• Stars
    star
    311
  • Rank 130,330 (Top 3 %)
  • Language
    Nix
  • License
    Apache License 2.0
  • Created about 5 years ago
  • Updated 3 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

rebuild only changed crates in CI with crate2nix and nix

crate2nix

crate2nix generates nix build files for rust crates using cargo.

tests-nix-linux tests-nix-macos Crate

Same dependency tree as cargo: It uses cargo_metadata to obtain the dependency tree from cargo. Therefore, it will use the exact same library versions as cargo and respect any locked down version in Cargo.lock.

Smart caching: It uses smart crate by crate caching so that nix rebuilds exactly the crates that need to be rebuilt. Compare that to docker layers...

Nix ecosystem goodness: You can use all things that make the nix/NixOS ecosystem great, e.g. distributed/remote builds, build minimal docker images, deploy your binary as a service to the cloud with NixOps, ...

Out of the box support for libraries with non-rust dependencies: It builds on top of the buildRustCrate function from NixOS so that native dependencies of many rust libraries are already correctly fetched when needed. If your library with native dependencies is not yet supported, you can customize defaultCrateOverrides / crateOverrides, see below.

Easy to understand nix template: The actual nix code is generated via templates/build.nix.tera so you can fix/improve the nix code without knowing rust if all the data is already there.

Optional Import From Derivation: Optional ability to generate the derived Cargo.nix during evaluation time so it does no need to be commited.

Here is a simple example which uses all the defaults and will generate a Cargo.nix file:

# From the project directory.
crate2nix generate

Here is a more elaborate example that uses <nixos-unstable> as the default pkgs path (instead of <nixpkgs>) and specifies both the path to the Cargo.toml file (-f) and the output (-o) file explicitly (usually not needed).

crate2nix generate \
    -n '<nixos-unstable>' \
    -f /some/project/dir/Cargo.toml \
    -o /some/project/dir/Cargo.nix

Use crate2nix help to show all commands and options.

Installation

If you are not running, install a recent version of nix by running curl https://nixos.org/nix/install | sh or following the instructions on https://nixos.org/nix/.

Then

# Install the stable version to your user env (with shell completions):
nix-env -i -f https://github.com/kolloch/crate2nix/tarball/0.10.0

NOTE: You can use eigenvalue.cachix.org to get prebuilt binaries for linux.

Development Version (master)

Similarly, you can install crate2nix by

# Install the unstable version to your user env (with shell completions):
nix-env -i -f https://github.com/kolloch/crate2nix/tarball/master

If you want to tweak crate2nix, clone the repository and then

cd crate2nix
# to run crate2nix without installing it
./crate2nix.sh
# or to install it in your user environment
nix-env -i -f .

Generating build files

The crate2nix generate command generates a nix file. You can specify the output file with -o. E.g.

crate2nix generate

generates Cargo.nix from the Cargo.lock in the current directory.

Look at the ./crate2nix/Cargo.nix file of this project for a non-trivial example. (How meta!)

Using build files (single binaries)

If your Cargo.nix was generated for a single binary crate (i.e. workspace) then the derivation that builds your binary can be accessed via the rootCrate.build attribute. Use this command to build it and make the result available in the result directory:

your_crate_name="super_duper"
nix build -f Cargo.nix rootCrate.build
./result/bin/${your_crate_name}

Within a nix file (e.g. your manually written default.nix), you can access the derivation like this:

let cargo_nix = callPackage ./Cargo.nix {};
in cargo_nix.rootCrate.build

Using build files (workspaces)

If your Cargo.nix was generated for a workspace (i.e. not a single binary) then the derivation that builds your binary CANNOT be accessed via the rootCrate attribute. There is no single root crate.

Instead, you can conveniently access the derivations of all your workspace members through the workspaceMembers attribute. Use this command to build one of the workspace members and make the result available in the result directory:

your_crate_name="super_duper"
nix build -f Cargo.nix workspaceMembers.${your_crate_name}.build
./result/bin/${your_crate_name}

Within a nix file (e.g. your manually written default.nix), you can access the derivation like this:

let cargo_nix = callPackage ./Cargo.nix {};
in cargo_nix.workspaceMembers."${your_crate_name}".build

Choosing a Rust Version

If you want to compile your code with a different rust version than is currently available in your nixpkgs, you can use the awesome overlays of the nixpkgs-mozilla.

For managing the git dependencies, I recommend niv. To create an initial "sources.nix" in the nix directory run:

niv init
niv add mozilla/nixpkgs-mozilla

Later on, you can update your dependencies with niv update.

