Compare commits
	
		
			21 Commits
		
	
	
		
			releases/v
			...
			single-ins
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|  | 9d89bbc364 | ||
|  | 10a7d51bce | ||
|  | 642cfa0200 | ||
|  | d3c3fef7d5 | ||
|  | 1c67340d91 | ||
|  | afb82faed7 | ||
|  | bc19d99f45 | ||
|  | 5ab66ea04b | ||
|  | 1b7507cdbf | ||
|  | 5bba53f2a2 | ||
|  | ebed63b0a2 | ||
|  | 5c21a08208 | ||
|  | 9affe1ce81 | ||
|  | ef735e86b9 | ||
|  | 4856b67e4a | ||
|  | 6e3de2b50b | ||
|  | d8ecc134bc | ||
|  | dba72516a1 | ||
|  | df989ac1d6 | ||
|  | a5f8eada85 | ||
|  | f57eb6b95e | 
							
								
								
									
										26
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										26
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							| @@ -3,22 +3,34 @@ on: | |||||||
|   pull_request: |   pull_request: | ||||||
|   push: |   push: | ||||||
| jobs: | jobs: | ||||||
|   tests: |   simple-build: | ||||||
|     strategy: |     strategy: | ||||||
|       matrix: |       matrix: | ||||||
|         os: [ubuntu-18.04, macos-latest] |         os: [ubuntu-latest, macos-latest] | ||||||
|     runs-on: ${{ matrix.os }} |     runs-on: ${{ matrix.os }} | ||||||
|     steps: |     steps: | ||||||
|     - uses: actions/checkout@v1 |     - uses: actions/checkout@v2 | ||||||
|     - run: yarn install --frozen-lockfile |     - run: yarn install --frozen-lockfile | ||||||
|     - run: yarn build |     - run: yarn build | ||||||
|     # TODO: just commit it using github |  | ||||||
|     - run: git diff --exit-code |  | ||||||
|     - run: yarn test |  | ||||||
|     - name: Install Nix |     - name: Install Nix | ||||||
|       uses: ./ |       uses: ./ | ||||||
|     - run: nix-env -iA cachix -f https://github.com/NixOS/nixpkgs/tarball/ab5863afada3c1b50fc43bf774b75ea71b287cde |     - run: nix-env -iA cachix -f https://cachix.org/api/v1/install | ||||||
|     - run: cat /etc/nix/nix.conf |     - run: cat /etc/nix/nix.conf | ||||||
|     # cachix should be available and be able to configure a cache |     # cachix should be available and be able to configure a cache | ||||||
|     - run: cachix use cachix |     - run: cachix use cachix | ||||||
|     - run: nix-build test.nix |     - run: nix-build test.nix | ||||||
|  |   no-channel: | ||||||
|  |     strategy: | ||||||
|  |       matrix: | ||||||
|  |         os: [ubuntu-latest, macos-latest] | ||||||
|  |     runs-on: ${{ matrix.os }} | ||||||
|  |     steps: | ||||||
|  |     - uses: actions/checkout@v2 | ||||||
|  |     - run: yarn install --frozen-lockfile | ||||||
|  |     - run: yarn build | ||||||
|  |     - name: Install Nix | ||||||
|  |       uses: ./ | ||||||
|  |       with: | ||||||
|  |         skip_adding_nixpkgs_channel: true | ||||||
|  |     - run: nix-build test.nix && exit 1 || echo "OK" | ||||||
|  |     - run: NIX_PATH=nixpkgs=https://github.com/NixOS/nixpkgs/tarball/ab5863afada3c1b50fc43bf774b75ea71b287cde nix-build test.nix | ||||||
| @@ -17,8 +17,8 @@ jobs: | |||||||
|   tests: |   tests: | ||||||
|     runs-on: ubuntu-latest |     runs-on: ubuntu-latest | ||||||
|     steps: |     steps: | ||||||
|     - uses: actions/checkout@v1 |     - uses: actions/checkout@v2 | ||||||
|     - uses: cachix/install-nix-action@v6 |     - uses: cachix/install-nix-action@v8 | ||||||
|     - run: nix-build |     - run: nix-build | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
|   | |||||||
| @@ -1,6 +1,11 @@ | |||||||
| name: 'Install Nix' | name: 'Install Nix' | ||||||
| description: 'Installs Nix on GitHub Actions for the supported platforms: Linux and macOS.' | description: 'Installs Nix on GitHub Actions for the supported platforms: Linux and macOS.' | ||||||
| author: 'Domen Kožar' | author: 'Domen Kožar' | ||||||
|  | inputs: | ||||||
|  |   install_url: | ||||||
|  |     description: 'Installation URL that will contain a script to install Nix' | ||||||
|  |   skip_adding_nixpkgs_channel: | ||||||
|  |     description: 'Skip adding nixpkgs-unstable channel' | ||||||
| branding: | branding: | ||||||
|   color: 'blue' |   color: 'blue' | ||||||
|   icon: 'sun' |   icon: 'sun' | ||||||
|   | |||||||
							
