lix/release.nix

436 lines
14 KiB
Nix
Raw Normal View History

{ nix ? builtins.fetchGit ./.
2019-10-25 13:23:05 +02:00
, nixpkgs ? builtins.fetchTarball https://github.com/NixOS/nixpkgs-channels/archive/nixos-19.09.tar.gz
2010-03-10 14:07:37 +01:00
, officialRelease ? false
, systems ? [ "x86_64-linux" "i686-linux" "x86_64-darwin" "aarch64-linux" ]
2010-03-10 14:07:37 +01:00
}:
2008-12-04 16:25:28 +01:00
let
pkgs = import nixpkgs { system = builtins.currentSystem or "x86_64-linux"; };
2013-03-15 13:18:49 +01:00
2008-12-04 16:25:28 +01:00
jobs = rec {
# Create a "vendor" directory that contains the crates listed in
# Cargo.lock, and include it in the Nix tarball. This allows Nix
# to be built without network access.
vendoredCrates =
let
lockFile = builtins.fromTOML (builtins.readFile nix-rust/Cargo.lock);
files = map (pkg: import <nix/fetchurl.nix> {
url = "https://crates.io/api/v1/crates/${pkg.name}/${pkg.version}/download";
sha256 = lockFile.metadata."checksum ${pkg.name} ${pkg.version} (registry+https://github.com/rust-lang/crates.io-index)";
}) (builtins.filter (pkg: pkg.source or "" == "registry+https://github.com/rust-lang/crates.io-index") lockFile.package);
in pkgs.runCommand "cargo-vendor-dir" {}
''
mkdir -p $out/vendor
cat > $out/vendor/config <<EOF
[source.crates-io]
replace-with = "vendored-sources"
[source.vendored-sources]
directory = "vendor"
EOF
${toString (builtins.map (file: ''
mkdir $out/vendor/tmp
tar xvf ${file} -C $out/vendor/tmp
dir=$(echo $out/vendor/tmp/*)
# Add just enough metadata to keep Cargo happy.
printf '{"files":{},"package":"${file.outputHash}"}' > "$dir/.cargo-checksum.json"
# Clean up some cruft from the winapi crates. FIXME: find
# a way to remove winapi* from our dependencies.
if [[ $dir =~ /winapi ]]; then
find $dir -name "*.a" -print0 | xargs -0 rm -f --
fi
mv "$dir" $out/vendor/
rm -rf $out/vendor/tmp
'') files)}
'';
2008-12-04 16:25:28 +01:00
tarball =
2013-03-15 13:18:49 +01:00
with pkgs;
with import ./release-common.nix { inherit pkgs; };
releaseTools.sourceTarball {
2008-12-04 16:25:28 +01:00
name = "nix-tarball";
version = builtins.readFile ./.version;
versionSuffix = if officialRelease then "" else "pre${toString nix.revCount}_${nix.shortRev}";
2017-01-27 16:13:22 +01:00
src = nix;
2008-12-04 16:25:28 +01:00
inherit officialRelease;
buildInputs = tarballDeps ++ buildDeps;
2008-12-04 16:25:28 +01:00
postUnpack = ''
(cd $sourceRoot && find . -type f) | cut -c3- > $sourceRoot/.dist-files
cat $sourceRoot/.dist-files
'';
2008-12-04 16:25:28 +01:00
preConfigure = ''
(cd perl ; autoreconf --install --force --verbose)
