2bef0ba240
Executes the previously added mdBook on the previously added book source to yield a directory that can be served by Nixery on its index page. This is one of those 'I <3 Nix' things due to how easy it is to do.
130 lines
4.1 KiB
Nix
130 lines
4.1 KiB
Nix
# Copyright 2019 Google LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# https://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
{ pkgs ? import <nixpkgs> {}
|
|
, preLaunch ? "" }:
|
|
|
|
with pkgs;
|
|
|
|
rec {
|
|
# Go implementation of the Nixery server which implements the
|
|
# container registry interface.
|
|
#
|
|
# Users will usually not want to use this directly, instead see the
|
|
# 'nixery' derivation below, which automatically includes runtime
|
|
# data dependencies.
|
|
nixery-server = buildGoPackage {
|
|
name = "nixery-server";
|
|
|
|
# Technically people should not be building Nixery through 'go get'
|
|
# or similar (as other required files will not be included), but
|
|
# buildGoPackage requires a package path.
|
|
goPackagePath = "github.com/google/nixery";
|
|
|
|
goDeps = ./go-deps.nix;
|
|
src = ./.;
|
|
|
|
meta = {
|
|
description = "Container image build serving Nix-backed images";
|
|
homepage = "https://github.com/google/nixery";
|
|
license = lib.licenses.asl20;
|
|
maintainers = [ lib.maintainers.tazjin ];
|
|
};
|
|
};
|
|
|
|
# Nix expression (unimported!) which is used by Nixery to build
|
|
# container images.
|
|
nixery-builder = runCommand "build-registry-image.nix" {} ''
|
|
cat ${./build-registry-image.nix} > $out
|
|
'';
|
|
|
|
# nixpkgs currently has an old version of mdBook. A new version is
|
|
# built here, but eventually the update will be upstreamed
|
|
# (nixpkgs#65890)
|
|
mdbook = rustPlatform.buildRustPackage rec {
|
|
name = "mdbook-${version}";
|
|
version = "0.3.1";
|
|
doCheck = false;
|
|
|
|
src = fetchFromGitHub {
|
|
owner = "rust-lang-nursery";
|
|
repo = "mdBook";
|
|
rev = "v${version}";
|
|
sha256 = "0py69267jbs6b7zw191hcs011cm1v58jz8mglqx3ajkffdfl3ghw";
|
|
};
|
|
|
|
cargoSha256 = "0qwhc42a86jpvjcaysmfcw8kmwa150lmz01flmlg74g6qnimff5m";
|
|
};
|
|
|
|
# Use mdBook to build a static asset page which Nixery can then
|
|
# serve. This is primarily used for the public instance at
|
|
# nixery.dev.
|
|
nixery-book = callPackage ./docs { inherit mdbook; };
|
|
|
|
# Wrapper script running the Nixery server with the above two data
|
|
# dependencies configured.
|
|
#
|
|
# In most cases, this will be the derivation a user wants if they
|
|
# are installing Nixery directly.
|
|
nixery-bin = writeShellScriptBin "nixery" ''
|
|
export NIX_BUILDER="${nixery-builder}"
|
|
export WEB_DIR="${nixery-book}"
|
|
exec ${nixery-server}/bin/nixery
|
|
'';
|
|
|
|
# Container image containing Nixery and Nix itself. This image can
|
|
# be run on Kubernetes, published on AppEngine or whatever else is
|
|
# desired.
|
|
nixery-image = let
|
|
# Wrapper script for the wrapper script (meta!) which configures
|
|
# the container environment appropriately.
|
|
#
|
|
# Most importantly, sandboxing is disabled to avoid privilege
|
|
# issues in containers.
|
|
nixery-launch-script = writeShellScriptBin "nixery" ''
|
|
set -e
|
|
export NIX_SSL_CERT_FILE=/etc/ssl/certs/ca-bundle.crt
|
|
mkdir /tmp
|
|
|
|
# Create the build user/group required by Nix
|
|
echo 'nixbld:x:30000:nixbld' >> /etc/group
|
|
echo 'nixbld:x:30000:30000:nixbld:/tmp:/bin/bash' >> /etc/passwd
|
|
|
|
# Disable sandboxing to avoid running into privilege issues
|
|
mkdir -p /etc/nix
|
|
echo 'sandbox = false' >> /etc/nix/nix.conf
|
|
|
|
# In some cases users building their own image might want to
|
|
# customise something on the inside (e.g. set up an environment
|
|
# for keys or whatever).
|
|
#
|
|
# This can be achieved by setting a 'preLaunch' script.
|
|
${preLaunch}
|
|
|
|
exec ${nixery-bin}/bin/nixery
|
|
'';
|
|
in dockerTools.buildLayeredImage {
|
|
name = "nixery";
|
|
config.Cmd = ["${nixery-launch-script}/bin/nixery"];
|
|
contents = [
|
|
cacert
|
|
coreutils
|
|
git
|
|
gnutar
|
|
gzip
|
|
nix
|
|
nixery-launch-script
|
|
openssh
|
|
];
|
|
};
|
|
}
|