2019-12-09 03:40:48 +01:00
|
|
|
# This file sets up the top-level package set by traversing the package tree
|
2021-04-12 21:49:36 +02:00
|
|
|
# (see //nix/readTree for details) and constructing a matching attribute set
|
2019-12-09 03:40:48 +01:00
|
|
|
# tree.
|
2019-06-29 15:12:24 +02:00
|
|
|
|
2021-04-10 23:43:41 +02:00
|
|
|
{ nixpkgsBisectPath ? null, ... }@args:
|
2019-12-13 22:32:35 +01:00
|
|
|
|
2019-06-29 15:12:24 +02:00
|
|
|
let
|
2021-04-12 21:49:36 +02:00
|
|
|
inherit (builtins)
|
|
|
|
attrValues
|
|
|
|
concatMap
|
2021-08-26 19:00:03 +02:00
|
|
|
elem
|
|
|
|
elemAt
|
2021-04-12 21:49:36 +02:00
|
|
|
filter
|
|
|
|
;
|
|
|
|
|
2019-12-09 03:40:48 +01:00
|
|
|
# This definition of fix is identical to <nixpkgs>.lib.fix, but the global
|
|
|
|
# package set is not available here.
|
|
|
|
fix = f: let x = f x; in x;
|
2021-08-26 19:00:03 +02:00
|
|
|
|
|
|
|
# readTree argument filter to generally disallow access to //users
|
|
|
|
# from other depot parts. Exceptions can be added for specific
|
|
|
|
# (full) paths.
|
|
|
|
depotArgsFilter = args: parts:
|
|
|
|
if (elemAt parts 0) == "users" || elem parts [
|
|
|
|
# whitby is allowed to access //users for two reasons:
|
|
|
|
#
|
|
|
|
# 1. Users host their SSH key sets in //users.
|
|
|
|
# 2. tazjin's website is currently hosted on whitby because
|
|
|
|
# camden is in storage.
|
|
|
|
#
|
|
|
|
[ "ops" "machines" "whitby" ]
|
|
|
|
|
2021-08-26 23:01:03 +02:00
|
|
|
# Due to evaluation order this also affects these targets.
|
2021-08-26 19:00:03 +02:00
|
|
|
# TODO(tazjin): Can this one be removed somehow?
|
|
|
|
[ "ops" "nixos" ]
|
2021-08-26 23:01:03 +02:00
|
|
|
[ "ops" "machines" "all-systems" ]
|
2021-08-26 19:00:03 +02:00
|
|
|
|
|
|
|
# //web/bubblegum has examples using //users/sterni, they should
|
|
|
|
# probably be in the user folder instead with a link there.
|
|
|
|
# TODO(sterni): Clean this up.
|
|
|
|
[ "web" "bubblegum" ]
|
|
|
|
]
|
|
|
|
then args
|
|
|
|
else args // {
|
|
|
|
depot = args.depot // {
|
|
|
|
users = throw ''
|
|
|
|
Access to items from the //users folder is not permitted from
|
|
|
|
other depot paths. Code under //users is not considered stable
|
|
|
|
or dependable in the wider depot context.
|
|
|
|
|
|
|
|
If a project under //users is required by something else,
|
|
|
|
please move it to a different depot path.
|
|
|
|
|
2021-08-26 22:50:56 +02:00
|
|
|
At location: //${builtins.concatStringsSep "/" parts}
|
2021-08-26 19:00:03 +02:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
readTree' = import ./nix/readTree {
|
|
|
|
argsFilter = depotArgsFilter;
|
|
|
|
};
