2017-03-20 19:41:37 +00:00
|
|
|
---
|
|
|
|
title: Rust
|
|
|
|
author: Matthias Beyer
|
|
|
|
date: 2017-03-05
|
|
|
|
---
|
|
|
|
|
2019-10-20 11:17:58 +01:00
|
|
|
# Rust
|
2017-03-20 19:41:37 +00:00
|
|
|
|
|
|
|
To install the rust compiler and cargo put
|
|
|
|
|
|
|
|
```
|
2017-11-24 06:12:02 +00:00
|
|
|
rustc
|
|
|
|
cargo
|
2017-03-20 19:41:37 +00:00
|
|
|
```
|
|
|
|
|
2017-08-05 15:38:48 +01:00
|
|
|
into the `environment.systemPackages` or bring them into
|
2017-11-24 06:12:02 +00:00
|
|
|
scope with `nix-shell -p rustc cargo`.
|
2017-03-20 19:41:37 +00:00
|
|
|
|
2017-08-05 15:38:48 +01:00
|
|
|
For daily builds (beta and nightly) use either rustup from
|
|
|
|
nixpkgs or use the [Rust nightlies
|
|
|
|
overlay](#using-the-rust-nightlies-overlay).
|
2017-03-20 19:41:37 +00:00
|
|
|
|
2017-12-12 10:55:15 +00:00
|
|
|
## Compiling Rust applications with Cargo
|
2017-03-20 19:41:37 +00:00
|
|
|
|
|
|
|
Rust applications are packaged by using the `buildRustPackage` helper from `rustPlatform`:
|
|
|
|
|
|
|
|
```
|
2017-11-17 07:26:51 +00:00
|
|
|
rustPlatform.buildRustPackage rec {
|
2020-01-12 17:19:57 +00:00
|
|
|
pname = "ripgrep";
|
|
|
|
version = "11.0.2";
|
2017-03-20 19:41:37 +00:00
|
|
|
|
|
|
|
src = fetchFromGitHub {
|
|
|
|
owner = "BurntSushi";
|
2020-01-12 17:19:57 +00:00
|
|
|
repo = pname;
|
|
|
|
rev = version;
|
|
|
|
sha256 = "1iga3320mgi7m853la55xip514a3chqsdi1a1rwv25lr9b1p7vd3";
|
2017-03-20 19:41:37 +00:00
|
|
|
};
|
|
|
|
|
2020-01-12 17:19:57 +00:00
|
|
|
cargoSha256 = "17ldqr3asrdcsh4l29m3b5r37r5d0b3npq1lrgjmxb6vlx6a36qh";
|
2017-03-20 19:41:37 +00:00
|
|
|
|
|
|
|
meta = with stdenv.lib; {
|
2017-11-17 07:26:51 +00:00
|
|
|
description = "A fast line-oriented regex search tool, similar to ag and ack";
|
2020-02-16 16:31:03 +00:00
|
|
|
homepage = "https://github.com/BurntSushi/ripgrep";
|
2017-11-17 07:26:51 +00:00
|
|
|
license = licenses.unlicense;
|
2017-03-20 19:41:37 +00:00
|
|
|
maintainers = [ maintainers.tailhook ];
|
|
|
|
};
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2017-08-05 15:38:48 +01:00
|
|
|
`buildRustPackage` requires a `cargoSha256` attribute which is computed over
|
2017-03-20 19:41:37 +00:00
|
|
|
all crate sources of this package. Currently it is obtained by inserting a
|
|
|
|
fake checksum into the expression and building the package once. The correct
|
|
|
|
checksum can be then take from the failed build.
|
|
|
|
|
2020-02-16 07:33:02 +00:00
|
|
|
Per the instructions in the [Cargo Book](https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html)
|
|
|
|
best practices guide, Rust applications should always commit the `Cargo.lock`
|
|
|
|
file in git to ensure a reproducible build. However, a few packages do not, and
|
|
|
|
Nix depends on this file, so if it missing you can use `cargoPatches` to apply
|
|
|
|
it in the `patchPhase`. Consider sending a PR upstream with a note to the
|
|
|
|
maintainer describing why it's important to include in the application.
