mirror of
https://github.com/privatevoid-net/nix-super.git
synced 2024-11-29 00:56:15 +02:00
Move NIX_BIN_DIR
and all logic using it to the Nix executable itself
This is because with the split packages of the Meson build, we simply have no idea what directory the binaries will be installed in when we build the library. In the process of doing so, consolidate and make more sophisticated the logic to cope with a few corner cases (e.g. `NIX_BIN_DIR` exists, but no binaries are inside it). Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
This commit is contained in:
parent
18485d2d53
commit
58b03ef1cd
21 changed files with 227 additions and 82 deletions
22
doc/manual/rl-next/build-hook-default.md
Normal file
22
doc/manual/rl-next/build-hook-default.md
Normal file
|
@ -0,0 +1,22 @@
|
||||||
|
---
|
||||||
|
synopsis: |-
|
||||||
|
The `build-hook` setting's default is less useful when using `libnixstore` as a library
|
||||||
|
prs:
|
||||||
|
- 11178
|
||||||
|
---
|
||||||
|
|
||||||
|
*This is an obscure issue that only affects usage of the `libnixstore` library outside of the Nix executable.*
|
||||||
|
|
||||||
|
As part the ongoing [rewrite of the build system](https://github.com/NixOS/nix/issues/2503) to use [Meson](https://mesonbuild.com/), we are also switching to packaging individual Nix components separately (and building them in separate derivations).
|
||||||
|
This means that when building `libnixstore` we do not know where the Nix binaries will be installed --- `libnixstore` doesn't know about downstream consumers like the Nix binaries at all.
|
||||||
|
|
||||||
|
*This is also unrelated to the _`post`_-`build-hook`*, which is often used for pushing to a cache.*
|
||||||
|
|
||||||
|
This has a small adverse affect on remote building --- the `build-remote` executable that is specified from the [`build-hook`](@docroot@/command-ref/conf-file.md#conf-build-hook) setting will not be gotten from the (presumed) installation location, but instead looked up on the `PATH`.
|
||||||
|
This means that other applications linking `libnixstore` that wish to use remote building must arrange for the `nix` command to be on the PATH (or manually overriding `build-hook`) in order for that to work.
|
||||||
|
|
||||||
|
Long term we don't envision this being a downside, because we plan to [get rid of `build-remote` and the build hook setting entirely](https://github.com/NixOS/nix/issues/1221).
|
||||||
|
There is simply no need to add a second layer of remote-procedure-calling when we want to connect to a remote builder.
|
||||||
|
The build hook protocol did in principle support custom ways of remote building, but that can also be accomplished with a custom service for the ssh or daemon/ssh-ng protocols, or with a custom [store type](@docroot@/store/types/) i.e. `Store` subclass. <!-- we normally don't mention classes, but consider that this release note is about a library use case -->
|
||||||
|
|
||||||
|
The Perl bindings no longer expose `getBinDir` either, since they libraries those bindings wrap no longer know the location of installed binaries as described above.
|
|
@ -7,7 +7,6 @@
|
||||||
|
|
||||||
#include "ansicolor.hh"
|
#include "ansicolor.hh"
|
||||||
#include "shared.hh"
|
#include "shared.hh"
|
||||||
#include "config-global.hh"
|
|
||||||
#include "eval.hh"
|
#include "eval.hh"
|
||||||
#include "eval-settings.hh"
|
#include "eval-settings.hh"
|
||||||
#include "attr-path.hh"
|
#include "attr-path.hh"
|
||||||
|
@ -77,10 +76,14 @@ struct NixRepl
|
||||||
int displ;
|
int displ;
|
||||||
StringSet varNames;
|
StringSet varNames;
|
||||||
|
|
||||||
|
RunNix * runNixPtr;
|
||||||
|
|
||||||
|
void runNix(Path program, const Strings & args, const std::optional<std::string> & input = {});
|
||||||
|
|
||||||
std::unique_ptr<ReplInteracter> interacter;
|
std::unique_ptr<ReplInteracter> interacter;
|
||||||
|
|
||||||
NixRepl(const LookupPath & lookupPath, nix::ref<Store> store,ref<EvalState> state,
|
NixRepl(const LookupPath & lookupPath, nix::ref<Store> store,ref<EvalState> state,
|
||||||
std::function<AnnotatedValues()> getValues);
|
std::function<AnnotatedValues()> getValues, RunNix * runNix);
|
||||||
virtual ~NixRepl() = default;
|
virtual ~NixRepl() = default;
|
||||||
|
|
||||||
ReplExitStatus mainLoop() override;
|
ReplExitStatus mainLoop() override;
|
||||||
|
@ -125,32 +128,16 @@ std::string removeWhitespace(std::string s)
|
||||||
|
|
||||||
|
|
||||||
NixRepl::NixRepl(const LookupPath & lookupPath, nix::ref<Store> store, ref<EvalState> state,
|
NixRepl::NixRepl(const LookupPath & lookupPath, nix::ref<Store> store, ref<EvalState> state,
|
||||||
std::function<NixRepl::AnnotatedValues()> getValues)
|
std::function<NixRepl::AnnotatedValues()> getValues, RunNix * runNix = nullptr)
|
||||||
: AbstractNixRepl(state)
|
: AbstractNixRepl(state)
|
||||||
, debugTraceIndex(0)
|
, debugTraceIndex(0)
|
||||||
, getValues(getValues)
|
, getValues(getValues)
|
||||||
, staticEnv(new StaticEnv(nullptr, state->staticBaseEnv.get()))
|
