2019-10-14 12:40:16 +00:00
|
|
|
#include "installables.hh"
|
2017-04-25 10:06:32 +00:00
|
|
|
#include "command.hh"
|
2016-02-09 20:34:24 +00:00
|
|
|
#include "attr-path.hh"
|
2017-10-24 10:45:11 +00:00
|
|
|
#include "common-eval-args.hh"
|
2016-02-09 20:34:24 +00:00
|
|
|
#include "derivations.hh"
|
|
|
|
#include "eval-inline.hh"
|
|
|
|
#include "eval.hh"
|
|
|
|
#include "get-drvs.hh"
|
|
|
|
#include "store-api.hh"
|
2017-04-25 09:20:37 +00:00
|
|
|
#include "shared.hh"
|
2019-06-05 14:51:54 +00:00
|
|
|
#include "flake/flake.hh"
|
2020-04-20 11:14:59 +00:00
|
|
|
#include "eval-cache.hh"
|
2020-03-30 12:03:28 +00:00
|
|
|
#include "url.hh"
|
2020-05-11 19:49:02 +00:00
|
|
|
#include "registry.hh"
|
2017-04-25 09:20:37 +00:00
|
|
|
|
|
|
|
#include <regex>
|
2019-05-23 21:42:13 +00:00
|
|
|
#include <queue>
|
2016-02-09 20:34:24 +00:00
|
|
|
|
|
|
|
namespace nix {
|
|
|
|
|
2020-06-08 14:20:00 +00:00
|
|
|
void completeFlakeInputPath(
|
|
|
|
ref<EvalState> evalState,
|
|
|
|
const FlakeRef & flakeRef,
|
|
|
|
std::string_view prefix)
|
|
|
|
{
|
|
|
|
auto flake = flake::getFlake(*evalState, flakeRef, true);
|
|
|
|
for (auto & input : flake.inputs)
|
|
|
|
if (hasPrefix(input.first, prefix))
|
|
|
|
completions->insert(input.first);
|
|
|
|
}
|
|
|
|
|
2019-05-22 11:46:07 +00:00
|
|
|
MixFlakeOptions::MixFlakeOptions()
|
2017-10-24 10:45:11 +00:00
|
|
|
{
|
2020-05-05 16:59:33 +00:00
|
|
|
addFlag({
|
|
|
|
.longName = "recreate-lock-file",
|
|
|
|
.description = "recreate lock file from scratch",
|
|
|
|
.handler = {&lockFlags.recreateLockFile, true}
|
|
|
|
});
|
2019-05-14 09:34:45 +00:00
|
|
|
|
2020-05-05 16:59:33 +00:00
|
|
|
addFlag({
|
|
|
|
.longName = "no-update-lock-file",
|
|
|
|
.description = "do not allow any updates to the lock file",
|
|
|
|
.handler = {&lockFlags.updateLockFile, false}
|
|
|
|
});
|
2020-01-29 20:01:34 +00:00
|
|
|
|
2020-05-05 16:59:33 +00:00
|
|
|
addFlag({
|
|
|
|
.longName = "no-write-lock-file",
|
|
|
|
.description = "do not write the newly generated lock file",
|
|
|
|
.handler = {&lockFlags.writeLockFile, false}
|
|
|
|
});
|
2019-05-14 09:34:45 +00:00
|
|
|
|
2020-05-05 16:59:33 +00:00
|
|
|
addFlag({
|
|
|
|
.longName = "no-registries",
|
|
|
|
.description = "don't use flake registries",
|
|
|
|
.handler = {&lockFlags.useRegistries, false}
|
|
|
|
});
|
2020-01-29 13:57:57 +00:00
|
|
|
|
2020-05-05 16:59:33 +00:00
|
|
|
addFlag({
|
|
|
|
.longName = "commit-lock-file",
|
|
|
|
.description = "commit changes to the lock file",
|
|
|
|
.handler = {&lockFlags.commitLockFile, true}
|
|
|
|
});
|
2020-02-05 13:48:49 +00:00
|
|
|
|
2020-05-05 16:59:33 +00:00
|
|
|
addFlag({
|
|
|
|
.longName = "update-input",
|
|
|
|
.description = "update a specific flake input",
|
|
|
|
.labels = {"input-path"},
|
|
|
|
.handler = {[&](std::string s) {
|
|
|
|
lockFlags.inputUpdates.insert(flake::parseInputPath(s));
|
2020-06-08 14:20:00 +00:00
|
|
|
}},
|
|
|
|
.completer = {[&](size_t, std::string_view prefix) {
|
|
|
|
if (auto flakeRef = getFlakeRefForCompletion())
|
|
|
|
completeFlakeInputPath(getEvalState(), *flakeRef, prefix);
|
2020-05-05 16:59:33 +00:00
|
|
|
}}
|
|
|
|
});
|
2020-01-29 22:12:58 +00:00
|
|
|
|
2020-05-05 16:59:33 +00:00
|
|
|
addFlag({
|
|
|
|
.longName = "override-input",
|
2020-08-19 12:21:27 +00:00
|
|
|
.description = "override a specific flake input (e.g. `dwarffs/nixpkgs`)",
|
2020-05-05 16:59:33 +00:00
|
|
|
.labels = {"input-path", "flake-url"},
|
|
|
|
.handler = {[&](std::string inputPath, std::string flakeRef) {
|
2020-01-29 13:57:57 +00:00
|
|
|
lockFlags.inputOverrides.insert_or_assign(
|
2020-05-05 16:59:33 +00:00
|
|
|
flake::parseInputPath(inputPath),
|
|
|
|
parseFlakeRef(flakeRef, absPath(".")));
|
|
|
|
}}
|
|
|
|
});
|
2020-07-01 18:23:39 +00:00
|
|
|
|
|
|
|
addFlag({
|
|
|
|
.longName = "inputs-from",
|
|
|
|
.description = "use the inputs of the specified flake as registry entries",
|
|
|
|
.labels = {"flake-url"},
|
|
|
|
.handler = {[&](std::string flakeRef) {
|
|
|
|
auto evalState = getEvalState();
|
|
|
|
auto flake = flake::lockFlake(
|
|
|
|
*evalState,
|
|
|
|
parseFlakeRef(flakeRef, absPath(".")),
|
|
|
|
{ .writeLockFile = false });
|
|
|
|
for (auto & [inputName, input] : flake.lockFile.root->inputs) {
|
|
|
|
auto input2 = flake.lockFile.findInput({inputName}); // resolve 'follows' nodes
|
|
|
|
if (auto input3 = std::dynamic_pointer_cast<const flake::LockedNode>(input2)) {
|
|
|
|
overrideRegistry(
|
|
|
|
fetchers::Input::fromAttrs({{"type","indirect"}, {"id", inputName}}),
|
|
|
|
input3->lockedRef.input,
|
|
|
|
{});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}},
|
|
|
|
.completer = {[&](size_t, std::string_view prefix) {
|
|
|
|
completeFlakeRef(getEvalState()->store, prefix);
|
|
|
|
}}
|
|
|
|
});
|
2019-05-22 11:46:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
SourceExprCommand::SourceExprCommand()
|
|
|
|
{
|
2020-05-04 20:40:19 +00:00
|
|
|
addFlag({
|
|
|
|
.longName = "file",
|
|
|
|
.shortName = 'f',
|
2020-08-19 12:21:27 +00:00
|
|
|
.description = "evaluate *file* rather than the default",
|
2020-05-04 20:40:19 +00:00
|
|
|
.labels = {"file"},
|
2020-05-10 19:35:07 +00:00
|
|
|
.handler = {&file},
|
|
|
|
.completer = completePath
|
2020-05-04 20:40:19 +00:00
|
|
|
});
|
2019-11-26 23:05:30 +00:00
|
|
|
|
2020-05-05 16:59:33 +00:00
|
|
|
addFlag({
|
|
|
|
.longName ="expr",
|
2020-08-19 12:21:27 +00:00
|
|
|
.description = "evaluate attributes from *expr*",
|
2020-05-05 16:59:33 +00:00
|
|
|
.labels = {"expr"},
|
|
|
|
.handler = {&expr}
|
|
|
|
});
|
2020-07-15 18:22:52 +00:00
|
|
|
|
|
|
|
addFlag({
|
|
|
|
.longName ="derivation",
|
|
|
|
.description = "operate on the store derivation rather than its outputs",
|
|
|
|
.handler = {&operateOn, OperateOn::Derivation},
|
|
|
|
});
|
2017-10-24 10:45:11 +00:00
|
|
|
}
|
|
|
|
|
Support non-x86_64-linux system types in flakes
A command like
$ nix run nixpkgs#hello
will now build the attribute 'packages.${system}.hello' rather than
'packages.hello'. Note that this does mean that the flake needs to
export an attribute for every system type it supports, and you can't
build on unsupported systems. So 'packages' typically looks like this:
packages = nixpkgs.lib.genAttrs ["x86_64-linux" "i686-linux"] (system: {
hello = ...;
});
The 'checks', 'defaultPackage', 'devShell', 'apps' and 'defaultApp'
outputs similarly are now attrsets that map system types to
derivations/apps. 'nix flake check' checks that the derivations for
all platforms evaluate correctly, but only builds the derivations in
'checks.${system}'.