|
2019-12-09 03:40:48 +01:00
|
|
|
|
2020-08-27 01:11:11 +02:00
|
|
|
# To determine build targets, we walk through the depot tree and
|
|
|
|
# fetch attributes that were imported by readTree and are buildable.
|
|
|
|
#
|
|
|
|
# Any build target that contains `meta.ci = false` will be skipped.
|
|
|
|
|
|
|
|
# Is this tree node eligible for build inclusion?
|
|
|
|
eligible = node: (node ? outPath) && (node.meta.ci or true);
|
|
|
|
|
|
|
|
# Walk the tree starting with 'node', recursively extending the list
|
|
|
|
# of build targets with anything that looks buildable.
|
2020-08-31 02:36:03 +02:00
|
|
|
#
|
|
|
|
# Any tree node can specify logical targets by exporting a
|
|
|
|
# 'meta.targets' attribute containing a list of keys in itself. This
|
|
|
|
# enables target specifications that do not exist on disk directly.
|
2020-08-27 01:11:11 +02:00
|
|
|
gather = node:
|
|
|
|
if node ? __readTree then
|
2020-08-31 02:36:03 +02:00
|
|
|
# Include the node itself if it is eligible.
|
|
|
|
(if eligible node then [ node ] else [])
|
|
|
|
# Include eligible children of the node
|
|
|
|
++ concatMap gather (attrValues node)
|
|
|
|
# Include specified sub-targets of the node
|
|
|
|
++ filter eligible (map
|
|
|
|
(k: (node."${k}" or {}) // {
|
|
|
|
# Keep the same tree location, but explicitly mark this
|
|
|
|
# node as a subtarget.
|
|
|
|
__readTree = node.__readTree;
|
|
|
|
__subtarget = k;
|
|
|
|
})
|
|
|
|
(node.meta.targets or []))
|
2020-08-27 01:11:11 +02:00
|
|
|
else [];
|
2020-06-13 22:39:48 +02:00
|
|
|
|
2021-04-12 21:49:36 +02:00
|
|
|
in fix(self: (readTree' {
|
|
|
|
depot = self;
|
|
|
|
|
|
|
|
# Pass third_party as 'pkgs' (for compatibility with external
|
|
|
|
# imports for certain subdirectories)
|
|
|
|
pkgs = self.third_party.nixpkgs;
|
|
|
|
|
|
|
|
# Expose lib attribute to packages.
|
|
|
|
lib = self.third_party.nixpkgs.lib;
|
|
|
|
|
|
|
|
# Pass arguments passed to the entire depot through, for packages
|
|
|
|
# that would like to add functionality based on this.
|
|
|
|
#
|
|
|
|
# Note that it is intended for exceptional circumstance, such as
|
|
|
|
# debugging by bisecting nixpkgs.
|
|
|
|
externalArgs = args;
|
|
|
|
} ./.) // {
|
2021-04-12 22:26:55 +02:00
|
|
|
# Make the path to the depot available for things that might need it
|
|
|
|
# (e.g. NixOS module inclusions)
|
|
|
|
path = ./.;
|
2020-06-24 04:08:53 +02:00
|
|
|
|
2020-08-27 01:11:11 +02:00
|
|
|
# List of all buildable targets, for CI purposes.
|
|
|
|
#
|
2020-08-27 02:05:45 +02:00
|
|
|
# Note: To prevent infinite recursion, this *must* be a nested
|
|
|
|
# attribute set (which does not have a __readTree attribute).
|
|
|
|
ci.targets = gather (self // {
|
|
|
|
# remove the pipelines themselves from the set over which to
|
|
|
|
# generate pipelines because that also leads to infinite
|
|
|
|
# recursion.
|
|
|
|
ops = self.ops // { pipelines = null; };
|
2021-04-10 18:05:16 +02:00
|
|
|
|
|
|
|
# remove nixpkgs from the set, for obvious reasons.
|
|
|
|
third_party = self.third_party // { nixpkgs = null; };
|
2020-08-27 02:05:45 +02:00
|
|
|
});
|
2021-04-11 12:19:18 +02:00
|
|
|
|
|
|
|
# Derivation that gcroots all depot targets.
|
|
|
|
ci.gcroot = self.third_party.nixpkgs.symlinkJoin {
|
|
|
|
name = "depot-gcroot";
|
|
|
|
paths = self.ci.targets;
|
|
|
|
};
|
2021-04-12 21:49:36 +02:00
|
|
|
})
|