, staticEnv(new StaticEnv(nullptr, state->staticBaseEnv.get()))
|
||||||
|
, runNixPtr{runNix}
|
||||||
, interacter(make_unique<ReadlineLikeInteracter>(getDataDir() + "/nix/repl-history"))
|
, interacter(make_unique<ReadlineLikeInteracter>(getDataDir() + "/nix/repl-history"))
|
||||||
{
|
{
|
||||||
}
|
}
|
||||||
|
|
||||||
void runNix(Path program, const Strings & args,
|
|
||||||
const std::optional<std::string> & input = {})
|
|
||||||
{
|
|
||||||
auto subprocessEnv = getEnv();
|
|
||||||
subprocessEnv["NIX_CONFIG"] = globalConfig.toKeyValue();
|
|
||||||
//isInteractive avoid grabling interactive commands
|
|
||||||
runProgram2(RunOptions {
|
|
||||||
.program = settings.nixBinDir+ "/" + program,
|
|
||||||
.args = args,
|
|
||||||
.environment = subprocessEnv,
|
|
||||||
.input = input,
|
|
||||||
.isInteractive = true,
|
|
||||||
});
|
|
||||||
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
static std::ostream & showDebugTrace(std::ostream & out, const PosTable & positions, const DebugTrace & dt)
|
static std::ostream & showDebugTrace(std::ostream & out, const PosTable & positions, const DebugTrace & dt)
|
||||||
{
|
{
|
||||||
if (dt.isError)
|
if (dt.isError)
|
||||||
|
@ -833,9 +820,18 @@ void NixRepl::evalString(std::string s, Value & v)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void NixRepl::runNix(Path program, const Strings & args, const std::optional<std::string> & input)
|
||||||
|
{
|
||||||
|
if (runNixPtr)
|
||||||
|
(*runNixPtr)(program, args, input);
|
||||||
|
else
|
||||||
|
throw Error("Cannot run '%s', no method of calling the Nix CLI provided", program);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
std::unique_ptr<AbstractNixRepl> AbstractNixRepl::create(
|
std::unique_ptr<AbstractNixRepl> AbstractNixRepl::create(
|
||||||
const LookupPath & lookupPath, nix::ref<Store> store, ref<EvalState> state,
|
const LookupPath & lookupPath, nix::ref<Store> store, ref<EvalState> state,
|
||||||
std::function<AnnotatedValues()> getValues)
|
std::function<AnnotatedValues()> getValues, RunNix * runNix)
|
||||||
{
|
{
|
||||||
return std::make_unique<NixRepl>(
|
return std::make_unique<NixRepl>(
|
||||||
lookupPath,
|
lookupPath,
|
||||||
|
|
|
@ -19,9 +19,19 @@ struct AbstractNixRepl
|
||||||
|
|
||||||
typedef std::vector<std::pair<Value*,std::string>> AnnotatedValues;
|
typedef std::vector<std::pair<Value*,std::string>> AnnotatedValues;
|
||||||
|
|
||||||
|
using RunNix = void(Path program, const Strings & args, const std::optional<std::string> & input);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param runNix Function to run the nix CLI to support various
|
||||||
|
* `:<something>` commands. Optional; if not provided,
|
||||||
|
* everything else will still work fine, but those commands won't.
|
||||||
|
*/
|
||||||
static std::unique_ptr<AbstractNixRepl> create(
|
static std::unique_ptr<AbstractNixRepl> create(
|
||||||
const LookupPath & lookupPath, nix::ref<Store> store, ref<EvalState> state,
|
const LookupPath & lookupPath,
|
||||||
std::function<AnnotatedValues()> getValues);
|
nix::ref<Store> store,
|
||||||
|
ref<EvalState> state,
|
||||||
|
std::function<AnnotatedValues()> getValues,
|
||||||
|
RunNix * runNix = nullptr);
|
||||||
|
|
||||||
static ReplExitStatus runSimple(
|
static ReplExitStatus runSimple(
|
||||||
ref<EvalState> evalState,
|
ref<EvalState> evalState,
|
||||||
|
|
|
@ -64,7 +64,6 @@ Settings::Settings()
|
||||||
, nixStateDir(canonPath(getEnvNonEmpty("NIX_STATE_DIR").value_or(NIX_STATE_DIR)))
|
, nixStateDir(canonPath(getEnvNonEmpty("NIX_STATE_DIR").value_or(NIX_STATE_DIR)))
|
||||||
, nixConfDir(canonPath(getEnvNonEmpty("NIX_CONF_DIR").value_or(NIX_CONF_DIR)))
|
, nixConfDir(canonPath(getEnvNonEmpty("NIX_CONF_DIR").value_or(NIX_CONF_DIR)))
|
||||||
, nixUserConfFiles(getUserConfigFiles())
|
, nixUserConfFiles(getUserConfigFiles())
|
||||||
, nixBinDir(canonPath(getEnvNonEmpty("NIX_BIN_DIR").value_or(NIX_BIN_DIR)))
|
|
||||||
, nixManDir(canonPath(NIX_MAN_DIR))
|
, nixManDir(canonPath(NIX_MAN_DIR))
|
||||||
, nixDaemonSocketFile(canonPath(getEnvNonEmpty("NIX_DAEMON_SOCKET_PATH").value_or(nixStateDir + DEFAULT_SOCKET_PATH)))
|
, nixDaemonSocketFile(canonPath(getEnvNonEmpty("NIX_DAEMON_SOCKET_PATH").value_or(nixStateDir + DEFAULT_SOCKET_PATH)))
|
||||||
{
|
{
|
||||||
|
@ -95,34 +94,6 @@ Settings::Settings()
|
||||||
sandboxPaths = tokenizeString<StringSet>("/System/Library/Frameworks /System/Library/PrivateFrameworks /bin/sh /bin/bash /private/tmp /private/var/tmp /usr/lib");
|
sandboxPaths = tokenizeString<StringSet>("/System/Library/Frameworks /System/Library/PrivateFrameworks /bin/sh /bin/bash /private/tmp /private/var/tmp /usr/lib");
|
||||||
allowedImpureHostPrefixes = tokenizeString<StringSet>("/System/Library /usr/lib /dev /bin/sh");
|
allowedImpureHostPrefixes = tokenizeString<StringSet>("/System/Library /usr/lib /dev /bin/sh");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* Set the build hook location
|
|
||||||
|
|
||||||
For builds we perform a self-invocation, so Nix has to be self-aware.
