2019-09-10 09:50:09 +00:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
2020-03-02 11:18:01 +00:00
|
|
|
# Needed to fail on must_get_env()
|
|
|
|
set -e
|
|
|
|
|
2019-09-10 09:50:09 +00:00
|
|
|
GIT_ROOT=$(cd "${BASH_SOURCE%/*}" && git rev-parse --show-toplevel)
|
2020-03-02 11:18:01 +00:00
|
|
|
source "${GIT_ROOT}/scripts/colors.sh"
|
|
|
|
|
|
|
|
function must_get_env() {
|
2020-10-06 11:54:28 +00:00
|
|
|
declare -n VAR_VALUE="$1"
|
|
|
|
if [[ -n "${VAR_VALUE}" ]]; then
|
|
|
|
echo "${VAR_VALUE}"
|
2020-03-02 11:18:01 +00:00
|
|
|
return
|
|
|
|
fi
|
2020-10-06 11:54:28 +00:00
|
|
|
echo -e "${RED}No required env variable:${RST} ${BLD}${!VAR_VALUE}${RST}" 1>&2
|
2020-03-02 11:18:01 +00:00
|
|
|
exit 1
|
|
|
|
}
|
2019-09-10 09:50:09 +00:00
|
|
|
|
2020-03-13 12:01:17 +00:00
|
|
|
function append_env_export() {
|
2020-10-06 11:54:28 +00:00
|
|
|
VAR_NAME=${1}
|
|
|
|
VAR_VALUE=$(must_get_env "${VAR_NAME}")
|
|
|
|
echo "export ${VAR_NAME}=\"${VAR_VALUE}\";" >> "${SECRETS_FILE_PATH}"
|
2020-03-13 12:01:17 +00:00
|
|
|
}
|
|
|
|
nixOpts=()
|
|
|
|
|
2020-10-06 11:54:28 +00:00
|
|
|
# We create if now so the trap knows its location
|
|
|
|
export SECRETS_FILE_PATH=$(mktemp)
|
|
|
|
chmod 644 ${SECRETS_FILE_PATH}
|
|
|
|
# If secrets file was created we want to remove it.
|
|
|
|
trap "rm -vf ${SECRETS_FILE_PATH}" EXIT ERR INT QUIT
|
2022-04-22 08:20:01 +00:00
|
|
|
|
2023-05-09 15:45:09 +00:00
|
|
|
# Names of variables containing secrets to save in env file.
|
|
|
|
SECRETS_ENV_VARS=(
|
2024-02-02 14:14:00 +00:00
|
|
|
'ALCHEMY_ETHEREUM_MAINNET_TOKEN'
|
|
|
|
'ALCHEMY_ETHEREUM_GOERLI_TOKEN'
|
|
|
|
'ALCHEMY_ETHEREUM_SEPOLIA_TOKEN'
|
2023-05-09 15:45:09 +00:00
|
|
|
'ALCHEMY_ARBITRUM_GOERLI_TOKEN'
|
|
|
|
'ALCHEMY_ARBITRUM_MAINNET_TOKEN'
|
2024-02-02 14:14:00 +00:00
|
|
|
'ALCHEMY_ARBITRUM_SEPOLIA_TOKEN'
|
2023-05-09 15:45:09 +00:00
|
|
|
'ALCHEMY_OPTIMISM_GOERLI_TOKEN'
|
|
|
|
'ALCHEMY_OPTIMISM_MAINNET_TOKEN'
|
2024-02-02 14:14:00 +00:00
|
|
|
'ALCHEMY_OPTIMISM_SEPOLIA_TOKEN'
|
|
|
|
'RARIBLE_MAINNET_API_KEY'
|
|
|
|
'RARIBLE_TESTNET_API_KEY'
|
2023-05-09 15:45:09 +00:00
|
|
|
'INFURA_TOKEN'
|
|
|
|
'INFURA_TOKEN_SECRET'
|
|
|
|
'OPENSEA_API_KEY'
|
2024-07-04 15:45:00 +00:00
|
|
|
'MIXPANEL_APP_ID'
|
|
|
|
'MIXPANEL_TOKEN'
|
2023-05-09 15:45:09 +00:00
|
|
|
'POKT_TOKEN'
|
|
|
|
)
|
|
|
|
|
2020-10-06 11:54:28 +00:00
|
|
|
# Secrets like this can't be passed via args or they end up in derivation.
|
2023-05-09 15:45:09 +00:00
|
|
|
for SECRET_VAR_NAME in "${SECRETS_ENV_VARS[@]}"; do
|
|
|
|
[[ -n "${!SECRET_VAR_NAME}" ]] && append_env_export "${SECRET_VAR_NAME}"
|
|
|
|
done
|
2022-02-14 11:57:33 +00:00
|
|
|
|
2020-10-06 11:54:28 +00:00
|
|
|
# If no secrets were passed there's no need to pass the 'secretsFile'.
|
|
|
|
if [[ -s "${SECRETS_FILE_PATH}" ]]; then
|
2022-09-20 10:09:52 +00:00
|
|
|
nixOpts+=("--option" "extra-sandbox-paths" "${SECRETS_FILE_PATH}")
|
2020-06-21 09:18:59 +00:00
|
|
|
nixOpts+=("--argstr" "secretsFile" "${SECRETS_FILE_PATH}")
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Used by Clojure at compile time to include JS modules
|
2020-04-26 12:40:06 +00:00
|
|
|
nixOpts+=("--argstr" "buildEnv" "$(must_get_env BUILD_ENV)")
|
2019-09-10 09:50:09 +00:00
|
|
|
|
2022-08-09 18:49:59 +00:00
|
|
|
# On Darwin we hit a sandbox serialization limit of 65535.
|
|
|
|
# https://github.com/NixOS/nix/issues/4119
|
2020-04-14 15:33:11 +00:00
|
|
|
if [[ "$(uname -s)" =~ Darwin ]]; then
|
2022-08-09 18:49:59 +00:00
|
|
|
nixOpts+=("--option" "build-use-sandbox" "false")
|
2019-09-10 09:50:09 +00:00
|
|
|
else
|
2022-08-09 18:49:59 +00:00
|
|
|
nixOpts+=("--option" "build-use-sandbox" "true")
|
2019-09-10 09:50:09 +00:00
|
|
|
fi
|
|
|
|
|
2020-03-13 12:01:17 +00:00
|
|
|
|
2024-02-15 08:18:11 +00:00
|
|
|
"${GIT_ROOT}/nix/scripts/build.sh" targets.mobile.android.build "${nixOpts[@]}"
|