
{"update", []() { return make_ref<CmdFlakeUpdate>(); }},
|
2021-02-26 15:55:54 +02:00
|
|
|
{"lock", []() { return make_ref<CmdFlakeLock>(); }},
|
2021-03-16 18:19:04 +02:00
|
|
|
{"metadata", []() { return make_ref<CmdFlakeMetadata>(); }},
|
2021-03-19 18:21:37 +02:00
|
|
|
{"info", []() { return make_ref<CmdFlakeInfo>(); }},
|
2019-06-18 17:01:35 +03:00
|
|
|
{"check", []() { return make_ref<CmdFlakeCheck>(); }},
|
|
|
|
{"init", []() { return make_ref<CmdFlakeInit>(); }},
|
2020-06-04 21:02:50 +03:00
|
|
|
{"new", []() { return make_ref<CmdFlakeNew>(); }},
|
2019-06-18 17:01:35 +03:00
|
|
|
{"clone", []() { return make_ref<CmdFlakeClone>(); }},
|
2020-01-30 01:58:55 +02:00
|
|
|
{"archive", []() { return make_ref<CmdFlakeArchive>(); }},
|
2020-04-16 16:36:15 +03:00
|
|
|
{"show", []() { return make_ref<CmdFlakeShow>(); }},
|
2021-01-11 13:36:39 +02:00
|
|
|
{"prefetch", []() { return make_ref<CmdFlakePrefetch>(); }},
|
2019-06-18 17:01:35 +03:00
|
|
|
})
|
2018-11-29 20:18:36 +02:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string description() override
|
|
|
|
{
|
|
|
|
return "manage Nix flakes";
|
|
|
|
}
|
|
|
|
|
2020-12-23 14:19:53 +02:00
|
|
|
std::string doc() override
|
|
|
|
{
|
|
|
|
return
|
|
|
|
#include "flake.md"
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
2018-11-29 20:18:36 +02:00
|
|
|
void run() override
|
|
|
|
{
|
|
|
|
if (!command)
|
|
|
|
throw UsageError("'nix flake' requires a sub-command.");
|
2020-06-08 17:23:54 +03:00
|
|
|
settings.requireExperimentalFeature("flakes");
|
2020-05-05 19:59:33 +03:00
|
|
|
command->second->prepare();
|
|
|
|
command->second->run();
|
2018-11-29 20:18:36 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-10-06 14:36:55 +03:00
|
|
|
static auto rCmdFlake = registerCommand<CmdFlake>("flake");
|