Since the source of nix-1p is checked in under //nix/nix-1p, we should use it from there if Nixery is being built inside of depot. Change-Id: Iddd54f7b93b398b2f909db6ee105366a9914a2ac Reviewed-on: https://cl.tvl.fyi/c/depot/+/5882 Reviewed-by: sterni <sternenseemann@systemli.org> Tested-by: BuildkiteCI Autosubmit: tazjin <tazjin@tvl.su>
		
			
				
	
	
		
			150 lines
		
	
	
	
		
			4.7 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			150 lines
		
	
	
	
		
			4.7 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
# Copyright 2022 The TVL Contributors
 | 
						|
# SPDX-License-Identifier: Apache-2.0
 | 
						|
 | 
						|
# This function header aims to provide compatibility between builds of
 | 
						|
# Nixery taking place inside/outside of the TVL depot.
 | 
						|
#
 | 
						|
# In the future, Nixery will transition to using //nix/buildGo for its
 | 
						|
# build system and this will need some major adaptations to support
 | 
						|
# that.
 | 
						|
{ depot ? { nix.readTree.drvTargets = x: x; }
 | 
						|
, pkgs ? import <nixpkgs> { }
 | 
						|
, preLaunch ? ""
 | 
						|
, extraPackages ? [ ]
 | 
						|
, maxLayers ? 20
 | 
						|
, commitHash ? null
 | 
						|
, ...
 | 
						|
}@args:
 | 
						|
 | 
						|
with pkgs;
 | 
						|
 | 
						|
let
 | 
						|
  inherit (pkgs) buildGoModule lib;
 | 
						|
 | 
						|
  # Avoid extracting this from git until we have a way to plumb
 | 
						|
  # through revision numbers.
 | 
						|
  nixery-commit-hash = "depot";
 | 
						|
 | 
						|
  # If Nixery is built outside of depot, it needs to dynamically fetch
 | 
						|
  # the current nix-1p.
 | 
						|
  nix-1p-git = builtins.fetchGit "https://code.tvl.fyi/depot.git:/nix/nix-1p.git";
 | 
						|
in
 | 
						|
depot.nix.readTree.drvTargets rec {
 | 
						|
  # Implementation of the Nix image building logic
 | 
						|
  nixery-prepare-image = import ./prepare-image { inherit pkgs; };
 | 
						|
 | 
						|
  # Use mdBook to build a static asset page which Nixery can then
 | 
						|
  # serve. This is primarily used for the public instance at
 | 
						|
  # nixery.dev.
 | 
						|
  #
 | 
						|
  # If the nixpkgs commit is known, append it to the main docs page.
 | 
						|
  nixery-book = callPackage ./docs {
 | 
						|
    nix-1p = depot.nix.nix-1p or nix-1p-git;
 | 
						|
 | 
						|
    postamble = lib.optionalString (pkgs ? nixpkgsCommits.unstable) ''
 | 
						|
      ### Which revision of `nixpkgs` is used for the builds?
 | 
						|
 | 
						|
      The current revision of `nixpkgs` is
 | 
						|
      [`${pkgs.nixpkgsCommits.unstable}`][commit] from the
 | 
						|
      `nixos-unstable` channel.
 | 
						|
 | 
						|
      This instance of Nixery uses the `nixpkgs` channel pinned by TVL
 | 
						|
      in [`//third_party/sources/sources.json`][sources].
 | 
						|
 | 
						|
      [commit]: https://github.com/NixOS/nixpkgs/commit/${pkgs.nixpkgsCommits.unstable}
 | 
						|
      [sources]: https://code.tvl.fyi/tree/third_party/sources/sources.json
 | 
						|
    '';
 | 
						|
  };
 | 
						|
 | 
						|
  nixery-popcount = callPackage ./popcount { };
 | 
						|
 | 
						|
  # Build Nixery's Go code, resulting in the binaries used for various
 | 
						|
  # bits of functionality.
 | 
						|
  #
 | 
						|
  # The server binary is wrapped to ensure that required environment
 | 
						|
  # variables are set at runtime.
 | 
						|
  nixery = buildGoModule rec {
 | 
						|
    name = "nixery";
 | 
						|