Fixes #2861. (That issue also talks about access to ~/.config/nixpkgs
and --arg, but I think it's reasonable to say that flakes shouldn't
support those.)
The alternative to attribute selection is to pass the system type as
an argument to the flake's 'outputs' function, e.g. 'outputs = { self,
nixpkgs, system }: ...'. However, that approach would be at odds with
hermetic evaluation and make it impossible to enumerate the packages
provided by a flake.
2019-10-15 15:52:10 +00:00
|
|
|
Strings SourceExprCommand::getDefaultFlakeAttrPaths()
|
|
|
|
{
|
|
|
|
return {"defaultPackage." + settings.thisSystem.get()};
|
|
|
|
}
|
|
|
|
|
|
|
|
Strings SourceExprCommand::getDefaultFlakeAttrPathPrefixes()
|
|
|
|
{
|
|
|
|
return {
|
|
|
|
// As a convenience, look for the attribute in
|
|
|
|
// 'outputs.packages'.
|
|
|
|
"packages." + settings.thisSystem.get() + ".",
|
|
|
|
// As a temporary hack until Nixpkgs is properly converted
|
|
|
|
// to provide a clean 'packages' set, look in 'legacyPackages'.
|
|
|
|
"legacyPackages." + settings.thisSystem.get() + "."
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-05-11 19:49:02 +00:00
|
|
|
void SourceExprCommand::completeInstallable(std::string_view prefix)
|
|
|
|
{
|
|
|
|
if (file) return; // FIXME
|
|
|
|
|
2020-06-05 12:09:12 +00:00
|
|
|
completeFlakeRefWithFragment(
|
|
|
|
getEvalState(),
|
|
|
|
lockFlags,
|
|
|
|
getDefaultFlakeAttrPathPrefixes(),
|
|
|
|
getDefaultFlakeAttrPaths(),
|
|
|
|
prefix);
|
|
|
|
}
|
|
|
|
|
|
|
|
void completeFlakeRefWithFragment(
|
|
|
|
ref<EvalState> evalState,
|
|
|
|
flake::LockFlags lockFlags,
|
|
|
|
Strings attrPathPrefixes,
|
|
|
|
const Strings & defaultFlakeAttrPaths,
|
|
|
|
std::string_view prefix)
|
|
|
|
{
|
2020-05-11 19:49:02 +00:00
|
|
|
/* Look for flake output attributes that match the
|
|
|
|
prefix. */
|
|
|
|
try {
|
|
|
|
auto hash = prefix.find('#');
|
|
|
|
if (hash != std::string::npos) {
|
|
|
|
auto fragment = prefix.substr(hash + 1);
|
|
|
|
auto flakeRefS = std::string(prefix.substr(0, hash));
|
|
|
|
// FIXME: do tilde expansion.
|
|
|
|
auto flakeRef = parseFlakeRef(flakeRefS, absPath("."));
|
|
|
|
|
2020-06-05 12:09:12 +00:00
|
|
|
auto evalCache = openEvalCache(*evalState,
|
2020-08-07 12:13:24 +00:00
|
|
|
std::make_shared<flake::LockedFlake>(lockFlake(*evalState, flakeRef, lockFlags)));
|
2020-05-11 19:49:02 +00:00
|
|
|
|
|
|
|
auto root = evalCache->getRoot();
|
|
|
|
|
|
|
|
/* Complete 'fragment' relative to all the
|
|
|
|
attrpath prefixes as well as the root of the
|
|
|
|
flake. */
|
|
|
|
attrPathPrefixes.push_back("");
|
|
|
|
|
|
|
|
for (auto & attrPathPrefixS : attrPathPrefixes) {
|
2020-06-05 12:09:12 +00:00
|
|
|
auto attrPathPrefix = parseAttrPath(*evalState, attrPathPrefixS);
|
2020-05-11 19:49:02 +00:00
|
|
|
auto attrPathS = attrPathPrefixS + std::string(fragment);
|
2020-06-05 12:09:12 +00:00
|
|
|
auto attrPath = parseAttrPath(*evalState, attrPathS);
|
2020-05-11 19:49:02 +00:00
|
|
|
|
|
|
|
std::string lastAttr;
|
|
|
|
if (!attrPath.empty() && !hasSuffix(attrPathS, ".")) {
|
|
|
|
lastAttr = attrPath.back();
|
|
|
|
attrPath.pop_back();
|
|
|
|
}
|
|
|
|
|
|
|
|
auto attr = root->findAlongAttrPath(attrPath);
|
|
|
|
if (!attr) continue;
|
|
|
|
|
2020-06-05 12:09:12 +00:00
|
|
|
for (auto & attr2 : attr->getAttrs()) {
|
2020-05-11 19:49:02 +00:00
|
|
|
if (hasPrefix(attr2, lastAttr)) {
|
|
|
|
auto attrPath2 = attr->getAttrPath(attr2);
|
|
|
|
/* Strip the attrpath prefix. */
|
|
|
|
attrPath2.erase(attrPath2.begin(), attrPath2.begin() + attrPathPrefix.size());
|
|
|
|
completions->insert(flakeRefS + "#" + concatStringsSep(".", attrPath2));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* And add an empty completion for the default
|
|
|
|
attrpaths. */
|
|
|
|
if (fragment.empty()) {
|
2020-06-05 12:09:12 +00:00
|
|
|
for (auto & attrPath : defaultFlakeAttrPaths) {
|
|
|
|
auto attr = root->findAlongAttrPath(parseAttrPath(*evalState, attrPath));
|
2020-05-11 19:49:02 +00:00
|
|
|
if (!attr) continue;
|
|
|
|
completions->insert(flakeRefS + "#");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} catch (Error & e) {
|
|
|
|
warn(e.msg());
|
|
|
|
}
|
|
|
|
|
2020-06-05 12:09:12 +00:00
|
|
|
completeFlakeRef(evalState->store, prefix);
|
2020-05-11 20:10:33 +00:00
|
|
|
}
|
|
|
|
|
2019-05-16 20:48:16 +00:00
|
|
|
ref<EvalState> EvalCommand::getEvalState()
|
2017-07-17 17:02:56 +00:00
|
|
|
{
|
2020-01-21 15:27:53 +00:00
|
|
|
if (!evalState)
|
2017-10-24 10:45:11 +00:00
|
|
|
evalState = std::make_shared<EvalState>(searchPath, getStore());
|
2017-07-17 17:02:56 +00:00
|
|
|
return ref<EvalState>(evalState);
|
|
|
|
}
|
|
|
|
|
2020-06-05 12:09:12 +00:00
|
|
|
void completeFlakeRef(ref<Store> store, std::string_view prefix)
|
2020-05-11 20:10:33 +00:00
|
|
|
{
|
|
|
|
if (prefix == "")
|
|
|
|
completions->insert(".");
|
|
|
|
|
|
|
|
completeDir(0, prefix);
|
|
|
|
|
2020-05-11 19:49:02 +00:00
|
|
|
/* Look for registry entries that match the prefix. */
|
2020-06-05 12:09:12 +00:00
|
|
|
for (auto & registry : fetchers::getRegistries(store)) {
|
2020-05-11 19:49:02 +00:00
|
|
|
for (auto & entry : registry->entries) {
|
Remove TreeInfo
The attributes previously stored in TreeInfo (narHash, revCount,
lastModified) are now stored in Input. This makes it less arbitrary
what attributes are stored where.
