2013-10-01 13:45:14 +02:00
|
|
|
/* Hydra job to build a tarball for Nixpkgs from a Git checkout. It
|
2009-03-09 18:49:13 +01:00
|
|
|
also builds the documentation and tests whether the Nix expressions
|
|
|
|
evaluate correctly. */
|
|
|
|
|
2016-01-19 21:25:08 +01:00
|
|
|
{ nixpkgs
|
|
|
|
, officialRelease
|
|
|
|
, pkgs ? import nixpkgs.outPath {}
|
|
|
|
, nix ? pkgs.nix
|
2019-07-10 11:45:52 +02:00
|
|
|
, lib-tests ? import ../../lib/tests/release.nix { inherit pkgs; }
|
2016-01-19 21:25:08 +01:00
|
|
|
}:
|
2009-03-09 18:49:13 +01:00
|
|
|
|
2015-10-23 13:04:10 +02:00
|
|
|
with pkgs;
|
2009-03-09 18:49:13 +01:00
|
|
|
|
2019-08-13 23:52:01 +02:00
|
|
|
releaseTools.sourceTarball {
|
2009-03-09 18:49:13 +01:00
|
|
|
name = "nixpkgs-tarball";
|
|
|
|
src = nixpkgs;
|
|
|
|
|
2013-10-01 13:45:14 +02:00
|
|
|
inherit officialRelease;
|
2016-08-01 11:34:54 +02:00
|
|
|
version = pkgs.lib.fileContents ../../.version;
|
2019-05-29 21:28:33 +02:00
|
|
|
versionSuffix = "pre${
|
|
|
|
if nixpkgs ? lastModified
|
|
|
|
then builtins.substring 0 8 nixpkgs.lastModified
|
2020-02-10 16:25:33 +01:00
|
|
|
else toString nixpkgs.revCount}.${nixpkgs.shortRev or "dirty"}";
|
2012-06-04 06:12:17 +02:00
|
|
|
|
2019-07-10 11:45:52 +02:00
|
|
|
buildInputs = [ nix.out jq lib-tests ];
|
2009-03-09 18:49:13 +01:00
|
|
|
|
|
|
|
configurePhase = ''
|
|
|
|
eval "$preConfigure"
|
2012-06-04 06:12:17 +02:00
|
|
|
releaseName=nixpkgs-$VERSION$VERSION_SUFFIX
|
2013-10-01 13:45:14 +02:00
|
|
|
echo -n $VERSION_SUFFIX > .version-suffix
|
2020-02-10 16:25:33 +01:00
|
|
|
echo -n ${nixpkgs.rev or nixpkgs.shortRev or "dirty"} > .git-revision
|
2009-03-09 18:49:13 +01:00
|
|
|
echo "release name is $releaseName"
|
2017-10-11 05:06:45 +02:00
|
|
|
echo "git-revision is $(cat .git-revision)"
|
2009-03-09 18:49:13 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
dontBuild = false;
|
|
|
|
|
|
|
|
doCheck = true;
|
|
|
|
|
|
|
|
checkPhase = ''
|
2012-05-13 21:10:57 +02:00
|
|
|
export NIX_DB_DIR=$TMPDIR
|
2012-05-15 16:37:24 +02:00
|
|
|
export NIX_STATE_DIR=$TMPDIR
|
2015-12-02 15:58:30 +01:00
|
|
|
export NIX_PATH=nixpkgs=$TMPDIR/barf.nix
|
2016-12-15 13:06:05 +01:00
|
|
|
opts=(--option build-users-group "")
|
2012-05-13 21:10:57 +02:00
|
|
|
nix-store --init
|
2012-11-29 14:10:49 +01:00
|
|
|
|
2015-12-02 15:58:30 +01:00
|
|
|
echo 'abort "Illegal use of <nixpkgs> in Nixpkgs."' > $TMPDIR/barf.nix
|
|
|
|
|
2018-07-04 17:21:33 +02:00
|
|
|
# Make sure that Nixpkgs does not use <nixpkgs>.
|
2017-12-07 15:57:06 +01:00
|
|
|
badFiles=$(find pkgs -type f -name '*.nix' -print | xargs grep -l '^[^#]*<nixpkgs\/' || true)
|
|
|
|
if [[ -n $badFiles ]]; then
|
2015-12-02 15:58:30 +01:00
|
|
|
echo "Nixpkgs is not allowed to use <nixpkgs> to refer to itself."