To pin your nixpkgs with the appropriate overlays, place a nixpkgs.nix file into you nix directory that was created by niv (if necessary):

let
  # Manage this with https://github.com/nmattia/niv
  # or define { nixpkgs = ...; nixpkgs-mozilla = ...; }
  # yourself.
  sources = import ./sources.nix;

  rustChannelsOverlay = import "${sources.nixpkgs-mozilla}/rust-overlay.nix";
  # Useful if you also want to provide that in a nix-shell since some rust tools depend
  # on that.
  rustChannelsSrcOverlay = import "${sources.nixpkgs-mozilla}/rust-src-overlay.nix";

in import sources.nixpkgs {
    overlays = [
      rustChannelsOverlay
      rustChannelsSrcOverlay
      (self: super: {
        # Replace "latest.rustChannels.stable" with the version of the rust tools that
        # you would like. Look at the documentation of nixpkgs-mozilla for examples.
        #
        # NOTE: "rust" instead of "rustc" is not a typo: It will include more than needed
        # but also the much needed "rust-std".
        rustc = super.latest.rustChannels.stable.rust;
        inherit (super.latest.rustChannels.stable) cargo rust rust-fmt rust-std clippy;
      })
    ];
  }

In your default.nix or other nix files, you can use the following to refer to that pinned pkgs with the rust version of your choice:

{ pkgs ? import ./nix/nixpkgs.nix }:

let cargoNix = pkgs.callPackage ./Cargo.nix {};
in cargoNix.rootCrate.build

Dynamic feature resolution

The enabled features for a crate now are resolved at build time! That means you can easily override them:

  1. There is a "rootFeatures" argument to the generated build file which you can override when calling it from the command line:

    nix build -f ....nix --arg rootFeatures '["default" "other"]' rootCrate.build
  2. Or when importing the build file with "callPackage":

    let cargo_nix = callPackage ./Cargo.nix { rootFeatures = ["default" "other"]; };
        crate2nix = cargo_nix.rootCrate.build;
    in ...
  3. Or by overriding them on the rootCrate or workspaceMembers:

    let cargo_nix = callPackage ./Cargo.nix {};
        crate2nix = cargo_nix.rootCrate.build.override { features = ["default" "other"]; };
    in ...

Note that only dependencies for the default features are included in the build. If you want full flexibility, you can use crate2nix generate --all-features to generate the most general build file. If you want to strip down the generated build file, you may want to use crate2nix generate --no-default-features --features "feature1 feature2".

Patching crate derivations with crateOverrides

NixOS comes with defaultCrateOverrides which specifies mostly some additional native buildInputs for various popular crates. If you are using a rust crate with native dependencies which is not yet covered, you can add additional buildInputs with the crateOverride parameter (similar to features):

let
  customBuildRustCrateForPkgs = pkgs: pkgs.buildRustCrate.override {
    defaultCrateOverrides = pkgs.defaultCrateOverrides // {
      funky-things = attrs: {
        buildInputs = [ pkgs.openssl ];
      };
    };
  };
  generatedBuild = callPackage ./crate2nix/Cargo.nix {
    buildRustCrateForPkgs = customBuildRustCrateForPkgs;
  };
in generatedBuild.rootCrate.build

Or obviously you can use the power of nix to add a dependency conditionally:

let
  customBuildRustCrateForPkgs = pkgs: pkgs.buildRustCrate.override {
    defaultCrateOverrides = pkgs.defaultCrateOverrides // {
      cssparser-macros = attrs: {
        buildInputs =
          lib.optionals
            pkgs.stdenv.isDarwin
            [ pkgs.darwin.apple_sdk.frameworks.Security ];
      };
    };
  };
  generatedBuild = callPackage ./crate2nix/Cargo.nix {
    buildRustCrateForPkgs = customBuildRustCrateForPkgs;
  };
in generatedBuild.rootCrate.build

crateOverrides are not restricted to buildInputs however. You should also be able to add patches and the like! (I didn't try that, though.)

crateOverrides are a feature of the underlying buildRustCrate support in NixOS that crate2nix uses.

Running rust tests

There is some experimental support for running tests of your rust crates. All of the crates in the workspace will have their tests executed. When enabling test execution (runTests = true;), failing tests will make the whole build fail unless you explicitly disable this via test hooks: see the section below.

      let cargo_nix = callPackage ./Cargo.nix {};
          crate2nix = cargo_nix.rootCrate.build.override {
	    runTests = true;
	    testInputs = [ pkgs.cowsay ];
	  };
      in ...

testInputs is optional and allows passing inputs to the test execution that should be in scope. Defaults to an empty list and is ignored when runTests equals false.

