1318 lines
		
	
	
		
			38 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			1318 lines
		
	
	
		
			38 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| set -eu
 | ||
| set -o pipefail
 | ||
| 
 | ||
| if (( "${NIX_DEBUG:-0}" >= 6 )); then
 | ||
|     set -x
 | ||
| fi
 | ||
| 
 | ||
| : ${outputs:=out}
 | ||
| 
 | ||
| 
 | ||
| ######################################################################
 | ||
| # Hook handling.
 | ||
| 
 | ||
| 
 | ||
| # Run all hooks with the specified name in the order in which they
 | ||
| # were added, stopping if any fails (returns a non-zero exit
 | ||
| # code). The hooks for <hookName> are the shell function or variable
 | ||
| # <hookName>, and the values of the shell array ‘<hookName>Hooks’.
 | ||
| runHook() {
 | ||
|     local hookName="$1"
 | ||
|     shift
 | ||
|     local hooksSlice="${hookName%Hook}Hooks[@]"
 | ||
| 
 | ||
|     local hook
 | ||
|     # Hack around old bash being bad and thinking empty arrays are
 | ||
|     # undefined.
 | ||
|     for hook in "_callImplicitHook 0 $hookName" ${!hooksSlice+"${!hooksSlice}"}; do
 | ||
|         _eval "$hook" "$@"
 | ||
|     done
 | ||
| 
 | ||
|     return 0
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| # Run all hooks with the specified name, until one succeeds (returns a
 | ||
| # zero exit code). If none succeed, return a non-zero exit code.
 | ||
| runOneHook() {
 | ||
|     local hookName="$1"
 | ||
|     shift
 | ||
|     local hooksSlice="${hookName%Hook}Hooks[@]"
 | ||
| 
 | ||
|     local hook ret=1
 | ||
|     # Hack around old bash like above
 | ||
|     for hook in "_callImplicitHook 1 $hookName" ${!hooksSlice+"${!hooksSlice}"}; do
 | ||
|         if _eval "$hook" "$@"; then
 | ||
|             ret=0
 | ||
|             break
 | ||
|         fi
 | ||
|     done
 | ||
| 
 | ||
|     return "$ret"
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| # Run the named hook, either by calling the function with that name or
 | ||
| # by evaluating the variable with that name. This allows convenient
 | ||
| # setting of hooks both from Nix expressions (as attributes /
 | ||
| # environment variables) and from shell scripts (as functions). If you
 | ||
| # want to allow multiple hooks, use runHook instead.
 | ||
| _callImplicitHook() {
 | ||
|     local def="$1"
 | ||
|     local hookName="$2"
 | ||
|     if declare -F "$hookName" > /dev/null; then
 | ||
|         "$hookName"
 | ||
|     elif type -p "$hookName" > /dev/null; then
 | ||
|         source "$hookName"
 | ||
|     elif [ -n "${!hookName:-}" ]; then
 | ||
|         eval "${!hookName}"
 | ||
|     else
 | ||
|         return "$def"
 | ||
|     fi
 | ||
|     # `_eval` expects hook to need nounset disable and leave it
 | ||
|     # disabled anyways, so Ok to to delegate. The alternative of a
 | ||
|     # return trap is no good because it would affect nested returns.
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| # A function wrapper around ‘eval’ that ensures that ‘return’ inside
 | ||
| # hooks exits the hook, not the caller. Also will only pass args if
 | ||
| # command can take them
 | ||
| _eval() {
 | ||
|     if declare -F "$1" > /dev/null 2>&1; then
 | ||
|         "$@" # including args
 | ||
|     else
 | ||
|         eval "$1"
 | ||
|     fi
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| ######################################################################
 | ||
| # Logging.
 | ||
| 
 | ||
| # Obsolete.
 | ||
| stopNest() { true; }
 | ||
| header() { echo "$1"; }
 | ||
| closeNest() { true; }
 | ||
| 
 | ||
| # Prints a command such that all word splits are unambiguous. We need
 | ||
| # to split the command in three parts because the middle format string
 | ||
| # will be, and must be, repeated for each argument. The first argument
 | ||
| # goes before the ':' and is just for convenience.
 | ||
| echoCmd() {
 | ||
|     printf "%s:" "$1"
 | ||
|     shift
 | ||
|     printf ' %q' "$@"
 | ||
|     echo
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| ######################################################################
 | ||
| # Error handling.
 | ||
| 
 | ||
| exitHandler() {
 | ||
|     exitCode="$?"
 | ||
|     set +e
 | ||
| 
 | ||
|     if [ -n "${showBuildStats:-}" ]; then
 | ||
|         times > "$NIX_BUILD_TOP/.times"
 | ||
|         local -a times=($(cat "$NIX_BUILD_TOP/.times"))
 | ||
|         # Print the following statistics:
 | ||
|         # - user time for the shell
 | ||
|         # - system time for the shell
 | ||
|         # - user time for all child processes
 | ||
|         # - system time for all child processes
 | ||
|         echo "build time elapsed: " "${times[@]}"
 | ||
|     fi
 | ||
| 
 | ||
|     if (( "$exitCode" != 0 )); then
 | ||
|         runHook failureHook
 | ||
| 
 | ||
|         # If the builder had a non-zero exit code and
 | ||
|         # $succeedOnFailure is set, create the file
 | ||
|         # ‘$out/nix-support/failed’ to signal failure, and exit
 | ||
|         # normally.  Otherwise, return the original exit code.
 | ||
|         if [ -n "${succeedOnFailure:-}" ]; then
 | ||
|             echo "build failed with exit code $exitCode (ignored)"
 | ||
|             mkdir -p "$out/nix-support"
 | ||
|             printf "%s" "$exitCode" > "$out/nix-support/failed"
 | ||
|             exit 0
 | ||
|         fi
 | ||
| 
 | ||
|     else
 | ||
|         runHook exitHook
 | ||
|     fi
 | ||
| 
 | ||
|     exit "$exitCode"
 | ||
| }
 | ||
| 
 | ||
| trap "exitHandler" EXIT
 | ||
| 
 | ||
| 
 | ||
| ######################################################################
 | ||
| # Helper functions.
 | ||
| 
 | ||
| 
 | ||
| addToSearchPathWithCustomDelimiter() {
 | ||
|     local delimiter="$1"
 | ||
|     local varName="$2"
 | ||
|     local dir="$3"
 | ||
|     if [ -d "$dir" ]; then
 | ||
|         export "${varName}=${!varName:+${!varName}${delimiter}}${dir}"
 | ||
|     fi
 | ||
| }
 | ||
| 
 | ||
| addToSearchPath() {
 | ||
|     addToSearchPathWithCustomDelimiter ":" "$@"
 | ||
| }
 | ||
| 
 | ||
| # Add $1/lib* into rpaths.
 | ||
| # The function is used in multiple-outputs.sh hook,
 | ||
| # so it is defined here but tried after the hook.
 | ||
| _addRpathPrefix() {
 | ||
|     if [ "${NIX_NO_SELF_RPATH:-0}" != 1 ]; then
 | ||
|         export NIX_LDFLAGS="-rpath $1/lib ${NIX_LDFLAGS-}"
 | ||
|         if [ -n "${NIX_LIB64_IN_SELF_RPATH:-}" ]; then
 | ||
|             export NIX_LDFLAGS="-rpath $1/lib64 ${NIX_LDFLAGS-}"
 | ||
|         fi
 | ||
|         if [ -n "${NIX_LIB32_IN_SELF_RPATH:-}" ]; then
 | ||
|             export NIX_LDFLAGS="-rpath $1/lib32 ${NIX_LDFLAGS-}"
 | ||
|         fi
 | ||
|     fi
 | ||
| }
 | ||
| 
 | ||
| # Return success if the specified file is an ELF object.
