forked from nixpak/nixpak
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathflake.nix
45 lines (40 loc) · 1.19 KB
/
flake.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
{
description = "NixPak - sandboxing for Nix";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
};
outputs = { self, nixpkgs, ... }@inputs: let
supportedSystems = [
"x86_64-linux"
"i686-linux"
"aarch64-linux"
"x86_64-darwin"
"aarch64-darwin"
];
forEachSystem = nixpkgs.lib.genAttrs supportedSystems;
forSystem = forEachSystem (system: {
mkNixPak = self.lib.nixpak {
inherit (nixpkgs) lib;
pkgs = nixpkgs.legacyPackages.x86_64-linux;
};
});
in {
lib.nixpak = import ./modules;
packages = forEachSystem (system: {
busybox = (import ./examples/busybox.nix {
inherit (forSystem.${system}) mkNixPak;
inherit (nixpkgs.legacyPackages.${system}) busybox;
}).config.script;
useless-curl = (import ./examples/network-isolation-demo.nix {
inherit (forSystem.${system}) mkNixPak;
inherit (nixpkgs.legacyPackages.${system}) curl;
}).config.script;
});
bundlers = forEachSystem (system: {
nixpak = drv: (import ./examples/bundler.nix {
inherit drv;
inherit (forSystem.${system}) mkNixPak;
}).config.script;
});
};
}