|
2018-08-14 03:20:30 +01:00
|
|
|
|
2020-03-19 00:43:07 +00:00
|
|
|
The fetcher will verify that the `Cargo.lock` file is in sync with the `src`
|
|
|
|
attribute, and fail the build if not. It will also will compress the vendor
|
|
|
|
directory into a tar.gz archive.
|
2019-08-24 13:29:47 +01:00
|
|
|
|
2019-11-01 14:19:39 +00:00
|
|
|
### Building a crate for a different target
|
|
|
|
|
|
|
|
To build your crate with a different cargo `--target` simply specify the `target` attribute:
|
|
|
|
|
|
|
|
```nix
|
|
|
|
pkgs.rustPlatform.buildRustPackage {
|
|
|
|
(...)
|
|
|
|
target = "x86_64-fortanix-unknown-sgx";
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2020-05-24 17:37:34 +01:00
|
|
|
### Running package tests
|
|
|
|
|
|
|
|
When using `buildRustPackage`, the `checkPhase` is enabled by default and runs
|
|
|
|
`cargo test` on the package to build. To make sure that we don't compile the
|
2020-07-31 06:06:53 +01:00
|
|
|
sources twice and to actually test the artifacts that will be used at runtime,
|
2020-05-31 19:47:32 +01:00
|
|
|
the tests will be ran in the `release` mode by default.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
|
|
|
However, in some cases the test-suite of a package doesn't work properly in the
|
2020-05-31 19:47:32 +01:00
|
|
|
`release` mode. For these situations, the mode for `checkPhase` can be changed like
|
|
|
|
so:
|
2020-05-24 17:37:34 +01:00
|
|
|
|
|
|
|
```nix
|
|
|
|
rustPlatform.buildRustPackage {
|
|
|
|
/* ... */
|
|
|
|
checkType = "debug";
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
Please note that the code will be compiled twice here: once in `release` mode
|
|
|
|
for the `buildPhase`, and again in `debug` mode for the `checkPhase`.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
#### Tests relying on the structure of the `target/` directory
|
|
|
|
|
|
|
|
Some tests may rely on the structure of the `target/` directory. Those tests
|
|
|
|
are likely to fail because we use `cargo --target` during the build. This means that
|
2020-05-24 17:37:34 +01:00
|
|
|
the artifacts
|
2020-05-31 19:47:32 +01:00
|
|
|
[are stored in `target/<architecture>/release/`](https://doc.rust-lang.org/cargo/guide/build-cache.html),
|
|
|
|
rather than in `target/release/`.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
This can only be worked around by patching the affected tests accordingly.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
|
|
|
#### Disabling package-tests
|
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
In some instances, it may be necessary to disable testing altogether (with `doCheck = false;`):
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
* If no tests exist -- the `checkPhase` should be explicitly disabled to skip
|
|
|
|
unnecessary build steps to speed up the build.
|
|
|
|
* If tests are highly impure (e.g. due to network usage).
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
There will obviously be some corner-cases not listed above where it's sensible to disable tests.
|
|
|
|
The above are just guidelines, and exceptions may be granted on a case-by-case basis.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
However, please check if it's possible to disable a problematic subset of the
|
|
|
|
test suite and leave a comment explaining your reasoning.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
### Building a package in `debug` mode
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
By default, `buildRustPackage` will use `release` mode for builds. If a package
|
|
|
|
should be built in `debug` mode, it can be configured like so:
|
2020-05-24 17:37:34 +01:00
|
|
|
|
|
|
|
```nix
|
|
|
|
rustPlatform.buildRustPackage {
|
|
|
|
/* ... */
|
|
|
|
buildType = "debug";
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
In this scenario, the `checkPhase` will be ran in `debug` mode as well.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
|
|
|
### Custom `build`/`install`-procedures
|
|
|
|
|
|
|
|
Some packages may use custom scripts for building/installing, e.g. with a `Makefile`.