As a result, the lock file format has changed. An entry like
"info": {
"lastModified": 1585405475,
"narHash": "sha256-bESW0n4KgPmZ0luxvwJ+UyATrC6iIltVCsGdLiphVeE="
},
"locked": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b88ff468e9850410070d4e0ccd68c7011f15b2be",
"type": "github"
},
is now stored as
"locked": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "b88ff468e9850410070d4e0ccd68c7011f15b2be",
"type": "github",
"lastModified": 1585405475,
"narHash": "sha256-bESW0n4KgPmZ0luxvwJ+UyATrC6iIltVCsGdLiphVeE="
},
The 'Input' class is now a dumb set of attributes. All the fetcher
implementations subclass InputScheme, not Input. This simplifies the
API.
Also, fix substitution of flake inputs. This was broken since lazy
flake fetching started using fetchTree internally.
2020-05-29 22:44:11 +00:00
|
|
|
auto from = entry.from.to_string();
|
2020-05-11 19:49:02 +00:00
|
|
|
if (!hasPrefix(prefix, "flake:") && hasPrefix(from, "flake:")) {
|
|
|
|
std::string from2(from, 6);
|
|
|
|
if (hasPrefix(from2, prefix))
|
|
|
|
completions->insert(from2);
|
|
|
|
} else {
|
|
|
|
if (hasPrefix(from, prefix))
|
|
|
|
completions->insert(from);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-06 14:03:22 +00:00
|
|
|
Buildable Installable::toBuildable()
|
|
|
|
{
|
|
|
|
auto buildables = toBuildables();
|
|
|
|
if (buildables.size() != 1)
|
|
|
|
throw Error("installable '%s' evaluates to %d derivations, where only one is expected", what(), buildables.size());
|
|
|
|
return std::move(buildables[0]);
|
|
|
|
}
|
|
|
|
|
2020-04-20 13:27:09 +00:00
|
|
|
std::vector<std::pair<std::shared_ptr<eval_cache::AttrCursor>, std::string>>
|
2020-08-07 12:13:24 +00:00
|
|
|
Installable::getCursors(EvalState & state)
|
2020-04-20 13:27:09 +00:00
|
|
|
{
|
|
|
|
auto evalCache =
|
2020-07-16 14:58:53 +00:00
|
|
|
std::make_shared<nix::eval_cache::EvalCache>(std::nullopt, state,
|
2020-04-20 13:27:09 +00:00
|
|
|
[&]() { return toValue(state).first; });
|
|
|
|
return {{evalCache->getRoot(), ""}};
|
|
|
|
}
|
|
|
|
|
2020-06-04 18:02:50 +00:00
|
|
|
std::pair<std::shared_ptr<eval_cache::AttrCursor>, std::string>
|
2020-08-07 12:13:24 +00:00
|
|
|
Installable::getCursor(EvalState & state)
|
2020-06-04 18:02:50 +00:00
|
|
|
{
|
2020-08-07 12:13:24 +00:00
|
|
|
auto cursors = getCursors(state);
|
2020-06-04 18:02:50 +00:00
|
|
|
if (cursors.empty())
|
|
|
|
throw Error("cannot find flake attribute '%s'", what());
|
|
|
|
return cursors[0];
|
|
|
|
}
|
|
|
|
|
2017-04-25 09:20:37 +00:00
|
|
|
struct InstallableStorePath : Installable
|
2016-02-09 20:34:24 +00:00
|
|
|
{
|
2019-12-05 18:11:09 +00:00
|
|
|
ref<Store> store;
|
|
|
|
StorePath storePath;
|
2017-04-25 09:20:37 +00:00
|
|
|
|
2020-07-13 14:19:37 +00:00
|
|
|
InstallableStorePath(ref<Store> store, StorePath && storePath)
|
|
|
|
: store(store), storePath(std::move(storePath)) { }
|
2017-04-25 09:20:37 +00:00
|
|
|
|
2019-12-05 18:11:09 +00:00
|
|
|
std::string what() override { return store->printStorePath(storePath); }
|
2017-04-25 09:20:37 +00:00
|
|
|
|
2017-09-06 14:03:22 +00:00
|
|
|
Buildables toBuildables() override
|
2017-04-25 09:20:37 +00:00
|
|
|
{
|
2020-07-15 17:50:32 +00:00
|
|
|
if (storePath.isDerivation()) {
|
|
|
|
std::map<std::string, StorePath> outputs;
|
2020-07-16 17:32:28 +00:00
|
|
|
auto drv = store->readDerivation(storePath);
|
2020-07-28 17:59:24 +00:00
|
|
|
for (auto & i : drv.outputsAndPaths(*store))
|
|
|
|
outputs.emplace(i.first, i.second.second);
|
2020-07-15 17:50:32 +00:00
|
|
|
return {
|
2020-07-23 19:02:57 +00:00
|
|
|
BuildableFromDrv {
|
2020-07-15 17:50:32 +00:00
|
|
|
.drvPath = storePath,
|
|
|
|
.outputs = std::move(outputs)
|
|
|
|
}
|
|
|
|
};
|
|
|
|
} else {
|
|
|
|
return {
|
2020-07-23 19:02:57 +00:00
|
|
|
BuildableOpaque {
|
|
|
|
.path = storePath,
|
2020-07-15 17:50:32 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
2017-04-25 09:20:37 +00:00
|
|
|
}
|
2019-07-12 14:28:39 +00:00
|
|
|
|
2019-12-11 13:53:30 +00:00
|
|
|
std::optional<StorePath> getStorePath() override
|
2019-07-12 14:28:39 +00:00
|
|
|
{
|
2020-06-16 20:20:18 +00:00
|
|
|
return storePath;
|
2019-07-12 14:28:39 +00:00
|
|
|
}
|
2017-04-25 09:20:37 +00:00
|
|
|
};
|
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
Buildables InstallableValue::toBuildables()
|
|
|
|
{
|
|
|
|
Buildables res;
|
2017-09-06 14:03:22 +00:00
|
|
|
|
2020-07-23 19:02:57 +00:00
|
|
|
std::map<StorePath, OutputPathMap> drvsToOutputs;
|
2017-09-06 14:03:22 +00:00
|
|
|
|
2020-07-23 19:02:57 +00:00
|
|
|
// Group by derivation, helps with .all in particular
|
2019-10-14 12:40:16 +00:00
|
|
|
for (auto & drv : toDerivations()) {
|
|
|
|
auto outputName = drv.outputName;
|
|
|
|
if (outputName == "")
|
2020-07-23 19:02:57 +00:00
|
|
|
throw Error("derivation '%s' lacks an 'outputName' attribute", state->store->printStorePath(drv.drvPath));
|
|
|
|
drvsToOutputs[drv.drvPath].insert_or_assign(outputName, drv.outPath);
|
2017-04-25 09:20:37 +00:00
|
|
|
}
|
2019-10-14 12:40:16 +00:00
