435 lines
16 KiB
Nix
435 lines
16 KiB
Nix
{
|
|
inputs = {
|
|
attic.url = "github:zhaofengli/attic?ref=main";
|
|
cachix.url = "github:cachix/cachix?ref=master";
|
|
complement = { url = "github:matrix-org/complement?ref=main"; flake = false; };
|
|
crane = { url = "github:ipetkov/crane?ref=master"; };
|
|
fenix = { url = "github:nix-community/fenix?ref=main"; inputs.nixpkgs.follows = "nixpkgs"; };
|
|
flake-compat = { url = "github:edolstra/flake-compat?ref=master"; flake = false; };
|
|
flake-utils.url = "github:numtide/flake-utils?ref=main";
|
|
nix-filter.url = "github:numtide/nix-filter?ref=main";
|
|
nixpkgs.url = "github:NixOS/nixpkgs?ref=nixpkgs-unstable";
|
|
rocksdb = { url = "github:girlbossceo/rocksdb?ref=v9.7.4"; flake = false; };
|
|
liburing = { url = "github:axboe/liburing?ref=master"; flake = false; };
|
|
};
|
|
|
|
outputs = inputs:
|
|
inputs.flake-utils.lib.eachDefaultSystem (system:
|
|
let
|
|
pkgsHost = import inputs.nixpkgs{
|
|
inherit system;
|
|
config.permittedInsecurePackages = [ "olm-3.2.16" ];
|
|
};
|
|
pkgsHostStatic = pkgsHost.pkgsStatic;
|
|
|
|
# The Rust toolchain to use
|
|
toolchain = inputs.fenix.packages.${system}.fromToolchainFile {
|
|
file = ./rust-toolchain.toml;
|
|
|
|
# See also `rust-toolchain.toml`
|
|
sha256 = "sha256-yMuSb5eQPO/bHv+Bcf/US8LVMbf/G/0MSfiPwBhiPpk=";
|
|
};
|
|
|
|
mkScope = pkgs: pkgs.lib.makeScope pkgs.newScope (self: {
|
|
inherit pkgs;
|
|
book = self.callPackage ./nix/pkgs/book {};
|
|
complement = self.callPackage ./nix/pkgs/complement {};
|
|
craneLib = ((inputs.crane.mkLib pkgs).overrideToolchain (_: toolchain));
|
|
inherit inputs;
|
|
main = self.callPackage ./nix/pkgs/main {};
|
|
oci-image = self.callPackage ./nix/pkgs/oci-image {};
|
|
tini = pkgs.tini.overrideAttrs {
|
|
# newer clang/gcc is unhappy with tini-static: <https://3.dog/~strawberry/pb/c8y4>
|
|
patches = [ (pkgs.fetchpatch {
|
|
url = "https://patch-diff.githubusercontent.com/raw/krallin/tini/pull/224.patch";
|
|
hash = "sha256-4bTfAhRyIT71VALhHY13hUgbjLEUyvgkIJMt3w9ag3k=";
|
|
})
|
|
];
|
|
};
|
|
liburing = pkgs.liburing.overrideAttrs {
|
|
# Tests weren't building
|
|
outputs = [ "out" "dev" "man" ];
|
|
buildFlags = [ "library" ];
|
|
src = inputs.liburing;
|
|
};
|
|
rocksdb = (pkgs.rocksdb.override {
|
|