								
								
									
										34
									
								
								lib/install-nix.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										34
									
								
								lib/install-nix.sh
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,34 @@ | |||||||
|  | #!/usr/bin/env bash | ||||||
|  | set -euo pipefail | ||||||
|  |  | ||||||
|  | # Set jobs to number of cores | ||||||
|  | sudo sh -c 'echo max-jobs = auto >> /tmp/nix.conf' | ||||||
|  | # Allow binary caches for runner user | ||||||
|  | sudo sh -c 'echo trusted-users = root runner >> /tmp/nix.conf' | ||||||
|  |  | ||||||
|  | if [[ $INPUT_SKIP_ADDING_NIXPKGS_CHANNEL = "true" ]]; then | ||||||
|  |   extra_cmd=--no-channel-add | ||||||
|  | else | ||||||
|  |   extra_cmd= | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | sh <(curl -L ${INPUT_INSTALL_URL:-https://nixos.org/nix/install}) \ | ||||||
|  |   --nix-extra-conf-file /tmp/nix.conf --darwin-use-unencrypted-nix-store-volume $extra_cmd | ||||||
|  |  | ||||||
|  | if [[ $OSTYPE =~ darwin ]]; then | ||||||
|  |   # Disable spotlight indexing of /nix to speed up performance | ||||||
|  |   sudo mdutil -i off /nix | ||||||
|  |  | ||||||
|  |   # macOS needs certificates hints | ||||||
|  |   cert_file=/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt | ||||||
|  |   echo "::set-env name=NIX_SSL_CERT_FILE::$cert_file" | ||||||
|  |   export NIX_SSL_CERT_FILE=$cert_file | ||||||
|  |   sudo launchctl setenv NIX_SSL_CERT_FILE "$cert_file" | ||||||
|  | fi | ||||||
|  |  | ||||||
|  | # Set paths | ||||||
|  | echo "::add-path::/nix/var/nix/profiles/per-user/runner/profile/bin" | ||||||
|  | echo "::add-path::/nix/var/nix/profiles/default/bin" | ||||||
|  | if [[ $INPUT_SKIP_ADDING_NIXPKGS_CHANNEL != "true" ]]; then | ||||||
|  | echo "::set-env name=NIX_PATH::/nix/var/nix/profiles/per-user/root/channels" | ||||||
|  | fi | ||||||
							
								
								
									
										81
									
								
								lib/main.js
									
									
									
									
									
								
							
							
						
						
									
										81
									
								
								lib/main.js
									
									
									