|
|
|
|
2020-07-23 19:02:57 +00:00
|
|
|
for (auto & i : drvsToOutputs)
|
|
|
|
res.push_back(BuildableFromDrv { i.first, i.second });
|
|
|
|
|
|
|
|
return res;
|
2019-10-14 12:40:16 +00:00
|
|
|
}
|
2017-08-29 14:18:00 +00:00
|
|
|
|
|
|
|
struct InstallableAttrPath : InstallableValue
|
2017-04-25 09:20:37 +00:00
|
|
|
{
|
2020-05-09 15:35:33 +00:00
|
|
|
SourceExprCommand & cmd;
|
2020-04-16 14:54:34 +00:00
|
|
|
RootValue v;
|
2017-04-25 09:20:37 +00:00
|
|
|
std::string attrPath;
|
|
|
|
|
2020-05-09 15:35:33 +00:00
|
|
|
InstallableAttrPath(ref<EvalState> state, SourceExprCommand & cmd, Value * v, const std::string & attrPath)
|
|
|
|
: InstallableValue(state), cmd(cmd), v(allocRootValue(v)), attrPath(attrPath)
|
2017-04-25 09:20:37 +00:00
|
|
|
{ }
|
|
|
|
|
|
|
|
std::string what() override { return attrPath; }
|
|
|
|
|
2020-02-07 13:22:01 +00:00
|
|
|
std::pair<Value *, Pos> toValue(EvalState & state) override
|
2017-04-25 09:20:37 +00:00
|
|
|
{
|
2020-04-16 14:54:34 +00:00
|
|
|
auto [vRes, pos] = findAlongAttrPath(state, attrPath, *cmd.getAutoArgs(state), **v);
|
2019-04-08 14:11:17 +00:00
|
|
|
state.forceValue(*vRes);
|
2020-02-07 13:22:01 +00:00
|
|
|
return {vRes, pos};
|
2017-04-25 09:20:37 +00:00
|
|
|
}
|
2020-05-09 15:35:33 +00:00
|
|
|
|
|
|
|
virtual std::vector<InstallableValue::DerivationInfo> toDerivations() override;
|
2017-04-25 09:20:37 +00:00
|
|
|
};
|
|
|
|
|
2020-05-09 20:07:18 +00:00
|
|
|
std::vector<InstallableValue::DerivationInfo> InstallableAttrPath::toDerivations()
|
|
|
|
{
|
|
|
|
auto v = toValue(*state).first;
|
|
|
|
|
|
|
|
Bindings & autoArgs = *cmd.getAutoArgs(*state);
|
|
|
|
|
|
|
|
DrvInfos drvInfos;
|
|
|
|
getDerivations(*state, *v, "", autoArgs, drvInfos, false);
|
|
|
|
|
|
|
|
std::vector<DerivationInfo> res;
|
|
|
|
for (auto & drvInfo : drvInfos) {
|
|
|
|
res.push_back({
|
|
|
|
state->store->parseStorePath(drvInfo.queryDrvPath()),
|
|
|
|
state->store->parseStorePath(drvInfo.queryOutPath()),
|
|
|
|
drvInfo.queryOutputName()
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
std::vector<std::string> InstallableFlake::getActualAttrPaths()
|
2019-04-08 12:21:13 +00:00
|
|
|
{
|
2019-10-14 12:40:16 +00:00
|
|
|
std::vector<std::string> res;
|
2019-05-01 09:38:48 +00:00
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
for (auto & prefix : prefixes)
|
|
|
|
res.push_back(prefix + *attrPaths.begin());
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
for (auto & s : attrPaths)
|
|
|
|
res.push_back(s);
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
return res;
|
|
|
|
}
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2020-01-22 19:59:59 +00:00
|
|
|
Value * InstallableFlake::getFlakeOutputs(EvalState & state, const flake::LockedFlake & lockedFlake)
|
2019-10-14 12:40:16 +00:00
|
|
|
{
|
|
|
|
auto vFlake = state.allocValue();
|
2019-05-23 21:42:13 +00:00
|
|
|
|
2020-01-22 19:59:59 +00:00
|
|
|
callFlake(state, lockedFlake, *vFlake);
|
2019-05-23 21:42:13 +00:00
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
auto aOutputs = vFlake->attrs->get(state.symbols.create("outputs"));
|
|
|
|
assert(aOutputs);
|
2019-04-08 12:21:13 +00:00
|
|
|
|
2020-02-14 21:45:33 +00:00
|
|
|
state.forceValue(*aOutputs->value);
|
2019-04-08 12:21:13 +00:00
|
|
|
|
2020-02-14 21:45:33 +00:00
|
|
|
return aOutputs->value;
|
2019-10-14 12:40:16 +00:00
|
|
|
}
|
2019-04-08 12:21:13 +00:00
|
|
|
|
2020-04-20 11:13:52 +00:00
|
|
|
ref<eval_cache::EvalCache> openEvalCache(
|
|
|
|
EvalState & state,
|
2020-08-07 12:13:24 +00:00
|
|
|
std::shared_ptr<flake::LockedFlake> lockedFlake)
|
2020-04-20 11:13:52 +00:00
|
|
|
{
|
2020-08-04 03:46:28 +00:00
|
|
|
auto fingerprint = lockedFlake->getFingerprint();
|
2020-07-16 14:58:53 +00:00
|
|
|
return make_ref<nix::eval_cache::EvalCache>(
|
2020-08-07 12:13:24 +00:00
|
|
|
evalSettings.useEvalCache && evalSettings.pureEval
|
2020-07-16 14:58:53 +00:00
|
|
|
? std::optional { std::cref(fingerprint) }
|
|
|
|
: std::nullopt,
|
2020-04-20 11:13:52 +00:00
|
|
|
state,
|
2020-04-20 13:27:09 +00:00
|
|
|
[&state, lockedFlake]()
|
2020-04-20 11:13:52 +00:00
|
|
|
{
|
|
|
|
/* For testing whether the evaluation cache is
|
|
|
|
complete. */
|
|
|
|
if (getEnv("NIX_ALLOW_EVAL").value_or("1") == "0")
|
|
|
|
throw Error("not everything is cached, but evaluation is not allowed");
|
|
|
|
|
|
|
|
auto vFlake = state.allocValue();
|
2020-04-20 13:27:09 +00:00
|
|
|
flake::callFlake(state, *lockedFlake, *vFlake);
|
2020-04-20 11:13:52 +00:00
|
|
|
|
|
|
|
state.forceAttrs(*vFlake);
|
|
|
|
|
|
|
|
auto aOutputs = vFlake->attrs->get(state.symbols.create("outputs"));
|
|
|
|
assert(aOutputs);
|
|
|
|
|
|
|
|
return aOutputs->value;
|
2020-07-16 14:58:53 +00:00
|
|
|
});
|
2020-04-20 11:13:52 +00:00
|
|
|
}
|
|
|
|
|
2020-06-17 15:13:01 +00:00
|
|
|
static std::string showAttrPaths(const std::vector<std::string> & paths)
|
|
|
|
{
|
|
|
|
std::string s;
|
|
|
|
for (const auto & [n, i] : enumerate(paths)) {
|
|
|
|
