{ nixConfig.extra-substituters = [ "https://bytecodealliance.cachix.org" "https://wasmcloud.cachix.org" "https://nixify.cachix.org" "https://crane.cachix.org" "https://nix-community.cachix.org" "https://cache.garnix.io" ]; nixConfig.extra-trusted-public-keys = [ "bytecodealliance.cachix.org-1:0SBgh//n2n0heh0sDFhTm+ZKBRy2sInakzFGfzN531Y=" "wasmcloud.cachix.org-1:9gRBzsKh+x2HbVVspreFg/6iFRiD4aOcUQfXVDl3hiM=" "nixify.cachix.org-1:95SiUQuf8Ij0hwDweALJsLtnMyv/otZamWNRp1Q1pXw=" "crane.cachix.org-1:8Scfpmn9w+hGdXH/Q9tTLiYAE/2dnJYRJP7kl80GuRk=" "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" "cache.garnix.io:CTFPyKSLcx5RMJKfLo5EEPUObbA78b0YQ2DTCJXqr9g=" ]; inputs.nixify.inputs.nixlib.follows = "nixlib"; inputs.nixify.url = "github:rvolosatovs/nixify"; inputs.nixlib.url = "github:nix-community/nixpkgs.lib"; inputs.nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixpkgs-unstable"; inputs.wit-deps.inputs.nixify.follows = "nixify"; inputs.wit-deps.inputs.nixlib.follows = "nixlib"; inputs.wit-deps.url = "github:bytecodealliance/wit-deps/v0.4.0"; inputs.wrpc.inputs.nixify.follows = "nixify"; inputs.wrpc.inputs.nixlib.follows = "nixlib"; inputs.wrpc.url = "github:wrpc/wrpc"; outputs = { nixify, nixlib, nixpkgs-unstable, wit-deps, wrpc, ... }: with builtins; with nixlib.lib; with nixify.lib; rust.mkFlake { src = ./.; overlays = [ wit-deps.overlays.default wrpc.overlays.default ( final: prev: { pkgsUnstable = import nixpkgs-unstable { inherit (final.stdenv.hostPlatform) system ; inherit (final) config ; }; } ) ]; excludePaths = [ ".envrc" ".github" ".gitignore" "flake.nix" "LICENSE" "README.md" ]; doCheck = false; # testing is performed in checks via `nextest` targets.arm-unknown-linux-gnueabihf = false; targets.arm-unknown-linux-musleabihf = false; targets.armv7-unknown-linux-gnueabihf = false; targets.armv7-unknown-linux-musleabihf = false; targets.powerpc64le-unknown-linux-gnu = false; targets.s390x-unknown-linux-gnu = false; targets.wasm32-unknown-unknown = false; targets.wasm32-wasi = false; clippy.allTargets = true; clippy.deny = ["warnings"]; clippy.workspace = true; test.allTargets = true; test.workspace = true; buildOverrides = { pkgs, pkgsCross ? pkgs, ... }: { buildInputs ? [], depsBuildBuild ? [], nativeBuildInputs ? [], nativeCheckInputs ? [], preCheck ? "", ... } @ args: with pkgs.lib; let darwin2darwin = pkgs.stdenv.hostPlatform.isDarwin && pkgsCross.stdenv.hostPlatform.isDarwin; depsBuildBuild' = depsBuildBuild ++ optional pkgs.stdenv.hostPlatform.isDarwin pkgs.darwin.apple_sdk.frameworks.SystemConfiguration ++ optional darwin2darwin pkgs.xcbuild.xcrun; in { buildInputs = buildInputs ++ optional pkgs.stdenv.hostPlatform.isDarwin pkgs.libiconv; depsBuildBuild = depsBuildBuild'; } // optionalAttrs (args ? cargoArtifacts) { preCheck = '' export GOCACHE=$TMPDIR/gocache export GOMODCACHE=$TMPDIR/gomod export GOPATH=$TMPDIR/go export HOME=$TMPDIR/home '' + preCheck; depsBuildBuild = depsBuildBuild' ++ optionals darwin2darwin [ pkgs.darwin.apple_sdk.frameworks.CoreFoundation pkgs.darwin.apple_sdk.frameworks.CoreServices ]; nativeCheckInputs = nativeCheckInputs ++ [ pkgs.nats-server pkgs.pkgsUnstable.go ]; }; withDevShells = { devShells, pkgs, ... }: extendDerivations { buildInputs = [ pkgs.cargo-audit pkgs.hey pkgs.nats-server pkgs.natscli pkgs.wit-deps pkgs.wrpc pkgs.pkgsUnstable.go pkgs.pkgsUnstable.wasm-tools pkgs.pkgsUnstable.wit-bindgen ]; } devShells; }; }