-
-
Notifications
You must be signed in to change notification settings - Fork 23
/
default.nix
223 lines (190 loc) · 7.82 KB
/
default.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
{ pkgs ? import <nixpkgs> {}
, nodejs ? pkgs.nodejs-8_x
, nodePackages ? pkgs.nodePackages_8_x
, node-gyp ? nodePackages.node-gyp
} @modArgs:
# Scope mkPnpmDerivation
with (import ./derivation.nix {
inherit pkgs nodejs nodePackages node-gyp;
});
with pkgs;
let
# Replace disallowed characters from package name
# @acme/package -> acme-package
safePkgName = name: builtins.replaceStrings ["@" "/"] ["" "-"] name;
rewritePnpmLock = import ./pnpmlock.nix {
inherit pkgs nodejs nodePackages;
};
importYAML = name: yamlFile: (lib.importJSON ((pkgs.runCommandNoCC name {} ''
mkdir -p $out
${pkgs.yaml2json}/bin/yaml2json < ${yamlFile} | ${pkgs.jq}/bin/jq -a '.' > $out/pnpmlock.json
'').outPath + "/pnpmlock.json"));
overrideDrv = (overrides: drv:
if (lib.hasAttr drv.pname overrides) then
(overrides."${drv.pname}" drv)
else drv);
defaultPnpmOverrides = import ./overrides.nix {
inherit pkgs nodejs nodePackages;
};
in {
inherit defaultPnpmOverrides;
# Create a nix-shell friendly development environment
mkPnpmEnv = drv: let
pkgJSON = writeText "${drv.name}-package-json" (builtins.toJSON drv.passthru.packageJSON);
envDrv = (drv.override {linkDevDependencies = true;}).overrideAttrs(oldAttrs: {
propagatedBuildInputs = [
# Avoid getting npm and its deps in environment
(drv.passthru.nodejs.override { enableNpm = false; })
# Users probably want pnpm
nodePackages.pnpm
];
srcs = [];
src = pkgs.runCommandNoCC "pnpm2nix-dummy-env-src" {} ''
mkdir $out
'';
# Remove original nodejs from inputs, it's now propagated and stripped from npm
buildInputs = builtins.filter (x: x != drv.passthru.nodejs) oldAttrs.buildInputs;
outputs = [ "out" ];
buildPhase = "true";
postUnpack = ''
mkdir -p node_modules/${oldAttrs.pname}
ln -s ${pkgJSON} node_modules/${oldAttrs.pname}/package.json
'';
installPhase = ''
mkdir -p $out
mv node_modules $out
'';
});
in makeSetupHook {
deps = envDrv.buildInputs ++ envDrv.propagatedBuildInputs;
} (writeScript "pnpm-env-hook.sh" ''
export NODE_PATH=${lib.getLib envDrv}/node_modules
'');
mkPnpmPackage = {
src,
packageJSON ? src + "/package.json",
pnpmLock ? src + "/pnpm-lock.yaml",
overrides ? defaultPnpmOverrides,
allowImpure ? false,
linkDevDependencies ? false,
...
} @args:
let
specialAttrs = [ "src" "packageJSON" "pnpmLock" "overrides" "allowImpure" ];
package = lib.importJSON packageJSON;
pname = safePkgName package.name;
version = package.version;
name = pname + "-" + version;
pnpmlock = let
lock = importYAML "${pname}-pnpmlock-${version}" pnpmLock;
in rewritePnpmLock lock;
# Convert pnpm package entries to nix derivations
packages = let
linkPath = src: link: src + ("/" + (lib.removePrefix "link:" link));
# Normal (registry/git) packages
nonLocalPackages = lib.mapAttrs (n: v: (let
drv = mkPnpmModule v;
overriden = overrideDrv overrides drv;
in overriden)) pnpmlock.packages;
# Local (link:) packages
localPackages = let
attrNames = builtins.filter (a: lib.hasPrefix "link:" a) pnpmlock.dependencies;
# Try to resolve relative path and import package.json to read package name
resolvePkgName = (link: (lib.importJSON ((linkPath src link) + "/package.json")).name);
resolve = (link: lib.nameValuePair link (resolvePkgName link));
resolvedSpecifiers = lib.listToAttrs (map (resolve) attrNames);
in lib.mapAttrs (n: v: let
# Note: src can only be local path for link: dependencies
pkgPath = linkPath src n;
pkg = ((import ./default.nix modArgs).mkPnpmPackage {