 | ||
| isELF() {
 | ||
|     local fn="$1"
 | ||
|     local fd
 | ||
|     local magic
 | ||
|     exec {fd}< "$fn"
 | ||
|     read -r -n 4 -u "$fd" magic
 | ||
|     exec {fd}<&-
 | ||
|     if [ "$magic" = $'\177ELF' ]; then return 0; else return 1; fi
 | ||
| }
 | ||
| 
 | ||
| # Return success if the specified file is a script (i.e. starts with
 | ||
| # "#!").
 | ||
| isScript() {
 | ||
|     local fn="$1"
 | ||
|     local fd
 | ||
|     local magic
 | ||
|     exec {fd}< "$fn"
 | ||
|     read -r -n 2 -u "$fd" magic
 | ||
|     exec {fd}<&-
 | ||
|     if [[ "$magic" =~ \#! ]]; then return 0; else return 1; fi
 | ||
| }
 | ||
| 
 | ||
| # printf unfortunately will print a trailing newline regardless
 | ||
| printLines() {
 | ||
|     (( "$#" > 0 )) || return 0
 | ||
|     printf '%s\n' "$@"
 | ||
| }
 | ||
| 
 | ||
| printWords() {
 | ||
|     (( "$#" > 0 )) || return 0
 | ||
|     printf '%s ' "$@"
 | ||
| }
 | ||
| 
 | ||
| ######################################################################
 | ||
| # Initialisation.
 | ||
| 
 | ||
| 
 | ||
| # Set a fallback default value for SOURCE_DATE_EPOCH, used by some build tools
 | ||
| # to provide a deterministic substitute for the "current" time. Note that
 | ||
| # 315532800 = 1980-01-01 12:00:00. We use this date because python's wheel
 | ||
| # implementation uses zip archive and zip does not support dates going back to
 | ||
| # 1970.
 | ||
| export SOURCE_DATE_EPOCH
 | ||
| : ${SOURCE_DATE_EPOCH:=315532800}
 | ||
| 
 | ||
| 
 | ||
| # Wildcard expansions that don't match should expand to an empty list.
 | ||
| # This ensures that, for instance, "for i in *; do ...; done" does the
 | ||
| # right thing.
 | ||
| shopt -s nullglob
 | ||
| 
 | ||
| 
 | ||
| # Set up the initial path.
 | ||
| PATH=
 | ||
| HOST_PATH=
 | ||
| for i in $initialPath; do
 | ||
|     if [ "$i" = / ]; then i=; fi
 | ||
|     addToSearchPath PATH "$i/bin"
 | ||
| 
 | ||
|     # For backward compatibility, we add initial path to HOST_PATH so
 | ||
|     # it can be used in auto patch-shebangs. Unfortunately this will
 | ||
|     # not work with cross compilation.
 | ||
|     if [ -z "${strictDeps-}" ]; then
 | ||
|         addToSearchPath HOST_PATH "$i/bin"
 | ||
|     fi
 | ||
| done
 | ||
| 
 | ||
| unset i
 | ||
| 
 | ||
| if (( "${NIX_DEBUG:-0}" >= 1 )); then
 | ||
|     echo "initial path: $PATH"
 | ||
| fi
 | ||
| 
 | ||
| 
 | ||
| # Check that the pre-hook initialised SHELL.
 | ||
| if [ -z "${SHELL:-}" ]; then echo "SHELL not set"; exit 1; fi
 | ||
| BASH="$SHELL"
 | ||
| export CONFIG_SHELL="$SHELL"
 | ||
| 
 | ||
| 
 | ||
| # Execute the pre-hook.
 | ||
| if [ -z "${shell:-}" ]; then export shell="$SHELL"; fi
 | ||
| runHook preHook
 | ||
| 
 | ||
| 
 | ||
| # Allow the caller to augment buildInputs (it's not always possible to
 | ||
| # do this before the call to setup.sh, since the PATH is empty at that
 | ||
| # point; here we have a basic Unix environment).
 | ||
| runHook addInputsHook
 | ||
| 
 | ||
| 
 | ||
| # Package accumulators
 | ||
| 
 | ||
| # shellcheck disable=SC2034
 | ||
| declare -a pkgsBuildBuild pkgsBuildHost pkgsBuildTarget
 | ||
| declare -a pkgsHostHost pkgsHostTarget
 | ||
| declare -a pkgsTargetTarget
 | ||
| 
 | ||
| declare -a pkgBuildAccumVars=(pkgsBuildBuild pkgsBuildHost pkgsBuildTarget)
 | ||
| declare -a pkgHostAccumVars=(pkgsHostHost pkgsHostTarget)
 | ||
| declare -a pkgTargetAccumVars=(pkgsTargetTarget)
 | ||
| 
 | ||
| declare -a pkgAccumVarVars=(pkgBuildAccumVars pkgHostAccumVars pkgTargetAccumVars)
 | ||
| 
 | ||
| 
 | ||
| # Hooks
 | ||
| 
 | ||
| declare -a envBuildBuildHooks envBuildHostHooks envBuildTargetHooks
 | ||
| declare -a envHostHostHooks envHostTargetHooks
 | ||
| declare -a envTargetTargetHooks
 | ||
| 
 | ||
| declare -a pkgBuildHookVars=(envBuildBuildHook envBuildHostHook envBuildTargetHook)
 | ||
| declare -a pkgHostHookVars=(envHostHostHook envHostTargetHook)
 | ||
| declare -a pkgTargetHookVars=(envTargetTargetHook)
 | ||
| 
 | ||
| declare -a pkgHookVarVars=(pkgBuildHookVars pkgHostHookVars pkgTargetHookVars)
 | ||
| 
 | ||
| # Add env hooks for all sorts of deps with the specified host offset.
 | ||
| addEnvHooks() {
 | ||
|     local depHostOffset="$1"
 | ||
|     shift
 | ||
|     local pkgHookVarsSlice="${pkgHookVarVars[$depHostOffset + 1]}[@]"
 | ||
|     local pkgHookVar
 | ||
|     for pkgHookVar in "${!pkgHookVarsSlice}"; do
 | ||
|         eval "${pkgHookVar}s"'+=("$@")'
 | ||
|     done
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| # Propagated dep files
 | ||
| 
 | ||
| declare -a propagatedBuildDepFiles=(
 | ||
|     propagated-build-build-deps
 | ||
|     propagated-native-build-inputs # Legacy name for back-compat
 | ||
|     propagated-build-target-deps
 | ||
| )
 | ||
| declare -a propagatedHostDepFiles=(
 | ||
|     propagated-host-host-deps
 | ||
|     propagated-build-inputs # Legacy name for back-compat
 | ||
| )
 | ||
| declare -a propagatedTargetDepFiles=(
 | ||
|     propagated-target-target-deps
 | ||
| )
 | ||
| declare -a propagatedDepFilesVars=(
 | ||
|     propagatedBuildDepFiles
 | ||
|     propagatedHostDepFiles
 | ||
|     propagatedTargetDepFiles
 | ||
| )
 | ||
| 
 | ||
| # Platform offsets: build = -1, host = 0, target = 1
 | ||
| declare -a allPlatOffsets=(-1 0 1)
 | ||
| 
 | ||
| 
 | ||
| # Mutually-recursively find all build inputs. See the dependency section of the
 | ||
| # stdenv chapter of the Nixpkgs manual for the specification this algorithm
 | ||
| # implements.
