feat: add a nix flake (#132)
* feat: wip `nix` Add initial code to be used when working with `nix` and `NixOS`. * a Nix flake * building a package * a NixOS module * feat: build `hp_agent` with `nix` * feat: add `hp_agent` as a flake output * feat: nix: start `headplane` after `headscale` * feat: do not rely on `git` for versioning It causes lots of pain when building with `nix` for a local `flake.nix`. Not sure if it's a good general solution: * now it requires a manual step of updating `./version` on each release. * we're losing commit hash abbreviation, like `0.5.3-5-gbe5a291` I guess, this can be fixed by installing git-pre-commit-hook, but even then it'd be wrong, because the output of `git describe --tags --always` won't be the same before and after commit. * feat: include `hp_agent` to the NixOS module * fix: version error message * fix: use relative path imports in `nix` * fix: NixOS module: generate `/etc/headplane/config.yaml` from `services.headplane.settings` * fix: NixOS module: allow passing `bool` in `services.headplane.settings.*` * fix: NixOS module: fix `/etc/headplane/config.yaml` generation * docs: add Nix/NixOS docs * feat: nix: read version from `package.json` * fix: nix: fix `agent` env vars configuration * feat: nix: add `services.headplane.agent.debug` option * fix: delete unnecessary `version` file * fix: nix: remove unnecessary `sed` substitutions A left over from previous versions. See: https://github.com/tale/headplane/issues/95#issue-2807487849 * feat: nix: do not hardcode `headplane-agent` configuration environment variables To make the module more flexible and to reduce the dependency on the config API. * docs: improve `Nix` documentation * Reflect recent changes. * Link `Nix` in README * feat: nix: setup Nix CI * feat: nix: CI without depending on flakehub.com * chore: begin bundling all deps into the server * fix: loosen headscale config validation * fix: navigate back to machines page on node deletion * fix: slice off trailing slash if present on headscale url * feat: switch to a central singleton handler This also adds support for Headscale TLS installations * fix: shamefully-hoist dependencies * fix: handle localized number fields * fix: revert dependency bundling for now * chore: cleanup and remove from readme for now --------- Co-authored-by: Aarnav Tale <aarnavtale@icloud.com>
This commit is contained in:
parent
483f86c457
commit
03a7e51384
20
.github/workflows/nix-update-lock.yaml
vendored
Normal file
20
.github/workflows/nix-update-lock.yaml
vendored
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
name: Update flake.lock
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
schedule:
|
||||||
|
- cron: '0 0 * * 0'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
update-flake-inputs:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
- uses: DeterminateSystems/nix-installer-action@main
|
||||||
|
- uses: DeterminateSystems/update-flake-lock@main
|
||||||
|
with:
|
||||||
|
pr-title: "chore: update flake.lock"
|
||||||
|
pr-labels: |
|
||||||
|
dependencies
|
||||||
|
automated
|
||||||
|
- uses: DeterminateSystems/flake-checker-action@main
|
||||||
|
- run: nix flake check --all-systems
|
||||||
24
.github/workflows/nix.yaml
vendored
Normal file
24
.github/workflows/nix.yaml
vendored
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
name:
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
workflow_dispatch:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
tags:
|
||||||
|
- v?[0-9]+.[0-9]+.[0-9]+*
|
||||||
|
|
||||||
|
concurrency:
|
||||||
|