Custom pre/post test hooks

Want to customize your test execution? Use the testPreRun and testPostRun crate attributes(next to runTests in the example above). crate2nix executes the bash snippets in testPreRun and testPostRun directly before and after the actual test command, and in the same shell. Some example use-cases include:

  • Setting some environment variable that is needed for the test.

  • Setting (and then unsetting) the bash set +e option to not fail the derivation build even if a test fails. This is quite useful if your tests are not flaky and you want to cache failures.

Import From Derivation

The tools.nix file contain the necessary code to generate the Cargo.nix file during evaluation time, which guarantee to always have Cargo.nix file up-to-date in regard to the Cargo.lock. The generated file is importable in Nix code, and can then be used like a normal Cargo.nix file. Note that this is not allowed in Nixpkgs, and it need at least Nix >= 2.5.

Internally, this work by reading the Cargo.lock file with Nix, using the locked version and hash present in it to fetch them without introducing impurities. The fetched dependancies are then used to generate a vendored folder, and the appropriate configuration is generated so that the depencies are fetched from here. crate2nix is then called in a derivation that will generate the Cargo.nix file offline, which can later be imported.

There are two commands in the tools.nix file:

  • generatedCargoNix will generate a folder containing a default.nix, to be used as a Cargo.nix file. The argument it takes are:
    • name: required. The name of the project (need to be a valid nix name identifier, so no space are allowed, but dash are.)
    • src: required. The folder that contain the root of the Rust project.
    • cargoToml: optional. The name and path relative to the src root of the Cargo.toml to use. Default to Cargo.toml.
    • additionalCargoNixArgs: optional, additional argument for crate2nix, in a list
  • appliedCargoNix take the same argument that generatedCargoNix, but also call the generated file with the pkgs provided when calling tools.nix

for example:

let
  crate2nix-tools = pkgs.callPackage "${crate2nix}/tools.nix" {};
  generated = crate2nix-tools.generatedCargoNix {
    name = "test-rust-project";
    src = ./.;
  };
  called = pkgs.callPackage "${generated}/default.nix" {};
in
  called.rootCrate.build

FAQ

Known Restrictions

crate2nix makes heavy use of buildRustCrate in nixpkgs. So we potentially depend on features in a recent version of nixpkgs. Check nix/sources.json for the version of nixpkgs that crate2nix is tested against.

If you feel limited by these restrictions, please do not hesitate to file an issue! That gives me a feeling of what is worth working on.

  • There is only experimental support for running tests Before 0.7.x: No support for building and running tests, see nixpkgs, issue 59177.
  • Target-specific features do not work automatically, see #129. You should be able to enable the required features manually, however.
  • A crate will only have access to its own source directory during build time and not e.g. to other directories in the same workspace. See crate2nix, issue 17. I used to consider this "works as intended" but now I think that we should use the "workspaceMember" argument of buildRustCrate for this.
  • It does translates target strings to nix expressions. The support should be reasonable but probably not complete - please let me know if you hit problems. Before 0.2.x: Filters all dependencies for the hard-coded "Linux x86_64" target platform. Again, it should be quite easy to support more platforms. To do so completely and at build time (vs build generation time) might be more involved.

Former restrictions, now supported:

  • Before 0.8.x: Since cargo exposes local paths in package IDs, the generated build file also contain them as part of an "opaque" ID. They are not interpreted as paths but maybe you do not want to expose local paths in there... The full opaque package ID will only be used if you have the same package with the same version multiple times. That should be very rare.
  • Before 0.6.x: Renamed crates with an explicit package name don't work yet.
  • Git sources are now also supported. Starting with 0.7 sub modules also work. Finding crates in arbitrary sub directories of git sources (which cargo supports!)is not supported, see #53.
  • Before 0.4.x: Only default crate features are supported. It should be easy to support a different feature set at build generation time since we can simply pass this set to cargo metadata. Feature selection during build time is out of scope for now.

Feedback: What is needed for a 1.0 release?

I would really appreciate your thoughts. Please add comments to issue #8.

Runtime Dependencies

crate2nix use cargo metadata / nix-prefetch-url at runtime so they need to be in the PATH. The default.nix adds the built-time nix/cargo binaries as fallback to the path.

Currently, crate2nix is only tested with nixpkgs-unstable since it depends on some new features and bug fixes.

