From c7b54793880f9eaceb47c29397448d6744cf5e5a Mon Sep 17 00:00:00 2001 From: Madeleine Sydney Date: Tue, 18 Feb 2025 23:17:14 -0700 Subject: [PATCH] wip(lldap): Consultant --- README.org | 1 + .../.direnv/bin/nix-direnv-reload | 19 + .../00h3wlz1w78g0lcpmp8fbd7rbsrd3rj4-source | 1 + .../01x5k4nlxcpyd85nnr0b9gm89rm8ff4x-source | 1 + .../60sn02zhawl3kwn0r515zff3h6hg6ydz-source | 1 + .../kdynjy1mbgkdg4p196v9gx6ljpf7q4nk-source | 1 + .../mb39v682m1xmknld5igi9jhwcs2hzygi-source | 1 + .../ngbb9br4mgjzy8b51a0qdyhlyq9c0mnx-source | 1 + .../spa690gs3z1l1zmw4j2jkikva1y6wix4-source | 1 + .../vl10fnq09vj8w8mg04wd5v28wgjhzvvm-source | 1 + .../wxjsfgkkd93fwqn1g49srpj9gms656wn-source | 1 + .../yj1wxm9hh8610iyzqnz75kvs6xl8j3my-source | 1 + ...e-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa | 1 + ...5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa.rc | 2088 +++++++++++++++++ scripts/ldap-nginx-plumber/.envrc | 1 + scripts/ldap-nginx-plumber/.gitignore | 10 + scripts/ldap-nginx-plumber/bb.edn | 7 + scripts/ldap-nginx-plumber/deps-lock.json | 231 ++ scripts/ldap-nginx-plumber/deps.edn | 12 + scripts/ldap-nginx-plumber/flake.lock | 171 ++ scripts/ldap-nginx-plumber/flake.nix | 47 + .../src/ldap_nginx_plumber/main.clj | 83 + users/crumb/programs/direnv.nix | 15 + users/crumb/programs/emacs.nix | 7 +- .../emacs/modules/lang/syd-lang-clojure.el | 84 + .../emacs/modules/lang/syd-lang-emacs-lisp.el | 11 +- .../crumb/programs/emacs/modules/syd-evil.el | 66 +- .../programs/emacs/modules/syd-keybinds.el | 4 +- .../crumb/programs/emacs/modules/syd-lang.el | 1 + .../programs/emacs/modules/syd-projects.el | 25 + .../programs/emacs/modules/syd-tooling.el | 7 + users/crumb/programs/emacs/modules/syd-ui.el | 10 +- .../emacs/project-skeletons/clj-nix/.envrc | 1 + .../project-skeletons/clj-nix/.gitignore | 11 + .../emacs/project-skeletons/clj-nix/bb.edn | 7 + .../emacs/project-skeletons/clj-nix/deps.edn | 9 + .../emacs/project-skeletons/clj-nix/flake.nix | 47 + .../clj-nix/src/__PROJECT-NAME__/main.clj | 5 + 38 files changed, 2944 insertions(+), 47 deletions(-) create mode 100755 scripts/ldap-nginx-plumber/.direnv/bin/nix-direnv-reload create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/00h3wlz1w78g0lcpmp8fbd7rbsrd3rj4-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/01x5k4nlxcpyd85nnr0b9gm89rm8ff4x-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/60sn02zhawl3kwn0r515zff3h6hg6ydz-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/kdynjy1mbgkdg4p196v9gx6ljpf7q4nk-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/mb39v682m1xmknld5igi9jhwcs2hzygi-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/ngbb9br4mgjzy8b51a0qdyhlyq9c0mnx-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/spa690gs3z1l1zmw4j2jkikva1y6wix4-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/vl10fnq09vj8w8mg04wd5v28wgjhzvvm-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/wxjsfgkkd93fwqn1g49srpj9gms656wn-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-inputs/yj1wxm9hh8610iyzqnz75kvs6xl8j3my-source create mode 120000 scripts/ldap-nginx-plumber/.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa create mode 100644 scripts/ldap-nginx-plumber/.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa.rc create mode 100644 scripts/ldap-nginx-plumber/.envrc create mode 100644 scripts/ldap-nginx-plumber/.gitignore create mode 100644 scripts/ldap-nginx-plumber/bb.edn create mode 100644 scripts/ldap-nginx-plumber/deps-lock.json create mode 100644 scripts/ldap-nginx-plumber/deps.edn create mode 100644 scripts/ldap-nginx-plumber/flake.lock create mode 100644 scripts/ldap-nginx-plumber/flake.nix create mode 100644 scripts/ldap-nginx-plumber/src/ldap_nginx_plumber/main.clj create mode 100644 users/crumb/programs/direnv.nix create mode 100644 users/crumb/programs/emacs/modules/lang/syd-lang-clojure.el create mode 100644 users/crumb/programs/emacs/project-skeletons/clj-nix/.envrc create mode 100644 users/crumb/programs/emacs/project-skeletons/clj-nix/.gitignore create mode 100644 users/crumb/programs/emacs/project-skeletons/clj-nix/bb.edn create mode 100644 users/crumb/programs/emacs/project-skeletons/clj-nix/deps.edn create mode 100644 users/crumb/programs/emacs/project-skeletons/clj-nix/flake.nix create mode 100644 users/crumb/programs/emacs/project-skeletons/clj-nix/src/__PROJECT-NAME__/main.clj diff --git a/README.org b/README.org index 22cc895..b45fda4 100755 --- a/README.org +++ b/README.org @@ -662,6 +662,7 @@ The beloved Faye's Wishsys is an incredibly impressive 3-kloc NixOS config with - [cite:@schafer2017advanced] - [cite:@bosio2023beautifying] - [cite:@zamboni2018beautifying] +- [cite:@pantůček2024simple] - [[https://prelude.emacsredux.com/en/stable/][Emacs Prelude]] - [[https://github.com/doomemacs/doomemacs][Doom Emacs]] - [[https://cce.whatthefuck.computer/cce][Ryan Rix's Complete Computing Environment]] diff --git a/scripts/ldap-nginx-plumber/.direnv/bin/nix-direnv-reload b/scripts/ldap-nginx-plumber/.direnv/bin/nix-direnv-reload new file mode 100755 index 0000000..5b16ae4 --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/bin/nix-direnv-reload @@ -0,0 +1,19 @@ +#!/usr/bin/env bash +set -e +if [[ ! -d "/persist/dots/scripts/ldap-nginx-plumber" ]]; then + echo "Cannot find source directory; Did you move it?" + echo "(Looking for "/persist/dots/scripts/ldap-nginx-plumber")" + echo 'Cannot force reload with this script - use "direnv reload" manually and then try again' + exit 1 +fi + +# rebuild the cache forcefully +_nix_direnv_force_reload=1 direnv exec "/persist/dots/scripts/ldap-nginx-plumber" true + +# Update the mtime for .envrc. +# This will cause direnv to reload again - but without re-building. +touch "/persist/dots/scripts/ldap-nginx-plumber/.envrc" + +# Also update the timestamp of whatever profile_rc we have. +# This makes sure that we know we are up to date. +touch -r "/persist/dots/scripts/ldap-nginx-plumber/.envrc" "/persist/dots/scripts/ldap-nginx-plumber/.direnv"/*.rc diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/00h3wlz1w78g0lcpmp8fbd7rbsrd3rj4-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/00h3wlz1w78g0lcpmp8fbd7rbsrd3rj4-source new file mode 120000 index 0000000..2548f35 --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/00h3wlz1w78g0lcpmp8fbd7rbsrd3rj4-source @@ -0,0 +1 @@ +/nix/store/00h3wlz1w78g0lcpmp8fbd7rbsrd3rj4-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/01x5k4nlxcpyd85nnr0b9gm89rm8ff4x-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/01x5k4nlxcpyd85nnr0b9gm89rm8ff4x-source new file mode 120000 index 0000000..f7fce9f --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/01x5k4nlxcpyd85nnr0b9gm89rm8ff4x-source @@ -0,0 +1 @@ +/nix/store/01x5k4nlxcpyd85nnr0b9gm89rm8ff4x-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/60sn02zhawl3kwn0r515zff3h6hg6ydz-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/60sn02zhawl3kwn0r515zff3h6hg6ydz-source new file mode 120000 index 0000000..b74be5c --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/60sn02zhawl3kwn0r515zff3h6hg6ydz-source @@ -0,0 +1 @@ +/nix/store/60sn02zhawl3kwn0r515zff3h6hg6ydz-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/kdynjy1mbgkdg4p196v9gx6ljpf7q4nk-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/kdynjy1mbgkdg4p196v9gx6ljpf7q4nk-source new file mode 120000 index 0000000..5e59609 --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/kdynjy1mbgkdg4p196v9gx6ljpf7q4nk-source @@ -0,0 +1 @@ +/nix/store/kdynjy1mbgkdg4p196v9gx6ljpf7q4nk-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/mb39v682m1xmknld5igi9jhwcs2hzygi-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/mb39v682m1xmknld5igi9jhwcs2hzygi-source new file mode 120000 index 0000000..ee0f322 --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/mb39v682m1xmknld5igi9jhwcs2hzygi-source @@ -0,0 +1 @@ +/nix/store/mb39v682m1xmknld5igi9jhwcs2hzygi-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/ngbb9br4mgjzy8b51a0qdyhlyq9c0mnx-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/ngbb9br4mgjzy8b51a0qdyhlyq9c0mnx-source new file mode 120000 index 0000000..fbc0d33 --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/ngbb9br4mgjzy8b51a0qdyhlyq9c0mnx-source @@ -0,0 +1 @@ +/nix/store/ngbb9br4mgjzy8b51a0qdyhlyq9c0mnx-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/spa690gs3z1l1zmw4j2jkikva1y6wix4-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/spa690gs3z1l1zmw4j2jkikva1y6wix4-source new file mode 120000 index 0000000..5dc697c --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/spa690gs3z1l1zmw4j2jkikva1y6wix4-source @@ -0,0 +1 @@ +/nix/store/spa690gs3z1l1zmw4j2jkikva1y6wix4-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/vl10fnq09vj8w8mg04wd5v28wgjhzvvm-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/vl10fnq09vj8w8mg04wd5v28wgjhzvvm-source new file mode 120000 index 0000000..c228600 --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/vl10fnq09vj8w8mg04wd5v28wgjhzvvm-source @@ -0,0 +1 @@ +/nix/store/vl10fnq09vj8w8mg04wd5v28wgjhzvvm-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/wxjsfgkkd93fwqn1g49srpj9gms656wn-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/wxjsfgkkd93fwqn1g49srpj9gms656wn-source new file mode 120000 index 0000000..1528614 --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/wxjsfgkkd93fwqn1g49srpj9gms656wn-source @@ -0,0 +1 @@ +/nix/store/wxjsfgkkd93fwqn1g49srpj9gms656wn-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-inputs/yj1wxm9hh8610iyzqnz75kvs6xl8j3my-source b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/yj1wxm9hh8610iyzqnz75kvs6xl8j3my-source new file mode 120000 index 0000000..f17959f --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-inputs/yj1wxm9hh8610iyzqnz75kvs6xl8j3my-source @@ -0,0 +1 @@ +/nix/store/yj1wxm9hh8610iyzqnz75kvs6xl8j3my-source \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa b/scripts/ldap-nginx-plumber/.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa new file mode 120000 index 0000000..9aad04c --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa @@ -0,0 +1 @@ +/nix/store/333wlbwbqw13ck7djq0a3wmaik3v9m6l-nix-shell-env \ No newline at end of file diff --git a/scripts/ldap-nginx-plumber/.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa.rc b/scripts/ldap-nginx-plumber/.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa.rc new file mode 100644 index 0000000..c7f694c --- /dev/null +++ b/scripts/ldap-nginx-plumber/.direnv/flake-profile-a5d5b61aa8a61b7d9d765e1daf971a9a578f1cfa.rc @@ -0,0 +1,2088 @@ +unset shellHook +PATH=${PATH:-} +nix_saved_PATH="$PATH" +XDG_DATA_DIRS=${XDG_DATA_DIRS:-} +nix_saved_XDG_DATA_DIRS="$XDG_DATA_DIRS" +AR='ar' +export AR +AS='as' +export AS +BASH='/nix/store/fd118hwh7d1ncib4mdw56ylv3g9k0iyj-bash-5.2p37/bin/bash' +CC='gcc' +export CC +CONFIG_SHELL='/nix/store/fd118hwh7d1ncib4mdw56ylv3g9k0iyj-bash-5.2p37/bin/bash' +export CONFIG_SHELL +CXX='g++' +export CXX +HOSTTYPE='x86_64' +HOST_PATH='/nix/store/wdap4cr3bnm685f27y9bb6q5b6q18msl-coreutils-9.5/bin:/nix/store/032xw8dchwjipwqh6b3h70yc3mcmsqld-findutils-4.10.0/bin:/nix/store/dd7xqz1qwl0di4zb8rzj7r1ds8np9xqs-diffutils-3.10/bin:/nix/store/bffnm1211li6y431irplzbjbccr0k884-gnused-4.9/bin:/nix/store/4lbfasv335vpk8rbcf3pgkag4rhg8jx8-gnugrep-3.11/bin:/nix/store/xpzl2sf58fqfpl64b1fy1ihxay7k71li-gawk-5.3.1/bin:/nix/store/zlmk040fc3jax9s3gldwp5rfwc1hhajc-gnutar-1.35/bin:/nix/store/chwdy9qaxd13q8zvl0zd5r7ql2q116di-gzip-1.13/bin:/nix/store/hpppxlcfvjzrvvcvhcm47divp65gbwq1-bzip2-1.0.8-bin/bin:/nix/store/y0akgyz13jgxwm968bs8kay47zbxx638-gnumake-4.4.1/bin:/nix/store/fd118hwh7d1ncib4mdw56ylv3g9k0iyj-bash-5.2p37/bin:/nix/store/apqwjgbjj646wk2jkzr67l26djamn481-patch-2.7.6/bin:/nix/store/rrv4bd5i7rp2m7j8ix4kl8bzijhh8gd3-xz-5.6.3-bin/bin:/nix/store/qraqns84wjffzd8d3dgbdcyxg41czbd6-file-5.46/bin' +export HOST_PATH +IFS=' +' +IN_NIX_SHELL='impure' +export IN_NIX_SHELL +LD='ld' +export LD +LINENO='76' +MACHTYPE='x86_64-pc-linux-gnu' +NIX_BINTOOLS='/nix/store/vrkxj51s4a1awh7m4p4f1w29wad5s20m-binutils-wrapper-2.43.1' +export NIX_BINTOOLS +NIX_BINTOOLS_WRAPPER_TARGET_HOST_x86_64_unknown_linux_gnu='1' +export NIX_BINTOOLS_WRAPPER_TARGET_HOST_x86_64_unknown_linux_gnu +NIX_BUILD_CORES='3' +export NIX_BUILD_CORES +NIX_CC='/nix/store/4ijy8jbsiqmj37avrk83gn2m903486mr-gcc-wrapper-14-20241116' +export NIX_CC +NIX_CC_WRAPPER_TARGET_HOST_x86_64_unknown_linux_gnu='1' +export NIX_CC_WRAPPER_TARGET_HOST_x86_64_unknown_linux_gnu +NIX_CFLAGS_COMPILE=' -frandom-seed=333wlbwbqw' +export NIX_CFLAGS_COMPILE +NIX_ENFORCE_NO_NATIVE='1' +export NIX_ENFORCE_NO_NATIVE +NIX_HARDENING_ENABLE='bindnow format fortify fortify3 pic relro stackprotector strictoverflow zerocallusedregs' +export NIX_HARDENING_ENABLE +NIX_LDFLAGS='-rpath /persist/dots/scripts/ldap-nginx-plumber/outputs/out/lib ' +export NIX_LDFLAGS +NIX_NO_SELF_RPATH='1' +NIX_STORE='/nix/store' +export NIX_STORE +NM='nm' +export NM +OBJCOPY='objcopy' +export OBJCOPY +OBJDUMP='objdump' +export OBJDUMP +OLDPWD='' +export OLDPWD +OPTERR='1' +OSTYPE='linux-gnu' +PATH='/nix/store/ambl1jm80ijixpiadag7sm8ixfj7brwj-clojure-lsp-2024.11.08-17.49.29/bin:/nix/store/g1hmkmwm8ss420y1w7wksici90cf6rn0-cljfmt-0.13.0/bin:/nix/store/nvjikwmjbjyqrvbvb0af8biban4da213-clojure-1.12.0.1495/bin:/nix/store/cjyvsrywfb60mmnqg3yf9wjcrhs4drks-babashka-1.12.196/bin:/nix/store/f04zhapn8n8w6yrd35s8sd9qmjp8g9ry-patchelf-0.15.0/bin:/nix/store/4ijy8jbsiqmj37avrk83gn2m903486mr-gcc-wrapper-14-20241116/bin:/nix/store/zs2gq6fkglrd28g1nxlb8waqq37cdc2z-gcc-14-20241116/bin:/nix/store/9lcg6rsqbmx6s35jzy86b86pkj0qhxjl-glibc-2.40-66-bin/bin:/nix/store/wdap4cr3bnm685f27y9bb6q5b6q18msl-coreutils-9.5/bin:/nix/store/vrkxj51s4a1awh7m4p4f1w29wad5s20m-binutils-wrapper-2.43.1/bin:/nix/store/5h5ghy2qf6l91l52j6m5vx473zi38vc3-binutils-2.43.1/bin:/nix/store/wdap4cr3bnm685f27y9bb6q5b6q18msl-coreutils-9.5/bin:/nix/store/032xw8dchwjipwqh6b3h70yc3mcmsqld-findutils-4.10.0/bin:/nix/store/dd7xqz1qwl0di4zb8rzj7r1ds8np9xqs-diffutils-3.10/bin:/nix/store/bffnm1211li6y431irplzbjbccr0k884-gnused-4.9/bin:/nix/store/4lbfasv335vpk8rbcf3pgkag4rhg8jx8-gnugrep-3.11/bin:/nix/store/xpzl2sf58fqfpl64b1fy1ihxay7k71li-gawk-5.3.1/bin:/nix/store/zlmk040fc3jax9s3gldwp5rfwc1hhajc-gnutar-1.35/bin:/nix/store/chwdy9qaxd13q8zvl0zd5r7ql2q116di-gzip-1.13/bin:/nix/store/hpppxlcfvjzrvvcvhcm47divp65gbwq1-bzip2-1.0.8-bin/bin:/nix/store/y0akgyz13jgxwm968bs8kay47zbxx638-gnumake-4.4.1/bin:/nix/store/fd118hwh7d1ncib4mdw56ylv3g9k0iyj-bash-5.2p37/bin:/nix/store/apqwjgbjj646wk2jkzr67l26djamn481-patch-2.7.6/bin:/nix/store/rrv4bd5i7rp2m7j8ix4kl8bzijhh8gd3-xz-5.6.3-bin/bin:/nix/store/qraqns84wjffzd8d3dgbdcyxg41czbd6-file-5.46/bin' +export PATH +PS4='+ ' +RANLIB='ranlib' +export RANLIB +READELF='readelf' +export READELF +SHELL='/nix/store/fd118hwh7d1ncib4mdw56ylv3g9k0iyj-bash-5.2p37/bin/bash' +export SHELL +SIZE='size' +export SIZE +SOURCE_DATE_EPOCH='315532800' +export SOURCE_DATE_EPOCH +STRINGS='strings' +export STRINGS +STRIP='strip' +export STRIP +XDG_DATA_DIRS='/nix/store/nvjikwmjbjyqrvbvb0af8biban4da213-clojure-1.12.0.1495/share:/nix/store/cjyvsrywfb60mmnqg3yf9wjcrhs4drks-babashka-1.12.196/share:/nix/store/f04zhapn8n8w6yrd35s8sd9qmjp8g9ry-patchelf-0.15.0/share' +export XDG_DATA_DIRS +__structuredAttrs='' +export __structuredAttrs +_substituteStream_has_warned_replace_deprecation='false' +buildInputs='' +export buildInputs +buildPhase='{ echo "------------------------------------------------------------"; + echo " WARNING: the existence of this path is not guaranteed."; + echo " It is an internal implementation detail for pkgs.mkShell."; + echo "------------------------------------------------------------"; + echo; + # Record all build inputs as runtime dependencies + export; +} >> "$out" +' +export buildPhase +builder='/nix/store/fd118hwh7d1ncib4mdw56ylv3g9k0iyj-bash-5.2p37/bin/bash' +export builder +cmakeFlags='' +export cmakeFlags +configureFlags='' +export configureFlags +defaultBuildInputs='' +defaultNativeBuildInputs='/nix/store/f04zhapn8n8w6yrd35s8sd9qmjp8g9ry-patchelf-0.15.0 /nix/store/b9qv2l6dy15jy7pvarzjpn0yl33rdrbc-update-autotools-gnu-config-scripts-hook /nix/store/h9lc1dpi14z7is86ffhl3ld569138595-audit-tmpdir.sh /nix/store/m54bmrhj6fqz8nds5zcj97w9s9bckc9v-compress-man-pages.sh /nix/store/wgrbkkaldkrlrni33ccvm3b6vbxzb656-make-symlinks-relative.sh /nix/store/5yzw0vhkyszf2d179m0qfkgxmp5wjjx4-move-docs.sh /nix/store/fyaryjvghbkpfnsyw97hb3lyb37s1pd6-move-lib64.sh /nix/store/kd4xwxjpjxi71jkm6ka0np72if9rm3y0-move-sbin.sh /nix/store/pag6l61paj1dc9sv15l7bm5c17xn5kyk-move-systemd-user-units.sh /nix/store/jivxp510zxakaaic7qkrb7v1dd2rdbw9-multiple-outputs.sh /nix/store/shr47253n0j4c4lpvv6fmlvaq7vfvc3x-no-broken-symlinks.sh /nix/store/q84p4jvn5yalz937azdrfbyy32kl5s16-patch-shebangs.sh /nix/store/cickvswrvann041nqxb0rxilc46svw1n-prune-libtool-files.sh /nix/store/xyff06pkhki3qy1ls77w10s0v79c9il0-reproducible-builds.sh /nix/store/z7k98578dfzi6l3hsvbivzm7hfqlk0zc-set-source-date-epoch-to-latest.sh /nix/store/pilsssjjdxvdphlg2h19p0bfx5q0jzkn-strip.sh /nix/store/4ijy8jbsiqmj37avrk83gn2m903486mr-gcc-wrapper-14-20241116' +depsBuildBuild='' +export depsBuildBuild +depsBuildBuildPropagated='' +export depsBuildBuildPropagated +depsBuildTarget='' +export depsBuildTarget +depsBuildTargetPropagated='' +export depsBuildTargetPropagated +depsHostHost='' +export depsHostHost +depsHostHostPropagated='' +export depsHostHostPropagated +depsTargetTarget='' +export depsTargetTarget +depsTargetTargetPropagated='' +export depsTargetTargetPropagated +doCheck='' +export doCheck +doInstallCheck='' +export doInstallCheck +dontAddDisableDepTrack='1' +export dontAddDisableDepTrack +declare -a envBuildBuildHooks=() +declare -a envBuildHostHooks=() +declare -a envBuildTargetHooks=() +declare -a envHostHostHooks=('ccWrapper_addCVars' 'bintoolsWrapper_addLDVars' ) +declare -a envHostTargetHooks=('ccWrapper_addCVars' 'bintoolsWrapper_addLDVars' ) +declare -a envTargetTargetHooks=() +declare -a fixupOutputHooks=('if [ -z "${dontPatchELF-}" ]; then patchELF "$prefix"; fi' 'if [[ -z "${noAuditTmpdir-}" && -e "$prefix" ]]; then auditTmpdir "$prefix"; fi' 'if [ -z "${dontGzipMan-}" ]; then compressManPages "$prefix"; fi' '_moveLib64' '_moveSbin' '_moveSystemdUserUnits' 'patchShebangsAuto' '_pruneLibtoolFiles' '_doStrip' ) +guess='3' +initialPath='/nix/store/wdap4cr3bnm685f27y9bb6q5b6q18msl-coreutils-9.5 /nix/store/032xw8dchwjipwqh6b3h70yc3mcmsqld-findutils-4.10.0 /nix/store/dd7xqz1qwl0di4zb8rzj7r1ds8np9xqs-diffutils-3.10 /nix/store/bffnm1211li6y431irplzbjbccr0k884-gnused-4.9 /nix/store/4lbfasv335vpk8rbcf3pgkag4rhg8jx8-gnugrep-3.11 /nix/store/xpzl2sf58fqfpl64b1fy1ihxay7k71li-gawk-5.3.1 /nix/store/zlmk040fc3jax9s3gldwp5rfwc1hhajc-gnutar-1.35 /nix/store/chwdy9qaxd13q8zvl0zd5r7ql2q116di-gzip-1.13 /nix/store/hpppxlcfvjzrvvcvhcm47divp65gbwq1-bzip2-1.0.8-bin /nix/store/y0akgyz13jgxwm968bs8kay47zbxx638-gnumake-4.4.1 /nix/store/fd118hwh7d1ncib4mdw56ylv3g9k0iyj-bash-5.2p37 /nix/store/apqwjgbjj646wk2jkzr67l26djamn481-patch-2.7.6 /nix/store/rrv4bd5i7rp2m7j8ix4kl8bzijhh8gd3-xz-5.6.3-bin /nix/store/qraqns84wjffzd8d3dgbdcyxg41czbd6-file-5.46' +mesonFlags='' +export mesonFlags +name='nix-shell-env' +export name +nativeBuildInputs='/nix/store/ambl1jm80ijixpiadag7sm8ixfj7brwj-clojure-lsp-2024.11.08-17.49.29 /nix/store/g1hmkmwm8ss420y1w7wksici90cf6rn0-cljfmt-0.13.0 /nix/store/nvjikwmjbjyqrvbvb0af8biban4da213-clojure-1.12.0.1495 /nix/store/cjyvsrywfb60mmnqg3yf9wjcrhs4drks-babashka-1.12.196' +export nativeBuildInputs +out='/persist/dots/scripts/ldap-nginx-plumber/outputs/out' +export out +outputBin='out' +outputDev='out' +outputDevdoc='REMOVE' +outputDevman='out' +outputDoc='out' +outputInclude='out' +outputInfo='out' +outputLib='out' +outputMan='out' +outputs='out' +export outputs +patches='' +export patches +phases='buildPhase' +export phases +pkg='/nix/store/4ijy8jbsiqmj37avrk83gn2m903486mr-gcc-wrapper-14-20241116' +declare -a pkgsBuildBuild=() +declare -a pkgsBuildHost=('/nix/store/ambl1jm80ijixpiadag7sm8ixfj7brwj-clojure-lsp-2024.11.08-17.49.29' '/nix/store/g1hmkmwm8ss420y1w7wksici90cf6rn0-cljfmt-0.13.0' '/nix/store/nvjikwmjbjyqrvbvb0af8biban4da213-clojure-1.12.0.1495' '/nix/store/cjyvsrywfb60mmnqg3yf9wjcrhs4drks-babashka-1.12.196' '/nix/store/f04zhapn8n8w6yrd35s8sd9qmjp8g9ry-patchelf-0.15.0' '/nix/store/b9qv2l6dy15jy7pvarzjpn0yl33rdrbc-update-autotools-gnu-config-scripts-hook' '/nix/store/h9lc1dpi14z7is86ffhl3ld569138595-audit-tmpdir.sh' '/nix/store/m54bmrhj6fqz8nds5zcj97w9s9bckc9v-compress-man-pages.sh' '/nix/store/wgrbkkaldkrlrni33ccvm3b6vbxzb656-make-symlinks-relative.sh' '/nix/store/5yzw0vhkyszf2d179m0qfkgxmp5wjjx4-move-docs.sh' '/nix/store/fyaryjvghbkpfnsyw97hb3lyb37s1pd6-move-lib64.sh' '/nix/store/kd4xwxjpjxi71jkm6ka0np72if9rm3y0-move-sbin.sh' '/nix/store/pag6l61paj1dc9sv15l7bm5c17xn5kyk-move-systemd-user-units.sh' '/nix/store/jivxp510zxakaaic7qkrb7v1dd2rdbw9-multiple-outputs.sh' '/nix/store/shr47253n0j4c4lpvv6fmlvaq7vfvc3x-no-broken-symlinks.sh' '/nix/store/q84p4jvn5yalz937azdrfbyy32kl5s16-patch-shebangs.sh' '/nix/store/cickvswrvann041nqxb0rxilc46svw1n-prune-libtool-files.sh' '/nix/store/xyff06pkhki3qy1ls77w10s0v79c9il0-reproducible-builds.sh' '/nix/store/z7k98578dfzi6l3hsvbivzm7hfqlk0zc-set-source-date-epoch-to-latest.sh' '/nix/store/pilsssjjdxvdphlg2h19p0bfx5q0jzkn-strip.sh' '/nix/store/4ijy8jbsiqmj37avrk83gn2m903486mr-gcc-wrapper-14-20241116' '/nix/store/vrkxj51s4a1awh7m4p4f1w29wad5s20m-binutils-wrapper-2.43.1' ) +declare -a pkgsBuildTarget=() +declare -a pkgsHostHost=() +declare -a pkgsHostTarget=() +declare -a pkgsTargetTarget=() +declare -a postFixupHooks=('_makeSymlinksRelativeInAllOutputs' '_multioutPropagateDev' 'noBrokenSymlinksInAllOutputs' ) +declare -a postUnpackHooks=('_updateSourceDateEpochFromSourceRoot' ) +declare -a preConfigureHooks=('_multioutConfig' ) +preConfigurePhases=' updateAutotoolsGnuConfigScriptsPhase' +declare -a preFixupHooks=('_moveToShare' '_multioutDocs' '_multioutDevs' ) +preferLocalBuild='1' +export preferLocalBuild +prefix='/persist/dots/scripts/ldap-nginx-plumber/outputs/out' +declare -a propagatedBuildDepFiles=('propagated-build-build-deps' 'propagated-native-build-inputs' 'propagated-build-target-deps' ) +propagatedBuildInputs='' +export propagatedBuildInputs +declare -a propagatedHostDepFiles=('propagated-host-host-deps' 'propagated-build-inputs' ) +propagatedNativeBuildInputs='' +export propagatedNativeBuildInputs +declare -a propagatedTargetDepFiles=('propagated-target-target-deps' ) +shell='/nix/store/fd118hwh7d1ncib4mdw56ylv3g9k0iyj-bash-5.2p37/bin/bash' +export shell +shellHook='' +export shellHook +stdenv='/nix/store/dh9szsq14j2w2dx7pn219n27gwq7w3dn-stdenv-linux' +export stdenv +strictDeps='' +export strictDeps +system='x86_64-linux' +export system +declare -a unpackCmdHooks=('_defaultUnpack' ) +_activatePkgs () +{ + + local hostOffset targetOffset; + local pkg; + for hostOffset in "${allPlatOffsets[@]}"; + do + local pkgsVar="${pkgAccumVarVars[hostOffset + 1]}"; + for targetOffset in "${allPlatOffsets[@]}"; + do + (( hostOffset <= targetOffset )) || continue; + local pkgsRef="${pkgsVar}[$targetOffset - $hostOffset]"; + local pkgsSlice="${!pkgsRef}[@]"; + for pkg in ${!pkgsSlice+"${!pkgsSlice}"}; + do + activatePackage "$pkg" "$hostOffset" "$targetOffset"; + done; + done; + done +} +_addRpathPrefix () +{ + + if [ "${NIX_NO_SELF_RPATH:-0}" != 1 ]; then + export NIX_LDFLAGS="-rpath $1/lib ${NIX_LDFLAGS-}"; + fi +} +_addToEnv () +{ + + local depHostOffset depTargetOffset; + local pkg; + for depHostOffset in "${allPlatOffsets[@]}"; + do + local hookVar="${pkgHookVarVars[depHostOffset + 1]}"; + local pkgsVar="${pkgAccumVarVars[depHostOffset + 1]}"; + for depTargetOffset in "${allPlatOffsets[@]}"; + do + (( depHostOffset <= depTargetOffset )) || continue; + local hookRef="${hookVar}[$depTargetOffset - $depHostOffset]"; + if [[ -z "${strictDeps-}" ]]; then + local visitedPkgs=""; + for pkg in "${pkgsBuildBuild[@]}" "${pkgsBuildHost[@]}" "${pkgsBuildTarget[@]}" "${pkgsHostHost[@]}" "${pkgsHostTarget[@]}" "${pkgsTargetTarget[@]}"; + do + if [[ "$visitedPkgs" = *"$pkg"* ]]; then + continue; + fi; + runHook "${!hookRef}" "$pkg"; + visitedPkgs+=" $pkg"; + done; + else + local pkgsRef="${pkgsVar}[$depTargetOffset - $depHostOffset]"; + local pkgsSlice="${!pkgsRef}[@]"; + for pkg in ${!pkgsSlice+"${!pkgsSlice}"}; + do + runHook "${!hookRef}" "$pkg"; + done; + fi; + done; + done +} +_allFlags () +{ + + export system pname name version; + while IFS='' read -r varName; do + nixTalkativeLog "@${varName}@ -> ${!varName}"; + args+=("--subst-var" "$varName"); + done < <(awk 'BEGIN { for (v in ENVIRON) if (v ~ /^[a-z][a-zA-Z0-9_]*$/) print v }') +} +_assignFirst () +{ + + local varName="$1"; + local _var; + local REMOVE=REMOVE; + shift; + for _var in "$@"; + do + if [ -n "${!_var-}" ]; then + eval "${varName}"="${_var}"; + return; + fi; + done; + echo; + echo "error: _assignFirst: could not find a non-empty variable whose name to assign to ${varName}."; + echo " The following variables were all unset or empty:"; + echo " $*"; + if [ -z "${out:-}" ]; then + echo ' If you do not want an "out" output in your derivation, make sure to define'; + echo ' the other specific required outputs. This can be achieved by picking one'; + echo " of the above as an output."; + echo ' You do not have to remove "out" if you want to have a different default'; + echo ' output, because the first output is taken as a default.'; + echo; + fi; + return 1 +} +_callImplicitHook () +{ + + local def="$1"; + local hookName="$2"; + if declare -F "$hookName" > /dev/null; then + nixTalkativeLog "calling implicit '$hookName' function hook"; + "$hookName"; + else + if type -p "$hookName" > /dev/null; then + nixTalkativeLog "sourcing implicit '$hookName' script hook"; + source "$hookName"; + else + if [ -n "${!hookName:-}" ]; then + nixTalkativeLog "evaling implicit '$hookName' string hook"; + eval "${!hookName}"; + else + return "$def"; + fi; + fi; + fi +} +_defaultUnpack () +{ + + local fn="$1"; + local destination; + if [ -d "$fn" ]; then + destination="$(stripHash "$fn")"; + if [ -e "$destination" ]; then + echo "Cannot copy $fn to $destination: destination already exists!"; + echo "Did you specify two \"srcs\" with the same \"name\"?"; + return 1; + fi; + cp -r --preserve=mode,timestamps --reflink=auto -- "$fn" "$destination"; + else + case "$fn" in + *.tar.xz | *.tar.lzma | *.txz) + ( XZ_OPT="--threads=$NIX_BUILD_CORES" xz -d < "$fn"; + true ) | tar xf - --mode=+w --warning=no-timestamp + ;; + *.tar | *.tar.