    src = ./.;
 | 
						|
    doCheck = true;
 | 
						|
 | 
						|
    # Needs to be updated after every modification of go.mod/go.sum
 | 
						|
    vendorSha256 = "115dfdhpklgmp6dsy59bp0i9inqim208lf1sqbnl9jy91bnnbl32";
 | 
						|
 | 
						|
    buildFlagsArray = [
 | 
						|
      "-ldflags=-s -w -X main.version=${nixery-commit-hash}"
 | 
						|
    ];
 | 
						|
 | 
						|
    nativeBuildInputs = [ makeWrapper ];
 | 
						|
    postInstall = ''
 | 
						|
      wrapProgram $out/bin/server \
 | 
						|
        --set WEB_DIR "${nixery-book}" \
 | 
						|
        --prefix PATH : ${nixery-prepare-image}/bin
 | 
						|
    '';
 | 
						|
 | 
						|
    # Nixery is mirrored to Github at tazjin/nixery; this is
 | 
						|
    # automatically updated from CI for canon builds.
 | 
						|
    passthru.meta.ci.extraSteps.github = depot.tools.releases.filteredGitPush {
 | 
						|
      filter = ":/tools/nixery";
 | 
						|
      remote = "git@github.com:tazjin/nixery.git";
 | 
						|
      ref = "refs/heads/master";
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  # Container image containing Nixery and Nix itself. This image can
 | 
						|
  # be run on Kubernetes, published on AppEngine or whatever else is
 | 
						|
  # desired.
 | 
						|
  nixery-image =
 | 
						|
    let
 | 
						|
      # Wrapper script for the wrapper script (meta!) which configures
 | 
						|
      # the container environment appropriately.
 | 
						|
      #
 | 
						|
      # Most importantly, sandboxing is disabled to avoid privilege
 | 
						|
      # issues in containers.
 | 
						|
      nixery-launch-script = writeShellScriptBin "nixery" ''
 | 
						|
        set -e
 | 
						|
        export PATH=${coreutils}/bin:$PATH
 | 
						|
        export NIX_SSL_CERT_FILE=/etc/ssl/certs/ca-bundle.crt
 | 
						|
        mkdir -p /tmp
 | 
						|
 | 
						|
        # Create the build user/group required by Nix
 | 
						|
        echo 'nixbld:x:30000:nixbld' >> /etc/group
 | 
						|
        echo 'nixbld:x:30000:30000:nixbld:/tmp:/bin/bash' >> /etc/passwd
 | 
						|
        echo 'root:x:0:0:root:/root:/bin/bash' >> /etc/passwd
 | 
						|
        echo 'root:x:0:' >> /etc/group
 | 
						|
 | 
						|
        # Disable sandboxing to avoid running into privilege issues
 | 
						|
        mkdir -p /etc/nix
 | 
						|
        echo 'sandbox = false' >> /etc/nix/nix.conf
 | 
						|
 | 
						|
        # In some cases users building their own image might want to
 | 
						|
        # customise something on the inside (e.g. set up an environment
 | 
						|
        # for keys or whatever).
 | 
						|
        #
 | 
						|
        # This can be achieved by setting a 'preLaunch' script.
 | 
						|
        ${preLaunch}
 | 
						|
 | 
						|
        exec ${nixery}/bin/server
 | 
						|
      '';
 | 
						|
    in
 | 
						|
    dockerTools.buildLayeredImage {
 | 
						|
      name = "nixery";
 | 
						|
      config.Cmd = [ "${nixery-launch-script}/bin/nixery" ];
 | 
						|
 | 
						|
      inherit maxLayers;
 | 
						|
      contents = [
 | 
						|
        bashInteractive
 | 
						|
        cacert
 | 
						|
        coreutils
 | 
						|
        git
 | 
						|
        gnutar
 | 
						|
        gzip
 | 
						|
        iana-etc
 | 
						|
        nix
 | 
						|
        nixery-prepare-image
 | 
						|
        nixery-launch-script
 | 
						|
        openssh
 | 
						|
        zlib
 | 
						|
      ] ++ extraPackages;
 | 
						|
    };
 | 
						|
}
 |