Project Overview / Terminology

If you want to hack on this, it is useful to know that build file generation is broken up into multiple phases:

  1. cargo metadata: Calling cargo metadata via the cargo_metadata crate.
  2. indexing metadata: Indexing the metadata by package ID to enable easy joining of "Node" and "Package" information, resulting in metadata::IndexedMetadata.
  3. resolving: Using the indexed metadata to actually resolve the dependencies and join all needed build information into resolve::CrateDerivation.
  4. pre-fetching: Pre-fetching crates.io packages to determine their sha256, see prefetch module.
  5. rendering: Rendering the data via the build.nix.tera template, see render module.

Related Projects

  • carnix is already widely used in NixOS itself, yet it failed to generate correct builds for my rust projects. After some attempts to fix that, I gave up. That said, big kudos for all the work on buildRustCrate and showing the way!
  • naersk uses cargo to drive the entire build. It builds all dependencies in one derivation and the crate itself in another. Since it relies on hashes from the Cargo.lock file, I don't know how it handles git dependencies with sub modules.
  • tenx-tech/cargo2nix: I haven't used it so take it with a grain of salt but I think
    • it uses its own build logic instead of buildRustCrate but still builds each crate in its own derivation.
    • it has some support for cross building (which is quite weak in crate2nix).
  • cargo-raze generates BUILD files for bazel.

More Repositories

1

home-manager

Manage a user environment using Nix [maintainer=@rycee]
Nix
6,023
star
2

awesome-nix

😎 A curated list of the best resources in the Nix community [maintainer=@cyntheticfox]
2,546
star
3

nixos-generators

Collection of image builders [maintainer=@Lassulus]
Nix
1,338
star
4

NixOS-WSL

NixOS on WSL(2) [maintainer=@nzbr]
Nix
1,236
star
5

disko

Declarative disk partitioning and formatting using nix [maintainer=@Lassulus]
Nix
1,232
star
6

nix-direnv

A fast, persistent use_nix/use_flake implementation for direnv [maintainer=@Mic92 / @bbenne10]
Nix
1,170
star
7

nixvim

Configure Neovim with Nix! [maintainer=@pta2002, @traxys, @GaetanLepage]
Nix
1,060
star
8

nix-on-droid

Nix-enabled environment for your Android device. [maintainers=@t184256,@Gerschtli]
Nix
1,038
star
9

nixos-anywhere

install nixos everywhere via ssh [maintainer=@numtide]
Shell
1,029
star
10

NUR

Nix User Repository: User contributed nix packages [maintainer=@Mic92]
Python
882
star
11

impermanence

Modules to help you handle persistent state on systems with ephemeral root storage [maintainer=@talyz]
Nix
882
star
12

dream2nix

Simplified nix packaging for various programming language ecosystems [maintainer=@DavHau]
Nix
839
star
13

comma

Comma runs software without installing it. [maintainers=@Artturin,@burke,@DavHau]
Rust
831
star
14

rnix-lsp

WIP Language Server for Nix! [maintainer=@aaronjanse]
Rust
701
star
15

lanzaboote

Secure Boot for NixOS [maintainers=@blitz @raitobezarius @nikstur]
Rust
696
star
16

poetry2nix

Convert poetry projects to nix automagically [maintainer=@adisbladis]
Nix
693
star
17

nix-init

Generate Nix packages from URLs with hash prefetching, dependency inference, license detection, and more [maintainer=@figsoda]
Rust
692
star
18

nix-index

Quickly locate nix packages with specific files [maintainers=@bennofs @figsoda @raitobezarius]
Rust
681
star
19

naersk

Build Rust projects in Nix - no configuration, no code generation, no IFD, sandbox friendly.
Nix
643
star
20

nixd

Nix language server, based on nix libraries [maintainer=@inclyc]
C++
619
star
21

nixGL

A wrapper tool for nix OpenGL application [maintainer=@guibou]
Nix
611
star
22

lorri

Your project’s nix-env [maintainer=@Profpatsch,@nyarly]
Rust
576
star
23

robotnix

Build Android (AOSP) using Nix [maintainer=@danielfullmer,@Atemu]
Nix
558
star
24

fenix

Rust toolchains and rust-analyzer nightly for Nix [maintainer=@figsoda]
Nix
547
star
25

nixpkgs-fmt

Nix code formatter for nixpkgs [maintainer=@zimbatm]
Rust
503
star
26

nixpkgs-wayland

Automated, pre-built packages for Wayland (sway/wlroots) tools for NixOS. [maintainers=@colemickens, @Artturin]
Nix
467
star
27

