Merge master into staging-next
This commit is contained in:
@@ -6,4 +6,5 @@ lib.recurseIntoAttrs {
|
||||
documentationTarball = callPackage ./documentationTarball { };
|
||||
setBuildTarget = callPackage ./setBuildTarget { };
|
||||
incremental = callPackage ./incremental { };
|
||||
upstreamStackHpackVersion = callPackage ./upstreamStackHpackVersion { };
|
||||
}
|
||||
|
||||
@@ -2,7 +2,11 @@
|
||||
|
||||
(haskellPackages.shellFor {
|
||||
packages = p: [ p.constraints p.linear ];
|
||||
extraDependencies = p: { libraryHaskellDepends = [ p.releaser ]; };
|
||||
# WARNING: When updating this, make sure that the libraries passed to
|
||||
# `extraDependencies` are not actually transitive dependencies of libraries in
|
||||
# `packages` above. We explicitly want to test that it is possible to specify
|
||||
# `extraDependencies` that are not in the closure of `packages`.
|
||||
extraDependencies = p: { libraryHaskellDepends = [ p.conduit ]; };
|
||||
nativeBuildInputs = [ cabal-install ];
|
||||
phases = [ "unpackPhase" "buildPhase" "installPhase" ];
|
||||
unpackPhase = ''
|
||||
@@ -18,13 +22,19 @@
|
||||
mkdir -p $HOME/.cabal
|
||||
touch $HOME/.cabal/config
|
||||
|
||||
# Check extraDependencies.libraryHaskellDepends arg
|
||||
# Check that the extraDependencies.libraryHaskellDepends arg is correctly
|
||||
# picked up. This uses ghci to interpret a small Haskell program that uses
|
||||
# a package from extraDependencies.
|
||||
ghci <<EOF
|
||||
:m + Releaser.Primitives
|
||||
:m + System.IO
|
||||
writeFile "done" "done"
|
||||
:set -XOverloadedStrings
|
||||
:m + Conduit
|
||||
runResourceT $ connect (yield "done") (sinkFile "outfile")
|
||||
EOF
|
||||
[[ done == $(cat done) ]]
|
||||
|
||||
if [[ "done" != "$(cat outfile)" ]]; then
|
||||
echo "ERROR: extraDependencies appear not to be available in the environment"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Check packages arg
|
||||
cabal v2-build --offline --verbose constraints linear --ghc-options="-O0 -j$NIX_BUILD_CORES"
|
||||
|
||||
151
pkgs/test/haskell/upstreamStackHpackVersion/default.nix
Normal file
151
pkgs/test/haskell/upstreamStackHpackVersion/default.nix
Normal file
@@ -0,0 +1,151 @@
|
||||
|
||||
# This derivation confirms that the version of hpack used by stack in Nixpkgs
|
||||
# is the exact same version as the upstream stack release.
|
||||
#
|
||||
# It is important to make sure the version of hpack used by stack in Nixpkgs
|
||||
# matches with the version of hpack used by the upstream stack release. This
|
||||
# is because hpack works slightly differently based on the version, and it can
|
||||
# be frustrating to use hpack in a team setting when members are using different
|
||||
# versions. See for more info: https://github.com/NixOS/nixpkgs/issues/223390
|
||||
#
|
||||
# This test is written as a fixed-output derivation, because we need to access
|
||||
# accesses the internet to download the upstream stack release.
|
||||
|
||||
{ cacert, curl, lib, stack, stdenv }:
|
||||
|
||||
let
|
||||
# Find the hpack derivation that is a dependency of stack. Throw exception
|
||||
# if hpack cannot be found.
|
||||
hpack =
|
||||
lib.findFirst
|
||||
(v: v.pname or "" == "hpack")
|
||||
(throw "could not find stack's hpack dependency")
|
||||
stack.passthru.getCabalDeps.executableHaskellDepends;
|
||||
|
||||
# This is a statically linked version of stack, so it should be usable within
|
||||
# the Nixpkgs builder (at least on x86_64-linux).
|
||||
stackDownloadUrl =
|
||||
"https://github.com/commercialhaskell/stack/releases/download/v${stack.version}/stack-${stack.version}-linux-x86_64-static.tar.gz";
|
||||
|
||||
# This test code has been explicitly pulled out of the derivation below so
|
||||
# that it can be hashed and added to the `name` of the derivation. This is
|
||||
# so that this test derivation won't be cached if the body of the test is
|
||||
# modified.
|
||||
#
|
||||
# WARNING: When modifying this script, make sure you don't introduce any
|
||||
# paths to the Nix store within it. We only want this derivation to be re-run
|
||||
# when the stack version (or the version of its hpack dependency) changes in
|
||||
# Nixpkgs.
|
||||
testScript = ''
|
||||
curl=(
|
||||
curl
|
||||
--location
|
||||
--max-redirs 20
|
||||
--retry 3
|
||||
--disable-epsv
|
||||
--cookie-jar cookies
|
||||
--user-agent "curl "
|
||||
--insecure
|
||||
)