group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.ref }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
nix-ci:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
- uses: DeterminateSystems/nix-installer-action@main
|
||||||
|
with:
|
||||||
|
determinate: true
|
||||||
|
- uses: DeterminateSystems/flake-checker-action@main
|
||||||
|
- run: nix flake check --all-systems
|
||||||
127
docs/Nix.md
Normal file
127
docs/Nix.md
Normal file
@ -0,0 +1,127 @@
|
|||||||
|
# Nix
|
||||||
|
|
||||||
|
[flake.nix](../flake.nix) provided:
|
||||||
|
```
|
||||||
|
$ nix flake show . --all-systems
|
||||||
|
git+file:///home/igor/personal/headplane?ref=refs/heads/nix&rev=2d78a95a0648a3778e114fb246ea436e96475d62
|
||||||
|
├───devShell
|
||||||
|
│ ├───aarch64-darwin: development environment 'headplane'
|
||||||
|
│ ├───x86_64-darwin: development environment 'headplane'
|
||||||
|
│ └───x86_64-linux: development environment 'headplane'
|
||||||
|
├───formatter
|
||||||
|
│ ├───aarch64-darwin: package 'alejandra-3.1.0'
|
||||||
|
│ ├───x86_64-darwin: package 'alejandra-3.1.0'
|
||||||
|
│ └───x86_64-linux: package 'alejandra-3.1.0'
|
||||||
|
├───nixosModules
|
||||||
|
│ └───headplane: NixOS module
|
||||||
|
├───overlays
|
||||||
|
│ └───default: Nixpkgs overlay
|
||||||
|
└───packages
|
||||||
|
├───aarch64-darwin
|
||||||
|
│ ├───headplane: package 'headplane-0.5.3-SNAPSHOT'
|
||||||
|
│ └───headplane-agent: package 'hp_agent-0.5.3-SNAPSHOT'
|
||||||
|
├───x86_64-darwin
|
||||||
|
│ ├───headplane: package 'headplane-0.5.3-SNAPSHOT'
|
||||||
|
│ └───headplane-agent: package 'hp_agent-0.5.3-SNAPSHOT'
|
||||||
|
└───x86_64-linux
|
||||||
|
├───headplane: package 'headplane-0.5.3-SNAPSHOT'
|
||||||
|
└───headplane-agent: package 'hp_agent-0.5.3-SNAPSHOT'
|
||||||
|
```
|
||||||
|
|
||||||
|
## NixOS module options
|
||||||
|
Defined as `services.headplane.*`, check the `./nix/` directory for details.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
1. Add the `github:tale/headplane` flake input.
|
||||||
|
2. Import a default overlay to add `pkgs.headplane` and `pkgs.headplane-agent`.
|
||||||
|
3. Import NixOS module for `services.headplane.*`.
|
||||||
|
|
||||||
|
```nix
|
||||||
|
# Your flake.nix
|
||||||
|
{
|
||||||
|
inputs = {
|
||||||
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
|
||||||
|
headplane = {
|
||||||
|
url = "github:igor-ramazanov/headplane/nix";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
outputs = {
|
||||||
|
nixpkgs,
|
||||||
|
headplane,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
nixosConfigurations.MY_MACHINE = nixpkgs.lib.nixosSystem {
|
||||||
|
system = "x86_64-linux";
|
||||||
|
modules = [
|
||||||
|
# provides `services.headplane.*` NixOS options.
|
||||||
|
headplane.nixosModules.headplane
|
||||||
|
{
|
||||||
|
# provides `pkgs.headplane` and `pkgs.headplane-agent`.
|
||||||
|
nixpkgs.overlays = [ headplane.overlays.default ];
|
||||||
|
}
|
||||||
|
{
|
||||||
|
{config, pkgs, ...}:
|
||||||
|
let
|
||||||
|
format = pkgs.formats.yaml {};
|
||||||
|
|
||||||
|
# A workaround generate a valid Headscale config accepted by Headplane when `config_strict == true`.
|
||||||
|
settings = lib.recursiveUpdate config.services.headscale.settings {
|
||||||
|
acme_email = "/dev/null";
|
||||||
|
tls_cert_path = "/dev/null";
|
||||||
|
tls_key_path = "/dev/null";
|
||||||
|
policy.path = "/dev/null";
|
||||||
|
oidc.client_secret_path = "/dev/null";
|
||||||
|
};
|
||||||
|
|
||||||
|
headscaleConfig = format.generate "headscale.yml" settings;
|
||||||
|
in {
|
||||||
|
services.headplane = {
|
||||||
|
enable = true;
