2009-02-10 16:48:30 +01:00
|
|
|
/* This file contains various functions that take a stdenv and return
|
|
|
|
a new stdenv with different behaviour, e.g. using a different C
|
|
|
|
compiler. */
|
|
|
|
|
2014-02-04 16:58:12 +01:00
|
|
|
pkgs:
|
2012-10-31 13:41:54 +01:00
|
|
|
|
2009-02-10 16:48:30 +01:00
|
|
|
rec {
|
|
|
|
|
|
|
|
|
|
|
|
# Override the compiler in stdenv for specific packages.
|
2015-01-09 20:22:12 +01:00
|
|
|
overrideCC = stdenv: cc: stdenv.override { allowedRequisites = null; cc = cc; };
|
2009-02-10 16:48:30 +01:00
|
|
|
|
2012-10-31 13:41:54 +01:00
|
|
|
|
2009-02-10 16:48:30 +01:00
|
|
|
# Add some arbitrary packages to buildInputs for specific packages.
|
2010-08-06 22:23:35 +02:00
|
|
|
# Used to override packages in stdenv like Make. Should not be used
|
2009-02-10 16:48:30 +01:00
|
|
|
# for other dependencies.
|
2014-02-04 17:18:38 +01:00
|
|
|
overrideInStdenv = stdenv: pkgs:
|
2020-04-28 16:51:39 +02:00
|
|
|
stdenv.override (prev: { allowedRequisites = null; extraBuildInputs = (prev.extraBuildInputs or []) ++ pkgs; });
|
2009-02-10 16:48:30 +01:00
|
|
|
|
|
|
|
|
|
|
|
# Override the setup script of stdenv. Useful for testing new
|
|
|
|
# versions of the setup script without causing a rebuild of
|
|
|
|
# everything.
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
# randomPkg = import ../bla { ...
|
|
|
|
# stdenv = overrideSetup stdenv ../stdenv/generic/setup-latest.sh;
|
|
|
|
# };
|
2014-02-04 17:18:38 +01:00
|
|
|
overrideSetup = stdenv: setupScript: stdenv.override { inherit setupScript; };
|
2009-02-10 16:48:30 +01:00
|
|
|
|
|
|
|
|
|
|
|
# Return a modified stdenv that tries to build statically linked
|
|
|
|
# binaries.
|
2018-12-13 21:35:50 +01:00
|
|
|
makeStaticBinaries = stdenv:
|
|
|
|
let stdenv' = if stdenv.hostPlatform.libc != "glibc" then stdenv else
|
|
|
|
stdenv.override (prev: {
|
2020-04-28 16:51:39 +02:00
|
|
|
extraBuildInputs = (prev.extraBuildInputs or []) ++ [
|
2018-12-13 21:35:50 +01:00
|
|
|
stdenv.glibc.static
|
|
|
|
];
|
|
|
|
});
|
|
|
|
in stdenv' //
|
2018-12-05 04:12:17 +01:00
|
|
|
{ mkDerivation = args:
|
2018-12-13 21:35:50 +01:00
|
|
|
if stdenv'.hostPlatform.isDarwin
|
2018-12-05 04:12:17 +01:00
|
|
|
then throw "Cannot build fully static binaries on Darwin/macOS"
|
2018-12-13 21:35:50 +01:00
|
|
|
else stdenv'.mkDerivation (args // {
|
|
|
|
NIX_CFLAGS_LINK = toString (args.NIX_CFLAGS_LINK or "") + " -static";
|
2018-08-03 18:36:51 +02:00
|
|
|
configureFlags = (args.configureFlags or []) ++ [
|
|
|
|
"--disable-shared" # brrr...
|
|
|
|
];
|
2009-02-10 16:48:30 +01:00
|
|
|
});
|
2014-02-04 16:58:12 +01:00
|
|
|
};