|
|
||||||
That is, it has to know where it is installed. We don't think it's sentient.
|
|
||||||
|
|
||||||
Normally, nix is installed according to `nixBinDir`, which is set at compile time,
|
|
||||||
but can be overridden. This makes for a great default that works even if this
|
|
||||||
code is linked as a library into some other program whose main is not aware
|
|
||||||
that it might need to be a build remote hook.
|
|
||||||
|
|
||||||
However, it may not have been installed at all. For example, if it's a static build,
|
|
||||||
there's a good chance that it has been moved out of its installation directory.
|
|
||||||
That makes `nixBinDir` useless. Instead, we'll query the OS for the path to the
|
|
||||||
current executable, using `getSelfExe()`.
|
|
||||||
|
|
||||||
As a last resort, we resort to `PATH`. Hopefully we find a `nix` there that's compatible.
|
|
||||||
If you're porting Nix to a new platform, that might be good enough for a while, but
|
|
||||||
you'll want to improve `getSelfExe()` to work on your platform.
|
|
||||||
*/
|
|
||||||
std::string nixExePath = nixBinDir + "/nix";
|
|
||||||
if (!pathExists(nixExePath)) {
|
|
||||||
nixExePath = getSelfExe().value_or("nix");
|
|
||||||
}
|
|
||||||
buildHook = {
|
|
||||||
nixExePath,
|
|
||||||
"__build-remote",
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void loadConfFile(AbstractConfig & config)
|
void loadConfFile(AbstractConfig & config)
|
||||||
|
|
|
@ -84,11 +84,6 @@ public:
|
||||||
*/
|
*/
|
||||||
std::vector<Path> nixUserConfFiles;
|
std::vector<Path> nixUserConfFiles;
|
||||||
|
|
||||||
/**
|
|
||||||
* The directory where the main programs are stored.
|
|
||||||
*/
|
|
||||||
Path nixBinDir;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The directory where the man pages are stored.
|
* The directory where the man pages are stored.
|
||||||
*/
|
*/
|
||||||
|
@ -246,7 +241,7 @@ public:
|
||||||
)",
|
)",
|
||||||
{"build-timeout"}};
|
{"build-timeout"}};
|
||||||
|
|
||||||
Setting<Strings> buildHook{this, {}, "build-hook",
|
Setting<Strings> buildHook{this, {"nix", "__build-remote"}, "build-hook",
|
||||||
R"(
|
R"(
|
||||||
The path to the helper program that executes remote builds.
|
The path to the helper program that executes remote builds.
|
||||||
|
|
||||||
|
|
|
@ -71,7 +71,6 @@ libstore_CXXFLAGS += \
|
||||||
-DNIX_STATE_DIR=\"$(NIX_ROOT)$(localstatedir)/nix\" \
|
-DNIX_STATE_DIR=\"$(NIX_ROOT)$(localstatedir)/nix\" \
|
||||||
-DNIX_LOG_DIR=\"$(NIX_ROOT)$(localstatedir)/log/nix\" \
|
-DNIX_LOG_DIR=\"$(NIX_ROOT)$(localstatedir)/log/nix\" \
|
||||||
-DNIX_CONF_DIR=\"$(NIX_ROOT)$(sysconfdir)/nix\" \
|
-DNIX_CONF_DIR=\"$(NIX_ROOT)$(sysconfdir)/nix\" \
|
||||||
-DNIX_BIN_DIR=\"$(NIX_ROOT)$(bindir)\" \
|
|
||||||
-DNIX_MAN_DIR=\"$(NIX_ROOT)$(mandir)\" \
|
-DNIX_MAN_DIR=\"$(NIX_ROOT)$(mandir)\" \
|
||||||
-DLSOF=\"$(NIX_ROOT)$(lsof)\"
|
-DLSOF=\"$(NIX_ROOT)$(lsof)\"
|
||||||
|
|
||||||
|
|
|
@ -328,7 +328,6 @@ prefix = get_option('prefix')
