2024-04-22 01:23:03 +03:00
|
|
|
{
|
|
|
|
description = "Build a cargo workspace";
|
|
|
|
|
|
|
|
inputs = {
|
|
|
|
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
|
|
|
|
2024-08-30 02:29:16 +03:00
|
|
|
crane.url = "github:ipetkov/crane";
|
2024-04-22 01:23:03 +03:00
|
|
|
|
|
|
|
fenix = {
|
|
|
|
url = "github:nix-community/fenix";
|
|
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
inputs.rust-analyzer-src.follows = "";
|
|
|
|
};
|
|
|
|
|
|
|
|
flake-utils.url = "github:numtide/flake-utils";
|
|
|
|
|
|
|
|
advisory-db = {
|
|
|
|
url = "github:rustsec/advisory-db";
|
|
|
|
flake = false;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
outputs = { self, nixpkgs, crane, fenix, flake-utils, advisory-db, ... }:
|
|
|
|
flake-utils.lib.eachDefaultSystem (system:
|
|
|
|
let
|
|
|
|
pkgs = nixpkgs.legacyPackages.${system};
|
|
|
|
|
|
|
|
inherit (pkgs) lib;
|
|
|
|
|
2024-05-19 04:07:07 +03:00
|
|
|
craneLib = crane.mkLib pkgs;
|
2024-06-11 06:53:46 +03:00
|
|
|
src = craneLib.cleanCargoSource ./.;
|
2024-04-22 01:23:03 +03:00
|
|
|
|
|
|
|
# Common arguments can be set here to avoid repeating them later
|
|
|
|
commonArgs = {
|
|
|
|
inherit src;
|
|
|
|
strictDeps = true;
|
|
|
|
|
|
|
|
buildInputs = [
|
|
|
|
# Add additional build inputs here
|
|
|
|
] ++ lib.optionals pkgs.stdenv.isDarwin [
|
|
|
|
# Additional darwin specific inputs can be set here
|
|
|
|
pkgs.libiconv
|
|
|
|
];
|
|
|
|
|
|
|
|
# Additional environment variables can be set directly
|
|
|
|
# MY_CUSTOM_VAR = "some value";
|
|
|
|
};
|
|
|
|
|
|
|
|
craneLibLLvmTools = craneLib.overrideToolchain
|
|
|
|
(fenix.packages.${system}.complete.withComponents [
|
|
|
|
"cargo"
|
|
|
|
"llvm-tools"
|
|
|
|
"rustc"
|
|
|
|
]);
|
|
|
|
|
|
|
|
# Build *just* the cargo dependencies (of the entire workspace),
|
|
|
|
# so we can reuse all of that work (e.g. via cachix) when running in CI
|
|
|
|
# It is *highly* recommended to use something like cargo-hakari to avoid
|
|
|
|
# cache misses when building individual top-level-crates
|
|
|
|
cargoArtifacts = craneLib.buildDepsOnly commonArgs;
|
|
|
|
|
|
|
|
individualCrateArgs = commonArgs // {
|
|
|
|
inherit cargoArtifacts;
|
|
|
|
inherit (craneLib.crateNameFromCargoToml { inherit src; }) version;
|
|
|
|
# NB: we disable tests since we'll run them all via cargo-nextest
|
|
|
|
doCheck = false;
|
|
|
|
};
|
|
|
|
|
|
|
|
fileSetForCrate = crate: lib.fileset.toSource {
|
|
|
|
root = ./.;
|
|
|
|
fileset = lib.fileset.unions [
|
|
|
|
./Cargo.toml
|
|
|
|
./Cargo.lock
|
|
|
|
./my-common
|
|
|
|
./my-workspace-hack
|
|
|
|
crate
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
# Build the top-level crates of the workspace as individual derivations.
|
|
|
|
# This allows consumers to only depend on (and build) only what they need.
|
|
|
|
# Though it is possible to build the entire workspace as a single derivation,
|
|
|
|
# so this is left up to you on how to organize things
|
|
|
|
my-cli = craneLib.buildPackage (individualCrateArgs // {
|
|
|
|
pname = "my-cli";
|
|
|
|
cargoExtraArgs = "-p my-cli";
|
|
|
|
src = fileSetForCrate ./my-cli;
|
|
|
|
});
|
|
|
|
my-server = craneLib.buildPackage (individualCrateArgs // {
|
|
|
|
pname = "my-server";
|
|
|
|
cargoExtraArgs = "-p my-server";
|
|
|
|
src = fileSetForCrate ./my-server;
|
|
|
|
});
|
|
|
|
in
|
|
|
|
{
|
|
|
|
checks = {
|
|
|
|
# Build the crates as part of `nix flake check` for convenience
|
|
|
|
inherit my-cli my-server;
