0901dfb214
When we "fix" libtool, we empty out its system library path to avoid it discovering libraries in e.g. /usr when the sandbox is disabled. But this also means that the checks libtool does to make sure it can find the libraries its supposed to be linking to won't work. On Linux and Darwin, this isn't a problem, because libtool doesn't actually perform any checks, but it is on at least NetBSD and Cygwin[1]. So, we force libtool not to do these checks on any platform, bringing the more exotic platforms into line with the existing behaviour on Linux and Darwin. Without this change, lots of library packages produce warnings like this in their build output on the platforms with checks by default: *** Warning: linker path does not have real file for library -lz. *** I have the capability to make that library automatically link in when *** you link to this library. But I can only do this if you have a *** shared version of the library, which you do not appear to have *** because I did check the linker path looking for a file starting *** with libz but no candidates were found. (...for regex pattern test) *** The inter-library dependencies that have been dropped here will be *** automatically added whenever a program is linked with this library *** or is declared to -dlopen it. And dependent packages break because libtool doesn't link their transitive dependencies. So making this change fixes _lots_ of packages on those platforms. [1]: https://git.savannah.gnu.org/cgit/libtool.git/tree/m4/libtool.m4?id=544fc0e2c2a03129a540aebef41ad32bfb5c06b8#n3445
1325 lines
38 KiB
Bash
1325 lines
38 KiB
Bash
set -eu
|
||
set -o pipefail
|
||
|
||
if [ -n "${BASH_VERSINFO-}" ] && [ "${BASH_VERSINFO-}" -lt 4 ]; then
|
||
echo "Detected Bash version that isn't supported by Nixpkgs (${BASH_VERSION})"
|
||
echo "Please install Bash 4 or greater to continue."
|
||
exit 1
|
||
fi
|
||
|
||
if (( "${NIX_DEBUG:-0}" >= 6 )); then
|
||
set -x
|
||
fi
|
||
|
||
: ${outputs:=out}
|
||
|
||
|
||
######################################################################
|
||
# Hook handling.
|
||
|
||
|
||
# Run all hooks with the specified name in the order in which they
|
||
# were added, stopping if any fails (returns a non-zero exit
|
||
# code). The hooks for <hookName> are the shell function or variable
|
||
# <hookName>, and the values of the shell array ‘<hookName>Hooks’.
|
||
runHook() {
|
||
local hookName="$1"
|
||
shift
|
||
local hooksSlice="${hookName%Hook}Hooks[@]"
|
||
|
||
local hook
|
||
# Hack around old bash being bad and thinking empty arrays are
|
||
# undefined.
|
||
for hook in "_callImplicitHook 0 $hookName" ${!hooksSlice+"${!hooksSlice}"}; do
|
||
_eval "$hook" "$@"
|
||
done
|
||
|
||
return 0
|
||
}
|
||
|
||
|
||
# Run all hooks with the specified name, until one succeeds (returns a
|
||
# zero exit code). If none succeed, return a non-zero exit code.
|
||
runOneHook() {
|
||
local hookName="$1"
|
||
shift
|
||
local hooksSlice="${hookName%Hook}Hooks[@]"
|
||
|
||
local hook ret=1
|
||
# Hack around old bash like above
|
||
for hook in "_callImplicitHook 1 $hookName" ${!hooksSlice+"${!hooksSlice}"}; do
|
||
if _eval "$hook" "$@"; then
|
||
ret=0
|
||
break
|
||
fi
|
||
done
|
||
|
||
return "$ret"
|
||
}
|
||
|
||
|
||
# Run the named hook, either by calling the function with that name or
|
||
# by evaluating the variable with that name. This allows convenient
|
||
# setting of hooks both from Nix expressions (as attributes /
|
||
# environment variables) and from shell scripts (as functions). If you
|
||
# want to allow multiple hooks, use runHook instead.
|
||
_callImplicitHook() {
|
||
local def="$1"
|
||
local hookName="$2"
|
||
if declare -F "$hookName" > /dev/null; then
|
||
"$hookName"
|
||
elif type -p "$hookName" > /dev/null; then
|
||
source "$hookName"
|
||
elif [ -n "${!hookName:-}" ]; then
|
||
eval "${!hookName}"
|
||
else
|
||
return "$def"
|
||
fi
|
||
# `_eval` expects hook to need nounset disable and leave it
|
||
# disabled anyways, so Ok to to delegate. The alternative of a
|
||
# return trap is no good because it would affect nested returns.
|
||
}
|
||
|
||
|
||
# A function wrapper around ‘eval’ that ensures that ‘return’ inside
|
||
# hooks exits the hook, not the caller. Also will only pass args if
|
||
# command can take them
|
||
_eval() {
|
||
if declare -F "$1" > /dev/null 2>&1; then
|
||
"$@" # including args
|
||
else
|
||
eval "$1"
|
||
fi
|
||
}
|
||
|
||
|
||
######################################################################
|
||
# Logging.
|
||
|
||
# Obsolete.
|
||
stopNest() { true; }
|
||
header() { echo "$1"; }
|
||
closeNest() { true; }
|
||
|
||
# Prints a command such that all word splits are unambiguous. We need
|
||
# to split the command in three parts because the middle format string
|
||
# will be, and must be, repeated for each argument. The first argument
|
||
# goes before the ':' and is just for convenience.
|
||
echoCmd() {
|
||
printf "%s:" "$1"
|
||
shift
|
||
printf ' %q' "$@"
|
||
echo
|
||
}
|
||
|
||
|
||
######################################################################
|
||
# Error handling.
|
||
|
||
exitHandler() {
|
||
exitCode="$?"
|
||
set +e
|
||
|
||
if [ -n "${showBuildStats:-}" ]; then
|
||
times > "$NIX_BUILD_TOP/.times"
|
||
local -a times=($(cat "$NIX_BUILD_TOP/.times"))
|
||
# Print the following statistics:
|
||
# - user time for the shell
|
||
# - system time for the shell
|
||
# - user time for all child processes
|
||
# - system time for all child processes
|
||
echo "build time elapsed: " "${times[@]}"
|
||
fi
|
||
|
||
if (( "$exitCode" != 0 )); then
|
||
runHook failureHook
|
||
|
||
# If the builder had a non-zero exit code and
|
||
# $succeedOnFailure is set, create the file
|
||
# ‘$out/nix-support/failed’ to signal failure, and exit
|
||
# normally. Otherwise, return the original exit code.
|
||
if [ -n "${succeedOnFailure:-}" ]; then
|
||
echo "build failed with exit code $exitCode (ignored)"
|
||
mkdir -p "$out/nix-support"
|
||
printf "%s" "$exitCode" > "$out/nix-support/failed"
|
||
exit 0
|
||
fi
|
||
|
||
else
|
||
runHook exitHook
|
||
fi
|
||
|
||
exit "$exitCode"