|
||||||
path_opts = [
|
path_opts = [
|
||||||
# Meson built-ins.
|
# Meson built-ins.
|
||||||
'datadir',
|
'datadir',
|
||||||
'bindir',
|
|
||||||
'mandir',
|
'mandir',
|
||||||
'libdir',
|
'libdir',
|
||||||
'includedir',
|
'includedir',
|
||||||
|
@ -373,7 +372,6 @@ cpp_str_defines = {
|
||||||
'NIX_STATE_DIR': state_dir / 'nix',
|
'NIX_STATE_DIR': state_dir / 'nix',
|
||||||
'NIX_LOG_DIR': log_dir,
|
'NIX_LOG_DIR': log_dir,
|
||||||
'NIX_CONF_DIR': sysconfdir / 'nix',
|
'NIX_CONF_DIR': sysconfdir / 'nix',
|
||||||
'NIX_BIN_DIR': bindir,
|
|
||||||
'NIX_MAN_DIR': mandir,
|
'NIX_MAN_DIR': mandir,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
#include "file-system.hh"
|
#include "file-system.hh"
|
||||||
#include "child.hh"
|
#include "child.hh"
|
||||||
#include "strings.hh"
|
#include "strings.hh"
|
||||||
|
#include "executable-path.hh"
|
||||||
|
|
||||||
namespace nix {
|
namespace nix {
|
||||||
|
|
||||||
|
@ -16,11 +17,18 @@ HookInstance::HookInstance()
|
||||||
if (buildHookArgs.empty())
|
if (buildHookArgs.empty())
|
||||||
throw Error("'build-hook' setting is empty");
|
throw Error("'build-hook' setting is empty");
|
||||||
|
|
||||||
auto buildHook = canonPath(buildHookArgs.front());
|
std::filesystem::path buildHook = buildHookArgs.front();
|
||||||
buildHookArgs.pop_front();
|
buildHookArgs.pop_front();
|
||||||
|
|
||||||
|
try {
|
||||||
|
buildHook = ExecutablePath::load().findPath(buildHook);
|
||||||
|
} catch (ExecutableLookupError & e) {
|
||||||
|
e.addTrace(nullptr, "while resolving the 'build-hook' setting'");
|
||||||
|
throw;
|
||||||
|
}
|
||||||
|
|
||||||
Strings args;
|
Strings args;
|
||||||
args.push_back(std::string(baseNameOf(buildHook)));
|
args.push_back(buildHook.filename().string());
|
||||||
|
|
||||||
for (auto & arg : buildHookArgs)
|
for (auto & arg : buildHookArgs)
|
||||||
args.push_back(arg);
|
args.push_back(arg);
|
||||||
|
@ -59,7 +67,7 @@ HookInstance::HookInstance()
|
||||||
if (dup2(builderOut.readSide.get(), 5) == -1)
|
if (dup2(builderOut.readSide.get(), 5) == -1)
|
||||||
throw SysError("dupping builder's stdout/stderr");
|
throw SysError("dupping builder's stdout/stderr");
|
||||||
|
|
||||||
execv(buildHook.c_str(), stringsToCharPtrs(args).data());
|
execv(buildHook.native().c_str(), stringsToCharPtrs(args).data());
|
||||||
|
|
||||||
throw SysError("executing '%s'", buildHook);
|
throw SysError("executing '%s'", buildHook);
|
||||||
});
|
});
|
||||||
|
|
|
@ -60,7 +60,7 @@ OsString ExecutablePath::render() const
|
||||||
}
|
}
|
||||||
|
|
||||||
std::optional<fs::path>
|
std::optional<fs::path>
|
||||||
ExecutablePath::find(const OsString & exe, std::function<bool(const fs::path &)> isExecutable) const
|
ExecutablePath::findName(const OsString & exe, std::function<bool(const fs::path &)> isExecutable) const
|
||||||
{
|
{
|
||||||
// "If the pathname being sought contains a <slash>, the search
|
// "If the pathname being sought contains a <slash>, the search
|
||||||
// through the path prefixes shall not be performed."
|
// through the path prefixes shall not be performed."
|
||||||
|
@ -76,4 +76,20 @@ ExecutablePath::find(const OsString & exe, std::function<bool(const fs::path &)>
|
||||||
return std::nullopt;
|
return std::nullopt;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fs::path ExecutablePath::findPath(const fs::path & exe, std::function<bool(const fs::path &)> isExecutable) const
|
||||||
|
{
|
||||||
|
// "If the pathname being sought contains a <slash>, the search
|
||||||
|
// through the path prefixes shall not be performed."