liburing = self.liburing;
|
|
}).overrideAttrs (old: {
|
|
src = inputs.rocksdb;
|
|
version = pkgs.lib.removePrefix
|
|
"v"
|
|
(builtins.fromJSON (builtins.readFile ./flake.lock))
|
|
.nodes.rocksdb.original.ref;
|
|
# we have this already at https://github.com/girlbossceo/rocksdb/commit/a935c0273e1ba44eacf88ce3685a9b9831486155
|
|
# unsetting this so i don't have to revert it and make this nix exclusive
|
|
patches = [];
|
|
cmakeFlags = pkgs.lib.subtractLists
|
|
[
|
|
# no real reason to have snappy, no one uses this
|
|
"-DWITH_SNAPPY=1"
|
|
# we dont need to use ldb or sst_dump (core_tools)
|
|
"-DWITH_CORE_TOOLS=1"
|
|
# we dont need to build rocksdb tests
|
|
"-DWITH_TESTS=1"
|
|
# we use rust-rocksdb via C interface and dont need C++ RTTI
|
|
"-DUSE_RTTI=1"
|
|
]
|
|
old.cmakeFlags
|
|
++ [
|
|
# we dont need to use ldb or sst_dump (core_tools)
|
|
"-DWITH_CORE_TOOLS=0"
|
|
# we dont need trace tools
|
|
"-DWITH_TRACE_TOOLS=0"
|
|
# we dont need to build rocksdb tests
|
|
"-DWITH_TESTS=0"
|
|
# we use rust-rocksdb via C interface and dont need C++ RTTI
|
|
"-DUSE_RTTI=0"
|
|
];
|
|
|
|
# outputs has "tools" which we dont need or use
|
|
outputs = [ "out" ];
|
|
|
|
# preInstall hooks has stuff for messing with ldb/sst_dump which we dont need or use
|
|
preInstall = "";
|
|
});
|
|
});
|
|
|
|
scopeHost = mkScope pkgsHost;
|
|
scopeHostStatic = mkScope pkgsHostStatic;
|
|
scopeCrossLinux = mkScope pkgsHost.pkgsLinux.pkgsStatic;
|
|
mkCrossScope = crossSystem:
|
|
let pkgsCrossStatic = (import inputs.nixpkgs {
|
|
inherit system;
|
|
crossSystem = {
|
|
config = crossSystem;
|
|
};
|
|
}).pkgsStatic;
|
|
in
|
|
mkScope pkgsCrossStatic;
|
|
|
|
mkDevShell = scope: scope.pkgs.mkShell {
|
|
env = scope.main.env // {
|
|
# Rust Analyzer needs to be able to find the path to default crate
|
|
# sources, and it can read this environment variable to do so. The
|
|
# `rust-src` component is required in order for this to work.
|
|
RUST_SRC_PATH = "${toolchain}/lib/rustlib/src/rust/library";
|
|
|
|
# Convenient way to access a pinned version of Complement's source
|
|
# code.
|
|
COMPLEMENT_SRC = inputs.complement.outPath;
|
|
|
|
# Needed for Complement
|
|
CGO_CFLAGS = "-I${scope.pkgs.olm}/include";
|
|
CGO_LDFLAGS = "-L${scope.pkgs.olm}/lib";
|
|
};