|
||
}
|
||
|
||
trap "exitHandler" EXIT
|
||
|
||
|
||
######################################################################
|
||
# Helper functions.
|
||
|
||
|
||
addToSearchPathWithCustomDelimiter() {
|
||
local delimiter="$1"
|
||
local varName="$2"
|
||
local dir="$3"
|
||
if [[ -d "$dir" && "${!varName:+${delimiter}${!varName}${delimiter}}" \
|
||
!= *"${delimiter}${dir}${delimiter}"* ]]; then
|
||
export "${varName}=${!varName:+${!varName}${delimiter}}${dir}"
|
||
fi
|
||
}
|
||
|
||
addToSearchPath() {
|
||
addToSearchPathWithCustomDelimiter ":" "$@"
|
||
}
|
||
|
||
# Add $1/lib* into rpaths.
|
||
# The function is used in multiple-outputs.sh hook,
|
||
# so it is defined here but tried after the hook.
|
||
_addRpathPrefix() {
|
||
if [ "${NIX_NO_SELF_RPATH:-0}" != 1 ]; then
|
||
export NIX_LDFLAGS="-rpath $1/lib ${NIX_LDFLAGS-}"
|
||
if [ -n "${NIX_LIB64_IN_SELF_RPATH:-}" ]; then
|
||
export NIX_LDFLAGS="-rpath $1/lib64 ${NIX_LDFLAGS-}"
|
||
fi
|
||
if [ -n "${NIX_LIB32_IN_SELF_RPATH:-}" ]; then
|
||
export NIX_LDFLAGS="-rpath $1/lib32 ${NIX_LDFLAGS-}"
|
||
fi
|
||
fi
|
||
}
|
||
|
||
# Return success if the specified file is an ELF object.
|
||
isELF() {
|
||
local fn="$1"
|
||
local fd
|
||
local magic
|
||
exec {fd}< "$fn"
|
||
read -r -n 4 -u "$fd" magic
|
||
exec {fd}<&-
|
||
if [ "$magic" = $'\177ELF' ]; then return 0; else return 1; fi
|
||
}
|
||
|
||
# Return success if the specified file is a script (i.e. starts with
|
||
# "#!").
|
||
isScript() {
|
||
local fn="$1"
|
||
local fd
|
||
local magic
|
||
exec {fd}< "$fn"
|
||
read -r -n 2 -u "$fd" magic
|
||
exec {fd}<&-
|
||
if [[ "$magic" =~ \#! ]]; then return 0; else return 1; fi
|
||
}
|
||
|
||
# printf unfortunately will print a trailing newline regardless
|
||
printLines() {
|
||
(( "$#" > 0 )) || return 0
|
||
printf '%s\n' "$@"
|
||
}
|
||
|
||
printWords() {
|
||
(( "$#" > 0 )) || return 0
|
||
printf '%s ' "$@"
|
||
}
|
||
|
||
######################################################################
|
||
# Initialisation.
|
||
|
||
|
||
# Set a fallback default value for SOURCE_DATE_EPOCH, used by some build tools
|
||
# to provide a deterministic substitute for the "current" time. Note that
|
||
# 315532800 = 1980-01-01 12:00:00. We use this date because python's wheel
|
||
# implementation uses zip archive and zip does not support dates going back to
|
||
# 1970.
|
||
export SOURCE_DATE_EPOCH
|
||
: ${SOURCE_DATE_EPOCH:=315532800}
|
||
|
||
|
||
# Wildcard expansions that don't match should expand to an empty list.
|
||
# This ensures that, for instance, "for i in *; do ...; done" does the
|
||
# right thing.
|
||
shopt -s nullglob
|
||
|
||
|
||
# Set up the initial path.
|
||
PATH=
|
||
HOST_PATH=
|
||
for i in $initialPath; do
|
||
if [ "$i" = / ]; then i=; fi
|
||
addToSearchPath PATH "$i/bin"
|
||
|
||
# For backward compatibility, we add initial path to HOST_PATH so
|
||
# it can be used in auto patch-shebangs. Unfortunately this will
|
||
# not work with cross compilation.
|
||
if [ -z "${strictDeps-}" ]; then
|
||
addToSearchPath HOST_PATH "$i/bin"
|
||
fi
|
||
done
|
||
|
||
unset i
|
||
|
||
if (( "${NIX_DEBUG:-0}" >= 1 )); then
|
||
echo "initial path: $PATH"
|
||
fi
|
||
|
||
|
||
# Check that the pre-hook initialised SHELL.
|
||
if [ -z "${SHELL:-}" ]; then echo "SHELL not set"; exit 1; fi
|
||
BASH="$SHELL"
|
||
export CONFIG_SHELL="$SHELL"
|
||
|
||
|
||
# Execute the pre-hook.
|
||
if [ -z "${shell:-}" ]; then export shell="$SHELL"; fi
|
||
runHook preHook
|
||
|
||
|
||
# Allow the caller to augment buildInputs (it's not always possible to
|
||
# do this before the call to setup.sh, since the PATH is empty at that
|
||
# point; here we have a basic Unix environment).
|
||
runHook addInputsHook
|
||
|
||
|
||
# Package accumulators
|
||
|
||
# shellcheck disable=SC2034
|
||
declare -a pkgsBuildBuild pkgsBuildHost pkgsBuildTarget
|
||
declare -a pkgsHostHost pkgsHostTarget
|
||
declare -a pkgsTargetTarget
|
||
|
||
declare -a pkgBuildAccumVars=(pkgsBuildBuild pkgsBuildHost pkgsBuildTarget)
|
||
declare -a pkgHostAccumVars=(pkgsHostHost pkgsHostTarget)
|
||
declare -a pkgTargetAccumVars=(pkgsTargetTarget)
|
||
|
||
declare -a pkgAccumVarVars=(pkgBuildAccumVars pkgHostAccumVars pkgTargetAccumVars)
|
||
|
||
|
||
# Hooks
|
||
|
||
declare -a envBuildBuildHooks envBuildHostHooks envBuildTargetHooks
|
||
declare -a envHostHostHooks envHostTargetHooks
|
||
declare -a envTargetTargetHooks
|
||
|
||
declare -a pkgBuildHookVars=(envBuildBuildHook envBuildHostHook envBuildTargetHook)
|
||
declare -a pkgHostHookVars=(envHostHostHook envHostTargetHook)
|
||
declare -a pkgTargetHookVars=(envTargetTargetHook)
|
||
|
||
declare -a pkgHookVarVars=(pkgBuildHookVars pkgHostHookVars pkgTargetHookVars)