|
||||||
|
// https://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap08.html#tag_08_03
|
||||||
|
if (exe.filename() == exe) {
|
||||||
|
auto resOpt = findName(exe, isExecutable);
|
||||||
|
if (resOpt)
|
||||||
|
return *resOpt;
|
||||||
|
else
|
||||||
|
throw ExecutableLookupError("Could not find executable '%s'", exe.native());
|
||||||
|
} else {
|
||||||
|
return exe;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
} // namespace nix
|
} // namespace nix
|
||||||
|
|
|
@ -5,6 +5,8 @@
|
||||||
|
|
||||||
namespace nix {
|
namespace nix {
|
||||||
|
|
||||||
|
MakeError(ExecutableLookupError, Error);
|
||||||
|
|
||||||
struct ExecutablePath
|
struct ExecutablePath
|
||||||
{
|
{
|
||||||
std::vector<std::filesystem::path> directories;
|
std::vector<std::filesystem::path> directories;
|
||||||
|
@ -54,10 +56,21 @@ struct ExecutablePath
|
||||||
*
|
*
|
||||||
* @return path to a resolved executable
|
* @return path to a resolved executable
|
||||||
*/
|
*/
|
||||||
std::optional<std::filesystem::path> find(
|
std::optional<std::filesystem::path> findName(
|
||||||
const OsString & exe,
|
const OsString & exe,
|
||||||
std::function<bool(const std::filesystem::path &)> isExecutableFile = isExecutableFileAmbient) const;
|
std::function<bool(const std::filesystem::path &)> isExecutableFile = isExecutableFileAmbient) const;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Like the `findName` but also allows a file path as input.
|
||||||
|
*
|
||||||
|
* This implements the full POSIX spec: if the path is just a name,
|
||||||
|
* it searches like the above. Otherwise, it returns the path as is.
|
||||||
|
* If (in the name case) the search fails, an exception is thrown.
|
||||||
|
*/
|
||||||
|
std::filesystem::path findPath(
|
||||||
|
const std::filesystem::path & exe,
|
||||||
|
std::function<bool(const std::filesystem::path &)> isExecutable = isExecutableFileAmbient) const;
|
||||||
|
|
||||||
bool operator==(const ExecutablePath &) const = default;
|
bool operator==(const ExecutablePath &) const = default;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -7,6 +7,7 @@
|
||||||
#include "eval-settings.hh" // for defexpr
|
#include "eval-settings.hh" // for defexpr
|
||||||
#include "users.hh"
|
#include "users.hh"
|
||||||
#include "tarball.hh"
|
#include "tarball.hh"
|
||||||
|
#include "self-exe.hh"
|
||||||
|
|
||||||
#include <fcntl.h>
|
#include <fcntl.h>
|
||||||
#include <regex>
|
#include <regex>
|
||||||
|
@ -67,7 +68,7 @@ static void removeChannel(const std::string & name)
|
||||||
channels.erase(name);
|
channels.erase(name);
|
||||||
writeChannels();
|
writeChannels();
|
||||||
|
|
||||||
runProgram(settings.nixBinDir + "/nix-env", true, { "--profile", profile, "--uninstall", name });
|
runProgram(getNixBin("nix-env").string(), true, { "--profile", profile, "--uninstall", name });
|
||||||
}
|
}
|
||||||
|
|
||||||
static Path nixDefExpr;
|
static Path nixDefExpr;
|
||||||
|
@ -118,7 +119,7 @@ static void update(const StringSet & channelNames)
|
||||||
|
|
||||||
bool unpacked = false;
|
bool unpacked = false;
|
||||||
if (std::regex_search(filename, std::regex("\\.tar\\.(gz|bz2|xz)$"))) {
|
if (std::regex_search(filename, std::regex("\\.tar\\.(gz|bz2|xz)$"))) {
|
||||||
runProgram(settings.nixBinDir + "/nix-build", false, { "--no-out-link", "--expr", "import " + unpackChannelPath +
|
runProgram(getNixBin("nix-build").string(), false, { "--no-out-link", "--expr", "import " + unpackChannelPath +
|
||||||
"{ name = \"" + cname + "\"; channelName = \"" + name + "\"; src = builtins.storePath \"" + filename + "\"; }" });
|
"{ name = \"" + cname + "\"; channelName = \"" + name + "\"; src = builtins.storePath \"" + filename + "\"; }" });
|
||||||
unpacked = true;
|
unpacked = true;
|
||||||
}
|
}
|
||||||
|
@ -143,7 +144,7 @@ static void update(const StringSet & channelNames)
|
||||||
for (auto & expr : exprs)
|
for (auto & expr : exprs)
|
||||||
envArgs.push_back(std::move(expr));
|
envArgs.push_back(std::move(expr));
|
||||||
envArgs.push_back("--quiet");
|
envArgs.push_back("--quiet");
|
||||||
runProgram(settings.nixBinDir + "/nix-env", false, envArgs);
|
runProgram(getNixBin("nix-env").string(), false, envArgs);
|
||||||
|
|
||||||
// Make the channels appear in nix-env.
|
// Make the channels appear in nix-env.
