Merge of haskell-with-nixpkgs back into HNix (#681)

There were 668 commits which got squashed:

* CI: Travis: env: global: rev: upd: note for haskell-update branch

M  .travis.yml

* CI: Travis: build.sh: BUILD_PROJECT: *Optparse*Completion: upd: directional note

M  build.sh

* Travis: Add CI job with linux and GHC-8.4.4 (#603)

GHC 8.4 is still widely used, so it's good to check compatibility
with it.

* Fix CI builds on internal branches (#604)

* CI: Travis: rm cache | Builds 2X times faster without Travis cache

M  .travis.yml

* CI: Travis: build.sh: mv `set` declaration | fx master CI statuses

M  .travis.yml
M  build.sh

* default.nix: make GHC 8.8.3 default

M  default.nix

* default.nix: rm allowUnfree - there is none

M  default.nix

* default.nix: add haskell.lib profiling options explicitly

Integrates with CI.

M  default.nix

* default.nix: add flags {doCheck,doHaddock,doCoverage}

M  default.nix

* CI: Travis: build.sh: init CACHIX_SIGNING_KEY with default empty value

Due to new strict `set` rules `if` statement check agains empty variable was
failing the build, this fixes builds in PRs.

...sigh.

M  build.sh

* default.nix: expose more features of `haskell.lib` API

M  default.nix

* default.nix: add docs to the exposed haskell.lib options

M  default.nix

* CI: build.sh: rm empty args from nix-build

M  build.sh

* CI: build.sh: update Nix after its installation

Nix that installs through Nix installer is 2.0.4.
Current Nix release is 2.3.5.

To to have a less of old bugs, and more of new bugs - Nix after installation
needs an update right away.

Old Nix literally prevented importing Nix channels on Linux Nix installations.

M  build.sh

* default.nix: to allow use of current channels remove hash guarding

M  default.nix

* default.nix: set `rev` default to `nixpkgs-unstable`

M  default.nix

* default.nix: for import form separate explicit override set

M  default.nix

* default.nix: add if useRev - then use rev, else use <nixpkgs>

M  default.nix

* CI: build.sh: MAIN: add the channel update

M  build.sh

* default.nix: default enableDeadCodeElimination to false | GHC macOS build bug

M  default.nix

* default.nix: off enableSharedExecutables | rare feature, not passes macOS tests

This feature seems to enable binaries as also a dynamic library, with is a rare
and largely unknown feature, and it not used. Since it is unexpected optional
rare not standard feature - turn it off by default.

M  default.nix

* default.nix: expose additional part of Nixpkgs haskell.lib API

M  default.nix

* default.nix: m doc upd

M  default.nix

* default.nix: upd docs for Header.lib args in headers, sort

Providing docs to them and sort them roughly in order of their application/stage

M  default.nix

* default.nix: abstract the developPackage into value

M  default.nix

* default.nix: package: sort inherited Haskell.lib args, provide doc

M  default.nix

* default.nix: add option enableSeparateBinOutput

M  default.nix

* default.nix: allow apply composition over the package

M  default.nix

* default.nix: allow apply composition over the package

M  default.nix

* default.nix: expose functionality: sdistTarball; add doc

M  default.nix

* default.nix: expose functionality: buildFromSdist; add doc

M  default.nix

* default.nix: expose functionality: failOnAllWarnings; add doc

M  default.nix

* default.nix: expose functionality: buildStrictly; add doc

M  default.nix

* default.nix: expose functionality: disableOptimization; add doc

M  default.nix

* default.nix: expose functionality: linkWithGold; add doc

M  default.nix

* default.nix: expose functionality: enableDWARFDebugging; add doc

M  default.nix

* default.nix: expose functionality: doJailbreak

Argument was already exposed in the header

M  default.nix

* default.nix: expose functionality: doStrip

Argument and doc was already provided in the header

M  default.nix

* default.nix: expose functionality: justStaticExecutables

Argument and doc was already provided in the header.

M  default.nix

* default.nix: expose functionality: checkUnusedPackages; provide doc

M  default.nix

* default.nix: expose functionality: gen*Optparse*Completion; provide doc

M  default.nix

* default.nix: expose functionality: doHyperlinkSource; provide doc

M  default.nix

* default.nix: rm doStrict (superceeded by failOnAllWarnings)

M  default.nix

* default.nix: rm doOptimize (superceeded by disableOptimizations)

M  default.nix

* default.nix: doc: add to header args

M  default.nix

* default.nix: doc: add to body (functions fold and composePackage)

M  default.nix

* default.nix: doc: add beginning doc and link to lib for more info on options

M  default.nix

* CI: Travis: add Nix packages upd

M  .travis.yml

* CI: Travis: fix Cachix nix-env install rights menegement

The Cachix suddenly started to fall with:

```
$ nix-env -iA cachix -f https://cachix.org/api/v1/install

error: creating directory '/Users/travis/.cache/nix/tarballs': Permission denied

The command "nix-env -iA cachix -f https://cachix.org/api/v1/install" exited with 1.
```

There are changes to macOS procedures, Nix updated to 2.2, and Cachix has big
upstream changes for macOS processes.

So fixing rights management in this way.

M  .travis.yml

* CI: Travis: rm sleep 2 - redundant

Anyway it takes 30s-1m to the nix-build.

M  .travis.yml

* CI: Travis: add HACK to fix reload Nix-daemon after Nix update 2.0 -> 2.2

M  .travis.yml

* CI: Travis: explicitly state the builds

M  .travis.yml

* CI: Travis: env: rm jobs matrix

M  .travis.yml

* CI: Travis: rm `os:` and `dist:`, since they are explicitly put below

M  .travis.yml

* CI: Travis: enable strict build in GHC 8.6.5

M  .travis.yml

* CI: Travis: upd explicit build names

M  .travis.yml

* CI: Travis: make GHC 8.10 mandatory

M  .travis.yml

* CI: Travis: move SDist check to GHC 8.10

M  .travis.yml

* CI: .travis.tml: clean-up

Since conf no longer multiplies rows into matrix, but provides it explitly,
exclusions not needed.