 | ||
| findInputs() {
 | ||
|     local -r pkg="$1"
 | ||
|     local -ri hostOffset="$2"
 | ||
|     local -ri targetOffset="$3"
 | ||
| 
 | ||
|     # Sanity check
 | ||
|     (( "$hostOffset" <= "$targetOffset" )) || exit -1
 | ||
| 
 | ||
|     local varVar="${pkgAccumVarVars[$hostOffset + 1]}"
 | ||
|     local varRef="$varVar[\$targetOffset - \$hostOffset]"
 | ||
|     local var="${!varRef}"
 | ||
|     unset -v varVar varRef
 | ||
| 
 | ||
|     # TODO(@Ericson2314): Restore using associative array once Darwin
 | ||
|     # nix-shell doesn't use impure bash. This should replace the O(n)
 | ||
|     # case with an O(1) hash map lookup, assuming bash is implemented
 | ||
|     # well :D.
 | ||
|     local varSlice="$var[*]"
 | ||
|     # ${..-} to hack around old bash empty array problem
 | ||
|     case "${!varSlice-}" in
 | ||
|         *" $pkg "*) return 0 ;;
 | ||
|     esac
 | ||
|     unset -v varSlice
 | ||
| 
 | ||
|     eval "$var"'+=("$pkg")'
 | ||
| 
 | ||
|     if ! [ -e "$pkg" ]; then
 | ||
|         echo "build input $pkg does not exist" >&2
 | ||
|         exit 1
 | ||
|     fi
 | ||
| 
 | ||
|     # The current package's host and target offset together
 | ||
|     # provide a <=-preserving homomorphism from the relative
 | ||
|     # offsets to current offset
 | ||
|     local -i mapOffsetResult
 | ||
|     function mapOffset() {
 | ||
|         local -ri inputOffset="$1"
 | ||
|         if (( "$inputOffset" <= 0 )); then
 | ||
|             local -ri outputOffset="$inputOffset + $hostOffset"
 | ||
|         else
 | ||
|             local -ri outputOffset="$inputOffset - 1 + $targetOffset"
 | ||
|         fi
 | ||
|         mapOffsetResult="$outputOffset"
 | ||
|     }
 | ||
| 
 | ||
|     # Host offset relative to that of the package whose immediate
 | ||
|     # dependencies we are currently exploring.
 | ||
|     local -i relHostOffset
 | ||
|     for relHostOffset in "${allPlatOffsets[@]}"; do
 | ||
|         # `+ 1` so we start at 0 for valid index
 | ||
|         local files="${propagatedDepFilesVars[$relHostOffset + 1]}"
 | ||
| 
 | ||
|         # Host offset relative to the package currently being
 | ||
|         # built---as absolute an offset as will be used.
 | ||
|         mapOffset relHostOffset
 | ||
|         local -i hostOffsetNext="$mapOffsetResult"
 | ||
| 
 | ||
|         # Ensure we're in bounds relative to the package currently
 | ||
|         # being built.
 | ||
|         [[ "${allPlatOffsets[*]}" = *"$hostOffsetNext"*  ]] || continue
 | ||
| 
 | ||
|         # Target offset relative to the *host* offset of the package
 | ||
|         # whose immediate dependencies we are currently exploring.
 | ||
|         local -i relTargetOffset
 | ||
|         for relTargetOffset in "${allPlatOffsets[@]}"; do
 | ||
|             (( "$relHostOffset" <= "$relTargetOffset" )) || continue
 | ||
| 
 | ||
|             local fileRef="${files}[$relTargetOffset - $relHostOffset]"
 | ||
|             local file="${!fileRef}"
 | ||
|             unset -v fileRef
 | ||
| 
 | ||
|             # Target offset relative to the package currently being
 | ||
|             # built.
 | ||
|             mapOffset relTargetOffset
 | ||
|             local -i targetOffsetNext="$mapOffsetResult"
 | ||
| 
 | ||
|             # Once again, ensure we're in bounds relative to the
 | ||
|             # package currently being built.
 | ||
|             [[ "${allPlatOffsets[*]}" = *"$targetOffsetNext"* ]] || continue
 | ||
| 
 | ||
|             [[ -f "$pkg/nix-support/$file" ]] || continue
 | ||
| 
 | ||
|             local pkgNext
 | ||
|             read -r -d '' pkgNext < "$pkg/nix-support/$file" || true
 | ||
|             for pkgNext in $pkgNext; do
 | ||
|                 findInputs "$pkgNext" "$hostOffsetNext" "$targetOffsetNext"
 | ||
|             done
 | ||
|         done
 | ||
|     done
 | ||
| }
 | ||
| 
 | ||
| # Make sure all are at least defined as empty
 | ||
| : ${depsBuildBuild=} ${depsBuildBuildPropagated=}
 | ||
| : ${nativeBuildInputs=} ${propagatedNativeBuildInputs=} ${defaultNativeBuildInputs=}
 | ||
| : ${depsBuildTarget=} ${depsBuildTargetPropagated=}
 | ||
| : ${depsHostHost=} ${depsHostHostPropagated=}
 | ||
| : ${buildInputs=} ${propagatedBuildInputs=} ${defaultBuildInputs=}
 | ||
| : ${depsTargetTarget=} ${depsTargetTargetPropagated=}
 | ||
| 
 | ||
| for pkg in $depsBuildBuild $depsBuildBuildPropagated; do
 | ||
|     findInputs "$pkg" -1 -1
 | ||
| done
 | ||
| for pkg in $nativeBuildInputs $propagatedNativeBuildInputs; do
 | ||
|     findInputs "$pkg" -1  0
 | ||
| done
 | ||
| for pkg in $depsBuildTarget $depsBuildTargetPropagated; do
 | ||
|     findInputs "$pkg" -1  1
 | ||
| done
 | ||
| for pkg in $depsHostHost $depsHostHostPropagated; do
 | ||
|     findInputs "$pkg"  0  0
 | ||
| done
 | ||
| for pkg in $buildInputs $propagatedBuildInputs ; do
 | ||
|     findInputs "$pkg"  0  1
 | ||
| done
 | ||
| for pkg in $depsTargetTarget $depsTargetTargetPropagated; do
 | ||
|     findInputs "$pkg"  1  1
 | ||
| done
 | ||
| # Default inputs must be processed last
 | ||
| for pkg in $defaultNativeBuildInputs; do
 | ||
|     findInputs "$pkg" -1  0
 | ||
| done
 | ||
| for pkg in $defaultBuildInputs; do
 | ||
|     findInputs "$pkg"  0  1
 | ||
| done
 | ||
| 
 | ||
| # Add package to the future PATH and run setup hooks
 | ||
| activatePackage() {
 | ||
|     local pkg="$1"
 | ||
|     local -ri hostOffset="$2"
 | ||
|     local -ri targetOffset="$3"
 | ||
| 
 | ||
|     # Sanity check
 | ||
|     (( "$hostOffset" <= "$targetOffset" )) || exit -1
 | ||
| 
 | ||
|     if [ -f "$pkg" ]; then
 | ||
|         source "$pkg"
 | ||
|     fi
 | ||
| 
 | ||
|     # Only dependencies whose host platform is guaranteed to match the
 | ||
|     # build platform are included here. That would be `depsBuild*`,
 | ||
|     # and legacy `nativeBuildInputs`, in general. If we aren't cross
 | ||
|     # compiling, however, everything can be put on the PATH. To ease
 | ||
|     # the transition, we do include everything in thatcase.
