{
nixConfig.extra-substituters = [
"https://bytecodealliance.cachix.org"
"https://wasmcloud.cachix.org"
"https://nixify.cachix.org"
"https://crane.cachix.org"
"https://nix-community.cachix.org"
"https://cache.garnix.io"
];
nixConfig.extra-trusted-public-keys = [
"bytecodealliance.cachix.org-1:0SBgh//n2n0heh0sDFhTm+ZKBRy2sInakzFGfzN531Y="
"wasmcloud.cachix.org-1:9gRBzsKh+x2HbVVspreFg/6iFRiD4aOcUQfXVDl3hiM="
"nixify.cachix.org-1:95SiUQuf8Ij0hwDweALJsLtnMyv/otZamWNRp1Q1pXw="
"crane.cachix.org-1:8Scfpmn9w+hGdXH/Q9tTLiYAE/2dnJYRJP7kl80GuRk="
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"cache.garnix.io:CTFPyKSLcx5RMJKfLo5EEPUObbA78b0YQ2DTCJXqr9g="
];
inputs.nixify.inputs.nixlib.follows = "nixlib";
inputs.nixify.url = "github:rvolosatovs/nixify";
inputs.nixlib.url = "github:nix-community/nixpkgs.lib";
inputs.nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
inputs.wit-deps.inputs.nixify.follows = "nixify";
inputs.wit-deps.inputs.nixlib.follows = "nixlib";
inputs.wit-deps.url = "github:bytecodealliance/wit-deps/v0.5.0";
inputs.wrpc.inputs.nixify.follows = "nixify";
inputs.wrpc.inputs.nixlib.follows = "nixlib";
inputs.wrpc.url = "github:wrpc/wrpc/v0.15.0";
outputs = {
nixify,
nixlib,
nixpkgs-unstable,
wit-deps,
wrpc,
...
}:
with builtins;
with nixlib.lib;
with nixify.lib;
rust.mkFlake {
src = ./.;
overlays = [
wit-deps.overlays.default
wrpc.overlays.default
(
final: prev: {
pkgsUnstable = import nixpkgs-unstable {
inherit
(final.stdenv.hostPlatform)
system
;
inherit
(final)
config
;
};
}
)
];
excludePaths = [
".envrc"
".github"
".gitignore"
"flake.nix"
"LICENSE"
"README.md"
];
doCheck = false; # testing is performed in checks via `nextest`
targets.arm-unknown-linux-gnueabihf = false;
targets.arm-unknown-linux-musleabihf = false;
targets.armv7-unknown-linux-gnueabihf = false;
targets.armv7-unknown-linux-musleabihf = false;
targets.powerpc64le-unknown-linux-gnu = false;
targets.s390x-unknown-linux-gnu = false;
targets.wasm32-unknown-unknown = false;
targets.wasm32-wasi = false;
clippy.allTargets = true;
clippy.deny = ["warnings"];
clippy.workspace = true;
test.allTargets = true;
test.workspace = true;
buildOverrides = {
pkgs,
pkgsCross ? pkgs,
...
}: {
buildInputs ? [],
depsBuildBuild ? [],
nativeBuildInputs ? [],
nativeCheckInputs ? [],
preCheck ? "",
...
} @ args:
with pkgs.lib; let
darwin2darwin = pkgs.stdenv.hostPlatform.isDarwin && pkgsCross.stdenv.hostPlatform.isDarwin;
depsBuildBuild' =
depsBuildBuild
++ optional pkgs.stdenv.hostPlatform.isDarwin pkgs.darwin.apple_sdk.frameworks.SystemConfiguration
++ optional darwin2darwin pkgs.xcbuild.xcrun;
in
{
buildInputs =
buildInputs
++ optional pkgs.stdenv.hostPlatform.isDarwin pkgs.libiconv;
depsBuildBuild = depsBuildBuild';
}
// optionalAttrs (args ? cargoArtifacts) {
preCheck =
''
export GOCACHE=$TMPDIR/gocache
export GOMODCACHE=$TMPDIR/gomod
export GOPATH=$TMPDIR/go
export HOME=$TMPDIR/home
''
+ preCheck;
depsBuildBuild =
depsBuildBuild'
++ optionals darwin2darwin [
pkgs.darwin.apple_sdk.frameworks.CoreFoundation
pkgs.darwin.apple_sdk.frameworks.CoreServices
];
nativeCheckInputs =
nativeCheckInputs
++ [
pkgs.nats-server
pkgs.pkgsUnstable.go
];
};
withDevShells = {
devShells,
pkgs,
...
}:
extendDerivations {
buildInputs = [
pkgs.cargo-audit
pkgs.hey
pkgs.nats-server
pkgs.natscli
pkgs.wit-deps
pkgs.wrpc
pkgs.pkgsUnstable.go
pkgs.pkgsUnstable.wasm-tools
pkgs.pkgsUnstable.wit-bindgen
];
}
devShells;
};
}