2019-09-10 09:50:09 +00:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
2020-03-02 11:18:01 +00:00
|
|
|
# Needed to fail on must_get_env()
|
|
|
|
set -e
|
|
|
|
|
2019-09-10 09:50:09 +00:00
|
|
|
GIT_ROOT=$(cd "${BASH_SOURCE%/*}" && git rev-parse --show-toplevel)
|
2020-03-02 11:18:01 +00:00
|
|
|
source "${GIT_ROOT}/scripts/colors.sh"
|
|
|
|
|
|
|
|
function must_get_env() {
|
2020-10-06 11:54:28 +00:00
|
|
|
declare -n VAR_VALUE="$1"
|
|
|
|
if [[ -n "${VAR_VALUE}" ]]; then
|
|
|
|
echo "${VAR_VALUE}"
|
2020-03-02 11:18:01 +00:00
|
|
|
return
|
|
|
|
fi
|
2020-10-06 11:54:28 +00:00
|
|
|
echo -e "${RED}No required env variable:${RST} ${BLD}${!VAR_VALUE}${RST}" 1>&2
|
2020-03-02 11:18:01 +00:00
|
|
|
exit 1
|
|
|
|
}
|
2019-09-10 09:50:09 +00:00
|
|
|
|
2020-03-13 12:01:17 +00:00
|
|
|
function append_env_export() {
|
2020-10-06 11:54:28 +00:00
|
|
|
VAR_NAME=${1}
|
|
|
|
VAR_VALUE=$(must_get_env "${VAR_NAME}")
|
|
|
|
echo "export ${VAR_NAME}=\"${VAR_VALUE}\";" >> "${SECRETS_FILE_PATH}"
|
2020-03-13 12:01:17 +00:00
|
|
|
}
|
|
|
|
|
2020-01-13 14:28:40 +00:00
|
|
|
config=''
|
2021-02-25 10:45:33 +00:00
|
|
|
if [[ -n "${STATUS_GO_SRC_OVERRIDE}" ]]; then
|
2020-01-13 14:28:40 +00:00
|
|
|
config+="status-im.status-go.src-override=\"${STATUS_GO_SRC_OVERRIDE}\";"
|
2020-01-08 14:41:07 +00:00
|
|
|
fi
|
2021-09-17 16:04:39 +00:00
|
|
|
config+="status-im.commit-hash=\"$(git rev-parse --verify HEAD)\";"
|
2020-03-02 11:18:01 +00:00
|
|
|
config+="status-im.build-type=\"$(must_get_env BUILD_TYPE)\";"
|
2020-04-26 12:40:06 +00:00
|
|
|
config+="status-im.build-number=\"$(must_get_env BUILD_NUMBER)\";"
|
|
|
|
config+="status-im.android.abi-split=\"$(must_get_env ANDROID_ABI_SPLIT)\";"
|
|
|
|
config+="status-im.android.abi-include=\"$(must_get_env ANDROID_ABI_INCLUDE)\";"
|
2020-03-13 12:01:17 +00:00
|
|
|
nixOpts=()
|
|
|
|
|
2020-10-06 11:54:28 +00:00
|
|
|
# We create if now so the trap knows its location
|
|
|
|
export SECRETS_FILE_PATH=$(mktemp)
|
|
|
|
chmod 644 ${SECRETS_FILE_PATH}
|
|
|
|
# If secrets file was created we want to remove it.
|
|
|
|
trap "rm -vf ${SECRETS_FILE_PATH}" EXIT ERR INT QUIT
|
2022-04-22 08:20:01 +00:00
|
|
|
|
2020-10-06 11:54:28 +00:00
|
|
|
# Secrets like this can't be passed via args or they end up in derivation.
|
2022-04-22 08:20:01 +00:00
|
|
|
if [[ -n "${INFURA_TOKEN}" ]]; then append_env_export 'INFURA_TOKEN'; fi
|
|
|
|
if [[ -n "${OPENSEA_API_KEY}" ]]; then append_env_export 'OPENSEA_API_KEY'; fi
|
2022-02-14 11:57:33 +00:00
|
|
|
|
2020-10-06 11:54:28 +00:00
|
|
|
# If no secrets were passed there's no need to pass the 'secretsFile'.
|
|
|
|
if [[ -s "${SECRETS_FILE_PATH}" ]]; then
|
2022-09-20 10:09:52 +00:00
|
|
|
nixOpts+=("--option" "extra-sandbox-paths" "${SECRETS_FILE_PATH}")
|
2020-06-21 09:18:59 +00:00
|
|
|
nixOpts+=("--argstr" "secretsFile" "${SECRETS_FILE_PATH}")
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Used by Clojure at compile time to include JS modules
|
2020-04-26 12:40:06 +00:00
|
|
|
nixOpts+=("--argstr" "buildEnv" "$(must_get_env BUILD_ENV)")
|
2019-09-10 09:50:09 +00:00
|
|
|
|
2022-08-09 18:49:59 +00:00
|
|
|
# On Darwin we hit a sandbox serialization limit of 65535.
|
|
|
|
# https://github.com/NixOS/nix/issues/4119
|
2020-04-14 15:33:11 +00:00
|
|
|
if [[ "$(uname -s)" =~ Darwin ]]; then
|
2022-08-09 18:49:59 +00:00
|
|
|
nixOpts+=("--option" "build-use-sandbox" "false")
|
2019-09-10 09:50:09 +00:00
|
|
|
else
|
2022-08-09 18:49:59 +00:00
|
|
|
nixOpts+=("--option" "build-use-sandbox" "true")
|
2019-09-10 09:50:09 +00:00
|
|
|
fi
|
|
|
|
|
2020-04-26 12:40:06 +00:00
|
|
|
nixOpts+=("--arg" "config" "{${config}}")
|
2020-03-13 12:01:17 +00:00
|
|
|
|
2022-07-25 20:38:41 +00:00
|
|
|
"${GIT_ROOT}/nix/scripts/build.sh" targets.mobile.android.release "${nixOpts[@]}"
|