M  .travis.yml

* CI: make generate*Complettions work and accept a list of executables

M  .travis.yml
M  build.sh
M  default.nix

* CI: rm buildStackProject, it does not work that way, and better to use real stack

M  .travis.yml
M  build.sh

* default.nix: clean-up docs

M  default.nix

* build.sh: default to GHC 8.10

M  build.sh

* build.sh: sort the options into logical order

M  build.sh

* build.sh: provide docs to options

M  build.sh

* build.sh: add disclamer for options

M  build.sh

* build.sh: add more options and their docs

M  build.sh

* build.sh: add new options into the build commands

M  build.sh

* CI: .travis.yml: use linkWithGold in Linux builds, a bit faster builds

M  .travis.yml

* CI: .travis.yml: GHC 8.10: add Haddock, optimize, Benchmark, Shell Complettions

M  .travis.yml

* build.sh: rm `pkgName` (not used), return `name` - used by Cachix

M  build.sh

* Silence redundant import warnings for Control.Monad.Fail (#633)

Also address mysterious redundant import warnings in the testsuite

This allows us to enable `buildStrictly=true` for GHC 8.8.

Fixes #613.

* default.nix: clean-up no longer relevant commented-out code

buildInputs populated automatically.

Environment overloads we can do any time, no need to keep trivial code
commented.

There is no AWS S3 use. If we would need we would write new deployment
implementation  outside of `default.nix` using actual NixOps.

* CI: .travis.yml: rm Strict from GHC 8.6.5

M  .travis.yml

* CI: .travis.yml: properly name GHC 8.8.3 macOS as Strict

M  .travis.yml

* CI: .travis.yml: add explicit quotes

M  .travis.yml

* CI: .travis.yml: add description to the channels

M  .travis.yml

* CI: .travis.yml: add description for executableNamesToShellComplete

M  .travis.yml

* default.nix: filter package root with nix-gitignore

so we don't copy stuff like `dist-newstyle`.

* CI: .travis.yml: add the disclaimer

M  .travis.yml

* CI: mv rev doc (.travis.yml->build.sh)

M  .travis.yml
M  build.sh

* CI: build.sh: upd disclaimer

M  build.sh

* CI: build.sh: add setting section disclaimer

M  build.sh

* CI: build.sh: upd NIX_PATH doc

M  .travis.yml
M  build.sh

* CI: .travis.yml: reduce not used pkgName

getOptParseApplicativeComplettions does not need it

M  .travis.yml

* CI: {.travis.yml,build.sh}: rename (name->project) more unique and descriptive

M  .travis.yml
M  build.sh

* CI: {.travis.yml,build.sh}: merge documentation into buildh.sh

M  .travis.yml
M  build.sh

* CI: .travis.yml: rm NOTEs from less important explanations

M  .travis.yml

* CI: .travis.yml: {add,set,sort} features from `build.sh` explicitly

M  .travis.yml

* CI: build.sh: mv doHyperlinkSource into logical place

M  build.sh

* CI: .travis.yml: upd the disclaimer

M  .travis.yml

* CI: .travis.yml: rm ALL_TESTS, since it does not work for nix-build

and also just plainly does not passes itself, so it is useless in CI build setup

M  .travis.yml

* CI: .travis.yml: upd CACHIX_SIGNING_KEY explanation

M  .travis.yml

* CI: .travis.yml: GHC 8.10: add Haddock and sources hyperlinking

M  .travis.yml

* CI: {.travis.yml,build.sh}: rename (GHCVERSION->compiler)

M  .travis.yml
M  build.sh

* CI: default.nix: add `compiler` explanation

M  default.nix

* CI: {.travis.yml,build.sh}: upd: make conf work with new Nix installer

M  .travis.yml
M  build.sh

* CI: .travis.yml: rm irrelevant remount

M  .travis.yml

* CI: {build.sh,default.nix}: upd settings structure, upd descriptions

M  build.sh
M  default.nix

* CI: default.nix: upd header disclamer

M  build.sh

* CI: mv rev doc (build.sh->default.nix)

M  build.sh
M  default.nix

* CI: merge docs (build.sh->default.nix)

M  build.sh
M  default.nix

* CI: build.sh: rm most of NOTE tags

M  build.sh

* CI: .travis.yml: rm Nix updates

After refactoring they are right beside/before build.sh Nix updates, so this
update can be reduced.

M  .travis.yml

* CI: .travis.yml: upd service restart

Since service is not touched the daemon-reload is probably not needed, restart
is sufficient.

M  .travis.yml

* CI: build.sh: add report of Nixpkgs channel revision

Since Nix and Nixpkgs channel were just updated and build is next - report the
revision.

M  build.sh

* default.nix: use dummy package name

* default.nix: upd rephrase

* default.nix: upd rephrase

M  default.nix

* default.nix: add explanation

M  default.nix

* default.nix: clean-up

M  default.nix

* default.nix: upd

M  default.nix

* default.nix: upd

M  default.nix

* default.nix: add explanation

M  default.nix

* add initial .github/workflows/test.yml

* M  .github/workflows/test.yml

* test.yml: upd name: (Test->CI)

M  .github/workflows/test.yml

* test.yml: add env of Nixpkgs Haskell Lib from HNix

M  .github/workflows/test.yml

* test.yml: (nix-build->./build.sh)

M  .github/workflows/test.yml

* test.yml: upd update of Nix to update all Nix installed packages

M  build.sh

* test.yml: jobs: tests->Basic_build

M  .github/workflows/test.yml

* {test.yml,build.sh}: project: hnix->replaceWithProjectNameInCachix

M  .github/workflows/test.yml
M  build.sh

* {test.yml,build.sh}: executableNames..Complete: hnix->replaceWith...

