2022-10-15 22:02:13 +02:00
|
|
|
{
|
2023-04-05 01:56:51 +02:00
|
|
|
inputs = {
|
2023-06-18 02:02:10 +02:00
|
|
|
nixpkgs.url = "github:NixOS/nixpkgs?ref=nixos-unstable";
|
2023-04-05 01:56:51 +02:00
|
|
|
flake-utils.url = "github:numtide/flake-utils";
|
2024-01-21 03:58:57 +01:00
|
|
|
nix-filter.url = "github:numtide/nix-filter";
|
2024-02-07 17:36:05 +01:00
|
|
|
flake-compat = {
|
|
|
|
url = "github:edolstra/flake-compat";
|
|
|
|
flake = false;
|
|
|
|
};
|
2023-04-05 01:56:51 +02:00
|
|
|
|
|
|
|
fenix = {
|
|
|
|
url = "github:nix-community/fenix";
|
|
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
};
|
2023-04-05 02:30:30 +02:00
|
|
|
crane = {
|
2024-03-06 03:42:17 +01:00
|
|
|
# Pin latest crane that's not affected by the following bugs:
|
|
|
|
#
|
|
|
|
# * <https://github.com/ipetkov/crane/issues/527#issuecomment-1978079140>
|
|
|
|
# * <https://github.com/toml-rs/toml/issues/691>
|
|
|
|
# * <https://github.com/toml-rs/toml/issues/267>
|
|
|
|
url = "github:ipetkov/crane?rev=2c653e4478476a52c6aa3ac0495e4dea7449ea0e";
|
2023-04-05 01:56:51 +02:00
|
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
2023-01-27 22:10:21 +01:00
|
|
|
};
|
2024-01-26 05:39:59 +01:00
|
|
|
attic.url = "github:zhaofengli/attic?ref=main";
|
2023-04-05 01:56:51 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
outputs =
|
|
|
|
{ self
|
|
|
|
, nixpkgs
|
|
|
|
, flake-utils
|
2024-01-21 03:58:57 +01:00
|
|
|
, nix-filter
|
2023-04-05 01:56:51 +02:00
|
|
|
|
|
|
|
, fenix
|
2023-04-05 02:30:30 +02:00
|
|
|
, crane
|
2024-01-26 05:39:59 +01:00
|
|
|
, ...
|
2023-04-05 01:56:51 +02:00
|
|
|
}: flake-utils.lib.eachDefaultSystem (system:
|
|
|
|
let
|
2024-01-26 05:39:59 +01:00
|
|
|
pkgsHost = nixpkgs.legacyPackages.${system};
|
2024-04-11 05:03:40 +02:00
|
|
|
allocator = null;
|
2023-04-05 04:11:34 +02:00
|
|
|
|
2024-03-09 21:45:27 +01:00
|
|
|
rocksdb' = pkgs:
|
|
|
|
let
|
2024-03-29 00:29:51 +01:00
|
|
|
version = "9.0.0";
|
2024-03-09 21:45:27 +01:00
|
|
|
in
|
2024-04-11 02:31:00 +02:00
|
|
|
(pkgs.rocksdb.overrideAttrs (old: {
|
2024-03-09 21:45:27 +01:00
|
|
|
inherit version;
|
|
|
|
src = pkgs.fetchFromGitHub {
|
2024-03-29 00:29:51 +01:00
|
|
|
owner = "girlbossceo";
|
2024-03-09 21:45:27 +01:00
|
|
|
repo = "rocksdb";
|
2024-03-29 00:29:51 +01:00
|
|
|
rev = "449768a833b79c267c584b5ab1d50e73db6faf9d";
|
|
|
|
hash = "sha256-MjmGfAlZ5WC2+hFH6nEUprqBjO8xiTQh2HJIqQ5mIg8=";