|
2017-12-07 15:57:06 +01:00
|
|
|
echo "The offending files: $badFiles"
|
2015-12-02 15:58:30 +01:00
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2014-04-20 00:07:14 +02:00
|
|
|
# Make sure that derivation paths do not depend on the Nixpkgs path.
|
|
|
|
mkdir $TMPDIR/foo
|
|
|
|
ln -s $(readlink -f .) $TMPDIR/foo/bar
|
2016-03-13 19:24:55 +01:00
|
|
|
p1=$(nix-instantiate ./. --dry-run -A firefox --show-trace)
|
2018-09-03 14:23:35 +02:00
|
|
|
p2=$(nix-instantiate $TMPDIR/foo/bar --dry-run -A firefox --show-trace)
|
2014-04-20 00:07:14 +02:00
|
|
|
if [ "$p1" != "$p2" ]; then
|
|
|
|
echo "Nixpkgs evaluation depends on Nixpkgs path ($p1 vs $p2)!"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2015-10-09 23:21:57 +02:00
|
|
|
# Check that all-packages.nix evaluates on a number of platforms without any warnings.
|
2015-03-06 13:16:10 +01:00
|
|
|
for platform in i686-linux x86_64-linux x86_64-darwin; do
|
2015-12-02 15:58:30 +01:00
|
|
|
header "checking Nixpkgs on $platform"
|
2015-10-09 23:21:57 +02:00
|
|
|
|
2016-11-30 15:21:30 +01:00
|
|
|
nix-env -f . \
|
2009-08-26 19:09:02 +02:00
|
|
|
--show-trace --argstr system "$platform" \
|
2016-12-15 13:06:05 +01:00
|
|
|
-qa --drv-path --system-filter \* --system \
|
|
|
|
"''${opts[@]}" 2>&1 >/dev/null | tee eval-warnings.log
|
2015-10-09 23:21:57 +02:00
|
|
|
|
|
|
|
if [ -s eval-warnings.log ]; then
|
2015-12-02 15:58:30 +01:00
|
|
|
echo "Nixpkgs on $platform evaluated with warnings, aborting"
|
2015-10-09 23:21:57 +02:00
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
rm eval-warnings.log
|
|
|
|
|
2016-11-30 15:21:30 +01:00
|
|
|
nix-env -f . \
|
2015-05-12 14:29:16 +02:00
|
|
|
--show-trace --argstr system "$platform" \
|
2016-12-15 13:06:05 +01:00
|
|
|
-qa --drv-path --system-filter \* --system --meta --xml \
|
|
|
|
"''${opts[@]}" > /dev/null
|
2009-03-09 18:49:13 +01:00
|
|
|
stopNest
|
|
|
|
done
|
2010-08-19 16:33:44 +02:00
|
|
|
|
|
|
|
header "checking eval-release.nix"
|
2014-04-20 00:07:14 +02:00
|
|
|
nix-instantiate --eval --strict --show-trace ./maintainers/scripts/eval-release.nix > /dev/null
|
2010-08-19 16:33:44 +02:00
|
|
|
stopNest
|
2014-02-19 13:01:33 +01:00
|
|
|
|
|
|
|
header "checking find-tarballs.nix"
|
2018-07-04 17:21:33 +02:00
|
|
|
nix-instantiate --readonly-mode --eval --strict --show-trace --json \
|
2015-12-16 13:59:02 +01:00
|
|
|
./maintainers/scripts/find-tarballs.nix \
|
|
|
|
--arg expr 'import ./maintainers/scripts/all-tarballs.nix' > $TMPDIR/tarballs.json
|
|
|
|
nrUrls=$(jq -r '.[].url' < $TMPDIR/tarballs.json | wc -l)
|
|
|
|
echo "found $nrUrls URLs"
|
|
|
|
if [ "$nrUrls" -lt 10000 ]; then
|
|
|
|
echo "suspiciously low number of URLs"
|
|
|
|
exit 1
|
|
|
|
fi
|
2014-02-19 13:01:33 +01:00
|
|
|
stopNest
|
2009-03-09 18:49:13 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
distPhase = ''
|
2012-01-18 21:16:00 +01:00
|
|
|
mkdir -p $out/tarballs
|
2009-03-09 18:49:13 +01:00
|
|
|
mkdir ../$releaseName
|
|
|
|
cp -prd . ../$releaseName
|
2013-01-30 12:51:29 +01:00
|
|
|
(cd .. && tar cfa $out/tarballs/$releaseName.tar.xz $releaseName) || false
|
2009-03-09 18:49:13 +01:00
|
|
|
'';
|
2009-07-08 17:56:05 +02:00
|
|
|
|
|
|
|
meta = {
|
2010-01-29 13:26:12 +01:00
|
|
|
maintainers = [ lib.maintainers.all ];
|
2009-07-08 17:56:05 +02:00
|
|
|
};
|
2009-03-09 18:49:13 +01:00
|
|
|
}
|