141 lines
3.9 KiB
Nix
141 lines
3.9 KiB
Nix
|
{
|
||
|
description = "Build a cargo project";
|
||
|
|
||
|
inputs = {
|
||
|
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
||
|
|
||
|
crane = {
|
||
|
url = "github:ipetkov/crane";
|
||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||
|
};
|
||
|
|
||
|
fenix = {
|
||
|
url = "github:nix-community/fenix";
|
||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||
|
inputs.rust-analyzer-src.follows = "";
|
||
|
};
|
||
|
|
||
|
flake-utils.url = "github:numtide/flake-utils";
|
||
|
|
||
|
advisory-db = {
|
||
|
url = "github:rustsec/advisory-db";
|
||
|
flake = false;
|
||
|
};
|
||
|
};
|
||
|
|
||
|
outputs = { self, nixpkgs, crane, fenix, flake-utils, advisory-db, ... }:
|
||
|
flake-utils.lib.eachDefaultSystem (system:
|
||
|
let
|
||
|
pkgs = nixpkgs.legacyPackages.${system};
|
||
|
|
||
|
inherit (pkgs) lib;
|
||
|
|
||
|
craneLib = crane.lib.${system};
|
||
|
src = craneLib.cleanCargoSource (craneLib.path ./.);
|
||
|
|
||
|
commonArgs = {
|
||
|
inherit src;
|
||
|
strictDeps = true;
|
||
|
|
||
|
buildInputs = with pkgs; [
|
||
|
pkg-config
|
||
|
openssl
|
||
|
] ++ lib.optionals pkgs.stdenv.isDarwin [
|
||
|
pkgs.libiconv
|
||
|
];
|
||
|
|
||
|
};
|
||
|
|
||
|
craneLibLLvmTools = craneLib.overrideToolchain
|
||
|
(fenix.packages.${system}.complete.withComponents [
|
||
|
"cargo"
|
||
|
"llvm-tools"
|
||
|
"rustc"
|
||
|
]);
|
||
|
|
||
|
# Build *just* the cargo dependencies, so we can reuse
|
||
|
# all of that work (e.g. via cachix) when running in CI
|
||
|
cargoArtifacts = craneLib.buildDepsOnly commonArgs;
|
||
|
|
||
|
# Build the actual crate itself, reusing the dependency
|
||
|
# artifacts from above.
|
||
|
celestial = craneLib.buildPackage (commonArgs // {
|
||
|
inherit cargoArtifacts;
|
||
|
});
|
||
|
in
|
||
|
{
|
||
|
checks = {
|
||
|
# Build the crate as part of `nix flake check` for convenience
|
||
|
inherit celestial;
|
||
|
|
||
|
# Run clippy (and deny all warnings) on the crate source,
|
||
|
# again, reusing the dependency artifacts from above.
|
||
|
#
|
||
|
# Note that this is done as a separate derivation so that
|
||
|
# we can block the CI if there are issues here, but not
|
||
|
# prevent downstream consumers from building our crate by itself.
|
||
|
celestial-clippy = craneLib.cargoClippy (commonArgs // {
|
||
|
inherit cargoArtifacts;
|
||
|
cargoClippyExtraArgs = "--all-targets -- --deny warnings";
|
||
|
});
|
||
|
|
||
|
celestial-doc = craneLib.cargoDoc (commonArgs // {
|
||
|
inherit cargoArtifacts;
|
||
|
});
|
||
|
|
||
|
# Check formatting
|
||
|
celestial-fmt = craneLib.cargoFmt {
|
||
|
inherit src;
|
||
|
};
|
||
|
|
||
|
# Audit dependencies
|
||
|
celestial-audit = craneLib.cargoAudit {
|
||
|
inherit src advisory-db;
|
||
|
};
|
||
|
|
||
|
# Audit licenses
|
||
|
celestial-deny = craneLib.cargoDeny {
|
||
|
inherit src;
|
||
|
};
|
||
|
|
||
|
# Run tests with cargo-nextest
|
||
|
# Consider setting `doCheck = false` on `celestial` if you do not want
|
||
|
# the tests to run twice
|
||
|
celestial-nextest = craneLib.cargoNextest (commonArgs // {
|
||
|
inherit cargoArtifacts;
|
||
|
partitions = 1;
|
||
|
partitionType = "count";
|
||
|
});
|
||
|
};
|
||
|
|
||
|
packages = {
|
||
|
default = celestial;
|
||
|
} // lib.optionalAttrs (!pkgs.stdenv.isDarwin) {
|
||
|
celestial-llvm-coverage = craneLibLLvmTools.cargoLlvmCov (commonArgs // {
|
||
|
inherit cargoArtifacts;
|
||
|
});
|
||
|
};
|
||
|
|
||
|
apps.default = flake-utils.lib.mkApp {
|
||
|
drv = celestial;
|
||
|
};
|
||
|
|
||
|
devShells.default = craneLib.devShell {
|
||
|
# Inherit inputs from checks.
|
||
|
checks = self.checks.${system};
|
||
|
|
||
|
LIBCLANG_PATH = "${pkgs.llvmPackages_17.libclang.lib}/lib";
|
||
|
RUST_BACKTRACE = 1;
|
||
|
RUST_SRC_PATH = "${pkgs.rust.packages.stable.rustPlatform.rustLibSrc}";
|
||
|
|
||
|
packages = with pkgs; [
|
||
|
rustfmt
|
||
|
rust-analyzer
|
||
|
clippy
|
||
|
openssl
|
||
|
sqlite
|
||
|
];
|
||
|
};
|
||
|
});
|
||
|
}
|