Allow the fetcher to authenticate with user name and password. Note: as of now, GitLab ignores the user name (it must be set, but the value does not matter) but this may change in the future: https://gitlab.com/gitlab-org/gitlab/-/issues/212953 Credentials can be passed to the nix-daemon, for example, via a read-protected `EnvironmentFile`: ```console $ ls -l /to/secrets.txt -rw------- 1 root root 100 Nov 1 10:42 /to/secrets.txt ``` In /to/secrets.txt: ``` # for `fetchFromGitLab { private=true; ... }` NIX_GITLAB_PRIVATE_USERNAME=whatever NIX_GITLAB_PRIVATE_PASSWORD=glpat-the-access-token # for `fetchFromGitLab { private=true; varPrefix="EXAMPLE"; ... }` NIX_EXAMPLE_GITLAB_PRIVATE_USERNAME=whatever NIX_EXAMPLE_GITLAB_PRIVATE_PASSWORD=glpat-another-access-token ``` In /etc/nixos/configuration.nix: ```nix { config, pkgs, ... }: { systemd.services.nix-daemon.serviceConfig.EnvironmentFile = "/to/secrets.txt"; } ``` GitLab supports HTTP Basic Authentication (credentials in `.netrc` file) only if accessed via Git. Access via the GitLab API requires a custom header (e.g. `PRIVATE-TOKEN`) instead. See: * https://docs.gitlab.com/ee/user/project/settings/project_access_tokens.html#project-access-tokens * https://docs.gitlab.com/ee/api/rest/authentication.html#personalprojectgroup-access-tokens
150 lines
3.9 KiB
Nix
150 lines
3.9 KiB
Nix
{
|
|
lib,
|
|
repoRevToNameMaybe,
|
|
fetchgit,
|
|
fetchzip,
|
|
}:
|
|
|
|
lib.makeOverridable (
|
|
# gitlab example
|
|
{
|
|
owner,
|
|
repo,
|
|
rev ? null,
|
|
tag ? null,
|
|
name ? repoRevToNameMaybe repo (lib.revOrTag rev tag) "gitlab",
|
|
protocol ? "https",
|
|
domain ? "gitlab.com",
|
|
group ? null,
|
|
fetchSubmodules ? false,
|
|
leaveDotGit ? false,
|
|
deepClone ? false,
|
|
forceFetchGit ? false,
|
|
sparseCheckout ? [ ],
|
|
private ? false,
|
|
varPrefix ? null,
|
|
... # For hash agility
|
|
}@args:
|
|
|
|
assert (
|
|
lib.assertMsg (lib.xor (tag == null) (
|
|
rev == null
|
|
)) "fetchFromGitLab requires one of either `rev` or `tag` to be provided (not both)."
|
|
);
|
|
|
|
let
|
|
slug = lib.concatStringsSep "/" (
|
|
(lib.optional (group != null) group)
|
|
++ [
|
|
owner
|
|
repo
|
|
]
|
|
);
|
|
revWithTag = if tag != null then "refs/tags/" + tag else rev;
|
|
escapedSlug = lib.replaceStrings [ "." "/" ] [ "%2E" "%2F" ] slug;
|
|
escapedRevWithTag = lib.replaceStrings [ "+" "%" "/" ] [ "%2B" "%25" "%2F" ] revWithTag;
|
|
passthruAttrs = removeAttrs args [
|
|
"protocol"
|
|
"domain"
|
|
"owner"
|
|
"group"
|
|
"repo"
|
|
"rev"
|
|
"tag"
|
|
"fetchSubmodules"
|
|
"forceFetchGit"
|
|
"private"
|
|
"varPrefix"
|
|
"leaveDotGit"
|
|
"deepClone"
|
|
];
|
|
|
|
varBase = "NIX${lib.optionalString (varPrefix != null) "_${varPrefix}"}_GITLAB_PRIVATE_";
|
|
useFetchGit =
|
|
fetchSubmodules || leaveDotGit || deepClone || forceFetchGit || (sparseCheckout != [ ]);
|
|
fetcher = if useFetchGit then fetchgit else fetchzip;
|
|
|
|
privateAttrs = lib.optionalAttrs private (
|
|
lib.throwIfNot (protocol == "https") "private token login is only supported for https" {
|
|
netrcPhase = ''
|
|
if [ -z "''$${varBase}USERNAME" -o -z "''$${varBase}PASSWORD" ]; then
|
|
echo "Error: Private fetchFromGitLab requires the nix building process (nix-daemon in multi user mode) to have the ${varBase}USERNAME and ${varBase}PASSWORD env vars set." >&2
|
|
exit 1
|
|
fi
|
|
''
|
|
+ (
|
|
if useFetchGit then
|
|
# GitLab supports HTTP Basic Authentication only when Git is used:
|
|
# https://docs.gitlab.com/ee/user/project/settings/project_access_tokens.html#project-access-tokens
|
|
''
|
|
cat > netrc <<EOF
|
|
machine ${domain}
|
|
login ''$${varBase}USERNAME
|
|
password ''$${varBase}PASSWORD
|
|
EOF
|
|
''
|
|
else
|
|
# Access via the GitLab API requires a custom header and does not work
|
|
# with HTTP Basic Authentication:
|
|
# https://docs.gitlab.com/ee/api/#personalprojectgroup-access-tokens
|
|
''
|
|
# needed because fetchurl always sets --netrc-file if a netrcPhase is present
|
|
touch netrc
|
|
|
|
cat > private-token <<EOF
|
|
PRIVATE-TOKEN: ''$${varBase}PASSWORD
|
|
EOF
|
|
curlOpts="$curlOpts --header @./private-token"
|
|
''
|
|
);
|
|
netrcImpureEnvVars = [
|
|
"${varBase}USERNAME"
|
|
"${varBase}PASSWORD"
|
|
];
|
|
}
|
|
);
|
|
|
|
gitRepoUrl = "${protocol}://${domain}/${slug}.git";
|
|
|
|
fetcherArgs =
|
|
(
|
|
if useFetchGit then
|
|
{
|
|
inherit
|
|
rev
|
|
deepClone
|
|
tag
|
|
fetchSubmodules
|
|
sparseCheckout
|
|
leaveDotGit
|
|
;
|
|
url = gitRepoUrl;
|
|
}
|
|
else
|
|
{
|
|
url = "${protocol}://${domain}/api/v4/projects/${escapedSlug}/repository/archive.tar.gz?sha=${escapedRevWithTag}";
|
|
|
|
passthru = {
|
|
inherit gitRepoUrl;
|
|
};
|
|
}
|
|
)
|
|
// privateAttrs
|
|
// passthruAttrs
|
|
// {
|
|
inherit name;
|
|
};
|
|
in
|
|
|
|
fetcher fetcherArgs
|
|
// {
|
|
meta.homepage = "${protocol}://${domain}/${slug}/";
|
|
inherit
|
|
tag
|
|
owner
|
|
repo
|
|
;
|
|
rev = revWithTag;
|
|
}
|
|
)
|