 | ||
|     #
 | ||
|     # TODO(@Ericson2314): Don't special-case native compilation
 | ||
|     if [[ -z "${strictDeps-}" || "$hostOffset" -le -1 ]]; then
 | ||
|         addToSearchPath _PATH "$pkg/bin"
 | ||
|     fi
 | ||
| 
 | ||
|     if [[ "$hostOffset" -le -1 ]]; then
 | ||
|         addToSearchPath _XDG_DATA_DIRS "$pkg/share"
 | ||
|     fi
 | ||
| 
 | ||
|     if [[ "$hostOffset" -eq 0 && -d "$pkg/bin" ]]; then
 | ||
|         addToSearchPath _HOST_PATH "$pkg/bin"
 | ||
|     fi
 | ||
| 
 | ||
|     if [[ -f "$pkg/nix-support/setup-hook" ]]; then
 | ||
|         source "$pkg/nix-support/setup-hook"
 | ||
|     fi
 | ||
| }
 | ||
| 
 | ||
| _activatePkgs() {
 | ||
|     local -i hostOffset targetOffset
 | ||
|     local pkg
 | ||
| 
 | ||
|     for hostOffset in "${allPlatOffsets[@]}"; do
 | ||
|         local pkgsVar="${pkgAccumVarVars[$hostOffset + 1]}"
 | ||
|         for targetOffset in "${allPlatOffsets[@]}"; do
 | ||
|             (( "$hostOffset" <= "$targetOffset" )) || continue
 | ||
|             local pkgsRef="${pkgsVar}[$targetOffset - $hostOffset]"
 | ||
|             local pkgsSlice="${!pkgsRef}[@]"
 | ||
|             for pkg in ${!pkgsSlice+"${!pkgsSlice}"}; do
 | ||
|                 activatePackage "$pkg" "$hostOffset" "$targetOffset"
 | ||
|             done
 | ||
|         done
 | ||
|     done
 | ||
| }
 | ||
| 
 | ||
| # Run the package setup hooks and build _PATH
 | ||
| _activatePkgs
 | ||
| 
 | ||
| # Set the relevant environment variables to point to the build inputs
 | ||
| # found above.
 | ||
| #
 | ||
| # These `depOffset`s, beyond indexing the arrays, also tell the env
 | ||
| # hook what sort of dependency (ignoring propagatedness) is being
 | ||
| # passed to the env hook. In a real language, we'd append a closure
 | ||
| # with this information to the relevant env hook array, but bash
 | ||
| # doesn't have closures, so it's easier to just pass this in.
 | ||
| _addToEnv() {
 | ||
|     local -i depHostOffset depTargetOffset
 | ||
|     local pkg
 | ||
| 
 | ||
|     for depHostOffset in "${allPlatOffsets[@]}"; do
 | ||
|         local hookVar="${pkgHookVarVars[$depHostOffset + 1]}"
 | ||
|         local pkgsVar="${pkgAccumVarVars[$depHostOffset + 1]}"
 | ||
|         for depTargetOffset in "${allPlatOffsets[@]}"; do
 | ||
|             (( "$depHostOffset" <= "$depTargetOffset" )) || continue
 | ||
|             local hookRef="${hookVar}[$depTargetOffset - $depHostOffset]"
 | ||
|             if [[ -z "${strictDeps-}" ]]; then
 | ||
| 
 | ||
|                 # Keep track of which packages we have visited before.
 | ||
|                 local visitedPkgs=""
 | ||
| 
 | ||
|                 # Apply environment hooks to all packages during native
 | ||
|                 # compilation to ease the transition.
 | ||
|                 #
 | ||
|                 # TODO(@Ericson2314): Don't special-case native compilation
 | ||
|                 for pkg in \
 | ||
|                     ${pkgsBuildBuild+"${pkgsBuildBuild[@]}"} \
 | ||
|                     ${pkgsBuildHost+"${pkgsBuildHost[@]}"} \
 | ||
|                     ${pkgsBuildTarget+"${pkgsBuildTarget[@]}"} \
 | ||
|                     ${pkgsHostHost+"${pkgsHostHost[@]}"} \
 | ||
|                     ${pkgsHostTarget+"${pkgsHostTarget[@]}"} \
 | ||
|                     ${pkgsTargetTarget+"${pkgsTargetTarget[@]}"}
 | ||
|                 do
 | ||
|                     if [[ "$visitedPkgs" = *"$pkg"* ]]; then
 | ||
|                         continue
 | ||
|                     fi
 | ||
|                     runHook "${!hookRef}" "$pkg"
 | ||
|                     visitedPkgs+=" $pkg"
 | ||
|                 done
 | ||
|             else
 | ||
|                 local pkgsRef="${pkgsVar}[$depTargetOffset - $depHostOffset]"
 | ||
|                 local pkgsSlice="${!pkgsRef}[@]"
 | ||
|                 for pkg in ${!pkgsSlice+"${!pkgsSlice}"}; do
 | ||
|                     runHook "${!hookRef}" "$pkg"
 | ||
|                 done
 | ||
|             fi
 | ||
|         done
 | ||
|     done
 | ||
| }
 | ||
| 
 | ||
| # Run the package-specific hooks set by the setup-hook scripts.
 | ||
| _addToEnv
 | ||
| 
 | ||
| 
 | ||
| # Unset setup-specific declared variables
 | ||
| unset allPlatOffsets
 | ||
| unset pkgBuildAccumVars pkgHostAccumVars pkgTargetAccumVars pkgAccumVarVars
 | ||
| unset pkgBuildHookVars pkgHostHookVars pkgTargetHookVars pkgHookVarVars
 | ||
| unset propagatedDepFilesVars
 | ||
| 
 | ||
| 
 | ||
| _addRpathPrefix "$out"
 | ||
| 
 | ||
| 
 | ||
| # Set the TZ (timezone) environment variable, otherwise commands like
 | ||
| # `date' will complain (e.g., `Tue Mar 9 10:01:47 Local time zone must
 | ||
| # be set--see zic manual page 2004').
 | ||
| export TZ=UTC
 | ||
| 
 | ||
| 
 | ||
| # Set the prefix.  This is generally $out, but it can be overriden,
 | ||
| # for instance if we just want to perform a test build/install to a
 | ||
| # temporary location and write a build report to $out.
 | ||
| if [ -z "${prefix:-}" ]; then
 | ||
|     prefix="$out";
 | ||
| fi
 | ||
| 
 | ||
| if [ "${useTempPrefix:-}" = 1 ]; then
 | ||
|     prefix="$NIX_BUILD_TOP/tmp_prefix";
 | ||
| fi
 | ||
| 
 | ||
| 
 | ||
| PATH="${_PATH-}${_PATH:+${PATH:+:}}$PATH"
 | ||
| HOST_PATH="${_HOST_PATH-}${_HOST_PATH:+${HOST_PATH:+:}}$HOST_PATH"
 | ||
| export XDG_DATA_DIRS="${_XDG_DATA_DIRS-}${_XDG_DATA_DIRS:+${XDG_DATA_DIRS:+:}}${XDG_DATA_DIRS-}"
 | ||
| if (( "${NIX_DEBUG:-0}" >= 1 )); then
 | ||
|     echo "final path: $PATH"
 | ||
|     echo "final host path: $HOST_PATH"
 | ||
|     echo "final data dirs: $XDG_DATA_DIRS"
 | ||
| fi
 | ||
| 
 | ||
| unset _PATH
 | ||
| unset _HOST_PATH
 | ||
| unset _XDG_DATA_DIRS
 | ||
| 
 | ||
| 
 | ||
| # Make GNU Make produce nested output.
 | ||
| export NIX_INDENT_MAKE=1
 | ||
| 
 | ||
| 
 | ||
| # Normalize the NIX_BUILD_CORES variable. The value might be 0, which
 | ||
| # means that we're supposed to try and auto-detect the number of
 | ||
| # available CPU cores at run-time.