|
2024-03-09 21:45:27 +01:00
|
|
|
};
|
2024-04-11 02:31:00 +02:00
|
|
|
}));
|
2024-02-14 19:08:23 +01:00
|
|
|
|
2023-04-05 01:56:51 +02:00
|
|
|
# Nix-accessible `Cargo.toml`
|
|
|
|
cargoToml = builtins.fromTOML (builtins.readFile ./Cargo.toml);
|
|
|
|
|
|
|
|
# The Rust toolchain to use
|
2024-01-26 05:39:59 +01:00
|
|
|
toolchain = fenix.packages.${system}.fromToolchainFile {
|
|
|
|
file = ./rust-toolchain.toml;
|
2023-04-05 01:56:51 +02:00
|
|
|
|
2024-01-26 05:39:59 +01:00
|
|
|
# See also `rust-toolchain.toml`
|
2024-01-17 19:18:36 +01:00
|
|
|
sha256 = "sha256-SXRtAuO4IqNOQq+nLbrsDFbVk+3aVA8NNpSZsKlVH/8=";
|
2023-04-05 01:56:51 +02:00
|
|
|
};
|
|
|
|
|
2024-01-26 05:39:59 +01:00
|
|
|
builder = pkgs:
|
|
|
|
((crane.mkLib pkgs).overrideToolchain toolchain).buildPackage;
|
2023-12-21 01:11:49 +01:00
|
|
|
|
2024-01-26 05:39:59 +01:00
|
|
|
nativeBuildInputs = pkgs: [
|
|
|
|
# bindgen needs the build platform's libclang. Apparently due to
|
|
|
|
# "splicing weirdness", pkgs.rustPlatform.bindgenHook on its own doesn't
|
|
|
|
# quite do the right thing here.
|
2024-03-06 03:42:17 +01:00
|
|
|
pkgs.pkgsBuildHost.rustPlatform.bindgenHook
|
2024-01-26 05:39:59 +01:00
|
|
|
];
|
2023-12-21 01:11:49 +01:00
|
|
|
|
2024-01-26 05:39:59 +01:00
|
|
|
env = pkgs: {
|
2024-03-23 00:50:57 +01:00
|
|
|
CONDUIT_VERSION_EXTRA = self.shortRev or self.dirtyShortRev;
|
2024-02-14 19:28:28 +01:00
|
|
|
ROCKSDB_INCLUDE_DIR = "${rocksdb' pkgs}/include";
|
|
|
|
ROCKSDB_LIB_DIR = "${rocksdb' pkgs}/lib";
|
2024-01-26 05:39:59 +01:00
|
|
|
}
|
|
|
|
// pkgs.lib.optionalAttrs pkgs.stdenv.hostPlatform.isStatic {
|
|
|
|
ROCKSDB_STATIC = "";
|
|
|
|
}
|
|
|
|
// {
|
|
|
|
CARGO_BUILD_RUSTFLAGS = let inherit (pkgs) lib stdenv; in
|
2024-03-09 21:45:27 +01:00
|
|
|
lib.concatStringsSep " " ([ ]
|
2024-01-26 05:39:59 +01:00
|
|
|
++ lib.optionals
|
2024-03-09 21:45:27 +01:00
|
|
|
# This disables PIE for static builds, which isn't great in terms
|
|
|
|
# of security. Unfortunately, my hand is forced because nixpkgs'
|
|
|
|
# `libstdc++.a` is built without `-fPIE`, which precludes us from
|
|
|
|
# leaving PIE enabled.
|
|
|
|
stdenv.hostPlatform.isStatic
|
|
|
|
[ "-C" "relocation-model=static" ]
|
2024-01-26 05:39:59 +01:00
|
|
|
++ lib.optionals
|
2024-03-09 21:45:27 +01:00
|
|
|
(stdenv.buildPlatform.config != stdenv.hostPlatform.config)
|
|
|
|
[ "-l" "c" ]
