The original implementation of this was really weird, so I restructed it a lot while debugging, and am just gonna leave the restructured version. Root cause of the segfault seems to be that upstream nixpkgs liburing derivation is generating both static and dynamic libraries, causing rocksdb to statically link liburing in a dynamic build, pulling in some allocator stuff at the same time. I created a PR[1] to fix this upstream, but it probably won't be available on nixos-unstable for quite a while, so we can also patch it locally. [1]: https://github.com/NixOS/nixpkgs/pull/314945
203 lines
7.1 KiB
Nix
203 lines
7.1 KiB
Nix
{
|
|
inputs = {
|
|
attic.url = "github:zhaofengli/attic?ref=main";
|
|
complement = { url = "github:matrix-org/complement?ref=main"; flake = false; };
|
|
crane = { url = "github:ipetkov/crane?ref=master"; inputs.nixpkgs.follows = "nixpkgs"; };
|
|
fenix = { url = "github:nix-community/fenix?ref=main"; inputs.nixpkgs.follows = "nixpkgs"; };
|
|
flake-compat = { url = "github:edolstra/flake-compat?ref=master"; flake = false; };
|
|
flake-utils.url = "github:numtide/flake-utils?ref=main";
|
|
nix-filter.url = "github:numtide/nix-filter?ref=main";
|
|
nixpkgs.url = "github:NixOS/nixpkgs?ref=nixos-unstable";
|
|
# https://github.com/girlbossceo/rocksdb/commit/db6df0b185774778457dabfcbd822cb81760cade
|
|
rocksdb = { url = "github:girlbossceo/rocksdb?ref=v9.2.1"; flake = false; };
|
|
liburing = { url = "github:axboe/liburing?ref=master"; flake = false; };
|
|
};
|
|
|
|
outputs = inputs:
|
|
inputs.flake-utils.lib.eachDefaultSystem (system:
|
|
let
|
|
pkgsHost = inputs.nixpkgs.legacyPackages.${system};
|
|
pkgsHostStatic = pkgsHost.pkgsStatic;
|
|
|
|
# The Rust toolchain to use
|
|
toolchain = inputs.fenix.packages.${system}.fromToolchainFile {
|
|
file = ./rust-toolchain.toml;
|
|
|
|
# See also `rust-toolchain.toml`
|
|
sha256 = "sha256-+syqAd2kX8KVa8/U2gz3blIQTTsYYt3U63xBWaGOSc8";
|
|
};
|
|
|
|
mkScope = pkgs: pkgs.lib.makeScope pkgs.newScope (self: {
|
|
inherit pkgs;
|
|
book = self.callPackage ./nix/pkgs/book {};
|
|
complement = self.callPackage ./nix/pkgs/complement {};
|
|
craneLib = ((inputs.crane.mkLib pkgs).overrideToolchain toolchain);
|
|
inherit inputs;
|
|
main = self.callPackage ./nix/pkgs/main {};
|
|
oci-image = self.callPackage ./nix/pkgs/oci-image {};
|
|
rocksdb = pkgs.rocksdb.overrideAttrs (old: {
|
|
src = inputs.rocksdb;
|
|
version = pkgs.lib.removePrefix
|
|
"v"
|
|
(builtins.fromJSON (builtins.readFile ./flake.lock))
|
|
.nodes.rocksdb.original.ref;
|
|
});
|
|
# TODO: remove once https://github.com/NixOS/nixpkgs/pull/314945 is available
|
|
liburing = pkgs.liburing.overrideAttrs (old: {
|
|
# the configure script doesn't support these, and unconditionally
|
|
# builds both static and dynamic libraries.
|
|
configureFlags = pkgs.lib.subtractLists
|
|
[ "--enable-static" "--disable-shared" ]
|
|
old.configureFlags;
|
|
|
|
postInstall = old.postInstall + ''
|
|
# we remove the extra outputs
|
|
#
|
|
# we need to do this to prevent rocksdb from trying to link the
|
|
# static library in a dynamic stdenv
|
|
rm $out/lib/liburing*${
|
|
if pkgs.stdenv.hostPlatform.isStatic then ".so*" else ".a"
|
|
}
|
|
'';
|
|
});
|
|
});
|
|
|
|
scopeHost = mkScope pkgsHost;
|
|
scopeHostStatic = mkScope pkgsHostStatic;
