diff options
author | Vincent Ambo <mail@tazj.in> | 2023-02-14T12·02+0300 |
---|---|---|
committer | tazjin <tazjin@tvl.su> | 2023-03-13T20·30+0000 |
commit | 025c67bf4d5666411b4d6cdc929e1a677ebc0439 (patch) | |
tree | e6e683d5c194686c8112518965f7e11458b18f27 /tvix/cli | |
parent | cbb4137dc08620af9d6360057c75891bf4d03b5f (diff) |
refactor(tvix/eval): flatten call stack of VM using generators r/5964
Warning: This is probably the biggest refactor in tvix-eval history, so far. This replaces all instances of trampolines and recursion during evaluation of the VM loop with generators. A generator is an asynchronous function that can be suspended to yield a message (in our case, vm::generators::GeneratorRequest) and receive a response (vm::generators::GeneratorResponsee). The `genawaiter` crate provides an interpreter for generators that can drive their execution and lets us move control flow between the VM and suspended generators. To do this, massive changes have occured basically everywhere in the code. On a high-level: 1. The VM is now organised around a frame stack. A frame is either a call frame (execution of Tvix bytecode) or a generator frame (a running or suspended generator). The VM has an outer loop that pops a frame off the frame stack, and then enters an inner loop either driving the execution of the bytecode or the execution of a generator. Both types of frames have several branches that can result in the frame re-enqueuing itself, and enqueuing some other work (in the form of a different frame) on top of itself. The VM will eventually resume the frame when everything "above" it has been suspended. In this way, the VM's new frame stack takes over much of the work that was previously achieved by recursion. 2. All methods previously taking a VM have been refactored into async functions that instead emit/receive generator messages for communication with the VM. Notably, this includes *all* builtins. This has had some other effects: - Some test have been removed or commented out, either because they tested code that was mostly already dead (nix_eq) or because they now require generator scaffolding which we do not have in place for tests (yet). - Because generator functions are technically async (though no async IO is involved), we lose the ability to use much of the Rust standard library e.g. in builtins. This has led to many algorithms being unrolled into iterative versions instead of iterator combinations, and things like sorting had to be implemented from scratch. - Many call sites that previously saw a `Result<..., ErrorKind>` bubble up now only see the result value, as the error handling is encapsulated within the generator loop. This reduces number of places inside of builtin implementations where error context can be attached to calls that can fail. Currently what we gain in this tradeoff is significantly more detailed span information (which we still need to bubble up, this commit does not change the error display). We'll need to do some analysis later of how useful the errors turn out to be and potentially introduce some methods for attaching context to a generator frame again. This change is very difficult to do in stages, as it is very much an "all or nothing" change that affects huge parts of the codebase. I've tried to isolate changes that can be isolated into the parent CLs of this one, but this change is still quite difficult to wrap one's mind and I'm available to discuss it and explain things to any reviewer. Fixes: b/238, b/237, b/251 and potentially others. Change-Id: I39244163ff5bbecd169fe7b274df19262b515699 Reviewed-on: https://cl.tvl.fyi/c/depot/+/8104 Reviewed-by: raitobezarius <tvl@lahfa.xyz> Reviewed-by: Adam Joseph <adam@westernsemico.com> Tested-by: BuildkiteCI