M  .github/workflows/test.yml
M  build.sh

* test.yml: jobs: Basic_build: name the steps

M  .github/workflows/test.yml

* build.sh: compiler: add explanation

M  build.sh

* default.nix: compiler: mv explanation

M  build.sh
M  default.nix

* test.yml: m upd

M  .github/workflows/test.yml

* test.yml: trigger CI on push to master, track only PRs| trigger build once

M  .github/workflows/test.yml

* Simplify step names

M  .github/workflows/test.yml

* GitHub CI: add Linux_GHC-8-10

M  .github/workflows/test.yml

* GitHub CI: add Linux_GHCJS

M  .github/workflows/test.yml

* GitHub CI: add macOS_default

M  .github/workflows/test.yml

* GitHub CI: Nixpkgs: disable withHoogle

M  .github/workflows/test.yml

* GitHub CI: add Hackage_Cabal

M  .github/workflows/test.yml

* GitHub CI: Hackage_Cabal: add cabal v2-configure

M  .github/workflows/test.yml

* GitHub CI: Hackage_Cabal: add cabal v2-build

M  .github/workflows/test.yml

* GitHub CI: Hackage_Cabal: add cabal v2-test

M  .github/workflows/test.yml

* .github/workflows/(test->main).yml

R  .github/workflows/test.yml -> .github/workflows/main.yml

* builds: rname project->cachixAccount

M  .github/workflows/main.yml
M  build.sh

* .travis.yml: add withHoogle=false for CI builds

M  .travis.yml

* .travis.yml: group cachix conf

M  .travis.yml

* GitHub CI: add name tags to builds

M  .github/workflows/main.yml

* GitHub CI: Nixpkgs custom build: add customization

M  .github/workflows/main.yml

* builds: pass-through useRev

M  .github/workflows/main.yml
M  build.sh
M  default.nix

* builds: use rev

M  .github/workflows/main.yml

* GitHub CI: add Nixpkgs_stable_Linux

M  .github/workflows/main.yml

* build.sh: provide a NIX_PATH change if rev is chosen

M  build.sh

* GitHub CI: add build schedule

M  .github/workflows/main.yml

* GitHub CI: add explanations

M  .github/workflows/main.yml

* GitHub CI: make all builds optional

M  .github/workflows/main.yml

* name Hackage_Cabal

M  .github/workflows/main.yml

* GitHub CI: Nixpkgs_unstable_macOS: upd

M  .github/workflows/main.yml

* build.sh: rm NIX_PATH setup| default.nix solves it internally

M  build.sh

* build.sh: short-curcuit the Nix tools update

M  build.sh

* add .github/workflows/Cabal-Linux.yml

* mv Hackage_Cabal build main->Cabal-Linux.yml

M  .github/workflows/Cabal-Linux.yml
M  .github/workflows/main.yml

* Cabal-Linux.yml: add schedule

M  .github/workflows/Cabal-Linux.yml

* main.yml: switch all Nix installer nix_path to nixos-unstable

M  .github/workflows/main.yml

* main.yml: rm all Nix installer nix_path resetting to default

M  .github/workflows/main.yml

* GitHub CI: workflow: add macOS, mv job into it

A  .github/workflows/Nixpkgs-macOS.yml
M  .github/workflows/main.yml

* GitHub CI: workflow: Nixpkgs-macOS: add triggers and shedule

M  .github/workflows/Nixpkgs-macOS.yml

* GitHub CI: workflow: Nixpkgs-macOS: m build rename

M  .github/workflows/Nixpkgs-macOS.yml

* GitHub CI: workflow: Nixpkgs-GHCJS: mv build in

A  .github/workflows/Nixpkgs-GHCJS.yml
M  .github/workflows/main.yml

* GitHub CI: workflow: main: rm withHoogle overload since it is redundant

M  .github/workflows/main.yml

* GitHub CI: workflow: main: (CI->Nixpkgs, Linux)

M  .github/workflows/main.yml

* GitHub CI: workflow: main: linkWithGold

M  .github/workflows/main.yml

* GitHub CI: workflow: main: upd build ids

M  .github/workflows/main.yml

* GitHub CI: workflow: main: upd build names

M  .github/workflows/main.yml

* GitHub CI: workflow: main: add NixOS-unstable Strict build

M  .github/workflows/main.yml

* GitHub CI: workflow: main: upd build names

M  .github/workflows/main.yml

* GitHub CI: workflow: main: add build GHC 8.6.5

M  .github/workflows/main.yml

* GitHub CI: workflow: main: add build GHC 8.4.4

M  .github/workflows/main.yml

* GitHub CI: workflow: main: upd build name

M  .github/workflows/main.yml

* GitHub CI: workflow: main: upd build names, wrap in "

M  .github/workflows/main.yml

* GitHub CI: main: upd name: add GHC for GitHub CI to not mix-in GHCJS

M  .github/workflows/main.yml

* GitHub CI: workflow: mv (main->Nixpkgs-GHC-Linux).yml

R  .github/workflows/main.yml -> .github/workflows/Nixpkgs-GHC-Linux.yml

* GitHub CI: workflow: mv Quality build

M  .github/workflows/Nixpkgs-GHC-Linux.yml

* GitHub CI: workflow: m rname builds

M  .github/workflows/Nixpkgs-GHC-Linux.yml

* GitHub CI: workflow: m rename of the build

M  .github/workflows/Nixpkgs-GHC-Linux.yml

* GitHub CI: workflow: Quality build: add nix-shell test

M  .github/workflows/Nixpkgs-GHC-Linux.yml

* GitHub CI: workflow: add denotation towards main examples

M  .github/workflows/Nixpkgs-GHC-Linux.yml

* GitHub CI: workflow: Quality build: fx nix-shell command

M  .github/workflows/Nixpkgs-GHC-Linux.yml

* GitHub CI: workflow: mv Nixpkgs-(GHC-->)Linux.yml

R  .github/workflows/Nixpkgs-GHC-Linux.yml -> .github/workflows/Nixpkgs-Linux.yml

* GitHub CI: workflow: GHCJS: clean-up

M  .github/workflows/Nixpkgs-GHCJS.yml

* GitHub CI: workflow: GHCJS: use nixos-unstable rev

M  .github/workflows/Nixpkgs-GHCJS.yml

* GitHub CI: workflow: GHCJS: use linkWithGold

M  .github/workflows/Nixpkgs-GHCJS.yml

* R  .github/workflows/Nixpkgs-Linux.yml -> .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: Nixpgs, Linux: recommend nixos-unstable

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: Nixpgs, Linux: recommend test for nixos-20.03 stable

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: mv additiona builds into Nixpgs-Linux-additional

A  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: rname workflows

M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: make main builds mandatory