|
|
|
|
|
|
|
|
# Run clippy (and deny all warnings) on the workspace source,
|
|
|
|
# again, reusing the dependency artifacts from above.
|
|
|
|
#
|
|
|
|
# Note that this is done as a separate derivation so that
|
|
|
|
# we can block the CI if there are issues here, but not
|
|
|
|
# prevent downstream consumers from building our crate by itself.
|
|
|
|
my-workspace-clippy = craneLib.cargoClippy (commonArgs // {
|
|
|
|
inherit cargoArtifacts;
|
|
|
|
cargoClippyExtraArgs = "--all-targets -- --deny warnings";
|
|
|
|
});
|
|
|
|
|
|
|
|
my-workspace-doc = craneLib.cargoDoc (commonArgs // {
|
|
|
|
inherit cargoArtifacts;
|
|
|
|
});
|
|
|
|
|
|
|
|
# Check formatting
|
|
|
|
my-workspace-fmt = craneLib.cargoFmt {
|
|
|
|
inherit src;
|
|
|
|
};
|
|
|
|
|
2024-08-31 20:27:30 +03:00
|
|
|
my-workspace-toml-fmt = craneLib.taploFmt {
|
|
|
|
src = pkgs.lib.sources.sourceFilesBySuffices src [ ".toml" ];
|
|
|
|
# taplo arguments can be further customized below as needed
|
|
|
|
# taploExtraArgs = "--config ./taplo.toml";
|
|
|
|
};
|
|
|
|
|
2024-04-22 01:23:03 +03:00
|
|
|
# Audit dependencies
|
|
|
|
my-workspace-audit = craneLib.cargoAudit {
|
|
|
|
inherit src advisory-db;
|
|
|
|
};
|
|
|
|
|
|
|
|
# Audit licenses
|
|
|
|
my-workspace-deny = craneLib.cargoDeny {
|
|
|
|
inherit src;
|
|
|
|
};
|
|
|
|
|
|
|
|
# Run tests with cargo-nextest
|
|
|
|
# Consider setting `doCheck = false` on other crate derivations
|
|
|
|
# if you do not want the tests to run twice
|
|
|
|
my-workspace-nextest = craneLib.cargoNextest (commonArgs // {
|
|
|
|
inherit cargoArtifacts;
|
|
|
|
partitions = 1;
|
|
|
|
partitionType = "count";
|
|
|
|
});
|
|
|
|
|
|
|
|
# Ensure that cargo-hakari is up to date
|
|
|
|
my-workspace-hakari = craneLib.mkCargoDerivation {
|
|
|
|
inherit src;
|
|
|
|
pname = "my-workspace-hakari";
|
|
|
|
cargoArtifacts = null;
|
|
|
|
doInstallCargoArtifacts = false;
|
|
|
|
|
|
|
|
buildPhaseCargoCommand = ''
|
|
|
|
cargo hakari generate --diff # workspace-hack Cargo.toml is up-to-date
|
|
|
|
cargo hakari manage-deps --dry-run # all workspace crates depend on workspace-hack
|
|
|
|
cargo hakari verify
|
|
|
|
'';
|
|
|
|
|
|
|
|
nativeBuildInputs = [
|
|
|
|
pkgs.cargo-hakari
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
packages = {
|
|
|
|
inherit my-cli my-server;
|
|
|
|
} // lib.optionalAttrs (!pkgs.stdenv.isDarwin) {
|
|
|
|
my-workspace-llvm-coverage = craneLibLLvmTools.cargoLlvmCov (commonArgs // {
|
|
|
|
inherit cargoArtifacts;
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
apps = {
|
|
|
|
my-cli = flake-utils.lib.mkApp {
|
|
|
|
drv = my-cli;
|
|
|
|
};
|
|
|
|
my-server = flake-utils.lib.mkApp {
|
|
|
|
drv = my-server;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
devShells.default = craneLib.devShell {
|
|
|
|
# Inherit inputs from checks.
|
|
|
|
checks = self.checks.${system};
|
|
|
|
|
|
|
|
# Additional dev-shell environment variables can be set directly
|
|
|
|
# MY_CUSTOM_DEVELOPMENT_VAR = "something else";
|
|
|
|
|
|
|
|
# Extra inputs can be added here; cargo and rustc are provided by default.
|
|
|
|
packages = [
|
|
|
|
pkgs.cargo-hakari
|
|
|
|
];
|
|
|
|
};
|
|
|
|
});
|
|
|
|
}
|