sshbind 0.0.3

SSHBind is a Rust library that securely binds remote services behind multiple SSH jump hosts to a local socket, enabling seamless access with encrypted credential management, TOTP-based two-factor authentication, and automatic reconnection.
Documentation
{
  description = "";

  inputs = {
    nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";

    crane.url = "github:ipetkov/crane";

    fenix = {
      url = "github:nix-community/fenix";
      inputs.nixpkgs.follows = "nixpkgs";
      inputs.rust-analyzer-src.follows = "";
    };

    flake-utils.url = "github:numtide/flake-utils";

    advisory-db = {
      url = "github:rustsec/advisory-db";
      flake = false;
    };

    statix.url = "github:oppiliappan/statix";

    pre-commit-hooks.url = "github:cachix/git-hooks.nix";
  };

  outputs = {
    self,
    nixpkgs,
    crane,
    fenix,
    flake-utils,
    advisory-db,
    statix,
    pre-commit-hooks,
    ...
  }:
    flake-utils.lib.eachDefaultSystem (system: let
      pkgs = import nixpkgs {
        inherit system;
        overlays = [
          statix.overlays.default
        ];
      };

      inherit (pkgs) lib;

      craneLib =
        (crane.mkLib pkgs).overrideToolchain
        fenix.packages.${system}.stable.completeToolchain;

      src = craneLib.cleanCargoSource ./.;

      # Common arguments can be set here to avoid repeating them later
      commonArgs = {
        inherit src;
        strictDeps = true;

        buildInputs =
          [
            # Add additional build inputs here
            pkgs.openssl
          ]
          ++ lib.optionals pkgs.stdenv.isDarwin [
            # Additional darwin specific inputs can be set here
            pkgs.libiconv
          ];

        nativeBuildInputs = with pkgs; [sops libiconv pkg-config];
        # Additional environment variables can be set directly
        LD_LIBRARY_PATH = pkgs.lib.makeLibraryPath [pkgs.openssl];
      };

      # craneLibLlvmTools =
      #   craneLib.overrideToolchain
      #   (fenix.packages.${system}.complete.withComponents [
      #     "cargo"
      #     "clippy"
      #     "llvm-tools"
      #     "llvm-tools-preview"
      #     "rustc"
      #   ]);

      # Build *just* the cargo dependencies, so we can reuse
      # all of that work (e.g. via cachix) when running in CI
      cargoArtifacts = craneLib.buildDepsOnly commonArgs;

      overlay = final: prev: {
        sshbind = craneLib.buildPackage (commonArgs
          // {
            inherit cargoArtifacts;
            doCheck = false;
          });
      };

      # Build the actual crate itself, reusing the dependency
      # artifacts from above.
      sshbind = craneLib.buildPackage (commonArgs
        // {
          inherit cargoArtifacts;
          doCheck = false;
        });
    in {
      checks = {
        # Build the crate as part of `nix flake check` for convenience
        inherit sshbind;

        pre-commit-check = pre-commit-hooks.lib.${system}.run {
          src = ./.;
          hooks = {
            check-case-conflicts.enable = true;
            check-executables-have-shebangs.enable = true;
            check-merge-conflicts.enable = true;
            check-shebang-scripts-are-executable.enable = true;
            check-toml.enable = true;
            check-yaml.enable = true;
            detect-private-keys.enable = true;
            end-of-file-fixer.enable = true;
            mixed-line-endings.enable = true;
            trim-trailing-whitespace.enable = true;
            alejandra.enable = true;
            mdformat.enable = true;
            pre-commit-hook-ensure-sops.enable = true;
            taplo.enable = true;
          };
          configPath = ".pre-commit-config-nix.yaml";
        };

        # Run clippy (and deny all warnings) on the crate source,
        # again, reusing the dependency artifacts from above.
        #
        # Note that this is done as a separate derivation so that
        # we can block the CI if there are issues here, but not
        # prevent downstream consumers from building our crate by itself.
        sshbind-clippy = craneLib.cargoClippy (commonArgs
          // {
            inherit cargoArtifacts;
            cargoClippyExtraArgs = "--all-targets -- --deny warnings";
          });

        sshbind-doc = craneLib.cargoDoc (commonArgs
          // {
            inherit cargoArtifacts;
          });

        # Check formatting
        sshbind-fmt = craneLib.cargoFmt {
          inherit src;
        };

        sshbind-toml-fmt = craneLib.taploFmt {
          src = pkgs.lib.sources.sourceFilesBySuffices src [".toml"];
          # taplo arguments can be further customized below as needed
          # taploExtraArgs = "--config ./taplo.toml";
        };

        # Audit dependencies
        sshbind-audit = craneLib.cargoAudit {
          inherit src advisory-db;
        };

        # Audit licenses
        sshbind-deny = craneLib.cargoDeny {
          inherit src;
        };

        # Run tests with cargo-nextest
        # Consider setting `doCheck = false` on `my-crate` if you do not want
        # the tests to run twice
        sshbind-nextest = craneLib.cargoNextest (commonArgs
          // {
            inherit cargoArtifacts;
            partitions = 1;
            partitionType = "count";
            withLlvmCov = true;
            # sandbox-paths = /tmp;
          });
      };

      packages =
        {
          default = sshbind;
        }
        // lib.optionalAttrs (!pkgs.stdenv.isDarwin) {
          sshbind-llvm-coverage = craneLib.cargoLlvmCov (commonArgs
            // {
              inherit cargoArtifacts;
              cargoLlvmCovExtraArgs = "--html";
            });
        };

      apps.default = flake-utils.lib.mkApp {
        drv = sshbind;
      };

      formatter = pkgs.alejandra;

      overlays = overlay;

      devShells.default = craneLib.devShell {
        # Inherit inputs from checks.
        checks = self.checks.${system};

        LD_LIBRARY_PATH = pkgs.lib.makeLibraryPath [pkgs.openssl];
        # Additional dev-shell environment variables can be set directly
        # MY_CUSTOM_DEVELOPMENT_VAR = "something else";

        # Extra inputs can be added here; cargo and rustc are provided by default.
        packages = [
          self.packages.${system}.default
          pkgs.openssl
          pkgs.sops
          pkgs.age
          pkgs.statix
          pkgs.gdb
          pkgs.ltex-ls
          # pkgs.ripgrep
        ];
      };
    });
}