|
2009-02-10 16:48:30 +01:00
|
|
|
|
2012-10-31 13:41:54 +01:00
|
|
|
|
2011-12-14 15:31:56 +01:00
|
|
|
# Return a modified stdenv that builds static libraries instead of
|
|
|
|
# shared libraries.
|
|
|
|
makeStaticLibraries = stdenv: stdenv //
|
2010-01-21 22:42:17 +01:00
|
|
|
{ mkDerivation = args: stdenv.mkDerivation (args // {
|
|
|
|
dontDisableStatic = true;
|
2018-08-03 18:36:51 +02:00
|
|
|
configureFlags = (args.configureFlags or []) ++ [
|
|
|
|
"--enable-static"
|
|
|
|
"--disable-shared"
|
|
|
|
];
|
2019-12-29 21:40:52 +01:00
|
|
|
cmakeFlags = (args.cmakeFlags or []) ++ [ "-DBUILD_SHARED_LIBS:BOOL=OFF" ];
|
2019-05-09 03:52:59 +02:00
|
|
|
mesonFlags = (args.mesonFlags or []) ++ [ "-Ddefault_library=static" ];
|
2010-01-21 22:42:17 +01:00
|
|
|
});
|
2014-02-04 16:58:12 +01:00
|
|
|
};
|
2010-01-21 22:42:17 +01:00
|
|
|
|
2019-07-24 16:04:51 +02:00
|
|
|
|
|
|
|
/* Modify a stdenv so that all buildInputs are implicitly propagated to
|
|
|
|
consuming derivations
|
|
|
|
*/
|
|
|
|
propagateBuildInputs = stdenv: stdenv //
|
|
|
|
{ mkDerivation = args: stdenv.mkDerivation (args // {
|
|
|
|
propagatedBuildInputs = (args.propagatedBuildInputs or []) ++ (args.buildInputs or []);
|
|
|
|
buildInputs = [];
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2009-03-30 15:22:19 +02:00
|
|
|
/* Modify a stdenv so that the specified attributes are added to
|
|
|
|
every derivation returned by its mkDerivation function.
|
|
|
|
|
|
|
|
Example:
|
|
|
|
stdenvNoOptimise =
|
|
|
|
addAttrsToDerivation
|
|
|
|
{ NIX_CFLAGS_COMPILE = "-O0"; }
|
|
|
|
stdenv;
|
|
|
|
*/
|
|
|
|
addAttrsToDerivation = extraAttrs: stdenv: stdenv //
|
|
|
|
{ mkDerivation = args: stdenv.mkDerivation (args // extraAttrs); };
|
|
|
|
|
|
|
|
|
2009-08-28 18:45:56 +02:00
|
|
|
/* Return a modified stdenv that builds packages with GCC's coverage
|
|
|
|
instrumentation. The coverage note files (*.gcno) are stored in
|
2009-09-01 23:56:46 +02:00
|
|
|
$out/.build, along with the source code of the package, to enable
|
|
|
|
programs like lcov to produce pretty-printed reports.
|
2009-08-28 18:45:56 +02:00
|
|
|
*/
|
|
|
|
addCoverageInstrumentation = stdenv:
|
2014-03-03 13:39:30 +01:00
|
|
|
overrideInStdenv stdenv [ pkgs.enableGCOVInstrumentation pkgs.keepBuildTree ];
|
2012-10-31 13:41:54 +01:00
|
|
|
|
2009-11-16 23:23:11 +01:00
|
|
|
|
|
|
|
/* Replace the meta.maintainers field of a derivation. This is useful
|
|
|
|
when you want to fork to update some packages without disturbing other
|
|
|
|
developers.
|
|
|
|
|
|
|
|
e.g.: in all-packages.nix:
|
|
|
|
|
|
|
|
# remove all maintainers.
|
|
|
|
defaultStdenv = replaceMaintainersField allStdenvs.stdenv pkgs [];
|
|
|
|
*/
|
|
|
|
replaceMaintainersField = stdenv: pkgs: maintainers: stdenv //
|
|
|
|
{ mkDerivation = args:
|
2021-01-27 06:59:00 +01:00
|
|
|
pkgs.lib.recursiveUpdate
|
2009-11-16 23:23:11 +01:00
|
|
|
(stdenv.mkDerivation args)
|
|
|
|
{ meta.maintainers = maintainers; };
|
|
|
|
};
|
2009-11-21 18:50:00 +01:00
|
|
|
|
|
|
|
|
|
|
|
/* Use the trace output to report all processed derivations with their
|
|
|
|
license name.
|
|
|
|
*/
|
|
|
|
traceDrvLicenses = stdenv: stdenv //
|
|
|
|
{ mkDerivation = args:
|
|
|
|
let
|
|
|
|
pkg = stdenv.mkDerivation args;
|
|
|
|
printDrvPath = val: let
|
|
|
|
drvPath = builtins.unsafeDiscardStringContext pkg.drvPath;
|
2012-12-28 19:35:35 +01:00
|
|
|
license = pkg.meta.license or null;
|
2009-11-21 18:50:00 +01:00
|
|
|
in
|
2012-12-28 19:35:35 +01:00
|
|
|
builtins.trace "@:drv:${toString drvPath}:${builtins.toString license}:@" val;
|
2009-11-21 18:50:00 +01:00
|
|
|
in pkg // {
|
|
|
|
outPath = printDrvPath pkg.outPath;
|
|
|
|
drvPath = printDrvPath pkg.drvPath;
|
|
|
|
};
|
|
|
|
};
|
2009-11-22 18:04:33 +01:00
|
|
|
|
2012-10-31 13:41:54 +01:00
|
|
|
|
2009-11-22 18:04:33 +01:00
|
|
|
/* Abort if the license predicate is not verified for a derivation
|
|
|
|
declared with mkDerivation.