|
2024-01-26 05:39:59 +01:00
|
|
|
++ lib.optionals
|
2024-03-09 21:45:27 +01:00
|
|
|
# This check has to match the one [here][0]. We only need to set
|
|
|
|
# these flags when using a different linker. Don't ask me why,
|
|
|
|
# though, because I don't know. All I know is it breaks otherwise.
|
|
|
|
#
|
|
|
|
# [0]: https://github.com/NixOS/nixpkgs/blob/5cdb38bb16c6d0a38779db14fcc766bc1b2394d6/pkgs/build-support/rust/lib/default.nix#L37-L40
|
|
|
|
(
|
|
|
|
# Nixpkgs doesn't check for x86_64 here but we do, because I
|
|
|
|
# observed a failure building statically for x86_64 without
|
|
|
|
# including it here. Linkers are weird.
|
|
|
|
(stdenv.hostPlatform.isAarch64 || stdenv.hostPlatform.isx86_64)
|
|
|
|
&& stdenv.hostPlatform.isStatic
|
|
|
|
&& !stdenv.isDarwin
|
|
|
|
&& !stdenv.cc.bintools.isLLVM
|
|
|
|
)
|
|
|
|
[
|
|
|
|
"-l"
|
|
|
|
"stdc++"
|
|
|
|
"-L"
|
|
|
|
"${stdenv.cc.cc.lib}/${stdenv.hostPlatform.config}/lib"
|
|
|
|
]
|
2024-01-26 05:39:59 +01:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
# What follows is stolen from [here][0]. Its purpose is to properly
|
|
|
|
# configure compilers and linkers for various stages of the build, and
|
|
|
|
# even covers the case of build scripts that need native code compiled and
|
|
|
|
# run on the build platform (I think).
|
|
|
|
#
|
2024-03-06 03:42:17 +01:00
|
|
|
# [0]: https://github.com/NixOS/nixpkgs/blob/5cdb38bb16c6d0a38779db14fcc766bc1b2394d6/pkgs/build-support/rust/lib/default.nix#L57-L80
|
2024-01-26 05:39:59 +01:00
|
|
|
// (
|
|
|
|
let
|
|
|
|
inherit (pkgs.rust.lib) envVars;
|
|
|
|
in
|
|
|
|
pkgs.lib.optionalAttrs
|
|
|
|
(pkgs.stdenv.targetPlatform.rust.rustcTarget
|
|
|
|
!= pkgs.stdenv.hostPlatform.rust.rustcTarget)
|
|
|
|
(
|
|
|
|
let
|
|
|
|
inherit (pkgs.stdenv.targetPlatform.rust) cargoEnvVarTarget;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
"CC_${cargoEnvVarTarget}" = envVars.ccForTarget;
|
|
|
|
"CXX_${cargoEnvVarTarget}" = envVars.cxxForTarget;
|
|
|
|
"CARGO_TARGET_${cargoEnvVarTarget}_LINKER" =
|
|
|
|
envVars.linkerForTarget;
|
|
|
|
}
|
|
|
|
)
|
2024-03-09 21:45:27 +01:00
|
|
|
// (
|
|
|
|
let
|
|
|
|
inherit (pkgs.stdenv.hostPlatform.rust) cargoEnvVarTarget rustcTarget;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
"CC_${cargoEnvVarTarget}" = envVars.ccForHost;
|
|
|
|
"CXX_${cargoEnvVarTarget}" = envVars.cxxForHost;
|
|
|
|
"CARGO_TARGET_${cargoEnvVarTarget}_LINKER" = envVars.linkerForHost;
|
|
|
|
CARGO_BUILD_TARGET = rustcTarget;
|
|
|
|
}
|
|
|
|
)
|
|
|
|
// (
|
|
|
|
let
|
