cachix-action
One nice benefit of Nix is that CI can build and cache developer environments for every project on every branch using binary caches.
Another important aspect of CI is the feedback loop of how many minutes does the build take to finish.
With a simple configuration using Cachix, you’ll never have to build any derivation twice and share them with all your developers.
After each job, just built derivations are pushed to your binary cache.
Before each job, derivations to be built are first substituted (if they exist) from your binary cache.
Getting started
Follow Continuous Integration with GitHub Actions tutorial.
See action.yml for all options.
Security
Cachix auth token and signing key need special care as they give read and write access to your caches.
As per GitHub Actions' security model:
Anyone with write access to a repository can create, read, and use secrets.
Which means all developers with write/push access can read your secrets and write to your cache.
Pull requests do not have access to secrets so read access to a public binary cache will work, but pushing will be disabled since there is no signing key.
Note that malicious code submitted via a pull request can, once merged into master
, reveal the tokens.
Hacking
Install the dependencies
$ yarn install
Build the typescript
$ yarn build
Run the tests
$ yarn test