2009-08-03 14:24:20 +02:00
# TeX needs a writable font cache.
export VARTEXFONTS=$TMPDIR/texfonts
2008-12-04 16:25:28 +01:00
'';
2012-12-06 16:55:57 +01:00
distPhase =
''
cp -prd ${vendoredCrates}/vendor/ nix-rust/vendor/
2012-12-06 16:55:57 +01:00
runHook preDist
2014-02-01 15:18:48 +01:00
make dist
2012-12-06 16:55:57 +01:00
mkdir -p $out/tarballs
cp *.tar.* $out/tarballs
'';
preDist = ''
2014-02-01 15:18:48 +01:00
make install docdir=$out/share/doc/nix makefiles=doc/manual/local.mk
2009-05-07 15:22:26 +02:00
echo "doc manual $out/share/doc/nix/manual" >> $out/nix-support/hydra-build-products
'';
2008-12-04 16:25:28 +01:00
};
2008-12-04 16:25:28 +01:00
2013-03-15 13:18:49 +01:00
build = pkgs.lib.genAttrs systems (system:
2008-12-04 16:25:28 +01:00
2018-03-19 11:57:34 +01:00
let pkgs = import nixpkgs { inherit system; }; in
with pkgs;
2008-12-04 16:25:28 +01:00
with import ./release-common.nix { inherit pkgs; };
2008-12-04 16:25:28 +01:00
releaseTools.nixBuild {
2009-03-06 18:00:58 +01:00
name = "nix";
2008-12-04 16:25:28 +01:00
src = tarball;
buildInputs = buildDeps;
2008-12-04 16:25:28 +01:00
preConfigure =
# Copy libboost_context so we don't get all of Boost in our closure.
# https://github.com/NixOS/nixpkgs/issues/45462
''
mkdir -p $out/lib
cp -pd ${boost}/lib/{libboost_context*,libboost_thread*,libboost_system*} $out/lib
rm -f $out/lib/*.a
${lib.optionalString stdenv.isLinux ''
chmod u+w $out/lib/*.so.*
patchelf --set-rpath $out/lib:${stdenv.cc.cc.lib}/lib $out/lib/libboost_thread.so.*
''}
'';
configureFlags = configureFlags ++
[ "--sysconfdir=/etc" ];
enableParallelBuilding = true;
makeFlags = "profiledir=$(out)/etc/profile.d";
2013-01-02 22:12:19 +01:00
installFlags = "sysconfdir=$(out)/etc";
doInstallCheck = true;
2014-02-01 15:37:50 +01:00
installCheckFlags = "sysconfdir=$(out)/etc";
2013-03-15 13:18:49 +01:00
});
2008-12-04 16:25:28 +01:00
2017-03-31 15:54:15 +02:00
perlBindings = pkgs.lib.genAttrs systems (system:
let pkgs = import nixpkgs { inherit system; }; in with pkgs;
releaseTools.nixBuild {
name = "nix-perl";
src = tarball;
buildInputs =
[ jobs.build.${system} curl bzip2 xz pkgconfig pkgs.perl boost ]
++ lib.optional (stdenv.isLinux || stdenv.isDarwin) libsodium;
2017-03-30 22:51:50 +02:00
configureFlags = ''
--with-dbi=${perlPackages.DBI}/${pkgs.perl.libPrefix}
--with-dbd-sqlite=${perlPackages.DBDSQLite}/${pkgs.perl.libPrefix}
'';
enableParallelBuilding = true;
2017-03-30 22:51:50 +02:00
postUnpack = "sourceRoot=$sourceRoot/perl";
});
2013-03-15 13:18:49 +01:00
binaryTarball = pkgs.lib.genAttrs systems (system:
with import nixpkgs { inherit system; };
let
2013-03-15 13:18:49 +01:00
toplevel = builtins.getAttr system jobs.build;
version = toplevel.src.version;
installerClosureInfo = closureInfo { rootPaths = [ toplevel cacert ]; };
in
runCommand "nix-binary-tarball-${version}"
{ #nativeBuildInputs = lib.optional (system != "aarch64-linux") shellcheck;
meta.description = "Distribution-independent Nix bootstrap binaries for ${system}";
}
''
cp ${installerClosureInfo}/registration $TMPDIR/reginfo
substitute ${./scripts/install-nix-from-closure.sh} $TMPDIR/install \
--subst-var-by nix ${toplevel} \
--subst-var-by cacert ${cacert}
