Add python template
This commit is contained in:
parent
d453e0a9c6
commit
417793580b
4 changed files with 35 additions and 114 deletions
|
|
@ -38,6 +38,12 @@
|
||||||
({pkgs, ...}: {
|
({pkgs, ...}: {
|
||||||
networking.hostName = instance;
|
networking.hostName = instance;
|
||||||
nixpkgs.overlays = [nix-custom.overlays.default];
|
nixpkgs.overlays = [nix-custom.overlays.default];
|
||||||
|
|
||||||
|
# Feishin broken
|
||||||
|
# TODO: Use audioling
|
||||||
|
nixpkgs.config.permittedInsecurePackages = [
|
||||||
|
"electron-31.7.7"
|
||||||
|
];
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
specialArgs = {inherit inputs;};
|
specialArgs = {inherit inputs;};
|
||||||
|
|
|
||||||
|
|
@ -13,17 +13,14 @@ in {
|
||||||
xdgCfg = config.xdg;
|
xdgCfg = config.xdg;
|
||||||
in {
|
in {
|
||||||
home.packages = with pkgs; [
|
home.packages = with pkgs; [
|
||||||
discord
|
|
||||||
element-desktop
|
|
||||||
feishin
|
feishin
|
||||||
jellyfin-mpv-shim
|
jellyfin-mpv-shim
|
||||||
joplin-desktop
|
joplin-desktop
|
||||||
lutris
|
lutris
|
||||||
nvtopPackages.amd
|
nvtopPackages.full
|
||||||
picard
|
picard
|
||||||
qbittorrent
|
qbittorrent
|
||||||
ryujinx
|
ryujinx
|
||||||
signal-desktop
|
|
||||||
telegram-desktop
|
telegram-desktop
|
||||||
thunderbird
|
thunderbird
|
||||||
via
|
via
|
||||||
|
|
|
||||||
28
template/python/flake.nix
Normal file
28
template/python/flake.nix
Normal file
|
|
@ -0,0 +1,28 @@
|
||||||
|
{
|
||||||
|
inputs = {
|
||||||
|
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
||||||
|
flake-utils.url = "github:numtide/flake-utils";
|
||||||
|
};
|
||||||
|
|
||||||
|
outputs = {
|
||||||
|
self,
|
||||||
|
flake-utils,
|
||||||
|
nixpkgs,
|
||||||
|
}:
|
||||||
|
flake-utils.lib.eachDefaultSystem (system: let
|
||||||
|
pkgs = nixpkgs.legacyPackages.${system};
|
||||||
|
in {
|
||||||
|
devShells.default = pkgs.mkShell {
|
||||||
|
packages = with pkgs; [
|
||||||
|
(
|
||||||
|
python3.withPackages (pyPkgs:
|
||||||
|
with pyPkgs; [
|
||||||
|
pylsp-mypy
|
||||||
|
python-lsp-ruff
|
||||||
|
python-lsp-server
|
||||||
|
])
|
||||||
|
)
|
||||||
|
];
|
||||||
|
};
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
@ -4,10 +4,6 @@
|
||||||
flake-utils.url = "github:numtide/flake-utils";
|
flake-utils.url = "github:numtide/flake-utils";
|
||||||
fenix.url = "github:nix-community/fenix";
|
fenix.url = "github:nix-community/fenix";
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
||||||
advisory-db = {
|
|
||||||
flake = false;
|
|
||||||
url = "github:rustsec/advisory-db";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = {
|
outputs = {
|
||||||
|
|
@ -16,119 +12,13 @@
|
||||||
fenix,
|
fenix,
|
||||||
flake-utils,
|
flake-utils,
|
||||||
nixpkgs,
|
nixpkgs,
|
||||||
advisory-db,
|
|
||||||
}:
|
}:
|
||||||
flake-utils.lib.eachDefaultSystem (system: let
|
flake-utils.lib.eachDefaultSystem (system: let
|
||||||
pkgs = nixpkgs.legacyPackages.${system};
|
pkgs = nixpkgs.legacyPackages.${system};
|
||||||
fenixPkgs = fenix.packages.${system};
|
fenixPkgs = fenix.packages.${system};
|
||||||
craneLib = crane.mkLib pkgs;
|
craneLib = crane.mkLib pkgs;
|
||||||
src = craneLib.path ./.;
|
|
||||||
|
|
||||||
# Common arguments can be set here to avoid repeating them later
|
|
||||||
commonArgs = with pkgs; {
|
|
||||||
inherit src;
|
|
||||||
strictDeps = true;
|
|
||||||
buildInputs =
|
|
||||||
[
|
|
||||||
# Add additional build inputs here
|
|
||||||
]
|
|
||||||
++ lib.optionals stdenv.isDarwin [
|
|
||||||
# Additional darwin specific inputs can be set here
|
|
||||||
libiconv
|
|
||||||
];
|
|
||||||
|
|
||||||
# Additional environment variables can be set directly
|
|
||||||
# MY_CUSTOM_VAR = "some value";
|
|
||||||
};
|
|
||||||
|
|
||||||
craneLibLLvmTools =
|
|
||||||
craneLib.overrideToolchain
|
|
||||||
(fenixPkgs.complete.withComponents [
|
|
||||||
"cargo"
|
|
||||||
"llvm-tools"
|
|
||||||
"rustc"
|
|
||||||
]);
|
|
||||||
|
|
||||||
# Build *just* the cargo dependencies, so we can reuse
|
|
||||||
# all of that work (e.g. via cachix) when running in CI
|
|
||||||
cargoArtifacts = craneLib.buildDepsOnly commonArgs;