|
||
|
||
# Add env hooks for all sorts of deps with the specified host offset.
|
||
addEnvHooks() {
|
||
local depHostOffset="$1"
|
||
shift
|
||
local pkgHookVarsSlice="${pkgHookVarVars[$depHostOffset + 1]}[@]"
|
||
local pkgHookVar
|
||
for pkgHookVar in "${!pkgHookVarsSlice}"; do
|
||
eval "${pkgHookVar}s"'+=("$@")'
|
||
done
|
||
}
|
||
|
||
|
||
# Propagated dep files
|
||
|
||
declare -a propagatedBuildDepFiles=(
|
||
propagated-build-build-deps
|
||
propagated-native-build-inputs # Legacy name for back-compat
|
||
propagated-build-target-deps
|
||
)
|
||
declare -a propagatedHostDepFiles=(
|
||
propagated-host-host-deps
|
||
propagated-build-inputs # Legacy name for back-compat
|
||
)
|
||
declare -a propagatedTargetDepFiles=(
|
||
propagated-target-target-deps
|
||
)
|
||
declare -a propagatedDepFilesVars=(
|
||
propagatedBuildDepFiles
|
||
propagatedHostDepFiles
|
||
propagatedTargetDepFiles
|
||
)
|
||
|
||
# Platform offsets: build = -1, host = 0, target = 1
|
||
declare -a allPlatOffsets=(-1 0 1)
|
||
|
||
|
||
# Mutually-recursively find all build inputs. See the dependency section of the
|
||
# stdenv chapter of the Nixpkgs manual for the specification this algorithm
|
||
# implements.
|
||
findInputs() {
|
||
local -r pkg="$1"
|
||
local -ri hostOffset="$2"
|
||
local -ri targetOffset="$3"
|
||
|
||
# Sanity check
|
||
(( "$hostOffset" <= "$targetOffset" )) || exit -1
|
||
|
||
local varVar="${pkgAccumVarVars[$hostOffset + 1]}"
|
||
local varRef="$varVar[\$targetOffset - \$hostOffset]"
|
||
local var="${!varRef}"
|
||
unset -v varVar varRef
|
||
|
||
# TODO(@Ericson2314): Restore using associative array once Darwin
|
||
# nix-shell doesn't use impure bash. This should replace the O(n)
|
||
# case with an O(1) hash map lookup, assuming bash is implemented
|
||
# well :D.
|
||
local varSlice="$var[*]"
|
||
# ${..-} to hack around old bash empty array problem
|
||
case "${!varSlice-}" in
|
||
*" $pkg "*) return 0 ;;
|
||
esac
|
||
unset -v varSlice
|
||
|
||
eval "$var"'+=("$pkg")'
|
||
|
||
if ! [ -e "$pkg" ]; then
|
||
echo "build input $pkg does not exist" >&2
|
||
exit 1
|
||
fi
|
||
|
||
# The current package's host and target offset together
|
||
# provide a <=-preserving homomorphism from the relative
|
||
# offsets to current offset
|
||
local -i mapOffsetResult
|
||
function mapOffset() {
|
||
local -ri inputOffset="$1"
|
||
if (( "$inputOffset" <= 0 )); then
|
||
local -ri outputOffset="$inputOffset + $hostOffset"
|
||
else
|
||
local -ri outputOffset="$inputOffset - 1 + $targetOffset"
|
||
fi
|
||
mapOffsetResult="$outputOffset"
|
||
}
|
||
|
||
# Host offset relative to that of the package whose immediate
|
||
# dependencies we are currently exploring.
|
||
local -i relHostOffset
|
||
for relHostOffset in "${allPlatOffsets[@]}"; do
|
||
# `+ 1` so we start at 0 for valid index
|
||
local files="${propagatedDepFilesVars[$relHostOffset + 1]}"
|
||
|
||
# Host offset relative to the package currently being
|
||
# built---as absolute an offset as will be used.
|
||
mapOffset relHostOffset
|
||
local -i hostOffsetNext="$mapOffsetResult"
|
||
|
||
# Ensure we're in bounds relative to the package currently
|
||
# being built.
|
||
[[ "${allPlatOffsets[*]}" = *"$hostOffsetNext"* ]] || continue
|
||
|
||
# Target offset relative to the *host* offset of the package
|
||
# whose immediate dependencies we are currently exploring.
|
||
local -i relTargetOffset
|
||
for relTargetOffset in "${allPlatOffsets[@]}"; do
|
||
(( "$relHostOffset" <= "$relTargetOffset" )) || continue
|
||
|
||
local fileRef="${files}[$relTargetOffset - $relHostOffset]"
|
||
local file="${!fileRef}"
|
||
unset -v fileRef
|
||
|
||
# Target offset relative to the package currently being
|
||
# built.
|
||
mapOffset relTargetOffset
|
||
local -i targetOffsetNext="$mapOffsetResult"
|
||
|
||
# Once again, ensure we're in bounds relative to the
|
||
# package currently being built.
|
||
[[ "${allPlatOffsets[*]}" = *"$targetOffsetNext"* ]] || continue
|
||
|
||
[[ -f "$pkg/nix-support/$file" ]] || continue
|
||
|
||
local pkgNext
|
||
read -r -d '' pkgNext < "$pkg/nix-support/$file" || true
|
||
for pkgNext in $pkgNext; do
|
||
findInputs "$pkgNext" "$hostOffsetNext" "$targetOffsetNext"
|
||
done
|
||
done
|
||
done
|
||
}
|
||
|
||
# Make sure all are at least defined as empty
|
||
: ${depsBuildBuild=} ${depsBuildBuildPropagated=}
|
||
: ${nativeBuildInputs=} ${propagatedNativeBuildInputs=} ${defaultNativeBuildInputs=}
|
||
: ${depsBuildTarget=} ${depsBuildTargetPropagated=}
|
||
: ${depsHostHost=} ${depsHostHostPropagated=}
|
||
: ${buildInputs=} ${propagatedBuildInputs=} ${defaultBuildInputs=}
|
||
: ${depsTargetTarget=} ${depsTargetTargetPropagated=}
|
||
|
||
for pkg in $depsBuildBuild $depsBuildBuildPropagated; do
|
||
findInputs "$pkg" -1 -1
|
||
done
|
||
for pkg in $nativeBuildInputs $propagatedNativeBuildInputs; do
|
||
findInputs "$pkg" -1 0
|
||
done
|
||
for pkg in $depsBuildTarget $depsBuildTargetPropagated; do
|
||
findInputs "$pkg" -1 1
|
||
done
|
||
for pkg in $depsHostHost $depsHostHostPropagated; do
|
||
findInputs "$pkg" 0 0
|
||
done
|
||
for pkg in $buildInputs $propagatedBuildInputs ; do
|
||
findInputs "$pkg" 0 1
|
||
done
|
||
for pkg in $depsTargetTarget $depsTargetTargetPropagated; do
|
||
findInputs "$pkg" 1 1
|
||
done
|
||
# Default inputs must be processed last
|
||
for pkg in $defaultNativeBuildInputs; do
|
||
findInputs "$pkg" -1 0
|
||
done
|
||
for pkg in $defaultBuildInputs; do
|
||
findInputs "$pkg" 0 1
|
||
done
|
||
|
||
# Add package to the future PATH and run setup hooks
|
||
activatePackage() {
|
||
local pkg="$1"
|
||
local -ri hostOffset="$2"
|
||
local -ri targetOffset="$3"
|
||
|
||
# Sanity check
|
||
(( "$hostOffset" <= "$targetOffset" )) || exit -1
|
||
|
||
if [ -f "$pkg" ]; then
|
||
source "$pkg"
