add option to build+run stuff with Nix
* add flake.nix * update .gitignore * add .envrc to allow direnv autoloading * describe how to use this in the README.md
This commit is contained in:
parent
8edea6262f
commit
3baa6fc079
3
.envrc
Normal file
3
.envrc
Normal file
@ -0,0 +1,3 @@
|
||||
use flake
|
||||
|
||||
# vim: ff=unix ft=sh
|
4
.gitignore
vendored
4
.gitignore
vendored
@ -1 +1,5 @@
|
||||
certs-test
|
||||
# nix symlink.
|
||||
result
|
||||
# ignore direnv folder.
|
||||
.direnv/
|
||||
|
41
README.md
41
README.md
@ -10,11 +10,17 @@ therefore the program should fail with the following:
|
||||
> 2023/03/08 18:31:00 connecting to https://\<endpoint\>
|
||||
> panic: Get "https://\<endpoint\>": tls: failed to verify certificate: x509: certificate signed by unknown authority
|
||||
|
||||
### build and run
|
||||
### build and run using Go
|
||||
to manually build and run the app, run:
|
||||
```sh
|
||||
go build -v . && ./certs-test -endpoint=<yoursite.tld>
|
||||
```
|
||||
|
||||
### build and run using podman
|
||||
to build a container in which the app will be able to connect to a TLS
|
||||
connected endpoint, run:
|
||||
|
||||
```
|
||||
```sh
|
||||
podman build -tcerts-test:success -f Dockerfile .
|
||||
```
|
||||
alternatively, run `make` or `make certsuccess`
|
||||
@ -22,16 +28,11 @@ alternatively, run `make` or `make certsuccess`
|
||||
to build a container that will yield a CA cert validation failure (because of
|
||||
the missing **ca-cert** bundle), run:
|
||||
|
||||
```
|
||||
```sh
|
||||
podman build -tcerts-test:fail -f Dockerfile .
|
||||
```
|
||||
alternatively, run `make certfail`
|
||||
|
||||
to manually build and run the app, run:
|
||||
```
|
||||
go build -v . && ./certs-test -endpoint=<yoursite.tld>
|
||||
```
|
||||
|
||||
to run the container, do
|
||||
```
|
||||
podman run localhost/certs-test:success
|
||||
@ -43,5 +44,29 @@ podman run localhost/certs-test:fail
|
||||
```
|
||||
based on which one you'd like to run.
|
||||
|
||||
### build and run using Nix
|
||||
build the flake's `success` and `failure` containers:
|
||||
```sh
|
||||
# build "success" first.
|
||||
nix build .#success
|
||||
podman load <result
|
||||
# run the container loaded in the previous step.
|
||||
podman run --rm localhost/certs-test:nix-success
|
||||
|
||||
# build the "failure".
|
||||
nix build .#failure
|
||||
# load the newly built container and run it.
|
||||
podman load <result && \
|
||||
podman run --rm localhost/certs-test:nix-fail
|
||||
|
||||
# inspect the containers.
|
||||
podman inspect localhost/certs-test:nix-{success,fail}
|
||||
```
|
||||
|
||||
build and run the app directly:
|
||||
```sh
|
||||
nix build .#certs-test && ./result/bin/certs-test
|
||||
```
|
||||
|
||||
### LICENSE
|
||||
CC0
|
||||
|
16
default.nix
Normal file
16
default.nix
Normal file
@ -0,0 +1,16 @@
|
||||
(
|
||||
import
|
||||
(
|
||||
let
|
||||
lock = builtins.fromJSON (builtins.readFile ./flake.lock);
|
||||
in
|
||||
fetchTarball {
|
||||
url = "https://github.com/edolstra/flake-compat/archive/${lock.nodes.flake-compat.locked.rev}.tar.gz";
|
||||
sha256 = lock.nodes.flake-compat.locked.narHash;
|
||||
}
|
||||
)
|
||||
{
|
||||
src = ./.;
|
||||
}
|
||||
)
|
||||
.defaultNix
|
60
flake.lock
Normal file
60
flake.lock
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"nodes": {
|
||||
"flake-compat": {
|
||||
"flake": false,
|
||||
"locked": {
|
||||
"lastModified": 1673956053,
|
||||
"narHash": "sha256-4gtG9iQuiKITOjNQQeQIpoIB6b16fm+504Ch3sNKLd8=",
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"rev": "35bb57c0c8d8b62bbfd284272c928ceb64ddbde9",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "edolstra",
|
||||
"repo": "flake-compat",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nix-filter": {
|
||||
"locked": {
|
||||
"lastModified": 1678109515,
|
||||
"narHash": "sha256-C2X+qC80K2C1TOYZT8nabgo05Dw2HST/pSn6s+n6BO8=",
|
||||
"owner": "numtide",
|
||||
"repo": "nix-filter",
|
||||
"rev": "aa9ff6ce4a7f19af6415fb3721eaa513ea6c763c",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "numtide",
|
||||
"repo": "nix-filter",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1678268259,
|
||||
"narHash": "sha256-q+ZWNJfXKgIKwsZBir0yXrmIV/4tOv5BflxDAfGISps=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "90ef5c3c337d8d9f0c97e7641ece70a41f6c16a2",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "NixOS",
|
||||
"ref": "nixpkgs-unstable",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"root": {
|
||||
"inputs": {
|
||||
"flake-compat": "flake-compat",
|
||||
"nix-filter": "nix-filter",
|
||||
"nixpkgs": "nixpkgs"
|
||||
}
|
||||
}
|
||||
},
|
||||
"root": "root",
|
||||
"version": 7
|
||||
}
|
233
flake.nix
Normal file
233
flake.nix
Normal file
@ -0,0 +1,233 @@
|
||||
{
|
||||
description = "test that the ca-certs bundle works in scratch containers";
|
||||
inputs = {
|
||||
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
||||
flake-compat = {
|
||||
url = "github:edolstra/flake-compat";
|
||||
flake = false;
|
||||
};
|
||||
nix-filter = {
|
||||
url = "github:numtide/nix-filter";
|
||||
};
|
||||
};
|
||||
|
||||
outputs = {
|
||||
self,
|
||||
nixpkgs,
|
||||
nix-filter,
|
||||
...