|
2020-05-31 19:47:32 +01:00
|
|
|
In these cases, it's recommended to override the `buildPhase`/`installPhase`/`checkPhase`.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-05-31 19:47:32 +01:00
|
|
|
Otherwise, some steps may fail because of the modified directory structure of `target/`.
|
2020-05-24 17:37:34 +01:00
|
|
|
|
2020-06-05 08:10:53 +01:00
|
|
|
### Building a crate with an absent or out-of-date Cargo.lock file
|
|
|
|
|
|
|
|
`buildRustPackage` needs a `Cargo.lock` file to get all dependencies in the
|
|
|
|
source code in a reproducible way. If it is missing or out-of-date one can use
|
|
|
|
the `cargoPatches` attribute to update or add it.
|
|
|
|
|
|
|
|
```
|
|
|
|
{ lib, rustPlatform, fetchFromGitHub }:
|
|
|
|
|
|
|
|
rustPlatform.buildRustPackage rec {
|
|
|
|
(...)
|
|
|
|
cargoPatches = [
|
|
|
|
# a patch file to add/update Cargo.lock in the source code
|
|
|
|
./add-Cargo.lock.patch
|
|
|
|
];
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2017-12-12 10:55:15 +00:00
|
|
|
## Compiling Rust crates using Nix instead of Cargo
|
|
|
|
|
2018-02-20 07:55:04 +00:00
|
|
|
### Simple operation
|
|
|
|
|
2017-12-12 10:55:15 +00:00
|
|
|
When run, `cargo build` produces a file called `Cargo.lock`,
|
|
|
|
containing pinned versions of all dependencies. Nixpkgs contains a
|
|
|
|
tool called `carnix` (`nix-env -iA nixos.carnix`), which can be used
|
|
|
|
to turn a `Cargo.lock` into a Nix expression.
|
|
|
|
|
|
|
|
That Nix expression calls `rustc` directly (hence bypassing Cargo),
|
|
|
|
and can be used to compile a crate and all its dependencies. Here is
|
|
|
|
an example for a minimal `hello` crate:
|
|
|
|
|
|
|
|
|
|
|
|
$ cargo new hello
|
|
|
|
$ cd hello
|
|
|
|
$ cargo build
|
|
|
|
Compiling hello v0.1.0 (file:///tmp/hello)
|
|
|
|
Finished dev [unoptimized + debuginfo] target(s) in 0.20 secs
|
|
|
|
$ carnix -o hello.nix --src ./. Cargo.lock --standalone
|
2018-03-28 02:07:19 +01:00
|
|
|
$ nix-build hello.nix -A hello_0_1_0
|
2017-12-12 10:55:15 +00:00
|
|
|
|
|
|
|
Now, the file produced by the call to `carnix`, called `hello.nix`, looks like:
|
|
|
|
|
|
|
|
```
|
2018-01-28 19:29:09 +00:00
|
|
|
# Generated by carnix 0.6.5: carnix -o hello.nix --src ./. Cargo.lock --standalone
|
2018-08-20 19:43:41 +01:00
|
|
|
{ lib, stdenv, buildRustCrate, fetchgit }:
|
|
|
|
let kernel = stdenv.buildPlatform.parsed.kernel.name;
|
2017-12-12 10:55:15 +00:00
|
|
|
# ... (content skipped)
|
|
|
|
in
|
|
|
|
rec {
|
2018-01-28 19:29:09 +00:00
|
|
|
hello = f: hello_0_1_0 { features = hello_0_1_0_features { hello_0_1_0 = f; }; };
|
|
|
|
hello_0_1_0_ = { dependencies?[], buildDependencies?[], features?[] }: buildRustCrate {
|
|
|
|
crateName = "hello";
|
|
|
|
version = "0.1.0";
|
|
|
|
authors = [ "pe@pijul.org <pe@pijul.org>" ];
|
|
|
|
src = ./.;
|
|
|
|
inherit dependencies buildDependencies features;
|
|
|
|
};
|
|
|
|