									
									
								
							| @@ -1,83 +1,4 @@ | |||||||
| "use strict"; | "use strict"; | ||||||
| var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { |  | ||||||
|     function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } |  | ||||||
|     return new (P || (P = Promise))(function (resolve, reject) { |  | ||||||
|         function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } |  | ||||||
|         function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } |  | ||||||
|         function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } |  | ||||||
|         step((generator = generator.apply(thisArg, _arguments || [])).next()); |  | ||||||
|     }); |  | ||||||
| }; |  | ||||||
| var __importStar = (this && this.__importStar) || function (mod) { |  | ||||||
|     if (mod && mod.__esModule) return mod; |  | ||||||
|     var result = {}; |  | ||||||
|     if (mod != null) for (var k in mod) if (Object.hasOwnProperty.call(mod, k)) result[k] = mod[k]; |  | ||||||
|     result["default"] = mod; |  | ||||||
|     return result; |  | ||||||
| }; |  | ||||||
| Object.defineProperty(exports, "__esModule", { value: true }); | Object.defineProperty(exports, "__esModule", { value: true }); | ||||||
| const core = __importStar(require("@actions/core")); |  | ||||||
| const exec = __importStar(require("@actions/exec")); |  | ||||||
| const tc = __importStar(require("@actions/tool-cache")); |  | ||||||
| const child_process_1 = require("child_process"); | const child_process_1 = require("child_process"); | ||||||
| const os_1 = require("os"); | child_process_1.execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' }); | ||||||
| const process_1 = require("process"); |  | ||||||
| const net_1 = require("net"); |  | ||||||
| function nixConf() { |  | ||||||
|     return __awaiter(this, void 0, void 0, function* () { |  | ||||||
|         // Workaround a segfault: https://github.com/NixOS/nix/issues/2733 |  | ||||||
|         yield exec.exec("sudo", ["mkdir", "-p", "/etc/nix"]); |  | ||||||
|         yield exec.exec("sudo", ["sh", "-c", "echo http2 = false >> /etc/nix/nix.conf"]); |  | ||||||
|         // Set jobs to number of cores |  | ||||||
|         yield exec.exec("sudo", ["sh", "-c", "echo max-jobs = auto >> /etc/nix/nix.conf"]); |  | ||||||
|         // Allow binary caches for runner user |  | ||||||
|         yield exec.exec("sudo", ["sh", "-c", "echo trusted-users = root runner >> /etc/nix/nix.conf"]); |  | ||||||
|     }); |  | ||||||
| } |  | ||||||
| function run() { |  | ||||||
|     return __awaiter(this, void 0, void 0, function* () { |  | ||||||
|         try { |  | ||||||
|             const PATH = process.env.PATH; |  | ||||||
|             yield nixConf(); |  | ||||||
|             // Catalina workaround https://github.com/NixOS/nix/issues/2925 |  | ||||||
|             if (os_1.type() == "Darwin") { |  | ||||||