* | *.tgz | *.tbz2 | *.tbz) + tar xf "$fn" --mode=+w --warning=no-timestamp + ;; + *) + return 1 + ;; + esac; + fi +} +_doStrip () +{ + + local -ra flags=(dontStripHost dontStripTarget); + local -ra debugDirs=(stripDebugList stripDebugListTarget); + local -ra allDirs=(stripAllList stripAllListTarget); + local -ra stripCmds=(STRIP STRIP_FOR_TARGET); + local -ra ranlibCmds=(RANLIB RANLIB_FOR_TARGET); + stripDebugList=${stripDebugList[*]:-lib lib32 lib64 libexec bin sbin Applications Library/Frameworks}; + stripDebugListTarget=${stripDebugListTarget[*]:-}; + stripAllList=${stripAllList[*]:-}; + stripAllListTarget=${stripAllListTarget[*]:-}; + local i; + for i in ${!stripCmds[@]}; + do + local -n flag="${flags[$i]}"; + local -n debugDirList="${debugDirs[$i]}"; + local -n allDirList="${allDirs[$i]}"; + local -n stripCmd="${stripCmds[$i]}"; + local -n ranlibCmd="${ranlibCmds[$i]}"; + if [[ -n "${dontStrip-}" || -n "${flag-}" ]] || ! type -f "${stripCmd-}" 2> /dev/null 1>&2; then + continue; + fi; + stripDirs "$stripCmd" "$ranlibCmd" "$debugDirList" "${stripDebugFlags[*]:--S -p}"; + stripDirs "$stripCmd" "$ranlibCmd" "$allDirList" "${stripAllFlags[*]:--s -p}"; + done +} +_eval () +{ + + if declare -F "$1" > /dev/null 2>&1; then + "$@"; + else + eval "$1"; + fi +} +_logHook () +{ + + if [[ -z ${NIX_LOG_FD-} ]]; then + return; + fi; + local hookKind="$1"; + local hookExpr="$2"; + shift 2; + if declare -F "$hookExpr" > /dev/null 2>&1; then + nixTalkativeLog "calling '$hookKind' function hook '$hookExpr'" "$@"; + else + if type -p "$hookExpr" > /dev/null; then + nixTalkativeLog "sourcing '$hookKind' script hook '$hookExpr'"; + else + if [[ "$hookExpr" != "_callImplicitHook"* ]]; then + local exprToOutput; + if [[ ${NIX_DEBUG:-0} -ge 5 ]]; then + exprToOutput="$hookExpr"; + else + local hookExprLine; + while IFS= read -r hookExprLine; do + hookExprLine="${hookExprLine#"${hookExprLine%%[![:space:]]*}"}"; + if [[ -n "$hookExprLine" ]]; then + exprToOutput+="$hookExprLine\\n "; + fi; + done <<< "$hookExpr"; + exprToOutput="${exprToOutput%%\\n }"; + fi; + nixTalkativeLog "evaling '$hookKind' string hook '$exprToOutput'"; + fi; + fi; + fi +} +_makeSymlinksRelative () +{ + + local symlinkTarget; + if [ "${dontRewriteSymlinks-}" ] || [ ! -e "$prefix" ]; then + return; + fi; + while IFS= read -r -d '' f; do + symlinkTarget=$(readlink "$f"); + if [[ "$symlinkTarget"/ != "$prefix"/* ]]; then + continue; + fi; + if [ ! -e "$symlinkTarget" ]; then + echo "the symlink $f is broken, it points to $symlinkTarget (which is missing)"; + fi; + echo "rewriting symlink $f to be relative to $prefix"; + ln -snrf "$symlinkTarget" "$f"; + done < <(find $prefix -type l -print0) +} +_makeSymlinksRelativeInAllOutputs () +{ + + local output; + for output in $(getAllOutputNames); + do + prefix="${!output}" _makeSymlinksRelative; + done +} +_moveLib64 () +{ + + if [ "${dontMoveLib64-}" = 1 ]; then + return; + fi; + if [ ! -e "$prefix/lib64" -o -L "$prefix/lib64" ]; then + return; + fi; + echo "moving $prefix/lib64/* to $prefix/lib"; + mkdir -p $prefix/lib; + shopt -s dotglob; + for i in $prefix/lib64/*; + do + mv --no-clobber "$i" $prefix/lib; + done; + shopt -u dotglob; + rmdir $prefix/lib64; + ln -s lib $prefix/lib64 +} +_moveSbin () +{ + + if [ "${dontMoveSbin-}" = 1 ]; then + return; + fi; + if [ ! -e "$prefix/sbin" -o -L "$prefix/sbin" ]; then + return; + fi; + echo "moving $prefix/sbin/* to $prefix/bin"; + mkdir -p $prefix/bin; + shopt -s dotglob; + for i in $prefix/sbin/*; + do + mv "$i" $prefix/bin; + done; + shopt -u dotglob; + rmdir $prefix/sbin; + ln -s bin $prefix/sbin +} +_moveSystemdUserUnits () +{ + + if [ "${dontMoveSystemdUserUnits:-0}" = 1 ]; then + return; + fi; + if [ ! -e "${prefix:?}/lib/systemd/user" ]; then + return; + fi; + local source="$prefix/lib/systemd/user"; + local target="$prefix/share/systemd/user"; + echo "moving $source/* to $target"; + mkdir -p "$target"; + ( shopt -s dotglob; + for i in "$source"/*; + do + mv "$i" "$target"; + done ); + rmdir "$source"; + ln -s "$target" "$source" +} +_moveToShare () +{ + + if [ -n "$__structuredAttrs" ]; then + if [ -z "${forceShare-}" ]; then + forceShare=(man doc info); + fi; + else + forceShare=(${forceShare:-man doc info}); + fi; + if [[ -z "$out" ]]; then + return; + fi; + for d in "${forceShare[@]}"; + do + if [ -d "$out/$d" ]; then + if [ -d "$out/share/$d" ]; then + echo "both $d/ and share/$d/ exist!"; + else + echo "moving $out/$d to $out/share/$d"; + mkdir -p $out/share; + mv $out/$d $out/share/; + fi; + fi; + done +} +_multioutConfig () +{ + + if [ "$(getAllOutputNames)" = "out" ] || [ -z "${setOutputFlags-1}" ]; then + return; + fi; + if [ -z "${shareDocName:-}" ]; then + local confScript="${configureScript:-}"; + if [ -z "$confScript" ] && [ -x ./configure ]; then + confScript=./configure; + fi; + if [ -f "$confScript" ]; then + local shareDocName="$(sed -n "s/^PACKAGE_TARNAME='\(.*\)'$/\1/p" < "$confScript")"; + fi; + if [ -z "$shareDocName" ] || echo "$shareDocName" | grep -q '[^a-zA-Z0-9_-]'; then + shareDocName="$(echo "$name" | sed 's/-[^a-zA-Z].*//')"; + fi; + fi; + prependToVar configureFlags --bindir="${!outputBin}"/bin --sbindir="${!outputBin}"/sbin --includedir="${!outputInclude}"/include --oldincludedir="${!outputInclude}"/include --mandir="${!outputMan}"/share/man --infodir="${!outputInfo}"/share/info --docdir="${!outputDoc}"/share/doc/"${shareDocName}" --libdir="${!outputLib}"/lib --libexecdir="${!outputLib}"/libexec --localedir="${!outputLib}"/share/locale; + prependToVar installFlags pkgconfigdir="${!outputDev}"/lib/pkgconfig m4datadir="${!outputDev}"/share/aclocal aclocaldir="${!outputDev}"/share/aclocal +} +_multioutDevs () +{ + + if [ "$(getAllOutputNames)" = "out" ] || [ -z "${moveToDev-1}" ]; then + return; + fi; + moveToOutput include "${!outputInclude}"; + moveToOutput lib/pkgconfig "${!outputDev}"; + moveToOutput share/pkgconfig "${!outputDev}"; + moveToOutput lib/cmake "${!outputDev}"; + moveToOutput share/aclocal "${!outputDev}"; + for f in "${!outputDev}"/{lib,share}/pkgconfig/*.pc; + do + echo "Patching '$f' includedir to output ${!outputInclude}"; + sed -i "/^includedir=/s,=\${prefix},=${!outputInclude}," "$f"; + done +} +_multioutDocs () +{ + + local REMOVE=REMOVE; + moveToOutput share/info "${!outputInfo}"; + moveToOutput share/doc "${!outputDoc}"; + moveToOutput share/gtk-doc "${!outputDevdoc}"; + moveToOutput share/devhelp/books "${!outputDevdoc}"; + moveToOutput share/man "${!outputMan}"; + moveToOutput share/man/man3 "${!outputDevman}" +} +_multioutPropagateDev () +{ + + if [ "$(getAllOutputNames)" = "out" ]; then + return; + fi; + local outputFirst; + for outputFirst in $(getAllOutputNames); + do + break; + done; + local propagaterOutput="$outputDev"; + if [ -z "$propagaterOutput" ]; then + propagaterOutput="$outputFirst"; + fi; + if [ -z "${propagatedBuildOutputs+1}" ]; then + local po_dirty="$outputBin $outputInclude $outputLib"; + set +o pipefail; + propagatedBuildOutputs=`echo "$po_dirty" | tr -s ' ' '\n' | grep -v -F "$propagaterOutput" | sort -u | tr '\n' ' ' `; + set -o pipefail; + fi; + if [ -z "$propagatedBuildOutputs" ]; then + return; + fi; + mkdir -p "${!propagaterOutput}"/nix-support; + for output in $propagatedBuildOutputs; + do + echo -n " ${!output}" >> "${!propagaterOutput}"/nix-support/propagated-build-inputs; + done +} +_nixLogWithLevel () +{ + + [[ -z ${NIX_LOG_FD-} || ${NIX_DEBUG:-0} -lt ${1:?} ]] && return 0; + local logLevel; + case "${1:?}" in + 0) + logLevel=ERROR + ;; + 1) + logLevel=WARN + ;; + 2) + logLevel=NOTICE + ;; + 3) + logLevel=INFO + ;; + 4) + logLevel=TALKATIVE + ;; + 5) + logLevel=CHATTY + ;; + 6) + logLevel=DEBUG + ;; + 7) + logLevel=VOMIT + ;; + *) + echo "_nixLogWithLevel: called with invalid log level: ${1:?}" >&"$NIX_LOG_FD"; + return 1 + ;; + esac; + local callerName="${FUNCNAME[2]}"; + if [[ $callerName == "_callImplicitHook" ]]; then + callerName="${hookName:?}"; + fi; + printf "%s: %s: %s\n" "$logLevel" "$callerName" "${2:?}" >&"$NIX_LOG_FD" +} +_overrideFirst () +{ + + if [ -z "${!1-}" ]; then + _assignFirst "$@"; + fi +} +_pruneLibtoolFiles () +{ + + if [ "${dontPruneLibtoolFiles-}" ] || [ ! -e "$prefix" ]; then + return; + fi; + find "$prefix" -type f -name '*.la' -exec grep -q '^# Generated by .*libtool' {} \; -exec grep -q "^old_library=''" {} \; -exec sed -i {} -e "/^dependency_libs='[^']/ c dependency_libs='' #pruned" \; +} +_updateSourceDateEpochFromSourceRoot () +{ + + if [ -n "$sourceRoot" ]; then + updateSourceDateEpoch "$sourceRoot"; + fi +} +activatePackage () +{ + + local pkg="$1"; + local -r hostOffset="$2"; + local -r targetOffset="$3"; + (( hostOffset <= targetOffset )) || exit 1; + if [ -f "$pkg" ]; then + nixTalkativeLog "sourcing setup hook '$pkg'"; + source "$pkg"; + fi; + if [[ -z "${strictDeps-}" || "$hostOffset" -le -1 ]]; then + addToSearchPath _PATH "$pkg/bin"; + fi; + if (( hostOffset <= -1 )); then + addToSearchPath _XDG_DATA_DIRS "$pkg/share"; + fi; + if [[ "$hostOffset" -eq 0 && -d "$pkg/bin" ]]; then + addToSearchPath _HOST_PATH "$pkg/bin"; + fi; + if [[ -f "$pkg/nix-support/setup-hook" ]]; then + nixTalkativeLog "sourcing setup hook '$pkg/nix-support/setup-hook'"; + source "$pkg/nix-support/setup-hook"; + fi +} +addEnvHooks () +{ + + local depHostOffset="$1"; + shift; + local pkgHookVarsSlice="${pkgHookVarVars[$depHostOffset + 1]}[@]"; + local pkgHookVar; + for pkgHookVar in "${!pkgHookVarsSlice}"; + do + eval "${pkgHookVar}s"'+=("$@")'; + done +} +addToSearchPath () +{ + + addToSearchPathWithCustomDelimiter ":" "$@" +} +addToSearchPathWithCustomDelimiter () +{ + + local delimiter="$1"; + local varName="$2"; + local dir="$3"; + if [[ -d "$dir" && "${!varName:+${delimiter}${!varName}${delimiter}}" != *"${delimiter}${dir}${delimiter}"* ]]; then + export "${varName}=${!varName:+${!varName}${delimiter}}${dir}"; + fi +} +appendToVar () +{ + + local -n nameref="$1"; + local useArray type; + if [ -n "$__structuredAttrs" ]; then + useArray=true; + else + useArray=false; + fi; + if type=$(declare -p "$1" 2> /dev/null); then + case "${type#* }" in + -A*) + echo "appendToVar(): ERROR: trying to use appendToVar on an associative array, use variable+=([\"X\"]=\"Y\") instead." 1>&2; + return 1 + ;; + -a*) + useArray=true + ;; + *) + useArray=false + ;; + esac; + fi; + shift; + if $useArray; then + nameref=(${nameref+"${nameref[@]}"} "$@"); + else + nameref="${nameref-} $*"; + fi +} +auditTmpdir () +{ + + local dir="$1"; + [ -e "$dir" ] || return 0; + echo "checking for references to $TMPDIR/ in $dir..."; + local i; + find "$dir" -type f -print0 | while IFS= read -r -d '' i; do + if [[ "$i" =~ .build-id ]]; then + continue; + fi; + if isELF "$i"; then + if { + printf :; + patchelf --print-rpath "$i" + } | grep -q -F ":$TMPDIR/"; then + echo "RPATH of binary $i contains a forbidden reference to $TMPDIR/"; + exit 1; + fi; + fi; + if isScript "$i"; then + if [ -e "$(dirname "$i")/.$(basename "$i")-wrapped" ]; then + if grep -q -F "$TMPDIR/" "$i"; then + echo "wrapper script $i contains a forbidden reference to $TMPDIR/"; + exit 1; + fi; + fi; + fi; + done +} +bintoolsWrapper_addLDVars () +{ + + local role_post; + getHostRoleEnvHook; + if [[ -d "$1/lib64" && ! -L "$1/lib64" ]]; then + export NIX_LDFLAGS${role_post}+=" -L$1/lib64"; + fi; + if [[ -d "$1/lib" ]]; then + local -a glob=($1/lib/lib*); + if [ "${#glob[*]}" -gt 0 ]; then + export NIX_LDFLAGS${role_post}+=" -L$1/lib"; + fi; + fi +} +buildPhase () +{ + + runHook preBuild; + if [[ -z "${makeFlags-}" && -z "${makefile:-}" && ! ( -e Makefile || -e makefile || -e GNUmakefile ) ]]; then + echo "no Makefile or custom buildPhase, doing nothing"; + else + foundMakefile=1; + local flagsArray=(${enableParallelBuilding:+-j${NIX_BUILD_CORES}} SHELL="$SHELL"); + concatTo flagsArray makeFlags makeFlagsArray buildFlags buildFlagsArray; + echoCmd 'build flags' "${flagsArray[@]}"; + make ${makefile:+-f $makefile} "${flagsArray[@]}"; + unset flagsArray; + fi; + runHook postBuild +} +ccWrapper_addCVars () +{ + + local role_post; + getHostRoleEnvHook; + if [ -d "$1/include" ]; then + export NIX_CFLAGS_COMPILE${role_post}+=" -isystem $1/include"; + fi; + if [ -d "$1/Library/Frameworks" ]; then + export NIX_CFLAGS_COMPILE${role_post}+=" -iframework $1/Library/Frameworks"; + fi +} +checkPhase () +{ + + runHook preCheck; + if [[ -z "${foundMakefile:-}" ]]; then + echo "no Makefile or custom checkPhase, doing nothing"; + runHook postCheck; + return; + fi; + if [[ -z "${checkTarget:-}" ]]; then + if make -n ${makefile:+-f $makefile} check > /dev/null 2>&1; then + checkTarget="check"; + else + if make -n ${makefile:+-f $makefile} test > /dev/null 2>&1; then + checkTarget="test"; + fi; + fi; + fi; + if [[ -z "${checkTarget:-}" ]]; then + echo "no check/test target in ${makefile:-Makefile}, doing nothing"; + else + local flagsArray=(${enableParallelChecking:+-j${NIX_BUILD_CORES}} SHELL="$SHELL"); + concatTo flagsArray makeFlags makeFlagsArray checkFlags=VERBOSE=y checkFlagsArray checkTarget; + echoCmd 'check flags' "${flagsArray[@]}"; + make ${makefile:+-f $makefile} "${flagsArray[@]}"; + unset flagsArray; + fi; + runHook postCheck +} +compressManPages () +{ + + local dir="$1"; + if [ -L "$dir"/share ] || [ -L "$dir"/share/man ] || [ ! -d "$dir/share/man" ]; then + return; + fi; + echo "gzipping man pages under $dir/share/man/"; + find "$dir"/share/man/ -type f -a '!' -regex '.