hello_0_1_0 = { features?(hello_0_1_0_features {}) }: hello_0_1_0_ {};
|
|
|
|
hello_0_1_0_features = f: updateFeatures f (rec {
|
|
|
|
hello_0_1_0.default = (f.hello_0_1_0.default or true);
|
|
|
|
}) [ ];
|
2017-12-12 10:55:15 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
In particular, note that the argument given as `--src` is copied
|
|
|
|
verbatim to the source. If we look at a more complicated
|
|
|
|
dependencies, for instance by adding a single line `libc="*"` to our
|
|
|
|
`Cargo.toml`, we first need to run `cargo build` to update the
|
|
|
|
`Cargo.lock`. Then, `carnix` needs to be run again, and produces the
|
|
|
|
following nix file:
|
|
|
|
|
|
|
|
```
|
2018-01-28 19:29:09 +00:00
|
|
|
# Generated by carnix 0.6.5: carnix -o hello.nix --src ./. Cargo.lock --standalone
|
2018-08-20 19:43:41 +01:00
|
|
|
{ lib, stdenv, buildRustCrate, fetchgit }:
|
|
|
|
let kernel = stdenv.buildPlatform.parsed.kernel.name;
|
2017-12-12 10:55:15 +00:00
|
|
|
# ... (content skipped)
|
|
|
|
in
|
|
|
|
rec {
|
2018-01-28 19:29:09 +00:00
|
|
|
hello = f: hello_0_1_0 { features = hello_0_1_0_features { hello_0_1_0 = f; }; };
|
|
|
|
hello_0_1_0_ = { dependencies?[], buildDependencies?[], features?[] }: buildRustCrate {
|
|
|
|
crateName = "hello";
|
|
|
|
version = "0.1.0";
|
|
|
|
authors = [ "pe@pijul.org <pe@pijul.org>" ];
|
|
|
|
src = ./.;
|
|
|
|
inherit dependencies buildDependencies features;
|
|
|
|
};
|
|
|
|
libc_0_2_36_ = { dependencies?[], buildDependencies?[], features?[] }: buildRustCrate {
|
|
|
|
crateName = "libc";
|
|
|
|
version = "0.2.36";
|
|
|
|
authors = [ "The Rust Project Developers" ];
|
|
|
|
sha256 = "01633h4yfqm0s302fm0dlba469bx8y6cs4nqc8bqrmjqxfxn515l";
|
|
|
|
inherit dependencies buildDependencies features;
|
2017-12-12 10:55:15 +00:00
|
|
|
};
|
2018-01-28 19:29:09 +00:00
|
|
|
hello_0_1_0 = { features?(hello_0_1_0_features {}) }: hello_0_1_0_ {
|
|
|
|
dependencies = mapFeatures features ([ libc_0_2_36 ]);
|
2017-12-12 10:55:15 +00:00
|
|
|
};
|
2018-01-28 19:29:09 +00:00
|
|
|
hello_0_1_0_features = f: updateFeatures f (rec {
|
|
|
|
hello_0_1_0.default = (f.hello_0_1_0.default or true);
|
|
|
|
libc_0_2_36.default = true;
|
|
|
|
}) [ libc_0_2_36_features ];
|
|
|
|
libc_0_2_36 = { features?(libc_0_2_36_features {}) }: libc_0_2_36_ {
|
|
|
|
features = mkFeatures (features.libc_0_2_36 or {});
|
|
|
|
};
|
|
|
|
libc_0_2_36_features = f: updateFeatures f (rec {
|
|
|
|
libc_0_2_36.default = (f.libc_0_2_36.default or true);
|
|
|
|
libc_0_2_36.use_std =
|
|
|
|
(f.libc_0_2_36.use_std or false) ||
|
|
|
|
(f.libc_0_2_36.default or false) ||
|
|
|
|
(libc_0_2_36.default or false);
|
|
|
|
}) [];
|
2017-12-12 10:55:15 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Here, the `libc` crate has no `src` attribute, so `buildRustCrate`
|
|
|
|
will fetch it from [crates.io](https://crates.io). A `sha256`
|
|
|
|
attribute is still needed for Nix purity.