|
||||
}: let
|
||||
projname = "certs-test";
|
||||
|
||||
# to work with older version of flakes
|
||||
lastModifiedDate =
|
||||
self.lastModifiedDate or self.lastModified or "19700101";
|
||||
|
||||
# Generate a user-friendly version number.
|
||||
version = "v0.0.0";
|
||||
|
||||
supportedSystems = ["x86_64-linux" "x86_64-darwin" "aarch64-linux" "aarch64-darwin"];
|
||||
forAllSystems = nixpkgs.lib.genAttrs supportedSystems;
|
||||
pkgs = forAllSystems (system: nixpkgs.legacyPackages.${system});
|
||||
# Nixpkgs instantiated for supported system types.
|
||||
nixpkgsFor = forAllSystems (system:
|
||||
import nixpkgs {
|
||||
inherit system;
|
||||
overlays = [
|
||||
# no overlay imports atm
|
||||
# (import ./overlay.nix)
|
||||
];
|
||||
});
|
||||
in {
|
||||
formatter = forAllSystems (
|
||||
system:
|
||||
nixpkgsFor.${system}.alejandra
|
||||
);
|
||||
packages = forAllSystems (system: let
|
||||
baseurl = "https://git.dotya.ml/wanderer/certs-test/";
|
||||
pkgs = nixpkgsFor.${system};
|
||||
inherit (pkgs) lib overlays;
|
||||
in rec {
|
||||
certs-test = with pkgs;
|
||||
buildGo120Module rec {
|
||||
pname = "certs-test";
|
||||
buildInputs = [
|
||||
go_1_20
|
||||
gcc
|
||||
];
|
||||
nativeBuildInputs = [pkgconfig];
|
||||
|
||||
overrideModAttrs = _: {
|
||||
# GOPROXY = "direct";
|
||||
GOFLAGS = "-buildmode=pie -trimpath -mod=readonly -modcacherw";
|
||||
CGO_ENABLED = "0";
|
||||
};
|
||||
|
||||
inherit version;
|
||||
doCheck = false;
|
||||
# use go.mod for managing go deps, instead of vendor-only dir
|
||||
proxyVendor = true;
|
||||
tags = []; # go "-tags" to build with
|
||||
ldflags = [
|
||||
"-s"
|
||||
"-w"
|
||||
"-X main.version=${version}"
|
||||
];
|
||||
|
||||
# dont't forget to update vendorSha256 whenever go.mod or go.sum change
|
||||
# vendorSha256 = "sha256-Ns3ohAzZliK75fM6ryWubhfLBCVwU7CsZbuuzZrGaRY=";
|
||||
vendorSha256 = null;