|
|
|
|
# Development tools
|
|
packages = [
|
|
# Always use nightly rustfmt because most of its options are unstable
|
|
#
|
|
# This needs to come before `toolchain` in this list, otherwise
|
|
# `$PATH` will have stable rustfmt instead.
|
|
inputs.fenix.packages.${system}.latest.rustfmt
|
|
|
|
toolchain
|
|
]
|
|
++ (with pkgsHost.pkgs; [
|
|
engage
|
|
cargo-audit
|
|
|
|
# Required by hardened-malloc.rs dep
|
|
binutils
|
|
|
|
# Needed for producing Debian packages
|
|
cargo-deb
|
|
|
|
# Needed for CI to check validity of produced Debian packages (dpkg-deb)
|
|
dpkg
|
|
|
|
# Needed for Complement
|
|
go
|
|
|
|
# Needed for our script for Complement
|
|
jq
|
|
|
|
# Needed for finding broken markdown links
|
|
lychee
|
|
|
|
# Needed for linting markdown files
|
|
markdownlint-cli
|
|
|
|
# Useful for editing the book locally
|
|
mdbook
|
|
|
|
# used for rust caching in CI to speed it up
|
|
sccache
|
|
|
|
# needed so we can get rid of gcc and other unused deps that bloat OCI images
|
|
removeReferencesTo
|
|
]
|
|
# liburing is Linux-exclusive
|
|
++ lib.optional stdenv.hostPlatform.isLinux liburing
|
|
# needed to build Rust applications on macOS
|
|
++ lib.optionals stdenv.hostPlatform.isDarwin [
|
|
# https://github.com/NixOS/nixpkgs/issues/206242
|
|
# ld: library not found for -liconv
|
|
libiconv
|
|
# https://stackoverflow.com/questions/69869574/properly-adding-darwin-apple-sdk-to-a-nix-shell
|
|
# https://discourse.nixos.org/t/compile-a-rust-binary-on-macos-dbcrossbar/8612
|
|
pkgsBuildHost.darwin.apple_sdk.frameworks.Security
|
|
])
|
|
++ scope.main.buildInputs
|
|
++ scope.main.propagatedBuildInputs
|
|
++ scope.main.nativeBuildInputs;
|
|
};
|
|
in
|
|
{
|
|
packages = {
|
|
default = scopeHost.main;
|
|
default-debug = scopeHost.main.override {
|
|
profile = "dev";
|
|
# debug build users expect full logs
|
|
disable_release_max_log_level = true;
|
|
};
|
|
default-test = scopeHost.main.override {
|
|
profile = "test";
|
|
disable_release_max_log_level = true;
|
|
};
|
|
all-features = scopeHost.main.override {
|
|
all_features = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
all-features-debug = scopeHost.main.override {
|
|
profile = "dev";
|
|
all_features = true;
|
|
# debug build users expect full logs
|
|
disable_release_max_log_level = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
hmalloc = scopeHost.main.override { features = ["hardened_malloc"]; };
|
|
|
|
oci-image = scopeHost.oci-image;
|
|
oci-image-all-features = scopeHost.oci-image.override {
|
|
main = scopeHost.main.override {
|
|
all_features = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
};
|
|
oci-image-all-features-debug = scopeHost.oci-image.override {
|
|
main = scopeHost.main.override {
|
|
profile = "dev";
|
|
all_features = true;
|
|
# debug build users expect full logs
|
|
disable_release_max_log_level = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
};
|
|
oci-image-hmalloc = scopeHost.oci-image.override {
|
|
main = scopeHost.main.override {
|
|
features = ["hardened_malloc"];
|
|
};
|
|
};
|
|
|
|
book = scopeHost.book;
|
|
|
|
complement = scopeHost.complement;
|
|
static-complement = scopeHostStatic.complement;
|
|
# macOS containers don't exist, so the complement images must be forced to linux
|
|
linux-complement = (mkCrossScope "${pkgsHost.hostPlatform.qemuArch}-linux-musl").complement;
|
|
}
|
|
//
|
|
builtins.listToAttrs
|
|
(builtins.concatLists
|
|
(builtins.map
|
|
(crossSystem:
|
|
let
|
|
binaryName = "static-${crossSystem}";
|
|
scopeCrossStatic = mkCrossScope crossSystem;
|
|
in
|
|
[
|
|
# An output for a statically-linked binary
|
|
{
|
|
name = binaryName;
|
|
value = scopeCrossStatic.main;
|
|
}
|
|
|
|
# An output for a statically-linked unstripped debug ("dev") binary
|
