• Stars
    star
    1,784
  • Rank 26,073 (Top 0.6 %)
  • Language
    Go
  • License
    Apache License 2.0
  • Created over 5 years ago
  • Updated 9 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Container registry which transparently builds images using the Nix package manager. Canonical repository is https://cs.tvl.fyi/depot/-/tree/tools/nixery

Build status

Nixery is a Docker-compatible container registry that is capable of transparently building and serving container images using Nix.

Images are built on-demand based on the image name. Every package that the user intends to include in the image is specified as a path component of the image name.

The path components refer to top-level keys in nixpkgs and are used to build a container image using a layering strategy that optimises for caching popular and/or large dependencies.

A public instance as well as additional documentation is available at nixery.dev.

You can watch the NixCon 2019 talk about Nixery for more information about the project and its use-cases.

The canonical location of the Nixery source code is //tools/nixery in the TVL monorepository. If cloning the entire repository is not desirable, the Nixery subtree can be cloned like this:

git clone https://code.tvl.fyi/depot.git:/tools/nixery.git

The subtree is infrequently mirrored to tazjin/nixery on Github.

Demo

Click the image to see an example in which an image containing an interactive shell and GNU hello is downloaded.

asciicast

To try it yourself, head to nixery.dev!

The special meta-package shell provides an image base with many core components (such as bash and coreutils) that users commonly expect in interactive images.

Feature overview

  • Serve container images on-demand using image names as content specifications

    Specify package names as path components and Nixery will create images, using the most efficient caching strategy it can to share data between different images.

  • Use private package sets from various sources

    In addition to building images from the publicly available Nix/NixOS channels, a private Nixery instance can be configured to serve images built from a package set hosted in a custom git repository or filesystem path.

    When using this feature with custom git repositories, Nixery will forward the specified image tags as git references.

    For example, if a company used a custom repository overlaying their packages on the Nix package set, images could be built from a git tag release-v2:

    docker pull nixery.thecompany.website/custom-service:release-v2

  • Efficient serving of image layers from Google Cloud Storage

    After building an image, Nixery stores all of its layers in a GCS bucket and forwards requests to retrieve layers to the bucket. This enables efficient serving of layers, as well as sharing of image layers between redundant instances.

Configuration

Nixery supports the following configuration options, provided via environment variables:

  • PORT: HTTP port on which Nixery should listen

  • NIXERY_CHANNEL: The name of a Nix/NixOS channel to use for building

  • NIXERY_PKGS_REPO: URL of a git repository containing a package set (uses locally configured SSH/git credentials)

  • NIXERY_PKGS_PATH: A local filesystem path containing a Nix package set to use for building

  • NIXERY_STORAGE_BACKEND: The type of backend storage to use, currently supported values are gcs (Google Cloud Storage) and filesystem.

    For each of these additional backend configuration is necessary, see the storage section for details.

  • NIX_TIMEOUT: Number of seconds that any Nix builder is allowed to run (defaults to 60)

  • NIX_POPULARITY_URL: URL to a file containing popularity data for the package set (see popcount/)

If the GOOGLE_APPLICATION_CREDENTIALS environment variable is set to a service account key, Nixery will also use this key to create [signed URLs][] for layers in the storage bucket. This makes it possible to serve layers from a bucket without having to make them publicly available.

In case the GOOGLE_APPLICATION_CREDENTIALS environment variable is not set, a redirect to storage.googleapis.com is issued, which means the underlying bucket objects need to be publicly accessible.

Storage

Nixery supports multiple different storage backends in which its build cache and image layers are kept, and from which they are served.

Currently the available storage backends are Google Cloud Storage and the local file system.

In the GCS case, images are served by redirecting clients to the storage bucket. Layers stored on the filesystem are served straight from the local disk.

These extra configuration variables must be set to configure storage backends:

  • GCS_BUCKET: Name of the Google Cloud Storage bucket to use (required for gcs)
  • GOOGLE_APPLICATION_CREDENTIALS: Path to a GCP service account JSON key (optional for gcs)
  • STORAGE_PATH: Path to a folder in which to store and from which to serve data (required for filesystem)

Background

The project started out inspired by the buildLayeredImage blog post with the intention of becoming a Kubernetes controller that can serve declarative image specifications specified in CRDs as container images. The design for this was outlined in a public gist.

