Skip to content

A reusable Concourse task for building Nix derivations

License

Notifications You must be signed in to change notification settings

risicle/nix-build-task

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

nix-build-task

This is a reusable task (in the vein of oci-build-task) for building Nix derivations in Concourse pipelines.

Features

  • Image-handling support. Container images produced by the derivations (through dockerTools or other means) can be used interchangably with those produced by oci-build-task. This includes being put to the registry-image resource or used immediately as a subsequent task image.
  • Cachix support. Push and pull, allowing unneccessary rebuilds to be avoided.
  • Outpath evaluation mode, making it possible to detect when changes will actually result in a different build output without performing the build.
  • No privileged requirement. You could run it with privileged: true if you wanted extra guarantees that the results didn't have any undeclared dependencies (see https://github.com/NixOS/docker#limitations for more information on this), but this is a fairly niche requirement, needed for building badly behaved software.

Operation

The idea of nix-build-task is to aid in producing reproducible builds of your projects, and in that spirit nix-build-task tries to be as "hands-off" as possible with the nix expression it is building. The expectation is that expressions are self-contained and strictly bring-your-own-nixpkgs. This way the same build result can be reliably achieved just as easily with or without nix-build-task, on a remote server or on a local development machine. See the guide on pinning nixpkgs for more detail on how to achieve this.

A basic example task:

  - task: build-my-project
    image: nix-build-task-dockerhub
    config:
      platform: linux
      image_resource:
        type: registry-image
        source:
          repository: risicle/nix-build-task
      inputs:
        - name: my-project-git
      outputs:
        - name: built-project
          path: output
      params:
        NIXFILE: my-project-git/project.nix
        ATTR: foo
      run:
        path: /bin/build

nix-build-task will call nix-build on the file pointed to in the NIXFILE parameter, optionally targeting a specific attribute of that expression indicated by the ATTR parameter, and attempt to copy the results to an output at the path output. The original nix output path of the derivation is written to output/result.outpath. Multiple attributes can be specified as ATTR0 ... ATTR<n> and their results will be copied to the respective output paths output0 ... output<n>. /bin/build is the entry point to call in the run.path.

Params

  • NIXFILE (required): path to file containing nix expression.
  • ATTR0 ... ATTR<n>: attributes to build. results will be copied to output0 ... output<n>. ATTR is an alias of ATTR0 and output is used for results if output0 is not found.
  • OUTPUT0_PREPARE_IMAGE ... OUTPUT<n>_PREPARE_IMAGE: set to a non-empty, non-falsey value, will cause the result from the respective output to be prepared as a container image to be used by e.g. concourse's registry-image resource. Set to the value unpack, will go a step further and prepare the image for immediate use as a concourse task image, equivalent to oci-build-task's UNPACK_ROOTFS option. OUTPUT_PREPARE_IMAGE is an alias of OUTPUT0_PREPARE_IMAGE.
  • OUTPUT0_EXPORT_NAR ... OUTPUT<n>_EXPORT_NAR: set to a non-empty, non-falsey value, will cause the results from the respective output to be exported from the nix store as a single result.nar file. Set to the value runtime-closure, will include the full runtime closure of the results. OUTPUT_EXPORT_NAR is an alias of OUTPUT0_EXPORT_NAR.
  • BUILD_ARG_<argname>: passed to nix-build's --arg option, specifying an argument to be passed to the nix expression in NIXFILE. Value interpreted as a nix expression.
  • BUILD_ARGSTR_<argname>: passed to nix-build's --argstr option, specifying an argument to be passed to the nix expression in NIXFILE. Value interpreted as a string.
  • NIX_OPTION_<optname>: passed to nix-build's --option argument, allows overriding a Nix configuration option.
  • CACHIX_CACHE: name of the Cachix cache to attempt to pull prebuilt binaries from and, if CACHIX_CONF, CACHIX_SIGNING_KEY or CACHIX_AUTH_TOKEN are set, attempt to push built binaries to.
  • CACHIX_CONF: path to a cachix.dhall file with credentials for cachix cache.
  • CACHIX_PUSH: explicitly control whether to push build results to CACHIX_CACHE.
    • Truthy values will enable pushing all built packages to cachix. This is the implied default when any of the CACHIX_CONF, CACHIX_SIGNING_KEY or CACHIX_AUTH_TOKEN params are set.
    • Falsey values will disable pushing to cachix.
    • The special value outputs will cause only the actual output packages and their runtime dependencies to be pushed to cachix. This may be useful either to conserve cache space or for people paranoid about pushing secrets that may be contained in intermediate build products.
  • CACHIX_PUSH_EXTRA_ARGS: extra arguments to supply to cachix push commands.
  • NIX_LOG_DIR: if this is set to a relative path, nix-build-task will simply interpret it as relative to the build directory and make it absolute, passing it through to nix-build. This allows build logs to be sent to an output directory.

Not explicitly handled by nix-build-task, but just happen to work by virtue of being passed as environment variables:

  • CACHIX_SIGNING_KEY: key for signing packages being pushed to CACHIX_CACHE.
  • CACHIX_AUTH_TOKEN: auth token for CACHIX_CACHE.
  • NIX_CONF_DIR: can be used to point at your own supplied nix.conf for overriding many nix options at once. If you're going to do this, note that the CACHIX_CACHE parameter will put its settings in /etc/nix/nix.conf and if you want this to still have an effect you will want to use an include line to refer to it or manually include your own equivalent settings.
  • NIXPKGS_CONFIG: can be used to point at your own supplied config.nix, where nixpkgs-specific settings such as allowUnfree, packageOverrides and permittedInsecurePackages can be configured. See the nixpkgs manual for more information on these.

Examples

Many examples of its use are contained in the testing jobs of the build pipeline. The same pipeline also shows how nix-build-task is used to build itself.