if (n > 0) s += n + 1 == paths.size() ? " or " : ", ";
|
|
|
|
s += '\''; s += i; s += '\'';
|
|
|
|
}
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2020-04-20 11:13:52 +00:00
|
|
|
std::tuple<std::string, FlakeRef, InstallableValue::DerivationInfo> InstallableFlake::toDerivation()
|
2019-10-14 12:40:16 +00:00
|
|
|
{
|
2020-05-13 05:45:45 +00:00
|
|
|
auto lockedFlake = getLockedFlake();
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2020-08-07 12:13:24 +00:00
|
|
|
auto cache = openEvalCache(*state, lockedFlake);
|
2020-04-20 11:13:52 +00:00
|
|
|
auto root = cache->getRoot();
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
for (auto & attrPath : getActualAttrPaths()) {
|
2020-04-20 11:13:52 +00:00
|
|
|
auto attr = root->findAlongAttrPath(parseAttrPath(*state, attrPath));
|
|
|
|
if (!attr) continue;
|
|
|
|
|
|
|
|
if (!attr->isDerivation())
|
|
|
|
throw Error("flake output attribute '%s' is not a derivation", attrPath);
|
|
|
|
|
2020-06-29 14:39:41 +00:00
|
|
|
auto drvPath = attr->forceDerivation();
|
2019-05-29 19:30:22 +00:00
|
|
|
|
2020-04-20 11:13:52 +00:00
|
|
|
auto drvInfo = DerivationInfo{
|
|
|
|
std::move(drvPath),
|
|
|
|
state->store->parseStorePath(attr->getAttr(state->sOutPath)->getString()),
|
|
|
|
attr->getAttr(state->sOutputName)->getString()
|
|
|
|
};
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2020-04-20 13:27:09 +00:00
|
|
|
return {attrPath, lockedFlake->flake.lockedRef, std::move(drvInfo)};
|
2019-06-07 20:25:48 +00:00
|
|
|
}
|
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
throw Error("flake '%s' does not provide attribute %s",
|
2020-06-17 15:13:01 +00:00
|
|
|
flakeRef, showAttrPaths(getActualAttrPaths()));
|
2019-10-14 12:40:16 +00:00
|
|
|
}
|
|
|
|
|
2020-04-20 11:13:52 +00:00
|
|
|
std::vector<InstallableValue::DerivationInfo> InstallableFlake::toDerivations()
|
2019-10-21 22:21:58 +00:00
|
|
|
{
|
2020-04-20 11:13:52 +00:00
|
|
|
std::vector<DerivationInfo> res;
|
2019-12-11 13:53:30 +00:00
|
|
|
res.push_back(std::get<2>(toDerivation()));
|
|
|
|
return res;
|
2019-10-21 22:21:58 +00:00
|
|
|
}
|
|
|
|
|
2020-02-07 13:22:01 +00:00
|
|
|
std::pair<Value *, Pos> InstallableFlake::toValue(EvalState & state)
|
2019-10-14 12:40:16 +00:00
|
|
|
{
|
2020-05-13 05:45:45 +00:00
|
|
|
auto lockedFlake = getLockedFlake();
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2020-05-13 05:45:45 +00:00
|
|
|
auto vOutputs = getFlakeOutputs(state, *lockedFlake);
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
auto emptyArgs = state.allocBindings(0);
|
2019-06-07 20:25:48 +00:00
|
|
|
|
2019-10-14 12:40:16 +00:00
|
|
|
for (auto & attrPath : getActualAttrPaths()) {
|
|
|
|
try {
|
2020-02-07 13:22:01 +00:00
|
|
|
auto [v, pos] = findAlongAttrPath(state, attrPath, *emptyArgs, *vOutputs);
|
2019-10-14 12:40:16 +00:00
|
|
|
state.forceValue(*v);
|
2020-02-07 13:22:01 +00:00
|
|
|
return {v, pos};
|
2019-10-14 12:40:16 +00:00
|
|
|
} catch (AttrPathNotFound & e) {
|
2019-04-08 12:21:13 +00:00
|
|
|
}
|
|
|
|
}
|
2019-10-14 12:40:16 +00:00
|
|
|
|
|
|
|
throw Error("flake '%s' does not provide attribute %s",
|
2020-06-17 15:13:01 +00:00
|
|
|
flakeRef, showAttrPaths(getActualAttrPaths()));
|
2019-10-14 12:40:16 +00:00
|
|
|
}
|
2019-04-08 12:21:13 +00:00
|
|
|
|
2020-04-20 13:27:09 +00:00
|
|
|
std::vector<std::pair<std::shared_ptr<eval_cache::AttrCursor>, std::string>>
|
2020-08-07 12:13:24 +00:00
|
|
|
InstallableFlake::getCursors(EvalState & state)
|
2020-04-20 13:27:09 +00:00
|
|
|
{
|
|
|
|
auto evalCache = openEvalCache(state,
|
2020-08-07 12:13:24 +00:00
|
|
|
std::make_shared<flake::LockedFlake>(lockFlake(state, flakeRef, lockFlags)));
|
2020-04-20 13:27:09 +00:00
|
|
|
|
|
|
|
auto root = evalCache->getRoot();
|
|
|
|
|
|
|
|
std::vector<std::pair<std::shared_ptr<eval_cache::AttrCursor>, std::string>> res;
|
|
|
|
|
|
|
|
for (auto & attrPath : getActualAttrPaths()) {
|
|
|
|
auto attr = root->findAlongAttrPath(parseAttrPath(state, attrPath));
|
|
|
|
if (attr) res.push_back({attr, attrPath});
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2020-05-13 05:45:45 +00:00
|
|
|
std::shared_ptr<flake::LockedFlake> InstallableFlake::getLockedFlake() const
|
|
|
|
{
|
|
|
|
if (!_lockedFlake)
|
|
|
|
_lockedFlake = std::make_shared<flake::LockedFlake>(lockFlake(*state, flakeRef, lockFlags));
|
|
|
|
return _lockedFlake;
|
|
|
|
}
|
|
|
|
|
2020-05-05 16:49:39 +00:00
|
|
|
FlakeRef InstallableFlake::nixpkgsFlakeRef() const
|
|
|
|
{
|
2020-05-13 05:45:45 +00:00
|
|
|
auto lockedFlake = getLockedFlake();
|
2020-05-05 16:49:39 +00:00
|
|
|
|
2020-06-11 12:40:21 +00:00
|
|
|
if (auto nixpkgsInput = lockedFlake->lockFile.findInput({"nixpkgs"})) {
|
|
|
|
if (auto lockedNode = std::dynamic_pointer_cast<const flake::LockedNode>(nixpkgsInput)) {
|
2020-05-28 10:13:13 +00:00
|
|
|
debug("using nixpkgs flake '%s'", lockedNode->lockedRef);
|
|
|
|
return std::move(lockedNode->lockedRef);
|
|
|
|
}
|