|
||||
|
||||
# In 'nix develop', we don't need a copy of the source tree
|
||||
# in the Nix store.
|
||||
src = nix-filter.lib.filter {
|
||||
# when in doubt, check out
|
||||
# https://github.com/numtide/nix-filter#design-notes
|
||||
# tl;dr: it'd be best to include folders, however there are
|
||||
# currently issues with that approach.
|
||||
root = lib.cleanSource ./.;
|
||||
exclude = [
|
||||
./README.md
|
||||
|
||||
./certs-test
|
||||
|
||||
./flake.nix
|
||||
./flake.lock
|
||||
./default.nix
|
||||
./shell.nix
|
||||
|
||||
./README.md
|
||||
|
||||
./.envrc
|
||||
./.gitattributes
|
||||
./.gitignore
|
||||
|
||||
# nix result symlink
|
||||
./result
|
||||
|
||||
# the entire .git folder
|
||||
./.git
|
||||
];
|
||||
};
|
||||
|
||||
meta = {
|
||||
description = "certs-test";
|
||||
homepage = baseurl;
|
||||
license = lib.licenses.gpl3;
|
||||
maintainers = ["wanderer"];
|
||||
platforms = lib.platforms.linux ++ lib.platforms.darwin;
|
||||
};
|
||||
};
|
||||
|
||||
scratch-with-cacerts = with pkgs;
|
||||
pkgs.dockerTools.pullImage {
|
||||
imageName = "ghcr.io/mariouhrik/scratch-with-cacerts";
|
||||
imageDigest = "sha256:4c95be74f178c9230587a557a1429f4bd10c4fdf24ddcc70a090d42f462ece55";
|
||||
sha256 = "sha256-1yLq1KcAl6xxFhRCPcWrCXzDs0Ik6+VAcfi/1MVDq38=";
|
||||
os = "linux";
|
||||
arch = "${system}";
|
||||
};
|
||||
|
||||
success = with pkgs;
|
||||
pkgs.dockerTools.buildLayeredImage {
|
||||
name = "certs-test";
|
||||
tag = "nix-success";
|
||||
fromImage = scratch-with-cacerts;
|
||||
contents = [
|
||||
certs-test
|
||||
];
|
||||
config = {
|
||||
Cmd = ["/bin/certs-test"];
|
||||
};
|
||||
};
|
||||
|
||||
failure = with pkgs;
|
||||
dockerTools.buildLayeredImage {
|
||||
name = "certs-test";
|
||||
tag = "nix-fail";
|
||||
contents = [
|
||||
certs-test
|
||||
];
|
||||
config = {
|
||||
Cmd = ["/bin/certs-test"];
|
||||
};
|
||||
};
|
||||
|
||||
default = certs-test;
|
||||
});
|
||||
|
||||
apps = forAllSystems (system: rec {
|
||||
certs-test = {
|
||||
type = "app";
|
||||
program = "${self.packages.${system}.${projname}}/bin/certs-test";
|
||||
};
|
||||
success = {
|
||||
type = "app";
|
||||
program = "${self.packages.${system}.${projname}}/bin/success";
|
||||
};
|
||||
failure = {
|
||||
type = "app";
|
||||
program = "${self.packages.${system}.${projname}}/bin/failure";
|
||||
};
|
||||
default = certs-test;
|
||||
});
|
||||
|
||||
devShells = forAllSystems (
|
||||
system: let
|
||||
pkgs = import nixpkgs {
|
||||
inherit system;
|
||||
overlays = [
|
||||
# (import ./overlay.nix)
|
||||
];
|
||||
};
|
||||
upcache = pkgs.writeShellScriptBin "upcache" ''
|
||||
## refs:
|
||||
## https://fzakaria.com/2020/08/11/caching-your-nix-shell.html
|
||||
## https://nixos.wiki/wiki/Caching_nix_shell_build_inputs
|
||||
nix-store --query --references $(nix-instantiate shell.nix) | \
|
||||
xargs nix-store --realise | \
|
||||
xargs nix-store --query --requisites | \
|
||||
cachix push ${projname}
|
||||
nix build --json \
|
||||
| jq -r '.[].outputs | to_entries[].value' \
|
||||
| cachix push ${projname}
|
||||
'';
|
||||
add-license = pkgs.writeShellScriptBin "add-license" ''
|
||||
go run github.com/google/addlicense@v1.0.0 -v \
|
||||
-c "wanderer <a_mirre at utb dot cz>" \
|
||||
-l "CC0" -s .
|
||||
'';
|
||||
in {
|
||||
default = with pkgs;
|
||||
mkShellNoCC {
|
||||
name = "${projname}-" + version;
|
||||
|
||||
GOFLAGS = "-buildmode=pie -trimpath -mod=readonly -modcacherw";
|
||||
GOLDFLAGS = "-s -w -X main.version=${version}";
|
||||
# CGO_CFLAGS = "-g0 -Ofast -mtune=native -flto";
|
||||
# CGO_LDFLAGS = "-Wl,-O1,-sort-common,-as-needed,-z,relro,-z,now,-flto -pthread";
|
||||
CGO_ENABLED = "0";
|
||||
|
||||
shellHook = ''
|
||||
echo " -- in ${projname} dev shell..."
|
||||
'';
|
||||
|
||||
packages = [
|
||||
pre-commit
|
||||
statix
|
||||
|
||||
# built-in
|
||||
upcache
|
||||
addlicense
|
||||
|
||||
# deps
|
||||
go_1_20
|
||||
go-tools
|
||||
gopls
|
||||
gofumpt
|
||||
];
|
||||
};
|
||||
}
|
||||
);
|
||||
};
|
||||
}
|
16
shell.nix
Normal file
16
shell.nix
Normal file
@ -0,0 +1,16 @@
|
||||
(
|
||||
import
|
||||
(
|
||||
let
|
||||
lock = builtins.fromJSON (builtins.readFile ./flake.lock);
|
||||
in
|
||||
fetchTarball {
|
||||
url = "https://github.com/edolstra/flake-compat/archive/${lock.nodes.flake-compat.locked.rev}.tar.gz";
|
||||
sha256 = lock.nodes.flake-compat.locked.narHash;
|
||||
}
|
||||
)
|
||||
{
|
||||
src = ./.;
|
||||
}
|
||||
)
|
||||
.shellNix
|
Loading…
Reference in New Issue
Block a user