|
||
fi
|
||
|
||
# Only dependencies whose host platform is guaranteed to match the
|
||
# build platform are included here. That would be `depsBuild*`,
|
||
# and legacy `nativeBuildInputs`, in general. If we aren't cross
|
||
# compiling, however, everything can be put on the PATH. To ease
|
||
# the transition, we do include everything in that case.
|
||
#
|
||
# TODO(@Ericson2314): Don't special-case native compilation
|
||
if [[ -z "${strictDeps-}" || "$hostOffset" -le -1 ]]; then
|
||
addToSearchPath _PATH "$pkg/bin"
|
||
fi
|
||
|
||
if [[ "$hostOffset" -le -1 ]]; then
|
||
addToSearchPath _XDG_DATA_DIRS "$pkg/share"
|
||
fi
|
||
|
||
if [[ "$hostOffset" -eq 0 && -d "$pkg/bin" ]]; then
|
||
addToSearchPath _HOST_PATH "$pkg/bin"
|
||
fi
|
||
|
||
if [[ -f "$pkg/nix-support/setup-hook" ]]; then
|
||
source "$pkg/nix-support/setup-hook"
|
||
fi
|
||
}
|
||
|
||
_activatePkgs() {
|
||
local -i hostOffset targetOffset
|
||
local pkg
|
||
|
||
for hostOffset in "${allPlatOffsets[@]}"; do
|
||
local pkgsVar="${pkgAccumVarVars[$hostOffset + 1]}"
|
||
for targetOffset in "${allPlatOffsets[@]}"; do
|
||
(( "$hostOffset" <= "$targetOffset" )) || continue
|
||
local pkgsRef="${pkgsVar}[$targetOffset - $hostOffset]"
|
||
local pkgsSlice="${!pkgsRef}[@]"
|
||
for pkg in ${!pkgsSlice+"${!pkgsSlice}"}; do
|
||
activatePackage "$pkg" "$hostOffset" "$targetOffset"
|
||
done
|
||
done
|
||
done
|
||
}
|
||
|
||
# Run the package setup hooks and build _PATH
|
||
_activatePkgs
|
||
|
||
# Set the relevant environment variables to point to the build inputs
|
||
# found above.
|
||
#
|
||
# These `depOffset`s, beyond indexing the arrays, also tell the env
|
||
# hook what sort of dependency (ignoring propagatedness) is being
|
||
# passed to the env hook. In a real language, we'd append a closure
|
||
# with this information to the relevant env hook array, but bash
|
||
# doesn't have closures, so it's easier to just pass this in.
|
||
_addToEnv() {
|
||
local -i depHostOffset depTargetOffset
|
||
local pkg
|
||
|
||
for depHostOffset in "${allPlatOffsets[@]}"; do
|
||
local hookVar="${pkgHookVarVars[$depHostOffset + 1]}"
|
||
local pkgsVar="${pkgAccumVarVars[$depHostOffset + 1]}"
|
||
for depTargetOffset in "${allPlatOffsets[@]}"; do
|
||
(( "$depHostOffset" <= "$depTargetOffset" )) || continue
|
||
local hookRef="${hookVar}[$depTargetOffset - $depHostOffset]"
|
||
if [[ -z "${strictDeps-}" ]]; then
|
||
|
||
# Keep track of which packages we have visited before.
|
||
local visitedPkgs=""
|
||
|
||
# Apply environment hooks to all packages during native
|
||
# compilation to ease the transition.
|
||
#
|
||
# TODO(@Ericson2314): Don't special-case native compilation
|
||
for pkg in \
|
||
${pkgsBuildBuild+"${pkgsBuildBuild[@]}"} \
|
||
${pkgsBuildHost+"${pkgsBuildHost[@]}"} \
|
||
${pkgsBuildTarget+"${pkgsBuildTarget[@]}"} \
|
||
${pkgsHostHost+"${pkgsHostHost[@]}"} \
|
||
${pkgsHostTarget+"${pkgsHostTarget[@]}"} \
|
||
${pkgsTargetTarget+"${pkgsTargetTarget[@]}"}
|
||
do
|
||
if [[ "$visitedPkgs" = *"$pkg"* ]]; then
|
||
continue
|
||
fi
|
||
runHook "${!hookRef}" "$pkg"
|
||
visitedPkgs+=" $pkg"
|
||
done
|
||
else
|
||
local pkgsRef="${pkgsVar}[$depTargetOffset - $depHostOffset]"
|
||
local pkgsSlice="${!pkgsRef}[@]"
|
||
for pkg in ${!pkgsSlice+"${!pkgsSlice}"}; do
|
||
runHook "${!hookRef}" "$pkg"
|
||
done
|
||
fi
|
||
done
|
||
done
|
||
}
|
||
|
||
# Run the package-specific hooks set by the setup-hook scripts.
|
||
_addToEnv
|
||
|
||
|
||
# Unset setup-specific declared variables
|
||
unset allPlatOffsets
|
||
unset pkgBuildAccumVars pkgHostAccumVars pkgTargetAccumVars pkgAccumVarVars
|
||
unset pkgBuildHookVars pkgHostHookVars pkgTargetHookVars pkgHookVarVars
|
||
unset propagatedDepFilesVars
|
||
|
||
|
||
_addRpathPrefix "$out"
|
||
|
||
|
||
# Set the TZ (timezone) environment variable, otherwise commands like
|
||
# `date' will complain (e.g., `Tue Mar 9 10:01:47 Local time zone must
|
||
# be set--see zic manual page 2004').
|
||
export TZ=UTC
|
||
|
||
|
||
# Set the prefix. This is generally $out, but it can be overriden,
|
||
# for instance if we just want to perform a test build/install to a
|
||
# temporary location and write a build report to $out.
|
||
if [ -z "${prefix:-}" ]; then
|
||
prefix="$out";
|
||
fi
|
||
|
||
if [ "${useTempPrefix:-}" = 1 ]; then
|
||
prefix="$NIX_BUILD_TOP/tmp_prefix";
|
||
fi
|
||
|
||
|
||
PATH="${_PATH-}${_PATH:+${PATH:+:}}$PATH"
|
||
HOST_PATH="${_HOST_PATH-}${_HOST_PATH:+${HOST_PATH:+:}}$HOST_PATH"
|
||
export XDG_DATA_DIRS="${_XDG_DATA_DIRS-}${_XDG_DATA_DIRS:+${XDG_DATA_DIRS:+:}}${XDG_DATA_DIRS-}"
|
||
if (( "${NIX_DEBUG:-0}" >= 1 )); then
|
||
echo "final path: $PATH"
|
||
echo "final host path: $HOST_PATH"
|
||
echo "final data dirs: $XDG_DATA_DIRS"