|
|
|
inherit (pkgs.stdenv.buildPlatform.rust) cargoEnvVarTarget;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
"CC_${cargoEnvVarTarget}" = envVars.ccForBuild;
|
|
|
|
"CXX_${cargoEnvVarTarget}" = envVars.cxxForBuild;
|
|
|
|
"CARGO_TARGET_${cargoEnvVarTarget}_LINKER" = envVars.linkerForBuild;
|
|
|
|
HOST_CC = "${pkgs.pkgsBuildHost.stdenv.cc}/bin/cc";
|
|
|
|
HOST_CXX = "${pkgs.pkgsBuildHost.stdenv.cc}/bin/c++";
|
|
|
|
}
|
|
|
|
)
|
|
|
|
);
|
2024-01-26 05:39:59 +01:00
|
|
|
|
2024-04-11 05:03:40 +02:00
|
|
|
mkPackage = pkgs: allocator: builder pkgs {
|
2024-01-25 03:52:42 +01:00
|
|
|
src = nix-filter {
|
|
|
|
root = ./.;
|
|
|
|
include = [
|
|
|
|
"src"
|
|
|
|
"Cargo.toml"
|
|
|
|
"Cargo.lock"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2024-04-11 05:03:40 +02:00
|
|
|
buildFeatures = [ ]
|
|
|
|
++ (if allocator == "jemalloc" then [ "jemalloc" ] else [ ])
|
|
|
|
++ (if allocator == "hmalloc" then [ "hardened_malloc" ] else [ ])
|
|
|
|
;
|
2024-04-11 02:31:00 +02:00
|
|
|
|
2024-04-11 05:03:40 +02:00
|
|
|
rocksdb' = (if allocator == "jemalloc" then (pkgs.rocksdb.override { enableJemalloc = true; }) else (rocksdb' pkgs));
|
2024-04-11 02:31:00 +02:00
|
|
|
|
|
|
|
# This is redundant with CI
|
|
|
|
doCheck = false;
|
|
|
|
|
|
|
|
env = env pkgs;
|
|
|
|
nativeBuildInputs = nativeBuildInputs pkgs;
|
|
|
|
|
|
|
|
meta.mainProgram = cargoToml.package.name;
|
|
|
|
};
|
|
|
|
|
2024-04-11 05:03:40 +02:00
|
|
|
mkOciImage = pkgs: package: allocator:
|
2024-01-26 05:39:59 +01:00
|
|
|
pkgs.dockerTools.buildImage {
|
|
|
|
name = package.pname;
|
2024-01-27 15:08:33 +01:00
|
|
|
tag = "main";
|
2024-01-27 22:27:00 +01:00
|
|
|
copyToRoot = [
|
|
|
|
pkgs.dockerTools.caCertificates
|
|
|
|
];
|
2024-01-26 05:39:59 +01:00
|
|
|
config = {
|
|
|
|
# Use the `tini` init system so that signals (e.g. ctrl+c/SIGINT)
|
|
|
|
# are handled as expected
|
|
|
|
Entrypoint = [
|
|
|
|
"${pkgs.lib.getExe' pkgs.tini "tini"}"
|
|
|
|
"--"
|
|
|
|
];
|
|
|
|
Cmd = [
|
|
|
|
"${pkgs.lib.getExe package}"
|
|
|
|
];
|
|
|
|
};
|
2024-01-25 03:52:42 +01:00
|
|
|
};
|
2024-01-26 05:39:59 +01:00
|
|
|
in
|
|
|
|
{
|
|
|
|
packages = {
|
2024-04-11 05:03:40 +02:00
|
|
|
default = mkPackage pkgsHost null;
|
|
|
|
jemalloc = mkPackage pkgsHost "jemalloc";
|
|
|
|
hmalloc = mkPackage pkgsHost "hmalloc";
|
|
|
|
oci-image = mkOciImage pkgsHost self.packages.${system}.default null;
|
|
|
|
oci-image-jemalloc = mkOciImage pkgsHost self.packages.${system}.default "jemalloc";
|
|
|
|
