This CL can be used to compare the style of nixpkgs-fmt against other formatters (nixpkgs, alejandra). Change-Id: I87c6abff6bcb546b02ead15ad0405f81e01b6d9e Reviewed-on: https://cl.tvl.fyi/c/depot/+/4397 Tested-by: BuildkiteCI Reviewed-by: sterni <sternenseemann@systemli.org> Reviewed-by: lukegb <lukegb@tvl.fyi> Reviewed-by: wpcarro <wpcarro@gmail.com> Reviewed-by: Profpatsch <mail@profpatsch.de> Reviewed-by: kanepyork <rikingcoding@gmail.com> Reviewed-by: tazjin <tazjin@tvl.su> Reviewed-by: cynthia <cynthia@tvl.fyi> Reviewed-by: edef <edef@edef.eu> Reviewed-by: eta <tvl@eta.st> Reviewed-by: grfn <grfn@gws.fyi>
		
			
				
	
	
		
			122 lines
		
	
	
	
		
			3.7 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			122 lines
		
	
	
	
		
			3.7 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
# This file sets up the top-level package set by traversing the package tree
 | 
						|
# (see //nix/readTree for details) and constructing a matching attribute set
 | 
						|
# tree.
 | 
						|
 | 
						|
{ nixpkgsBisectPath ? null
 | 
						|
, parentTargetMap ? null
 | 
						|
, nixpkgsConfig ? { }
 | 
						|
, ...
 | 
						|
}@args:
 | 
						|
 | 
						|
let
 | 
						|
  inherit (builtins)
 | 
						|
    filter
 | 
						|
    ;
 | 
						|
 | 
						|
  readTree = import ./nix/readTree { };
 | 
						|
 | 
						|
  # Disallow access to //users from other depot parts.
 | 
						|
  usersFilter = readTree.restrictFolder {
 | 
						|
    folder = "users";
 | 
						|
    reason = ''
 | 
						|
      Code under //users is not considered stable or dependable in the
 | 
						|
      wider depot context. If a project under //users is required by
 | 
						|
      something else, please move it to a different depot path.
 | 
						|
    '';
 | 
						|
 | 
						|
    exceptions = [
 | 
						|
      # whitby is allowed to access //users for several reasons:
 | 
						|
      #
 | 
						|
      # 1. User SSH keys are set in //users.
 | 
						|
      # 2. Some personal websites or demo projects are served from it.
 | 
						|
      [ "ops" "machines" "whitby" ]
 | 
						|
 | 
						|
      # Due to evaluation order this also affects these targets.
 | 
						|
      # TODO(tazjin): Can this one be removed somehow?
 | 
						|
      [ "ops" "nixos" ]
 | 
						|
      [ "ops" "machines" "all-systems" ]
 | 
						|
    ];
 | 
						|
  };
 | 
						|
 | 
						|
  # Disallow access to //corp from other depot parts.
 | 
						|
  corpFilter = readTree.restrictFolder {
 | 
						|
    folder = "corp";
 | 
						|
    reason = ''
 | 
						|
      Code under //corp may use incompatible licensing terms with
 | 
						|
      other depot parts and should not be used anywhere else.
 | 
						|
    '';
 | 
						|
 | 
						|
    exceptions = [
 | 
						|
      # For the same reason as above, whitby is exempt to serve the
 | 
						|
      # corp website.
 | 
						|
      [ "ops" "machines" "whitby" ]
 | 
						|
      [ "ops" "nixos" ]
 | 
						|
      [ "ops" "machines" "all-systems" ]
 | 
						|
    ];
 | 
						|
  };
 | 
						|
 | 
						|
  readDepot = depotArgs: readTree {
 | 
						|
    args = depotArgs;
 | 
						|
    path = ./.;
 | 
						|
    filter = parts: args: corpFilter parts (usersFilter parts args);
 | 
						|
    scopedArgs = {
 | 
						|
      __findFile = _: _: throw "Do not import from NIX_PATH in the depot!";
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  # To determine build targets, we walk through the depot tree and
 | 
						|
  # fetch attributes that were imported by readTree and are buildable.
 | 
						|
  #
 | 
						|
  # Any build target that contains `meta.ci.skip = true` will be skipped.
 | 
						|
 | 
						|
  # Is this tree node eligible for build inclusion?
 | 
						|
  eligible = node: (node ? outPath) && !(node.meta.ci.skip or false);
 | 
						|
 | 
						|
in
 | 
						|
readTree.fix (self: (readDepot {
 | 
						|
  depot = self;
 | 
						|
 | 
						|
  # Pass third_party as 'pkgs' (for compatibility with external
 | 
						|
  # imports for certain subdirectories)
 | 
						|
  pkgs = self.third_party.nixpkgs;
 | 
						|
 | 
						|
  # Expose lib attribute to packages.
 | 
						|
  lib = self.third_party.nixpkgs.lib;
 | 
						|
 | 
						|
  # Pass arguments passed to the entire depot through, for packages
 | 
						|
  # that would like to add functionality based on this.
 | 
						|
  #
 | 
						|
  # Note that it is intended for exceptional circumstance, such as
 | 
						|
  # debugging by bisecting nixpkgs.
 | 
						|
  externalArgs = args;
 | 
						|
}) // {
 | 
						|
  # Make the path to the depot available for things that might need it
 | 
						|
  # (e.g. NixOS module inclusions)
 | 
						|
  path = self.third_party.nixpkgs.lib.cleanSourceWith {
 | 
						|
    name = "depot";
 | 
						|
    src = ./.;
 | 
						|
    filter = self.third_party.nixpkgs.lib.cleanSourceFilter;
 | 
						|
  };
 | 
						|
 | 
						|
  # List of all buildable targets, for CI purposes.
 | 
						|
  #
 | 
						|
  # Note: To prevent infinite recursion, this *must* be a nested
 | 
						|
  # attribute set (which does not have a __readTree attribute).
 | 
						|
  ci.targets = readTree.gather eligible (self // {
 | 
						|
    # remove the pipelines themselves from the set over which to
 | 
						|
    # generate pipelines because that also leads to infinite
 | 
						|
    # recursion.
 | 
						|
    ops = self.ops // { pipelines = null; };
 | 
						|
 | 
						|
    # remove nixpkgs from the set, for obvious reasons.
 | 
						|
    third_party = self.third_party // { nixpkgs = null; };
 | 
						|
  });
 | 
						|
 | 
						|
  # Derivation that gcroots all depot targets.
 | 
						|
  ci.gcroot = with self.third_party.nixpkgs; makeSetupHook
 | 
						|
    {
 | 
						|
      name = "depot-gcroot";
 | 
						|
      deps = self.ci.targets;
 | 
						|
    }
 | 
						|
    emptyFile;
 | 
						|
})
 |