-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Create nixosModules, templates, and toolchains attributes
- Loading branch information
1 parent
ee6da51
commit f0544a5
Showing
14 changed files
with
635 additions
and
18 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,161 @@ | ||
{ | ||
description = "Versatus rust-based project template."; | ||
|
||
inputs = { | ||
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable"; | ||
|
||
crane = { | ||
url = "github:ipetkov/crane"; | ||
inputs.nixpkgs.follows = "nixpkgs"; | ||
}; | ||
|
||
fenix = { | ||
url = "github:nix-community/fenix"; | ||
inputs.nixpkgs.follows = "nixpkgs"; | ||
inputs.rust-analyzer-src.follows = ""; | ||
}; | ||
|
||
flake-utils.url = "github:numtide/flake-utils"; | ||
|
||
advisory-db = { | ||
url = "github:rustsec/advisory-db"; | ||
flake = false; | ||
}; | ||
|
||
versatus-nix = { | ||
url = "github:versatus/versatus.nix"; | ||
inputs.nixpkgs.follows = "nixpkgs"; | ||
inputs.fenix.follows = "fenix"; | ||
inputs.flake-utils.follows = "flake-utils"; | ||
}; | ||
}; | ||
|
||
outputs = { self, nixpkgs, crane, fenix, flake-utils, advisory-db, versatus-nix, ... }: | ||
flake-utils.lib.eachDefaultSystem (system: | ||
let | ||
pkgs = nixpkgs.legacyPackages.${system}; | ||
inherit (pkgs) lib; | ||
|
||
toolchains = versatus-nix.toolchains.${system}; | ||
rustToolchain = toolchains.mkRustToolchainFromTOML | ||
./rust-toolchain.toml | ||
lib.fakeSha256; # Run `nix flake check` and replace with the expected hash. | ||
|
||
# Overrides the default crane rust-toolchain with fenix. | ||
craneLib = (crane.mkLib pkgs).overrideToolchain rustToolchain.fenix-pkgs; | ||
src = craneLib.cleanCargoSource ./.; | ||
|
||
# Common arguments can be set here to avoid repeating them later | ||
commonArgs = { | ||
inherit src; | ||
strictDeps = true; | ||
|
||
# Inputs that must be available at the time of the build | ||
nativeBuildInputs = [ | ||
# pkgs.pkg-config # necessary for linking OpenSSL | ||
# pkgs.clang | ||
]; | ||
|
||
buildInputs = [ | ||
# Add additional build inputs here | ||
# pkgs.openssl.dev | ||
] ++ [ | ||
# You probably want this. | ||
rustToolchain.darwin-pkgs | ||
] ++ lib.optionals pkgs.stdenv.isDarwin [ | ||
# Additional darwin specific inputs can be set here | ||
]; | ||
|
||
# Additional environment variables can be set directly | ||
# LIBCLANG_PATH = "${pkgs.libclang.lib}/lib"; | ||
# MY_CUSTOM_VAR = "some value"; | ||
}; | ||
|
||
# Build *just* the cargo dependencies, so we can reuse | ||
# all of that work (e.g. via cachix) when running in CI | ||
cargoArtifacts = craneLib.buildDepsOnly commonArgs; | ||
|
||
# Build the actual crate itself, reusing the dependency | ||
# artifacts from above. | ||
my-crate = craneLib.buildPackage (commonArgs // { | ||
inherit cargoArtifacts; | ||
doCheck = false; # Use cargo-nexttest below. | ||
# Extra command line arguments to pass to cargo. | ||
# cargoExtraArgs = "--locked --bin your_binary_name"; | ||
}); | ||
in | ||
{ | ||
checks = { | ||
# Build the crate as part of `nix flake check` for convenience | ||
inherit my-crate; | ||
|
||
# Run clippy (and deny all warnings) on the crate source, | ||
# again, reusing the dependency artifacts from above. | ||
# | ||
# Note that this is done as a separate derivation so that | ||
# we can block the CI if there are issues here, but not | ||
# prevent downstream consumers from building our crate by itself. | ||
my-crate-clippy = craneLib.cargoClippy (commonArgs // { | ||
inherit cargoArtifacts; | ||
cargoClippyExtraArgs = "--all-targets -- --deny warnings"; | ||
}); | ||
|
||
my-crate-doc = craneLib.cargoDoc (commonArgs // { | ||
inherit cargoArtifacts; | ||
}); | ||
|
||
# Check formatting | ||
my-crate-fmt = craneLib.cargoFmt { | ||
inherit src; | ||
}; | ||
|
||
# Audit dependencies | ||
my-crate-audit = craneLib.cargoAudit { | ||
inherit src advisory-db; | ||
}; | ||
|
||
# Audit licenses | ||
my-crate-deny = craneLib.cargoDeny { | ||
inherit src; | ||
}; | ||
|
||
# Run tests with cargo-nextest | ||
# Consider setting `doCheck = false` on `my-crate` if you do not want | ||
# the tests to run twice | ||
my-crate-nextest = craneLib.cargoNextest (commonArgs // { | ||
inherit cargoArtifacts; | ||
partitions = 1; | ||
partitionType = "count"; | ||
}); | ||
}; | ||
|
||
packages = { | ||
default = my-crate; | ||
} // lib.optionalAttrs (!pkgs.stdenv.isDarwin) { | ||
my-crate-llvm-coverage = craneLib.cargoLlvmCov (commonArgs // { | ||
inherit cargoArtifacts; | ||
}); | ||
}; | ||
|
||
apps.default = flake-utils.lib.mkApp { | ||
drv = my-crate; | ||
}; | ||
|
||
devShells.default = craneLib.devShell { | ||
# Inherit inputs from checks. | ||
checks = self.checks.${system}; | ||
|
||
# Additional dev-shell environment variables can be set directly | ||
# MY_CUSTOM_DEVELOPMENT_VAR = "something else"; | ||
|
||
# Extra inputs can be added here; cargo and rustc are provided by default. | ||
packages = with pkgs; [ | ||
# ripgrep | ||
nil # nix lsp | ||
nixpkgs-fmt # nix formatter | ||
]; | ||
}; | ||
|
||
formatter = pkgs.nixpkgs-fmt; | ||
}); | ||
} |
Oops, something went wrong.