|
||||||
struct stat st;
|
struct stat st;
|
||||||
|
@ -244,7 +245,7 @@ static int main_nix_channel(int argc, char ** argv)
|
||||||
case cListGenerations:
|
case cListGenerations:
|
||||||
if (!args.empty())
|
if (!args.empty())
|
||||||
throw UsageError("'--list-generations' expects no arguments");
|
throw UsageError("'--list-generations' expects no arguments");
|
||||||
std::cout << runProgram(settings.nixBinDir + "/nix-env", false, {"--profile", profile, "--list-generations"}) << std::flush;
|
std::cout << runProgram(getNixBin("nix-env").string(), false, {"--profile", profile, "--list-generations"}) << std::flush;
|
||||||
break;
|
break;
|
||||||
case cRollback:
|
case cRollback:
|
||||||
if (args.size() > 1)
|
if (args.size() > 1)
|
||||||
|
@ -256,7 +257,7 @@ static int main_nix_channel(int argc, char ** argv)
|
||||||
} else {
|
} else {
|
||||||
envArgs.push_back("--rollback");
|
envArgs.push_back("--rollback");
|
||||||
}
|
}
|
||||||
runProgram(settings.nixBinDir + "/nix-env", false, envArgs);
|
runProgram(getNixBin("nix-env").string(), false, envArgs);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -26,6 +26,8 @@ endif
|
||||||
|
|
||||||
nix_CXXFLAGS += $(INCLUDE_libutil) $(INCLUDE_libstore) $(INCLUDE_libfetchers) $(INCLUDE_libexpr) $(INCLUDE_libflake) $(INCLUDE_libmain) -I src/libcmd -I doc/manual $(INCLUDE_nix)
|
nix_CXXFLAGS += $(INCLUDE_libutil) $(INCLUDE_libstore) $(INCLUDE_libfetchers) $(INCLUDE_libexpr) $(INCLUDE_libflake) $(INCLUDE_libmain) -I src/libcmd -I doc/manual $(INCLUDE_nix)
|
||||||
|
|
||||||
|
nix_CXXFLAGS += -DNIX_BIN_DIR=\"$(NIX_ROOT)$(bindir)\"
|
||||||
|
|
||||||
nix_LIBS = libexpr libmain libfetchers libflake libstore libutil libcmd
|
nix_LIBS = libexpr libmain libfetchers libflake libstore libutil libcmd
|
||||||
|
|
||||||
nix_LDFLAGS = $(THREAD_LDFLAGS) $(SODIUM_LIBS) $(EDITLINE_LIBS) $(BOOST_LDFLAGS) $(LOWDOWN_LIBS)
|
nix_LDFLAGS = $(THREAD_LDFLAGS) $(SODIUM_LIBS) $(EDITLINE_LIBS) $(BOOST_LDFLAGS) $(LOWDOWN_LIBS)
|
||||||
|
|
|
@ -19,6 +19,7 @@
|
||||||
#include "network-proxy.hh"
|
#include "network-proxy.hh"
|
||||||
#include "eval-cache.hh"
|
#include "eval-cache.hh"
|
||||||
#include "flake/flake.hh"
|
#include "flake/flake.hh"
|
||||||
|
#include "self-exe.hh"
|
||||||
|
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <regex>
|
#include <regex>
|
||||||
|
@ -366,6 +367,17 @@ void mainWrapped(int argc, char * * argv)
|
||||||
initGC();
|
initGC();
|
||||||
flake::initLib(flakeSettings);
|
flake::initLib(flakeSettings);
|
||||||
|
|
||||||
|
/* Set the build hook location
|
||||||
|
|
||||||
|
For builds we perform a self-invocation, so Nix has to be
|
||||||
|
self-aware. That is, it has to know where it is installed. We
|
||||||
|
don't think it's sentient.
|
||||||
|
*/
|
||||||
|
settings.buildHook.setDefault(Strings {
|
||||||
|
getNixBin({}).string(),
|
||||||
|
"__build-remote",
|
||||||
|
});
|
||||||
|
|
||||||
#if __linux__
|
#if __linux__
|
||||||
if (isRootUser()) {
|
if (isRootUser()) {
|
||||||
try {
|
try {
|
||||||
|
|
|
@ -33,6 +33,21 @@ subdir('build-utils-meson/threads')
|
||||||
|
|
||||||
subdir('build-utils-meson/export-all-symbols')
|
subdir('build-utils-meson/export-all-symbols')
|
||||||
|
|
||||||
|
configdata = configuration_data()
|
||||||
|
|
||||||
|
fs = import('fs')
|
||||||
|
|
||||||
|
bindir = get_option('bindir')
|
||||||
|
if not fs.is_absolute(bindir)
|
||||||
|
bindir = get_option('prefix') / bindir
|
||||||
|
endif
|
||||||
|
configdata.set_quoted('NIX_BIN_DIR', bindir)
|
||||||
|
|
||||||
|
config_h = configure_file(
|
||||||
|
configuration : configdata,
|
||||||
|
output : 'config-nix-cli.hh',
|
||||||
|
)