Diffstat (limited to 'tvix/cli')
-rw-r--r-- | tvix/cli/src/derivation.rs | 590 | ||||
-rw-r--r-- | tvix/cli/src/main.rs | 2 |
2 files changed, 301 insertions, 291 deletions
diff --git a/tvix/cli/src/derivation.rs b/tvix/cli/src/derivation.rs index 88c5e522966d..15c4c6f858f7 100644 --- a/tvix/cli/src/derivation.rs +++ b/tvix/cli/src/derivation.rs @@ -5,7 +5,8 @@ use std::cell::RefCell; use std::collections::{btree_map, BTreeSet}; use std::rc::Rc; use tvix_eval::builtin_macros::builtins; -use tvix_eval::{AddContext, CoercionKind, ErrorKind, NixAttrs, NixList, Value, VM}; +use tvix_eval::generators::{self, GenCo}; +use tvix_eval::{AddContext, CoercionKind, ErrorKind, NixAttrs, NixList, Value}; use crate::errors::Error; use crate::known_paths::{KnownPaths, PathKind, PathName}; @@ -17,13 +18,17 @@ const IGNORE_NULLS: &str = "__ignoreNulls"; /// Helper function for populating the `drv.outputs` field from a /// manually specified set of outputs, instead of the default /// `outputs`. -fn populate_outputs(vm: &mut VM, drv: &mut Derivation, outputs: NixList) -> Result<(), ErrorKind> { +async fn populate_outputs( + co: &GenCo, + drv: &mut Derivation, + outputs: NixList, +) -> Result<(), ErrorKind> { // Remove the original default `out` output. drv.outputs.clear(); for output in outputs { - let output_name = output - .force(vm)? + let output_name = generators::request_force(co, output) + .await .to_str() .context("determining output name")?; @@ -144,9 +149,9 @@ fn populate_output_configuration( /// Handles derivation parameters which are not just forwarded to /// the environment. The return value indicates whether the /// parameter should be included in the environment. -fn handle_derivation_parameters( +async fn handle_derivation_parameters( drv: &mut Derivation, - vm: &mut VM, + co: &GenCo, name: &str, value: &Value, val_str: &str, @@ -158,11 +163,7 @@ fn handle_derivation_parameters( "args" => { let args = value.to_list()?; for arg in args { - drv.arguments.push(strong_coerce_to_string( - vm, - &arg, - "handling command-line builder arguments", - )?); + drv.arguments.push(strong_coerce_to_string(co, arg).await?); } // The arguments do not appear in the environment. @@ -176,7 +177,7 @@ fn handle_derivation_parameters( .context("looking at the `outputs` parameter of the derivation")?; drv.outputs.clear(); - populate_outputs(vm, drv, outputs)?; + populate_outputs(co, drv, outputs).await?; } "builder" => { @@ -193,22 +194,20 @@ fn handle_derivation_parameters( Ok(true) } -fn strong_coerce_to_string(vm: &mut VM, val: &Value, ctx: &str) -> Result<String, ErrorKind> { - Ok(val - .force(vm) - .context(ctx)? - .coerce_to_string(CoercionKind::Strong, vm) - .context(ctx)? - .as_str() - .to_string()) +async fn strong_coerce_to_string(co: &GenCo, val: Value) -> Result<String, ErrorKind> { + let val = generators::request_force(co, val).await; + let val_str = generators::request_string_coerce(co, val, CoercionKind::Strong).await; + + Ok(val_str.as_str().to_string()) } #[builtins(state = "Rc<RefCell<KnownPaths>>")] mod derivation_builtins { use super::*; + use tvix_eval::generators::Gen; #[builtin("placeholder")] - fn builtin_placeholder(_: &mut VM, input: Value) -> Result<Value, ErrorKind> { + async fn builtin_placeholder(co: GenCo, input: Value) -> Result<Value, ErrorKind> { let placeholder = hash_placeholder( input .to_str() @@ -224,29 +223,28 @@ mod derivation_builtins { /// This is considered an internal function, users usually want to /// use the higher-level `builtins.derivation` instead. #[builtin("derivationStrict")] - fn builtin_derivation_strict( + async fn builtin_derivation_strict( state: Rc<RefCell<KnownPaths>>, - vm: &mut VM, + co: GenCo, input: Value, ) -> Result<Value, ErrorKind> { let input = input.to_attrs()?; - let name = input - .select_required("name")? - .force(vm)? + let name = generators::request_force(&co, input.select_required("name")?.clone()) + .await .to_str() .context("determining derivation name")?; // Check whether attributes should be passed as a JSON file. // TODO: the JSON serialisation has to happen here. if let Some(sa) = input.select(STRUCTURED_ATTRS) { - if sa.force(vm)?.as_bool()? { + if generators::request_force(&co, sa.clone()).await.as_bool()? { return Err(ErrorKind::NotImplemented(STRUCTURED_ATTRS)); } } // Check whether null attributes should be ignored or passed through. let ignore_nulls = match input.select(IGNORE_NULLS) { - Some(b) => b.force(vm)?.as_bool()?, + Some(b) => generators::request_force(&co, b.clone()).await.as_bool()?, None => false, }; @@ -254,37 +252,45 @@ mod derivation_builtins { drv.outputs.insert("out".to_string(), Default::default()); // Configure fixed-output derivations if required. + + async fn select_string( + co: &GenCo, + attrs: &NixAttrs, + key: &str, + ) -> Result<Option<String>, ErrorKind> { + if let Some(attr) = attrs.select(key) { + return Ok(Some(strong_coerce_to_string(co, attr.clone()).await?)); + } + + Ok(None) + } + populate_output_configuration( &mut drv, - input - .select("outputHash") - .map(|v| strong_coerce_to_string(vm, v, "evaluating the `outputHash` parameter")) - .transpose()?, - input - .select("outputHashAlgo") - .map(|v| { - strong_coerce_to_string(vm, v, "evaluating the `outputHashAlgo` parameter") - }) - .transpose()?, - input - .select("outputHashMode") - .map(|v| { - strong_coerce_to_string(vm, v, "evaluating the `outputHashMode` parameter") - }) - .transpose()?, + select_string(&co, &input, "outputHash") + .await + .context("evaluating the `outputHash` parameter")?, + select_string(&co, &input, "outputHashAlgo") + .await + .context("evaluating the `outputHashAlgo` parameter")?, + select_string(&co, &input, "outputHashMode") + .await + .context("evaluating the `outputHashMode` parameter")?, )?; for (name, value) in input.into_iter_sorted() { - if ignore_nulls && matches!(*value.force(vm)?, Value::Null) { + let value = generators::request_force(&co, value).await; + if ignore_nulls && matches!(value, Value::Null) { continue; } - let val_str = strong_coerce_to_string(vm, &value, "evaluating derivation attributes")?; + let val_str = strong_coerce_to_string(&co, value.clone()).await?; // handle_derivation_parameters tells us whether the // argument should be added to the environment; continue // to the next one otherwise - if !handle_derivation_parameters(&mut drv, vm, name.as_str(), &value, &val_str)? { + if !handle_derivation_parameters(&mut drv, &co, name.as_str(), &value, &val_str).await? + { continue; } @@ -375,9 +381,9 @@ mod derivation_builtins { } #[builtin("toFile")] - fn builtin_to_file( + async fn builtin_to_file( state: Rc<RefCell<KnownPaths>>, - _: &mut VM, + co: GenCo, name: Value, content: Value, ) -> Result<Value, ErrorKind> { @@ -421,247 +427,251 @@ mod tests { use super::*; use tvix_eval::observer::NoOpObserver; - static mut OBSERVER: NoOpObserver = NoOpObserver {}; - - // Creates a fake VM for tests, which can *not* actually be - // used to force (most) values but can satisfy the type - // parameter. - fn fake_vm() -> VM<'static> { - // safe because accessing the observer doesn't actually do anything - unsafe { - VM::new( - Default::default(), - Box::new(tvix_eval::DummyIO), - &mut OBSERVER, - Default::default(), - ) - } - } - - #[test] - fn populate_outputs_ok() { - let mut vm = fake_vm(); - let mut drv = Derivation::default(); - drv.outputs.insert("out".to_string(), Default::default()); - - let outputs = NixList::construct( - 2, - vec![Value::String("foo".into()), Value::String("bar".into())], - ); - - populate_outputs(&mut vm, &mut drv, outputs).expect("populate_outputs should succeed"); - - assert_eq!(drv.outputs.len(), 2); - assert!(drv.outputs.contains_key("bar")); - assert!(drv.outputs.contains_key("foo")); - } - - #[test] - fn populate_outputs_duplicate() { - let mut vm = fake_vm(); - let mut drv = Derivation::default(); - drv.outputs.insert("out".to_string(), Default::default()); - - let outputs = NixList::construct( - 2, - vec![Value::String("foo".into()), Value::String("foo".into())], - ); - - populate_outputs(&mut vm, &mut drv, outputs) - .expect_err("supplying duplicate outputs should fail"); - } - - #[test] - fn populate_inputs_empty() { - let mut drv = Derivation::default(); - let paths = KnownPaths::default(); - let inputs = vec![]; - - populate_inputs(&mut drv, &paths, inputs); - - assert!(drv.input_sources.is_empty()); - assert!(drv.input_derivations.is_empty()); - } - - #[test] - fn populate_inputs_all() { - let mut drv = Derivation::default(); - - let mut paths = KnownPaths::default(); - paths.plain("/nix/store/fn7zvafq26f0c8b17brs7s95s10ibfzs-foo"); - paths.drv( - "/nix/store/aqffiyqx602lbam7n1zsaz3yrh6v08pc-bar.drv", - &["out"], - ); - paths.output( - "/nix/store/zvpskvjwi72fjxg0vzq822sfvq20mq4l-bar", - "out", - "/nix/store/aqffiyqx602lbam7n1zsaz3yrh6v08pc-bar.drv", - ); - - let inputs = vec![ - "/nix/store/fn7zvafq26f0c8b17brs7s95s10ibfzs-foo".into(), - "/nix/store/aqffiyqx602lbam7n1zsaz3yrh6v08pc-bar.drv".into(), - "/nix/store/zvpskvjwi72fjxg0vzq822sfvq20mq4l-bar".into(), - ]; - - populate_inputs(&mut drv, &paths, inputs); - - assert_eq!(drv.input_sources.len(), 1); - assert!(drv - .input_sources - .contains("/nix/store/fn7zvafq26f0c8b17brs7s95s10ibfzs-foo")); - - assert_eq!(drv.input_derivations.len(), 1); - assert!(drv - .input_derivations - .contains_key("/nix/store/aqffiyqx602lbam7n1zsaz3yrh6v08pc-bar.drv")); - } - - #[test] - fn populate_output_config_std() { - let mut drv = Derivation::default(); - - populate_output_configuration(&mut drv, None, None, None) - .expect("populate_output_configuration() should succeed"); - - assert_eq!(drv, Derivation::default(), "derivation should be unchanged"); - } - - #[test] - fn populate_output_config_fod() { - let mut drv = Derivation::default(); - drv.outputs.insert("out".to_string(), Default::default()); - - populate_output_configuration( - &mut drv, - Some("0000000000000000000000000000000000000000000000000000000000000000".into()), - Some("sha256".into()), - None, - ) - .expect("populate_output_configuration() should succeed"); - - let expected = Hash { - algo: "sha256".into(), - digest: "0000000000000000000000000000000000000000000000000000000000000000".into(), - }; - - assert_eq!(drv.outputs["out"].hash, Some(expected)); - } - - #[test] - fn populate_output_config_fod_recursive() { - let mut drv = Derivation::default(); - drv.outputs.insert("out".to_string(), Default::default()); - - populate_output_configuration( - &mut drv, - Some("0000000000000000000000000000000000000000000000000000000000000000".into()), - Some("sha256".into()), - Some("recursive".into()), - ) - .expect("populate_output_configuration() should succeed"); - - let expected = Hash { - algo: "r:sha256".into(), - digest: "0000000000000000000000000000000000000000000000000000000000000000".into(), - }; - - assert_eq!