tvl-depot/tools/nixery
Florian Klink 970f492235 feat(ci): add integration tests to GitHub Actions, remove .travis.yaml
This copies the integration tests from `.travis.yaml` into a script,
documents the assumptions it makes, and wires it into GitHub Actions.

Contrary to the travis version, we don't use Nixery's GCS backend, as
handing out access to the bucket used, especially for PRs, needs to be
done carefully.

Adding back GCS to the integration test can be done at a later point,
either by using a mock server, or by only exposing the credentials for
master builds (and have the test script decide on whether
GOOGLE_APPLICATION_CREDENTIALS is set or not).

The previous travis version had some complicated post-mortem log
gathering - instead of doing this, we can just `docker run` nixery, but
fork it into the background with the shell - causing it to still be able
to log its output as it's running.

An additional `--rm` is appended, so the container gets cleaned up on
termination - this allows subsequent runs on non-CI infrastructure (like
developer laptops), without having to manually clean up containers.

Fixes #119.
2021-04-29 23:44:42 +02:00
..
.github/workflows feat(ci): add integration tests to GitHub Actions, remove .travis.yaml 2021-04-29 23:44:42 +02:00
builder feat(storage): Add support for content-types (GCS only) 2020-10-29 17:07:52 +01:00
config docs(config): Fix comment typo 2020-12-04 14:17:21 +01:00
docs chore(nix): update channel 19.03 -> 20.03 2020-05-01 11:58:31 +01:00
logs refactor: Reshuffle file structure for better code layout 2019-11-27 14:12:38 +00:00
manifest feat(storage): Add support for content-types (GCS only) 2020-10-29 17:07:52 +01:00
popcount fix(popcount): Accommodate upstream changes on nixos.org 2020-07-25 14:43:21 +01:00
prepare-image chore(nix): update channel URL 2021-04-14 14:10:53 +02:00
scripts feat(ci): add integration tests to GitHub Actions, remove .travis.yaml 2021-04-29 23:44:42 +02:00
storage feat(storage): Add support for content-types (GCS only) 2020-10-29 17:07:52 +01:00
.gitattributes docs: Replace static page with mdBook site 2019-08-05 00:32:53 +01:00
.gitignore chore: Prevent accidental key leaks via gitignore 2019-08-03 01:25:36 +01:00
CONTRIBUTING.md docs(CONTRIBUTING): Mention commit message format 2019-07-29 21:10:04 +01:00
default.nix chore(build): Change pin for default nixpkgs used to build Nixery 2020-07-25 14:43:21 +01:00
go-deps.nix chore(build): Update pinned Go dependencies 2020-07-25 14:43:21 +01:00
LICENSE chore: Add license scaffolding & contribution guidelines 2019-07-23 23:32:56 +01:00
main.go feat(storage): Add generic support for content-types 2021-04-27 15:39:58 +02:00
nixpkgs-pin.nix chore(build): Change pin for default nixpkgs used to build Nixery 2020-07-25 14:43:21 +01:00
README.md docs: Update README with a link to the NixCon talk 2020-12-05 14:34:09 +01:00
shell.nix refactor: Reshuffle file structure for better code layout 2019-11-27 14:12:38 +00:00


Build Status

Nixery is a Docker-compatible container registry that is capable of transparently building and serving container images using Nix.

Images are built on-demand based on the image name. Every package that the user intends to include in the image is specified as a path component of the image name.

The path components refer to top-level keys in nixpkgs and are used to build a container image using a layering strategy that optimises for caching popular and/or large dependencies.

A public instance as well as additional documentation is available at nixery.dev.

You can watch the NixCon 2019 talk about Nixery for more information about the project and its use-cases.

This is not an officially supported Google project.

Demo

Click the image to see an example in which an image containing an interactive shell and GNU hello is downloaded.

asciicast

To try it yourself, head to nixery.dev!

The special meta-package shell provides an image base with many core components (such as bash and coreutils) that users commonly expect in interactive images.

Feature overview

  • Serve container images on-demand using image names as content specifications

    Specify package names as path components and Nixery will create images, using the most efficient caching strategy it can to share data between different images.

  • Use private package sets from various sources

    In addition to building images from the publicly available Nix/NixOS channels, a private Nixery instance can be configured to serve images built from a package set hosted in a custom git repository or filesystem path.

    When using this feature with custom git repositories, Nixery will forward the specified image tags as git references.

    For example, if a company used a custom repository overlaying their packages on the Nix package set, images could be built from a git tag release-v2:

    docker pull nixery.thecompany.website/custom-service:release-v2

  • Efficient serving of image layers from Google Cloud Storage

    After building an image, Nixery stores all of its layers in a GCS bucket and forwards requests to retrieve layers to the bucket. This enables efficient serving of layers, as well as sharing of image layers between redundant instances.

Configuration

Nixery supports the following configuration options, provided via environment variables:

  • PORT: HTTP port on which Nixery should listen

  • NIXERY_CHANNEL: The name of a Nix/NixOS channel to use for building

  • NIXERY_PKGS_REPO: URL of a git repository containing a package set (uses locally configured SSH/git credentials)

  • NIXERY_PKGS_PATH: A local filesystem path containing a Nix package set to use for building

  • NIXERY_STORAGE_BACKEND: The type of backend storage to use, currently supported values are gcs (Google Cloud Storage) and filesystem.

    For each of these additional backend configuration is necessary, see the storage section for details.

  • NIX_TIMEOUT: Number of seconds that any Nix builder is allowed to run (defaults to 60)

  • NIX_POPULARITY_URL: URL to a file containing popularity data for the package set (see popcount/)

If the GOOGLE_APPLICATION_CREDENTIALS environment variable is set to a service account key, Nixery will also use this key to create [signed URLs][] for layers in the storage bucket. This makes it possible to serve layers from a bucket without having to make them publicly available.

Storage

Nixery supports multiple different storage backends in which its build cache and image layers are kept, and from which they are served.

Currently the available storage backends are Google Cloud Storage and the local file system.

In the GCS case, images are served by redirecting clients to the storage bucket. Layers stored on the filesystem are served straight from the local disk.

These extra configuration variables must be set to configure storage backends:

  • GCS_BUCKET: Name of the Google Cloud Storage bucket to use (required for gcs)
  • GOOGLE_APPLICATION_CREDENTIALS: Path to a GCP service account JSON key (optional for gcs)
  • STORAGE_PATH: Path to a folder in which to store and from which to serve data (required for filesystem)

Background

The project started out inspired by the buildLayeredImage blog post with the intention of becoming a Kubernetes controller that can serve declarative image specifications specified in CRDs as container images. The design for this was outlined in a public gist.

Roadmap

Kubernetes integration

It should be trivial to deploy Nixery inside of a Kubernetes cluster with correct caching behaviour, addressing and so on.

See issue #4.

Nix-native builder

The image building and layering functionality of Nixery will be extracted into a separate Nix function, which will make it possible to build images directly in Nix builds.