|
||||||
|
|
||||||
add_project_arguments(
|
add_project_arguments(
|
||||||
# TODO(Qyriad): Yes this is how the autoconf+Make system did it.
|
# TODO(Qyriad): Yes this is how the autoconf+Make system did it.
|
||||||
# It would be nice for our headers to be idempotent instead.
|
# It would be nice for our headers to be idempotent instead.
|
||||||
|
@ -42,15 +57,17 @@ add_project_arguments(
|
||||||
#'-include', 'config-fetchers.hh',
|
#'-include', 'config-fetchers.hh',
|
||||||
'-include', 'config-main.hh',
|
'-include', 'config-main.hh',
|
||||||
'-include', 'config-cmd.hh',
|
'-include', 'config-cmd.hh',
|
||||||
|
'-include', 'config-nix-cli.hh',
|
||||||
language : 'cpp',
|
language : 'cpp',
|
||||||
)
|
)
|
||||||
|
|
||||||
subdir('build-utils-meson/diagnostics')
|
subdir('build-utils-meson/diagnostics')
|
||||||
subdir('build-utils-meson/generate-header')
|
subdir('build-utils-meson/generate-header')
|
||||||
|
|
||||||
nix_sources = files(
|
nix_sources = [config_h] + files(
|
||||||
'add-to-store.cc',
|
'add-to-store.cc',
|
||||||
'app.cc',
|
'app.cc',
|
||||||
|
'self-exe.cc',
|
||||||
'build.cc',
|
'build.cc',
|
||||||
'bundle.cc',
|
'bundle.cc',
|
||||||
'cat.cc',
|
'cat.cc',
|
||||||
|
|
|
@ -1,12 +1,32 @@
|
||||||
#include "eval.hh"
|
#include "eval.hh"
|
||||||
#include "eval-settings.hh"
|
#include "eval-settings.hh"
|
||||||
|
#include "config-global.hh"
|
||||||
#include "globals.hh"
|
#include "globals.hh"
|
||||||
#include "command.hh"
|
#include "command.hh"
|
||||||
#include "installable-value.hh"
|
#include "installable-value.hh"
|
||||||
#include "repl.hh"
|
#include "repl.hh"
|
||||||
|
#include "processes.hh"
|
||||||
|
#include "self-exe.hh"
|
||||||
|
|
||||||
namespace nix {
|
namespace nix {
|
||||||
|
|
||||||
|
void runNix(Path program, const Strings & args,
|
||||||
|
const std::optional<std::string> & input = {})
|
||||||
|
{
|
||||||
|
auto subprocessEnv = getEnv();
|
||||||
|
subprocessEnv["NIX_CONFIG"] = globalConfig.toKeyValue();
|
||||||
|
//isInteractive avoid grabling interactive commands
|
||||||
|
runProgram2(RunOptions {
|
||||||
|
.program = getNixBin(program).string(),
|
||||||
|
.args = args,
|
||||||
|
.environment = subprocessEnv,
|
||||||
|
.input = input,
|
||||||
|
.isInteractive = true,
|
||||||
|
});
|
||||||
|
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
struct CmdRepl : RawInstallablesCommand
|
struct CmdRepl : RawInstallablesCommand
|
||||||
{
|
{
|
||||||
CmdRepl() {
|
CmdRepl() {
|
||||||
|
@ -81,7 +101,8 @@ struct CmdRepl : RawInstallablesCommand
|
||||||
lookupPath,
|
lookupPath,
|
||||||
openStore(),
|
openStore(),
|
||||||
state,
|
state,
|
||||||
getValues
|
getValues,
|
||||||
|
runNix
|
||||||
);
|
);
|
||||||
repl->autoArgs = getAutoArgs(*repl->state);
|
repl->autoArgs = getAutoArgs(*repl->state);
|
||||||
repl->initEnv();
|
repl->initEnv();
|
||||||
|
|
38
src/nix/self-exe.cc
Normal file
38
src/nix/self-exe.cc
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
#include "current-process.hh"
|
||||||
|
#include "file-system.hh"
|
||||||
|
#include "globals.hh"
|
||||||
|
#include "self-exe.hh"
|
||||||
|
|
||||||
|
namespace nix {
|
||||||
|
|
||||||
|
namespace fs = std::filesystem;
|
||||||
|
|
||||||
|
fs::path getNixBin(std::optional<std::string_view> binaryNameOpt)
|
||||||
|
{
|
||||||
|
auto getBinaryName = [&] { return binaryNameOpt ? *binaryNameOpt : "nix"; };
|
||||||
|
|
||||||
|
// If the environment variable is set, use it unconditionally
|
||||||
|
if (auto envOpt = getEnvNonEmpty("NIX_BIN_DIR"))
|
||||||
|
return fs::path{*envOpt} / std::string{getBinaryName()};
|
||||||
|
|
||||||
|
// Use some-times avaiable OS tricks to get to the path of this Nix, and try that
|
||||||
|
if (auto selfOpt = getSelfExe()) {
|
||||||
|
fs::path path{*selfOpt};
|
||||||
|
if (binaryNameOpt)
|
||||||
|
path = path.parent_path() / std::string{*binaryNameOpt};
|
||||||
|
if (fs::exists(path))
|
||||||
|
return path;
|
||||||
|
}
|
||||||
|
|
||||||
|
// If `nix` exists at the hardcoded fallback path, use it.
|
||||||
|
{
|
||||||
|
auto path = fs::path{NIX_BIN_DIR} / std::string{getBinaryName()};
|
||||||
|
if (fs::exists(path))
|
||||||
|
return path;
|
||||||
|
}
|
||||||
|
|
||||||
|
// return just the name, hoping the exe is on the `PATH`
|
||||||
|
return getBinaryName();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
31
src/nix/self-exe.hh
Normal file
31
src/nix/self-exe.hh
Normal file
|
@ -0,0 +1,31 @@
|
||||||
|
#pragma once
|
||||||
|
///@file
|
||||||
|
|
||||||
|
#include <filesystem>
|
||||||
|
|
||||||
|
namespace nix {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get a path to the given Nix binary.