|                 child_process_1.execFileSync(`${__dirname}/create-darwin-volume.sh`, { stdio: 'inherit' }); |  | ||||||
|             } |  | ||||||
|             // Needed due to multi-user being too defensive |  | ||||||
|             core.exportVariable('ALLOW_PREEXISTING_INSTALLATION', "1"); |  | ||||||
|             // TODO: retry due to all the things that can go wrong |  | ||||||
|             const nixInstall = yield tc.downloadTool('https://nixos.org/nix/install'); |  | ||||||
|             yield exec.exec("sh", [nixInstall, "--daemon"]); |  | ||||||
|             // write nix.conf again as installation overwrites it, reload the daemon to pick up changes |  | ||||||
|             yield nixConf(); |  | ||||||
|             yield exec.exec("sudo", ["pkill", "-HUP", "nix-daemon"]); |  | ||||||
|             // setup env |  | ||||||
|             core.exportVariable('PATH', `${PATH}:/nix/var/nix/profiles/default/bin:/nix/var/nix/profiles/per-user/runner/profile/bin`); |  | ||||||
|             core.exportVariable('NIX_PATH', `/nix/var/nix/profiles/per-user/root/channels`); |  | ||||||
|             if (os_1.type() == "Darwin") { |  | ||||||
|                 // macOS needs certificates hints |  | ||||||
|                 core.exportVariable('NIX_SSL_CERT_FILE', '/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt'); |  | ||||||
|                 // TODO: nc doesn't work correctly on macOS :( |  | ||||||
|                 yield awaitSocket(); |  | ||||||
|             } |  | ||||||
|         } |  | ||||||
|         catch (error) { |  | ||||||
|             core.setFailed(`Action failed with error: ${error}`); |  | ||||||
|             throw (error); |  | ||||||
|         } |  | ||||||
|     }); |  | ||||||
| } |  | ||||||
| function awaitSocket() { |  | ||||||
|     return __awaiter(this, void 0, void 0, function* () { |  | ||||||
|         const daemonSocket = net_1.createConnection({ path: '/nix/var/nix/daemon-socket/socket' }); |  | ||||||
|         daemonSocket.on('error', () => __awaiter(this, void 0, void 0, function* () { |  | ||||||
|             console.log('Waiting for daemon socket to be available, reconnecting...'); |  | ||||||
|             yield new Promise(resolve => setTimeout(resolve, 500)); |  | ||||||
|             yield awaitSocket(); |  | ||||||
|         })); |  | ||||||
|         daemonSocket.on('connect', () => { |  | ||||||
|             process_1.exit(0); |  | ||||||
|         }); |  | ||||||
|     }); |  | ||||||
| } |  | ||||||
| run(); |  | ||||||
|   | |||||||
| @@ -1,8 +0,0 @@ | |||||||
| "use strict"; |  | ||||||
| Object.defineProperty(exports, "__esModule", { value: true }); |  | ||||||
| function extrasperse(elem, array) { |  | ||||||
|     const init = []; |  | ||||||
|     return array.reduce((r, a) => r.concat(elem, a), init); |  | ||||||
| } |  | ||||||
| exports.extrasperse = extrasperse; |  | ||||||
| ; |  | ||||||
							