*\.\(bz2\|gz\|xz\)$' -print0 | while IFS= read -r -d '' f; do + if gzip -c -n "$f" > "$f".gz; then + rm "$f"; + else + rm "$f".gz; + fi; + done; + find "$dir"/share/man/ -type l -a '!' -regex '.*\.\(bz2\|gz\|xz\)$' -print0 | sort -z | while IFS= read -r -d '' f; do + local target; + target="$(readlink -f "$f")"; + if [ -f "$target".gz ]; then + ln -sf "$target".gz "$f".gz && rm "$f"; + fi; + done +} +concatStringsSep () +{ + + local sep="$1"; + local name="$2"; + local type oldifs; + if type=$(declare -p "$name" 2> /dev/null); then + local -n nameref="$name"; + case "${type#* }" in + -A*) + echo "concatStringsSep(): ERROR: trying to use concatStringsSep on an associative array." 1>&2; + return 1 + ;; + -a*) + local IFS="$(printf '\036')" + ;; + *) + local IFS=" " + ;; + esac; + local ifs_separated="${nameref[*]}"; + echo -n "${ifs_separated//"$IFS"/"$sep"}"; + fi +} +concatTo () +{ + + local -; + set -o noglob; + local -n targetref="$1"; + shift; + local arg default name type; + for arg in "$@"; + do + IFS="=" read -r name default <<< "$arg"; + local -n nameref="$name"; + if [[ -z "${nameref[*]}" && -n "$default" ]]; then + targetref+=("$default"); + else + if type=$(declare -p "$name" 2> /dev/null); then + case "${type#* }" in + -A*) + echo "concatTo(): ERROR: trying to use concatTo on an associative array." 1>&2; + return 1 + ;; + -a*) + targetref+=("${nameref[@]}") + ;; + *) + if [[ "$name" = *"Array" ]]; then + nixErrorLog "concatTo(): $name is not declared as array, treating as a singleton. This will become an error in future"; + targetref+=(${nameref+"${nameref[@]}"}); + else + targetref+=(${nameref-}); + fi + ;; + esac; + fi; + fi; + done +} +configurePhase () +{ + + runHook preConfigure; + : "${configureScript=}"; + if [[ -z "$configureScript" && -x ./configure ]]; then + configureScript=./configure; + fi; + if [ -z "${dontFixLibtool:-}" ]; then + export lt_cv_deplibs_check_method="${lt_cv_deplibs_check_method-pass_all}"; + local i; + find . -iname "ltmain.sh" -print0 | while IFS='' read -r -d '' i; do + echo "fixing libtool script $i"; + fixLibtool "$i"; + done; + CONFIGURE_MTIME_REFERENCE=$(mktemp configure.mtime.reference.XXXXXX); + find . -executable -type f -name configure -exec grep -l 'GNU Libtool is free software; you can redistribute it and/or modify' {} \; -exec touch -r {} "$CONFIGURE_MTIME_REFERENCE" \; -exec sed -i s_/usr/bin/file_file_g {} \; -exec touch -r "$CONFIGURE_MTIME_REFERENCE" {} \;; + rm -f "$CONFIGURE_MTIME_REFERENCE"; + fi; + if [[ -z "${dontAddPrefix:-}" && -n "$prefix" ]]; then + prependToVar configureFlags "${prefixKey:---prefix=}$prefix"; + fi; + if [[ -f "$configureScript" ]]; then + if [ -z "${dontAddDisableDepTrack:-}" ]; then + if grep -q dependency-tracking "$configureScript"; then + prependToVar configureFlags --disable-dependency-tracking; + fi; + fi; + if [ -z "${dontDisableStatic:-}" ]; then + if grep -q enable-static "$configureScript"; then + prependToVar configureFlags --disable-static; + fi; + fi; + if [ -z "${dontPatchShebangsInConfigure:-}" ]; then + patchShebangs --build "$configureScript"; + fi; + fi; + if [ -n "$configureScript" ]; then + local -a flagsArray; + concatTo flagsArray configureFlags configureFlagsArray; + echoCmd 'configure flags' "${flagsArray[@]}"; + $configureScript "${flagsArray[@]}"; + unset flagsArray; + else + echo "no configure script, doing nothing"; + fi; + runHook postConfigure +} +consumeEntire () +{ + + if IFS='' read -r -d '' "$1"; then + echo "consumeEntire(): ERROR: Input null bytes, won't process" 1>&2; + return 1; + fi +} +distPhase () +{ + + runHook preDist; + local flagsArray=(); + concatTo flagsArray distFlags distFlagsArray distTarget=dist; + echo 'dist flags: %q' "${flagsArray[@]}"; + make ${makefile:+-f $makefile} "${flagsArray[@]}"; + if [ "${dontCopyDist:-0}" != 1 ]; then + mkdir -p "$out/tarballs"; + cp -pvd ${tarballs[*]:-*.tar.gz} "$out/tarballs"; + fi; + runHook postDist +} +dumpVars () +{ + + if [ "${noDumpEnvVars:-0}" != 1 ]; then + { + install -m 0600 /dev/null "$NIX_BUILD_TOP/env-vars" && export 2> /dev/null >| "$NIX_BUILD_TOP/env-vars" + } || true; + fi +} +echoCmd () +{ + + printf "%s:" "$1"; + shift; + printf ' %q' "$@"; + echo +} +exitHandler () +{ + + exitCode="$?"; + set +e; + if [ -n "${showBuildStats:-}" ]; then + read -r -d '' -a buildTimes < <(times); + echo "build times:"; + echo "user time for the shell ${buildTimes[0]}"; + echo "system time for the shell ${buildTimes[1]}"; + echo "user time for all child processes ${buildTimes[2]}"; + echo "system time for all child processes ${buildTimes[3]}"; + fi; + if (( "$exitCode" != 0 )); then + runHook failureHook; + if [ -n "${succeedOnFailure:-}" ]; then + echo "build failed with exit code $exitCode (ignored)"; + mkdir -p "$out/nix-support"; + printf "%s" "$exitCode" > "$out/nix-support/failed"; + exit 0; + fi; + else + runHook exitHook; + fi; + return "$exitCode" +} +findInputs () +{ + + local -r pkg="$1"; + local -r hostOffset="$2"; + local -r targetOffset="$3"; + (( hostOffset <= targetOffset )) || exit 1; + local varVar="${pkgAccumVarVars[hostOffset + 1]}"; + local varRef="$varVar[$((targetOffset - hostOffset))]"; + local var="${!varRef}"; + unset -v varVar varRef; + local varSlice="$var[*]"; + case " ${!varSlice-} " in + *" $pkg "*) + return 0 + ;; + esac; + unset -v varSlice; + eval "$var"'+=("$pkg")'; + if ! [ -e "$pkg" ]; then + echo "build input $pkg does not exist" 1>&2; + exit 1; + fi; + function mapOffset () + { + local -r inputOffset="$1"; + local -n outputOffset="$2"; + if (( inputOffset <= 0 )); then + outputOffset=$((inputOffset + hostOffset)); + else + outputOffset=$((inputOffset - 1 + targetOffset)); + fi + }; + local relHostOffset; + for relHostOffset in "${allPlatOffsets[@]}"; + do + local files="${propagatedDepFilesVars[relHostOffset + 1]}"; + local hostOffsetNext; + mapOffset "$relHostOffset" hostOffsetNext; + (( -1 <= hostOffsetNext && hostOffsetNext <= 1 )) || continue; + local relTargetOffset; + for relTargetOffset in "${allPlatOffsets[@]}"; + do + (( "$relHostOffset" <= "$relTargetOffset" )) || continue; + local fileRef="${files}[$relTargetOffset - $relHostOffset]"; + local file="${!fileRef}"; + unset -v fileRef; + local targetOffsetNext; + mapOffset "$relTargetOffset" targetOffsetNext; + (( -1 <= hostOffsetNext && hostOffsetNext <= 1 )) || continue; + [[ -f "$pkg/nix-support/$file" ]] || continue; + local pkgNext; + read -r -d '' pkgNext < "$pkg/nix-support/$file" || true; + for pkgNext in $pkgNext; + do + findInputs "$pkgNext" "$hostOffsetNext" "$targetOffsetNext"; + done; + done; + done +} +fixLibtool () +{ + + local search_path; + for flag in $NIX_LDFLAGS; + do + case $flag in + -L*) + search_path+=" ${flag#-L}" + ;; + esac; + done; + sed -i "$1" -e "s^eval \(sys_lib_search_path=\).*^\1'${search_path:-}'^" -e 's^eval sys_lib_.+search_path=.*^^' +} +fixupPhase () +{ + + local output; + for output in $(getAllOutputNames); + do + if [ -e "${!output}" ]; then + chmod -R u+w,u-s,g-s "${!output}"; + fi; + done; + runHook preFixup; + local output; + for output in $(getAllOutputNames); + do + prefix="${!output}" runHook fixupOutput; + done; + recordPropagatedDependencies; + if [ -n "${setupHook:-}" ]; then + mkdir -p "${!outputDev}/nix-support"; + substituteAll "$setupHook" "${!outputDev}/nix-support/setup-hook"; + fi; + if [ -n "${setupHooks:-}" ]; then + mkdir -p "${!outputDev}/nix-support"; + local hook; + for hook in ${setupHooks[@]}; + do + local content; + consumeEntire content < "$hook"; + substituteAllStream content "file '$hook'" >> "${!outputDev}/nix-support/setup-hook"; + unset -v content; + done; + unset -v hook; + fi; + if [ -n "${propagatedUserEnvPkgs:-}" ]; then + mkdir -p "${!outputBin}/nix-support"; + printWords $propagatedUserEnvPkgs > "${!outputBin}/nix-support/propagated-user-env-packages"; + fi; + runHook postFixup +} +genericBuild () +{ + + export GZIP_NO_TIMESTAMPS=1; + if [ -f "${buildCommandPath:-}" ]; then + source "$buildCommandPath"; + return; + fi; + if [ -n "${buildCommand:-}" ]; then + eval "$buildCommand"; + return; + fi; + if [ -z "${phases[*]:-}" ]; then + phases="${prePhases[*]:-} unpackPhase patchPhase ${preConfigurePhases[*]:-} configurePhase ${preBuildPhases[*]:-} buildPhase checkPhase ${preInstallPhases[*]:-} installPhase ${preFixupPhases[*]:-} fixupPhase installCheckPhase ${preDistPhases[*]:-} distPhase ${postPhases[*]:-}"; + fi; + for curPhase in ${phases[*]}; + do + runPhase "$curPhase"; + done +} +getAllOutputNames () +{ + + if [ -n "$__structuredAttrs" ]; then + echo "${!outputs[*]}"; + else + echo "$outputs"; + fi +} +getHostRole () +{ + + getRole "$hostOffset" +} +getHostRoleEnvHook () +{ + + getRole "$depHostOffset" +} +getRole () +{ + + case $1 in + -1) + role_post='_FOR_BUILD' + ;; + 0) + role_post='' + ;; + 1) + role_post='_FOR_TARGET' + ;; + *) + echo "binutils-wrapper-2.43.1: used as improper sort of dependency" 1>&2; + return 1 + ;; + esac +} +getTargetRole () +{ + + getRole "$targetOffset" +} +getTargetRoleEnvHook () +{ + + getRole "$depTargetOffset" +} +getTargetRoleWrapper () +{ + + case $targetOffset in + -1) + export NIX_BINTOOLS_WRAPPER_TARGET_BUILD_x86_64_unknown_linux_gnu=1 + ;; + 0) + export NIX_BINTOOLS_WRAPPER_TARGET_HOST_x86_64_unknown_linux_gnu=1 + ;; + 1) + export NIX_BINTOOLS_WRAPPER_TARGET_TARGET_x86_64_unknown_linux_gnu=1 + ;; + *) + echo "binutils-wrapper-2.43.1: used as improper sort of dependency" 1>&2; + return 1 + ;; + esac +} +installCheckPhase () +{ + + runHook preInstallCheck; + if [[ -z "${foundMakefile:-}" ]]; then + echo "no Makefile or custom installCheckPhase, doing nothing"; + else + if [[ -z "${installCheckTarget:-}" ]] && ! make -n ${makefile:+-f $makefile} "${installCheckTarget:-installcheck}" > /dev/null 2>&1; then + echo "no installcheck target in ${makefile:-Makefile}, doing nothing"; + else + local flagsArray=(${enableParallelChecking:+-j${NIX_BUILD_CORES}} SHELL="$SHELL"); + concatTo flagsArray makeFlags makeFlagsArray installCheckFlags installCheckFlagsArray installCheckTarget=installcheck; + echoCmd 'installcheck flags' "${flagsArray[@]}"; + make ${makefile:+-f $makefile} "${flagsArray[@]}"; + unset flagsArray; + fi; + fi; + runHook postInstallCheck +} +installPhase () +{ + + runHook preInstall; + if [[ -z "${makeFlags-}" && -z "${makefile:-}" && ! ( -e Makefile || -e makefile || -e GNUmakefile ) ]]; then + echo "no Makefile or custom installPhase, doing nothing"; + runHook postInstall; + return; + else + foundMakefile=1; + fi; + if [ -n "$prefix" ]; then + mkdir -p "$prefix"; + fi; + local flagsArray=(${enableParallelInstalling:+-j${NIX_BUILD_CORES}} SHELL="$SHELL"); + concatTo flagsArray makeFlags makeFlagsArray installFlags installFlagsArray installTargets=install; + echoCmd 'install flags' "${flagsArray[@]}"; + make ${makefile:+-f $makefile} "${flagsArray[@]}"; + unset flagsArray; + runHook postInstall +} +isELF () +{ + + local fn="$1"; + local fd; + local magic; + exec {fd}< "$fn"; + read -r -n 4 -u "$fd" magic; + exec {fd}>&-; + if [ "$magic" = 'ELF' ]; then + return 0; + else + return 1; + fi +} +isMachO () +{ + + local fn="$1"; + local fd; + local magic; + exec {fd}< "$fn"; + read -r -n 4 -u "$fd" magic; + exec {fd}>&-; + if [[ "$magic" = $(echo -ne "\xfe\xed\xfa\xcf") || "$magic" = $(echo -ne "\xcf\xfa\xed\xfe") ]]; then + return 0; + else + if [[ "$magic" = $(echo -ne "\xfe\xed\xfa\xce") || "$magic" = $(echo -ne "\xce\xfa\xed\xfe") ]]; then + return 0; + else + if [[ "$magic" = $(echo -ne "\xca\xfe\xba\xbe") || "$magic" = $(echo -ne "\xbe\xba\xfe\xca") ]]; then + return 0; + else + return 1; + fi; + fi; + fi +} +isScript () +{ + + local fn="$1"; + local fd; + local magic; + exec {fd}< "$fn"; + read -r -n 2 -u "$fd" magic; + exec {fd}>&-; + if [[ "$magic" =~ \#! ]]; then + return 0; + else + return 1; + fi +} +mapOffset () +{ + + local -r inputOffset="$1"; + local -n outputOffset="$2"; + if (( inputOffset <= 0 )); then + outputOffset=$((inputOffset + hostOffset)); + else + outputOffset=$((inputOffset - 1 + targetOffset)); + fi +} +moveToOutput () +{ + + local patt="$1"; + local dstOut="$2"; + local output; + for output in $(getAllOutputNames); + do + if [ "${!output}" = "$dstOut" ]; then + continue; + fi; + local srcPath; + for srcPath in "${!output}"/$patt; + do + if [ ! -e "$srcPath" ] && [ ! -L "$srcPath" ]; then + continue; + fi; + if [ "$dstOut" = REMOVE ]; then + echo "Removing $srcPath"; + rm -r "$srcPath"; + else + local dstPath="$dstOut${srcPath#${!output}}"; + echo "Moving $srcPath to $dstPath"; + if [ -d "$dstPath" ] && [ -d "$srcPath" ]; then + rmdir "$srcPath" --ignore-fail-on-non-empty; + if [ -d "$srcPath" ]; then + mv -t "$dstPath" "$srcPath"/*; + rmdir "$srcPath"; + fi; + else + mkdir -p "$(readlink -m "$dstPath/..")"; + mv "$srcPath" "$dstPath"; + fi; + fi; + local srcParent="$(readlink -m "$srcPath/..")"; + if [ -n "$(find "$srcParent" -maxdepth 0 -type d -empty 2> /dev/null)" ]; then + echo "Removing empty $srcParent/ and (possibly) its parents"; + rmdir -p --ignore-fail-on-non-empty "$srcParent" 2> /dev/null || true; + fi; + done; + done +} +nixChattyLog () +{ + + _nixLogWithLevel 5 "$*" +} +nixDebugLog () +{ + + _nixLogWithLevel 6 "$*" +} +nixErrorLog () +{ + + _nixLogWithLevel 0 "$*" +} +nixInfoLog () +{ + + _nixLogWithLevel 3 "$*" +} +nixLog () +{ + + [[ -z ${NIX_LOG_FD-} ]] && return 0; + local callerName="${FUNCNAME[1]}"; + if [[ $callerName == "_callImplicitHook" ]]; then + callerName="${hookName:?}"; + fi; + printf "%s: %s\n" "$callerName" "$*" >&"$NIX_LOG_FD" +} +nixNoticeLog () +{ + + _nixLogWithLevel 2 "$*" +} +nixTalkativeLog () +{ + + _nixLogWithLevel 4 "$*" +} +nixVomitLog () +{ + + _nixLogWithLevel 7 "$*" +} +nixWarnLog () +{ + + _nixLogWithLevel 1 "$*" +} +noBrokenSymlinks () +{ + + local -r output="${1:?}"; + local path; + local pathParent; + local symlinkTarget; + local -i numDanglingSymlinks=0; + local -i numReflexiveSymlinks=0; + if [[ ! -e $output ]]; then + nixWarnLog "skipping non-existent output $output"; + return 0; + fi; + nixInfoLog "running on $output"; + while IFS= read -r -d '' path; do + pathParent="$(dirname "$path")"; + symlinkTarget="$(readlink "$path")"; + if [[ $symlinkTarget == /* ]]; then + nixInfoLog "symlink $path points to absolute target $symlinkTarget"; + else + nixInfoLog "symlink $path points to relative target $symlinkTarget"; + symlinkTarget="$(realpath --no-symlinks --canonicalize-missing "$pathParent/$symlinkTarget")"; + fi; + if [[ $symlinkTarget != "$NIX_STORE"/* ]]; then + nixInfoLog "symlink $path points outside the Nix store; ignoring"; + continue; + fi; + if [[ $path == "$symlinkTarget" ]]; then + nixErrorLog "the symlink $path is reflexive $symlinkTarget"; + numReflexiveSymlinks+=1; + else + if [[ ! -e $symlinkTarget ]]; then + nixErrorLog "the symlink $path points to a missing target $symlinkTarget"; + numDanglingSymlinks+=1; + else + nixDebugLog "the symlink $path is irreflexive and points to a target which exists"; + fi; + fi; + done < <(find "$output" -type l -print0); + if ((numDanglingSymlinks > 0 || numReflexiveSymlinks > 0)); then + nixErrorLog "found $numDanglingSymlinks dangling symlinks and $numReflexiveSymlinks reflexive symlinks"; + exit 1; + fi; + return 0 +} +noBrokenSymlinksInAllOutputs () +{ + + if [[ -z ${dontCheckForBrokenSymlinks-} ]]; then + for output in $(getAllOutputNames); + do + noBrokenSymlinks "${!output}"; + done; + fi +} +patchELF () +{ + + local dir="$1"; + [ -e "$dir" ] || return 0; + echo "shrinking RPATHs of ELF executables and libraries in $dir"; + local i; + while IFS= read -r -d '' i; do + if [[ "$i" =~ .build-id ]]; then + continue; + fi; + if ! isELF "$i"; then + continue; + fi; + echo "shrinking $i"; + patchelf --shrink-rpath "$i" || true; + done < <(find "$dir" -type f -print0) +} +patchPhase () +{ + + runHook prePatch; + local -a patchesArray; + concatTo patchesArray patches; + for i in "${patchesArray[@]}"; + do + echo "applying patch $i"; + local uncompress=cat; + case "$i" in + *.gz) + uncompress="gzip -d" + ;; + *.bz2) + uncompress="bzip2 -d" + ;; + *.xz) + uncompress="xz -d" + ;; + *.lzma) + uncompress="lzma -d" + ;; + esac; + local -a flagsArray; + concatTo flagsArray patchFlags=-p1; + $uncompress < "$i" 2>&1 | patch "${flagsArray[@]}"; + done; + runHook postPatch +} +patchShebangs () +{ + + local pathName; + local update=false; + while [[ $# -gt 0 ]]; do + case "$1" in + --host) + pathName=HOST_PATH; + shift + ;; + --build) + pathName=PATH; + shift + ;; + --update) + update=true; + shift + ;; + --) + shift; + break + ;; + -* | --*) + echo "Unknown option $1 supplied to patchShebangs" 1>&2; + return 1 + ;; + *) + break + ;; + esac; + done; + echo "patching script interpreter paths in $@"; + local f; + local oldPath; + local newPath; + local arg0; + local args; + local oldInterpreterLine; + local newInterpreterLine; + if [[ $# -eq 0 ]]; then + echo "No arguments supplied to patchShebangs" 1>&2; + return 0; + fi; + local f; + while IFS= read -r -d '' f; do + isScript "$f" || continue; + read -r oldInterpreterLine < "$f" || [ "$oldInterpreterLine" ]; + read -r oldPath arg0 args <<< "${oldInterpreterLine:2}"; + if [[ -z "${pathName:-}" ]]; then + if [[ -n $strictDeps && $f == "$NIX_STORE"* ]]; then + pathName=HOST_PATH; + else + pathName=PATH; + fi; + fi; + if [[ "$oldPath" == *"/bin/env" ]]; then + if [[ $arg0 == "-S" ]]; then + arg0=${args%% *}; + args=${args#* }; + newPath="$(PATH="${!pathName}" type -P "env" || true)"; + args="-S $(PATH="${!pathName}" type -P "$arg0" || true) $args"; + else + if [[ $arg0 == "-"* || $arg0 == *"="* ]]; then + echo "$f: unsupported interpreter directive \"$oldInterpreterLine\" (set dontPatchShebangs=1 and handle shebang patching yourself)" 1>&2; + exit 1; + else + newPath="$(PATH="${!pathName}" type -P "$arg0" || true)"; + fi; + fi; + else + if [[ -z $oldPath ]]; then + oldPath="/bin/sh"; + fi; + newPath="$(PATH="${!pathName}" type -P "$(basename "$oldPath")" || true)"; + args="$arg0 $args"; + fi; + newInterpreterLine="$newPath $args"; + newInterpreterLine=${newInterpreterLine%${newInterpreterLine##*[![:space:]]}}; + if [[ -n "$oldPath" && ( "$update" == true || "${oldPath:0:${#NIX_STORE}}" != "$NIX_STORE" ) ]]; then + if [[ -n "$newPath" && "$newPath" != "$oldPath" ]]; then + echo "$f: interpreter directive changed from \"$oldInterpreterLine\" to \"$newInterpreterLine\""; + escapedInterpreterLine=${newInterpreterLine//\\/\\\\}; + timestamp=$(stat --printf "%y" "$f"); + sed -i -e "1 s|.*|#\!$escapedInterpreterLine|" "$f"; + touch --date "$timestamp" "$f"; + fi; + fi; + done < <(find "$@" -type f -perm -0100 -print0) +} +patchShebangsAuto () +{ + + if [[ -z "${dontPatchShebangs-}" && -e "$prefix" ]]; then + if [[ "$output" != out && "$output" = "$outputDev" ]]; then + patchShebangs --build "$prefix"; + else + patchShebangs --host "$prefix"; + fi; + fi +} +prependToVar () +{ + + local -n nameref="$1"; + local useArray type; + if [ -n "$__structuredAttrs" ]; then + useArray=true; + else + useArray=false; + fi; + if type=$(declare -p "$1" 2> /dev/null); then + case "${type#* }" in + -A*) + echo "prependToVar(): ERROR: trying to use prependToVar on an associative array." 1>&2; + return 1 + ;; + -a*) + useArray=true + ;; + *) + useArray=false + ;; + esac; + fi; + shift; + if $useArray; then + nameref=("$@" ${nameref+"${nameref[@]}"}); + else + nameref="$* ${nameref-}"; + fi +} +printLines () +{ + + (( "$#" > 0 )) || return 0; + printf '%s\n' "$@" +} +printWords () +{ + + (( "$#" > 0 )) || return 0; + printf '%s ' "$@" +} +recordPropagatedDependencies () +{ + + declare -ra flatVars=(depsBuildBuildPropagated propagatedNativeBuildInputs depsBuildTargetPropagated depsHostHostPropagated propagatedBuildInputs depsTargetTargetPropagated); + declare -ra flatFiles=("${propagatedBuildDepFiles[@]}" "${propagatedHostDepFiles[@]}" "${propagatedTargetDepFiles[@]}"); + local propagatedInputsIndex; + for propagatedInputsIndex in "${!flatVars[@]}"; + do + local propagatedInputsSlice="${flatVars[$propagatedInputsIndex]}[@]"; + local propagatedInputsFile="${flatFiles[$propagatedInputsIndex]}"; + [[ -n "${!propagatedInputsSlice}" ]] || continue; + mkdir -p "${!outputDev}/nix-support"; + printWords ${!propagatedInputsSlice} > "${!outputDev}/nix-support/$propagatedInputsFile"; + done +} +runHook () +{ + + local hookName="$1"; + shift; + local hooksSlice="${hookName%Hook}Hooks[@]"; + local hook; + for hook in "_callImplicitHook 0 $hookName" ${!hooksSlice+"${!hooksSlice}"}; + do + _logHook "$hookName" "$hook" "$@"; + _eval "$hook" "$@"; + done; + return 0 +} +runOneHook () +{ + + local hookName="$1"; + shift; + local hooksSlice="${hookName%Hook}Hooks[@]"; + local hook ret=1; + for hook in "_callImplicitHook 1 $hookName" ${!hooksSlice+"${!hooksSlice}"}; + do + _logHook "$hookName" "$hook" "$@"; + if _eval "$hook" "$@"; then + ret=0; + break; + fi; + done; + return "$ret" +} +runPhase () +{ + + local curPhase="$*"; + if [[ "$curPhase" = unpackPhase && -n "${dontUnpack:-}" ]]; then + return; + fi; + if [[ "$curPhase" = patchPhase && -n "${dontPatch:-}" ]]; then + return; + fi; + if [[ "$curPhase" = configurePhase && -n "${dontConfigure:-}" ]]; then + return; + fi; + if [[ "$curPhase" = buildPhase && -n "${dontBuild:-}" ]]; then + return; + fi; + if [[ "$curPhase" = checkPhase && -z "${doCheck:-}" ]]; then + return; + fi; + if [[ "$curPhase" = installPhase && -n "${dontInstall:-}" ]]; then + return; + fi; + if [[ "$curPhase" = fixupPhase && -n "${dontFixup:-}" ]]; then + return; + fi; + if [[ "$curPhase" = installCheckPhase && -z "${doInstallCheck:-}" ]]; then + return; + fi; + if [[ "$curPhase" = distPhase && -z "${doDist:-}" ]]; then + return; + fi; + showPhaseHeader "$curPhase"; + dumpVars; + local startTime endTime; + startTime=$(date +"%s"); + eval "${!curPhase:-$curPhase}"; + endTime=$(date +"%s"); + showPhaseFooter "$curPhase" "$startTime" "$endTime"; + if [ "$curPhase" = unpackPhase ]; then + [ -n "${sourceRoot:-}" ] && chmod +x -- "${sourceRoot}"; + cd -- "${sourceRoot:-.}"; + fi +} +showPhaseFooter () +{ + + local phase="$1"; + local startTime="$2"; + local endTime="$3"; + local delta=$(( endTime - startTime )); + (( delta < 30 )) && return; + local H=$((delta/3600)); + local M=$((delta%3600/60)); + local S=$((delta%60)); + echo -n "$phase completed in "; + (( H > 0 )) && echo -n "$H hours "; + (( M > 0 )) && echo -n "$M minutes "; + echo "$S seconds" +} +showPhaseHeader () +{ + + local phase="$1"; + echo "Running phase: $phase"; + if [[ -z ${NIX_LOG_FD-} ]]; then + return; + fi; + printf "@nix { \"action\": \"setPhase\", \"phase\": \"%s\" }\n" "$phase" >&"$NIX_LOG_FD" +} +stripDirs () +{ + + local cmd="$1"; + local ranlibCmd="$2"; + local paths="$3"; + local stripFlags="$4"; + local excludeFlags=(); + local pathsNew=; + [ -z "$cmd" ] && echo "stripDirs: Strip command is empty" 1>&2 && exit 1; + [ -z "$ranlibCmd" ] && echo "stripDirs: Ranlib command is empty" 1>&2 && exit 1; + local pattern; + if [ -n "${stripExclude:-}" ]; then + for pattern in "${stripExclude[@]}"; + do + excludeFlags+=(-a '!' '(' -name "$pattern" -o -wholename "$prefix/$pattern" ')'); + done; + fi; + local p; + for p in ${paths}; + do + if [ -e "$prefix/$p" ]; then + pathsNew="${pathsNew} $prefix/$p"; + fi; + done; + paths=${pathsNew}; + if [ -n "${paths}" ]; then + echo "stripping (with command $cmd and flags $stripFlags) in $paths"; + local striperr; + striperr="$(mktemp --tmpdir="$TMPDIR" 'striperr.XXXXXX')"; + find $paths -type f "${excludeFlags[@]}" -a '!' -path "$prefix/lib/debug/*" -printf '%D-%i,%p\0' | sort -t, -k1,1 -u -z | cut -d, -f2- -z | xargs -r -0 -n1 -P "$NIX_BUILD_CORES" -- $cmd $stripFlags 2> "$striperr" || exit_code=$?; + [[ "$exit_code" = 123 || -z "$exit_code" ]] || ( cat "$striperr" 1>&2 && exit 1 ); + rm "$striperr"; + find $paths -name '*.a' -type f -exec $ranlibCmd '{}' \; 2> /dev/null; + fi +} +stripHash () +{ + + local strippedName casematchOpt=0; + strippedName="$(basename -- "$1")"; + shopt -q nocasematch && casematchOpt=1; + shopt -u nocasematch; + if [[ "$strippedName" =~ ^[a-z0-9]{32}- ]]; then + echo "${strippedName:33}"; + else + echo "$strippedName"; + fi; + if (( casematchOpt )); then + shopt -s nocasematch; + fi +} +substitute () +{ + + local input="$1"; + local output="$2"; + shift 2; + if [ ! -f "$input" ]; then + echo "substitute(): ERROR: file '$input' does not exist" 1>&2; + return 1; + fi; + local content; + consumeEntire content < "$input"; + if [ -e "$output" ]; then + chmod +w "$output"; + fi; + substituteStream content "file '$input'" "$@" > "$output" +} +substituteAll () +{ + + local input="$1"; + local output="$2"; + local -a args=(); + _allFlags; + substitute "$input" "$output" "${args[@]}" +} +substituteAllInPlace () +{ + + local fileName="$1"; + shift; + substituteAll "$fileName" "$fileName" "$@" +} +substituteAllStream () +{ + + local -a args=(); + _allFlags; + substituteStream "$1" "$2" "${args[@]}" +} +substituteInPlace () +{ + + local -a fileNames=(); + for arg in "$@"; + do + if [[ "$arg" = "--"* ]]; then + break; + fi; + fileNames+=("$arg"); + shift; + done; + if ! [[ "${#fileNames[@]}" -gt 0 ]]; then + echo "substituteInPlace called without any files to operate on (files must come before options!)" 