 | ||
| 
 | ||
| if [ -z "${NIX_BUILD_CORES:-}" ]; then
 | ||
|   NIX_BUILD_CORES="1"
 | ||
| elif [ "$NIX_BUILD_CORES" -le 0 ]; then
 | ||
|   NIX_BUILD_CORES=$(nproc 2>/dev/null || true)
 | ||
|   if expr >/dev/null 2>&1 "$NIX_BUILD_CORES" : "^[0-9][0-9]*$"; then
 | ||
|     :
 | ||
|   else
 | ||
|     NIX_BUILD_CORES="1"
 | ||
|   fi
 | ||
| fi
 | ||
| export NIX_BUILD_CORES
 | ||
| 
 | ||
| 
 | ||
| # Prevent SSL libraries from using certificates in /etc/ssl, unless set explicitly.
 | ||
| # Leave it in impure shells for convenience.
 | ||
| if [ -z "${NIX_SSL_CERT_FILE:-}" ] && [ "${IN_NIX_SHELL:-}" != "impure" ]; then
 | ||
|   export NIX_SSL_CERT_FILE=/no-cert-file.crt
 | ||
| fi
 | ||
| # Another variant left for compatibility.
 | ||
| if [ -z "${SSL_CERT_FILE:-}" ] && [ "${IN_NIX_SHELL:-}" != "impure" ]; then
 | ||
|   export SSL_CERT_FILE=/no-cert-file.crt
 | ||
| fi
 | ||
| 
 | ||
| 
 | ||
| ######################################################################
 | ||
| # Textual substitution functions.
 | ||
| 
 | ||
| 
 | ||
| substituteStream() {
 | ||
|     local var=$1
 | ||
|     local description=$2
 | ||
|     shift 2
 | ||
| 
 | ||
|     while (( "$#" )); do
 | ||
|         case "$1" in
 | ||
|             --replace)
 | ||
|                 pattern="$2"
 | ||
|                 replacement="$3"
 | ||
|                 shift 3
 | ||
|                 local savedvar
 | ||
|                 savedvar="${!var}"
 | ||
|                 eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}'
 | ||
|                 if [ "$pattern" != "$replacement" ]; then
 | ||
|                     if [ "${!var}" == "$savedvar" ]; then
 | ||
|                         echo "substituteStream(): WARNING: pattern '$pattern' doesn't match anything in $description" >&2
 | ||
|                     fi
 | ||
|                 fi
 | ||
|                 ;;
 | ||
| 
 | ||
|             --subst-var)
 | ||
|                 local varName="$2"
 | ||
|                 shift 2
 | ||
|                 # check if the used nix attribute name is a valid bash name
 | ||
|                 if ! [[ "$varName" =~ ^[a-zA-Z_][a-zA-Z0-9_]*$ ]]; then
 | ||
|                     echo "substituteStream(): ERROR: substitution variables must be valid Bash names, \"$varName\" isn't." >&2
 | ||
|                     return 1
 | ||
|                 fi
 | ||
|                 if [ -z ${!varName+x} ]; then
 | ||
|                     echo "substituteStream(): ERROR: variable \$$varName is unset" >&2
 | ||
|                     return 1
 | ||
|                 fi
 | ||
|                 pattern="@$varName@"
 | ||
|                 replacement="${!varName}"
 | ||
|                 eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}'
 | ||
|                 ;;
 | ||
| 
 | ||
|             --subst-var-by)
 | ||
|                 pattern="@$2@"
 | ||
|                 replacement="$3"
 | ||
|                 eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}'
 | ||
|                 shift 3
 | ||
|                 ;;
 | ||
| 
 | ||
|             *)
 | ||
|                 echo "substituteStream(): ERROR: Invalid command line argument: $1" >&2
 | ||
|                 return 1
 | ||
|                 ;;
 | ||
|         esac
 | ||
|     done
 | ||
| 
 | ||
|     printf "%s" "${!var}"
 | ||
| }
 | ||
| 
 | ||
| consumeEntire() {
 | ||
|     # read returns non-0 on EOF, so we want read to fail
 | ||
|     if IFS='' read -r -N 0 $1; then
 | ||
|         echo "consumeEntire(): ERROR: Input null bytes, won't process" >&2
 | ||
|         return 1
 | ||
|     fi
 | ||
| }
 | ||
| 
 | ||
| substitute() {
 | ||
|     local input="$1"
 | ||
|     local output="$2"
 | ||
|     shift 2
 | ||
| 
 | ||
|     if [ ! -f "$input" ]; then
 | ||
|         echo "substitute(): ERROR: file '$input' does not exist" >&2
 | ||
|         return 1
 | ||
|     fi
 | ||
| 
 | ||
|     local content
 | ||
|     consumeEntire content < "$input"
 | ||
| 
 | ||
|     if [ -e "$output" ]; then chmod +w "$output"; fi
 | ||
|     substituteStream content "file '$input'" "$@" > "$output"
 | ||
| }
 | ||
| 
 | ||
| substituteInPlace() {
 | ||
|     local fileName="$1"
 | ||
|     shift
 | ||
|     substitute "$fileName" "$fileName" "$@"
 | ||
| }
 | ||
| 
 | ||
| _allFlags() {
 | ||
|     for varName in $(awk 'BEGIN { for (v in ENVIRON) if (v ~ /^[a-z][a-zA-Z0-9_]*$/) print v }'); do
 | ||
|         if (( "${NIX_DEBUG:-0}" >= 1 )); then
 | ||
|             printf "@%s@ -> %q\n" "${varName}" "${!varName}"
 | ||
|         fi
 | ||
|         args+=("--subst-var" "$varName")
 | ||
|     done
 | ||
| }
 | ||
| 
 | ||
| substituteAllStream() {
 | ||
|     local -a args=()
 | ||
|     _allFlags
 | ||
| 
 | ||
|     substituteStream "$1" "$2" "${args[@]}"
 | ||
| }
 | ||
| 
 | ||
| # Substitute all environment variables that start with a lowercase character and
 | ||
| # are valid Bash names.
 | ||
| substituteAll() {
 | ||
|     local input="$1"
 | ||
|     local output="$2"
 | ||
| 
 | ||
|     local -a args=()
 | ||
|     _allFlags
 | ||
| 
 | ||
|     substitute "$input" "$output" "${args[@]}"
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| substituteAllInPlace() {
 | ||
|     local fileName="$1"
 | ||
|     shift
 | ||
|     substituteAll "$fileName" "$fileName" "$@"
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| ######################################################################
 | ||
| # What follows is the generic builder.
 | ||
| 
 | ||
| 
 | ||
| # This function is useful for debugging broken Nix builds.  It dumps
 | ||
| # all environment variables to a file `env-vars' in the build
 | ||
| # directory.  If the build fails and the `-K' option is used, you can
 | ||
| # then go to the build directory and source in `env-vars' to reproduce
 | ||
| # the environment used for building.
 | ||
| dumpVars() {
 | ||
|     if [ "${noDumpEnvVars:-0}" != 1 ]; then
 | ||
|         export 2>/dev/null >| "$NIX_BUILD_TOP/env-vars" || true
 | ||
|     fi
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| # Utility function: echo the base name of the given path, with the
 | ||
| # prefix `HASH-' removed, if present.