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: make build not strict, to not scare off people ;)

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: make Nix-shell into a separate test

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: Nix-shell: from the hip nix-shell'ing

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: Nix-shell: add separate Hoogle test

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: rename GHCJS

M  .github/workflows/Nixpkgs-GHCJS.yml

* GitHub CI: workflow: main: prettify

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: fx Nix-shell test

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: rename Nix-shell build

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: m upd

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: upd Nix-shell build

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: upd Quality build

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: upd NixOS stable build

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: upd disclaimer

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: upd steps to "Determined Nix-build"

M  .github/workflows/Nixpkgs-GHCJS.yml
M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml
M  .github/workflows/Nixpkgs-macOS.yml

* GitHub CI: workflow: main: upd Hoogle step name

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: m upd

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: upd Hoogle step name

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: upd Hoogle build name

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: upd Basic build name

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: add explicit nixos-unstable

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: Basic: add nixos-unstable explanation

M  .github/workflows/Nixpkgs-Linux-main.yml

* GitHub CI: workflow: main: Nix-shell: use pure shell (*sic)

M  .github/workflows/Nixpkgs-Linux-main.yml

* default.nix: abstract over package root| now able to manage monorepos

* default.nix: abstract over package name| full support of monorepos

M  default.nix

* build.sh: passthrough package{Name,Root} into default.nix

* {default.nix,build.sh}: (package->cabal)Name end explanation

* CI: Nixpkgs-Linux-main: add template for monorepo matrix

* CI: Cabal-Linux: add template for monorepo matrix

* D  ghcjs/default.nix

* Nixpkgs-macOS: mv env attrset

* CI: Nixpkgs workflows: use haskell-with-nixpkgs cachix account

M  .github/workflows/Nixpkgs-GHCJS.yml
M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml
M  .github/workflows/Nixpkgs-macOS.yml
M  .travis.yml

* CI: Nixpkgs workflows: provide CACHIX_SIGNING_KEY

M  .github/workflows/Nixpkgs-GHCJS.yml
M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml
M  .github/workflows/Nixpkgs-macOS.yml
M  .travis.yml

* CI: GitHub: Nixpkgs workflows: Cachix action, provide account to it

M  .github/workflows/Nixpkgs-GHCJS.yml
M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml
M  .github/workflows/Nixpkgs-macOS.yml

* CI: GitHub: Nixpkgs-Linux-main: quality build: upd name

* CI: GitHub: add submodule recursion to checkouts

M  .github/workflows/Cabal-Linux.yml
M  .github/workflows/Nixpkgs-GHCJS.yml
M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml
M  .github/workflows/Nixpkgs-macOS.yml

* CI: GitHub: Cabal-Linux: provide libsodium

* default.nix: upd neat-interpolation override

* build.sh: clean-up

rm redundant settings, since default.nix is the main API propagation point

* default.nix: set proper cabalName

* CI: switch back to HNix Cachix account

M  .github/workflows/Nixpkgs-GHCJS.yml
M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml
M  .github/workflows/Nixpkgs-macOS.yml
M  .travis.yml

* .travis.yml: switch back to HNix Cachix account secret

* default.nix: upd GHC to 8.8.4

* CI: update GHC 8.8.(3->4)

Also dropping minor numbers from build names for bravity of tracking Nixpkgs

M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .github/workflows/Nixpkgs-Linux-main.yml
M  .travis.yml

* CI: rm Nixpkgs GHC 8.4.4 builds

8.4.4 support is removed from Nixpkgs

M  .github/workflows/Nixpkgs-Linux-additional.yml
M  .travis.yml

* CI: Cabal-Linux: add GHC 8.4 build

Since Nixpkgs removed 8.4, adding it to Hackage builds.

* CI: Cabal-Linux: enable tests in configuration

M  .github/workflows/Cabal-Linux.yml

* CI: Cabal-Linux: clean-up

M  .github/workflows/Cabal-Linux.yml

* CI: Cabal-Linux: add Nix installation, instantiate still required for tests

M  .github/workflows/Cabal-Linux.yml

* CI: Cabal-Linux: make builds pass mandatory

* CI: Nixpkgs-Linux-main: make all builds optional

Due to Nixpkgs brittleness - it often blocks the development process, when the
PRs do not pass due to issues of downstream Nixpkgs.

Moreover that HNix builds in Nixpkgs with Nix, so the point of this builds is
just to check that HNix builds with Nixpkgs under Nix.

When Nixpkgs build is mandatory - PRs get blocked by it and PRs await on fixing
Nixpkgs.

Making Nixpkgs builds optional allows parallelization of code development and
Nixpkgs fixing.

More in discussion: https://github.com/haskell-nix/hnix/pull/681#discussion_r463983376

* CI: Nixpkgs-Linux-main: make all builds optional cache builders

Due to Nixpkgs brittleness - it often blocks the development process, when the
PRs do not pass due to issues of downstream Nixpkgs.

Moreover that HNix builds in Nixpkgs with Nix, so the point of this builds is
just to check that HNix builds with Nixpkgs under Nix.

When Nixpkgs build is mandatory - PRs get blocked by it and PRs await on fixing
Nixpkgs.

Making Nixpkgs builds optional allows parallelization of code development and
Nixpkgs fixing.

More in discussion: https://github.com/haskell-nix/hnix/pull/681#discussion_r463983376

CI: Travis: fx optional builds

CI: Nixpkgs-Linux-main: make all builds optional

Due to Nixpkgs brittleness - it often blocks the development process, when the
PRs do not pass due to issues of downstream Nixpkgs.

Moreover that HNix builds in Nixpkgs with Nix, so the point of this builds is
just to check that HNix builds with Nixpkgs under Nix.

When Nixpkgs build is mandatory - PRs get blocked by it and PRs await on fixing
Nixpkgs.

Making Nixpkgs builds optional allows parallelization of code development and
Nixpkgs fixing.