|
||||||
|
agent = {
|
||||||
|
# As an example only.
|
||||||
|
# Headplane Agent hasn't yet been ready at the moment of writing the doc.
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
HEADPLANE_AGENT_DEBUG = true;
|
||||||
|
HEADPLANE_AGENT_HOSTNAME = "localhost";
|
||||||
|
HEADPLANE_AGENT_TS_SERVER = "https://example.com";
|
||||||
|
HEADPLANE_AGENT_TS_AUTHKEY = "xxxxxxxxxxxxxx";
|
||||||
|
HEADPLANE_AGENT_HP_SERVER = "https://example.com/admin/dns";
|
||||||
|
HEADPLANE_AGENT_HP_AUTHKEY = "xxxxxxxxxxxxxx";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
settings = {
|
||||||
|
server = {
|
||||||
|
host = "127.0.0.1";
|
||||||
|
port = 3000;
|
||||||
|
cookie_secret = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx";
|
||||||
|
cookie_secure = true;
|
||||||
|
};
|
||||||
|
headscale = {
|
||||||
|
url = "https://example.com";
|
||||||
|
config_path = "${headscaleConfig}";
|
||||||
|
config_strict = true;
|
||||||
|
};
|
||||||
|
integration.proc.enabled = true;
|
||||||
|
oidc = {
|
||||||
|
issuer = "https://oidc.example.com";
|
||||||
|
client_id = "headplane";
|
||||||
|
client_secret = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx";
|
||||||
|
disable_api_key_login = true;
|
||||||
|
# Might needed when integrating with Authelia.
|
||||||
|
token_endpoint_auth_method = "client_secret_basic";
|
||||||
|
headscale_api_key = "xxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx";
|
||||||
|
redirect_uri = "https://oidc.example.com/admin/oidc/callback";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
```
|
||||||
82
flake.lock
Normal file
82
flake.lock
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
{
|
||||||
|
"nodes": {
|
||||||
|
"devshell": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1741473158,
|
||||||
|
"narHash": "sha256-kWNaq6wQUbUMlPgw8Y+9/9wP0F8SHkjy24/mN3UAppg=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "devshell",
|
||||||
|
"rev": "7c9e793ebe66bcba8292989a68c0419b737a22a0",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "devshell",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"flake-utils": {
|
||||||
|
"inputs": {
|
||||||
|
"systems": "systems"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1731533236,
|
||||||
|
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "flake-utils",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1741646908,
|
||||||
|
"narHash": "sha256-55a1x5k+oFY2QCFjj7Mn5nPa8Do0shVl0m280mOAW/Q=",
|
||||||
|
"owner": "nixos",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "ab0c5b18dab5e4b5d06ed679f8fd7cdc9970c4be",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nixos",
|
||||||
|
"ref": "nixpkgs-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"root": {
|
||||||
|
"inputs": {
|
||||||
|
"devshell": "devshell",
|
||||||
|
"flake-utils": "flake-utils",
|
||||||
|
"nixpkgs": "nixpkgs"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"systems": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1681028828,
|
||||||
|
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default",
|
||||||
|
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-systems",
|
||||||
|
"repo": "default",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"root": "root",
|
||||||
|
"version": 7
|
||||||
|
}
|
||||||
69
flake.nix
Normal file
69
flake.nix
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
rec {
|
||||||
|
description = "headplane";
|
||||||
|
|
||||||
|
inputs = {
|
||||||
|
devshell = {
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
url = "github:numtide/devshell";
|
||||||
|
};
|
||||||
|
flake-utils.url = "github:numtide/flake-utils";
|
||||||
|
nixpkgs.url = "github:nixos/nixpkgs/nixpkgs-unstable";
|
||||||
|
};
|
||||||
|
|
||||||
|
outputs = {
|
||||||
|
devshell,
|
||||||
|
flake-utils,
|
||||||
|
nixpkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
flake-utils.lib.eachSystem [
|
||||||
|
"aarch64-darwin"
|
||||||
|
"x86_64-darwin"
|
||||||
|
"x86_64-linux"
|
||||||
|
]
|
||||||
|
(system: let
|
||||||
|
pkgs = import nixpkgs {
|
||||||
|
inherit system;
|
||||||
|
overlays = [devshell.overlays.default];
|
||||||
|
};
|
||||||
|
in rec {
|
||||||
|
formatter = pkgs.alejandra;
|
||||||
|
packages = {
|
||||||
|
headplane = pkgs.callPackage ./nix/package.nix {};
|
||||||
|
headplane-agent = pkgs.callPackage ./nix/agent.nix {};
|
||||||
|
};
|
||||||
|
checks.default = pkgs.symlinkJoin {
|
||||||
|
name = "headplane-with-agent";
|
||||||
|
paths = [packages.headplane packages.headplane-agent];
|
||||||
|
};
|
||||||
|
devShells.default = pkgs.devshell.mkShell rec {
|
||||||
|
name = description;
|
||||||
|
motd = let
|
||||||
|
providedPackages = pkgs.lib.concatStringsSep "\n" (
|
||||||
|
pkgs.lib.map
|
||||||
|
(pkg: "\t* ${pkgs.lib.getName pkg}")
|
||||||
|
(pkgs.lib.reverseList packages)
|
||||||
|
);
|
||||||
|
in ''
|
||||||
|
Entered '${description}' development environment.