|
||
fi
|
||
|
||
unset _PATH
|
||
unset _HOST_PATH
|
||
unset _XDG_DATA_DIRS
|
||
|
||
|
||
# Make GNU Make produce nested output.
|
||
export NIX_INDENT_MAKE=1
|
||
|
||
|
||
# Normalize the NIX_BUILD_CORES variable. The value might be 0, which
|
||
# means that we're supposed to try and auto-detect the number of
|
||
# available CPU cores at run-time.
|
||
|
||
if [ -z "${NIX_BUILD_CORES:-}" ]; then
|
||
NIX_BUILD_CORES="1"
|
||
elif [ "$NIX_BUILD_CORES" -le 0 ]; then
|
||
NIX_BUILD_CORES=$(nproc 2>/dev/null || true)
|
||
if expr >/dev/null 2>&1 "$NIX_BUILD_CORES" : "^[0-9][0-9]*$"; then
|
||
:
|
||
else
|
||
NIX_BUILD_CORES="1"
|
||
fi
|
||
fi
|
||
export NIX_BUILD_CORES
|
||
|
||
|
||
# Prevent SSL libraries from using certificates in /etc/ssl, unless set explicitly.
|
||
# Leave it in impure shells for convenience.
|
||
if [ -z "${NIX_SSL_CERT_FILE:-}" ] && [ "${IN_NIX_SHELL:-}" != "impure" ]; then
|
||
export NIX_SSL_CERT_FILE=/no-cert-file.crt
|
||
fi
|
||
# Another variant left for compatibility.
|
||
if [ -z "${SSL_CERT_FILE:-}" ] && [ "${IN_NIX_SHELL:-}" != "impure" ]; then
|
||
export SSL_CERT_FILE=/no-cert-file.crt
|
||
fi
|
||
|
||
|
||
######################################################################
|
||
# Textual substitution functions.
|
||
|
||
|
||
substituteStream() {
|
||
local var=$1
|
||
local description=$2
|
||
shift 2
|
||
|
||
while (( "$#" )); do
|
||
case "$1" in
|
||
--replace)
|
||
pattern="$2"
|
||
replacement="$3"
|
||
shift 3
|
||
local savedvar
|
||
savedvar="${!var}"
|
||
eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}'
|
||
if [ "$pattern" != "$replacement" ]; then
|
||
if [ "${!var}" == "$savedvar" ]; then
|
||
echo "substituteStream(): WARNING: pattern '$pattern' doesn't match anything in $description" >&2
|
||
fi
|
||
fi
|
||
;;
|
||
|
||
--subst-var)
|
||
local varName="$2"
|
||
shift 2
|
||
# check if the used nix attribute name is a valid bash name
|
||
if ! [[ "$varName" =~ ^[a-zA-Z_][a-zA-Z0-9_]*$ ]]; then
|
||
echo "substituteStream(): ERROR: substitution variables must be valid Bash names, \"$varName\" isn't." >&2
|
||
return 1
|
||
fi
|
||
if [ -z ${!varName+x} ]; then
|
||
echo "substituteStream(): ERROR: variable \$$varName is unset" >&2
|
||
return 1
|
||
fi
|
||
pattern="@$varName@"
|
||
replacement="${!varName}"
|
||
eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}'
|
||
;;
|
||
|
||
--subst-var-by)
|
||
pattern="@$2@"
|
||
replacement="$3"
|
||
eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}'
|
||
shift 3
|
||
;;
|
||
|
||
*)
|
||
echo "substituteStream(): ERROR: Invalid command line argument: $1" >&2
|
||
return 1
|
||
;;
|
||
esac
|
||
done
|
||
|
||
printf "%s" "${!var}"
|
||
}
|
||
|
||
consumeEntire() {
|
||
# read returns non-0 on EOF, so we want read to fail
|
||
if IFS='' read -r -N 0 $1; then
|
||
echo "consumeEntire(): ERROR: Input null bytes, won't process" >&2
|
||
return 1
|
||
fi
|
||
}
|
||
|
||
substitute() {
|
||
local input="$1"
|
||
local output="$2"
|
||
shift 2
|
||
|
||
if [ ! -f "$input" ]; then
|
||
echo "substitute(): ERROR: file '$input' does not exist" >&2
|
||
return 1
|
||
fi
|
||
|
||
local content
|
||
consumeEntire content < "$input"
|
||
|
||
if [ -e "$output" ]; then chmod +w "$output"; fi
|
||
substituteStream content "file '$input'" "$@" > "$output"
|
||
}
|
||
|
||
substituteInPlace() {
|
||
local fileName="$1"
|
||
shift
|
||
substitute "$fileName" "$fileName" "$@"
|
||
}
|
||
|
||
_allFlags() {
|
||
for varName in $(awk 'BEGIN { for (v in ENVIRON) if (v ~ /^[a-z][a-zA-Z0-9_]*$/) print v }'); do
|
||
if (( "${NIX_DEBUG:-0}" >= 1 )); then
|
||
printf "@%s@ -> %q\n" "${varName}" "${!varName}"
|
||
fi
|
||
args+=("--subst-var" "$varName")
|
||
done
|
||
}
|
||
|
||
substituteAllStream() {
|
||
local -a args=()
|
||
_allFlags
|
||
|
||
substituteStream "$1" "$2" "${args[@]}"
|
||
}
|
||
|
||
# Substitute all environment variables that start with a lowercase character and
|
||
# are valid Bash names.
|
||
substituteAll() {
|
||
local input="$1"
|
||
local output="$2"
|
||
|
||
local -a args=()
|
||
_allFlags
|
||
|
||
substitute "$input" "$output" "${args[@]}"
|
||
}
|
||
|
||
|
||
substituteAllInPlace() {
|
||
local fileName="$1"
|
||
shift
|
||
substituteAll "$fileName" "$fileName" "$@"