inherit allowImpure;
src = pkgPath;
packageJSON = pkgPath + "/package.json";
pnpmLock = pkgPath + "/pnpm-lock.yaml";
}).overrideAttrs(oldAttrs: {
src = wrapRawSrc pkgPath oldAttrs.pname;
});
in pkg) resolvedSpecifiers;
in nonLocalPackages // localPackages;
# Wrap sources in a directory named the same as the node_modules/ path
wrapRawSrc = src: pname: (stdenv.mkDerivation (let
name = safePkgName pname;
in {
name = "pnpm2nix-source-${name}";
inherit src;
# Make dirty tars work
TAR_OPTIONS = "--delay-directory-restore";
# We're still making them writable, but we need to run something else first
dontMakeSourcesWritable = true;
# Make directories have +x and everything writable
postUnpack = ''
find "$sourceRoot" -type d -exec chmod u+x {} \;
chmod -R u+w -- "$sourceRoot"
'';
dontBuild = true;
configurePhase = ":";
fixupPhase = ":";
installPhase = ''
mkdir -p $out/${pname}
cp -a * $out/${pname}/
'';
}));
wrapSrc = pkgInfo: let
integrity = lib.splitString "-" pkgInfo.resolution.integrity;
shaType = lib.elemAt integrity 0;
shaSum = lib.elemAt integrity 1;
tarball = (lib.lists.last (lib.splitString "/" pkgInfo.pname)) + "-" + pkgInfo.version + ".tgz";
registry = if builtins.hasAttr "registry" pnpmlock then pnpmlock.registry else "https://registry.npmjs.org/";
src = (if (lib.hasAttr "integrity" pkgInfo.resolution) then
(pkgs.fetchurl {
url = if (lib.hasAttr "tarball" pkgInfo.resolution)
then pkgInfo.resolution.tarball
else "${registry}${pkgInfo.pname}/-/${tarball}";
"${shaType}" = shaSum;
}) else if (lib.hasAttr "commit" pkgInfo.resolution) then builtins.fetchGit {
url = pkgInfo.resolution.repo;
rev = pkgInfo.resolution.commit;
} else if allowImpure then fetchTarball {
# Note: Resolved tarballs(github revs for example)
# does not yet have checksums
# https://github.com/pnpm/pnpm/issues/1035
url = pkgInfo.resolution.tarball;
} else throw "No download method found for package ${pkgInfo.name}, consider adding `allowImpure = true;`");
in wrapRawSrc src pkgInfo.pname;
mkPnpmModule = pkgInfo: let
hasCycle = (builtins.length pkgInfo.constituents) > 1;
# These attrs have already been created in pre-processing
# Cyclic dependencies has deterministic ordering so they will end up with the exact same attributes
name = builtins.substring 0 207 (lib.concatStringsSep "-" (builtins.map (attr: pnpmlock.packages."${attr}".name) pkgInfo.constituents));
version = if !hasCycle then pkgInfo.version else "cyclic";
pname = lib.concatStringsSep "-" (builtins.map (attr: pnpmlock.packages."${attr}".pname) pkgInfo.constituents);
srcs = (builtins.map (attr: wrapSrc pnpmlock.packages."${attr}") pkgInfo.constituents);
deps = builtins.map (attrName: packages."${attrName}")
# Get all dependencies from cycle
(lib.unique (lib.flatten (builtins.map
(attr: pnpmlock.packages."${attr}".dependencies) pkgInfo.constituents)));
in
mkPnpmDerivation {
inherit deps;
attrs = { inherit name srcs pname version; };
linkDevDependencies = false;
};
in
assert (pnpmlock.lockfileVersion == 5 || pnpmlock.lockfileVersion == 5.1);
(mkPnpmDerivation {
deps = (builtins.map
(attrName: packages."${attrName}")
(pnpmlock.dependencies ++ pnpmlock.optionalDependencies));
devDependencies = builtins.map
(attrName: packages."${attrName}") pnpmlock.devDependencies;
inherit linkDevDependencies;
passthru = {
packageJSON = package;
};
# Filter "special" attrs we know how to interpret, merge rest to drv attrset
attrs = ((lib.filterAttrs (k: v: !(lib.lists.elem k specialAttrs)) args) // {
srcs = [ (wrapRawSrc src pname) ];
inherit name pname version;
});
});
}