emacs-overlay

Bleeding edge emacs overlay [maintainer=@adisbladis]
Nix
451
star
28

vulnix

Vulnerability (CVE) scanner for Nix/NixOS.
Python
378
star
29

nurl

Generate Nix fetcher calls from repository URLs [maintainer=@figsoda]
Rust
360
star
30

rnix-parser

A Nix parser written in Rust [maintainer=@oberblastmeister]
Nix
328
star
31

nixos-vscode-server

Visual Studio Code Server support in NixOS
Nix
316
star
32

terraform-nixos

A set of Terraform modules that are designed to deploy NixOS [maintainer=@adrian-gierakowski]
HCL
304
star
33

srvos

NixOS profiles for servers [maintainer=@numtide]
Nix
297
star
34

nixbox

NixOS Vagrant boxes [maintainer=@zimbatm]
HCL
276
star
35

neovim-nightly-overlay

[maintainer=@Kranzes]
Nix
267
star
36

vscode-nix-ide

Nix language support for VSCode editor [maintainer: @jnoortheen]
TypeScript
248
star
37

nix-user-chroot

Install & Run nix without root permissions [maintainer=@Mic92]
Rust
243
star
38

haumea

Filesystem-based module system for Nix [maintainer=@figsoda]
Nix
235
star
39

trustix

Trustix: Distributed trust and reproducibility tracking for binary caches [maintainer=@adisbladis]
Go
234
star
40

nix-zsh-completions

ZSH Completions for Nix
Shell
215
star
41

NixNG

A linux distribution based on Nix [maintainer=@MagicRB]
Nix
210
star
42

nix-index-database

Weekly updated nix-index database [maintainer=@Mic92]
Nix
205
star
43

noogle

https://noogle.dev - nix function exploring. [maintainer=@hsjobeki]
Nix
194
star
44

nix-melt

A ranger-like flake.lock viewer [maintainer=@figsoda]
Rust
190
star
45

pypi2nix

Abandoned! Generate Nix expressions for Python packages
Python
189
star
46

gomod2nix

Convert applications using Go modules to Nix expressions [maintainer=@adisbladis]
Nix
186
star
47

todomvc-nix

Example on how to nixify a project [maintainer=@Rizary]
Nix
160
star
48

flakelight

Framework for simplifying flake setup [maintainer=@accelbread]
Nix
159
star
49

nix-environments

Repository to maintain out-of-tree shell.nix files (maintainer=@mic92)
Nix
156
star
50

pip2nix

Freeze pip-installable packages into Nix expressions [maintainer=@datakurre]
Python
152
star
51

tree-sitter-nix

Nix grammar for tree-sitter [maintainer=@cstrahan]
JavaScript
148
star
52

docker-nixpkgs

docker images from nixpkgs [maintainer=@zimbatm]
Nix
137
star
53

linuxkit-nix

An easy to use Linux builder for macOS [maintainer=@nicknovitski]
Nix
133
star
54

nix-vscode-extensions

Nix expressions for VSCode and OpenVSX extensions [maintainers: @deemp, @AmeerTaweel]
Haskell
132
star
55

npmlock2nix

nixify npm based packages [maintainer=@andir]
Nix
125
star
56

yarn2nix

Generate nix expressions from a yarn.lock file [maintainer=???]
Nix
123
star
57

nixos-install-scripts

collection of one-shot scripts to install NixOS on various server hosters and other hardware. [maintainer=@happysalada]
Shell
122
star
58

nix-eval-jobs

Parallel nix evaluator with a streamable json output [maintainers @Mic92, @adisbladis]
C++
119
star
59

nixago

Generate configuration files using Nix [maintainer=@jmgilman]
Nix
118
star
60

nixdoc

Tool to generate documentation for Nix library functions [maintainer=@infinisil]
Nix
113
star
61

dns.nix

A Nix DSL for DNS zone files [maintainers=@raitobezarius @kirelagin @Tom-Hubrecht]
Nix
105
star
62

nix-unstable-installer

A place to host Nix unstable releases [maintainer=@lilyinstarlight]
Ruby
105
star
63

wiki

Nixos wiki [maintainer=@samueldr]
104
star
64

go-nix

Elements of Nix re-implemented as Go libraries [maintainer=@flokli]
Go
102
star
65

nixpkgs-lint

A fast semantic linter for Nix using tree-sitter 🌳 + ❄️. [maintainers=@Artturin,@siraben]
Rust
101
star
66