2020-05-05 16:49:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return Installable::nixpkgsFlakeRef();
|
|
|
|
}
|
|
|
|
|
2019-04-08 14:11:17 +00:00
|
|
|
std::vector<std::shared_ptr<Installable>> SourceExprCommand::parseInstallables(
|
|
|
|
ref<Store> store, std::vector<std::string> ss)
|
2017-04-25 09:20:37 +00:00
|
|
|
{
|
|
|
|
std::vector<std::shared_ptr<Installable>> result;
|
2016-02-09 20:34:24 +00:00
|
|
|
|
2019-11-26 23:05:30 +00:00
|
|
|
if (file || expr) {
|
|
|
|
if (file && expr)
|
|
|
|
throw UsageError("'--file' and '--expr' are exclusive");
|
|
|
|
|
2019-04-08 14:11:17 +00:00
|
|
|
// FIXME: backward compatibility hack
|
2019-11-26 23:05:30 +00:00
|
|
|
if (file) evalSettings.pureEval = false;
|
2017-04-25 13:18:05 +00:00
|
|
|
|
2019-04-08 14:11:17 +00:00
|
|
|
auto state = getEvalState();
|
|
|
|
auto vFile = state->allocValue();
|
2016-02-09 20:34:24 +00:00
|
|
|
|
2019-11-26 23:05:30 +00:00
|
|
|
if (file)
|
|
|
|
state->evalFile(lookupFileArg(*state, *file), *vFile);
|
|
|
|
else {
|
|
|
|
auto e = state->parseExprFromString(*expr, absPath("."));
|
|
|
|
state->eval(e, *vFile);
|
|
|
|
}
|
2017-07-04 13:38:23 +00:00
|
|
|
|
2019-04-08 14:11:17 +00:00
|
|
|
for (auto & s : ss)
|
2020-05-09 15:35:33 +00:00
|
|
|
result.push_back(std::make_shared<InstallableAttrPath>(state, *this, vFile, s == "." ? "" : s));
|
2016-02-09 20:34:24 +00:00
|
|
|
|
2019-04-08 14:11:17 +00:00
|
|
|
} else {
|
2016-02-09 20:34:24 +00:00
|
|
|
|
2019-04-08 14:11:17 +00:00
|
|
|
for (auto & s : ss) {
|
2020-05-06 15:20:23 +00:00
|
|
|
std::exception_ptr ex;
|
|
|
|
|
|
|
|
try {
|
|
|
|
auto [flakeRef, fragment] = parseFlakeRefWithFragment(s, absPath("."));
|
|
|
|
result.push_back(std::make_shared<InstallableFlake>(
|
2020-05-09 15:35:33 +00:00
|
|
|
getEvalState(), std::move(flakeRef),
|
2020-05-06 15:20:23 +00:00
|
|
|
fragment == "" ? getDefaultFlakeAttrPaths() : Strings{fragment},
|
2020-05-09 15:35:33 +00:00
|
|
|
getDefaultFlakeAttrPathPrefixes(), lockFlags));
|
2020-05-06 15:20:23 +00:00
|
|
|
continue;
|
|
|
|
} catch (...) {
|
|
|
|
ex = std::current_exception();
|
2019-04-08 14:22:04 +00:00
|
|
|
}
|
|
|
|
|
2020-05-06 15:20:23 +00:00
|
|
|
if (s.find('/') != std::string::npos) {
|
2020-04-27 20:53:11 +00:00
|
|
|
try {
|
2020-07-14 11:56:18 +00:00
|
|
|
result.push_back(std::make_shared<InstallableStorePath>(store, store->followLinksToStorePath(s)));
|
2020-04-27 20:53:11 +00:00
|
|
|
continue;
|
2020-07-14 11:56:18 +00:00
|
|
|
} catch (BadStorePath &) {
|
2020-04-27 20:53:11 +00:00
|
|
|
} catch (...) {
|
2020-05-06 15:20:23 +00:00
|
|
|
if (!ex)
|
|
|
|
ex = std::current_exception();
|
2020-04-27 20:53:11 +00:00
|
|
|
}
|
2020-05-06 15:20:23 +00:00
|
|
|
}
|
2020-04-27 20:53:11 +00:00
|
|
|
|
2020-05-06 15:20:23 +00:00
|
|
|
std::rethrow_exception(ex);
|
2020-04-27 20:53:11 +00:00
|
|
|
|
2020-05-06 15:20:23 +00:00
|
|
|
/*
|
|
|
|
throw Error(
|
|
|
|
pathExists(s)
|
|
|
|
? "path '%s' is not a flake or a store path"
|
|
|
|
: "don't know how to handle argument '%s'", s);
|
|
|
|
*/
|
2019-04-08 14:11:17 +00:00
|
|
|
}
|
2017-04-25 09:20:37 +00:00
|
|
|
}
|
2016-02-09 20:34:24 +00:00
|
|
|
|
2017-04-25 09:20:37 +00:00
|
|
|
return result;
|
|
|
|
}
|
2016-02-09 20:34:24 +00:00
|
|
|
|
2019-04-08 14:11:17 +00:00
|
|
|
std::shared_ptr<Installable> SourceExprCommand::parseInstallable(
|
|
|
|
ref<Store> store, const std::string & installable)
|
2017-09-10 13:58:30 +00:00
|
|
|
{
|
2019-04-08 14:11:17 +00:00
|
|
|
auto installables = parseInstallables(store, {installable});
|
2017-09-10 13:58:30 +00:00
|
|
|
assert(installables.size() == 1);
|
|
|
|
return installables.front();
|
|
|
|
}
|
|
|
|
|
2020-07-15 18:05:42 +00:00
|
|
|
Buildables build(ref<Store> store, Realise mode,
|
2020-06-29 08:05:44 +00:00
|
|
|
std::vector<std::shared_ptr<Installable>> installables, BuildMode bMode)
|
2017-04-25 09:20:37 +00:00
|
|
|
{
|
2020-07-15 18:05:42 +00:00
|
|
|
if (mode == Realise::Nothing)
|
2017-07-14 15:10:13 +00:00
|
|
|
settings.readOnlyMode = true;
|
2016-02-09 20:34:24 +00:00
|
|
|
|
2017-09-06 14:03:22 +00:00
|
|
|
Buildables buildables;
|
|
|
|
|
2019-12-05 18:11:09 +00:00
|
|
|
std::vector<StorePathWithOutputs> pathsToBuild;
|
2017-07-14 15:10:13 +00:00
|
|
|
|
2017-09-06 14:03:22 +00:00
|
|
|
for (auto & i : installables) {
|
|
|
|
for (auto & b : i->toBuildables()) {
|
2020-07-23 19:02:57 +00:00
|
|
|
std::visit(overloaded {
|
|
|
|
[&](BuildableOpaque bo) {
|
|
|
|
pathsToBuild.push_back({bo.path});
|
|
|
|
},
|
|
|
|
[&](BuildableFromDrv bfd) {
|
|
|
|
StringSet outputNames;
|
|
|
|
for (auto & output : bfd.outputs)
|
|
|
|
outputNames.insert(output.first);
|
|
|
|
pathsToBuild.push_back({bfd.drvPath, outputNames});
|
|
|
|
},
|
|
|
|
}, b);
|
2017-09-06 14:03:22 +00:00
|
|
|
buildables.push_back(std::move(b));
|
2017-07-14 15:10:13 +00:00
|
|
|
}
|
2017-09-06 14:03:22 +00:00
|
|
|
}
|
2016-02-09 20:34:24 +00:00
|
|
|
|
2020-07-15 18:05:42 +00:00
|
|
|
if (mode == Realise::Nothing)
|
2017-09-06 14:03:22 +00:00
|
|
|
printMissing(store, pathsToBuild, lvlError);