|
||||||
|
|
||||||
|
Provided packages:
|
||||||
|
${providedPackages}
|
||||||
|
'';
|
||||||
|
packages = [
|
||||||
|
pkgs.go
|
||||||
|
pkgs.nodejs-slim_22
|
||||||
|
pkgs.pnpm_10
|
||||||
|
pkgs.typescript-language-server
|
||||||
|
];
|
||||||
|
env = [];
|
||||||
|
};
|
||||||
|
})
|
||||||
|
// {
|
||||||
|
overlays.default = final: prev: {
|
||||||
|
headplane = final.callPackage ./nix/package.nix {};
|
||||||
|
headplane-agent = final.callPackage ./nix/agent.nix {};
|
||||||
|
};
|
||||||
|
nixosModules.headplane = import ./nix/module.nix;
|
||||||
|
};
|
||||||
|
}
|
||||||
9
nix/agent.nix
Normal file
9
nix/agent.nix
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
{buildGoModule}:
|
||||||
|
buildGoModule {
|
||||||
|
pname = "hp_agent";
|
||||||
|
version = (builtins.fromJSON (builtins.readFile ../package.json)).version;
|
||||||
|
src = ../.;
|
||||||
|
vendorHash = "sha256-G0kahv3mPTL/mxU2U+0IytJaFVPXMbMBktbLMfM0BO8=";
|
||||||
|
ldflags = ["-s" "-w"];
|
||||||
|
env.CGO_ENABLED = 0;
|
||||||
|
}
|
||||||
112
nix/module.nix
Normal file
112
nix/module.nix
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
inherit
|
||||||
|
(lib)
|
||||||
|
attrsToList
|
||||||
|
listToAttrs
|
||||||
|
map
|
||||||
|
mkEnableOption
|
||||||
|
mkIf
|
||||||
|
mkOption
|
||||||
|
mkPackageOption
|
||||||
|
typeOf
|
||||||
|
types
|
||||||
|
;
|
||||||
|
cfg = config.services.headplane;
|
||||||
|
settingsFormat = pkgs.formats.yaml {};
|
||||||
|
settingsFile = settingsFormat.generate "headplane-config.yaml" cfg.settings;
|
||||||
|
agentEnv = listToAttrs (map (n: {
|
||||||
|
name = n.name;
|
||||||
|
value =
|
||||||
|
if ((typeOf n.value) == "bool")
|
||||||
|
then
|
||||||
|
(
|
||||||
|
if (n.value)
|
||||||
|
then "true"
|
||||||
|
else "false"
|
||||||
|
)
|
||||||
|
else n.value;
|
||||||
|
}) (attrsToList cfg.agent.settings));
|
||||||
|
in {
|
||||||
|
options.services.headplane = {
|
||||||
|
enable = mkEnableOption "headplane";
|
||||||
|
package = mkPackageOption pkgs "headplane" {};
|
||||||
|
|
||||||
|
settings = mkOption {
|
||||||
|
type = types.submodule {
|
||||||
|
freeformType = settingsFormat.type;
|
||||||
|
};
|
||||||
|
default = {};
|
||||||
|
description = "Headplane config, generates a YAML config. See: https://github.com/tale/headplane/blob/main/config.example.yaml.";
|
||||||
|
};
|
||||||
|
|
||||||
|
agent = mkOption {
|
||||||
|
type = types.submodule {
|
||||||
|
options = {
|
||||||
|
enable = mkEnableOption "headplane-agent";
|
||||||
|
package = mkPackageOption pkgs "headplane-agent" {};
|
||||||
|
settings = mkOption {
|
||||||
|
type = types.attrsOf [types.str types.bool];
|
||||||
|
description = "Headplane agent env vars config. See: https://github.com/tale/headplane/blob/main/docs/Headplane-Agent.md";
|
||||||
|
default = {};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
environment = {
|
||||||
|
systemPackages = [cfg.package];
|
||||||
|
etc."headplane/config.yaml".source = "${settingsFile}";
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.headplane-agent =
|
||||||
|
mkIf cfg.agent.enable
|
||||||
|
{
|
||||||
|
description = "Headplane side-running agent";
|
||||||
|
|
||||||
|
wantedBy = ["multi-user.target"];
|
||||||
|
after = ["headplane.service"];
|
||||||
|
requires = ["headplane.service"];
|
||||||
|
|
||||||
|
environment = agentEnv;
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
User = config.services.headscale.user;
|
||||||
|
Group = config.services.headscale.group;
|
||||||
|
|
||||||
|
ExecStart = "${pkgs.headplane-agent}/bin/hp_agent";
|
||||||
|
Restart = "always";
|
||||||
|
RestartSec = 5;
