Nixery is going to gain a new binary (used for building images without a registry server); to prepare for this the server binary has moved to cmd/server and the Nix build logic has been updated to wrap this binary and set the required environment variables. Change-Id: I9b4f49f47872ae76430463e2fcb8f68114070f72 Reviewed-on: https://cl.tvl.fyi/c/depot/+/5603 Tested-by: BuildkiteCI Reviewed-by: sterni <sternenseemann@systemli.org>
		
			
				
	
	
		
			43 lines
		
	
	
	
		
			1.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			43 lines
		
	
	
	
		
			1.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| # NixOS module to run Nixery, currently with local-storage as the
 | |
| # backend for storing/serving image layers.
 | |
| { depot, config, lib, pkgs, ... }:
 | |
| 
 | |
| let
 | |
|   cfg = config.services.depot.nixery;
 | |
|   description = "Nixery - container images on-demand";
 | |
|   storagePath = "/var/lib/nixery/${pkgs.nixpkgsCommits.unstable}";
 | |
| in
 | |
| {
 | |
|   options.services.depot.nixery = {
 | |
|     enable = lib.mkEnableOption description;
 | |
| 
 | |
|     port = lib.mkOption {
 | |
|       type = lib.types.int;
 | |
|       default = 45243; # "image"
 | |
|       description = "Port on which Nixery should listen";
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   config = lib.mkIf cfg.enable {
 | |
|     systemd.services.nixery = {
 | |
|       inherit description;
 | |
|       wantedBy = [ "multi-user.target" ];
 | |
| 
 | |
|       serviceConfig = {
 | |
|         DynamicUser = true;
 | |
|         StateDirectory = "nixery";
 | |
|         Restart = "always";
 | |
|         ExecStartPre = "${pkgs.coreutils}/bin/mkdir -p ${storagePath}";
 | |
|         ExecStart = "${depot.tools.nixery.nixery}/bin/server";
 | |
|       };
 | |
| 
 | |
|       environment = {
 | |
|         PORT = toString cfg.port;
 | |
|         NIXERY_PKGS_PATH = pkgs.path;
 | |
|         NIXERY_STORAGE_BACKEND = "filesystem";
 | |
|         NIX_TIMEOUT = "60"; # seconds
 | |
|         STORAGE_PATH = storagePath;
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| }
 |