 | ||
| stripHash() {
 | ||
|     local strippedName casematchOpt=0
 | ||
|     # On separate line for `set -e`
 | ||
|     strippedName="$(basename -- "$1")"
 | ||
|     shopt -q nocasematch && casematchOpt=1
 | ||
|     shopt -u nocasematch
 | ||
|     if [[ "$strippedName" =~ ^[a-z0-9]{32}- ]]; then
 | ||
|         echo "${strippedName:33}"
 | ||
|     else
 | ||
|         echo "$strippedName"
 | ||
|     fi
 | ||
|     if (( casematchOpt )); then shopt -s nocasematch; fi
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| unpackCmdHooks+=(_defaultUnpack)
 | ||
| _defaultUnpack() {
 | ||
|     local fn="$1"
 | ||
| 
 | ||
|     if [ -d "$fn" ]; then
 | ||
| 
 | ||
|         # We can't preserve hardlinks because they may have been
 | ||
|         # introduced by store optimization, which might break things
 | ||
|         # in the build.
 | ||
|         cp -pr --reflink=auto -- "$fn" "$(stripHash "$fn")"
 | ||
| 
 | ||
|     else
 | ||
| 
 | ||
|         case "$fn" in
 | ||
|             *.tar.xz | *.tar.lzma | *.txz)
 | ||
|                 # Don't rely on tar knowing about .xz.
 | ||
|                 xz -d < "$fn" | tar xf -
 | ||
|                 ;;
 | ||
|             *.tar | *.tar.* | *.tgz | *.tbz2 | *.tbz)
 | ||
|                 # GNU tar can automatically select the decompression method
 | ||
|                 # (info "(tar) gzip").
 | ||
|                 tar xf "$fn"
 | ||
|                 ;;
 | ||
|             *)
 | ||
|                 return 1
 | ||
|                 ;;
 | ||
|         esac
 | ||
| 
 | ||
|     fi
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| unpackFile() {
 | ||
|     curSrc="$1"
 | ||
|     header "unpacking source archive $curSrc" 3
 | ||
|     if ! runOneHook unpackCmd "$curSrc"; then
 | ||
|         echo "do not know how to unpack source archive $curSrc"
 | ||
|         exit 1
 | ||
|     fi
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| unpackPhase() {
 | ||
|     runHook preUnpack
 | ||
| 
 | ||
|     if [ -z "${srcs:-}" ]; then
 | ||
|         if [ -z "${src:-}" ]; then
 | ||
|             # shellcheck disable=SC2016
 | ||
|             echo 'variable $src or $srcs should point to the source'
 | ||
|             exit 1
 | ||
|         fi
 | ||
|         srcs="$src"
 | ||
|     fi
 | ||
| 
 | ||
|     # To determine the source directory created by unpacking the
 | ||
|     # source archives, we record the contents of the current
 | ||
|     # directory, then look below which directory got added.  Yeah,
 | ||
|     # it's rather hacky.
 | ||
|     local dirsBefore=""
 | ||
|     for i in *; do
 | ||
|         if [ -d "$i" ]; then
 | ||
|             dirsBefore="$dirsBefore $i "
 | ||
|         fi
 | ||
|     done
 | ||
| 
 | ||
|     # Unpack all source archives.
 | ||
|     for i in $srcs; do
 | ||
|         unpackFile "$i"
 | ||
|     done
 | ||
| 
 | ||
|     # Find the source directory.
 | ||
| 
 | ||
|     # set to empty if unset
 | ||
|     : ${sourceRoot=}
 | ||
| 
 | ||
|     if [ -n "${setSourceRoot:-}" ]; then
 | ||
|         runOneHook setSourceRoot
 | ||
|     elif [ -z "$sourceRoot" ]; then
 | ||
|         for i in *; do
 | ||
|             if [ -d "$i" ]; then
 | ||
|                 case $dirsBefore in
 | ||
|                     *\ $i\ *)
 | ||
|                         ;;
 | ||
|                     *)
 | ||
|                         if [ -n "$sourceRoot" ]; then
 | ||
|                             echo "unpacker produced multiple directories"
 | ||
|                             exit 1
 | ||
|                         fi
 | ||
|                         sourceRoot="$i"
 | ||
|                         ;;
 | ||
|                 esac
 | ||
|             fi
 | ||
|         done
 | ||
|     fi
 | ||
| 
 | ||
|     if [ -z "$sourceRoot" ]; then
 | ||
|         echo "unpacker appears to have produced no directories"
 | ||
|         exit 1
 | ||
|     fi
 | ||
| 
 | ||
|     echo "source root is $sourceRoot"
 | ||
| 
 | ||
|     # By default, add write permission to the sources.  This is often
 | ||
|     # necessary when sources have been copied from other store
 | ||
|     # locations.
 | ||
|     if [ "${dontMakeSourcesWritable:-0}" != 1 ]; then
 | ||
|         chmod -R u+w -- "$sourceRoot"
 | ||
|     fi
 | ||
| 
 | ||
|     runHook postUnpack
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| patchPhase() {
 | ||
|     runHook prePatch
 | ||
| 
 | ||
|     for i in ${patches:-}; do
 | ||
|         header "applying patch $i" 3
 | ||
|         local uncompress=cat
 | ||
|         case "$i" in
 | ||
|             *.gz)
 | ||
|                 uncompress="gzip -d"
 | ||
|                 ;;
 | ||
|             *.bz2)
 | ||
|                 uncompress="bzip2 -d"
 | ||
|                 ;;
 | ||
|             *.xz)
 | ||
|                 uncompress="xz -d"
 | ||
|                 ;;
 | ||
|             *.lzma)
 | ||
|                 uncompress="lzma -d"
 | ||
|                 ;;
 | ||
|         esac
 | ||
|         # "2>&1" is a hack to make patch fail if the decompressor fails (nonexistent patch, etc.)
 | ||
|         # shellcheck disable=SC2086
 | ||
|         $uncompress < "$i" 2>&1 | patch ${patchFlags:--p1}
 | ||
|     done
 | ||
| 
 | ||
|     runHook postPatch
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| fixLibtool() {
 | ||
|     sed -i -e 's^eval sys_lib_.*search_path=.*^^' "$1"
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| configurePhase() {
 | ||
|     runHook preConfigure
 | ||
| 
 | ||
|     # set to empty if unset
 | ||
|     : ${configureScript=}
 | ||
|     : ${configureFlags=}
 | ||
| 
 | ||
|     if [[ -z "$configureScript" && -x ./configure ]]; then
 | ||
|         configureScript=./configure
 | ||
|     fi
 | ||
| 
 | ||
|     if [ -z "${dontFixLibtool:-}" ]; then
 | ||
|         local i
 | ||
|         find . -iname "ltmain.sh" -print0 | while IFS='' read -r -d '' i; do
 | ||
|             echo "fixing libtool script $i"
 | ||
|             fixLibtool "$i"
 | ||
|         done
 | ||
|     fi
 | ||
| 
 | ||
|     if [[ -z "${dontAddPrefix:-}" && -n "$prefix" ]]; then
 | ||
|         configureFlags="${prefixKey:---prefix=}$prefix $configureFlags"
 | ||
|     fi
 | ||
| 
 | ||
|     # Add --disable-dependency-tracking to speed up some builds.
 | ||
|     if [ -z "${dontAddDisableDepTrack:-}" ]; then
 | ||
|         if [ -f "$configureScript" ] && grep -q dependency-tracking "$configureScript"; then
 | ||
|             configureFlags="--disable-dependency-tracking $configureFlags"
 | ||
|         fi
 | ||
|     fi
 | ||
| 
 | ||
|     # By default, disable static builds.