								
								
									
										72
									
								
								src/main.ts
									
									
									
									
									
								
							
							
						
						
									
										72
									
								
								src/main.ts
									
									
									
									
									
								
							| @@ -1,71 +1,3 @@ | |||||||
| import * as core from '@actions/core'; | import { execFileSync } from 'child_process'; | ||||||
| import * as exec from '@actions/exec'; |  | ||||||
| import * as tc from '@actions/tool-cache'; |  | ||||||
| import {execFileSync} from 'child_process'; |  | ||||||
| import {type} from 'os'; |  | ||||||
| import {exit} from 'process'; |  | ||||||
| import {createConnection} from 'net'; |  | ||||||
|  |  | ||||||
| async function nixConf() { | execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' }); | ||||||
|     // Workaround a segfault: https://github.com/NixOS/nix/issues/2733 |  | ||||||
|     await exec.exec("sudo", ["mkdir", "-p", "/etc/nix"]); |  | ||||||
|     await exec.exec("sudo", ["sh", "-c", "echo http2 = false >> /etc/nix/nix.conf"]); |  | ||||||
|  |  | ||||||
|     // Set jobs to number of cores |  | ||||||
|     await exec.exec("sudo", ["sh", "-c", "echo max-jobs = auto >> /etc/nix/nix.conf"]); |  | ||||||
|  |  | ||||||
|     // Allow binary caches for runner user |  | ||||||
|     await exec.exec("sudo", ["sh", "-c", "echo trusted-users = root runner >> /etc/nix/nix.conf"]); |  | ||||||
| } |  | ||||||
|  |  | ||||||
| async function run() { |  | ||||||
|   try { |  | ||||||
|     const PATH = process.env.PATH; |  | ||||||
|   |  | ||||||
|     await nixConf(); |  | ||||||
|  |  | ||||||
|     // Catalina workaround https://github.com/NixOS/nix/issues/2925 |  | ||||||
|     if (type() == "Darwin") { |  | ||||||
|       execFileSync(`${__dirname}/create-darwin-volume.sh`, { stdio: 'inherit' }); |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     // Needed due to multi-user being too defensive |  | ||||||
|     core.exportVariable('ALLOW_PREEXISTING_INSTALLATION', "1");  |  | ||||||
|  |  | ||||||
|     // TODO: retry due to all the things that can go wrong |  | ||||||
|     const nixInstall = await tc.downloadTool('https://nixos.org/nix/install'); |  | ||||||
|     await exec.exec("sh", [nixInstall, "--daemon"]); |  | ||||||
|  |  | ||||||
|     // write nix.conf again as installation overwrites it, reload the daemon to pick up changes |  | ||||||
|     await nixConf(); |  | ||||||
|     await exec.exec("sudo", ["pkill", "-HUP", "nix-daemon"]); |  | ||||||
|  |  | ||||||
|     // setup env |  | ||||||
|     core.exportVariable('PATH', `${PATH}:/nix/var/nix/profiles/default/bin:/nix/var/nix/profiles/per-user/runner/profile/bin`) |  | ||||||
|     core.exportVariable('NIX_PATH', `/nix/var/nix/profiles/per-user/root/channels`) |  | ||||||
|     if (type() == "Darwin") { |  | ||||||
|       // macOS needs certificates hints |  | ||||||
|       core.exportVariable('NIX_SSL_CERT_FILE', '/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt'); |  | ||||||
|  |  | ||||||
|       // TODO: nc doesn't work correctly on macOS :( |  | ||||||
|       await awaitSocket(); |  | ||||||
|     } |  | ||||||
|   } catch (error) { |  | ||||||
|     core.setFailed(`Action failed with error: ${error}`); |  | ||||||
|     throw(error); |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| async function awaitSocket() { |  | ||||||
|   const daemonSocket = createConnection({ path: '/nix/var/nix/daemon-socket/socket' }); |  | ||||||
|   daemonSocket.on('error', async () => { |  | ||||||
|     console.log('Waiting for daemon socket to be available, reconnecting...'); |  | ||||||
|     await new Promise(resolve => setTimeout(resolve, 500)); |  | ||||||
|     await awaitSocket(); |  | ||||||
|   }); |  | ||||||
|   daemonSocket.on('connect', () => { |  | ||||||
|     exit(0); |  | ||||||
|   }); |  | ||||||
| } |  | ||||||
|  |  | ||||||
| run(); |  | ||||||
|   | |||||||
| @@ -424,9 +424,9 @@ acorn-walk@^6.0.1: | |||||||
|   integrity sha512-7evsyfH1cLOCdAzZAd43Cic04yKydNx0cF+7tiA19p1XnLLPU4dpCQOqpjqwokFe//vS0QqfqqjCS2JkiIs0cA== |   integrity sha512-7evsyfH1cLOCdAzZAd43Cic04yKydNx0cF+7tiA19p1XnLLPU4dpCQOqpjqwokFe//vS0QqfqqjCS2JkiIs0cA== | ||||||
|  |  | ||||||
| acorn@^5.5.3: | acorn@^5.5.3: | ||||||
|   version "5.7.3" |   version "5.7.4" | ||||||
|   resolved "https://registry.yarnpkg.com/acorn/-/acorn-5.7.3.tgz#67aa231bf8812974b85235a96771eb6bd07ea279" |   resolved "https://registry.yarnpkg.com/acorn/-/acorn-5.7.4.tgz#3e8d8a9947d0599a1796d10225d7432f4a4acf5e" | ||||||
|   integrity sha512-T/zvzYRfbVojPWahDsE5evJdHb3oJoQfFbsrKM7w5Zcs++Tr257tia3BmMP8XYVjp1S9RZXQMh7gao96BlqZOw== |   integrity sha512-1D++VG7BhrtvQpNbBzovKNc1FLGGEE/oGe7b9xJm/RFHMBeUaUGpluV9RLjZa47YFdPcDAenEYuq9pQPcMdLJg== | ||||||
|  |  | ||||||
| acorn@^6.0.1: | acorn@^6.0.1: | ||||||
|   version "6.3.0" |   version "6.3.0" | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user