More in discussion: https://github.com/haskell-nix/hnix/pull/681#discussion_r463983376

CI: Travis: fx optional builds

* CI: Travis: enable fast skip

See: https://github.com/haskell-nix/hnix/pull/681#discussion_r463996365

M  .travis.yml

* CI: Travis: add "bypass" to keep CI green, send cache gen to background

M  .travis.yml

* CI: Nixpkgs-Linux-main: proper executable name to shell complete

* CI: Nixpkgs-Linux-main: Quality build: add shell completion test

M  .github/workflows/Nixpkgs-Linux-main.yml

* CI: Nixpkgs-Linux-main: default build: add strict build

M  .github/workflows/Nixpkgs-Linux-main.yml

* CI: Nixpkgs-GHCJS: print log tail

* CI: Nixpkgs-GHCJS: turn-off build which is not persued

Co-authored-by: Simon Jakobi <simon.jakobi@gmail.com>
Co-authored-by: Richard Marko <srk@48.io>
This commit is contained in:
Anton Latukha 2020-08-03 20:25:22 +03:00 committed by GitHub
parent 695a47fac3
commit 7cd6a0f276
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
8 changed files with 446 additions and 50 deletions

65
.github/workflows/Cabal-Linux.yml vendored Normal file
View File

@ -0,0 +1,65 @@
name: "Hackage, Cabal, Linux"
on:
pull_request:
push:
branches:
- master
schedule:
- cron: "45 02 * * *"
jobs:
build10:
name: GHC 8.10
runs-on: ubuntu-latest
strategy:
matrix:
packageRoots: [ ./ ]
defaults:
run:
working-directory: ${{ matrix.packageRoots }}
steps:
- uses: actions/checkout@v2
with:
submodules: recursive
- uses: actions/setup-haskell@v1.1
with:
ghc-version: "8.10"
# cabal-version: "3.0.0.0"
- name: Install additional system packages
run: sudo apt install libsodium-dev
# 2020-08-01: NOTE: Nix instantiate still needed for HNix tests
- name: Install Nix
uses: cachix/install-nix-action@v10
- run: cabal v2-configure --disable-optimization --enable-tests --enable-deterministic
- run: cabal v2-build
- run: cabal v2-test
build20:
name: GHC 8.4
runs-on: ubuntu-latest
strategy:
matrix:
packageRoots: [ ./ ]
defaults:
run:
working-directory: ${{ matrix.packageRoots }}
steps:
- uses: actions/checkout@v2
with:
submodules: recursive
- uses: actions/setup-haskell@v1.1
with:
ghc-version: "8.4"
# cabal-version: "3.0.0.0"
- name: Install additional system packages
run: sudo apt install libsodium-dev
# 2020-08-01: NOTE: Nix instantiate still needed for HNix tests
- name: Install Nix
uses: cachix/install-nix-action@v10
- run: cabal v2-configure --disable-optimization --enable-tests
- run: cabal v2-build
- run: cabal v2-test

View File

@ -0,0 +1,45 @@
# 2020-08-02: NOTE: GHCJS fails for number of month, and makes GitHub CI "red", because team does not care and not pursue GHCJS build currently - there is no need to test for it. Technically compilation directly to WebAssembly looks much easier task than keeping HQ compilation to JS. WebAssembly compilation https://github.com/tweag/asterius look much more promising.
# 2020-08-02: FIXME: If this is not needed after some time - remove the file.
name: "Nixpkgs, Linux, GHCJS"
on:
pull_request:
push:
branches:
- master
schedule:
# Every day at 05:45
- cron: "45 05 * * *"
env:
useRev: "true"
rev: "nixos-unstable"
cachixAccount: "hnix"
# GitHub secret
CACHIX_SIGNING_KEY: ${{ secrets.CACHIX_SIGNING_KEY }}
linkWithGold: "true"
compiler: "ghcjs"
ghcjsTmpLogFile: "/tmp/ghcjsTmpLogFile.log"
ghcjsLogTailLength: "10000"
jobs:
build10:
name: Build
runs-on: ubuntu-latest
continue-on-error: true
steps:
- name: Git checkout
uses: actions/checkout@v2
with:
submodules: recursive
- name: Install Nix
uses: cachix/install-nix-action@v10
- name: Install Cachix
uses: cachix/cachix-action@v6
with:
name: ${{ env.cachixAccount }}
- name: Determined Nix-build
run: ./build.sh
- name: Print log tail
if: always()
run: tail -n "$ghcjsLogTailLength" "$ghcjsTmpLogFile" && rm "$ghcjsTmpLogFile"

View File

@ -0,0 +1,72 @@
name: "Nixpkgs, Linux, additional"
on:
# On Git changes in PR
pull_request:
# On Git changes of the master
push:
branches:
- master
schedule:
# Every day at 03:45
- cron: "45 06 * * *"
env:
###
### NOTE: This configuration uses `build.sh` interface, which uses `default.nix` interface, which exposes the Nixpkgs Haskell Lib interface.
###
### Documentation of this settings is mosly in `default.nix`, since most settings it Nixpkgs related
### and the other part of keys explained in `build.sh`, since those address external procedures aound the builds.
### Additional documentation is in Nixpkgs Haskell.lib: https://github.com/NixOS/nixpkgs/blob/master/pkgs/development/haskell-modules/lib.nix
###
useRev: "true"
rev: "nixos-unstable"
cachixAccount: "hnix"
# GitHub secret
CACHIX_SIGNING_KEY: ${{ secrets.CACHIX_SIGNING_KEY }}
linkWithGold: "true"
jobs:
build40:
name: "Nixpkgs-unstable channel, default GHC (8.8)"
runs-on: ubuntu-latest
continue-on-error: true
env:
rev: "nixpkgs-unstable"
steps:
- name: Git checkout
uses: actions/checkout@v2
with:
submodules: recursive
- name: Install Nix
uses: cachix/install-nix-action@v10
- name: Install Cachix
uses: cachix/cachix-action@v6
with:
name: ${{ env.cachixAccount }}
- name: Determined Nix-build
run: ./build.sh
build50:
name: "NixOS-unstable channel, GHC 8.6.5"
runs-on: ubuntu-latest
continue-on-error: true
env:
compiler: "ghc865"
steps:
- name: Git checkout
uses: actions/checkout@v2
with:
submodules: recursive
- name: Install Nix
uses: cachix/install-nix-action@v10
- name: Install Cachix
uses: cachix/cachix-action@v6
with:
name: ${{ env.cachixAccount }}
- name: Determined Nix-build
run: ./build.sh