|
||||||
|
*
|
||||||
|
* Normally, nix is installed according to `NIX_BIN_DIR`, which is set
|
||||||
|
* at compile time, but can be overridden.
|
||||||
|
*
|
||||||
|
* However, it may not have been installed at all. For example, if it's
|
||||||
|
* a static build, there's a good chance that it has been moved out of
|
||||||
|
* its installation directory. That makes `NIX_BIN_DIR` useless.
|
||||||
|
* Instead, we'll query the OS for the path to the current executable,
|
||||||
|
* using `getSelfExe()`.
|
||||||
|
*
|
||||||
|
* As a last resort, we resort to `PATH`. Hopefully we find a `nix`
|
||||||
|
* there that's compatible. If you're porting Nix to a new platform,
|
||||||
|
* that might be good enough for a while, but you'll want to improve
|
||||||
|
* `getSelfExe()` to work on your platform.
|
||||||
|
*
|
||||||
|
* @param binary_name the exact binary name we're looking up. Might be
|
||||||
|
* `nix-*` instead of `nix` for the legacy CLI commands. Optional to use
|
||||||
|
* current binary name.
|
||||||
|
*/
|
||||||
|
std::filesystem::path getNixBin(std::optional<std::string_view> binary_name = {});
|
||||||
|
|
||||||
|
}
|
|
@ -9,6 +9,7 @@
|
||||||
#include "names.hh"
|
#include "names.hh"
|
||||||
#include "progress-bar.hh"
|
#include "progress-bar.hh"
|
||||||
#include "executable-path.hh"
|
#include "executable-path.hh"
|
||||||
|
#include "self-exe.hh"
|
||||||
|
|
||||||
using namespace nix;
|
using namespace nix;
|
||||||
|
|
||||||
|
@ -93,7 +94,7 @@ struct CmdUpgradeNix : MixDryRun, StoreCommand
|
||||||
{
|
{
|
||||||
Activity act(*logger, lvlInfo, actUnknown,
|
Activity act(*logger, lvlInfo, actUnknown,
|
||||||
fmt("installing '%s' into profile '%s'...", store->printStorePath(storePath), profileDir));
|
fmt("installing '%s' into profile '%s'...", store->printStorePath(storePath), profileDir));
|
||||||
runProgram(settings.nixBinDir + "/nix-env", false,
|
runProgram(getNixBin("nix-env").string(), false,
|
||||||
{"--profile", profileDir, "-i", store->printStorePath(storePath), "--no-sandbox"});
|
{"--profile", profileDir, "-i", store->printStorePath(storePath), "--no-sandbox"});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -103,7 +104,7 @@ struct CmdUpgradeNix : MixDryRun, StoreCommand
|
||||||
/* Return the profile in which Nix is installed. */
|
/* Return the profile in which Nix is installed. */
|
||||||
Path getProfileDir(ref<Store> store)
|
Path getProfileDir(ref<Store> store)
|
||||||
{
|
{
|
||||||
auto whereOpt = ExecutablePath::load().find(OS_STR("nix-env"));
|
auto whereOpt = ExecutablePath::load().findName(OS_STR("nix-env"));
|
||||||
if (!whereOpt)
|
if (!whereOpt)
|
||||||
throw Error("couldn't figure out how Nix is installed, so I can't upgrade it");
|
throw Error("couldn't figure out how Nix is installed, so I can't upgrade it");
|
||||||
auto & where = *whereOpt;
|
auto & where = *whereOpt;
|
||||||
|
|
|
@ -5,7 +5,6 @@ use Nix::Store;
|
||||||
|
|
||||||
$version = "@PACKAGE_VERSION@";
|
$version = "@PACKAGE_VERSION@";
|
||||||
|
|
||||||
$binDir = Nix::Store::getBinDir;
|
|
||||||
$storeDir = Nix::Store::getStoreDir;
|
$storeDir = Nix::Store::getStoreDir;
|
||||||
|
|
||||||
%config = ();
|
%config = ();
|
||||||
|
|
|
@ -24,7 +24,7 @@ our @EXPORT = qw(
|
||||||
|
|
||||||
hashPath hashFile hashString convertHash
|
hashPath hashFile hashString convertHash
|
||||||
signString checkSignature
|
signString checkSignature
|
||||||
getBinDir getStoreDir
|
getStoreDir
|
||||||
setVerbosity
|
setVerbosity
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|
|
@ -424,11 +424,6 @@ StoreWrapper::addTempRoot(char * storePath)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
SV * getBinDir()
|
|
||||||
PPCODE:
|
|
||||||
XPUSHs(sv_2mortal(newSVpv(settings.nixBinDir.c_str(), 0)));
|
|
||||||
|
|
||||||
|
|
||||||
SV * getStoreDir()
|
SV * getStoreDir()
|
||||||
PPCODE:
|
PPCODE:
|
||||||
XPUSHs(sv_2mortal(newSVpv(settings.nixStore.c_str(), 0)));
|
XPUSHs(sv_2mortal(newSVpv(settings.nixStore.c_str(), 0)));
|
||||||
|
|
Loading…
Reference in a new issue