|
||
}
|
||
|
||
|
||
######################################################################
|
||
# What follows is the generic builder.
|
||
|
||
|
||
# This function is useful for debugging broken Nix builds. It dumps
|
||
# all environment variables to a file `env-vars' in the build
|
||
# directory. If the build fails and the `-K' option is used, you can
|
||
# then go to the build directory and source in `env-vars' to reproduce
|
||
# the environment used for building.
|
||
dumpVars() {
|
||
if [ "${noDumpEnvVars:-0}" != 1 ]; then
|
||
export 2>/dev/null >| "$NIX_BUILD_TOP/env-vars" || true
|
||
fi
|
||
}
|
||
|
||
|
||
# Utility function: echo the base name of the given path, with the
|
||
# prefix `HASH-' removed, if present.
|
||
stripHash() {
|
||
local strippedName casematchOpt=0
|
||
# On separate line for `set -e`
|
||
strippedName="$(basename -- "$1")"
|
||
shopt -q nocasematch && casematchOpt=1
|
||
shopt -u nocasematch
|
||
if [[ "$strippedName" =~ ^[a-z0-9]{32}- ]]; then
|
||
echo "${strippedName:33}"
|
||
else
|
||
echo "$strippedName"
|
||
fi
|
||
if (( casematchOpt )); then shopt -s nocasematch; fi
|
||
}
|
||
|
||
|
||
unpackCmdHooks+=(_defaultUnpack)
|
||
_defaultUnpack() {
|
||
local fn="$1"
|
||
|
||
if [ -d "$fn" ]; then
|
||
|
||
# We can't preserve hardlinks because they may have been
|
||
# introduced by store optimization, which might break things
|
||
# in the build.
|
||
cp -pr --reflink=auto -- "$fn" "$(stripHash "$fn")"
|
||
|
||
else
|
||
|
||
case "$fn" in
|
||
*.tar.xz | *.tar.lzma | *.txz)
|
||
# Don't rely on tar knowing about .xz.
|
||
xz -d < "$fn" | tar xf -
|
||
;;
|
||
*.tar | *.tar.* | *.tgz | *.tbz2 | *.tbz)
|
||
# GNU tar can automatically select the decompression method
|
||
# (info "(tar) gzip").
|
||
tar xf "$fn"
|
||
;;
|
||
*)
|
||
return 1
|
||
;;
|
||
esac
|
||
|
||
fi
|
||
}
|
||
|
||
|
||
unpackFile() {
|
||
curSrc="$1"
|
||
header "unpacking source archive $curSrc" 3
|
||
if ! runOneHook unpackCmd "$curSrc"; then
|
||
echo "do not know how to unpack source archive $curSrc"
|
||
exit 1
|
||
fi
|
||
}
|
||
|
||
|
||
unpackPhase() {
|
||
runHook preUnpack
|
||
|
||
if [ -z "${srcs:-}" ]; then
|
||
if [ -z "${src:-}" ]; then
|
||
# shellcheck disable=SC2016
|
||
echo 'variable $src or $srcs should point to the source'
|
||
exit 1
|
||
fi
|
||
srcs="$src"
|
||
fi
|
||
|
||
# To determine the source directory created by unpacking the
|
||
# source archives, we record the contents of the current
|
||
# directory, then look below which directory got added. Yeah,
|
||
# it's rather hacky.
|
||
local dirsBefore=""
|
||
for i in *; do
|
||
if [ -d "$i" ]; then
|
||
dirsBefore="$dirsBefore $i "
|
||
fi
|
||
done
|
||
|
||
# Unpack all source archives.
|
||
for i in $srcs; do
|
||
unpackFile "$i"
|
||
done
|
||
|
||
# Find the source directory.
|
||
|
||
# set to empty if unset
|
||
: ${sourceRoot=}
|
||
|
||
if [ -n "${setSourceRoot:-}" ]; then
|
||
runOneHook setSourceRoot
|
||
elif [ -z "$sourceRoot" ]; then
|
||
for i in *; do
|
||
if [ -d "$i" ]; then
|
||
case $dirsBefore in
|
||
*\ $i\ *)
|
||
;;
|
||
*)
|
||
if [ -n "$sourceRoot" ]; then
|
||
echo "unpacker produced multiple directories"
|
||
exit 1
|
||
fi
|
||
sourceRoot="$i"
|
||
;;
|
||
esac
|
||
fi
|
||
done
|
||
fi
|
||
|
||
if [ -z "$sourceRoot" ]; then
|
||
echo "unpacker appears to have produced no directories"
|
||
exit 1
|
||
fi
|
||
|
||
echo "source root is $sourceRoot"
|
||
|
||
# By default, add write permission to the sources. This is often
|
||
# necessary when sources have been copied from other store
|
||
# locations.
|
||
if [ "${dontMakeSourcesWritable:-0}" != 1 ]; then
|
||
chmod -R u+w -- "$sourceRoot"
|
||
fi
|
||
|
||
runHook postUnpack
|
||
}
|
||
|
||
|
||
patchPhase() {
|
||
runHook prePatch
|
||
|
||
for i in ${patches:-}; do
|
||
header "applying patch $i" 3
|
||
local uncompress=cat
|
||
case "$i" in
|
||
*.gz)
|
||
uncompress="gzip -d"
|
||
;;
|
||
*.bz2)
|
||
uncompress="bzip2 -d"
|
||
;;
|
||
*.xz)
|
||
uncompress="xz -d"
|
||
;;
|
||
*.lzma)
|
||
uncompress="lzma -d"
|
||
;;
|
||
esac
|
||
# "2>&1" is a hack to make patch fail if the decompressor fails (nonexistent patch, etc.)
|
||
# shellcheck disable=SC2086
|
||
$uncompress < "$i" 2>&1 | patch ${patchFlags:--p1}
|
||
done
|
||
|
||
runHook postPatch
|
||
}
|
||
|
||
|
||
fixLibtool() {
|
||
sed -i -e 's^eval sys_lib_.*search_path=.*^^' "$1"
|
||
}
|
||
|
||
|
||
configurePhase() {
|
||
runHook preConfigure
|
||
|
||
# set to empty if unset
|
||
: ${configureScript=}
|
||
: ${configureFlags=}
|
||
|
||
if [[ -z "$configureScript" && -x ./configure ]]; then
|
||
configureScript=./configure
|
||
fi
|
||
|
||
if [ -z "${dontFixLibtool:-}" ]; then
|
||
export lt_cv_deplibs_check_method="${lt_cv_deplibs_check_method-pass_all}"
|
||
local i
|
||
find . -iname "ltmain.sh" -print0 | while IFS='' read -r -d '' i; do
|
||
echo "fixing libtool script $i"
|
||
fixLibtool "$i"
|
||
done
|
||
fi
|
||
|
||
if [[ -z "${dontAddPrefix:-}" && -n "$prefix" ]]; then
|
||
configureFlags="${prefixKey:---prefix=}$prefix $configureFlags"
|
||
fi
|
||
|
||
# Add --disable-dependency-tracking to speed up some builds.
|
||
if [ -z "${dontAddDisableDepTrack:-}" ]; then
|
||
if [ -f "$configureScript" ] && grep -q dependency-tracking "$configureScript"; then
|
||
configureFlags="--disable-dependency-tracking $configureFlags"