|
|
|
|
|
|
|
|
One possible predicate to avoid all non-free packages can be achieved
|
|
|
|
with the following function:
|
|
|
|
|
|
|
|
isFree = license: with builtins;
|
2019-04-24 05:48:22 +02:00
|
|
|
if license == null then true
|
2009-11-22 18:04:33 +01:00
|
|
|
else if isList license then lib.all isFree license
|
|
|
|
else license != "non-free" && license != "unfree";
|
|
|
|
|
|
|
|
This adapter can be defined on the defaultStdenv definition. You can
|
|
|
|
use it by patching the all-packages.nix file or by using the override
|
2017-02-01 16:03:42 +01:00
|
|
|
feature of ~/.config/nixpkgs/config.nix .
|
2009-11-22 18:04:33 +01:00
|
|
|
*/
|
|
|
|
validateLicenses = licensePred: stdenv: stdenv //
|
|
|
|
{ mkDerivation = args:
|
|
|
|
let
|
|
|
|
pkg = stdenv.mkDerivation args;
|
2011-11-20 21:53:15 +01:00
|
|
|
drv = builtins.unsafeDiscardStringContext pkg.drvPath;
|
2009-11-22 18:04:33 +01:00
|
|
|
license =
|
2012-12-28 19:35:35 +01:00
|
|
|
pkg.meta.license or
|
2011-11-20 21:53:15 +01:00
|
|
|
# Fixed-output derivations such as source tarballs usually
|
|
|
|
# don't have licensing information, but that's OK.
|
2012-12-28 19:35:35 +01:00
|
|
|
(pkg.outputHash or
|
|
|
|
(builtins.trace
|
|
|
|
"warning: ${drv} lacks licensing information" null));
|
2009-11-22 18:04:33 +01:00
|
|
|
|
|
|
|
validate = arg:
|
|
|
|
if licensePred license then arg
|
2011-11-20 21:42:05 +01:00
|
|
|
else abort ''
|
2011-11-20 21:53:15 +01:00
|
|
|
while building ${drv}:
|
2011-11-20 21:42:05 +01:00
|
|
|
license `${builtins.toString license}' does not pass the predicate.
|
|
|
|
'';
|
2009-11-22 18:04:33 +01:00
|
|
|
|
|
|
|
in pkg // {
|
|
|
|
outPath = validate pkg.outPath;
|
|
|
|
drvPath = validate pkg.drvPath;
|
|
|
|
};
|
|
|
|
};
|
2012-10-31 13:41:54 +01:00
|
|
|
|
|
|
|
|
|
|
|
/* Modify a stdenv so that it produces debug builds; that is,
|
|
|
|
binaries have debug info, and compiler optimisations are
|
|
|
|
disabled. */
|
|
|
|
keepDebugInfo = stdenv: stdenv //
|
|
|
|
{ mkDerivation = args: stdenv.mkDerivation (args // {
|
|
|
|
dontStrip = true;
|
2015-08-10 09:10:35 +02:00
|
|
|
NIX_CFLAGS_COMPILE = toString (args.NIX_CFLAGS_COMPILE or "") + " -ggdb -Og";
|
2012-10-31 13:41:54 +01:00
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2014-02-04 16:58:12 +01:00
|
|
|
|
2014-10-10 14:01:38 +02:00
|
|
|
/* Modify a stdenv so that it uses the Gold linker. */
|
|
|
|
useGoldLinker = stdenv: stdenv //
|
|
|
|
{ mkDerivation = args: stdenv.mkDerivation (args // {
|
2015-05-04 14:00:12 +02:00
|
|
|
NIX_CFLAGS_LINK = toString (args.NIX_CFLAGS_LINK or "") + " -fuse-ld=gold";
|
2014-10-10 14:01:38 +02:00
|
|
|
});
|
|
|
|
};
|
2018-03-21 23:22:05 +01:00
|
|
|
|
|
|
|
|
|
|
|
/* Modify a stdenv so that it builds binaries optimized specifically
|
|
|
|
for the machine they are built on.
|
|
|
|
|
|
|
|
WARNING: this breaks purity! */
|
|
|
|
impureUseNativeOptimizations = stdenv: stdenv //
|
|
|
|
{ mkDerivation = args: stdenv.mkDerivation (args // {
|
|
|
|
NIX_CFLAGS_COMPILE = toString (args.NIX_CFLAGS_COMPILE or "") + " -march=native";
|
|
|
|
NIX_ENFORCE_NO_NATIVE = false;
|
|
|
|
|
|
|
|
preferLocalBuild = true;
|
|
|
|
allowSubstitutes = false;
|
|
|
|
});
|
|
|
|
};
|
2009-03-30 15:22:19 +02:00
|
|
|
}
|