oci-image-hmalloc = mkOciImage pkgsHost self.packages.${system}.default "hmalloc";
|
2024-03-17 23:06:10 +01:00
|
|
|
|
|
|
|
book =
|
|
|
|
let
|
|
|
|
package = self.packages.${system}.default;
|
|
|
|
in
|
|
|
|
pkgsHost.stdenv.mkDerivation {
|
|
|
|
pname = "${package.pname}-book";
|
|
|
|
version = package.version;
|
|
|
|
|
|
|
|
src = nix-filter {
|
|
|
|
root = ./.;
|
|
|
|
include = [
|
|
|
|
"book.toml"
|
2024-03-18 06:10:54 +01:00
|
|
|
"conduwuit-example.toml"
|
2024-03-17 23:06:10 +01:00
|
|
|
"README.md"
|
|
|
|
"debian/README.md"
|
|
|
|
"docs"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
nativeBuildInputs = (with pkgsHost; [
|
|
|
|
mdbook
|
|
|
|
]);
|
|
|
|
|
|
|
|
buildPhase = ''
|
|
|
|
mdbook build
|
|
|
|
mv public $out
|
|
|
|
'';
|
|
|
|
};
|
2024-01-30 00:48:30 +01:00
|
|
|
}
|
|
|
|
//
|
|
|
|
builtins.listToAttrs
|
|
|
|
(builtins.concatLists
|
|
|
|
(builtins.map
|
|
|
|
(crossSystem:
|
|
|
|
let
|
|
|
|
binaryName = "static-${crossSystem}";
|
|
|
|
pkgsCrossStatic =
|
|
|
|
(import nixpkgs {
|
|
|
|
inherit system;
|
|
|
|
crossSystem = {
|
|
|
|
config = crossSystem;
|
|
|
|
};
|
|
|
|
}).pkgsStatic;
|
|
|
|
in
|
|
|
|
[
|
|
|
|
# An output for a statically-linked binary
|
|
|
|
{
|
|
|
|
name = binaryName;
|
2024-04-11 05:03:40 +02:00
|
|
|
value = mkPackage pkgsCrossStatic null;
|
2024-01-30 00:48:30 +01:00
|
|
|
}
|
|
|
|
|
2024-04-11 02:31:00 +02:00
|
|
|
# An output for a statically-linked binary with jemalloc
|
|
|
|
{
|
|
|
|
name = "${binaryName}-jemalloc";
|
2024-04-11 05:03:40 +02:00
|
|
|
value = mkPackage pkgsCrossStatic "jemalloc";
|
2024-04-11 02:31:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
# An output for a statically-linked binary with hardened_malloc
|
|
|
|
{
|
|
|
|
name = "${binaryName}-hmalloc";
|
2024-04-11 05:03:40 +02:00
|
|
|
value = mkPackage pkgsCrossStatic "hmalloc";
|
2024-04-11 02:31:00 +02:00
|
|
|
}
|
|
|
|
|
2024-01-30 00:48:30 +01:00
|
|
|
# An output for an OCI image based on that binary
|
|
|
|
{
|
|
|
|
name = "oci-image-${crossSystem}";
|
|
|
|
value = mkOciImage
|
|
|
|
pkgsCrossStatic
|
2024-04-11 05:03:40 +02:00
|
|
|
self.packages.${system}.${binaryName}
|
|
|
|
null;
|
2024-01-30 00:48:30 +01:00
|
|
|
}
|
2024-04-11 02:31:00 +02:00
|
|
|
|
|
|
|
# An output for an OCI image based on that binary with jemalloc
|
|
|
|
{
|
|
|
|
name = "oci-image-${crossSystem}-jemalloc";
|
2024-04-11 05:03:40 +02:00
|
|
|
value = mkOciImage
|
2024-04-11 02:31:00 +02:00
|
|
|
pkgsCrossStatic
|
2024-04-11 05:03:40 +02:00
|
|
|
self.packages.${system}.${binaryName}
