updated
This commit is contained in:
216
flake.nix
216
flake.nix
@ -2,7 +2,7 @@
|
||||
description = "A webserver to create files for testing purposes";
|
||||
|
||||
inputs = {
|
||||
nixpkgs.url = "github:nixos/nixpkgs?rev=a73246e2eef4c6ed172979932bc80e1404ba2d56";
|
||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
|
||||
|
||||
microvm = {
|
||||
url = "github:astro/microvm.nix";
|
||||
@ -10,163 +10,92 @@
|
||||
};
|
||||
};
|
||||
|
||||
outputs = {
|
||||
self,
|
||||
nixpkgs,
|
||||
...
|
||||
} @ inputs: let
|
||||
supportedSystems = ["x86_64-linux" "x86_64-darwin" "aarch64-linux" "aarch64-darwin"];
|
||||
forAllSystems = nixpkgs.lib.genAttrs supportedSystems;
|
||||
pkgs = forAllSystems (system: nixpkgs.legacyPackages.${system}.extend overlay);
|
||||
|
||||
overlay = final: prev: rec {
|
||||
python3Packages = prev.python3Packages.overrideScope (pfinal: pprev: {
|
||||
packageNameToDrv = x: builtins.getAttr (cleanPythonPackageName x) final.python3Packages;
|
||||
outputs =
|
||||
{
|
||||
self,
|
||||
nixpkgs,
|
||||
...
|
||||
}@inputs:
|
||||
let
|
||||
supportedSystems = [ "x86_64-linux" ];
|
||||
forAllSystems = nixpkgs.lib.genAttrs supportedSystems;
|
||||
pkgs = forAllSystems (system: nixpkgs.legacyPackages.${system});
|
||||
in
|
||||
{
|
||||
# `nix build`
|
||||
packages = forAllSystems (system: rec {
|
||||
default = testdata;
|
||||
testdata = pkgs.${system}.callPackage ./nix/package.nix { src = ./.; };
|
||||
vm = self.nixosConfigurations.vm.config.microvm.declaredRunner;
|
||||
});
|
||||
|
||||
cleanPythonPackageName = x: let
|
||||
cleanName = builtins.match "([a-z,A-Z,0-9,_,-]+).*" x;
|
||||
in
|
||||
if cleanName != null
|
||||
then builtins.elemAt cleanName 0
|
||||
else builtins.warn "Could not determine package name from '${x}'" null;
|
||||
};
|
||||
# `nix develop`
|
||||
devShells = forAllSystems (system: rec {
|
||||
default = venv;
|
||||
|
||||
pyproject = builtins.fromTOML (builtins.readFile ./pyproject.toml);
|
||||
venv = pkgs.${system}.mkShell {
|
||||
shellHook = ''
|
||||
if [ ! -d .venv/ ]; then
|
||||
echo "Creating Virtual Environment..."
|
||||
${pkgs.${system}.python3}/bin/python3 -m venv .venv
|
||||
fi
|
||||
|
||||
buildDependencies = forAllSystems (system: builtins.map pkgs.${system}.python3Packages.packageNameToDrv pyproject.build-system.requires);
|
||||
runtimeDependencies = forAllSystems (system: builtins.map pkgs.${system}.python3Packages.packageNameToDrv pyproject.project.dependencies);
|
||||
optionalDependencies = forAllSystems (system: builtins.mapAttrs (name: value: builtins.map pkgs.${system}.python3Packages.packageNameToDrv value) pyproject.project.optional-dependencies);
|
||||
in {
|
||||
# `nix build`
|
||||
packages = forAllSystems (system: let
|
||||
buildTestdata = {skipCheck ? false}:
|
||||
pkgs.${system}.python3Packages.buildPythonPackage {
|
||||
pname = pyproject.project.name;
|
||||
version = pyproject.project.version;
|
||||
src = ./.;
|
||||
alias activate='source .venv/bin/activate'
|
||||
|
||||
pyproject = true;
|
||||
|
||||
build-system = buildDependencies.${system};
|
||||
|
||||
dependencies = runtimeDependencies.${system};
|
||||
|
||||
optional-dependencies = optionalDependencies.${system};
|
||||
|
||||
nativeCheckInputs = optionalDependencies.${system}.dev;
|
||||
|
||||
checkPhase = let
|
||||
dev = builtins.map (x: x.pname) optionalDependencies.${system}.dev;
|
||||
in ''
|
||||
${
|
||||
if builtins.elem "pytest" dev && !skipCheck
|
||||
then "pytest tests"
|
||||
else ""
|
||||
}
|
||||
${
|
||||
if builtins.elem "mypy" dev && !skipCheck
|
||||
then "mypy src"
|
||||
else ""
|
||||
}
|
||||
${
|
||||
if builtins.elem "pylint" dev && !skipCheck
|
||||
then "pylint src"
|
||||
else ""
|
||||
}
|
||||
echo "Entering Virtual Environment..."