substitute ${./scripts/install-darwin-multi-user.sh} $TMPDIR/install-darwin-multi-user.sh \
--subst-var-by nix ${toplevel} \
--subst-var-by cacert ${cacert}
substitute ${./scripts/install-systemd-multi-user.sh} $TMPDIR/install-systemd-multi-user.sh \
--subst-var-by nix ${toplevel} \
--subst-var-by cacert ${cacert}
substitute ${./scripts/install-multi-user.sh} $TMPDIR/install-multi-user \
--subst-var-by nix ${toplevel} \
--subst-var-by cacert ${cacert}
2017-07-09 18:38:32 +02:00
if type -p shellcheck; then
# SC1090: Don't worry about not being able to find
# $nix/etc/profile.d/nix.sh
shellcheck --exclude SC1090 $TMPDIR/install
shellcheck $TMPDIR/install-darwin-multi-user.sh
shellcheck $TMPDIR/install-systemd-multi-user.sh
# SC1091: Don't panic about not being able to source
# /etc/profile
# SC2002: Ignore "useless cat" "error", when loading
# .reginfo, as the cat is a much cleaner
# implementation, even though it is "useless"
# SC2116: Allow ROOT_HOME=$(echo ~root) for resolving
# root's home directory
shellcheck --external-sources \
--exclude SC1091,SC2002,SC2116 $TMPDIR/install-multi-user
fi
2017-07-09 18:38:32 +02:00
chmod +x $TMPDIR/install
chmod +x $TMPDIR/install-darwin-multi-user.sh
chmod +x $TMPDIR/install-systemd-multi-user.sh
chmod +x $TMPDIR/install-multi-user
dir=nix-${version}-${system}
fn=$out/$dir.tar.xz
mkdir -p $out/nix-support
echo "file binary-dist $fn" >> $out/nix-support/hydra-build-products
tar cvfJ $fn \
--owner=0 --group=0 --mode=u+rw,uga+r \
--absolute-names \
--hard-dereference \
--transform "s,$TMPDIR/install,$dir/install," \
--transform "s,$TMPDIR/reginfo,$dir/.reginfo," \
--transform "s,$NIX_STORE,$dir/store,S" \
$TMPDIR/install $TMPDIR/install-darwin-multi-user.sh \
$TMPDIR/install-systemd-multi-user.sh \
$TMPDIR/install-multi-user $TMPDIR/reginfo \
$(cat ${installerClosureInfo}/store-paths)
2013-03-15 13:18:49 +01:00
'');
2009-09-17 19:44:13 +02:00
2008-12-04 16:25:28 +01:00
coverage =
2018-03-20 14:55:47 +01:00
with pkgs;
with import ./release-common.nix { inherit pkgs; };
2008-12-04 16:25:28 +01:00
releaseTools.coverageAnalysis {
name = "nix-build";
src = tarball;
2018-03-20 14:55:47 +01:00
buildInputs = buildDeps;
2008-12-04 16:25:28 +01:00
2012-03-19 17:05:42 +01:00
dontInstall = false;
2012-05-12 05:30:47 +02:00
doInstallCheck = true;
2012-08-27 17:28:48 +02:00
2019-10-22 20:12:23 +02:00
lcovFilter = [ "*/boost/*" "*-tab.*" ];
2008-12-04 16:25:28 +01:00
# We call `dot', and even though we just use it to
# syntax-check generated dot files, it still requires some
# fonts. So provide those.
FONTCONFIG_FILE = texFunctions.fontsConf;
};
2012-08-27 17:28:48 +02:00
#rpm_fedora27x86_64 = makeRPM_x86_64 (diskImageFunsFun: diskImageFunsFun.fedora27x86_64) [ ];
#deb_debian8i386 = makeDeb_i686 (diskImageFuns: diskImageFuns.debian8i386) [ "libsodium-dev" ] [ "libsodium13" ];
#deb_debian8x86_64 = makeDeb_x86_64 (diskImageFunsFun: diskImageFunsFun.debian8x86_64) [ "libsodium-dev" ] [ "libsodium13" ];
2016-04-29 17:11:51 +02:00
#deb_ubuntu1710i386 = makeDeb_i686 (diskImageFuns: diskImageFuns.ubuntu1710i386) [ ] [ "libsodium18" ];
#deb_ubuntu1710x86_64 = makeDeb_x86_64 (diskImageFuns: diskImageFuns.ubuntu1710x86_64) [ ] [ "libsodium18" "libboost-context1.62.0" ];