|
|
|
|
"jemalloc";
|
2024-04-11 02:31:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
# An output for an OCI image based on that binary with hardened_malloc
|
|
|
|
{
|
|
|
|
name = "oci-image-${crossSystem}-hmalloc";
|
2024-04-11 05:03:40 +02:00
|
|
|
value = mkOciImage
|
2024-04-11 02:31:00 +02:00
|
|
|
pkgsCrossStatic
|
2024-04-11 05:03:40 +02:00
|
|
|
self.packages.${system}.${binaryName}
|
|
|
|
"hmalloc";
|
2024-04-11 02:31:00 +02:00
|
|
|
}
|
2024-01-30 00:48:30 +01:00
|
|
|
]
|
|
|
|
)
|
|
|
|
[
|
|
|
|
"x86_64-unknown-linux-musl"
|
2024-04-11 02:31:00 +02:00
|
|
|
"x86_64-unknown-linux-musl-jemalloc"
|
|
|
|
"x86_64-unknown-linux-musl-hmalloc"
|
2024-01-30 00:48:30 +01:00
|
|
|
"aarch64-unknown-linux-musl"
|
2024-04-11 02:31:00 +02:00
|
|
|
"aarch64-unknown-linux-musl-jemalloc"
|
|
|
|
"aarch64-unknown-linux-musl-hmalloc"
|
2024-01-30 00:48:30 +01:00
|
|
|
]
|
|
|
|
)
|
|
|
|
);
|
2024-01-26 05:39:59 +01:00
|
|
|
|
|
|
|
devShells.default = pkgsHost.mkShell {
|
|
|
|
env = env pkgsHost // {
|
2023-12-21 01:11:49 +01:00
|
|
|
# Rust Analyzer needs to be able to find the path to default crate
|
|
|
|
# sources, and it can read this environment variable to do so. The
|
|
|
|
# `rust-src` component is required in order for this to work.
|
2024-01-26 05:39:59 +01:00
|
|
|
RUST_SRC_PATH = "${toolchain}/lib/rustlib/src/rust/library";
|
2023-12-21 01:11:49 +01:00
|
|
|
};
|
2023-07-16 22:38:33 +02:00
|
|
|
|
2023-04-05 01:56:51 +02:00
|
|
|
# Development tools
|
2024-01-26 05:39:59 +01:00
|
|
|
nativeBuildInputs = nativeBuildInputs pkgsHost ++ [
|
|
|
|
# Always use nightly rustfmt because most of its options are unstable
|
|
|
|
#
|
|
|
|
# This needs to come before `toolchain` in this list, otherwise
|
|
|
|
# `$PATH` will have stable rustfmt instead.
|
|
|
|
fenix.packages.${system}.latest.rustfmt
|
|
|
|
|
|
|
|
toolchain
|
|
|
|
] ++ (with pkgsHost; [
|
2023-12-21 01:33:31 +01:00
|
|
|
engage
|
2024-01-29 00:53:27 +01:00
|
|
|
|
2024-03-06 03:42:17 +01:00
|
|
|
# Needed for producing Debian packages
|
|
|
|
cargo-deb
|
|
|
|
|
2024-01-29 00:53:27 +01:00
|
|
|
# Needed for Complement
|
|
|
|
go
|
|
|
|
olm
|
|
|
|
|
|
|
|
# Needed for our script for Complement
|
|
|
|
jq
|
2024-03-17 23:06:10 +01:00
|
|
|
|
|
|
|
# Needed for finding broken markdown links
|
|
|
|
lychee
|
2024-03-21 23:40:10 +01:00
|
|
|
|
|
|
|
# Useful for editing the book locally
|
|
|
|
mdbook
|
2023-12-21 01:33:31 +01:00
|
|
|
]);
|
2023-04-05 01:56:51 +02:00
|
|
|
};
|
|
|
|
});
|
2022-10-15 22:02:13 +02:00
|
|
|
}
|