Nix binary cache implemented in rust (maintainer: @Mic92)
  • Rust 96.2%
  • Nix 2.5%
  • HTML 0.6%
  • Dafny 0.5%
  • Shell 0.2%
Find a file
Jörg Thalheim 76dfd8bf99
Merge pull request #1009 from nix-community/more-changelog
Added more change log entries to `harmonia-store-core`
2026-04-28 11:48:07 +00:00
.cargo build: keep frame pointers in cargo builds 2026-04-19 17:17:23 +02:00
.github drop update-flake-lock in favour of dependabot 2026-04-18 13:38:55 +02:00
docs/architecture docs: cleanup architecture 2026-04-18 13:44:10 +02:00
harmonia-bench harmonia-bench: add narinfo latency benchmark 2026-04-20 09:37:51 +02:00
harmonia-cache harmonia-cache: send sd_notify READY=1 and WATCHDOG=1 2026-04-26 22:55:05 +02:00
harmonia-client Format TOML files with taplio 2026-03-29 12:57:18 -04:00
harmonia-daemon daemon: propagate has_ca_schema errors instead of treating as miss 2026-04-18 15:02:29 +02:00
harmonia-nar harmonia-nar: bound name/symlink/depth in NAR parser 2026-04-26 19:54:06 +02:00
harmonia-protocol Revert "Revert main-only changes to align with nix-2.34" 2026-04-27 17:03:57 -04:00
harmonia-protocol-derive Format TOML files with taplio 2026-03-29 12:57:18 -04:00
harmonia-ssh-store Format TOML files with taplio 2026-03-29 12:57:18 -04:00
harmonia-store-aterm harmonia-store-core,aterm: drop unused dependencies 2026-04-18 11:50:46 +02:00
harmonia-store-core Added more change log entries to harmonia-store-core 2026-04-27 17:07:54 -04:00
harmonia-store-db harmonia-cache: read store metadata from db.sqlite directly 2026-04-20 09:37:51 +02:00
harmonia-store-remote Merge pull request #977 from nix-community/no-ring 2026-04-18 13:19:24 +00:00
harmonia-utils-base-encoding cargo: hoist shared dependencies to workspace.dependencies 2026-04-18 12:51:07 +02:00
harmonia-utils-hash cargo: hoist shared dependencies to workspace.dependencies 2026-04-18 12:51:07 +02:00
harmonia-utils-io utils-io: drop noisy "buffer is still shared" warning 2026-04-26 18:15:25 +02:00
harmonia-utils-test Factor out read_upstream_json 2026-04-27 16:30:48 -04:00
nix harmonia-cache: send sd_notify READY=1 and WATCHDOG=1 2026-04-26 22:55:05 +02:00
scripts create-release: use cargo update instead of cargo build 2026-02-08 19:29:22 +01:00
tests flake: drop flake-parts and gather nix files under nix/ 2026-04-18 13:58:37 +02:00
.envrc add envrc 2023-01-28 11:43:42 +01:00
.gitignore redo frontend with tailwind 2025-07-26 15:21:48 +02:00
.taplo.toml Format TOML files with taplio 2026-03-29 12:57:18 -04:00
Cargo.lock bump version harmonia-v3.1.0 2026-04-27 18:13:03 +02:00
Cargo.toml bump version harmonia-v3.1.0 2026-04-27 18:13:03 +02:00
codecov.yml codecov: move comment 2025-11-29 22:39:57 +01:00
config.vcl get rid of libnixstore 2024-11-25 11:50:48 +01:00
CONTRIBUTING.md flake: move clippy from packages to checks 2026-04-18 14:04:40 +02:00
flake.lock Merge pull request #995 from nix-community/dependabot/nix/crane-60c8293 2026-04-26 16:33:55 +00:00
flake.nix Add /build-trace-v2 endpoint for content-addressed derivations 2026-04-18 14:55:41 +02:00
harmonia.toml get rid of libnixstore 2024-11-25 11:50:48 +01:00
LICENSE Add code from Nix Ninja 2025-11-27 12:04:23 -05:00
README.md harmonia-cache: read store metadata from db.sqlite directly 2026-04-20 09:37:51 +02:00

harmonia

Harmonia is a binary cache for nix that serves your /nix/store as a binary cache over http. It's written in Rust for speed.

Features

  • http-ranges support for nar file streaming
  • streaming build logs
  • .ls file streaming
    • Note: doesn't contain narOffset in json response but isn't needed for nix-index
  • Add /serve/<narhash>/ endpoint to allow serving the content of package. Also discovers index.html to allow serving websites directly from the nix store.
  • Content is compressed transparently with zstd.
  • Builtin TLS: when no frontend webserver is used, Harmonia can also provide TLS encryption

Configuration for public binary cache on NixOS

Using NixOS stable (from nixpkgs)

There is a module for harmonia in nixpkgs. The following example set's up harmonia as a public binary cache using nginx as a frontend webserver with https encryption:

{ config, pkgs, ... }: {
  services.harmonia.enable = true;
  # FIXME: generate a public/private key pair like this:
  # $ nix-store --generate-binary-cache-key cache.yourdomain.tld-1 /var/lib/secrets/harmonia.secret /var/lib/secrets/harmonia.pub
  services.harmonia.signKeyPaths = [ "/var/lib/secrets/harmonia.secret" ];
  # Example using sops-nix to store the signing key
  #services.harmonia.signKeyPaths = [ config.sops.secrets.harmonia-key.path ];
  #sops.secrets.harmonia-key = { };

  # optional if you use allowed-users in other places
  #nix.settings.allowed-users = [ "harmonia" ];

  networking.firewall.allowedTCPPorts = [ 443 80 ];