|
|
|
|
|
2018-02-20 07:55:04 +00:00
|
|
|
### Handling external dependencies
|
|
|
|
|
2017-12-12 10:55:15 +00:00
|
|
|
Some crates require external libraries. For crates from
|
|
|
|
[crates.io](https://crates.io), such libraries can be specified in
|
|
|
|
`defaultCrateOverrides` package in nixpkgs itself.
|
|
|
|
|
|
|
|
Starting from that file, one can add more overrides, to add features
|
|
|
|
or build inputs by overriding the hello crate in a seperate file.
|
|
|
|
|
|
|
|
```
|
|
|
|
with import <nixpkgs> {};
|
2018-01-28 19:29:09 +00:00
|
|
|
((import ./hello.nix).hello {}).override {
|
2017-12-12 10:55:15 +00:00
|
|
|
crateOverrides = defaultCrateOverrides // {
|
|
|
|
hello = attrs: { buildInputs = [ openssl ]; };
|
|
|
|
};
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Here, `crateOverrides` is expected to be a attribute set, where the
|
|
|
|
key is the crate name without version number and the value a function.
|
|
|
|
The function gets all attributes passed to `buildRustCrate` as first
|
|
|
|
argument and returns a set that contains all attribute that should be
|
|
|
|
overwritten.
|
|
|
|
|
|
|
|
For more complicated cases, such as when parts of the crate's
|
2019-11-09 09:07:59 +00:00
|
|
|
derivation depend on the crate's version, the `attrs` argument of
|
2017-12-12 10:55:15 +00:00
|
|
|
the override above can be read, as in the following example, which
|
|
|
|
patches the derivation:
|
|
|
|
|
|
|
|
```
|
|
|
|
with import <nixpkgs> {};
|
2018-01-28 19:29:09 +00:00
|
|
|
((import ./hello.nix).hello {}).override {
|
2017-12-12 10:55:15 +00:00
|
|
|
crateOverrides = defaultCrateOverrides // {
|
|
|
|
hello = attrs: lib.optionalAttrs (lib.versionAtLeast attrs.version "1.0") {
|
|
|
|
postPatch = ''
|
|
|
|
substituteInPlace lib/zoneinfo.rs \
|
|
|
|
--replace "/usr/share/zoneinfo" "${tzdata}/share/zoneinfo"
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Another situation is when we want to override a nested
|
|
|
|
dependency. This actually works in the exact same way, since the
|
|
|
|
`crateOverrides` parameter is forwarded to the crate's
|
|
|
|
dependencies. For instance, to override the build inputs for crate
|
|
|
|
`libc` in the example above, where `libc` is a dependency of the main
|
|
|
|
crate, we could do:
|
|
|
|
|
|
|
|
```
|
|
|
|
with import <nixpkgs> {};
|
2018-01-28 19:29:09 +00:00
|
|
|
((import hello.nix).hello {}).override {
|
2017-12-12 10:55:15 +00:00
|
|
|
crateOverrides = defaultCrateOverrides // {
|
|
|
|
libc = attrs: { buildInputs = []; };
|
|
|
|
};
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2018-02-20 07:55:04 +00:00
|
|
|
### Options and phases configuration
|
|
|
|
|
|
|
|
Actually, the overrides introduced in the previous section are more
|
|
|
|
general. A number of other parameters can be overridden:
|
2017-12-12 10:55:15 +00:00
|
|
|
|
|
|
|
- The version of rustc used to compile the crate:
|
|
|
|
|
|
|
|
```
|
2018-01-28 19:29:09 +00:00
|
|
|
(hello {}).override { rust = pkgs.rust; };
|
2017-12-12 10:55:15 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