|
||||
|
||||
# Fetch the statically-linked upstream Stack binary.
|
||||
"''${curl[@]}" "${stackDownloadUrl}" > ./stack.tar.gz
|
||||
tar xf ./stack.tar.gz
|
||||
|
||||
upstream_stack_version_output="$(./stack-${stack.version}-linux-x86_64-static/stack --version)"
|
||||
echo "upstream \`stack --version\` output: $upstream_stack_version_output"
|
||||
|
||||
nixpkgs_stack_version_output="$(stack --version)"
|
||||
echo "nixpkgs \`stack --version\` output: $nixpkgs_stack_version_output"
|
||||
|
||||
# Confirm that the upstream stack version is the same as the stack version
|
||||
# in Nixpkgs. This check isn't strictly necessary, but it is a good sanity
|
||||
# check.
|
||||
|
||||
if [[ "$upstream_stack_version_output" =~ "Version "([0-9]+((\.[0-9]+)+)) ]]; then
|
||||
upstream_stack_version="''${BASH_REMATCH[1]}"
|
||||
|
||||
echo "parsed upstream stack version: $upstream_stack_version"
|
||||
echo "stack version from nixpkgs: ${stack.version}"
|
||||
|
||||
if [[ "${stack.version}" != "$upstream_stack_version" ]]; then
|
||||
echo "ERROR: stack version in Nixpkgs (${stack.version}) does not match the upstream version for some reason: $upstream_stack_version"
|
||||
exit 1
|
||||
fi
|
||||
else
|
||||
echo "ERROR: Upstream stack version cannot be found in --version output: $upstream_stack_version"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Confirm that the hpack version used in the upstream stack release is the
|
||||
# same as the hpack version used by the Nixpkgs stack binary.
|
||||
|
||||
if [[ "$upstream_stack_version_output" =~ hpack-([0-9]+((\.[0-9]+)+)) ]]; then
|
||||
upstream_hpack_version="''${BASH_REMATCH[1]}"
|
||||
|
||||
echo "parsed upstream stack's hpack version: $upstream_hpack_version"
|
||||
echo "Nixpkgs stack's hpack version: ${hpack.version}"
|
||||
|
||||
if [[ "${hpack.version}" != "$upstream_hpack_version" ]]; then
|
||||
echo "ERROR: stack's hpack version in Nixpkgs (${hpack.version}) does not match the upstream stack's hpack version: $upstream_hpack_version"
|
||||
echo "The stack derivation in Nixpkgs needs to be fixed up so that it depends on hpack-$upstream_hpack_version, instead of ${hpack.name}"
|
||||
exit 1
|
||||
fi
|
||||
else
|
||||
echo "ERROR: Upstream stack's hpack version cannot be found in --version output: $upstream_hpack_version"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Output a string with a known hash.
|
||||
echo "success" > $out
|
||||
'';
|
||||
|
||||
testScriptHash = builtins.hashString "sha256" testScript;
|
||||
in
|
||||
|
||||
stdenv.mkDerivation {
|
||||
|
||||
# This name is very important.
|
||||
#
|
||||
# The idea here is that want this derivation to be re-run everytime the
|
||||
# version of stack (or the version of its hpack dependency) changes in
|
||||
# Nixpkgs. We also want to re-run this derivation whenever the test script
|
||||
# is changed.
|
||||
#
|
||||
# Nix/Hydra will re-run derivations if their name changes (even if they are a
|
||||
# FOD and they have the same hash).
|
||||
#
|
||||
# The name of this derivation contains the stack version string, the hpack
|
||||
# version string, and a hash of the test script. So Nix will know to
|
||||
# re-run this version when (and only when) one of those values change.
|
||||
name = "upstream-stack-hpack-version-test-${stack.name}-${hpack.name}-${testScriptHash}";
|
||||
|
||||
# This is the sha256 hash for the string "success", which is output upon this
|
||||
# test succeeding.
|
||||
outputHash = "sha256-gbK9TqmMjbZlVPvI12N6GmmhMPMx/rcyt1yqtMSGj9U=";
|
||||
outputHashMode = "flat";
|
||||
outputHashAlgo = "sha256";
|
||||
|
||||
nativeBuildInputs = [ curl stack ];
|
||||
|
||||
impureEnvVars = lib.fetchers.proxyImpureEnvVars;
|
||||
|
||||
buildCommand = ''
|
||||
# Make sure curl can access HTTPS sites, like GitHub.
|
||||
#
|
||||
# Note that we absolutely don't want the Nix store path of the cacert
|
||||
# derivation in the testScript, because we don't want to rebuild this
|
||||
# derivation when only the cacert derivation changes.
|
||||
export SSL_CERT_FILE="${cacert}/etc/ssl/certs/ca-bundle.crt"
|
||||
'' + testScript;
|
||||
|
||||
meta = with lib; {
|
||||
description = "Test that the stack in Nixpkgs uses the same version of Hpack as the upstream stack release";
|
||||
maintainers = with maintainers; [ cdepillabout ];
|
||||
|
||||
# This derivation internally runs a statically-linked version of stack from
|
||||
# upstream. This statically-linked version of stack is only available for
|
||||
# x86_64-linux, so this test can only be run on x86_64-linux.
|
||||
platforms = [ "x86_64-linux" ];
|
||||
};
|
||||
}
|
||||
Reference in New Issue
Block a user