mirror of
https://github.com/tailscale/tailscale.git
synced 2025-07-28 23:04:10 +00:00

Cleanup nix support, make flake easier to read with nix-systems. This also harmonizes with golinks flake setup and reduces an input dependency by 1. Update deps test to ensure the vendor hash stays harmonized with go.mod. Update make tidy to ensure vendor hash stays current. Updates #16637 Signed-off-by: Mike O'Driscoll <mikeo@tailscale.com>
141 lines
5.3 KiB
Nix
141 lines
5.3 KiB
Nix
# flake.nix describes a Nix source repository that provides
|
|
# development builds of Tailscale and the fork of the Go compiler
|
|
# toolchain that Tailscale maintains. It also provides a development
|
|
# environment for working on tailscale, for use with "nix develop".
|
|
#
|
|
# For more information about this and why this file is useful, see:
|
|
# https://nixos.wiki/wiki/Flakes
|
|
#
|
|
# Also look into direnv: https://direnv.net/, this can make it so that you can
|
|
# automatically get your environment set up when you change folders into the
|
|
# project.
|
|
#
|
|
# WARNING: currently, the packages provided by this flake are brittle,
|
|
# and importing this flake into your own Nix configs is likely to
|
|
# leave you with broken builds periodically.
|
|
#
|
|
# The issue is that building Tailscale binaries uses the buildGoModule
|
|
# helper from nixpkgs. This helper demands to know the content hash of
|
|
# all of the Go dependencies of this repo, in the form of a Nix SRI
|
|
# hash. This hash isn't automatically kept in sync with changes made
|
|
# to go.mod yet, and so every time we update go.mod while hacking on
|
|
# Tailscale, this flake ends up with a broken build due to hash
|
|
# mismatches.
|
|
#
|
|
# Right now, this flake is intended for use by Tailscale developers,
|
|
# who are aware of this mismatch and willing to live with it. At some
|
|
# point, we'll add automation to keep the hashes more in sync, at
|
|
# which point this caveat should go away.
|
|
#
|
|
# See https://github.com/tailscale/tailscale/issues/6845 for tracking
|
|
# how to fix this mismatch.
|
|
{
|
|
inputs = {
|
|
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
|
systems.url = "github:nix-systems/default";
|
|
# Used by shell.nix as a compat shim.
|
|
flake-compat = {
|
|
url = "github:edolstra/flake-compat";
|
|
flake = false;
|
|
};
|
|
};
|
|
|
|
outputs = {
|
|
self,
|
|
nixpkgs,
|
|
systems,
|
|
flake-compat,
|
|
}: let
|
|
eachSystem = f: nixpkgs.lib.genAttrs (import systems) (s: f nixpkgs.legacyPackages.${s});
|
|
|
|
# tailscaleRev is the git commit at which this flake was imported,
|
|
# or the empty string when building from a local checkout of the
|
|
# tailscale repo.
|
|
tailscaleRev = self.rev or "";
|
|
in {
|
|
# tailscale takes a nixpkgs package set, and builds Tailscale from
|
|
# the same commit as this flake. IOW, it provides "tailscale built
|
|
# from HEAD", where HEAD is "whatever commit you imported the
|
|
# flake at".
|
|
#
|
|
# This is currently unfortunately brittle, because we have to
|
|
# specify vendorHash, and that sha changes any time we alter
|
|
# go.mod. We don't want to force a nix dependency on everyone
|
|
# hacking on Tailscale, so this flake is likely to have broken
|
|
# builds periodically until someone comes through and manually
|
|
# fixes them up. I sure wish there was a way to express "please
|
|
# just trust the local go.mod, vendorHash has no benefit here",
|
|
# but alas.
|
|
#
|
|
# So really, this flake is for tailscale devs to dogfood with, if
|
|
# you're an end user you should be prepared for this flake to not
|
|
# build periodically.
|
|
packages = eachSystem (pkgs: rec {
|
|
default = pkgs.buildGo124Module {
|
|
name = "tailscale";
|
|
pname = "tailscale";
|
|
|
|
src = ./.;
|
|
vendorHash = pkgs.lib.fileContents ./go.mod.sri;
|
|
nativeBuildInputs = [pkgs.makeWrapper pkgs.installShellFiles];
|
|
ldflags = ["-X tailscale.com/version.gitCommitStamp=${tailscaleRev}"];
|
|
env.CGO_ENABLED = 0;
|
|
subPackages = [
|
|
"cmd/tailscale"
|
|
"cmd/tailscaled"
|
|
"cmd/tsidp"
|
|
];
|
|
doCheck = false;
|
|
|
|
# NOTE: We strip the ${PORT} and $FLAGS because they are unset in the
|
|
# environment and cause issues (specifically the unset PORT). At some
|
|
# point, there should be a NixOS module that allows configuration of these
|
|
# things, but for now, we hardcode the default of port 41641 (taken from
|
|
# ./cmd/tailscaled/tailscaled.defaults).
|
|
postInstall =
|
|
pkgs.lib.optionalString pkgs.stdenv.isLinux ''
|
|
wrapProgram $out/bin/tailscaled --prefix PATH : ${pkgs.lib.makeBinPath [pkgs.iproute2 pkgs.iptables pkgs.getent pkgs.shadow]}
|
|
wrapProgram $out/bin/tailscale --suffix PATH : ${pkgs.lib.makeBinPath [pkgs.procps]}
|
|
|
|
sed -i \
|
|
-e "s#/usr/sbin#$out/bin#" \
|
|
-e "/^EnvironmentFile/d" \
|
|
-e 's/''${PORT}/41641/' \
|
|
-e 's/$FLAGS//' \
|
|
./cmd/tailscaled/tailscaled.service
|
|
|
|
install -D -m0444 -t $out/lib/systemd/system ./cmd/tailscaled/tailscaled.service
|
|
''
|
|
+ pkgs.lib.optionalString (pkgs.stdenv.buildPlatform.canExecute pkgs.stdenv.hostPlatform) ''
|
|
installShellCompletion --cmd tailscale \
|
|
--bash <($out/bin/tailscale completion bash) \
|
|
--fish <($out/bin/tailscale completion fish) \
|
|
--zsh <($out/bin/tailscale completion zsh)
|
|
'';
|
|
};
|
|
tailscale = default;
|
|
});
|
|
|
|
devShells = eachSystem (pkgs: {
|
|
devShell = pkgs.mkShell {
|
|
packages = with pkgs; [
|
|
curl
|
|
git
|
|
gopls
|
|
gotools
|
|
graphviz
|
|
perl
|
|
go_1_24
|
|
yarn
|
|
|
|
# qemu and e2fsprogs are needed for natlab
|
|
qemu
|
|
e2fsprogs
|
|
];
|
|
};
|
|
});
|
|
};
|
|
}
|
|
# nix-direnv cache busting line: sha256-4QTSspHLYJfzlontQ7msXyOB5gzq7ZwSvWmKuYY5klA=
|
|
|