2019-07-30 14:25:04 +02:00
|
|
|
<div align="center">
|
2019-08-05 02:20:52 +02:00
|
|
|
<img src="docs/src/nixery-logo.png">
|
2019-07-30 14:25:04 +02:00
|
|
|
</div>
|
2019-07-23 21:24:51 +02:00
|
|
|
|
2019-07-30 14:25:04 +02:00
|
|
|
-----------------
|
|
|
|
|
|
|
|
[![Build Status](https://travis-ci.org/google/nixery.svg?branch=master)](https://travis-ci.org/google/nixery)
|
|
|
|
|
|
|
|
**Nixery** is a Docker-compatible container registry that is capable of
|
|
|
|
transparently building and serving container images using [Nix][].
|
2019-07-23 21:24:51 +02:00
|
|
|
|
2019-07-31 15:36:32 +02:00
|
|
|
Images are built on-demand based on the *image name*. Every package that the
|
|
|
|
user intends to include in the image is specified as a path component of the
|
|
|
|
image name.
|
|
|
|
|
|
|
|
The path components refer to top-level keys in `nixpkgs` and are used to build a
|
|
|
|
container image using Nix's [buildLayeredImage][] functionality.
|
|
|
|
|
2019-08-05 02:20:52 +02:00
|
|
|
A public instance as well as additional documentation is available at
|
|
|
|
[nixery.dev][public].
|
|
|
|
|
2019-07-23 21:24:51 +02:00
|
|
|
The project started out with the intention of becoming a Kubernetes controller
|
|
|
|
that can serve declarative image specifications specified in CRDs as container
|
|
|
|
images. The design for this is outlined in [a public gist][gist].
|
|
|
|
|
|
|
|
This is not an officially supported Google project.
|
|
|
|
|
|
|
|
## Usage example
|
|
|
|
|
2019-08-02 18:05:33 +02:00
|
|
|
Using the publicly available Nixery instance at `nixery.dev`, one could
|
2019-07-23 21:24:51 +02:00
|
|
|
retrieve a container image containing `curl` and an interactive shell like this:
|
|
|
|
|
|
|
|
```shell
|
2019-08-02 18:05:33 +02:00
|
|
|
tazjin@tazbox:~$ sudo docker run -ti nixery.dev/shell/curl bash
|
|
|
|
Unable to find image 'nixery.dev/shell/curl:latest' locally
|
2019-07-23 21:24:51 +02:00
|
|
|
latest: Pulling from shell/curl
|
|
|
|
7734b79e1ba1: Already exists
|
|
|
|
b0d2008d18cd: Pull complete
|
|
|
|
< ... some layers omitted ...>
|
|
|
|
Digest: sha256:178270bfe84f74548b6a43347d73524e5c2636875b673675db1547ec427cf302
|
2019-08-02 18:05:33 +02:00
|
|
|
Status: Downloaded newer image for nixery.dev/shell/curl:latest
|
2019-07-23 21:24:51 +02:00
|
|
|
bash-4.4# curl --version
|
|
|
|
curl 7.64.0 (x86_64-pc-linux-gnu) libcurl/7.64.0 OpenSSL/1.0.2q zlib/1.2.11 libssh2/1.8.0 nghttp2/1.35.1
|
|
|
|
```
|
|
|
|
|
2019-07-31 15:36:32 +02:00
|
|
|
The special meta-package `shell` provides an image base with many core
|
|
|
|
components (such as `bash` and `coreutils`) that users commonly expect in
|
|
|
|
interactive images.
|
|
|
|
|
|
|
|
## Feature overview
|
|
|
|
|
|
|
|
* Serve container images on-demand using image names as content specifications
|
|
|
|
|
|
|
|
Specify package names as path components and Nixery will create images, using
|
|
|
|
the most efficient caching strategy it can to share data between different
|
|
|
|
images.