Roadmap

Kubernetes integration

It should be trivial to deploy Nixery inside of a Kubernetes cluster with correct caching behaviour, addressing and so on.

See issue #4.

Nix-native builder

The image building and layering functionality of Nixery will be extracted into a separate Nix function, which will make it possible to build images directly in Nix builds.

More Repositories

1

nix-1p

A (more or less) one page introduction to Nix, the language.
Nix
895
star
2

kontemplate

Extremely simple Kubernetes resource templates | Source has moved to https://git.tazj.in/tree/ops/kontemplate
212
star
3

kubernetes-letsencrypt

A Kubernetes controller to retrieve Let's Encrypt certificates based on service annotations (unmaintained)
Kotlin
115
star
4

nixos-config

NixOS configuration for my machines. This repository is deprecated, config now lives at https://cs.tvl.fyi/depot/-/tree/users/tazjin/nixos
Nix
50
star
5

clojure-basics

A collection of interesting things for people who want to start learning Clojure.
45
star
6

yants

Yet Another Nix Type System | Source has moved to https://git.tazj.in/tree/nix/yants
36
star
7

democrify

A Mac application for democratic handling of music at parties, using libspotify.
Haskell
23
star
8

terraform-provider-keycloak

A Terraform provider to configure a Keycloak IDP
Go
20
star
9

alcoholic_jwt

Rust library for validation of RS256 JWTs. Source has moved to https://git.tazj.in/tree/net/alcoholic_jwt
Rust
18
star
10

converse

A simple forum software
Rust
16
star
11

elm-yesod

elm-yesod contains the Language.Elm.Yesod module for embedding Elm code in Yesod applications.
Haskell
15
star
12

watchblob

Connect to 2-factor WatchGuard VPNs on Linux with OpenVPN
Go
14
star
13

puppet-masterless

A simple skeleton/template for a masterless Puppet setup using systemd.
Puppet
13
star
14

depot

Personal monorepo, now at https://git.tazj.in
11
star
15

yubikey-fde

Full disk encryption with Yubikeys
Rust
11
star
16

coreos-ansible

An example CoreOS cluster deployment through Ansible
9
star
17

varnish-elb-systemd

Point Varnish dynamically at an AWS ELB, using bash and systemd
Shell
8
star
18

emacs.d

You are looking for https://cs.tvl.fyi/depot/-/tree/users/tazjin/emacs
Emacs Lisp
8
star
19

nixfd

`nix-env -qaP` getting on your nerves?
Rust
8
star
20

nixini

(WIP) NixOS + ChromeOS = πŸ’–
Nix
7
star
21

carnix

See nix-community/carnix instead!
6
star
22

buildGo.nix

Nix builder for Go software. Source has moved to https://git.tazj.in/tree/nix/buildGo
6
star
23

k8s-elk-demo

A simple demonstration of the ELK stack on a Kubernetes cluster
Nginx
5
star
24

journaldriver

journald -> Stackdriver Logging | Repository has moved to https://git.tazj.in/tree/ops/journaldriver
4
star
25

defer.rs

Go's defer keyword, in Rust.
3
star
26

quinistry

A Docker Registry Quine
Go
3
star
27

hs-pkpass

A Haskell library for creating and signing Passbook passes.
Haskell
3
star
28

crimp

Higher-level Rust API for cURL bindings. Source has moved to https://git.tazj.in/tree/net/crimp
Rust
2
star
29

pacman-osx

Pacman package manager on OS X
Shell
2
star
30

recovery

Instructions for myself for recovering my online identities
1
star
31

gemma

Simple tracking of recurring tasks
Common Lisp
1
star
32

pubkartet

A little service for pubs in Oslo
Haskell
1
star
33

tazjin

1
star
34

drifter-info

1
star
35

stomp.erl

An Erlang client for the STOMP protocol
Erlang
1
star
36

erlang-presentation

Erlang presentation at javaBin Oslo, 2016-09-22
Erlang
1
star
37

etcd-announcer

Tiny scratch-based Docker image for etcd service announcement
Go
1
star
38

herbert

A key signing server for cloud environments (pre-alpha)
Haskell
1
star