172
.github/workflows/Nixpkgs-Linux-main.yml vendored Normal file
View File

@ -0,0 +1,172 @@
name: "Nixpkgs, Linux, main"
# When to trigger builds
on:
# On Git changes in PR
pull_request:
# On Git changes of the master
push:
branches:
- master
schedule:
# Every day at 03:45
- cron: "45 03 * * *"
env:
###
### NOTE: Table example of the provided build configuration keys
### Infrastructure uses `build.sh` API, which uses `default.nix` API, which exposes the almost literal Nixpkgs Haskell Lib API wich was abstracted for use outside of Nix language.
###
### Documentation of this settings is mosly in `default.nix`, since most settings it Nixpkgs related
### and the other part of keys explained in `build.sh`, since those address external procedures aound the builds.
### Additional documentation is in Nixpkgs Haskell.lib: https://github.com/NixOS/nixpkgs/blob/master/pkgs/development/haskell-modules/lib.nix
###
useRev: "true"
rev: "nixos-unstable"
# Register and use Cachix account
cachixAccount: "hnix"
# GitHub secret
CACHIX_SIGNING_KEY: ${{ secrets.CACHIX_SIGNING_KEY }}
allowInconsistentDependencies: "false"
doJailbreak: "false"
doCheck: "true"
sdistTarball: "false"
buildFromSdist: "false"
buildStrictly: "false"
failOnAllWarnings: "false"
enableDeadCodeElimination: "false"
disableOptimization: "true"
linkWithGold: "true"
enableLibraryProfiling: "false"
enableExecutableProfiling: "false"
doTracing: "false"
enableDWARFDebugging: "false"
doStrip: "false"
enableSharedLibraries: "true"
enableStaticLibraries: "false"
enableSharedExecutables: "false"
justStaticExecutables: "false"
enableSeparateBinOutput: "false"
checkUnusedPackages: "false"
doHaddock: "false"
doHyperlinkSource: "false"
doCoverage: "false"
doBenchmark: "false"
generateOptparseApplicativeCompletions: "false"
executableNamesToShellComplete: '[ "hnix" ]'
jobs:
# NOTE: Basic example
build10:
name: "NixOS-unstable channel, strict build, default GHC (8.8)"
runs-on: ubuntu-latest
# 2020-08-01: NOTE: Due to Nixpkgs brittleness to not block project development Nixpkgs made optional, see commit message for more info
continue-on-error: true
steps:
- name: Git checkout
uses: actions/checkout@v2
with:
submodules: recursive
- name: Install Nix
uses: cachix/install-nix-action@v10
- name: Install Cachix
uses: cachix/cachix-action@v6
with:
name: ${{ env.cachixAccount }}
- name: Determined Nix-build
env:
# nixos-unstable is a nixpkgs-upstable that passed a number of upstream CI and quality checks, it is essentially a current branch while also receives stable updates fitting for our CI checkups with current Nixpkgs.
# Note that Nix nature is purely functional lazy language, it is referentially transparent, reproducible (deterministic) builds, that means that just as in the type system - any the Nix build failures properly cascade through the Nixpkgs tree graph branch, so particular `master` broken checkouts would properly refuse/would not be able to build parts of Nixpkgs tree graph. So the Nix builds are pretty brittle, do not be ashamed to make Nixpkgs builds optional (`continue-on-error: true`), or set them to the latest stable NixOS Nixpkgs release.
useRev: "true"
rev: "nixos-unstable"
buildStrictly: "true"
run: ./build.sh
# NOTE: Example of customization using Nixpkgs Haskell Lib API
build20:
name: "Quality build, SDist, Optimizations, Benchmark, Haddock, Completions, GHC 8.10.1"
runs-on: ubuntu-latest
continue-on-error: true
# Matrix of builds for multiple subprojects in a monorepo
strategy:
matrix:
packageRoots: [ ./ ]
steps:
- name: Git checkout
uses: actions/checkout@v2
with:
submodules: recursive
- name: Install Nix
uses: cachix/install-nix-action@v10
- name: Install Cachix
uses: cachix/cachix-action@v6
with:
name: ${{ env.cachixAccount }}
- name: Determined Nix-build
env:
useRev: "true"
rev: "nixos-unstable"
compiler: "ghc8101"
buildFromSdist: "true"
linkWithGold: "true"
doHaddock: "true"
doHyperlinkSource: "true"
disableOptimization: "false"
enableDeadCodeElimination: "true"
doBenchmark: "true"
generateOptparseApplicativeCompletions: "true"
# packageRoot for CI builds can be just a paths, since CI uses remote Git repo that is already filtered with local .gitignore's
packageRoot: ${{ matrix.packageRoots }}
run: ./build.sh
# NOTE: Build on latest stable NixOS release
build30:
name: "NixOS 20.03 stable channel, default GHC (8.8)"
runs-on: ubuntu-latest
continue-on-error: true
steps:
- name: Git checkout
uses: actions/checkout@v2
with:
submodules: recursive
- name: Install Nix
uses: cachix/install-nix-action@v10
- name: Install Cachix
uses: cachix/cachix-action@v6
with:
name: ${{ env.cachixAccount }}
- name: Determined Nix-build
env:
rev: "nixos-20.03"
run: ./build.sh
# NOTE: This would additionally test that the Nix shell customization of the project works.
# By default *this setup provides local hoogle and generates database of the documetation for the project and its dependencies
build40:
name: "Nix-shell & supplied locall project Hoogle DB"
runs-on: ubuntu-latest
continue-on-error: true
steps:
- name: Git checkout
uses: actions/checkout@v2
with:
submodules: recursive
- name: Install Nix
uses: cachix/install-nix-action@v10
- name: Install Cachix
uses: cachix/cachix-action@v6
with:
name: ${{ env.cachixAccount }}
- name: Nix-shell
run: nix-shell --pure --command 'echo "Evaluated, loaded and entered $IN_NIX_SHELL Nix shell env."'
- name: Local Hoogle DB for the project development and tooling
run: nix-shell --pure --command 'hoogle True'
# Other samples of tests used in the project see in the directory

