|
| 1 | +#!/usr/bin/env bash |
| 2 | +set -euo pipefail |
| 3 | + |
| 4 | +PGRX_VERSION="${1:?Usage: bootstrap.sh <pgrx-version> <rust-version>}" |
| 5 | +RUST_VERSION="${2:?Usage: bootstrap.sh <pgrx-version> <rust-version>}" |
| 6 | +OUTPUT_DIR="${3:-/output}" |
| 7 | + |
| 8 | +echo "=== Bootstrapping pgrx ${PGRX_VERSION} with Rust ${RUST_VERSION} ===" |
| 9 | +echo "" |
| 10 | + |
| 11 | +# Step 1: Compute the crate source hash from crates.io |
| 12 | +echo "--- Step 1: Fetching cargo-pgrx ${PGRX_VERSION} from crates.io ---" |
| 13 | +CRATE_URL="https://static.crates.io/crates/cargo-pgrx/cargo-pgrx-${PGRX_VERSION}.crate" |
| 14 | +STORE_PATH=$(nix-prefetch-url --unpack "${CRATE_URL}" 2>/dev/null) |
| 15 | +CRATE_HASH=$(nix hash to-sri --type sha256 "${STORE_PATH}") |
| 16 | +echo "Crate hash: ${CRATE_HASH}" |
| 17 | +echo "" |
| 18 | + |
| 19 | +# Step 2: Build cargo-pgrx in a minimal flake to extract the cargoHash |
| 20 | +echo "--- Step 2: Computing cargoHash (this builds cargo-pgrx dependencies) ---" |
| 21 | +echo "(This will intentionally fail once to reveal the correct hash)" |
| 22 | +TMPDIR=$(mktemp -d) |
| 23 | + |
| 24 | +cat > "${TMPDIR}/flake.nix" << EOF |
| 25 | +{ |
| 26 | + inputs = { |
| 27 | + nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable"; |
| 28 | + rust-overlay = { |
| 29 | + url = "github:oxalica/rust-overlay"; |
| 30 | + inputs.nixpkgs.follows = "nixpkgs"; |
| 31 | + }; |
| 32 | + }; |
| 33 | + outputs = { nixpkgs, rust-overlay, ... }: |
| 34 | + let |
| 35 | + pkgs = import nixpkgs { |
| 36 | + system = "x86_64-linux"; |
| 37 | + overlays = [ (import rust-overlay) ]; |
| 38 | + }; |
| 39 | + rustToolchain = pkgs.rust-bin.stable."${RUST_VERSION}".default; |
| 40 | + rustPlatform = pkgs.makeRustPlatform { |
| 41 | + cargo = rustToolchain; |
| 42 | + rustc = rustToolchain; |
| 43 | + }; |
| 44 | + in { |
| 45 | + packages.x86_64-linux.default = rustPlatform.buildRustPackage rec { |
| 46 | + pname = "cargo-pgrx"; |
| 47 | + version = "${PGRX_VERSION}"; |
| 48 | + src = pkgs.fetchCrate { |
| 49 | + inherit pname version; |
| 50 | + hash = "${CRATE_HASH}"; |
| 51 | + }; |
| 52 | + cargoHash = ""; |
| 53 | + nativeBuildInputs = [ pkgs.pkg-config ]; |
| 54 | + buildInputs = [ pkgs.openssl ]; |
| 55 | + doCheck = false; |
| 56 | + auditable = false; |
| 57 | + }; |
| 58 | + }; |
| 59 | +} |
| 60 | +EOF |
| 61 | + |
| 62 | +# The build will fail because cargoHash is empty, but it will print the correct hash |
| 63 | +BUILD_OUTPUT=$(nix build "${TMPDIR}#default" -L 2>&1 || true) |
| 64 | + |
| 65 | +# Extract the hash from the error output - try multiple patterns |
| 66 | +CARGO_HASH=$(echo "${BUILD_OUTPUT}" | grep -oP 'got:\s+\K\S+' | head -1 || true) |
| 67 | + |
| 68 | +if [ -z "${CARGO_HASH}" ]; then |
| 69 | + CARGO_HASH=$(echo "${BUILD_OUTPUT}" | grep "got:" | head -1 | sed 's/.*got:[[:space:]]*//' | tr -d ' ' || true) |
| 70 | +fi |
| 71 | + |
| 72 | +rm -rf "${TMPDIR}" |
| 73 | + |
| 74 | +if [ -z "${CARGO_HASH}" ]; then |
| 75 | + echo "ERROR: Could not extract cargoHash from build output." |
| 76 | + echo "Build output (last 40 lines):" |
| 77 | + echo "${BUILD_OUTPUT}" | tail -40 |
| 78 | + exit 1 |
| 79 | +fi |
| 80 | +echo "Cargo hash: ${CARGO_HASH}" |
| 81 | +echo "" |
| 82 | + |
| 83 | +# Step 3: Write result JSON to output directory |
| 84 | +echo "--- Step 3: Writing result to ${OUTPUT_DIR}/result.json ---" |
| 85 | +mkdir -p "${OUTPUT_DIR}" |
| 86 | + |
| 87 | +cat > "${OUTPUT_DIR}/result.json" << JSON |
| 88 | +{ |
| 89 | + "pgrxVersion": "${PGRX_VERSION}", |
| 90 | + "rustVersion": "${RUST_VERSION}", |
| 91 | + "hash": "${CRATE_HASH}", |
| 92 | + "cargoHash": "${CARGO_HASH}" |
| 93 | +} |
| 94 | +JSON |
| 95 | + |
| 96 | +echo "" |
| 97 | +echo "=== Results ===" |
| 98 | +echo "pgrx version: ${PGRX_VERSION}" |
| 99 | +echo "rust version: ${RUST_VERSION}" |
| 100 | +echo "crate hash: ${CRATE_HASH}" |
| 101 | +echo "cargo hash: ${CARGO_HASH}" |
| 102 | +echo "" |
| 103 | +echo "Result written to ${OUTPUT_DIR}/result.json" |
0 commit comments