1>&2; + return 1; + fi; + for file in "${fileNames[@]}"; + do + substitute "$file" "$file" "$@"; + done +} +substituteStream () +{ + + local var=$1; + local description=$2; + shift 2; + while (( "$#" )); do + local replace_mode="$1"; + case "$1" in + --replace) + if ! "$_substituteStream_has_warned_replace_deprecation"; then + echo "substituteStream() in derivation $name: WARNING: '--replace' is deprecated, use --replace-{fail,warn,quiet}. ($description)" 1>&2; + _substituteStream_has_warned_replace_deprecation=true; + fi; + replace_mode='--replace-warn' + ;& + --replace-quiet | --replace-warn | --replace-fail) + pattern="$2"; + replacement="$3"; + shift 3; + local savedvar; + savedvar="${!var}"; + eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}'; + if [ "$pattern" != "$replacement" ]; then + if [ "${!var}" == "$savedvar" ]; then + if [ "$replace_mode" == --replace-warn ]; then + printf "substituteStream() in derivation $name: WARNING: pattern %q doesn't match anything in %s\n" "$pattern" "$description" 1>&2; + else + if [ "$replace_mode" == --replace-fail ]; then + printf "substituteStream() in derivation $name: ERROR: pattern %q doesn't match anything in %s\n" "$pattern" "$description" 1>&2; + return 1; + fi; + fi; + fi; + fi + ;; + --subst-var) + local varName="$2"; + shift 2; + if ! [[ "$varName" =~ ^[a-zA-Z_][a-zA-Z0-9_]*$ ]]; then + echo "substituteStream() in derivation $name: ERROR: substitution variables must be valid Bash names, \"$varName\" isn't." 1>&2; + return 1; + fi; + if [ -z ${!varName+x} ]; then + echo "substituteStream() in derivation $name: ERROR: variable \$$varName is unset" 1>&2; + return 1; + fi; + pattern="@$varName@"; + replacement="${!varName}"; + eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}' + ;; + --subst-var-by) + pattern="@$2@"; + replacement="$3"; + eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}'; + shift 3 + ;; + *) + echo "substituteStream() in derivation $name: ERROR: Invalid command line argument: $1" 1>&2; + return 1 + ;; + esac; + done; + printf "%s" "${!var}" +} +unpackFile () +{ + + curSrc="$1"; + echo "unpacking source archive $curSrc"; + if ! runOneHook unpackCmd "$curSrc"; then + echo "do not know how to unpack source archive $curSrc"; + exit 1; + fi +} +unpackPhase () +{ + + runHook preUnpack; + if [ -z "${srcs:-}" ]; then + if [ -z "${src:-}" ]; then + echo 'variable $src or $srcs should point to the source'; + exit 1; + fi; + srcs="$src"; + fi; + local -a srcsArray; + concatTo srcsArray srcs; + local dirsBefore=""; + for i in *; + do + if [ -d "$i" ]; then + dirsBefore="$dirsBefore $i "; + fi; + done; + for i in "${srcsArray[@]}"; + do + unpackFile "$i"; + done; + : "${sourceRoot=}"; + if [ -n "${setSourceRoot:-}" ]; then + runOneHook setSourceRoot; + else + if [ -z "$sourceRoot" ]; then + for i in *; + do + if [ -d "$i" ]; then + case $dirsBefore in + *\ $i\ *) + + ;; + *) + if [ -n "$sourceRoot" ]; then + echo "unpacker produced multiple directories"; + exit 1; + fi; + sourceRoot="$i" + ;; + esac; + fi; + done; + fi; + fi; + if [ -z "$sourceRoot" ]; then + echo "unpacker appears to have produced no directories"; + exit 1; + fi; + echo "source root is $sourceRoot"; + if [ "${dontMakeSourcesWritable:-0}" != 1 ]; then + chmod -R u+w -- "$sourceRoot"; + fi; + runHook postUnpack +} +updateAutotoolsGnuConfigScriptsPhase () +{ + + if [ -n "${dontUpdateAutotoolsGnuConfigScripts-}" ]; then + return; + fi; + for script in config.sub config.guess; + do + for f in $(find . -type f -name "$script"); + do + echo "Updating Autotools / GNU config script to a newer upstream version: $f"; + cp -f "/nix/store/3g69kgyhn438bxli7nf202xz6sc3sln9-gnu-config-2024-01-01/$script" "$f"; + done; + done +} +updateSourceDateEpoch () +{ + + local path="$1"; + [[ $path == -* ]] && path="./$path"; + local -a res=($(find "$path" -type f -not -newer "$NIX_BUILD_TOP/.." -printf '%T@ "%p"\0' | sort -n --zero-terminated | tail -n1 --zero-terminated | head -c -1)); + local time="${res[0]//\.[0-9]*/}"; + local newestFile="${res[1]}"; + if [ "${time:-0}" -gt "$SOURCE_DATE_EPOCH" ]; then + echo "setting SOURCE_DATE_EPOCH to timestamp $time of file $newestFile"; + export SOURCE_DATE_EPOCH="$time"; + local now="$(date +%s)"; + if [ "$time" -gt $((now - 60)) ]; then + echo "warning: file $newestFile may be generated; SOURCE_DATE_EPOCH may be non-deterministic"; + fi; + fi +} +PATH="$PATH${nix_saved_PATH:+:$nix_saved_PATH}" +XDG_DATA_DIRS="$XDG_DATA_DIRS${nix_saved_XDG_DATA_DIRS:+:$nix_saved_XDG_DATA_DIRS}" +export NIX_BUILD_TOP="$(mktemp -d -t nix-shell.XXXXXX)" +export TMP="$NIX_BUILD_TOP" +export TMPDIR="$NIX_BUILD_TOP" +export TEMP="$NIX_BUILD_TOP" +export TEMPDIR="$NIX_BUILD_TOP" +eval "${shellHook:-}" diff --git a/scripts/ldap-nginx-plumber/.envrc b/scripts/ldap-nginx-plumber/.envrc new file mode 100644 index 0000000..3550a30 --- /dev/null +++ b/scripts/ldap-nginx-plumber/.envrc @@ -0,0 +1 @@ +use flake diff --git a/scripts/ldap-nginx-plumber/.gitignore b/scripts/ldap-nginx-plumber/.gitignore new file mode 100644 index 0000000..1fcb19e --- /dev/null +++ b/scripts/ldap-nginx-plumber/.gitignore @@ -0,0 +1,10 @@ +result +.nrepl +.nrepl-port +.cpcache/ +.cache/ +.lsp/ +.clj-kondo +.cpcache +.lsp +.nrepl diff --git a/scripts/ldap-nginx-plumber/bb.edn b/scripts/ldap-nginx-plumber/bb.edn new file mode 100644 index 0000000..9ce3b5e --- /dev/null +++ b/scripts/ldap-nginx-plumber/bb.edn @@ -0,0 +1,7 @@ +{:tasks + {:requires ([babashka.process :as p]) + update-lockfile + {:doc "Update the clj-nix lockfile" + :task (let [r (p/sh {:out :inherit :err :inherit} + "nix run github:jlesquembre/clj-nix#deps-lock")] + (System/exit (:exit r)))}}} diff --git a/scripts/ldap-nginx-plumber/deps-lock.json b/scripts/ldap-nginx-plumber/deps-lock.json new file mode 100644 index 0000000..6ca3d45 --- /dev/null +++ b/scripts/ldap-nginx-plumber/deps-lock.json @@ -0,0 +1,231 @@ +{ + "lock-version": 4, + "git-deps": [], + "mvn-deps": [ + { + "mvn-path": "cider/cider-nrepl/0.50.2/cider-nrepl-0.50.2.jar", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-tbnqZSyOG3J9fd1m4dapUi+nHjtaQJeLV4a/VC5YJPs=" + }, + { + "mvn-path": "cider/cider-nrepl/0.50.2/cider-nrepl-0.50.2.pom", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-pcCaxUODbWDLN1avACS4514owHqNuz4GSCm6trWVADs=" + }, + { + "mvn-path": "cider/orchard/0.27.2/orchard-0.27.2.jar", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-Jsgqu5d32ltq8zEWWEA/HJ4fTRedJBxVvbVwHcuNe+E=" + }, + { + "mvn-path": "cider/orchard/0.27.2/orchard-0.27.2.pom", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-eUGmk2TB2JzLpi2p+Ge//udJO7t/o339YCaPNt7KFek=" + }, + { + "mvn-path": "com/unboundid/unboundid-ldapsdk/5.1.1/unboundid-ldapsdk-5.1.1.jar", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-pDQyAxsORZLswWwh04LPvdn5jVAvFn9+/oaXq09Efrk=" + }, + { + "mvn-path": "com/unboundid/unboundid-ldapsdk/5.1.1/unboundid-ldapsdk-5.1.1.pom", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-w6xcAY5WK8G4gm92pX0qY7sf0uKzCo8m7dSBPrEvztg=" + }, + { + "mvn-path": "http-kit/http-kit/2.8.0/http-kit-2.8.0.jar", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-xJbmqG/sRrN0PcOZ7chy4USW2IioTQTByE3qoe0gg60=" + }, + { + "mvn-path": "http-kit/http-kit/2.8.0/http-kit-2.8.0.pom", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-RLTLjpPU9rJiwE7Qdx1w3WbnbUXX/HVYIGcaYmVcVDk=" + }, + { + "mvn-path": "mx/cider/logjam/0.3.0/logjam-0.3.0.jar", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-h1moSv+GjTrjwDEil7l6psf7j5NUK39llkv5kT9K4J8=" + }, + { + "mvn-path": "mx/cider/logjam/0.3.0/logjam-0.3.0.pom", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-k9fFPsmXKX/14Z92LgY8cFtCu8jmbBE/DCbyRWK1D6Q=" + }, + { + "mvn-path": "nrepl/nrepl/1.1.1/nrepl-1.1.1.jar", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-P2jHLbYCXN4hKfwc7o5aL9/jYCTo6NAfo04tc3SL2gk=" + }, + { + "mvn-path": "nrepl/nrepl/1.1.1/nrepl-1.1.1.pom", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-KayXZRYA/ZpRur3UBfhjhi29S9Zt2sfQ5+vRQGznYwQ=" + }, + { + "mvn-path": "org/babashka/cli/0.8.62/cli-0.8.62.jar", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-/Y+i9wLRyvXCgB1D/qnZyZ05p0/jFwe6FYiDyIWlm7E=" + }, + { + "mvn-path": "org/babashka/cli/0.8.62/cli-0.8.62.pom", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-O3xHZ+YB2KirU9VMGeECp7XEoomB8WI3Qh9YpoeqMxc=" + }, + { + "mvn-path": "org/clojars/pntblnk/clj-ldap/0.0.17/clj-ldap-0.0.17.jar", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-d+ygGVO56kwcrLssTcym1P3PsFmOq3UlqYgkHL025nI=" + }, + { + "mvn-path": "org/clojars/pntblnk/clj-ldap/0.0.17/clj-ldap-0.0.17.pom", + "mvn-repo": "https://repo.clojars.org/", + "hash": "sha256-DpL90WPauoqhSf2UH5BFHY2DLo+NtNsWOlToM7LZALw=" + }, + { + "mvn-path": "org/clojure/clojure/1.10.3/clojure-1.10.3.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-fxJHLa7Y9rUXSYqqKrE6ViR1w+31FHjkWBzHYemJeaM=" + }, + { + "mvn-path": "org/clojure/clojure/1.10.3/clojure-1.10.3.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-GJwAxDNAdJai+7DsyzeQjJSVXZHq0b5IFWdE7MGBbZQ=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.0/clojure-1.11.0.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-PiH6daB+yd278bK1A1bPGAcQ0DmN6qT0TpHNYwRVWUc=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.0/clojure-1.11.0.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-SQjMS0yeYsmoFJb5PLWsb2lBd8xkXc87jOXkkavOHro=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.1/clojure-1.11.1.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-I4G26UI6tGUVFFWUSQPROlYkPWAGuRlK/Bv0+HEMtN4=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.1/clojure-1.11.1.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-IMRaGr7b2L4grvk2BQrjGgjBZ0CzL4dAuIOM3pb/y4o=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.2/clojure-1.11.2.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-iPqZkT1pIs+39kn1xGdQOHfLb8yMwW02948mSAhLqZc=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.2/clojure-1.11.2.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-FzbP/xCV4dT+/raogrut9ttB7+MV8pbw/aMtt//EExE=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.3/clojure-1.11.3.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-nDBUCTKOK5boXdK160t1gQxnt2unCuTQ9t3pvPtVsbc=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.3/clojure-1.11.3.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-DA2+Ge4NKpxXMQzr3dNWRD8NFlFMQmBHsGLjpXwNuK0=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.4/clojure-1.11.4.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-/H/xtmENDjSUp1zBHvgYEL2kAqwVcBL+TjuJlYbPQTM=" + }, + { + "mvn-path": "org/clojure/clojure/1.11.4/clojure-1.11.4.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-a6YADmhI+Cw5y5tJqyqmo6Vi9MJNUrMeUZCuZJXwwwk=" + }, + { + "mvn-path": "org/clojure/clojure/1.12.0/clojure-1.12.0.jar", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-xFMzAGRBoFnqn9sTQfxsH0C5IaENzNgmZTEeSKA4R2M=" + }, + { + "mvn-path": "org/clojure/clojure/1.12.0/clojure-1.12.0.pom", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-KfRiqonLl2RXWEGKXwjUwagrc1yW569JgX0WqpuQgVA=" + }, + { + "mvn-path": "org/clojure/core.specs.alpha/0.2.56/core.specs.alpha-0.2.56.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-/PRCveArBKhj8vzFjuaiowxM8Mlw99q4VjTwq3ERZrY=" + }, + { + "mvn-path": "org/clojure/core.specs.alpha/0.2.56/core.specs.alpha-0.2.56.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-AarxdIP/HHSCySoHKV1+e8bjszIt9EsptXONAg/wB0A=" + }, + { + "mvn-path": "org/clojure/core.specs.alpha/0.2.62/core.specs.alpha-0.2.62.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-Bu6owHC75FwVhWfkQ0OWgbyMRukSNBT4G/oyukLWy8g=" + }, + { + "mvn-path": "org/clojure/core.specs.alpha/0.2.62/core.specs.alpha-0.2.62.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-F3i70Ti9GFkLgFS+nZGdG+toCfhbduXGKFtn1Ad9MA4=" + }, + { + "mvn-path": "org/clojure/core.specs.alpha/0.4.74/core.specs.alpha-0.4.74.jar", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-63OsCM9JuoQMiLpnvu8RM2ylVDM9lAiAjXiUbg/rnds=" + }, + { + "mvn-path": "org/clojure/core.specs.alpha/0.4.74/core.specs.alpha-0.4.74.pom", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-M0EOuKpz1S2Vez3G4KZfOZisBiPL2BPZDDPm5onEJCk=" + }, + { + "mvn-path": "org/clojure/pom.contrib/0.3.0/pom.contrib-0.3.0.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-fxgrOypUPgV0YL+T/8XpzvasUn3xoTdqfZki6+ee8Rk=" + }, + { + "mvn-path": "org/clojure/pom.contrib/1.1.0/pom.contrib-1.1.0.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-EOzku1+YKQENwWVh9C67g7ry9HYFtR+RBbkvPKoIlxU=" + }, + { + "mvn-path": "org/clojure/pom.contrib/1.2.0/pom.contrib-1.2.0.pom", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-CRbXpBVYuVAKQnyIb6KYJ6zlJZIGvjrTPmTilvwaYRE=" + }, + { + "mvn-path": "org/clojure/spec.alpha/0.2.194/spec.alpha-0.2.194.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-z2iZ+YUpjGSxPqEplGrZAo3uja3w6rmuGORVAn04JJw=" + }, + { + "mvn-path": "org/clojure/spec.alpha/0.2.194/spec.alpha-0.2.194.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-WhHw4eizwFLmUcSYxpRbRNs1Nb8sGHGf3PZd8fiLE+Y=" + }, + { + "mvn-path": "org/clojure/spec.alpha/0.3.218/spec.alpha-0.3.218.jar", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-Z+yJjrVcZqlXpVJ53YXRN2u5lL2HZosrDeHrO5foquA=" + }, + { + "mvn-path": "org/clojure/spec.alpha/0.3.218/spec.alpha-0.3.218.pom", + "mvn-repo": "https://repo.maven.apache.org/maven2/", + "hash": "sha256-bY3hTDrIdXYMX/kJVi/5hzB3AxxquTnxyxOeFp/pB1g=" + }, + { + "mvn-path": "org/clojure/spec.alpha/0.5.238/spec.alpha-0.5.238.jar", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-lM2ZtupjlkHzevSGCmQ7btOZ7lqL5dcXz/C2Y8jXUHc=" + }, + { + "mvn-path": "org/clojure/spec.alpha/0.5.238/spec.alpha-0.5.238.pom", + "mvn-repo": "https://repo1.maven.org/maven2/", + "hash": "sha256-PLp+DcwIXEzpLd3/6iJhJP+sF4vnm9A3m1suMKlpy+o=" + } + ] +} diff --git a/scripts/ldap-nginx-plumber/deps.edn b/scripts/ldap-nginx-plumber/deps.edn new file mode 100644 index 0000000..058221e --- /dev/null +++ b/scripts/ldap-nginx-plumber/deps.edn @@ -0,0 +1,12 @@ +{:deps {org.clojure/clojure {:mvn/version "1.12.0"} + org.babashka/cli {:mvn/version "0.8.62"} + http-kit/http-kit {:mvn/version "2.8.0"} + org.clojars.pntblnk/clj-ldap {:mvn/version "0.0.17"}} + :paths ["src"] + :aliases + {:cider + {:extra-deps {cider/cider-nrepl {:mvn/version "0.50.2"}} + :main-opts ["-m" "nrepl.cmdline" + "--middleware" "[cider.nrepl/cider-middleware]"]} + :run + {:main-opts ["-m" "ldap-nginx-plumber.main"]}}} diff --git a/scripts/ldap-nginx-plumber/flake.lock b/scripts/ldap-nginx-plumber/flake.lock new file mode 100644 index 0000000..90af986 --- /dev/null +++ b/scripts/ldap-nginx-plumber/flake.lock @@ -0,0 +1,171 @@ +{ + "nodes": { + "clj-nix": { + "inputs": { + "devshell": "devshell", + "nix-fetcher-data": "nix-fetcher-data", + "nixpkgs": "nixpkgs" + }, + "locked": { + "lastModified": 1738969798, + "narHash": "sha256-yHUAph4easuun343wEEJXC4qsftl9vRy+CqLkORkeKI=", + "owner": "jlesquembre", + "repo": "clj-nix", + "rev": "7b314a06743ef400beb921d3559482741d19bf3f", + "type": "github" + }, + "original": { + "owner": "jlesquembre", + "repo": "clj-nix", + "type": "github" + } + }, + "devshell": { + "inputs": { + "nixpkgs": [ + "clj-nix", + "nixpkgs" + ] + }, + "locked": { + "lastModified": 1728330715, + "narHash": "sha256-xRJ2nPOXb//u1jaBnDP56M7v5ldavjbtR6lfGqSvcKg=", + "owner": "numtide", + "repo": "devshell", + "rev": "dd6b80932022cea34a019e2bb32f6fa9e494dfef", + "type": "github" + }, + "original": { + "owner": "numtide", + "repo": "devshell", + "type": "github" + } + }, + "flake-parts": { + "inputs": { + "nixpkgs-lib": "nixpkgs-lib" + }, + "locked": { + "lastModified": 1719745305, + "narHash": "sha256-xwgjVUpqSviudEkpQnioeez1Uo2wzrsMaJKJClh+Bls=", + "owner": "hercules-ci", + "repo": "flake-parts", + "rev": "c3c5ecc05edc7dafba779c6c1a61cd08ac6583e9", + "type": "github" + }, + "original": { + "owner": "hercules-ci", + "repo": "flake-parts", + "type": "github" + } + }, + "flake-utils": { + "inputs": { + "systems": "systems" + }, + "locked": { + "lastModified": 1731533236, + "narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=", + "owner": "numtide", + "repo": "flake-utils", + "rev": "11707dc2f618dd54ca8739b309ec4fc024de578b", + "type": "github" + }, + "original": { + "owner": "numtide", + "repo": "flake-utils", + "type": "github" + } + }, + "nix-fetcher-data": { + "inputs": { + "flake-parts": "flake-parts", + "nixpkgs": [ + "clj-nix", + "nixpkgs" + ] + }, + "locked": { + "lastModified": 1728229178, + "narHash": "sha256-p5Fx880uBYstIsbaDYN7sECJT11oHxZQKtHgMAVblWA=", + "owner": "jlesquembre", + "repo": "nix-fetcher-data", + "rev": "f3a73c34d28db49ef90fd7872a142bfe93120e55", + "type": "github" + }, + "original": { + "owner": "jlesquembre", + "repo": "nix-fetcher-data", + "type": "github" + } + }, + "nixpkgs": { + "locked": { + "lastModified": 1728492678, + "narHash": "sha256-9UTxR8eukdg+XZeHgxW5hQA9fIKHsKCdOIUycTryeVw=", + "owner": "NixOS", + "repo": "nixpkgs", + "rev": "5633bcff0c6162b9e4b5f1264264611e950c8ec7", + "type": "github" + }, + "original": { + "owner": "NixOS", + "ref": "nixos-unstable", + "repo": "nixpkgs", + "type": "github" + } + }, + "nixpkgs-lib": { + "locked": { + "lastModified": 1717284937, + "narHash": "sha256-lIbdfCsf8LMFloheeE6N31+BMIeixqyQWbSr2vk79EQ=", + "type": "tarball", + "url": "https://github.com/NixOS/nixpkgs/archive/eb9ceca17df2ea50a250b6b27f7bf6ab0186f198.tar.gz" + }, + "original": { + "type": "tarball", + "url": "https://github.com/NixOS/nixpkgs/archive/eb9ceca17df2ea50a250b6b27f7bf6ab0186f198.tar.gz" + } + }, + "nixpkgs_2": { + "locked": { + "lastModified": 1739866667, + "narHash": "sha256-EO1ygNKZlsAC9avfcwHkKGMsmipUk1Uc0TbrEZpkn64=", + "owner": "NixOS", + "repo": "nixpkgs", + "rev": "73cf49b8ad837ade2de76f87eb53fc85ed5d4680", + "type": "github" + }, + "original": { + "owner": "NixOS", + "ref": "nixos-unstable", + "repo": "nixpkgs", + "type": "github" + } + }, + "root": { + "inputs": { + "clj-nix": "clj-nix", + "flake-utils": "flake-utils", + "nixpkgs": "nixpkgs_2" + } + }, + "systems": { + "locked": { + "lastModified": 1681028828, + "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", + "owner": "nix-systems", + "repo": "default", + "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e", + "type": "github" + }, + "original": { + "owner": "nix-systems", + "repo": "default", + "type": "github" + } + } + }, + "root": "root", + "version": 7 +} diff --git a/scripts/ldap-nginx-plumber/flake.nix b/scripts/ldap-nginx-plumber/flake.nix new file mode 100644 index 0000000..0eb9ed0 --- /dev/null +++ b/scripts/ldap-nginx-plumber/flake.nix @@ -0,0 +1,47 @@ +{ + inputs = { + nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable"; + flake-utils.url = "github:numtide/flake-utils"; + clj-nix.url = "github:jlesquembre/clj-nix"; + }; + + outputs = { self, ... }@inputs: + inputs.flake-utils.lib.eachDefaultSystem (system: + let pkgs = import inputs.nixpkgs { + inherit system; + overlays = [ + inputs.clj-nix.overlays.default + ]; + }; + in { + packages = rec { + ldap-nginx-plumber = inputs.clj-nix.lib.mkCljApp { + pkgs = inputs.nixpkgs.legacyPackages.${system}; + modules = [ + { + name = "msyds/ldap-nginx-plumber"; + version = "1.0.0"; + main-ns = "ldap-nginx-plumber.main"; + projectSrc = ./.; + + nativeImage = { + # Disable for faster build times. + # enable = true; + }; + } + ]; + }; + + default = ldap-nginx-plumber; + }; + + devShells.default = pkgs.mkShell { + packages = with pkgs; [ + clojure-lsp + cljfmt + clojure + babashka + ]; + }; + }); +} diff --git a/scripts/ldap-nginx-plumber/src/ldap_nginx_plumber/main.clj b/scripts/ldap-nginx-plumber/src/ldap_nginx_plumber/main.clj new file mode 100644 index 0000000..551337d --- /dev/null +++ b/scripts/ldap-nginx-plumber/src/ldap_nginx_plumber/main.clj @@ -0,0 +1,83 @@ +(ns ldap-nginx-plumber.main + (:require [clojure.spec.alpha :as spec] + [org.httpkit.server :as http] + [clj-ldap.client :as ldap] + [babashka.cli :as cli]) + (:gen-class)) + +(defn- port? [x] + (and (nat-int? %) + (<= 0 % 65535))) + +(def cli-spec + {:spec + {:port {:coerce :int + :desc "Port to listen on" + :alias :p + :validate port? + :require true} + :base-dn {:coerce :string + :desc "Base DN for LDAP searches" + :require true} + :ldap-host {:coerce :string + :require true} + :ldap-port {:coerce :int + :validate port? + :default 389}}}) + +(defonce ldap-connection-pool + (atom nil)) + +(defn- response [status & {:as more}] + (apply merge + {:status status + :headers {"Content-Type" "text/plain"}} + more)) + +(defn- consultant-app [opts] + (fn [req] + (prn req) + (response 200 :body "hi") + #_ + (let [user-dn (format "uid=%s,%s" + )] + (if (ldap/bind? @ldap-connection-pool) + (response 200 + :body "Dong") + (response 401))))) + +(defonce consultant-server (atom nil)) + +(defn- stop-consultant! [] + (when @consultant-server + ;; Graceful shutdown: wait 100ms for existing requests to be finished. + ;; :timeout is optional, when no timeout, stop immediately. + (http/server-stop! @consultant-server {:timeout 100}) + (reset! consultant-server nil))) + +(defn- start-consultant [& {:keys [port] :as opts}] + (if @consultant-server + (throw (ex-info "Refusing to start the server whilst a previous lingers" {})) + (reset! consultant-server + (http/run-server (#'consultant-app opts) + {:port port + :legacy-return-value? false})))) + +(defn- connect-to-ldap [& {:keys [base-dn ldap-host ldap-port]}] + (reset! ldap-connection-pool + (or @ldap-connection-pool + (ldap/connect {:host {:address ldap-host + :port ldap-port} + :max-connections 8})))) + +(defn- main* [& opts] + (and (apply connect-to-ldap opts) + (apply start-consultant opts))) + +#_ ; Start on :8080 +(main* :port 8080) +#_ ; Shutdown +(stop-consultant!) + +(defn -main [& args] + (main* (cli/parse-opts args cli-spec))) diff --git a/users/crumb/programs/direnv.nix b/users/crumb/programs/direnv.nix new file mode 100644 index 0000000..235c0f4 --- /dev/null +++ b/users/crumb/programs/direnv.nix @@ -0,0 +1,15 @@ +{ config, lib, pkgs, ... }: + +{ + # High-speed Nix support. Note that Lorri has a years-old open issue + # preventing it from starting on boot/login correctly. + # + # Currently unused in favour of nix-direnv. + + # services.lorri.enable = true; + + programs.direnv = { + enable = true; + nix-direnv.enable = true; + }; +} diff --git a/users/crumb/programs/emacs.nix b/users/crumb/programs/emacs.nix index 2bc547d..4d3e782 100755 --- a/users/crumb/programs/emacs.nix +++ b/users/crumb/programs/emacs.nix @@ -49,6 +49,7 @@ let buildInputs = [ pkgs.git # Dependency of Straight.el. my-aspell + pkgs.direnv ]; postBuild = '' # The binary called `emacs` is actually a symlink to `emacs-«version»`, so @@ -61,12 +62,9 @@ let --set EMACS_DATA_DIR "${emacsDataDir}" \ --prefix PATH : "${pkgs.git}/bin" \ --prefix PATH : "${my-aspell}/bin" \ + --prefix PATH : "${pkgs.direnv}/bin" \ --set ASPELL_CONF "dict-dir ${my-aspell}/lib/aspell" done - - # HACK: Prevent collision between `emacsWrapper` and the later - # `emacsWithPackages` call. - # find $out/bin -not -regex '.*/\.?emacs[^/]*' -exec rm {} \; ''; meta = emacsPackage.meta; version = emacsPackage.version; @@ -111,7 +109,6 @@ in { }; home.packages = [ - # emacsWrapper emacsclient-or-emacs ] ++ fontPackages; diff --git a/users/crumb/programs/emacs/modules/lang/syd-lang-clojure.el b/users/crumb/programs/emacs/modules/lang/syd-lang-clojure.el new file mode 100644 index 0000000..dc45cd5 --- /dev/null +++ b/users/crumb/programs/emacs/modules/lang/syd-lang-clojure.el @@ -0,0 +1,84 @@ +;;; syd-lang-clojure.el -*- lexical-binding: t; -*- + +(use-package clojure-mode + :mode (rx "." (or "clj" "cljs" "edn" "cljc") eol) + :config + (add-hook 'clojure-mode-hook #'syd-lisp-mode) + (dolist (c '(?- ?_ ?? ?! ?+ ?* ?/ ?: ?> ?< ?= ?&)) + (modify-syntax-entry c "w" clojure-mode-syntax-table))) + +(use-package cider + :after clojure-mode) + +(defun syd-clojure-open-repl (&optional arg type) + "Open a Cider REPL for clojure and return the buffer." + (interactive "P") + ;; TODO: Better error handling + ;; type is `clj' for clojure and `cljs' for clojurescript + ;; ... with no type specified, assume `clj'. + (let ((type (or type 'clj))) + (if-let* ((buffer (cider-current-repl type))) + (pop-to-buffer buffer) + (let ((process (cond ((eq type 'clj) (cider-jack-in-clj arg)) + ((eq type 'cljs) (cider-jack-in-cljs arg))))) + (message "Starting CIDER server for the first time...") + (while (and (process-live-p process) + (not (cider-current-repl type))) + (sit-for 1)) + (message "Starting CIDER server for the first time...done") + (pop-to-buffer (cider-current-repl type)))))) + +(use-package cider-mode + :straight nil + ;; :after clojure-mode + :hook (clojure-mode-local-vars . cider-mode) + :init + (with-eval-after-load 'clojure-mode + (set-repl-handler! '(clojure-mode clojurec-mode) + #'syd-clojure-open-repl :persist t) + (set-repl-handler! 