|
||||||
|
|
||||||
|
# TODO: Harden `systemd` security according to the "The Principle of Least Power".
|
||||||
|
# See: `$ systemd-analyze security headplane-agent`.
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.headplane = {
|
||||||
|
description = "Headscale Web UI";
|
||||||
|
|
||||||
|
wantedBy = ["multi-user.target"];
|
||||||
|
after = ["headscale.service"];
|
||||||
|
requires = ["headscale.service"];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
User = config.services.headscale.user;
|
||||||
|
Group = config.services.headscale.group;
|
||||||
|
|
||||||
|
ExecStart = "${pkgs.headplane}/bin/headplane";
|
||||||
|
Restart = "always";
|
||||||
|
RestartSec = 5;
|
||||||
|
|
||||||
|
# TODO: Harden `systemd` security according to the "The Principle of Least Power".
|
||||||
|
# See: `$ systemd-analyze security headplane`.
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
48
nix/package.nix
Normal file
48
nix/package.nix
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
git,
|
||||||
|
lib,
|
||||||
|
makeWrapper,
|
||||||
|
nodejs_22,
|
||||||
|
pnpm_10,
|
||||||
|
stdenv,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
stdenv.mkDerivation (finalAttrs: {
|
||||||
|
pname = "headplane";
|
||||||
|
version = (builtins.fromJSON (builtins.readFile ../package.json)).version;
|
||||||
|
src = ../.;
|
||||||
|
|
||||||
|
nativeBuildInputs = [
|
||||||
|
makeWrapper
|
||||||
|
nodejs_22
|
||||||
|
pnpm_10.configHook
|
||||||
|
git
|
||||||
|
];
|
||||||
|
|
||||||
|
dontCheckForBrokenSymlinks = true;
|
||||||
|
|
||||||
|
pnpmDeps = pnpm_10.fetchDeps {
|
||||||
|
inherit (finalAttrs) pname version src;
|
||||||
|
hash = "sha256-j+3fcxukK19fXVIlVe+tXenYf28MylHy+/qHy7FpvL0=";
|
||||||
|
};
|
||||||
|
|
||||||
|
buildPhase = ''
|
||||||
|
runHook preBuild
|
||||||
|
pnpm build
|
||||||
|
pnpm prune --prod
|
||||||
|
runHook postBuild
|
||||||
|
'';
|
||||||
|
|
||||||
|
installPhase = ''
|
||||||
|
runHook preInstall
|
||||||
|
mkdir -p $out/{bin,share/headplane}
|
||||||
|
cp -r {build,node_modules} $out/share/headplane/
|
||||||
|
sed -i "s;$PWD;../..;" $out/share/headplane/build/headplane/server.js
|
||||||
|
makeWrapper ${lib.getExe nodejs_22} $out/bin/headplane \
|
||||||
|
--chdir $out/share/headplane \
|
||||||
|
--set BUILD_PATH $out/share/headplane/build \
|
||||||
|
--set NODE_ENV production \
|
||||||
|
--add-flags $out/share/headplane/build/headplane/server.js
|
||||||
|
runHook postInstall
|
||||||
|
'';
|
||||||
|
})
|
||||||
Loading…
Reference in New Issue
Block a user