- Whether to build in release mode or debug mode (release mode by
|
|
|
|
default):
|
|
|
|
|
|
|
|
```
|
2018-01-28 19:29:09 +00:00
|
|
|
(hello {}).override { release = false; };
|
2017-12-12 10:55:15 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
- Whether to print the commands sent to rustc when building
|
|
|
|
(equivalent to `--verbose` in cargo:
|
|
|
|
|
|
|
|
```
|
2018-01-28 19:29:09 +00:00
|
|
|
(hello {}).override { verbose = false; };
|
2017-12-12 10:55:15 +00:00
|
|
|
```
|
|
|
|
|
2018-02-20 07:55:04 +00:00
|
|
|
- Extra arguments to be passed to `rustc`:
|
|
|
|
|
|
|
|
```
|
|
|
|
(hello {}).override { extraRustcOpts = "-Z debuginfo=2"; };
|
|
|
|
```
|
|
|
|
|
|
|
|
- Phases, just like in any other derivation, can be specified using
|
|
|
|
the following attributes: `preUnpack`, `postUnpack`, `prePatch`,
|
|
|
|
`patches`, `postPatch`, `preConfigure` (in the case of a Rust crate,
|
|
|
|
this is run before calling the "build" script), `postConfigure`
|
|
|
|
(after the "build" script),`preBuild`, `postBuild`, `preInstall` and
|
|
|
|
`postInstall`. As an example, here is how to create a new module
|
|
|
|
before running the build script:
|
|
|
|
|
|
|
|
```
|
|
|
|
(hello {}).override {
|
|
|
|
preConfigure = ''
|
|
|
|
echo "pub const PATH=\"${hi.out}\";" >> src/path.rs"
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
```
|
|
|
|
|
|
|
|
### Features
|
|
|
|
|
2018-01-28 19:29:09 +00:00
|
|
|
One can also supply features switches. For example, if we want to
|
|
|
|
compile `diesel_cli` only with the `postgres` feature, and no default
|
|
|
|
features, we would write:
|
|
|
|
|
|
|
|
```
|
|
|
|
(callPackage ./diesel.nix {}).diesel {
|
|
|
|
default = false;
|
|
|
|
postgres = true;
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2018-02-20 07:55:04 +00:00
|
|
|
Where `diesel.nix` is the file generated by Carnix, as explained above.
|
2017-12-12 10:55:15 +00:00
|
|
|
|
2018-03-28 02:07:19 +01:00
|
|
|
|
|
|
|
## Setting Up `nix-shell`
|
|
|
|
Oftentimes you want to develop code from within `nix-shell`. Unfortunately
|
|
|
|
`buildRustCrate` does not support common `nix-shell` operations directly
|
|
|
|
(see [this issue](https://github.com/NixOS/nixpkgs/issues/37945))
|
|
|
|
so we will use `stdenv.mkDerivation` instead.
|
|
|
|
|
|
|
|
Using the example `hello` project above, we want to do the following:
|
|
|
|
- Have access to `cargo` and `rustc`
|
|
|
|
- Have the `openssl` library available to a crate through it's _normal_
|
|
|
|
compilation mechanism (`pkg-config`).
|
|
|
|
|
|
|
|
A typical `shell.nix` might look like:
|
|
|
|
|
|
|
|
```
|
|
|
|
with import <nixpkgs> {};
|
|
|
|
|
|
|
|
stdenv.mkDerivation {
|
|
|
|
name = "rust-env";
|
2018-12-13 07:05:30 +00:00
|
|
|
nativeBuildInputs = [
|
2018-03-28 02:07:19 +01:00
|
|
|
rustc cargo
|
|
|
|
|
2018-12-13 07:05:30 +00:00
|
|
|
# Example Build-time Additional Dependencies
|
|
|
|
pkgconfig
|
|
|
|
];
|
|
|
|
buildInputs = [
|
|
|
|
# Example Run-time Additional Dependencies
|
|
|
|
openssl
|
2018-03-28 02:07:19 +01:00
|
|
|
];
|
|
|
|
|
|
|
|
# Set Environment Variables
|
|
|
|