|
|
||||||
|
|
||||||
# Build the actual crate itself, reusing the dependency
|
|
||||||
# artifacts from above.
|
|
||||||
crate = craneLib.buildPackage (commonArgs
|
|
||||||
// {
|
|
||||||
inherit cargoArtifacts;
|
|
||||||
});
|
|
||||||
in {
|
in {
|
||||||
checks = {
|
|
||||||
# Build the crate as part of `nix flake check` for convenience
|
|
||||||
inherit crate;
|
|
||||||
|
|
||||||
# Run clippy (and deny all warnings) on the crate source,
|
|
||||||
# again, resuing the dependency artifacts from above.
|
|
||||||
#
|
|
||||||
# Note that this is done as a separate derivation so that
|
|
||||||
# we can block the CI if there are issues here, but not
|
|
||||||
# prevent downstream consumers from building our crate by itself.
|
|
||||||
clippy = craneLib.cargoClippy (commonArgs
|
|
||||||
// {
|
|
||||||
inherit cargoArtifacts;
|
|
||||||
cargoClippyExtraArgs = "--all-targets -- --deny warnings";
|
|
||||||
});
|
|
||||||
|
|
||||||
doc = craneLib.cargoDoc (commonArgs
|
|
||||||
// {
|
|
||||||
inherit cargoArtifacts;
|
|
||||||
});
|
|
||||||
|
|
||||||
# Check formatting
|
|
||||||
fmt = craneLib.cargoFmt {
|
|
||||||
inherit src;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Audit dependencies
|
|
||||||
audit = craneLib.cargoAudit {
|
|
||||||
inherit src advisory-db;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Audit licenses
|
|
||||||
deny = craneLib.cargoDeny {
|
|
||||||
inherit src;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Run tests with cargo-nextest
|
|
||||||
# Consider setting `doCheck = false` on `my-crate` if you do not want
|
|
||||||
# the tests to run twice
|
|
||||||
nextest = craneLib.cargoNextest (commonArgs
|
|
||||||
// {
|
|
||||||
inherit cargoArtifacts;
|
|
||||||
partitions = 1;
|
|
||||||
partitionType = "count";
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
packages =
|
|
||||||
{
|
|
||||||
default = crate;
|
|
||||||
}
|
|
||||||
// pkgs.lib.optionalAttrs (!pkgs.stdenv.isDarwin) {
|
|
||||||
my-crate-llvm-coverage = craneLibLLvmTools.cargoLlvmCov (commonArgs
|
|
||||||
// {
|
|
||||||
inherit cargoArtifacts;
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
apps.default = flake-utils.lib.mkApp {
|
|
||||||
drv = crate;
|
|
||||||
};
|
|
||||||
|
|
||||||
devShells.default = craneLib.devShell {
|
devShells.default = craneLib.devShell {
|
||||||
# Inherit inputs from checks.
|
|
||||||
# Enable after Cargo.toml and Cargo.lock are present
|
|
||||||
# Consider customizing deny.toml
|
|
||||||
# checks = self.checks.${system};
|
|
||||||
|
|
||||||
# Extra inputs can be added here; cargo and rustc are provided by default
|
|
||||||
packages = [
|
packages = [
|
||||||
fenixPkgs.rust-analyzer
|
fenixPkgs.rust-analyzer
|
||||||
];
|
];
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue