-
-
Notifications
You must be signed in to change notification settings - Fork 12.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tracexec: Packaging improvements #310158
tracexec: Packaging improvements #310158
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your packaging effort! I have added some review comments and the test and licenses. Apart from that, there's some extra complexity for handling different architectures: seccomp-bpf
feature isn't available for riscv64 architecture due to seccompiler doesn't support it: rust-vmm/seccompiler#72 .
In general, you can take a look at my PKGBUILD at AUR: https://aur.archlinux.org/cgit/aur.git/tree/PKGBUILD?h=tracexec
And a kind reminder that in the future tests should be run single threaded, with RUST_TEST_THREADS=1
Done.
I'm skipping over this as https://github.com/kxxt/tracexec/releases/tag/v0.2.2 mentions this as fixed. |
Ah, looks like tracexec was already packaged meanwhile: I'll apply the improvements made here onto it. |
Good to merge from my side; if ofborg passes, please somebody merge. |
@ofborg build tracexec |
Hmm, this seems to introduce a build failure in the check phase on aarch64-linux: Relevant log:
Edit: ofborg logs: https://logs.ofborg.org/?key=nixos/nixpkgs.310158&attempt_id=2fc50c54-2fc3-4592-9531-96631b6355dd |
It would be nice to have passthru.updateScript = gitUpdater {
url = "https://github.com/kxxt/tracexec";
rev-prefix = "v";
}; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry, didn't see your PR. Thanks! ❤️
@WilliButz No clue about that one. Should Rust aarch64 have a working GCC out of the box? Edit: I succeed to build it cross, which suggest to me that maybe something not specific to this package is broken: NIX_PATH=nixpkgs=. nix-build '<nixpkgs>' --arg crossSystem '(import <nixpkgs/lib>).systems.examples.aarch64-multiplatform' --no-out-link -A tracexec |
I defined it here: https://github.com/kxxt/tracexec/blob/main/.cargo/config.toml . It's because rust defaults to linking with |
@DontEatOreo I used the more generic
mentioned in the Tested with: NIX_PATH=nixpkgs=. nix-shell maintainers/scripts/update.nix --argstr package tracexec |
@kxxt What would be a good solution to that? As in, can that be written such that it does not break native (non-cross) compilation, or should we work around that in nixpkgs somehow? (The cross-compilation of the package currently works in nixpkgs btw, I just tested it and edited put the invocation into #310158 (comment), in case that is useful for you). |
How does this work in the AUR package (which only has |
I suspect I'll disable tests for non-x86_64 archs until a solution is found. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
Because when host and target architecture is the same, a compatible symlink is there, at least on Arch Linux(and Ubuntu or GitHub runner image) . (e.g. aarch64-linux-gnu-gcc symlinked to gcc). |
install -Dm644 LICENSE -t "$out/share/licenses/${pname}/" | ||
install -Dm644 THIRD_PARTY_LICENSES.HTML -t "$out/share/licenses/${pname}/" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
pname
probably shouldn't be reused for the license directory
With disabled tests on aarch64, ofborg passes, merging. |
Original PR title:
tracexec: init at 0.1.0
Description of changes
See https://github.com/kxxt/tracexec
❤️ co-maintainers would be very appreciated!
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.