|
||
fi
|
||
fi
|
||
|
||
# By default, disable static builds.
|
||
if [ -z "${dontDisableStatic:-}" ]; then
|
||
if [ -f "$configureScript" ] && grep -q enable-static "$configureScript"; then
|
||
configureFlags="--disable-static $configureFlags"
|
||
fi
|
||
fi
|
||
|
||
if [ -n "$configureScript" ]; then
|
||
# Old bash empty array hack
|
||
# shellcheck disable=SC2086
|
||
local flagsArray=(
|
||
$configureFlags ${configureFlagsArray+"${configureFlagsArray[@]}"}
|
||
)
|
||
echoCmd 'configure flags' "${flagsArray[@]}"
|
||
# shellcheck disable=SC2086
|
||
$configureScript "${flagsArray[@]}"
|
||
unset flagsArray
|
||
else
|
||
echo "no configure script, doing nothing"
|
||
fi
|
||
|
||
runHook postConfigure
|
||
}
|
||
|
||
|
||
buildPhase() {
|
||
runHook preBuild
|
||
|
||
# set to empty if unset
|
||
: ${makeFlags=}
|
||
|
||
if [[ -z "$makeFlags" && -z "${makefile:-}" && ! ( -e Makefile || -e makefile || -e GNUmakefile ) ]]; then
|
||
echo "no Makefile, doing nothing"
|
||
else
|
||
foundMakefile=1
|
||
|
||
# Old bash empty array hack
|
||
# shellcheck disable=SC2086
|
||
local flagsArray=(
|
||
${enableParallelBuilding:+-j${NIX_BUILD_CORES} -l${NIX_BUILD_CORES}}
|
||
SHELL=$SHELL
|
||
$makeFlags ${makeFlagsArray+"${makeFlagsArray[@]}"}
|
||
$buildFlags ${buildFlagsArray+"${buildFlagsArray[@]}"}
|
||
)
|
||
|
||
echoCmd 'build flags' "${flagsArray[@]}"
|
||
make ${makefile:+-f $makefile} "${flagsArray[@]}"
|
||
unset flagsArray
|
||
fi
|
||
|
||
runHook postBuild
|
||
}
|
||
|
||
|
||
checkPhase() {
|
||
runHook preCheck
|
||
|
||
if [[ -z "${foundMakefile:-}" ]]; then
|
||
echo "no Makefile or custom checkPhase, doing nothing"
|
||
runHook postCheck
|
||
return
|
||
fi
|
||
|
||
if [[ -z "${checkTarget:-}" ]]; then
|
||
#TODO(@oxij): should flagsArray influence make -n?
|
||
if make -n ${makefile:+-f $makefile} check >/dev/null 2>&1; then
|
||
checkTarget=check
|
||
elif make -n ${makefile:+-f $makefile} test >/dev/null 2>&1; then
|
||
checkTarget=test
|
||
fi
|
||
fi
|
||
|
||
if [[ -z "${checkTarget:-}" ]]; then
|
||
echo "no check/test target in ${makefile:-Makefile}, doing nothing"
|
||
else
|
||
# Old bash empty array hack
|
||
# shellcheck disable=SC2086
|
||
local flagsArray=(
|
||
${enableParallelChecking:+-j${NIX_BUILD_CORES} -l${NIX_BUILD_CORES}}
|
||
SHELL=$SHELL
|
||
$makeFlags ${makeFlagsArray+"${makeFlagsArray[@]}"}
|
||
${checkFlags:-VERBOSE=y} ${checkFlagsArray+"${checkFlagsArray[@]}"}
|
||
${checkTarget}
|
||
)
|
||
|
||
echoCmd 'check flags' "${flagsArray[@]}"
|
||
make ${makefile:+-f $makefile} "${flagsArray[@]}"
|
||
|
||
unset flagsArray
|
||
fi
|
||
|
||
runHook postCheck
|
||
}
|
||
|
||
|
||
installPhase() {
|
||
runHook preInstall
|
||
|
||
if [ -n "$prefix" ]; then
|
||
mkdir -p "$prefix"
|
||
fi
|
||
|
||
# Old bash empty array hack
|
||
# shellcheck disable=SC2086
|
||
local flagsArray=(
|
||
SHELL=$SHELL
|
||
$makeFlags ${makeFlagsArray+"${makeFlagsArray[@]}"}
|
||
$installFlags ${installFlagsArray+"${installFlagsArray[@]}"}
|
||
${installTargets:-install}
|
||
)
|
||
|
||
echoCmd 'install flags' "${flagsArray[@]}"
|
||
make ${makefile:+-f $makefile} "${flagsArray[@]}"
|
||
unset flagsArray
|
||
|
||
runHook postInstall
|
||
}
|
||
|
||
|
||
# The fixup phase performs generic, package-independent stuff, like
|
||
# stripping binaries, running patchelf and setting
|
||
# propagated-build-inputs.
|
||
fixupPhase() {
|
||
# Make sure everything is writable so "strip" et al. work.
|
||
local output
|
||
for output in $outputs; do
|
||
if [ -e "${!output}" ]; then chmod -R u+w "${!output}"; fi
|
||
done
|
||
|
||
runHook preFixup
|
||
|
||
# Apply fixup to each output.
|
||
local output
|
||
for output in $outputs; do
|
||
prefix="${!output}" runHook fixupOutput
|
||
done
|
||
|
||
|
||
# Propagate dependencies & setup hook into the development output.
|
||
declare -ra flatVars=(
|
||
# Build
|
||
depsBuildBuildPropagated
|
||
propagatedNativeBuildInputs
|
||
depsBuildTargetPropagated
|
||
# Host
|
||
depsHostHostPropagated
|
||
propagatedBuildInputs
|
||
# Target
|
||
depsTargetTargetPropagated
|
||
)
|
||
declare -ra flatFiles=(
|
||
"${propagatedBuildDepFiles[@]}"
|
||
"${propagatedHostDepFiles[@]}"
|
||
"${propagatedTargetDepFiles[@]}"
|
||
)
|
||
|
||
local propagatedInputsIndex
|
||
for propagatedInputsIndex in "${!flatVars[@]}"; do
|
||
local propagatedInputsSlice="${flatVars[$propagatedInputsIndex]}[@]"
|
||
local propagatedInputsFile="${flatFiles[$propagatedInputsIndex]}"
|
||
|
||
[[ "${!propagatedInputsSlice}" ]] || continue
|
||
|
||
mkdir -p "${!outputDev}/nix-support"
|
||
# shellcheck disable=SC2086
|
||
printWords ${!propagatedInputsSlice} > "${!outputDev}/nix-support/$propagatedInputsFile"
|
||
done
|
||
|
||
|
||
if [ -n "${setupHook:-}" ]; then
|
||
mkdir -p "${!outputDev}/nix-support"
|
||
substituteAll "$setupHook" "${!outputDev}/nix-support/setup-hook"
|
||
fi
|
||
|
||
# TODO(@Ericson2314): Remove after https://github.com/NixOS/nixpkgs/pull/31414
|
||
if [ -n "${setupHooks:-}" ]; then
|
||
mkdir -p "${!outputDev}/nix-support"
|
||
local hook
|
||
for hook in $setupHooks; do
|
||
local content
|
||
consumeEntire content < "$hook"
|
||
substituteAllStream content "file '$hook'" >> "${!outputDev}/nix-support/setup-hook"