|
{
|
|
name = "${binaryName}-debug";
|
|
value = scopeCrossStatic.main.override {
|
|
profile = "dev";
|
|
# debug build users expect full logs
|
|
disable_release_max_log_level = true;
|
|
};
|
|
}
|
|
|
|
# An output for a statically-linked unstripped debug binary with the
|
|
# "test" profile (for CI usage only)
|
|
{
|
|
name = "${binaryName}-test";
|
|
value = scopeCrossStatic.main.override {
|
|
profile = "test";
|
|
disable_release_max_log_level = true;
|
|
};
|
|
}
|
|
|
|
# An output for a statically-linked binary with `--all-features`
|
|
{
|
|
name = "${binaryName}-all-features";
|
|
value = scopeCrossStatic.main.override {
|
|
all_features = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
}
|
|
|
|
# An output for a statically-linked unstripped debug ("dev") binary with `--all-features`
|
|
{
|
|
name = "${binaryName}-all-features-debug";
|
|
value = scopeCrossStatic.main.override {
|
|
profile = "dev";
|
|
all_features = true;
|
|
# debug build users expect full logs
|
|
disable_release_max_log_level = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
}
|
|
|
|
# An output for a statically-linked binary with hardened_malloc
|
|
{
|
|
name = "${binaryName}-hmalloc";
|
|
value = scopeCrossStatic.main.override {
|
|
features = ["hardened_malloc"];
|
|
};
|
|
}
|
|
|
|
# An output for an OCI image based on that binary
|
|
{
|
|
name = "oci-image-${crossSystem}";
|
|
value = scopeCrossStatic.oci-image;
|
|
}
|
|
|
|
# An output for an OCI image based on that unstripped debug ("dev") binary
|
|
{
|
|
name = "oci-image-${crossSystem}-debug";
|
|
value = scopeCrossStatic.oci-image.override {
|
|
main = scopeCrossStatic.main.override {
|
|
profile = "dev";
|
|
# debug build users expect full logs
|
|
disable_release_max_log_level = true;
|
|
};
|
|
};
|
|
}
|
|
|
|
# An output for an OCI image based on that binary with `--all-features`
|
|
{
|
|
name = "oci-image-${crossSystem}-all-features";
|
|
value = scopeCrossStatic.oci-image.override {
|
|
main = scopeCrossStatic.main.override {
|
|
all_features = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
};
|
|
}
|
|
|
|
# An output for an OCI image based on that unstripped debug ("dev") binary with `--all-features`
|
|
{
|
|
name = "oci-image-${crossSystem}-all-features-debug";
|
|
value = scopeCrossStatic.oci-image.override {
|
|
main = scopeCrossStatic.main.override {
|
|
profile = "dev";
|
|
all_features = true;
|
|
# debug build users expect full logs
|
|
disable_release_max_log_level = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
};
|
|
}
|
|
|
|
# An output for an OCI image based on that binary with hardened_malloc
|
|
{
|
|
name = "oci-image-${crossSystem}-hmalloc";
|
|
value = scopeCrossStatic.oci-image.override {
|
|
main = scopeCrossStatic.main.override {
|
|
features = ["hardened_malloc"];
|
|
};
|
|
};
|
|
}
|
|
|
|
# An output for a complement OCI image for the specified platform
|
|
{
|
|
name = "complement-${crossSystem}";
|
|
value = scopeCrossStatic.complement;
|
|
}
|
|
]
|
|
)
|
|
[
|
|
#"x86_64-apple-darwin"
|
|
#"aarch64-apple-darwin"
|
|
"x86_64-linux-gnu"
|
|
"x86_64-linux-musl"
|
|
"aarch64-linux-musl"
|
|
]
|
|
)
|
|
);
|
|
|
|
devShells.default = mkDevShell scopeHostStatic;
|
|
devShells.all-features = mkDevShell
|
|
(scopeHostStatic.overrideScope (final: prev: {
|
|
main = prev.main.override {
|
|
all_features = true;
|
|
disable_features = [
|
|
# this is non-functional on nix for some reason
|
|
"hardened_malloc"
|
|
# dont include experimental features
|
|
"experimental"
|
|
];
|
|
};
|
|
}));
|
|
devShells.no-features = mkDevShell
|
|
(scopeHostStatic.overrideScope (final: prev: {
|
|
main = prev.main.override { default_features = false; };
|
|
}));
|
|
devShells.dynamic = mkDevShell scopeHost;
|
|
});
|
|
}
|