|
2020-07-15 18:05:42 +00:00
|
|
|
else if (mode == Realise::Outputs)
|
2020-06-29 08:05:44 +00:00
|
|
|
store->buildPaths(pathsToBuild, bMode);
|
2017-09-06 14:03:22 +00:00
|
|
|
|
|
|
|
return buildables;
|
|
|
|
}
|
|
|
|
|
2020-07-15 18:22:52 +00:00
|
|
|
StorePathSet toStorePaths(ref<Store> store,
|
|
|
|
Realise mode, OperateOn operateOn,
|
2017-09-10 13:58:30 +00:00
|
|
|
std::vector<std::shared_ptr<Installable>> installables)
|
2017-09-06 14:03:22 +00:00
|
|
|
{
|
2019-12-05 18:11:09 +00:00
|
|
|
StorePathSet outPaths;
|
2017-09-06 14:03:22 +00:00
|
|
|
|
2020-07-15 18:22:52 +00:00
|
|
|
if (operateOn == OperateOn::Output) {
|
|
|
|
for (auto & b : build(store, mode, installables))
|
2020-07-23 19:02:57 +00:00
|
|
|
std::visit(overloaded {
|
|
|
|
[&](BuildableOpaque bo) {
|
|
|
|
outPaths.insert(bo.path);
|
|
|
|
},
|
|
|
|
[&](BuildableFromDrv bfd) {
|
|
|
|
for (auto & output : bfd.outputs)
|
|
|
|
outPaths.insert(output.second);
|
|
|
|
},
|
|
|
|
}, b);
|
2020-07-15 18:22:52 +00:00
|
|
|
} else {
|
|
|
|
if (mode == Realise::Nothing)
|
|
|
|
settings.readOnlyMode = true;
|
|
|
|
|
|
|
|
for (auto & i : installables)
|
|
|
|
for (auto & b : i->toBuildables())
|
2020-07-23 19:02:57 +00:00
|
|
|
if (auto bfd = std::get_if<BuildableFromDrv>(&b))
|
|
|
|
outPaths.insert(bfd->drvPath);
|
2020-07-15 18:22:52 +00:00
|
|
|
}
|
2017-04-25 09:20:37 +00:00
|
|
|
|
2017-04-25 14:19:22 +00:00
|
|
|
return outPaths;
|
2017-04-25 09:20:37 +00:00
|
|
|
}
|
|
|
|
|
2020-07-15 18:22:52 +00:00
|
|
|
StorePath toStorePath(ref<Store> store,
|
|
|
|
Realise mode, OperateOn operateOn,
|
2017-09-10 13:58:30 +00:00
|
|
|
std::shared_ptr<Installable> installable)
|
|
|
|
{
|
2020-07-15 18:22:52 +00:00
|
|
|
auto paths = toStorePaths(store, mode, operateOn, {installable});
|
2017-09-10 13:58:30 +00:00
|
|
|
|
|
|
|
if (paths.size() != 1)
|
2019-04-08 21:58:33 +00:00
|
|
|
throw Error("argument '%s' should evaluate to one store path", installable->what());
|
2017-09-10 13:58:30 +00:00
|
|
|
|
2020-06-16 20:20:18 +00:00
|
|
|
return *paths.begin();
|
2017-09-10 13:58:30 +00:00
|
|
|
}
|
|
|
|
|
2019-12-05 18:11:09 +00:00
|
|
|
StorePathSet toDerivations(ref<Store> store,
|
Add "nix show-derivation"
This debug command prints a store derivation in JSON format. For
example:
$ nix show-derivation nixpkgs.hello
{
"/nix/store/ayjwpwwiyy04nh9z71rsdgd3q7bra7ch-hello-2.10.drv": {
"outputs": {
"out": {
"path": "/nix/store/w5w4v29ql0qwqhczkdxs94ix2lh7ibgs-hello-2.10"
}
},
"inputSrcs": [
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"inputDrvs": {
"/nix/store/13839aqdf6x4k3b785rw5f2l7857l6y3-bash-4.4-p12.drv": [
"out"
],
"/nix/store/vgdx7fdc7d4iirmnwj2py1nrvr5qwzj7-hello-2.10.tar.gz.drv": [
"out"
],
"/nix/store/x3kkd0vsqfflbvwf1055l9mr39bg0ms0-stdenv.drv": [
"out"
]
},
"platform": "x86_64-linux",
"builder": "/nix/store/qp5fw57d38bd1n07ss4zxh88zg67c3vg-bash-4.4-p12/bin/bash",
"args": [
"-e",
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"env": {
"buildInputs": "",
"builder": "/nix/store/qp5fw57d38bd1n07ss4zxh88zg67c3vg-bash-4.4-p12/bin/bash",
"configureFlags": "",
"doCheck": "1",
"name": "hello-2.10",
"nativeBuildInputs": "",
"out": "/nix/store/w5w4v29ql0qwqhczkdxs94ix2lh7ibgs-hello-2.10",
"propagatedBuildInputs": "",
"propagatedNativeBuildInputs": "",
"src": "/nix/store/3x7dwzq014bblazs7kq20p9hyzz0qh8g-hello-2.10.tar.gz",
"stdenv": "/nix/store/6zngq1rdh0ans9qyckqimqibgnlvlfrm-stdenv",
"system": "x86_64-linux"
}
}
}
This removes the need for pp-aterm.
2017-09-25 11:43:35 +00:00
|
|
|
std::vector<std::shared_ptr<Installable>> installables, bool useDeriver)
|
|
|
|
{
|
2019-12-05 18:11:09 +00:00
|
|
|
StorePathSet drvPaths;
|
Add "nix show-derivation"
This debug command prints a store derivation in JSON format. For
example:
$ nix show-derivation nixpkgs.hello
{
"/nix/store/ayjwpwwiyy04nh9z71rsdgd3q7bra7ch-hello-2.10.drv": {
"outputs": {
"out": {
"path": "/nix/store/w5w4v29ql0qwqhczkdxs94ix2lh7ibgs-hello-2.10"
}
},
"inputSrcs": [
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"inputDrvs": {
"/nix/store/13839aqdf6x4k3b785rw5f2l7857l6y3-bash-4.4-p12.drv": [
"out"
],
"/nix/store/vgdx7fdc7d4iirmnwj2py1nrvr5qwzj7-hello-2.10.tar.gz.drv": [
"out"
],
"/nix/store/x3kkd0vsqfflbvwf1055l9mr39bg0ms0-stdenv.drv": [
"out"
]
},
"platform": "x86_64-linux",
"builder": "/nix/store/qp5fw57d38bd1n07ss4zxh88zg67c3vg-bash-4.4-p12/bin/bash",
"args": [
"-e",
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"env": {
"buildInputs": "",
"builder": "/nix/store/qp5fw57d38bd1n07ss4zxh88zg67c3vg-bash-4.4-p12/bin/bash",
"configureFlags": "",
"doCheck": "1",
"name": "hello-2.10",
"nativeBuildInputs": "",
"out": "/nix/store/w5w4v29ql0qwqhczkdxs94ix2lh7ibgs-hello-2.10",
"propagatedBuildInputs": "",
"propagatedNativeBuildInputs": "",
"src": "/nix/store/3x7dwzq014bblazs7kq20p9hyzz0qh8g-hello-2.10.tar.gz",
"stdenv": "/nix/store/6zngq1rdh0ans9qyckqimqibgnlvlfrm-stdenv",
"system": "x86_64-linux"
}
}
}
This removes the need for pp-aterm.