|
||
unset -v content
|
||
done
|
||
unset -v hook
|
||
fi
|
||
|
||
# Propagate user-env packages into the output with binaries, TODO?
|
||
|
||
if [ -n "${propagatedUserEnvPkgs:-}" ]; then
|
||
mkdir -p "${!outputBin}/nix-support"
|
||
# shellcheck disable=SC2086
|
||
printWords $propagatedUserEnvPkgs > "${!outputBin}/nix-support/propagated-user-env-packages"
|
||
fi
|
||
|
||
runHook postFixup
|
||
}
|
||
|
||
|
||
installCheckPhase() {
|
||
runHook preInstallCheck
|
||
|
||
if [[ -z "${foundMakefile:-}" ]]; then
|
||
echo "no Makefile or custom installCheckPhase, doing nothing"
|
||
#TODO(@oxij): should flagsArray influence make -n?
|
||
elif [[ -z "${installCheckTarget:-}" ]] \
|
||
&& ! make -n ${makefile:+-f $makefile} ${installCheckTarget:-installcheck} >/dev/null 2>&1; then
|
||
echo "no installcheck target in ${makefile:-Makefile}, doing nothing"
|
||
else
|
||
# Old bash empty array hack
|
||
# shellcheck disable=SC2086
|
||
local flagsArray=(
|
||
${enableParallelChecking:+-j${NIX_BUILD_CORES} -l${NIX_BUILD_CORES}}
|
||
SHELL=$SHELL
|
||
$makeFlags ${makeFlagsArray+"${makeFlagsArray[@]}"}
|
||
$installCheckFlags ${installCheckFlagsArray+"${installCheckFlagsArray[@]}"}
|
||
${installCheckTarget:-installcheck}
|
||
)
|
||
|
||
echoCmd 'installcheck flags' "${flagsArray[@]}"
|
||
make ${makefile:+-f $makefile} "${flagsArray[@]}"
|
||
unset flagsArray
|
||
fi
|
||
|
||
runHook postInstallCheck
|
||
}
|
||
|
||
|
||
distPhase() {
|
||
runHook preDist
|
||
|
||
# Old bash empty array hack
|
||
# shellcheck disable=SC2086
|
||
local flagsArray=(
|
||
$distFlags ${distFlagsArray+"${distFlagsArray[@]}"} ${distTarget:-dist}
|
||
)
|
||
|
||
echo 'dist flags: %q' "${flagsArray[@]}"
|
||
make ${makefile:+-f $makefile} "${flagsArray[@]}"
|
||
|
||
if [ "${dontCopyDist:-0}" != 1 ]; then
|
||
mkdir -p "$out/tarballs"
|
||
|
||
# Note: don't quote $tarballs, since we explicitly permit
|
||
# wildcards in there.
|
||
# shellcheck disable=SC2086
|
||
cp -pvd ${tarballs:-*.tar.gz} "$out/tarballs"
|
||
fi
|
||
|
||
runHook postDist
|
||
}
|
||
|
||
|
||
showPhaseHeader() {
|
||
local phase="$1"
|
||
case "$phase" in
|
||
unpackPhase) header "unpacking sources";;
|
||
patchPhase) header "patching sources";;
|
||
configurePhase) header "configuring";;
|
||
buildPhase) header "building";;
|
||
checkPhase) header "running tests";;
|
||
installPhase) header "installing";;
|
||
fixupPhase) header "post-installation fixup";;
|
||
installCheckPhase) header "running install tests";;
|
||
*) header "$phase";;
|
||
esac
|
||
}
|
||
|
||
|
||
genericBuild() {
|
||
if [ -f "${buildCommandPath:-}" ]; then
|
||
source "$buildCommandPath"
|
||
return
|
||
fi
|
||
if [ -n "${buildCommand:-}" ]; then
|
||
eval "$buildCommand"
|
||
return
|
||
fi
|
||
|
||
if [ -z "${phases:-}" ]; then
|
||
phases="${prePhases:-} unpackPhase patchPhase ${preConfigurePhases:-} \
|
||
configurePhase ${preBuildPhases:-} buildPhase checkPhase \
|
||
${preInstallPhases:-} installPhase ${preFixupPhases:-} fixupPhase installCheckPhase \
|
||
${preDistPhases:-} distPhase ${postPhases:-}";
|
||
fi
|
||
|
||
for curPhase in $phases; do
|
||
if [[ "$curPhase" = unpackPhase && -n "${dontUnpack:-}" ]]; then continue; fi
|
||
if [[ "$curPhase" = patchPhase && -n "${dontPatch:-}" ]]; then continue; fi
|
||
if [[ "$curPhase" = configurePhase && -n "${dontConfigure:-}" ]]; then continue; fi
|
||
if [[ "$curPhase" = buildPhase && -n "${dontBuild:-}" ]]; then continue; fi
|
||
if [[ "$curPhase" = checkPhase && -z "${doCheck:-}" ]]; then continue; fi
|
||
if [[ "$curPhase" = installPhase && -n "${dontInstall:-}" ]]; then continue; fi
|
||
if [[ "$curPhase" = fixupPhase && -n "${dontFixup:-}" ]]; then continue; fi
|
||
if [[ "$curPhase" = installCheckPhase && -z "${doInstallCheck:-}" ]]; then continue; fi
|
||
if [[ "$curPhase" = distPhase && -z "${doDist:-}" ]]; then continue; fi
|
||
|
||
if [[ -n $NIX_LOG_FD ]]; then
|
||
echo "@nix { \"action\": \"setPhase\", \"phase\": \"$curPhase\" }" >&$NIX_LOG_FD
|
||
fi
|
||
|
||
showPhaseHeader "$curPhase"
|
||
dumpVars
|
||
|
||
# Evaluate the variable named $curPhase if it exists, otherwise the
|
||
# function named $curPhase.
|
||
eval "${!curPhase:-$curPhase}"
|
||
|
||
if [ "$curPhase" = unpackPhase ]; then
|
||
cd "${sourceRoot:-.}"
|
||
fi
|
||
done
|
||
}
|
||
|
||
|
||
# Execute the post-hooks.
|
||
runHook postHook
|
||
|
||
|
||
# Execute the global user hook (defined through the Nixpkgs
|
||
# configuration option ‘stdenv.userHook’). This can be used to set
|
||
# global compiler optimisation flags, for instance.
|
||
runHook userHook
|
||
|
||
|
||
dumpVars
|
||
|
||
# Disable nounset for nix-shell.
|
||
set +u
|