RUST_BACKTRACE = 1;
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
You should now be able to run the following:
|
|
|
|
```
|
|
|
|
$ nix-shell --pure
|
|
|
|
$ cargo build
|
|
|
|
$ cargo test
|
|
|
|
```
|
|
|
|
|
|
|
|
### Controlling Rust Version Inside `nix-shell`
|
|
|
|
To control your rust version (i.e. use nightly) from within `shell.nix` (or
|
|
|
|
other nix expressions) you can use the following `shell.nix`
|
|
|
|
|
|
|
|
```
|
|
|
|
# Latest Nightly
|
|
|
|
with import <nixpkgs> {};
|
|
|
|
let src = fetchFromGitHub {
|
|
|
|
owner = "mozilla";
|
|
|
|
repo = "nixpkgs-mozilla";
|
2019-06-08 15:15:32 +01:00
|
|
|
# commit from: 2019-05-15
|
|
|
|
rev = "9f35c4b09fd44a77227e79ff0c1b4b6a69dff533";
|
|
|
|
sha256 = "18h0nvh55b5an4gmlgfbvwbyqj91bklf1zymis6lbdh75571qaz0";
|
2018-03-28 02:07:19 +01:00
|
|
|
};
|
|
|
|
in
|
|
|
|
with import "${src.out}/rust-overlay.nix" pkgs pkgs;
|
|
|
|
stdenv.mkDerivation {
|
|
|
|
name = "rust-env";
|
|
|
|
buildInputs = [
|
|
|
|
# Note: to use use stable, just replace `nightly` with `stable`
|
|
|
|
latest.rustChannels.nightly.rust
|
|
|
|
|
|
|
|
# Add some extra dependencies from `pkgs`
|
|
|
|
pkgconfig openssl
|
|
|
|
];
|
|
|
|
|
|
|
|
# Set Environment Variables
|
|
|
|
RUST_BACKTRACE = 1;
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Now run:
|
|
|
|
```
|
|
|
|
$ rustc --version
|
|
|
|
rustc 1.26.0-nightly (188e693b3 2018-03-26)
|
|
|
|
```
|
|
|
|
|
|
|
|
To see that you are using nightly.
|
|
|
|
|
|
|
|
|
2017-03-20 19:41:37 +00:00
|
|
|
## Using the Rust nightlies overlay
|
|
|
|
|
|
|
|
Mozilla provides an overlay for nixpkgs to bring a nightly version of Rust into scope.
|
|
|
|
This overlay can _also_ be used to install recent unstable or stable versions
|
|
|
|
of Rust, if desired.
|
|
|
|
|
|
|
|
To use this overlay, clone
|
|
|
|
[nixpkgs-mozilla](https://github.com/mozilla/nixpkgs-mozilla),
|
|
|
|
and create a symbolic link to the file
|
|
|
|
[rust-overlay.nix](https://github.com/mozilla/nixpkgs-mozilla/blob/master/rust-overlay.nix)
|
|
|
|
in the `~/.config/nixpkgs/overlays` directory.
|
|
|
|
|
|
|
|
$ git clone https://github.com/mozilla/nixpkgs-mozilla.git
|
2017-03-20 19:59:43 +00:00
|
|
|
$ mkdir -p ~/.config/nixpkgs/overlays
|
2017-03-20 19:41:37 +00:00
|
|
|
$ ln -s $(pwd)/nixpkgs-mozilla/rust-overlay.nix ~/.config/nixpkgs/overlays/rust-overlay.nix
|
|
|
|
|
|
|
|
The latest version can be installed with the following command:
|
|
|
|
|
2017-08-05 15:38:48 +01:00
|
|
|
$ nix-env -Ai nixos.latest.rustChannels.stable.rust
|
2017-03-20 19:41:37 +00:00
|
|
|
|
|
|
|
Or using the attribute with nix-shell:
|
|
|
|
|
2017-08-05 15:38:48 +01:00
|
|
|
$ nix-shell -p nixos.latest.rustChannels.stable.rust
|
2017-03-20 19:41:37 +00:00
|
|
|
|
|
|
|
To install the beta or nightly channel, "stable" should be substituted by
|
|
|
|
"nightly" or "beta", or
|
|
|
|
use the function provided by this overlay to pull a version based on a
|
|
|
|
build date.
|
|
|
|
|
|
|
|
The overlay automatically updates itself as it uses the same source as
|
|
|
|
[rustup](https://www.rustup.rs/).
|