(drv.outputs["out"].hash, Some(expected)); - } - - #[test] - /// hash_algo set to sha256, but SRI hash passed - fn populate_output_config_flat_sri_sha256() { - let mut drv = Derivation::default(); - drv.outputs.insert("out".to_string(), Default::default()); - - populate_output_configuration( - &mut drv, - Some("sha256-swapHA/ZO8QoDPwumMt6s5gf91oYe+oyk4EfRSyJqMg=".into()), - Some("sha256".into()), - Some("flat".into()), - ) - .expect("populate_output_configuration() should succeed"); - - let expected = Hash { - algo: "sha256".into(), - digest: "b306a91c0fd93bc4280cfc2e98cb7ab3981ff75a187bea3293811f452c89a8c8".into(), // lower hex - }; - - assert_eq!(drv.outputs["out"].hash, Some(expected)); - } - - #[test] - /// hash_algo set to empty string, SRI hash passed - fn populate_output_config_flat_sri() { - let mut drv = Derivation::default(); - drv.outputs.insert("out".to_string(), Default::default()); - - populate_output_configuration( - &mut drv, - Some("sha256-s6JN6XqP28g1uYMxaVAQMLiXcDG8tUs7OsE3QPhGqzA=".into()), - Some("".into()), - Some("flat".into()), - ) - .expect("populate_output_configuration() should succeed"); - - let expected = Hash { - algo: "sha256".into(), - digest: "b3a24de97a8fdbc835b9833169501030b8977031bcb54b3b3ac13740f846ab30".into(), // lower hex - }; - - assert_eq!(drv.outputs["out"].hash, Some(expected)); - } - - #[test] - fn handle_outputs_parameter() { - let mut vm = fake_vm(); - let mut drv = Derivation::default(); - drv.outputs.insert("out".to_string(), Default::default()); - - let outputs = Value::List(NixList::construct( - 2, - vec![Value::String("foo".into()), Value::String("bar".into())], - )); - let outputs_str = outputs - .coerce_to_string(CoercionKind::Strong, &mut vm) - .unwrap(); - - handle_derivation_parameters(&mut drv, &mut vm, "outputs", &outputs, outputs_str.as_str()) - .expect("handling 'outputs' parameter should succeed"); - - assert_eq!(drv.outputs.len(), 2); - assert!(drv.outputs.contains_key("bar")); - assert!(drv.outputs.contains_key("foo")); - } - - #[test] - fn handle_args_parameter() { - let mut vm = fake_vm(); - let mut drv = Derivation::default(); - - let args = Value::List(NixList::construct( - 3, - vec![ - Value::String("--foo".into()), - Value::String("42".into()), - Value::String("--bar".into()), - ], - )); - - let args_str = args - .coerce_to_string(CoercionKind::Strong, &mut vm) - .unwrap(); - - handle_derivation_parameters(&mut drv, &mut vm, "args", &args, args_str.as_str()) - .expect("handling 'args' parameter should succeed"); - - assert_eq!( - drv.arguments, - vec!["--foo".to_string(), "42".to_string(), "--bar".to_string()] - ); - } + // TODO: These tests are commented out because we do not have + // scaffolding to drive generators during testing at the moment. + + // static mut OBSERVER: NoOpObserver = NoOpObserver {}; + + // // Creates a fake VM for tests, which can *not* actually be + // // used to force (most) values but can satisfy the type + // // parameter. + // fn fake_vm() -> VM<'static> { + // // safe because accessing the observer doesn't actually do anything + // unsafe { + // VM::new( + // Default::default(), + // Box::new(tvix_eval::DummyIO), + // &mut OBSERVER, + // Default::default(), + // todo!