From 8d8a6467735e86d4e348f58f43ebfb90791d950a Mon Sep 17 00:00:00 2001 From: sinavir Date: Mon, 16 Jan 2023 18:50:12 +0100 Subject: [PATCH] init backend --- hackens_orga/backend/__init__.py | 0 hackens_orga/backend/admin.py | 7 + hackens_orga/backend/apps.py | 6 + .../backend/migrations/0001_initial.py | 47 +++++ hackens_orga/backend/migrations/__init__.py | 0 hackens_orga/backend/models.py | 33 +++ hackens_orga/backend/serializers.py | 29 +++ hackens_orga/backend/tests.py | 3 + hackens_orga/backend/urls.py | 15 ++ hackens_orga/backend/views.py | 25 +++ hackens_orga/hackens_orga/__init__.py | 0 hackens_orga/hackens_orga/asgi.py | 16 ++ hackens_orga/hackens_orga/settings.py | 138 +++++++++++++ hackens_orga/hackens_orga/urls.py | 23 +++ hackens_orga/hackens_orga/wsgi.py | 16 ++ hackens_orga/manage.py | 22 ++ nix/default.nix | 6 + nix/drf-knox.nix | 20 ++ nix/sources.json | 14 ++ nix/sources.nix | 194 ++++++++++++++++++ shell.nix | 14 ++ 21 files changed, 628 insertions(+) create mode 100644 hackens_orga/backend/__init__.py create mode 100644 hackens_orga/backend/admin.py create mode 100644 hackens_orga/backend/apps.py create mode 100644 hackens_orga/backend/migrations/0001_initial.py create mode 100644 hackens_orga/backend/migrations/__init__.py create mode 100644 hackens_orga/backend/models.py create mode 100644 hackens_orga/backend/serializers.py create mode 100644 hackens_orga/backend/tests.py create mode 100644 hackens_orga/backend/urls.py create mode 100644 hackens_orga/backend/views.py create mode 100644 hackens_orga/hackens_orga/__init__.py create mode 100644 hackens_orga/hackens_orga/asgi.py create mode 100644 hackens_orga/hackens_orga/settings.py create mode 100644 hackens_orga/hackens_orga/urls.py create mode 100644 hackens_orga/hackens_orga/wsgi.py create mode 100755 hackens_orga/manage.py create mode 100644 nix/default.nix create mode 100644 nix/drf-knox.nix create mode 100644 nix/sources.json create mode 100644 nix/sources.nix create mode 100644 shell.nix diff --git a/hackens_orga/backend/__init__.py b/hackens_orga/backend/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/hackens_orga/backend/admin.py b/hackens_orga/backend/admin.py new file mode 100644 index 0000000..313364d --- /dev/null +++ b/hackens_orga/backend/admin.py @@ -0,0 +1,7 @@ +from django.contrib import admin + +from .models import Agent, BudgetGroup, BudgetLine + +admin.site.register(Agent) +admin.site.register(BudgetGroup) +admin.site.register(BudgetLine) diff --git a/hackens_orga/backend/apps.py b/hackens_orga/backend/apps.py new file mode 100644 index 0000000..6a3779f --- /dev/null +++ b/hackens_orga/backend/apps.py @@ -0,0 +1,6 @@ +from django.apps import AppConfig + + +class BackendConfig(AppConfig): + default_auto_field = 'django.db.models.BigAutoField' + name = 'backend' diff --git a/hackens_orga/backend/migrations/0001_initial.py b/hackens_orga/backend/migrations/0001_initial.py new file mode 100644 index 0000000..3dd4a84 --- /dev/null +++ b/hackens_orga/backend/migrations/0001_initial.py @@ -0,0 +1,47 @@ +# Generated by Django 3.2.16 on 2023-01-16 14:17 + +import datetime +from django.conf import settings +from django.db import migrations, models +import django.db.models.deletion + + +class Migration(migrations.Migration): + + initial = True + + dependencies = [ + migrations.swappable_dependency(settings.AUTH_USER_MODEL), + ] + + operations = [ + migrations.CreateModel( + name='Agent', + fields=[ + ('id', models.BigAutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), + ('name', models.CharField(max_length=255)), + ('user', models.OneToOneField(null=True, on_delete=django.db.models.deletion.CASCADE, to=settings.AUTH_USER_MODEL)), + ], + ), + migrations.CreateModel( + name='BudgetGroup', + fields=[ + ('id', models.BigAutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), + ('name', models.CharField(max_length=255)), + ('description', models.TextField(blank=True)), + ], + ), + migrations.CreateModel( + name='BudgetLine', + fields=[ + ('id', models.BigAutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), + ('amount', models.DecimalField(decimal_places=2, max_digits=12)), + ('comment', models.TextField(blank=True)), + ('date', models.DateField(default=datetime.date.today)), + ('facture', models.FileField(blank=True, null=True, upload_to='factures/')), + ('title', models.CharField(max_length=255)), + ('author', models.ForeignKey(on_delete=django.db.models.deletion.PROTECT, to='backend.agent')), + ('group', models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, to='backend.budgetgroup')), + ], + ), + ] diff --git a/hackens_orga/backend/migrations/__init__.py b/hackens_orga/backend/migrations/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/hackens_orga/backend/models.py b/hackens_orga/backend/models.py new file mode 100644 index 0000000..30e9e01 --- /dev/null +++ b/hackens_orga/backend/models.py @@ -0,0 +1,33 @@ +from datetime import date + +from django.contrib.auth.models import User +from django.db import models + + +class BudgetLine(models.Model): + amount = models.DecimalField(max_digits=12, decimal_places=2) + author = models.ForeignKey("Agent", on_delete=models.PROTECT) + comment = models.TextField(blank=True) + date = models.DateField(default=date.today) + facture = models.FileField(upload_to="factures/", null=True, blank=True) + group = models.ForeignKey("BudgetGroup", on_delete=models.CASCADE) + title = models.CharField(max_length=255) + + def __str__(self): + return f"BudgetLine_{self.title}_{self.amount}€" + + +class Agent(models.Model): + name = models.CharField(max_length=255) + user = models.OneToOneField(User, on_delete=models.CASCADE, null=True) + + def __str__(self): + return f"Agent_{self.name}" + + +class BudgetGroup(models.Model): + name = models.CharField(max_length=255) + description = models.TextField(blank=True) + + def __str__(self): + return f"BudgetGroup_{self.name}" diff --git a/hackens_orga/backend/serializers.py b/hackens_orga/backend/serializers.py new file mode 100644 index 0000000..8727221 --- /dev/null +++ b/hackens_orga/backend/serializers.py @@ -0,0 +1,29 @@ +from rest_framework import serializers + +from .models import Agent, BudgetGroup, BudgetLine + + +class AgentSerializer(serializers.ModelSerializer): + class Meta: + model = Agent + fields = "__all__" + + +class BudgetGroupSerializer(serializers.ModelSerializer): + total = serializers.SerializerMethodField() + + def get_total(self, obj): + tot = 0 + for i in obj.budgetline_set.all(): + tot += i.amount + return tot + + class Meta: + model = BudgetGroup + fields = "__all__" + + +class BudgetLineSerializer(serializers.ModelSerializer): + class Meta: + model = BudgetLine + fields = "__all__" diff --git a/hackens_orga/backend/tests.py b/hackens_orga/backend/tests.py new file mode 100644 index 0000000..7ce503c --- /dev/null +++ b/hackens_orga/backend/tests.py @@ -0,0 +1,3 @@ +from django.test import TestCase + +# Create your tests here. diff --git a/hackens_orga/backend/urls.py b/hackens_orga/backend/urls.py new file mode 100644 index 0000000..033de53 --- /dev/null +++ b/hackens_orga/backend/urls.py @@ -0,0 +1,15 @@ +"""backend URL Configuration +""" + +from rest_framework import routers + +from .views import AgentViewSet, BudgetGroupViewSet, BudgetLineViewSet + +router = routers.DefaultRouter() + +router.register(r"agent", AgentViewSet) +router.register(r"budgetgroup", BudgetGroupViewSet) +router.register(r"budgetline", BudgetLineViewSet) + +app_name = "orga-backend" +urlpatterns = router.urls diff --git a/hackens_orga/backend/views.py b/hackens_orga/backend/views.py new file mode 100644 index 0000000..9bb569d --- /dev/null +++ b/hackens_orga/backend/views.py @@ -0,0 +1,25 @@ +from django.shortcuts import render +from rest_framework import viewsets +from rest_framework.permissions import IsAuthenticatedOrReadOnly + +from .models import Agent, BudgetGroup, BudgetLine +from .serializers import (AgentSerializer, BudgetGroupSerializer, + BudgetLineSerializer) + + +class AgentViewSet(viewsets.ModelViewSet): + queryset = Agent.objects.all() + serializer_class = AgentSerializer + permission_class = [IsAuthenticatedOrReadOnly] + + +class BudgetGroupViewSet(viewsets.ModelViewSet): + queryset = BudgetGroup.objects.all() + serializer_class = BudgetGroupSerializer + permission_class = [IsAuthenticatedOrReadOnly] + + +class BudgetLineViewSet(viewsets.ModelViewSet): + queryset = BudgetLine.objects.all() + serializer_class = BudgetLineSerializer + permission_class = [IsAuthenticatedOrReadOnly] diff --git a/hackens_orga/hackens_orga/__init__.py b/hackens_orga/hackens_orga/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/hackens_orga/hackens_orga/asgi.py b/hackens_orga/hackens_orga/asgi.py new file mode 100644 index 0000000..1307f81 --- /dev/null +++ b/hackens_orga/hackens_orga/asgi.py @@ -0,0 +1,16 @@ +""" +ASGI config for hackens_orga project. + +It exposes the ASGI callable as a module-level variable named ``application``. + +For more information on this file, see +https://docs.djangoproject.com/en/3.2/howto/deployment/asgi/ +""" + +import os + +from django.core.asgi import get_asgi_application + +os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'hackens_orga.settings') + +application = get_asgi_application() diff --git a/hackens_orga/hackens_orga/settings.py b/hackens_orga/hackens_orga/settings.py new file mode 100644 index 0000000..9c9407d --- /dev/null +++ b/hackens_orga/hackens_orga/settings.py @@ -0,0 +1,138 @@ +""" +Django settings for hackens_orga project. + +Generated by 'django-admin startproject' using Django 3.2.16. + +For more information on this file, see +https://docs.djangoproject.com/en/3.2/topics/settings/ + +For the full list of settings and their values, see +https://docs.djangoproject.com/en/3.2/ref/settings/ +""" + +from pathlib import Path + +# Build paths inside the project like this: BASE_DIR / 'subdir'. +BASE_DIR = Path(__file__).resolve().parent.parent + + +# Quick-start development settings - unsuitable for production +# See https://docs.djangoproject.com/en/3.2/howto/deployment/checklist/ + +# SECURITY WARNING: keep the secret key used in production secret! +SECRET_KEY = "django-insecure-d4qh9v-en$&f%$j$jyhqkn_th#ow-e22bs^stx(n33sg-eyfhd" + +# SECURITY WARNING: don't run with debug turned on in production! +DEBUG = True + +ALLOWED_HOSTS = [] + + +# Application definition + +INSTALLED_APPS = [ + "django.contrib.admin", + "django.contrib.auth", + "django.contrib.contenttypes", + "django.contrib.sessions", + "django.contrib.messages", + "django.contrib.staticfiles", + "rest_framework", + "backend", + "django_extensions", +] + +MIDDLEWARE = [ + "django.middleware.security.SecurityMiddleware", + "django.contrib.sessions.middleware.SessionMiddleware", + "django.middleware.common.CommonMiddleware", + "django.middleware.csrf.CsrfViewMiddleware", + "django.contrib.auth.middleware.AuthenticationMiddleware", + "django.contrib.messages.middleware.MessageMiddleware", + "django.middleware.clickjacking.XFrameOptionsMiddleware", +] + +ROOT_URLCONF = "hackens_orga.urls" + +TEMPLATES = [ + { + "BACKEND": "django.template.backends.django.DjangoTemplates", + "DIRS": [], + "APP_DIRS": True, + "OPTIONS": { + "context_processors": [ + "django.template.context_processors.debug", + "django.template.context_processors.request", + "django.contrib.auth.context_processors.auth", + "django.contrib.messages.context_processors.messages", + ], + }, + }, +] + +WSGI_APPLICATION = "hackens_orga.wsgi.application" + +# Django-rest-framework +# https://www.django-rest-framework.org/ + +REST_FRAMEWORK = { + # Use Django's standard `django.contrib.auth` permissions, + # or allow read-only access for unauthenticated users. + "DEFAULT_PERMISSION_CLASSES": [ + "rest_framework.permissions.DjangoModelPermissionsOrAnonReadOnly" + ] +} + +# Database +# https://docs.djangoproject.com/en/3.2/ref/settings/#databases + +DATABASES = { + "default": { + "ENGINE": "django.db.backends.sqlite3", + "NAME": BASE_DIR / "db.sqlite3", + } +} + + +# Password validation +# https://docs.djangoproject.com/en/3.2/ref/settings/#auth-password-validators + +AUTH_PASSWORD_VALIDATORS = [ + { + "NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator", + }, + { + "NAME": "django.contrib.auth.password_validation.MinimumLengthValidator", + }, + { + "NAME": "django.contrib.auth.password_validation.CommonPasswordValidator", + }, + { + "NAME": "django.contrib.auth.password_validation.NumericPasswordValidator", + }, +] + + +# Internationalization +# https://docs.djangoproject.com/en/3.2/topics/i18n/ + +LANGUAGE_CODE = "en-us" + +TIME_ZONE = "Europe/Paris" + +USE_I18N = False + +USE_L10N = False + +USE_TZ = True + + +# Static files (CSS, JavaScript, Images) +# https://docs.djangoproject.com/en/3.2/howto/static-files/ + +STATIC_URL = "/static/" + +# Default primary key field type +# https://docs.djangoproject.com/en/3.2/ref/settings/#default-auto-field + +DEFAULT_AUTO_FIELD = "django.db.models.BigAutoField" diff --git a/hackens_orga/hackens_orga/urls.py b/hackens_orga/hackens_orga/urls.py new file mode 100644 index 0000000..b0999bb --- /dev/null +++ b/hackens_orga/hackens_orga/urls.py @@ -0,0 +1,23 @@ +"""hackens_orga URL Configuration + +The `urlpatterns` list routes URLs to views. For more information please see: + https://docs.djangoproject.com/en/3.2/topics/http/urls/ +Examples: +Function views + 1. Add an import: from my_app import views + 2. Add a URL to urlpatterns: path('', views.home, name='home') +Class-based views + 1. Add an import: from other_app.views import Home + 2. Add a URL to urlpatterns: path('', Home.as_view(), name='home') +Including another URLconf + 1. Import the include() function: from django.urls import include, path + 2. Add a URL to urlpatterns: path('blog/', include('blog.urls')) +""" +from django.contrib import admin +from django.urls import include, path + +urlpatterns = [ + path("admin/", admin.site.urls), + path("api-auth/", include("rest_framework.urls", namespace="rest_framework")), + path("api/", include("backend.urls")), +] diff --git a/hackens_orga/hackens_orga/wsgi.py b/hackens_orga/hackens_orga/wsgi.py new file mode 100644 index 0000000..d491cb4 --- /dev/null +++ b/hackens_orga/hackens_orga/wsgi.py @@ -0,0 +1,16 @@ +""" +WSGI config for hackens_orga project. + +It exposes the WSGI callable as a module-level variable named ``application``. + +For more information on this file, see +https://docs.djangoproject.com/en/3.2/howto/deployment/wsgi/ +""" + +import os + +from django.core.wsgi import get_wsgi_application + +os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'hackens_orga.settings') + +application = get_wsgi_application() diff --git a/hackens_orga/manage.py b/hackens_orga/manage.py new file mode 100755 index 0000000..f1290e6 --- /dev/null +++ b/hackens_orga/manage.py @@ -0,0 +1,22 @@ +#!/nix/store/xzyq7h4cmjkr596010w5x6icrc918cgr-python3-3.10.9/bin/python +"""Django's command-line utility for administrative tasks.""" +import os +import sys + + +def main(): + """Run administrative tasks.""" + os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'hackens_orga.settings') + try: + from django.core.management import execute_from_command_line + except ImportError as exc: + raise ImportError( + "Couldn't import Django. Are you sure it's installed and " + "available on your PYTHONPATH environment variable? Did you " + "forget to activate a virtual environment?" + ) from exc + execute_from_command_line(sys.argv) + + +if __name__ == '__main__': + main() diff --git a/nix/default.nix b/nix/default.nix new file mode 100644 index 0000000..f782f86 --- /dev/null +++ b/nix/default.nix @@ -0,0 +1,6 @@ +# nix/default.nix +{ pkgs ? import {} }: +let + sources = import ./sources.nix; +in +import sources.nixpkgs { } diff --git a/nix/drf-knox.nix b/nix/drf-knox.nix new file mode 100644 index 0000000..693a5c6 --- /dev/null +++ b/nix/drf-knox.nix @@ -0,0 +1,20 @@ +{ djangorestframework, cryptography, django, fetchPypi, buildPythonPackage }: +buildPythonPackage rec { + pname = "djangorestframework-knox"; + version = "4.2.0"; + + src = fetchPypi { + pname = "django-rest-knox"; + inherit version; + sha256 = "sha256-RZXx3CPW5Br3k55fLY/a9q3gp0plYhjntWaD21Vm/Mk="; + }; + + propagatedBuildInputs = [ + django + djangorestframework + cryptography + ]; + + # Test raises django.core.exceptions.ImproperlyConfigured + doCheck = false; +} diff --git a/nix/sources.json b/nix/sources.json new file mode 100644 index 0000000..b2e4875 --- /dev/null +++ b/nix/sources.json @@ -0,0 +1,14 @@ +{ + "nixpkgs": { + "branch": "nixos-22.05", + "description": "Nix Packages collection", + "homepage": "", + "owner": "NixOS", + "repo": "nixpkgs", + "rev": "0874168639713f547c05947c76124f78441ea46c", + "sha256": "0gw5l5bj3zcgxhp7ki1jafy6sl5nk4vr43hal94lhi15kg2vfmfy", + "type": "tarball", + "url": "https://github.com/NixOS/nixpkgs/archive/0874168639713f547c05947c76124f78441ea46c.tar.gz", + "url_template": "https://github.com///archive/.tar.gz" + } +} diff --git a/nix/sources.nix b/nix/sources.nix new file mode 100644 index 0000000..9a01c8a --- /dev/null +++ b/nix/sources.nix @@ -0,0 +1,194 @@ +# This file has been generated by Niv. + +let + + # + # The fetchers. fetch_ fetches specs of type . + # + + fetch_file = pkgs: name: spec: + let + name' = sanitizeName name + "-src"; + in + if spec.builtin or true then + builtins_fetchurl { inherit (spec) url sha256; name = name'; } + else + pkgs.fetchurl { inherit (spec) url sha256; name = name'; }; + + fetch_tarball = pkgs: name: spec: + let + name' = sanitizeName name + "-src"; + in + if spec.builtin or true then + builtins_fetchTarball { name = name'; inherit (spec) url sha256; } + else + pkgs.fetchzip { name = name'; inherit (spec) url sha256; }; + + fetch_git = name: spec: + let + ref = + if spec ? ref then spec.ref else + if spec ? branch then "refs/heads/${spec.branch}" else + if spec ? tag then "refs/tags/${spec.tag}" else + abort "In git source '${name}': Please specify `ref`, `tag` or `branch`!"; + submodules = if spec ? submodules then spec.submodules else false; + submoduleArg = + let + nixSupportsSubmodules = builtins.compareVersions builtins.nixVersion "2.4" >= 0; + emptyArgWithWarning = + if submodules == true + then + builtins.trace + ( + "The niv input \"${name}\" uses submodules " + + "but your nix's (${builtins.nixVersion}) builtins.fetchGit " + + "does not support them" + ) + {} + else {}; + in + if nixSupportsSubmodules + then { inherit submodules; } + else emptyArgWithWarning; + in + builtins.fetchGit + ({ url = spec.repo; inherit (spec) rev; inherit ref; } // submoduleArg); + + fetch_local = spec: spec.path; + + fetch_builtin-tarball = name: throw + ''[${name}] The niv type "builtin-tarball" is deprecated. You should instead use `builtin = true`. + $ niv modify ${name} -a type=tarball -a builtin=true''; + + fetch_builtin-url = name: throw + ''[${name}] The niv type "builtin-url" will soon be deprecated. You should instead use `builtin = true`. + $ niv modify ${name} -a type=file -a builtin=true''; + + # + # Various helpers + # + + # https://github.com/NixOS/nixpkgs/pull/83241/files#diff-c6f540a4f3bfa4b0e8b6bafd4cd54e8bR695 + sanitizeName = name: + ( + concatMapStrings (s: if builtins.isList s then "-" else s) + ( + builtins.split "[^[:alnum:]+._?=-]+" + ((x: builtins.elemAt (builtins.match "\\.*(.*)" x) 0) name) + ) + ); + + # The set of packages used when specs are fetched using non-builtins. + mkPkgs = sources: system: + let + sourcesNixpkgs = + import (builtins_fetchTarball { inherit (sources.nixpkgs) url sha256; }) { inherit system; }; + hasNixpkgsPath = builtins.any (x: x.prefix == "nixpkgs") builtins.nixPath; + hasThisAsNixpkgsPath = == ./.; + in + if builtins.hasAttr "nixpkgs" sources + then sourcesNixpkgs + else if hasNixpkgsPath && ! hasThisAsNixpkgsPath then + import {} + else + abort + '' + Please specify either (through -I or NIX_PATH=nixpkgs=...) or + add a package called "nixpkgs" to your sources.json. + ''; + + # The actual fetching function. + fetch = pkgs: name: spec: + + if ! builtins.hasAttr "type" spec then + abort "ERROR: niv spec ${name} does not have a 'type' attribute" + else