 | ||
|     if [ -z "${dontDisableStatic:-}" ]; then
 | ||
|         if [ -f "$configureScript" ] && grep -q enable-static "$configureScript"; then
 | ||
|             configureFlags="--disable-static $configureFlags"
 | ||
|         fi
 | ||
|     fi
 | ||
| 
 | ||
|     if [ -n "$configureScript" ]; then
 | ||
|         # Old bash empty array hack
 | ||
|         # shellcheck disable=SC2086
 | ||
|         local flagsArray=(
 | ||
|             $configureFlags ${configureFlagsArray+"${configureFlagsArray[@]}"}
 | ||
|         )
 | ||
|         echoCmd 'configure flags' "${flagsArray[@]}"
 | ||
|         # shellcheck disable=SC2086
 | ||
|         $configureScript "${flagsArray[@]}"
 | ||
|         unset flagsArray
 | ||
|     else
 | ||
|         echo "no configure script, doing nothing"
 | ||
|     fi
 | ||
| 
 | ||
|     runHook postConfigure
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| buildPhase() {
 | ||
|     runHook preBuild
 | ||
| 
 | ||
|     # set to empty if unset
 | ||
|     : ${makeFlags=}
 | ||
| 
 | ||
|     if [[ -z "$makeFlags" && -z "${makefile:-}" && ! ( -e Makefile || -e makefile || -e GNUmakefile ) ]]; then
 | ||
|         echo "no Makefile, doing nothing"
 | ||
|     else
 | ||
|         foundMakefile=1
 | ||
| 
 | ||
|         # Old bash empty array hack
 | ||
|         # shellcheck disable=SC2086
 | ||
|         local flagsArray=(
 | ||
|             ${enableParallelBuilding:+-j${NIX_BUILD_CORES} -l${NIX_BUILD_CORES}}
 | ||
|             SHELL=$SHELL
 | ||
|             $makeFlags ${makeFlagsArray+"${makeFlagsArray[@]}"}
 | ||
|             $buildFlags ${buildFlagsArray+"${buildFlagsArray[@]}"}
 | ||
|         )
 | ||
| 
 | ||
|         echoCmd 'build flags' "${flagsArray[@]}"
 | ||
|         make ${makefile:+-f $makefile} "${flagsArray[@]}"
 | ||
|         unset flagsArray
 | ||
|     fi
 | ||
| 
 | ||
|     runHook postBuild
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| checkPhase() {
 | ||
|     runHook preCheck
 | ||
| 
 | ||
|     if [[ -z "${foundMakefile:-}" ]]; then
 | ||
|         echo "no Makefile or custom checkPhase, doing nothing"
 | ||
|         runHook postCheck
 | ||
|         return
 | ||
|     fi
 | ||
| 
 | ||
|     if [[ -z "${checkTarget:-}" ]]; then
 | ||
|         #TODO(@oxij): should flagsArray influence make -n?
 | ||
|         if make -n ${makefile:+-f $makefile} check >/dev/null 2>&1; then
 | ||
|             checkTarget=check
 | ||
|         elif make -n ${makefile:+-f $makefile} test >/dev/null 2>&1; then
 | ||
|             checkTarget=test
 | ||
|         fi
 | ||
|     fi
 | ||
| 
 | ||
|     if [[ -z "${checkTarget:-}" ]]; then
 | ||
|         echo "no check/test target in ${makefile:-Makefile}, doing nothing"
 | ||
|     else
 | ||
|         # Old bash empty array hack
 | ||
|         # shellcheck disable=SC2086
 | ||
|         local flagsArray=(
 | ||
|             ${enableParallelChecking:+-j${NIX_BUILD_CORES} -l${NIX_BUILD_CORES}}
 | ||
|             SHELL=$SHELL
 | ||
|             $makeFlags ${makeFlagsArray+"${makeFlagsArray[@]}"}
 | ||
|             ${checkFlags:-VERBOSE=y} ${checkFlagsArray+"${checkFlagsArray[@]}"}
 | ||
|             ${checkTarget}
 | ||
|         )
 | ||
| 
 | ||
|         echoCmd 'check flags' "${flagsArray[@]}"
 | ||
|         make ${makefile:+-f $makefile} "${flagsArray[@]}"
 | ||
| 
 | ||
|         unset flagsArray
 | ||
|     fi
 | ||
| 
 | ||
|     runHook postCheck
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| installPhase() {
 | ||
|     runHook preInstall
 | ||
| 
 | ||
|     if [ -n "$prefix" ]; then
 | ||
|         mkdir -p "$prefix"
 | ||
|     fi
 | ||
| 
 | ||
|     # Old bash empty array hack
 | ||
|     # shellcheck disable=SC2086
 | ||
|     local flagsArray=(
 | ||
|         SHELL=$SHELL
 | ||
|         $makeFlags ${makeFlagsArray+"${makeFlagsArray[@]}"}
 | ||
|         $installFlags ${installFlagsArray+"${installFlagsArray[@]}"}
 | ||
|         ${installTargets:-install}
 | ||
|     )
 | ||
| 
 | ||
|     echoCmd 'install flags' "${flagsArray[@]}"
 | ||
|     make ${makefile:+-f $makefile} "${flagsArray[@]}"
 | ||
|     unset flagsArray
 | ||
| 
 | ||
|     runHook postInstall
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| # The fixup phase performs generic, package-independent stuff, like
 | ||
| # stripping binaries, running patchelf and setting
 | ||
| # propagated-build-inputs.
 | ||
| fixupPhase() {
 | ||
|     # Make sure everything is writable so "strip" et al. work.
 | ||
|     local output
 | ||
|     for output in $outputs; do
 | ||
|         if [ -e "${!output}" ]; then chmod -R u+w "${!output}"; fi
 | ||
|     done
 | ||
| 
 | ||
|     runHook preFixup
 | ||
| 
 | ||
|     # Apply fixup to each output.
 | ||
|     local output
 | ||
|     for output in $outputs; do
 | ||
|         prefix="${!output}" runHook fixupOutput
 | ||
|     done
 | ||
| 
 | ||
| 
 | ||
|     # Propagate dependencies & setup hook into the development output.
 | ||
|     declare -ra flatVars=(
 | ||
|         # Build
 | ||
|         depsBuildBuildPropagated
 | ||
|         propagatedNativeBuildInputs
 | ||
|         depsBuildTargetPropagated
 | ||
|         # Host
 | ||
|         depsHostHostPropagated
 | ||
|         propagatedBuildInputs
 | ||
|         # Target
 | ||
|         depsTargetTargetPropagated
 | ||
|     )
 | ||
|     declare -ra flatFiles=(
 | ||
|         "${propagatedBuildDepFiles[@]}"
 | ||
|         "${propagatedHostDepFiles[@]}"
 | ||
|         "${propagatedTargetDepFiles[@]}"
 | ||
|     )
 | ||
| 
 | ||
|     local propagatedInputsIndex
 | ||
|     for propagatedInputsIndex in "${!flatVars[@]}"; do
 | ||
|         local propagatedInputsSlice="${flatVars[$propagatedInputsIndex]}[@]"
 | ||
|         local propagatedInputsFile="${flatFiles[$propagatedInputsIndex]}"
 | ||
| 
 | ||
|         [[ "${!propagatedInputsSlice}" ]] || continue
 | ||
| 
 | ||
|         mkdir -p "${!outputDev}/nix-support"
 | ||
|         # shellcheck disable=SC2086
 | ||
|         printWords ${!propagatedInputsSlice} > "${!outputDev}/nix-support/$propagatedInputsFile"
 | ||
|     done
 | ||
| 
 | ||
| 
 | ||
|     if [ -n "${setupHook:-}" ]; then
 | ||
|         mkdir -p "${!outputDev}/nix-support"
 | ||
|         substituteAll "$setupHook" "${!outputDev}/nix-support/setup-hook"
 | ||
|     fi
 | ||
| 
 | ||
|     # TODO(@Ericson2314): Remove after https://github.com/NixOS/nixpkgs/pull/31414
 | ||
|     if [ -n "${setupHooks:-}" ]; then
 | ||
|         mkdir -p "${!outputDev}/nix-support"
 | ||
|         local hook
 | ||
|         for hook in $setupHooks; do
 | ||
|             local content
 | ||
|             consumeEntire content < "$hook"
 | ||
|             substituteAllStream content "file '$hook'" >> "${!outputDev}/nix-support/setup-hook"
 | ||
|             unset -v content
 | ||
|         done
 | ||
|         unset -v hook
 | ||
|     fi
 | ||
| 
 | ||
|     # Propagate user-env packages into the output with binaries, TODO?
 | ||
| 
 | ||
|     if [ -n "${propagatedUserEnvPkgs:-}" ]; then
 | ||
|         mkdir -p "${!outputBin}/nix-support"
 | ||
|         # shellcheck disable=SC2086
 | ||
|         printWords $propagatedUserEnvPkgs > "${!outputBin}/nix-support/propagated-user-env-packages"
 | ||
|     fi
 | ||
| 
 | ||
|     runHook postFixup
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| installCheckPhase() {
 | ||
|     runHook preInstallCheck
 | ||
| 
 | ||
|     if [[ -z "${foundMakefile:-}" ]]; then
 | ||
|         echo "no Makefile or custom installCheckPhase, doing nothing"
 | ||
|     #TODO(@oxij): should flagsArray influence make -n?
 | ||
|     elif [[ -z "${installCheckTarget:-}" ]] \
 | ||
|        && ! make -n ${makefile:+-f $makefile} ${installCheckTarget:-installcheck} >/dev/null 2>&1; then
 | ||
|         echo "no installcheck target in ${makefile:-Makefile}, doing nothing"
 | ||
|     else
 | ||
|         # Old bash empty array hack
 | ||
|         # shellcheck disable=SC2086
 | ||
|         local flagsArray=(
 | ||
|             ${enableParallelChecking:+-j${NIX_BUILD_CORES} -l${NIX_BUILD_CORES}}
 | ||
|             SHELL=$SHELL
 | ||
|             $makeFlags ${makeFlagsArray+"${makeFlagsArray[@]}"}
 | ||
|             $installCheckFlags ${installCheckFlagsArray+"${installCheckFlagsArray[@]}"}
 | ||
|             ${installCheckTarget:-installcheck}
 | ||
|         )
 | ||
| 
 | ||
|         echoCmd 'installcheck flags' "${flagsArray[@]}"
 | ||
|         make ${makefile:+-f $makefile} "${flagsArray[@]}"
 | ||
|         unset flagsArray
 | ||
|     fi
 | ||
| 
 | ||
|     runHook postInstallCheck
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| distPhase() {
 | ||
|     runHook preDist
 | ||
| 
 | ||
|     # Old bash empty array hack
 | ||
|     # shellcheck disable=SC2086
 | ||
|     local flagsArray=(
 | ||
|         $distFlags ${distFlagsArray+"${distFlagsArray[@]}"} ${distTarget:-dist}
 | ||
|     )
 | ||
| 
 | ||
|     echo 'dist flags: %q' "${flagsArray[@]}"
 | ||
|     make ${makefile:+-f $makefile} "${flagsArray[@]}"
 | ||
| 
 | ||
|     if [ "${dontCopyDist:-0}" != 1 ]; then
 | ||
|         mkdir -p "$out/tarballs"
 | ||
| 
 | ||
|         # Note: don't quote $tarballs, since we explicitly permit
 | ||
|         # wildcards in there.
 | ||
|         # shellcheck disable=SC2086
 | ||
|         cp -pvd ${tarballs:-*.tar.gz} "$out/tarballs"
 | ||
|     fi
 | ||
| 
 | ||
|     runHook postDist
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| showPhaseHeader() {
 | ||
|     local phase="$1"
 | ||
|     case "$phase" in
 | ||
|         unpackPhase) header "unpacking sources";;
 | ||
|         patchPhase) header "patching sources";;
 | ||
|         configurePhase) header "configuring";;
 | ||
|         buildPhase) header "building";;
 | ||
|         checkPhase) header "running tests";;
 | ||
|         installPhase) header "installing";;
 | ||
|         fixupPhase) header "post-installation fixup";;
 | ||
|         installCheckPhase) header "running install tests";;
 | ||
|         *) header "$phase";;
 | ||
|     esac
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| genericBuild() {
 | ||
|     if [ -f "${buildCommandPath:-}" ]; then
 | ||
|         source "$buildCommandPath"
 | ||
|         return
 | ||
|     fi
 | ||
|     if [ -n "${buildCommand:-}" ]; then
 | ||
|         eval "$buildCommand"
 | ||
|         return
 | ||
|     fi
 | ||
| 
 | ||
|     if [ -z "${phases:-}" ]; then
 | ||
|         phases="${prePhases:-} unpackPhase patchPhase ${preConfigurePhases:-} \
 | ||
|             configurePhase ${preBuildPhases:-} buildPhase checkPhase \
 | ||
|             ${preInstallPhases:-} installPhase ${preFixupPhases:-} fixupPhase installCheckPhase \
 | ||
|             ${preDistPhases:-} distPhase ${postPhases:-}";
 | ||
|     fi
 | ||
| 
 | ||
|     for curPhase in $phases; do
 | ||
|         if [[ "$curPhase" = unpackPhase && -n "${dontUnpack:-}" ]]; then continue; fi
 | ||
|         if [[ "$curPhase" = patchPhase && -n "${dontPatch:-}" ]]; then continue; fi
 | ||
|         if [[ "$curPhase" = configurePhase && -n "${dontConfigure:-}" ]]; then continue; fi
 | ||
|         if [[ "$curPhase" = buildPhase && -n "${dontBuild:-}" ]]; then continue; fi
 | ||
|         if [[ "$curPhase" = checkPhase && -z "${doCheck:-}" ]]; then continue; fi
 | ||
|         if [[ "$curPhase" = installPhase && -n "${dontInstall:-}" ]]; then continue; fi
 | ||
|         if [[ "$curPhase" = fixupPhase && -n "${dontFixup:-}" ]]; then continue; fi
 | ||
|         if [[ "$curPhase" = installCheckPhase && -z "${doInstallCheck:-}" ]]; then continue; fi
 | ||
|         if [[ "$curPhase" = distPhase && -z "${doDist:-}" ]]; then continue; fi
 | ||
| 
 | ||
|         if [[ -n $NIX_LOG_FD ]]; then
 | ||
|             echo "@nix { \"action\": \"setPhase\", \"phase\": \"$curPhase\" }" >&$NIX_LOG_FD
 | ||
|         fi
 | ||
| 
 | ||
|         showPhaseHeader "$curPhase"
 | ||
|         dumpVars
 | ||
| 
 | ||
|         # Evaluate the variable named $curPhase if it exists, otherwise the
 | ||
|         # function named $curPhase.
 | ||
|         eval "${!curPhase:-$curPhase}"
 | ||
| 
 | ||
|         if [ "$curPhase" = unpackPhase ]; then
 | ||
|             cd "${sourceRoot:-.}"
 | ||
|         fi
 | ||
|     done
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| # Execute the post-hooks.
 | ||
| runHook postHook
 | ||
| 
 | ||
| 
 | ||
| # Execute the global user hook (defined through the Nixpkgs
 | ||
| # configuration option ‘stdenv.userHook’).  This can be used to set
 | ||
| # global compiler optimisation flags, for instance.
 | ||
| runHook userHook
 | ||
| 
 | ||
| 
 | ||
| dumpVars
 | ||
| 
 | ||
| # Disable nounset for nix-shell.
 | ||
| set +u
 | 