2008-12-04 16:25:28 +01:00
# System tests.
tests.remoteBuilds = (import ./tests/remote-builds.nix rec {
inherit nixpkgs;
2013-03-25 21:59:11 +01:00
nix = build.x86_64-linux; system = "x86_64-linux";
2014-09-05 11:49:35 +02:00
});
2011-10-11 15:58:47 +02:00
tests.nix-copy-closure = (import ./tests/nix-copy-closure.nix rec {
inherit nixpkgs;
2013-03-25 21:59:11 +01:00
nix = build.x86_64-linux; system = "x86_64-linux";
2014-09-05 11:49:35 +02:00
});
tests.setuid = pkgs.lib.genAttrs
2018-02-07 14:15:20 +01:00
["i686-linux" "x86_64-linux"]
(system:
import ./tests/setuid.nix rec {
inherit nixpkgs;
nix = build.${system}; inherit system;
});
2017-05-29 14:19:11 +02:00
tests.binaryTarball =
with import nixpkgs { system = "x86_64-linux"; };
vmTools.runInLinuxImage (runCommand "nix-binary-tarball-test"
{ diskImage = vmTools.diskImages.ubuntu1204x86_64;
}
''
set -x
useradd -m alice
su - alice -c 'tar xf ${binaryTarball.x86_64-linux}/*.tar.*'
mkdir /dest-nix
mount -o bind /dest-nix /nix # Provide a writable /nix.
chown alice /nix
su - alice -c '_NIX_INSTALLER_TEST=1 ./nix-*/install'
su - alice -c 'nix-store --verify'
su - alice -c 'PAGER= nix-store -qR ${build.x86_64-linux}'
2018-08-30 17:10:28 +02:00
# Check whether 'nix upgrade-nix' works.
cat > /tmp/paths.nix <<EOF
{
x86_64-linux = "${build.x86_64-linux}";
}
EOF
2019-11-06 10:35:31 +01:00
su - alice -c 'nix --experimental-features nix-command upgrade-nix -vvv --nix-store-paths-url file:///tmp/paths.nix'
(! [ -L /home/alice/.profile-1-link ])
2018-08-30 17:10:28 +02:00
su - alice -c 'PAGER= nix-store -qR ${build.x86_64-linux}'
2014-11-18 18:40:47 +01:00
mkdir -p $out/nix-support
touch $out/nix-support/hydra-build-products
umount /nix
''); # */
/*
2016-01-19 21:10:32 +01:00
tests.evalNixpkgs =
import (nixpkgs + "/pkgs/top-level/make-tarball.nix") {
2016-01-19 21:10:32 +01:00
inherit nixpkgs;
inherit pkgs;
nix = build.x86_64-linux;
officialRelease = false;
};
tests.evalNixOS =
pkgs.runCommand "eval-nixos" { buildInputs = [ build.x86_64-linux ]; }
''
export NIX_STATE_DIR=$TMPDIR
nix-instantiate ${nixpkgs}/nixos/release-combined.nix -A tested --dry-run \
--arg nixpkgs '{ outPath = ${nixpkgs}; revCount = 123; shortRev = "abcdefgh"; }'
2016-01-19 21:10:32 +01:00
touch $out
'';
*/
2016-01-19 21:10:32 +01:00
installerScript =
pkgs.runCommand "installer-script"
{ buildInputs = [ build.x86_64-linux ];
}
''
mkdir -p $out/nix-support
substitute ${./scripts/install.in} $out/install \
${pkgs.lib.concatMapStrings
(system: "--replace '@binaryTarball_${system}@' $(nix --experimental-features nix-command hash-file --base16 --type sha256 ${binaryTarball.${system}}/*.tar.xz) ")
[ "x86_64-linux" "i686-linux" "x86_64-darwin" "aarch64-linux" ]
} \
--replace '@nixVersion@' ${build.x86_64-linux.src.version}
echo "file installer $out/install" >> $out/nix-support/hydra-build-products
'';