40
.github/workflows/Nixpkgs-macOS.yml vendored Normal file
View File

@ -0,0 +1,40 @@
name: "Nixpkgs, macOS"
# Due to macOS is a side-build to test the platform, using nixos-unstable for additional long-term stability of it
on:
# On Git changes in PR
pull_request:
# On Git changes of the master
push:
branches:
- master
schedule:
# Every day at 04:45
- cron: "45 01 * * *"
env:
useRev: "true"
rev: "nixos-unstable"
cachixAccount: "hnix"
# GitHub secret
CACHIX_SIGNING_KEY: ${{ secrets.CACHIX_SIGNING_KEY }}
jobs:
build10:
name: NixOS-unstable, default GHC (8.8)
runs-on: macos-latest
continue-on-error: true
steps:
- name: Git checkout
uses: actions/checkout@v2
with:
submodules: recursive
- name: Install Nix
uses: cachix/install-nix-action@v10
- name: Install Cachix
uses: cachix/cachix-action@v6
with:
name: ${{ env.cachixAccount }}
- name: Determined Nix-build
run: ./build.sh

View File

@ -21,8 +21,6 @@ git:
env:
global:
# NOTE: This is secure CACHIX_SIGNING_KEY=val, it is only available on project internal branches, so Cachix would push only there
- secure: "dm6I+M4+V+C7QMTpcSADdKPE633SvmToXZrTbZ7miNDGmMN+/SfHeN2ybi1+PW6oViMlbPN/7J/aEfiGjSJI8vLk72Y4uCWGmpSb8TXZLu6+whnxtZzzW8+z4tsM4048QJg7CF3N/25U8thRFgs3DqUub1Sf3nG9LrNWdz6ZcDQ="
###
### NOTE: This configuration uses `build.sh` interface, which uses `default.nix` interface, which exposes the Nixpkgs Haskell Lib interface.
###
@ -31,10 +29,8 @@ env:
### Additional documentation is in Nixpkgs Haskell.lib: https://github.com/NixOS/nixpkgs/blob/master/pkgs/development/haskell-modules/lib.nix
###
#
# - rev=nixos-unstable
# - NIX_PATH="nixpkgs=https://github.com/nixos/nixpkgs/archive/$rev.tar.gz"
- project='hnix'
- useRev='true'
- rev='nixos-unstable'
- allowInconsistentDependencies='false'
- doJailbreak='false'
- doCheck='true'
@ -63,41 +59,42 @@ env:
- generateOptparseApplicativeCompletions='false'
- executableNamesToShellComplete='[ "hnix" ]'
#
- withHoogle='false'
#
- cachixAccount='hnix'
# NOTE: This is secure CACHIX_SIGNING_KEY=val, it is only available on project internal branches, so Cachix would push only there
- secure: "dm6I+M4+V+C7QMTpcSADdKPE633SvmToXZrTbZ7miNDGmMN+/SfHeN2ybi1+PW6oViMlbPN/7J/aEfiGjSJI8vLk72Y4uCWGmpSb8TXZLu6+whnxtZzzW8+z4tsM4048QJg7CF3N/25U8thRFgs3DqUub1Sf3nG9LrNWdz6ZcDQ="
#
- ghcjsTmpLogFile='/tmp/ghcjsTmpLogFile.log'
- ghcjsLogTailLength='10000'
# 2020-05-26: Currently newest Travis dist Ubuntu 18.04 bionic
# {os} x {jobs} + {jobs:include} - {jobs:exclude} = {build matrix}
jobs:
fast_finish: true
include:
- name: GHC 8.4.4, Linux
- name: Bypass build
env:
- compiler='ghc844'
- linkWithGold='true'
- compiler='bypass'
os: linux
dist: bionic
- name: GHC 8.6.5, Linux
env:
- compiler='ghc865'
- linkWithGold='true'
os: linux
dist: bionic
- name: GHC 8.8.3, macOS, Strict
- name: GHC 8.8.4, macOS
env:
- compiler='ghc883'
- buildStrictly='true'
- compiler='ghc884'
os: osx
- name: GHC 8.10.1, Linux, SDist, Optimize, Benchmark, Haddock, Shell Completions
- name: GHC 8.8.4, Linux
env:
- compiler='ghc884'
os: linux
dist: bionic
- name: GHC 8.10.1, Linux
env:
- compiler='ghc8101'
- buildFromSdist='true'
- linkWithGold='true'
- doHaddock='true'
- doHyperlinkSource='true'
- doBenchmark='true'
- disableOptimization='false'
- enableDeadCodeElimination='true'
- generateOptparseApplicativeCompletions='true'
os: linux
dist: bionic
- name: GHCJS, Linux
@ -107,6 +104,9 @@ jobs:
dist: bionic
allow_failures:
- env: compiler='ghcjs'
- env: compiler='ghc8101'
- env: compiler='ghc884'
- env: compiler='ghc865'
before_script:
- sudo mkdir -p /etc/nix
@ -117,13 +117,15 @@ before_script:
- if [ "${TRAVIS_OS_NAME}" = "osx" ]; then sudo launchctl kickstart -k system/org.nixos.nix-daemon; fi
script:
# Ability to bypass builds
- if [ "${compiler}" = "bypass" ]; then exit; fi
#
#
# Install Cachix client using Nix:
- if [ "${TRAVIS_OS_NAME}" = "linux" ] || [ "${TRAVIS_OS_NAME}" = "osx" ]; then nix-env -iA cachix -f https://cachix.org/api/v1/install; fi
- cachix use "$project"
- cachix use "$cachixAccount"
# If key is set - use Cachix push, else - proceed without it
- if [ ! "$CACHIX_SIGNING_KEY" = "" ]; then cachix push "$project" --watch-store& fi
- if [ ! "$CACHIX_SIGNING_KEY" = "" ]; then cachix push "$cachixAccount" --watch-store& fi
#
#
# NOTE: Normal GHC build

