forked from oasisprotocol/cipher-paratime
-
Notifications
You must be signed in to change notification settings - Fork 0
/
flake.nix
158 lines (136 loc) · 4.84 KB
/
flake.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
{
description = "Oasis Network Cipher ParaTime";
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixpkgs-unstable";
flake-utils.url = "github:numtide/flake-utils";
rust-overlay = {
url = "github:oxalica/rust-overlay";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "nixpkgs";
};
fortanix-sgx-tools = {
url = "github:sbellem/fortanix-sgx-tools";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "nixpkgs";
inputs.rust-overlay.follows = "rust-overlay";
};
sgxs-tools = {
url = "github:sbellem/sgxs-tools";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "nixpkgs";
inputs.rust-overlay.follows = "rust-overlay";
};
oasis-core-tools = {
url = "github:sbellem/oasis-core/nix";
inputs.flake-utils.follows = "flake-utils";
inputs.nixpkgs.follows = "nixpkgs";
inputs.rust-overlay.follows = "rust-overlay";
};
};
outputs = {
self,
nixpkgs,
rust-overlay,
flake-utils,
fortanix-sgx-tools,
oasis-core-tools,
sgxs-tools,
}:
flake-utils.lib.eachSystem ["x86_64-linux"] (
system: let
overlays = [(import rust-overlay)];
pkgs = import nixpkgs {
inherit system overlays;
};
pname = "cipher-paratime";
version = "2.0.1-alpha1";
src = builtins.path {
path = ./.;
name = "${pname}-${version}";
};
cargoSha256 = "sha256-r3GpzZ/G+yLxJFcAFjIfFv6sENxlIVf5UQz/AXJ8y8Y=";
LIBCLANG_PATH = "${pkgs.llvmPackages_11.libclang.lib}/lib";
rust_toolchain = pkgs.rust-bin.fromRustupToolchainFile ./rust-toolchain;
_nativeBuildInputs = with pkgs; [
clang_11
fortanix-sgx-tools.defaultPackage.${system}
llvmPackages_11.libclang.lib
oasis-core-tools.defaultPackage.${system}
];
in
with pkgs; {
packages.nosgx = rustPlatform.buildRustPackage rec {
inherit pname version src cargoSha256 LIBCLANG_PATH rust_toolchain _nativeBuildInputs;
nativeBuildInputs = _nativeBuildInputs ++ [rust_toolchain];
};
packages.sgx = rustPlatform.buildRustPackage rec {
inherit pname version src cargoSha256 LIBCLANG_PATH rust_toolchain _nativeBuildInputs;
nativeBuildInputs =
_nativeBuildInputs
++ [
(rust_toolchain.override {
targets = ["x86_64-fortanix-unknown-sgx"];
})
];
# TODO: Make sure it's ok to drop "-isystem/usr/include/x86_64-linux-gnu"
#
# See nixpkgs manual sect 6.8
#
# 6.8. Purity in Nixpkgs
# Measures taken to prevent dependencies on packages outside the
# store, and what you can do to prevent them.
#
# GCC doesn’t search in locations such as /usr/include. In fact,
# attempts to add such directories through the -I flag are
# filtered out. Likewise, the linker (from GNU binutils) doesn’t
# search in standard locations such as /usr/lib. Programs built on
# Linux are linked against a GNU C Library that likewise doesn’t
# search in the default system locations.
CFLAGS_X86_64_FORTANIX_UNKNOWN_SGX = "-mlvi-hardening -mllvm -x86-experimental-lvi-inline-asm-hardening";
CC_X86_64_FORTANIX_UNKNOWN_SGX = clang_11;
buildPhase = ''
runHook preBuild
cargo build --release --target x86_64-fortanix-unknown-sgx
runHook postBuild
'';
postBuild = ''
cargo elf2sgxs --release
'';
installPhase = ''
runHook preInstall
mkdir -p $out/bin
cp target/x86_64-fortanix-unknown-sgx/release/cipher-paratime.sgxs $out/bin/
runHook postInstall
'';
};
defaultPackage = self.packages.${system}.nosgx;
devShell = mkShell {
inherit LIBCLANG_PATH rust_toolchain _nativeBuildInputs;
buildInputs =
_nativeBuildInputs
++ [
exa
fd
gcc
gcc_multi
libseccomp
openssl
pkg-config
protobuf
(rust_toolchain.override {
targets = ["x86_64-fortanix-unknown-sgx"];
})
sgxs-tools.defaultPackage.${system}
unixtools.whereis
which
b2sum
];
shellHook = ''
alias ls=exa
alias find=fd
export RUST_BACKTRACE=1
'';
};
}
);
}