# Aggregate job containing the release-critical jobs.
release = pkgs.releaseTools.aggregate {
name = "nix-${tarball.version}";
meta.description = "Release-critical builds";
constituents =
[ tarball
build.i686-linux
build.x86_64-darwin
build.x86_64-linux
build.aarch64-linux
binaryTarball.i686-linux
binaryTarball.x86_64-darwin
binaryTarball.x86_64-linux
binaryTarball.aarch64-linux
tests.remoteBuilds
tests.nix-copy-closure
tests.binaryTarball
#tests.evalNixpkgs
#tests.evalNixOS
installerScript
];
};
2008-12-04 16:25:28 +01:00
};
2008-12-04 18:54:14 +01:00
makeRPM_i686 = makeRPM "i686-linux";
makeRPM_x86_64 = makeRPM "x86_64-linux";
2012-08-27 17:28:48 +02:00
makeRPM =
2015-02-10 11:33:07 +01:00
system: diskImageFun: extraPackages:
2008-12-04 16:25:28 +01:00
with import nixpkgs { inherit system; };
2008-12-04 16:25:28 +01:00
releaseTools.rpmBuild rec {
2012-09-13 23:23:12 +02:00
name = "nix-rpm";
2010-03-10 14:07:37 +01:00
src = jobs.tarball;
diskImage = (diskImageFun vmTools.diskImageFuns)
2015-02-10 11:33:07 +01:00
{ extraPackages =
[ "sqlite" "sqlite-devel" "bzip2-devel" "libcurl-devel" "openssl-devel" "xz-devel" "libseccomp-devel" "libsodium-devel" "boost-devel" "bison" "flex" ]
2015-02-10 11:33:07 +01:00
++ extraPackages; };
2018-01-05 01:44:32 +01:00
# At most 2047MB can be simulated in qemu-system-i386
memSize = 2047;
meta.schedulingPriority = 50;
2012-05-01 22:31:56 +02:00
postRPMInstall = "cd /tmp/rpmout/BUILD/nix-* && make installcheck";
#enableParallelBuilding = true;
2008-12-04 16:25:28 +01:00
};
2008-12-04 18:54:14 +01:00
makeDeb_i686 = makeDeb "i686-linux";
makeDeb_x86_64 = makeDeb "x86_64-linux";
2012-08-27 17:28:48 +02:00
2008-12-04 16:25:28 +01:00
makeDeb =
2016-04-29 17:11:51 +02:00
system: diskImageFun: extraPackages: extraDebPackages:
2008-12-04 16:25:28 +01:00
with import nixpkgs { inherit system; };
2008-12-04 16:25:28 +01:00
releaseTools.debBuild {
name = "nix-deb";
2010-03-10 14:07:37 +01:00
src = jobs.tarball;
diskImage = (diskImageFun vmTools.diskImageFuns)
{ extraPackages =
[ "libsqlite3-dev" "libbz2-dev" "libcurl-dev" "libcurl3-nss" "libssl-dev" "liblzma-dev" "libseccomp-dev" "libsodium-dev" "libboost-all-dev" ]
++ extraPackages; };
memSize = 2047;
meta.schedulingPriority = 50;
2016-04-29 17:11:51 +02:00
postInstall = "make installcheck";
configureFlags = "--sysconfdir=/etc";
debRequires =
2017-06-01 14:28:21 +02:00
[ "curl" "libsqlite3-0" "libbz2-1.0" "bzip2" "xz-utils" "libssl1.0.0" "liblzma5" "libseccomp2" ]
2016-04-29 17:11:51 +02:00
++ extraDebPackages;
2014-02-06 14:21:14 +01:00
debMaintainer = "Eelco Dolstra <eelco.dolstra@logicblox.com>";
2012-05-12 05:30:47 +02:00
doInstallCheck = true;
#enableParallelBuilding = true;
};
2008-12-04 16:25:28 +01:00
in jobs