|
||||
source .venv/bin/activate
|
||||
'';
|
||||
};
|
||||
in rec {
|
||||
default = testdata;
|
||||
testdata = buildTestdata {skipCheck = false;};
|
||||
quick = buildTestdata {skipCheck = true;};
|
||||
vm = self.nixosConfigurations.vm.config.microvm.declaredRunner;
|
||||
});
|
||||
});
|
||||
|
||||
# `nix fmt`
|
||||
formatter = forAllSystems (system: pkgs.${system}.alejandra);
|
||||
# NixOS Module
|
||||
nixosModules.default = import ./nix/module.nix inputs;
|
||||
|
||||
# `nix develop`
|
||||
devShells = forAllSystems (system: rec {
|
||||
default = venv;
|
||||
|
||||
venv = pkgs.${system}.mkShell {
|
||||
shellHook = ''
|
||||
if [ ! -d .venv/ ]; then
|
||||
echo "Creating Virtual Environment..."
|
||||
${pkgs.${system}.python3}/bin/python3 -m venv .venv
|
||||
fi
|
||||
|
||||
alias activate='source .venv/bin/activate'
|
||||
|
||||
echo "Entering Virtual Environment..."
|
||||
source .venv/bin/activate
|
||||
'';
|
||||
};
|
||||
});
|
||||
|
||||
# NixOS Module
|
||||
nixosModules.default = import ./nix/module.nix inputs;
|
||||
|
||||
# nixos definition for a microvm to test nixosModules
|
||||
nixosConfigurations = let
|
||||
system = "x86_64-linux";
|
||||
in {
|
||||
vm = nixpkgs.lib.nixosSystem {
|
||||
inherit system;
|
||||
# NixOS definition for a microvm to test nixosModules
|
||||
nixosConfigurations."vm" = nixpkgs.lib.nixosSystem {
|
||||
system = "x86_64-linux";
|
||||
|
||||
modules = [
|
||||
inputs.microvm.nixosModules.microvm
|
||||
({config, ...}: {
|
||||
system.stateVersion = config.system.nixos.version;
|
||||
(
|
||||
{ config, ... }:
|
||||
{
|
||||
services.getty.autologinUser = "root";
|
||||
|
||||
networking.hostName = "vm";
|
||||
users.users.root.password = "";
|
||||
microvm = {
|
||||
hypervisor = "qemu";
|
||||
|
||||
microvm = {
|
||||
# volumes = [
|
||||
# {
|
||||
# mountPoint = "/var";
|
||||
# image = "var.img";
|
||||
# size = 256;
|
||||
# }
|
||||
# ];
|
||||
shares = [
|
||||
{
|
||||
# use proto = "virtiofs" for MicroVMs that are started by systemd
|
||||
proto = "9p";
|
||||
tag = "ro-store";
|
||||
# a host's /nix/store will be picked up so that no
|
||||
# squashfs/erofs will be built for it.
|
||||
source = "/nix/store";
|
||||
mountPoint = "/nix/.ro-store";
|
||||
}
|
||||
];
|
||||
shares = [
|
||||
{
|
||||
# Host's /nix/store will be picked up so that no squashfs/erofs will be built for it.
|
||||
tag = "ro-store";
|
||||
source = "/nix/store";
|
||||
mountPoint = "/nix/.ro-store";
|
||||
}
|
||||
];
|
||||
|
||||
interfaces = [
|
||||
{
|
||||
type = "user";
|
||||
id = "qemu";
|
||||
mac = "02:00:00:01:01:01";
|
||||
}
|
||||
];
|
||||
interfaces = [
|
||||
{
|
||||
type = "user";
|
||||
id = "qemu";
|
||||
# Locally administered have one of 2/6/A/E in the second nibble.
|
||||
mac = "02:00:00:01:01:01";
|
||||
}
|
||||
];
|
||||
|
||||
forwardPorts = [
|
||||
{
|
||||
host.port = config.services.testdata.port;
|
||||
guest.port = config.services.testdata.port;
|
||||
}
|
||||
];
|
||||
|
||||
# "qemu" has 9p built-in!
|
||||
hypervisor = "qemu";
|
||||
socket = "control.socket";
|
||||
};
|
||||
})
|
||||
forwardPorts = [
|
||||
{
|
||||
host.port = config.services.testdata.port;
|
||||
guest.port = config.services.testdata.port;
|
||||
}
|
||||
];
|
||||
};
|
||||
}
|
||||
)
|
||||
|
||||
self.nixosModules.default
|
||||
rec {
|
||||
networking.firewall.allowedTCPPorts = [services.testdata.port];
|
||||
networking.firewall.allowedTCPPorts = [ services.testdata.port ];
|
||||
services.testdata = {
|
||||
enable = true;
|
||||
|
||||
@ -174,11 +103,15 @@
|
||||
port = 1234;
|
||||
|
||||
settings = {
|
||||
keys = ["one" "two" "three"];
|
||||
keys = [
|
||||
"one"
|
||||
"two"
|
||||
"three"
|
||||
];
|
||||
max-size = "1GB";
|
||||
max-data = "100GB";
|
||||
buffer-size = "12MiB";
|
||||
database = "/root/testdata_state.json";
|
||||
database = "/root/testdata-state.json";
|
||||
database-update-interval = 5.0;
|
||||
log = "/root/log.jsonl";
|
||||
};
|
||||
@ -187,5 +120,4 @@
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
Reference in New Issue
Block a user