(), + // ) + // } + // } + + // #[test] + // fn populate_outputs_ok() { + // let mut vm = fake_vm(); + // let mut drv = Derivation::default(); + // drv.outputs.insert("out".to_string(), Default::default()); + + // let outputs = NixList::construct( + // 2, + // vec![Value::String("foo".into()), Value::String("bar".into())], + // ); + + // populate_outputs(&mut vm, &mut drv, outputs).expect("populate_outputs should succeed"); + + // assert_eq!(drv.outputs.len(), 2); + // assert!(drv.outputs.contains_key("bar")); + // assert!(drv.outputs.contains_key("foo")); + // } + + // #[test] + // fn populate_outputs_duplicate() { + // let mut vm = fake_vm(); + // let mut drv = Derivation::default(); + // drv.outputs.insert("out".to_string(), Default::default()); + + // let outputs = NixList::construct( + // 2, + // vec![Value::String("foo".into()), Value::String("foo".into())], + // ); + + // populate_outputs(&mut vm, &mut drv, outputs) + // .expect_err("supplying duplicate outputs should fail"); + // } + + // #[test] + // fn populate_inputs_empty() { + // let mut drv = Derivation::default(); + // let paths = KnownPaths::default(); + // let inputs = vec![]; + + // populate_inputs(&mut drv, &paths, inputs); + + // assert!(drv.input_sources.is_empty()); + // assert!(drv.input_derivations.is_empty()); + // } + + // #[test] + // fn populate_inputs_all() { + // let mut drv = Derivation::default(); + + // let mut paths = KnownPaths::default(); + // paths.plain("/nix/store/fn7zvafq26f0c8b17brs7s95s10ibfzs-foo"); + // paths.drv( + // "/nix/store/aqffiyqx602lbam7n1zsaz3yrh6v08pc-bar.drv", + // &["out"], + // ); + // paths.output( + // "/nix/store/zvpskvjwi72fjxg0vzq822sfvq20mq4l-bar", + // "out", + // "/nix/store/aqffiyqx602lbam7n1zsaz3yrh6v08pc-bar.drv", + // ); + + // let inputs = vec![ + // "/nix/store/fn7zvafq26f0c8b17brs7s95s10ibfzs-foo".into(), + // "/nix/store/aqffiyqx602lbam7n1zsaz3yrh6v08pc-bar.drv".into(), + // "/nix/store/zvpskvjwi72fjxg0vzq822sfvq20mq4l-bar".into(), + // ]; + + // populate_inputs(&mut drv, &paths, inputs); + + // assert_eq!(drv.input_sources.len(), 1); + // assert!(drv + // .input_sources + // .contains("/nix/store/fn7zvafq26f0c8b17brs7s95s10ibfzs-foo")); + + // assert_eq!(drv.input_derivations.len(), 1); + // assert!(drv + // .input_derivations + // .contains_key("/nix/store/aqffiyqx602lbam7n1zsaz3yrh6v08pc-bar.drv")); + // } + + // #[test] + // fn populate_output_config_std() { + // let mut drv = Derivation::default(); + + // populate_output_configuration(&mut drv, None, None, None) + // .expect("populate_output_configuration() should succeed"); + + // assert_eq!(drv, Derivation::default(), "derivation should be unchanged"); + // } + + // #[test] + // fn populate_output_config_fod() { + // let mut drv = Derivation::default(); + // drv.outputs.insert("out".to_string(), Default::default()); + + // populate_output_configuration( + // &mut drv, + // Some("0000000000000000000000000000000000000000000000000000000000000000".into()), + // Some("sha256".into()), + // None, + // ) + // .expect("populate_output_configuration() should succeed"); + + // let expected = Hash { + // algo: "sha256".into(), + // digest: "0000000000000000000000000000000000000000000000000000000000000000".into(), + // }; + + // assert_eq!(drv.outputs["out"].hash, Some(expected)); + // } + + // #[test] + // fn populate_output_config_fod_recursive() { + // let mut drv = Derivation::default(); + // drv.outputs.insert("out".to_string(), Default::default()); + + // populate_output_configuration( + // &mut drv, + // Some("0000000000000000000000000000000000000000000000000000000000000000".into()), + // Some("sha256".into()), + // Some("recursive".into()), + // ) + // .expect("populate_output_configuration() should succeed"); + + // let expected = Hash { + // algo: "r:sha256".into(), + // digest: "0000000000000000000000000000000000000000000000000000000000000000".into(), + // }; + + // assert_eq!