|
|
|
|
mkDevShell = scope: scope.pkgs.mkShell {
|
|
env = scope.main.env // {
|
|
# Rust Analyzer needs to be able to find the path to default crate
|
|
# sources, and it can read this environment variable to do so. The
|
|
# `rust-src` component is required in order for this to work.
|
|
RUST_SRC_PATH = "${toolchain}/lib/rustlib/src/rust/library";
|
|
|
|
# Convenient way to access a pinned version of Complement's source
|
|
# code.
|
|
COMPLEMENT_SRC = inputs.complement.outPath;
|
|
|
|
# Needed for Complement
|
|
CGO_CFLAGS = "-I${scope.pkgs.olm}/include";
|
|
CGO_LDFLAGS = "-L${scope.pkgs.olm}/lib";
|
|
};
|
|
|
|
# Development tools
|
|
packages = [
|
|
# Always use nightly rustfmt because most of its options are unstable
|
|
#
|
|
# This needs to come before `toolchain` in this list, otherwise
|
|
# `$PATH` will have stable rustfmt instead.
|
|
inputs.fenix.packages.${system}.latest.rustfmt
|
|
|
|
toolchain
|
|
]
|
|
++ (with pkgsHost.pkgs; [
|
|
engage
|
|
cargo-audit
|
|
|
|
# Needed for producing Debian packages
|
|
cargo-deb
|
|
|
|
# Needed for Complement
|
|
go
|
|
|
|
# Needed for our script for Complement
|
|
jq
|
|
|
|
# Needed for finding broken markdown links
|
|
lychee
|
|
|
|
# Useful for editing the book locally
|
|
mdbook
|
|
])
|
|
++ scope.main.buildInputs
|
|
++ scope.main.propagatedBuildInputs
|
|
++ scope.main.nativeBuildInputs;
|
|
|
|
meta.broken = scope.main.meta.broken;
|
|
};
|
|
in
|
|
{
|
|
packages = {
|
|
default = scopeHostStatic.main;
|
|
hmalloc = scopeHost.main.override { features = ["hardened_malloc"]; };
|
|
|
|
oci-image = scopeHost.oci-image;
|
|
oci-image-hmalloc = scopeHost.oci-image.override {
|
|
main = scopeHost.main.override {
|
|
features = ["hardened_malloc"];
|
|
};
|
|
};
|
|
|
|
book = scopeHost.book;
|
|
|
|
complement = scopeHost.complement;
|
|
static-complement = scopeHostStatic.complement;
|
|
}
|
|
//
|
|
builtins.listToAttrs
|
|
(builtins.concatLists
|
|
(builtins.map
|
|
(crossSystem:
|
|
let
|
|
binaryName = "static-${crossSystem}";
|
|
pkgsCrossStatic =
|
|
(import inputs.nixpkgs {
|
|
inherit system;
|
|
crossSystem = {
|
|
config = crossSystem;
|
|
};
|
|
}).pkgsStatic;
|
|
scopeCrossStatic = mkScope pkgsCrossStatic;
|
|
in
|
|
[
|
|
# An output for a statically-linked binary
|
|
{
|
|
name = binaryName;
|
|
value = scopeCrossStatic.main;
|
|
}
|
|
|
|
# An output for a statically-linked binary with hardened_malloc
|
|
{
|
|
name = "${binaryName}-hmalloc";
|
|
value = scopeCrossStatic.main.override {
|
|
features = ["hardened_malloc"];
|
|
};
|
|
}
|
|
|
|
# An output for an OCI image based on that binary
|
|
{
|
|
name = "oci-image-${crossSystem}";
|
|
value = scopeCrossStatic.oci-image;
|
|
}
|
|
|
|
# An output for an OCI image based on that binary with hardened_malloc
|
|
{
|
|
name = "oci-image-${crossSystem}-hmalloc";
|
|
value = scopeCrossStatic.oci-image.override {
|
|
main = scopeCrossStatic.main.override {
|
|
features = ["hardened_malloc"];
|
|
};
|
|
};
|
|
}
|
|
]
|
|
)
|
|
[
|
|
"x86_64-unknown-linux-musl"
|
|
"aarch64-unknown-linux-musl"
|
|
]
|
|
)
|
|
);
|
|
|
|
devShells.default = mkDevShell scopeHostStatic;
|
|
devShells.all-features = mkDevShell
|
|
(scopeHostStatic.overrideScope (final: prev: {
|
|
main = prev.main.override { all_features = true; };
|
|
}));
|
|
devShells.no-features = mkDevShell
|
|
(scopeHostStatic.overrideScope (final: prev: {
|
|
main = prev.main.override { default_features = false; };
|
|
}));
|
|
devShells.dynamic = mkDevShell scopeHost;
|
|
});
|
|
}
|