1
0
Fork 0
mirror of https://github.com/cachix/cachix-action.git synced 2025-06-08 07:07:00 +09:00
Build software only once and put it in a global cache https://cachix.org
Find a file
2022-10-12 14:25:49 +01:00
.github bump install-nix-action 2022-10-12 14:25:49 +01:00
dist/main Allow installing cachix globally for self-hosted runners 2022-10-11 16:15:36 +01:00
src Allow installing cachix globally for self-hosted runners 2022-10-11 16:15:36 +01:00
.gitignore bundle all the dependencies 2020-04-10 14:55:10 +02:00
action.yml feat: support node.js 16 2022-10-07 21:51:36 +02:00
jest.config.js Initial commit 2019-09-30 15:32:36 +02:00
LICENSE Split Nix installation into separate action 2019-10-02 16:25:24 +02:00
package.json Allow installing cachix globally for self-hosted runners 2022-10-11 16:15:36 +01:00
README.md README: clarify on security 2020-07-29 11:59:30 +02:00
shell.nix add shell.nix for development 2020-04-16 05:18:25 +01:00
test-with-arg.nix Add nixBuildArgs parameter 2020-02-27 16:46:25 +01:00
test.nix install-nix-action v11 2020-09-21 16:58:28 +02:00
tsconfig.json Initial commit 2019-09-30 15:32:36 +02:00
yarn.lock Allow installing cachix globally for self-hosted runners 2022-10-11 16:15:36 +01:00

cachix-action

github actions badge

One nice benefit of Nix is that CI can build and cache developer environments for every project on every branch using binary caches.

Another important aspect of CI is the feedback loop of how many minutes does the build take to finish.

With a simple configuration using Cachix, youll never have to build any derivation twice and share them with all your developers.

After each job, just built derivations are pushed to your binary cache.

Before each job, derivations to be built are first substituted (if they exist) from your binary cache.

Getting started

Follow Continuous Integration with GitHub Actions tutorial.

See action.yml for all options.

Security

Cachix auth token and signing key need special care as they give read and write access to your caches.

As per GitHub Actions' security model:

Anyone with write access to a repository can create, read, and use secrets.

Which means all developers with write/push access can read your secrets and write to your cache.

Pull requests do not have access to secrets so read access to a public binary cache will work, but pushing will be disabled since there is no signing key.

Note that malicious code submitted via a pull request can, once merged into master, reveal the tokens.

Hacking

Install the dependencies

$ yarn install

Build the typescript

$ yarn build

Run the tests ✔️

$ yarn test