resholve ensures shell script dependencies are declared, present, and don't break or shift if PATH changes. It helps turn shell scripts and libraries into reliable, self-contained packages you can use as building blocks.
resholve treats references to external commands (and sourced scripts) as build-blocking errors until you declare the dependency. Once they're all declared, it rewrites the references to absolute paths.
Comparisons:
- a linker for bash scripts
- patchelf for shell scripts
Convinced? Jump to the Quickstart. Otherwise:
- If you want to understand what problems resholve addresses, read the next section.
- If you want to see invocations and output, the Demos document is a good place to start.
I built resholve so Nix/Nixpkgs can have great shell packaging.
In the Nix ecosystem, resholve helps us:
- discover and declare dependencies at package time instead of after runtime failures
- keep unexpected versions of an executable or script from causing undefined behavior
- avoid polluting PATH with all of a script's dependencies, which also means
- no conflicts between tools different scripts need on PATH
- no conflicts with other packages a user expects on PATH
- no implicit dependency on the content of fragile rc/profile scripts
- work directly with "normal" shell scripts
- no polluting source scripts with template variables/syntax
- no inlining shell scripts to readily inject absolute paths
- no fragile .patch files
- no fragile sed/awk text substitutions that might over-match
Note: resholve is a generic command-line program. Other ecosystems/toolchains could use it for similar benefits.
If you're packaging Shell with Nix, you'll want to use resholve's Nix API.
You can also use resholve's CLI directly.
Note: resholve is only packaged with Nix for now. Whether you use the CLI or the Nix API, you'll need to have Nix installed.
Since resholve's Nix API/builders are included in nixpkgs, most Nix users can jump right in. Two good places to start:
-
API reference: NixOS/nixpkgs: pkgs/development/misc/resholve/README.md.
Tip: If you're an experienced packager or write a lot of Shell, you may also want to read through resholve's Nix demo. It's terse, but it ~proves that Nix + resholve enable us to build shell packages that are so well-contained we can safely compose them even when they have conflicting dependencies.
resholve has an explicit-is-better-than-implicit philosophy, so its CLI is pretty verbose. You can use it directly, but it's more or less assumed that you'll use it through scripts or packaging toolchains. (You may not need to learn the CLI unless you're using it on scripts you can't build Nix expressions for, integrating it with other toolchains, packaging it, or contributing to resholve itself.)
If you're new to resholve, start with the demo shell.
If you just want resholve itself (no preconfigured demo environment), use the instructions for building/installing a development version or a stable version.
Note: However you obtain the resholve CLI, check
man resholve
for CLI usage.
The demo shell pulls in prerequisites for resholve's command-line demo. This demo illustrates resholve's basic features, invocation patterns, output, error messages, exit statuses, and how resholving a script changes it.
The easy way to run the demo is with Nix's experimental nix-command
and flakes
features enabled. The following command will load the demo shell environment and print more information on how to proceed:
nix develop github:abathur/resholve
Note: There's more on the demo's output format and a plaintext copy of the output in the Demos document.
Traditional `nix-shell` instructions
You can also use the demo via nix-shell
if you clone the repository:
git clone https://github.com/abathur/resholve.git
cd resholve
nix-shell
resholve's master
branch is fairly stable. If you have Nix's experimental nix-command and flakes features enabled, you should be able to use it with any of the below:
# without cloning
nix build github:abathur/resholve
nix shell github:abathur/resholve
# from the root of a resholve checkout
nix build
nix shell
Traditional `nix-build` instructions
You can build resholve from a checkout with the traditional CLI:
git clone https://github.com/abathur/resholve.git
cd resholve
nix-build
Caution: The same isn't quite true of
nix-shell
, which will load the demo shell. This might be fine for your purposes, but keep in mind that it pre-populates some environment variables just for the demo.
You can get a cached stable version of resholve from Nixpkgs:
# new CLI/flakes
NIXPKGS_ALLOW_INSECURE=1 nix shell --impure nixpkgs#resholve
NIXPKGS_ALLOW_INSECURE=1 nix shell --impure github:nixos/nixpkgs#resholve
# traditional CLI
NIXPKGS_ALLOW_INSECURE=1 nix-shell -p resholve
Note: the high-quality shell parser resholve builds on uses python2.
nixpkgs
has taken steps to protect users from accidental run-time use of python2. resholve will still work at build-time for use in Nix packages. You only need theNIXPKGS_ALLOW_INSECURE
env to use nixpkgs' copy of resholve in a shell. To be safe, don't run resholve on untrusted input.(This isn't permanent. resholve should eventually be able to move to python3.)
If you're looking to improve resholve or the broader ecosystem (resholve + binlore), feel free to open an issue, reach out to me on Matrix, or send an email.
There's much to do. Some of it is simple and straightforward. Some of it's creative and green-field. Some of it's difficult. I've focused on primary work at the expense of documenting an onramp for other contributors--but I'm happy to help you get started and use the opportunity to build the ramp as we go.
You can rebuild resholve by following the instructions for building a development version. resholve's tests don't run during the build, so you should also validate the codebase by running make ci
.
Note: Some documentation updates entail updating generated files. I use
make update
for this, but this will also usually cause some churn intimings.md
anddemos.md
. It's generally fine to skip committing those changes if they aren't meaningful. Feel free to bug me if you aren't comfortable doing this or need feedback.
- resholve leverages the Oil shell's OSH parser) and wouldn't be feasible without Andy Chu's excellent work on that project.
- The manpage is currently the canonical reference to resholve's options and behavior; the only online format is plaintext. See #19.
-
My short-term goal is to support packaging shell projects for the Nix package manager. As such, the current build process depends on Nix.
If you're interested in using resholve without Nix, I'll appreciate contributions that fill in build support for other environments.
Because Shell is a very flexible, tricky language, resholve necessarily focuses on low-hanging-fruit tasks. Some of these will inevitably be supported over time, while others may stay out of reach. Please open an issue if you find a new one.
The main areas I'm currently aware of:
-
In any Nix build, resholve now blocks resolution of some fundamental external utilities (such as su and sudo) that use run wrappers in NixOS. See #29 for more.
-
Because resholve makes assumptions about the behavior of some builtins in order to resolve scripts, it blocks if it looks like one is overridden by a function or alias. (This can likely be relaxed once I have a better sense of who/what/when/where/why/how these are overridden).
-
resholve doesn't have robust handling of variables that get executed like commands (this includes things like
eval $variable
and"$run_as_command"
and$GIT_COMMAND status
). There's some room for improvement here, but I also want to manage expectations because some cases are completely intractable without evaluating the script.- there's a first-level complication about seeing-through the variables themselves
- and then a second-level issue with seeing-through double-quoted strings (for example, an eval )
-
fc -s
has interesting behavior that makes it hard to account for:- If I run
ls /tmp
and thenecho blah
and thenfc -s 'ls'
, it'll re-run that previous ls command.- If resholve rewrites ls to an absolute path, the fc -s command won't work as expected unless we also expand the ls inside the fc command.
- If I run
ls /tmp
and thenfc -s tmp=sbin
, it'll runls /sbin
; if I then runfc -s ls=stat
, it runsstat /sbin
.- Accounting for this will be hard. There are no strict semantics--it can substitute arbitrary text which could be executable names or arguments or even just parts of them. We'd have to be very explicitly parsing things out, or maybe extracting them into a mock test and running it, to know what to do.
For now this is unaddressed. It probably makes the most sense to just raise a warning about not handling fc and link to a doc or issue about it, but I'm inclined to put this off until someone asks about it.
- If I run