This repository has been archived by the owner on Jul 2, 2024. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 11
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
3 changed files
with
359 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,160 @@ | ||
{ | ||
description = "Superviseur - Define and run multi-service applications on isolated environments with Nix or Docker ❄️🐋 🛠️ 💻 ✨"; | ||
|
||
inputs = { | ||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.05"; | ||
|
||
crane = { | ||
url = "github:ipetkov/crane"; | ||
inputs.nixpkgs.follows = "nixpkgs"; | ||
}; | ||
|
||
fenix = { | ||
url = "github:nix-community/fenix"; | ||
inputs.nixpkgs.follows = "nixpkgs"; | ||
inputs.rust-analyzer-src.follows = ""; | ||
}; | ||
|
||
flake-utils.url = "github:numtide/flake-utils"; | ||
|
||
advisory-db = { | ||
url = "github:rustsec/advisory-db"; | ||
flake = false; | ||
}; | ||
}; | ||
|
||
outputs = { self, nixpkgs, crane, fenix, flake-utils, advisory-db, ... }: | ||
flake-utils.lib.eachDefaultSystem (system: | ||
let | ||
pkgs = import nixpkgs { | ||
inherit system; | ||
}; | ||
|
||
inherit (pkgs) lib; | ||
|
||
craneLib = crane.lib.${system}; | ||
|
||
protoFilter = path: _type: builtins.match ".*proto$" path != null; | ||
protoOrCargo = path: type: | ||
(protoFilter path type) || (craneLib.filterCargoSources path type); | ||
|
||
# src = craneLib.cleanCargoSource (craneLib.path ../.); | ||
src = lib.cleanSourceWith { | ||
src = craneLib.path ../.; # The original, unfiltered source | ||
filter = protoOrCargo; | ||
}; | ||
|
||
# Common arguments can be set here to avoid repeating them later | ||
commonArgs = { | ||
inherit src; | ||
|
||
pname = "superviseur"; | ||
version = "0.1.0-alpha.13"; | ||
cargoExtraArgs = "--package=superviseur"; | ||
|
||
|
||
|
||
buildInputs = [ | ||
# Add additional build inputs here | ||
pkgs.pkgconfig | ||
pkgs.gnumake | ||
pkgs.protobuf | ||
] ++ lib.optionals pkgs.stdenv.isDarwin [ | ||
# Additional darwin specific inputs can be set here | ||
pkgs.libiconv | ||
pkgs.darwin.Security | ||
]; | ||
|
||
# Additional environment variables can be set directly | ||
# MY_CUSTOM_VAR = "some value"; | ||
}; | ||
|
||
craneLibLLvmTools = craneLib.overrideToolchain | ||
(fenix.packages.${system}.complete.withComponents [ | ||
"cargo" | ||
"llvm-tools" | ||
"rustc" | ||
]); | ||
|
||
# Build *just* the cargo dependencies, so we can reuse | ||
# all of that work (e.g. via cachix) when running in CI | ||
cargoArtifacts = craneLib.buildDepsOnly commonArgs; | ||
|
||
# Build the actual crate itself, reusing the dependency | ||
# artifacts from above. | ||
superviseur = craneLib.buildPackage (commonArgs // { | ||
inherit cargoArtifacts; | ||
}); | ||
|
||
in | ||
{ | ||
checks = { | ||
# Build the crate as part of `nix flake check` for convenience | ||
inherit superviseur; | ||
|
||
# Run clippy (and deny all warnings) on the crate source, | ||
# again, resuing the dependency artifacts from above. | ||
# | ||
# Note that this is done as a separate derivation so that | ||
# we can block the CI if there are issues here, but not | ||
# prevent downstream consumers from building our crate by itself. | ||
superviseur-clippy = craneLib.cargoClippy (commonArgs // { | ||
inherit cargoArtifacts; | ||
cargoClippyExtraArgs = "--all-targets -- --deny warnings"; | ||
}); | ||
|
||
superviseur-doc = craneLib.cargoDoc (commonArgs // { | ||
inherit cargoArtifacts; | ||
}); | ||
|
||
# Check formatting | ||
superviseur-fmt = craneLib.cargoFmt { | ||
inherit src; | ||
}; | ||
|
||
# Audit dependencies | ||
superviseur-audit = craneLib.cargoAudit { | ||
inherit src advisory-db; | ||
}; | ||
|
||
# Run tests with cargo-nextest | ||
# Consider setting `doCheck = false` on `superviseur` if you do not want | ||
# the tests to run twice | ||
superviseur-nextest = craneLib.cargoNextest (commonArgs // { | ||
inherit cargoArtifacts; | ||
partitions = 1; | ||
partitionType = "count"; | ||
}); | ||
} // lib.optionalAttrs (system == "x86_64-linux") { | ||
# NB: cargo-tarpaulin only supports x86_64 systems | ||
# Check code coverage (note: this will not upload coverage anywhere) | ||
superviseur-coverage = craneLib.cargoTarpaulin (commonArgs // { | ||
inherit cargoArtifacts; | ||
}); | ||
}; | ||
|
||
packages = { | ||
default = superviseur; | ||
superviseur-llvm-coverage = craneLibLLvmTools.cargoLlvmCov (commonArgs // { | ||
inherit cargoArtifacts; | ||
}); | ||
}; | ||
|
||
apps.default = flake-utils.lib.mkApp { | ||
drv = superviseur; | ||
}; | ||
|
||
devShells.default = pkgs.mkShell { | ||
inputsFrom = builtins.attrValues self.checks.${system}; | ||
|
||
# Additional dev-shell environment variables can be set directly | ||
# MY_CUSTOM_DEVELOPMENT_VAR = "something else"; | ||
|
||
# Extra inputs can be added here | ||
nativeBuildInputs = with pkgs; [ | ||
cargo | ||
rustc | ||
]; | ||
}; | ||
}); | ||
} |