(drv.outputs["out"].hash, Some(expected)); + // } + + // #[test] + // /// hash_algo set to sha256, but SRI hash passed + // fn populate_output_config_flat_sri_sha256() { + // let mut drv = Derivation::default(); + // drv.outputs.insert("out".to_string(), Default::default()); + + // populate_output_configuration( + // &mut drv, + // Some("sha256-swapHA/ZO8QoDPwumMt6s5gf91oYe+oyk4EfRSyJqMg=".into()), + // Some("sha256".into()), + // Some("flat".into()), + // ) + // .expect("populate_output_configuration() should succeed"); + + // let expected = Hash { + // algo: "sha256".into(), + // digest: "b306a91c0fd93bc4280cfc2e98cb7ab3981ff75a187bea3293811f452c89a8c8".into(), // lower hex + // }; + + // assert_eq!(drv.outputs["out"].hash, Some(expected)); + // } + + // #[test] + // /// hash_algo set to empty string, SRI hash passed + // fn populate_output_config_flat_sri() { + // let mut drv = Derivation::default(); + // drv.outputs.insert("out".to_string(), Default::default()); + + // populate_output_configuration( + // &mut drv, + // Some("sha256-s6JN6XqP28g1uYMxaVAQMLiXcDG8tUs7OsE3QPhGqzA=".into()), + // Some("".into()), + // Some("flat".into()), + // ) + // .expect("populate_output_configuration() should succeed"); + + // let expected = Hash { + // algo: "sha256".into(), + // digest: "b3a24de97a8fdbc835b9833169501030b8977031bcb54b3b3ac13740f846ab30".into(), // lower hex + // }; + + // assert_eq!(drv.outputs["out"].hash, Some(expected)); + // } + + // #[test] + // fn handle_outputs_parameter() { + // let mut vm = fake_vm(); + // let mut drv = Derivation::default(); + // drv.outputs.insert("out".to_string(), Default::default()); + + // let outputs = Value::List(NixList::construct( + // 2, + // vec![Value::String("foo".into()), Value::String("bar".into())], + // )); + // let outputs_str = outputs + // .coerce_to_string(CoercionKind::Strong, &mut vm) + // .unwrap(); + + // handle_derivation_parameters(&mut drv, &mut vm, "outputs", &outputs, outputs_str.as_str()) + // .expect("handling 'outputs' parameter should succeed"); + + // assert_eq!(drv.outputs.len(), 2); + // assert!(drv.outputs.contains_key("bar")); + // assert!(drv.outputs.contains_key("foo")); + // } + + // #[test] + // fn handle_args_parameter() { + // let mut vm = fake_vm(); + // let mut drv = Derivation::default(); + + // let args = Value::List(NixList::construct( + // 3, + // vec![ + // Value::String("--foo".into()), + // Value::String("42".into()), + // Value::String("--bar".into()), + // ], + // )); + + // let args_str = args + // .coerce_to_string(CoercionKind::Strong, &mut vm) + // .unwrap(); + + // handle_derivation_parameters(&mut drv, &mut vm, "args", &args, args_str.as_str()) + // .expect("handling 'args' parameter should succeed"); + + // assert_eq!( + // drv.arguments, + // vec!["--foo".to_string(), "42".to_string(), "--bar".to_string()] + // ); + // } #[test] fn builtins_placeholder_hashes() { diff --git a/tvix/cli/src/main.rs b/tvix/cli/src/main.rs index 447bb13c714e..0942c128ecf7 100644 --- a/tvix/cli/src/main.rs +++ b/tvix/cli/src/main.rs @@ -12,7 +12,7 @@ use clap::Parser; use known_paths::KnownPaths; use rustyline::{error::ReadlineError, Editor}; use tvix_eval::observer::{DisassemblingObserver, TracingObserver}; -use tvix_eval::{Builtin, BuiltinArgument, Value, VM}; +use tvix_eval::{Builtin, Value}; #[derive(Parser)] struct Args { |