'clojurescript-mode + #'syd-clojure-open-cljs-repl :persist t) + (set-eval-handler! '(clojure-mode clojurec-mode clojurescript-mode) + #'cider-eval-region)) + :config + (add-hook 'cider-mode-hook #'eldoc-mode) + (set-popup-rules! + `(("^\\*cider-error*" :ignore t) + ("^\\*cider-repl" :quit nil :ttl nil) + ("^\\*cider-repl-history" :vslot 2 :ttl nil) + (,(rx bol "*cider-cheatsheet*") + :width ,(lambda (win) + (with-selected-window win + (enlarge-window (- (min 45 (* 0.2 (frame-width))) + (window-width)) + t))) + :side right :vslot -8 :quit t :select t) + (,(rx bol "*cider-doc*") + :slot 2 :vslot -8 :quit t :select t))) + ;; DEPRECATED: Remove once syd-strategies is working. + (syd-add-hook 'clojure-mode-hook + (defun syd-clojure-set-handlers-h () + (setq-local syd-lookup-documentation-handlers + (list #'cider-doc)))) + (general-define-key + :keymaps 'cider-mode-map + :states '(normal visual motion emacs insert) + :major-modes t + :prefix syd-localleader-key + :non-normal-prefix syd-alt-localleader-key + "\"" #'cider-jack-in-cljs + "'" #'cider-jack-in-clj + "c" #'cider-connect-clj + "C" #'cider-connect-cljs + "r l" #'cider-load-buffer + "r n" #'cider-repl-set-ns + "r r" #'cider-ns-refresh + "r R" #'cider-restart + "r q" #'cider-quit + "h c" #'cider-cheatsheet)) + +;; Give different pairs of delimiters different colours. +(use-package rainbow-delimiters + :hook (clojure-mode . rainbow-delimiters-mode)) + +(provide 'syd-lang-clojure) diff --git a/users/crumb/programs/emacs/modules/lang/syd-lang-emacs-lisp.el b/users/crumb/programs/emacs/modules/lang/syd-lang-emacs-lisp.el index 8a7d793..0243ce3 100644 --- a/users/crumb/programs/emacs/modules/lang/syd-lang-emacs-lisp.el +++ b/users/crumb/programs/emacs/modules/lang/syd-lang-emacs-lisp.el @@ -68,12 +68,11 @@ to a pop up buffer." (add-hook 'emacs-lisp-mode-hook #'syd-lisp-mode) -(defun syd-emacs-set-handlers-h () - (setq-local syd-lookup-documentation-handlers - (list #'syd-emacs-lisp-lookup-documentation))) - -(add-hook 'emacs-lisp-mode-hook #'syd-emacs-set-handlers-h) -(add-hook 'help-mode-hook #'syd-emacs-set-handlers-h) + ;; DEPRECATED: Remove once syd-strategies is working. +(syd-add-hook '(emacs-lisp-mode-hook help-mode-hook) + (defun syd-emacs-set-handlers-h () + (setq-local syd-lookup-documentation-handlers + (list #'syd-emacs-lisp-lookup-documentation)))) ;; Semantic highlighting for Elisp. (use-package highlight-defined diff --git a/users/crumb/programs/emacs/modules/syd-evil.el b/users/crumb/programs/emacs/modules/syd-evil.el index ad7f96e..65b6fe4 100755 --- a/users/crumb/programs/emacs/modules/syd-evil.el +++ b/users/crumb/programs/emacs/modules/syd-evil.el @@ -107,35 +107,35 @@ Otherwise, nil." ;; It must be updated whenever evil-collection updates theirs. (defvar evil-collection-mode-list `(2048-game ag alchemist anaconda-mode apropos arc-mode atomic-chrome - auto-package-update beginend bluetooth bm bookmark - (buff-menu "buff-menu") bufler calc calendar cider citre cmake-mode - color-rg comint company compile consult corfu crdt (csv "csv-mode") - (custom cus-edit) cus-theme dape dashboard daemons deadgrep debbugs - debug devdocs dictionary diff-hl diff-mode dired dired-sidebar - disk-usage distel doc-view docker eat ebib ebuku edbi edebug ediff eglot - elpaca ement explain-pause-mode eldoc elfeed elisp-mode elisp-refs - elisp-slime-nav embark emms ,@(if (> emacs-major-version 28) '(emoji)) - epa ert eshell eval-sexp-fu evil-mc eww fanyi finder flycheck flymake - forge free-keys geiser ggtags git-timemachine gited gnus go-mode gptel - grep guix hackernews helm help helpful hg-histedit hungry-delete hyrolo - ibuffer (image image-mode) image-dired image+ imenu imenu-list - (indent "indent") indium info ivy js2-mode - ,@(if (>= emacs-major-version 30) '(kmacro)) leetcode lispy lms log-edit - log-view lsp-ui-imenu lua-mode kotlin-mode macrostep man - (magit magit-repos magit-submodule) magit-repos magit-section - magit-todos markdown-mode monky mpc mpdel mu4e mu4e-conversation neotree - newsticker notmuch nov omnisharp org org-present org-roam osx-dictionary - outline p4 (package-menu package) pass (pdf pdf-tools) popup proced - prodigy profiler p-search python quickrun racer racket-describe realgud - reftex replace restclient rg ripgrep rjsx-mode robe rtags ruby-mode - scheme scroll-lock selectrum sh-script - ,@(if (> emacs-major-version 27) '(shortdoc)) simple simple-mpc slime - sly smerge-mode snake so-long speedbar tab-bar tablist tar-mode telega - (term term ansi-term multi-term) tetris thread tide timer-list - transmission trashed tuareg typescript-mode vc-annotate vc-dir vc-git - vdiff vertico view vlf vterm vundo w3m wdired wgrep which-key - with-editor woman xref xwidget yaml-mode youtube-dl zmusic - (ztree ztree-diff))) + auto-package-update beginend bluetooth bm bookmark + (buff-menu "buff-menu") bufler calc calendar cider citre cmake-mode + color-rg comint company compile consult corfu crdt (csv "csv-mode") + (custom cus-edit) cus-theme dape dashboard daemons deadgrep debbugs + debug devdocs dictionary diff-hl diff-mode dired dired-sidebar + disk-usage distel doc-view docker eat ebib ebuku edbi edebug ediff eglot + elpaca ement explain-pause-mode eldoc elfeed elisp-mode elisp-refs + elisp-slime-nav embark emms ,@(if (> emacs-major-version 28) '(emoji)) + epa ert eshell eval-sexp-fu evil-mc eww fanyi finder flycheck flymake + forge free-keys geiser ggtags git-timemachine gited gnus go-mode gptel + grep guix hackernews helm help helpful hg-histedit hungry-delete hyrolo + ibuffer (image image-mode) image-dired image+ imenu imenu-list + (indent "indent") indium info ivy js2-mode + ,@(if (>= emacs-major-version 30) '(kmacro)) leetcode lispy lms log-edit + log-view lsp-ui-imenu lua-mode kotlin-mode macrostep man + (magit magit-repos magit-submodule) magit-repos magit-section + magit-todos markdown-mode monky mpc mpdel mu4e mu4e-conversation neotree + newsticker notmuch nov omnisharp org org-present org-roam osx-dictionary + outline p4 (package-menu package) pass (pdf pdf-tools) popup proced + prodigy profiler p-search python quickrun racer racket-describe realgud + reftex replace restclient rg ripgrep rjsx-mode robe rtags ruby-mode + scheme scroll-lock selectrum sh-script + ,@(if (> emacs-major-version 27) '(shortdoc)) simple simple-mpc slime + sly smerge-mode snake so-long speedbar tab-bar tablist tar-mode telega + (term term ansi-term multi-term) tetris thread tide timer-list + transmission trashed tuareg typescript-mode vc-annotate vc-dir vc-git + vdiff vertico view vlf vterm vundo w3m wdired wgrep which-key + with-editor woman xref xwidget yaml-mode youtube-dl zmusic + (ztree ztree-diff))) (cl-defun syd-evil-collection-init (module &key disabled-modules) "Initialise evil-collection-MODULE. @@ -150,14 +150,12 @@ modules." (with-demoted-errors "error loading evil-collection: %s" (evil-collection-init (list module)))))) - (defun syd-evil-collection-disable-blacklist-a (fn) + ;; Allow binding to ESC. + (syd-defadvice syd-evil-collection-disable-blacklist-a (fn) + :around #'evil-collection-vterm-toggle-send-escape (let (evil-collection-key-blacklist) (funcall-interactively fn))) - ;; Allow binding to ESC. - (advice-add #'evil-collection-vterm-toggle-send-escape - :around #'syd-evil-collection-disable-blacklist-a) - ;; These modes belong to packages that Emacs always loads at startup, causing ;; evil-collection and it's co-packages to all load immediately. We avoid ;; this by loading them after evil-collection has first loaded... diff --git a/users/crumb/programs/emacs/modules/syd-keybinds.el b/users/crumb/programs/emacs/modules/syd-keybinds.el index b64a0f1..6fa3451 100755 --- a/users/crumb/programs/emacs/modules/syd-keybinds.el +++ b/users/crumb/programs/emacs/modules/syd-keybinds.el @@ -78,7 +78,9 @@ ;; Project (general-def :prefix-map 'syd-leader-project-map - "C" `("Compile project" . ,#'project-compile)) + "C" `("Compile project" . ,#'project-compile) + "&" `("Async cmd in project root" . ,#'project-async-shell-command) + "p" `("Switch project" . ,#'project-switch-project)) (general-def :prefix-map 'syd-leader-help-package-map diff --git a/users/crumb/programs/emacs/modules/syd-lang.el b/users/crumb/programs/emacs/modules/syd-lang.el index 0b30dac..8272299 100644 --- a/users/crumb/programs/emacs/modules/syd-lang.el +++ b/users/crumb/programs/emacs/modules/syd-lang.el @@ -2,6 +2,7 @@ (file-name-concat user-emacs-directory "modules" "lang")) (require 'syd-lang-emacs-lisp) +(require 'syd-lang-clojure) (require 'syd-lang-nix) (provide 'syd-lang) diff --git a/users/crumb/programs/emacs/modules/syd-projects.el b/users/crumb/programs/emacs/modules/syd-projects.el index 10775b7..fd9e3be 100755 --- a/users/crumb/programs/emacs/modules/syd-projects.el +++ b/users/crumb/programs/emacs/modules/syd-projects.el @@ -28,4 +28,29 @@ ;; `compile-multi-embark-command-map'. :config (projection-multi-embark-setup-command-map)) +(use-package skeletor + :commands (skeletor-create-project-at skeletor-create-project) + :custom ((skeletor-project-directory (expand-file-name "~/src")) + (skeletor-completing-read-function #'completing-read)) + :general (:keymaps 'syd-leader-project-map + "n" #'skeletor-create-project + "N" #'skeletor-create-project-at) + :config + (skeletor-define-template "clj-nix" + :substitutions + '(("__PROJECT-OWNER__" . (lambda () + (read-no-blanks-input "Project owner: ")))) + :before-git + (lambda (dir) + ;; Use underscores instead of hyphens in clj file names. + (let ((default-directory (file-name-concat dir "src"))) + (dolist (f (directory-files "." nil "-" t)) + (rename-file + f + (string-replace "-" "_" f)))) + ;; REVIEW: Is it safe to make this be async? We require that the command + ;; has finished before Git initialises. + (skeletor-shell-command "nix run github:jlesquembre/clj-nix#deps-lock" + dir)))) + (provide 'syd-projects) diff --git a/users/crumb/programs/emacs/modules/syd-tooling.el b/users/crumb/programs/emacs/modules/syd-tooling.el index fa7fda9..1898516 100644 --- a/users/crumb/programs/emacs/modules/syd-tooling.el +++ b/users/crumb/programs/emacs/modules/syd-tooling.el @@ -27,4 +27,11 @@ (set-popup-rule! (rx line-start "*lsp-" (or "help" "install")) :size 0.35 :quit t :select nil)) +(use-package envrc + ;; REVIEW: Can we load this any later/better? + :hook (on-first-file . envrc-global-mode) + :config + (set-popup-rule! (rx "*envrc*") + :quit t :ttl 0)) + (provide 'syd-tooling) diff --git a/users/crumb/programs/emacs/modules/syd-ui.el b/users/crumb/programs/emacs/modules/syd-ui.el index 87b8707..eaa9108 100755 --- a/users/crumb/programs/emacs/modules/syd-ui.el +++ b/users/crumb/programs/emacs/modules/syd-ui.el @@ -64,6 +64,10 @@ :custom ((display-line-numbers-type 'relative) ;; Always ask "y/n"; never "yes/no". (use-short-answers t) + ;; Scroll compilation buffer to follow output. + (compilation-scroll-output t) + ;; Allow `fit-window-to-buffer' to make horizontal adjustments. + (fit-window-to-buffer-horizontally t) ;; I don't like that `grep' asks me to save unsaved files. It makes ;; me think it's about to kill my buffers. (grep-save-buffers nil) @@ -161,6 +165,10 @@ for example when calling `shell'.") :quit t) ;; Required for :quit t to do anything. (evil-set-initial-state 'messages-buffer-mode 'motion) - (evil-set-initial-state 'debugger-mode 'normal))) + (evil-set-initial-state 'debugger-mode 'normal) + (set-popup-rule! shell-command-buffer-name-async + :slot -2 + :modeline nil + :ttl nil))) (provide 'syd-ui) diff --git a/users/crumb/programs/emacs/project-skeletons/clj-nix/.envrc b/users/crumb/programs/emacs/project-skeletons/clj-nix/.envrc new file mode 100644 index 0000000..3550a30 --- /dev/null +++ b/users/crumb/programs/emacs/project-skeletons/clj-nix/.envrc @@ -0,0 +1 @@ +use flake diff --git a/users/crumb/programs/emacs/project-skeletons/clj-nix/.gitignore b/users/crumb/programs/emacs/project-skeletons/clj-nix/.gitignore new file mode 100644 index 0000000..96ef0c9 --- /dev/null +++ b/users/crumb/programs/emacs/project-skeletons/clj-nix/.gitignore @@ -0,0 +1,11 @@ +result +.nrepl +.nrepl-port +.cpcache/ +.cache/ +.lsp/ +.clj-kondo +.cpcache +.lsp +.nrepl +.direnv/ diff --git a/users/crumb/programs/emacs/project-skeletons/clj-nix/bb.edn b/users/crumb/programs/emacs/project-skeletons/clj-nix/bb.edn new file mode 100644 index 0000000..9ce3b5e --- /dev/null +++ b/users/crumb/programs/emacs/project-skeletons/clj-nix/bb.edn @@ -0,0 +1,7 @@ +{:tasks + {:requires ([babashka.process :as p]) + update-lockfile + {:doc "Update the clj-nix lockfile" + :task (let [r (p/sh {:out :inherit :err :inherit} + "nix run github:jlesquembre/clj-nix#deps-lock")] + (System/exit (:exit r)))}}} diff --git a/users/crumb/programs/emacs/project-skeletons/clj-nix/deps.edn b/users/crumb/programs/emacs/project-skeletons/clj-nix/deps.edn new file mode 100644 index 0000000..8aaf83f --- /dev/null +++ b/users/crumb/programs/emacs/project-skeletons/clj-nix/deps.edn @@ -0,0 +1,9 @@ +{:deps {org.clojure/clojure {:mvn/version "1.12.0"}} + :paths ["src"] + :aliases + {:cider + {:extra-deps {cider/cider-nrepl {:mvn/version "0.50.2"}} + :main-opts ["-m" "nrepl.cmdline" + "--middleware" "[cider.nrepl/cider-middleware]"]} + :run + {:main-opts ["-m" "__PROJECT-NAME__.main"]}}} diff --git a/users/crumb/programs/emacs/project-skeletons/clj-nix/flake.nix b/users/crumb/programs/emacs/project-skeletons/clj-nix/flake.nix new file mode 100644 index 0000000..446d751 --- /dev/null +++ b/users/crumb/programs/emacs/project-skeletons/clj-nix/flake.nix @@ -0,0 +1,47 @@ +{ + inputs = { + nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable"; + flake-utils.url = "github:numtide/flake-utils"; + clj-nix.url = "github:jlesquembre/clj-nix"; + }; + + outputs = { self, ... }@inputs: + inputs.flake-utils.lib.eachDefaultSystem (system: + let pkgs = import inputs.nixpkgs { + inherit system; + overlays = [ + inputs.clj-nix.overlays.default + ]; + }; + in { + packages = rec { + __PROJECT-NAME__ = inputs.clj-nix.lib.mkCljApp { + pkgs = inputs.nixpkgs.legacyPackages.${system}; + modules = [ + { + name = "__PROJECT-OWNER__/__PROJECT-NAME__"; + version = "1.0.0"; + main-ns = "__PROJECT-NAME__.main"; + projectSrc = ./.; + + nativeImage = { + # Disable for faster build times. + enable = true; + }; + } + ]; + }; + + default = __PROJECT-NAME__; + }; + + devShells.default = pkgs.mkShell { + packages = with pkgs; [ + clojure-lsp + cljfmt + clojure + babashka + ]; + }; + }); +} diff --git a/users/crumb/programs/emacs/project-skeletons/clj-nix/src/__PROJECT-NAME__/main.clj b/users/crumb/programs/emacs/project-skeletons/clj-nix/src/__PROJECT-NAME__/main.clj new file mode 100644 index 0000000..72d6bd8 --- /dev/null +++ b/users/crumb/programs/emacs/project-skeletons/clj-nix/src/__PROJECT-NAME__/main.clj @@ -0,0 +1,5 @@ +(ns __PROJECT-NAME__.main + (:gen-class)) + +(defn -main [& args] + (println "🦭!")) \ No newline at end of file