if spec.type == "file" then fetch_file pkgs name spec + else if spec.type == "tarball" then fetch_tarball pkgs name spec + else if spec.type == "git" then fetch_git name spec + else if spec.type == "local" then fetch_local spec + else if spec.type == "builtin-tarball" then fetch_builtin-tarball name + else if spec.type == "builtin-url" then fetch_builtin-url name + else + abort "ERROR: niv spec ${name} has unknown type ${builtins.toJSON spec.type}"; + + # If the environment variable NIV_OVERRIDE_${name} is set, then use + # the path directly as opposed to the fetched source. + replace = name: drv: + let + saneName = stringAsChars (c: if isNull (builtins.match "[a-zA-Z0-9]" c) then "_" else c) name; + ersatz = builtins.getEnv "NIV_OVERRIDE_${saneName}"; + in + if ersatz == "" then drv else + # this turns the string into an actual Nix path (for both absolute and + # relative paths) + if builtins.substring 0 1 ersatz == "/" then /. + ersatz else /. + builtins.getEnv "PWD" + "/${ersatz}"; + + # Ports of functions for older nix versions + + # a Nix version of mapAttrs if the built-in doesn't exist + mapAttrs = builtins.mapAttrs or ( + f: set: with builtins; + listToAttrs (map (attr: { name = attr; value = f attr set.${attr}; }) (attrNames set)) + ); + + # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/lists.nix#L295 + range = first: last: if first > last then [] else builtins.genList (n: first + n) (last - first + 1); + + # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L257 + stringToCharacters = s: map (p: builtins.substring p 1 s) (range 0 (builtins.stringLength s - 1)); + + # https://github.com/NixOS/nixpkgs/blob/0258808f5744ca980b9a1f24fe0b1e6f0fecee9c/lib/strings.nix#L269 + stringAsChars = f: s: concatStrings (map f (stringToCharacters s)); + concatMapStrings = f: list: concatStrings (map f list); + concatStrings = builtins.concatStringsSep ""; + + # https://github.com/NixOS/nixpkgs/blob/8a9f58a375c401b96da862d969f66429def1d118/lib/attrsets.nix#L331 + optionalAttrs = cond: as: if cond then as else {}; + + # fetchTarball version that is compatible between all the versions of Nix + builtins_fetchTarball = { url, name ? null, sha256 }@attrs: + let + inherit (builtins) lessThan nixVersion fetchTarball; + in + if lessThan nixVersion "1.12" then + fetchTarball ({ inherit url; } // (optionalAttrs (!isNull name) { inherit name; })) + else + fetchTarball attrs; + + # fetchurl version that is compatible between all the versions of Nix + builtins_fetchurl = { url, name ? null, sha256 }@attrs: + let + inherit (builtins) lessThan nixVersion fetchurl; + in + if lessThan nixVersion "1.12" then + fetchurl ({ inherit url; } // (optionalAttrs (!isNull name) { inherit name; })) + else + fetchurl attrs; + + # Create the final "sources" from the config + mkSources = config: + mapAttrs ( + name: spec: + if builtins.hasAttr "outPath" spec + then abort + "The values in sources.json should not have an 'outPath' attribute" + else + spec // { outPath = replace name (fetch config.pkgs name spec); } + ) config.sources; + + # The "config" used by the fetchers + mkConfig = + { sourcesFile ? if builtins.pathExists ./sources.json then ./sources.json else null + , sources ? if isNull sourcesFile then {} else builtins.fromJSON (builtins.readFile sourcesFile) + , system ? builtins.currentSystem + , pkgs ? mkPkgs sources system + }: rec { + # The sources, i.e. the attribute set of spec name to spec + inherit sources; + + # The "pkgs" (evaluated nixpkgs) to use for e.g. non-builtin fetchers + inherit pkgs; + }; + +in +mkSources (mkConfig {}) // { __functor = _: settings: mkSources (mkConfig settings); } diff --git a/shell.nix b/shell.nix new file mode 100644 index 0000000..b5709f2 --- /dev/null +++ b/shell.nix @@ -0,0 +1,14 @@ +{ pkgs ? import ./nix {} }: +pkgs.mkShell { + buildInputs = [ + (pkgs.python310.withPackages (ps: [ + ps.django + ps.black + ps.isort + ps.djangorestframework + ps.django-extensions + #ps.django_guardian + #(ps.callPackage ./nix/drf-knox.nix {}) + ])) + ]; +}