namaka

Snapshot testing for Nix based on haumea [maintainer=@figsoda]
Rust
96
star
67

nur-combined

A repository of NUR that combines all repositories [maintainer=@Mic92]
Nix
92
star
68

napalm

Support for building npm packages in Nix and lightweight npm registry [maintainer @jtojnar]
Nix
91
star
69

nixos-images

Automatically build (netboot) images for NixOS [maintainer=@Mic92]
Nix
90
star
70

nix-ld-rs

Run unpatched dynamic binaries on NixOS [maintainer=@zhaofengli @Mic92]
Rust
90
star
71

vgo2nix

Convert go.mod files to nixpkgs buildGoPackage compatible deps.nix files [maintainer=@adisbladis]
Nix
89
star
72

nixt

Simple unit-testing for Nix [maintainer=@Lord-Valen]
TypeScript
87
star
73

nur-packages-template

A template for NUR repositories: [maintainer=@fgaz]
Nix
84
star
74

pnpm2nix

Load pnpm lock files into nix :) [maintainer=@adisbladis]
Nix
82
star
75

mineflake

Declarative Minecraft server in NixOS [unmaintained]
Rust
75
star
76

infra

nix-community infrastructure [maintainer=@Mic92]
Nix
74
star
77

kde2nix

Provisional, experimental Plasma 6 (and friends) pre-release packaging [maintainer=@K900]
Nix
69
star
78

nix-data-science

Standard set of packages and overlays for data-scientists [maintainer=@tbenst]
Nix
69
star
79

pyproject.nix

A collection of Nix utilities to work with Python projects [maintainer=@adisbladis]
Nix
65
star
80

ethereum.nix

Nix packages and NixOS modules for the Ethereum ecosystem. [maintainers=@aldoborrero,@brianmcgee,@selfuryon]
Nix
65
star
81

setup.nix

Nixpkgs based build tools for declarative Python packages [maintainer=@datakurre]
Nix
64
star
82

nixpkgs.lib

nixpkgs lib for cheap instantiation [maintainer=@github-action] (with initial help from @blaggacao)
Nix
63
star
83

nix-installers

Nix installers for legacy distributions (rpm & deb & pacman) [maintainer=@adisbladis]
Nix
62
star
84

hydra-check

check hydra for the build status of a package [maintainer=@makefu,@Artturin]
Python
60
star
85

zon2nix

Convert the dependencies in `build.zig.zon` to a Nix expression [maintainer=@figsoda]
Zig
58
star
86

redoxpkgs

Cross-compile to Redox using Nix [maintainer=@aaronjanse]
Nix
51
star
87

nix-github-actions

A library to turn Nix Flake attribute sets into Github Actions matrices [maintainer=@adisbladis]
Nix
49
star
88

patsh

A command-line tool for patching shell scripts inspired by resholve [maintainer=@figsoda]
Rust
46
star
89

mavenix

Deterministic Maven builds using Nix [maintainer=@icetan]
Nix
45
star
90

nixpkgs-pytools

Tools for removing the tedious nature of creating nixpkgs derivations [maintainer=@costrouc]
Python
42
star
91

nix-unit

Unit testing for Nix code [maintainer=@adisbladis]
C++
41
star
92

docker-nix

Docker image for nix [maintainer=@zimbatm] [status=deprecated]
Dockerfile
38
star
93

nix-ts-mode

An Emacs major mode for editing Nix expressions, powered by tree-sitter.
Emacs Lisp
37
star
94

builtwithnix.org

Share the love of Nix [maintainer=@zimbatm]
HTML
37
star
95

nixpkgs-terraform-providers-bin

auto-updating terraform providers for nix [maintainer=@zimbatm]
Nix
35
star
96

nixops-libvirtd

NixOps libvirtd backend plugin [maintainer=@AmineChikhaoui]
Python
34
star
97

flake-nimble

Nimble packages Nix flake [maintainer=?]
Nix
33
star
98

authentik-nix

Nix flake with package, NixOS module and basic VM test for authentik. Trying to provide an alternative deployment mode to the officially supported docker-compose approach. Not affiliated with or officially supported by the authentik project [maintainer=@willibutz]
Nix
31
star
99

flake-firefox-nightly

this provides an auto-updating flake for firefox-nightly-bin from nixpkgs-mozilla [maintainer=@colemickens, @Artturin]
Nix
27
star
100

dreampkgs

A collection of software packages managed with dream2nix [maintainer=@DavHau]
Nix
26
star