|
|
|
|
|
|
|
|
* Use private package sets from various sources
|
2019-07-29 22:03:04 +02:00
|
|
|
|
2019-07-31 15:36:32 +02:00
|
|
|
In addition to building images from the publicly available Nix/NixOS channels,
|
|
|
|
a private Nixery instance can be configured to serve images built from a
|
|
|
|
package set hosted in a custom git repository or filesystem path.
|
2019-07-29 22:03:04 +02:00
|
|
|
|
2019-07-31 15:36:32 +02:00
|
|
|
When using this feature with custom git repositories, Nixery will forward the
|
|
|
|
specified image tags as git references.
|
2019-07-29 22:03:04 +02:00
|
|
|
|
2019-07-31 15:36:32 +02:00
|
|
|
For example, if a company used a custom repository overlaying their packages
|
|
|
|
on the Nix package set, images could be built from a git tag `release-v2`:
|
2019-07-29 22:03:04 +02:00
|
|
|
|
2019-07-31 15:36:32 +02:00
|
|
|
`docker pull nixery.thecompany.website/custom-service:release-v2`
|
|
|
|
|
|
|
|
* Efficient serving of image layers from Google Cloud Storage
|
|
|
|
|
|
|
|
After building an image, Nixery stores all of its layers in a GCS bucket and
|
|
|
|
forwards requests to retrieve layers to the bucket. This enables efficient
|
|
|
|
serving of layers, as well as sharing of image layers between redundant
|
|
|
|
instances.
|
|
|
|
|
|
|
|
## Configuration
|
|
|
|
|
|
|
|
Nixery supports the following configuration options, provided via environment
|
|
|
|
variables:
|
|
|
|
|
|
|
|
* `BUCKET`: [Google Cloud Storage][gcs] bucket to store & serve image layers
|
|
|
|
* `PORT`: HTTP port on which Nixery should listen
|
|
|
|
* `NIXERY_CHANNEL`: The name of a Nix/NixOS channel to use for building
|
|
|
|
* `NIXERY_PKGS_REPO`: URL of a git repository containing a package set (uses
|
|
|
|
locally configured SSH/git credentials)
|
|
|
|
* `NIXERY_PKGS_PATH`: A local filesystem path containing a Nix package set to use
|
|
|
|
for building
|
2019-08-03 02:25:21 +02:00
|
|
|
* `GCS_SIGNING_KEY`: A Google service account key (in PEM format) that can be
|
|
|
|
used to sign Cloud Storage URLs
|
|
|
|
* `GCS_SIGNING_ACCOUNT`: Google service account ID that the signing key belongs
|
|
|
|
to
|
2019-07-31 15:36:32 +02:00
|
|
|
|
|
|
|
## Roadmap
|
2019-07-29 22:03:04 +02:00
|
|
|
|
2019-08-05 02:20:52 +02:00
|
|
|
### Kubernetes integration
|
2019-07-23 21:24:51 +02:00
|
|
|
|
2019-07-29 22:03:04 +02:00
|
|
|
It should be trivial to deploy Nixery inside of a Kubernetes cluster with
|
|
|
|
correct caching behaviour, addressing and so on.
|
2019-07-23 21:24:51 +02:00
|
|
|
|
2019-07-29 22:03:04 +02:00
|
|
|
See [issue #4](https://github.com/google/nixery/issues/4).
|
2019-07-23 21:24:51 +02:00
|
|
|
|
|
|
|
[Nix]: https://nixos.org/
|
|
|
|
[gist]: https://gist.github.com/tazjin/08f3d37073b3590aacac424303e6f745
|
|
|
|
[buildLayeredImage]: https://grahamc.com/blog/nix-and-layered-docker-images
|
2019-08-05 02:20:52 +02:00
|
|
|
[public]: https://nixery.dev
|
2019-07-31 15:36:32 +02:00
|
|
|
[gcs]: https://cloud.google.com/storage/
|