View File

@ -13,13 +13,10 @@ set -Eexuo pipefail
# NOTE: If vars not imported - init the vars with default values
compiler=${compiler:-'ghc8101'}
rev=${rev:-'nixpkgs-unstable'}
# If NIX_PATH not imported - construct it from `rev`
NIX_PATH=${NIX_PATH:-"nixpkgs=https://github.com/nixos/nixpkgs/archive/$rev.tar.gz"}
export NIX_PATH
# Project name, used by cachix
project=${project:-'defaultProjectName'}
compiler=${compiler:-'ghc884'}
# Account in Cachix to use
cachixAccount=${cachixAccount:-'replaceWithProjectNameInCachix'}
allowInconsistentDependencies=${allowInconsistentDependencies:-'false'}
@ -190,7 +187,8 @@ MAIN() {
# Overall it is useful to have in CI test builds the latest stable Nix
# 2020-06-24: HACK: Do not ask why different commands on Linux and macOS. IDK, wished they we the same. These are the only commands that worked on according platforms right after the fresh Nix installer rollout.
(nix-channel --update && nix-env -iA nixpkgs.nix) || (sudo nix upgrade-nix)
# 2020-07-06: HACK: GitHub Actions CI shown that nix-channel or nix-upgrade-nix do not work, there is probably some new rollout, shortcircuting for the time bing with || true
(nix-channel --update && nix-env -u) || (sudo nix upgrade-nix) || true
# Report the Nixpkgs channel revision
@ -198,14 +196,14 @@ nix-instantiate --eval -E 'with import <nixpkgs> {}; lib.version or lib.nixpkgsV
# Secrets are not shared to PRs from forks
# nix-build | cachix push <project> - uploads binaries, runs&works only in the branches of the main repository, so for PRs - else case runs
# nix-build | cachix push <account> - uploads binaries, runs&works only in the branches of the main repository, so for PRs - else case runs
if [ ! "$CACHIX_SIGNING_KEY" = "" ]
then
# Build of the inside repo branch - enable push Cachix cache
BUILD_PROJECT | cachix push "$project"
BUILD_PROJECT | cachix push "$cachixAccount"
else

View File

@ -1,6 +1,13 @@
{
# Compiler in a form ghc8101 == GHC 8.10.1, just remove spaces and dots
compiler ? "ghc883"
# 2020-07-05: By default using default GHC for Nixpkgs, see https://search.nixos.org/packages?query=ghc&from=0&size=500&channel=unstable for current version (currently ghc883 == GHC 8.8.3)
compiler ? "ghc884"
# Deafult.nix is a unit package abstraciton that allows to abstract over packages even in monorepos:
# Example: pass --arg cabalName --arg packageRoot "./subprojectDir", or map default.nix over a list of tiples for subprojects.
# cabalName is package resulting name: by default and on error resolves in haskellPackages.developPackage to project root directory name by default, but outside the haskellPackages.developPackage as you see below packageRoot can be different
, cabalName ? "hnix"
, packageRoot ? pkgs.nix-gitignore.gitignoreSource [ ] ./.
# This settings expose most of the Nixpkgs Haskell.lib API: https://github.com/NixOS/nixpkgs/blob/master/pkgs/development/haskell-modules/lib.nix
@ -74,7 +81,7 @@
, useRev ? false
# Nix by default uses nixpkgs-unstable channel
# Nix by default updates and uses locally configured nixpkgs-unstable channel
# Nixpkgs revision options:
# `rev` vals in order of freshness -> cache & stability:
# { master
@ -89,21 +96,15 @@
, pkgs ?
if builtins.compareVersions builtins.nixVersion "2.0" < 0
then abort "hnix requires at least nix 2.0"
then abort "Requires Nix >= 2.0"
else
if useRev
# Please do not guard with hash, so the package able to use current channels (rolling `rev`) of Haskell&Nixpkgs
# Do not guard with hash, so the project is able to use current channels (rolling `rev`) of Nixpkgs
then import (builtins.fetchTarball "https://github.com/NixOS/nixpkgs/archive/${rev}.tar.gz") {}
else import <nixpkgs> {}
// {
# Try to build dependencies even if they are marked broken.
config.allowBroken = true;
# config.packageOverrides = pkgs: rec {
# nix = pkgs.nixStable.overrideDerivation (attrs: with pkgs; rec {
# src = if builtins.pathExists ./data/nix/.version
# then data/nix
# else throw "data/nix doesn't seem to contain the nix source. You may want to run git submodule update --init.";
# });
# };
}
, mkDerivation ? null
@ -140,7 +141,7 @@ let
overrideHaskellPackages;
# Application of functions from this list to the package in code here happens in the reverse order (from the tail). Some options depend on & override others, so if enabling options caused Nix error or not expected result - change the order, and please do not change this order without proper testing.
listOfSetsOfSwitchExtend =
listSwitchFunc =
[
{
switch = sdistTarball;
@ -197,21 +198,22 @@ let
];
# Function that applies enabled option to the package, used in the fold.
funcOnSwitchAppliesFunction = set: object:
onSwitchApplyFunc = set: object:
if set.switch
then set.function object
else object;
# General description of package
package = haskellPackages.developPackage {
name = "hnix";
root = pkgs.nix-gitignore.gitignoreSource [ ] ./.;
name = cabalName;
# Do not include into closure the files listed in .gitignore
root = packageRoot;
overrides = self: super: {
# 2020-06-26 Due to a behaviour change in neat-interpolation-0.4, we
# require n-i >= 0.4. dontCheck helps us avoid conflicts with
# neat-interpolation's test dependencies.
neat-interpolation = pkgs.haskell.lib.dontCheck super.neat-interpolation_0_5_1;
neat-interpolation = pkgs.haskell.lib.dontCheck super.neat-interpolation_0_5_1_1;
# 2020-07-23 hnix uses multiple functions that are unavailable in
# data-fix < 0.3.
@ -266,7 +268,7 @@ let
# One part of Haskell.lib options are argument switches, those are in `inherit`ed list.
# Other part - are function wrappers over pkg. Fold allows to compose those.
# composePackage = foldr (if switch then function) (package) ([{switch,function}]) == (functionN .. (function1 package))
composedPackage = pkgs.lib.foldr (funcOnSwitchAppliesFunction) package listOfSetsOfSwitchExtend;
composedPackage = pkgs.lib.foldr (onSwitchApplyFunc) package listSwitchFunc;
in composedPackage