2017-09-25 11:43:35 +00:00
|
|
|
|
|
|
|
for (auto & i : installables)
|
2020-07-23 19:02:57 +00:00
|
|
|
for (auto & b : i->toBuildables())
|
|
|
|
std::visit(overloaded {
|
|
|
|
[&](BuildableOpaque bo) {
|
|
|
|
if (!useDeriver)
|
|
|
|
throw Error("argument '%s' did not evaluate to a derivation", i->what());
|
|
|
|
auto derivers = store->queryValidDerivers(bo.path);
|
Add "nix show-derivation"
This debug command prints a store derivation in JSON format. For
example:
$ nix show-derivation nixpkgs.hello
{
"/nix/store/ayjwpwwiyy04nh9z71rsdgd3q7bra7ch-hello-2.10.drv": {
"outputs": {
"out": {
"path": "/nix/store/w5w4v29ql0qwqhczkdxs94ix2lh7ibgs-hello-2.10"
}
},
"inputSrcs": [
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"inputDrvs": {
"/nix/store/13839aqdf6x4k3b785rw5f2l7857l6y3-bash-4.4-p12.drv": [
"out"
],
"/nix/store/vgdx7fdc7d4iirmnwj2py1nrvr5qwzj7-hello-2.10.tar.gz.drv": [
"out"
],
"/nix/store/x3kkd0vsqfflbvwf1055l9mr39bg0ms0-stdenv.drv": [
"out"
]
},
"platform": "x86_64-linux",
"builder": "/nix/store/qp5fw57d38bd1n07ss4zxh88zg67c3vg-bash-4.4-p12/bin/bash",
"args": [
"-e",
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"env": {
"buildInputs": "",
"builder": "/nix/store/qp5fw57d38bd1n07ss4zxh88zg67c3vg-bash-4.4-p12/bin/bash",
"configureFlags": "",
"doCheck": "1",
"name": "hello-2.10",
"nativeBuildInputs": "",
"out": "/nix/store/w5w4v29ql0qwqhczkdxs94ix2lh7ibgs-hello-2.10",
"propagatedBuildInputs": "",
"propagatedNativeBuildInputs": "",
"src": "/nix/store/3x7dwzq014bblazs7kq20p9hyzz0qh8g-hello-2.10.tar.gz",
"stdenv": "/nix/store/6zngq1rdh0ans9qyckqimqibgnlvlfrm-stdenv",
"system": "x86_64-linux"
}
}
}
This removes the need for pp-aterm.
2017-09-25 11:43:35 +00:00
|
|
|
if (derivers.empty())
|
|
|
|
throw Error("'%s' does not have a known deriver", i->what());
|
|
|
|
// FIXME: use all derivers?
|
2020-06-16 20:20:18 +00:00
|
|
|
drvPaths.insert(*derivers.begin());
|
2020-07-23 19:02:57 +00:00
|
|
|
},
|
|
|
|
[&](BuildableFromDrv bfd) {
|
|
|
|
drvPaths.insert(bfd.drvPath);
|
|
|
|
},
|
|
|
|
}, b);
|
Add "nix show-derivation"
This debug command prints a store derivation in JSON format. For
example:
$ nix show-derivation nixpkgs.hello
{
"/nix/store/ayjwpwwiyy04nh9z71rsdgd3q7bra7ch-hello-2.10.drv": {
"outputs": {
"out": {
"path": "/nix/store/w5w4v29ql0qwqhczkdxs94ix2lh7ibgs-hello-2.10"
}
},
"inputSrcs": [
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"inputDrvs": {
"/nix/store/13839aqdf6x4k3b785rw5f2l7857l6y3-bash-4.4-p12.drv": [
"out"
],
"/nix/store/vgdx7fdc7d4iirmnwj2py1nrvr5qwzj7-hello-2.10.tar.gz.drv": [
"out"
],
"/nix/store/x3kkd0vsqfflbvwf1055l9mr39bg0ms0-stdenv.drv": [
"out"
]
},
"platform": "x86_64-linux",
"builder": "/nix/store/qp5fw57d38bd1n07ss4zxh88zg67c3vg-bash-4.4-p12/bin/bash",
"args": [
"-e",
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"env": {
"buildInputs": "",
"builder": "/nix/store/qp5fw57d38bd1n07ss4zxh88zg67c3vg-bash-4.4-p12/bin/bash",
"configureFlags": "",
"doCheck": "1",
"name": "hello-2.10",
"nativeBuildInputs": "",
"out": "/nix/store/w5w4v29ql0qwqhczkdxs94ix2lh7ibgs-hello-2.10",
"propagatedBuildInputs": "",
"propagatedNativeBuildInputs": "",
"src": "/nix/store/3x7dwzq014bblazs7kq20p9hyzz0qh8g-hello-2.10.tar.gz",
"stdenv": "/nix/store/6zngq1rdh0ans9qyckqimqibgnlvlfrm-stdenv",
"system": "x86_64-linux"
}
}
}
This removes the need for pp-aterm.
2017-09-25 11:43:35 +00:00
|
|
|
|
|
|
|
return drvPaths;
|
|
|
|
}
|
|
|
|
|
2020-05-11 13:46:18 +00:00
|
|
|
InstallablesCommand::InstallablesCommand()
|
|
|
|
{
|
|
|
|
expectArgs({
|
|
|
|
.label = "installables",
|
|
|
|
.handler = {&_installables},
|
2020-05-11 19:49:02 +00:00
|
|
|
.completer = {[&](size_t, std::string_view prefix) {
|
|
|
|
completeInstallable(prefix);
|
|
|
|
}}
|
2020-05-11 13:46:18 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-04-25 10:06:32 +00:00
|
|
|
void InstallablesCommand::prepare()
|
2017-04-25 09:20:37 +00:00
|
|
|
{
|
2019-11-26 23:05:30 +00:00
|
|
|
if (_installables.empty() && useDefaultInstallables())
|
2019-04-19 14:07:37 +00:00
|
|
|
// FIXME: commands like "nix install" should not have a
|
|
|
|
// default, probably.
|
|
|
|
_installables.push_back(".");
|
2019-04-08 14:11:17 +00:00
|
|
|
installables = parseInstallables(getStore(), _installables);
|
2017-08-29 14:18:00 +00:00
|
|
|
}
|
|
|
|
|
2020-06-08 14:20:00 +00:00
|
|
|
std::optional<FlakeRef> InstallablesCommand::getFlakeRefForCompletion()
|
|
|
|
{
|
|
|
|
if (_installables.empty()) {
|
|
|
|
if (useDefaultInstallables())
|
|
|
|
return parseFlakeRef(".", absPath("."));
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
return parseFlakeRef(_installables.front(), absPath("."));
|
|
|
|
}
|
|
|
|
|
2020-05-11 19:49:02 +00:00
|
|
|
InstallableCommand::InstallableCommand()
|
|
|
|
{
|
|
|
|
expectArgs({
|
|
|
|
.label = "installable",
|
2020-05-12 09:53:32 +00:00
|
|
|
.optional = true,
|
2020-05-11 19:49:02 +00:00
|
|
|
.handler = {&_installable},
|
|
|
|
.completer = {[&](size_t, std::string_view prefix) {
|
|
|
|
completeInstallable(prefix);
|
|
|
|
}}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-08-29 14:18:00 +00:00
|
|
|
void InstallableCommand::prepare()
|
|
|
|
{
|
2019-04-08 14:11:17 +00:00
|
|
|
installable = parseInstallable(getStore(), _installable);
|
2016-02-09 20:34:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|