  # FIXME: replace this with your own email
  security.acme.defaults.email = "yourname@youremail.com";
  security.acme.acceptTerms = true;

  services.nginx = {
    enable = true;
    recommendedTlsSettings = true;
    # FIXME: replace "cache.yourdomain.tld" with your own domain.
    virtualHosts."cache.yourdomain.tld" = {
      enableACME = true;
      forceSSL = true;

      locations."/".extraConfig = ''
        proxy_pass http://127.0.0.1:5000;
        proxy_set_header Host $host;
        proxy_redirect http:// https://;
        proxy_http_version 1.1;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        proxy_set_header Upgrade $http_upgrade;
        proxy_set_header Connection $connection_upgrade;
      '';
    };
  };
}

Using the flake version (latest features)

To use the latest version with all features, import the harmonia flake:

# flake.nix
{
  inputs.harmonia.url = "github:nix-community/harmonia";
  # ... other inputs
}

# configuration.nix
{ inputs, config, pkgs, ... }: {
  imports = [ inputs.harmonia.nixosModules.harmonia ];

  services.harmonia-dev.cache.enable = true;
  # FIXME: generate a public/private key pair like this:
  # $ nix-store --generate-binary-cache-key cache.yourdomain.tld-1 /var/lib/secrets/harmonia.secret /var/lib/secrets/harmonia.pub
  services.harmonia-dev.cache.signKeyPaths = [ "/var/lib/secrets/harmonia.secret" ];

  # All other nginx configuration remains the same as above
  networking.firewall.allowedTCPPorts = [ 443 80 ];

  services.nginx = {
    enable = true;
    recommendedTlsSettings = true;
    virtualHosts."cache.yourdomain.tld" = {
      enableACME = true;
      forceSSL = true;
      locations."/".extraConfig = ''
        proxy_pass http://127.0.0.1:5000;
        proxy_set_header Host $host;
        proxy_redirect http:// https://;
        proxy_http_version 1.1;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        proxy_set_header Upgrade $http_upgrade;
        proxy_set_header Connection $connection_upgrade;
      '';
    };
  };
}

You can use the binary cache on a different machine using the following NixOS configuration:

{
  nix.settings = {
    substituters = [ "https://cache.yourdomain.tld" ];
    # FIXME replace the key with the content of /var/lib/secrets/harmonia.pub
    trusted-public-keys = [ "cache.yourdomain.tld-1:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=" ];
  };
}

Configuration format

Configuration is done via a toml file. Hint: You don't need to interface with the configuration directly in case you are using the NixOS module. The location of the configuration file should be passed as env var CONFIG_FILE. If no config file is passed the following default values will be used:

# default ip:hostname to bind to
bind = "[::]:5000"
# unix socket are also supported
# bind = "unix:/run/harmonia/socket"
# Sets number of workers to start in the webserver
workers = 4
# Sets the per-worker maximum number of concurrent connections.
max_connection_rate = 256
# binary cache priority that is advertised in /nix-cache-info
priority = 30
# Whether to enable transparent compression with zstd.
# Note that this is incompatible with resuming, so don't enable this
# if any of your users are on a flaky connection.
# Default: false
enable_compression = true

# Allow to override the store path advertised in /nix-cache-info
# virtual_nix_store = "/nix/store"
# Allow to serve the nix store from a different physical location
# Default: empty
# Example: if you use `nix copy --store /guest` to populate a store than configure:
# real_nix_store = "/guest/nix/store"

# Path to the nix SQLite database. Harmonia reads store metadata directly from
# this file (no nix-daemon connection is used). Derived from the store layout
# by default; override only for non-standard state directories.
# nix_db_path = "/nix/var/nix/db/db.sqlite"

Per default we wont sign any narinfo because we don't have a secret key, to enable this feature enable it by providing a path to a private key generated by nix-store --generate-binary-cache-key cache.example.com-1 /etc/nix/cache.secret /etc/nix/cache.pub

# nix binary cache signing key
sign_key_paths = [ "/run/secrets/cache.secret" ]

Harmonia also reads the SIGN_KEY_PATHS environment variable which holds paths to secret keys separated by spaces. All paths provided by sign_key_paths config option and SIGN_KEY_PATHS environment variable will be used for signing.

TLS Configuration

Harmonia can serve content over HTTPS without requiring a reverse proxy. To enable TLS, specify the paths to your certificate and private key files in the configuration:

# Path to TLS certificate (PEM format)
tls_cert_path = "/path/to/cert.pem"
# Path to TLS private key (PEM format)
tls_key_path = "/path/to/key.pem"

Requirements for TLS certificates:

  • Certificate must be in PEM format
  • Certificate must be X.509 v3 (rustls does not support older versions)
  • Private key can be in either PKCS#8 or RSA format
  • Both files must be readable by the harmonia process

Example generating a self-signed certificate for testing:

openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365 -nodes \
  -subj "/C=US/ST=State/O=Organization/CN=cache.example.com"

Note: When TLS is enabled, harmonia will only accept HTTPS connections on the configured port.

Logging Configuration

Logging is handled by tracing and configured via the RUST_LOG environment variable using EnvFilter syntax (compatible with the familiar env_logger directives). The default filter is info. To only log errors use RUST_LOG=error, and to keep info messages while disabling actix access logging use RUST_LOG=info,actix_web::middleware=error.

Build

Whole application

nix build -L

Get a development environment:

nix develop

Run tests

nix flake check -L

Prometheus Monitoring

Harmonia exposes Prometheus metrics at the /metrics endpoint for monitoring and observability.

Available Metrics

HTTP Request Metrics:

  • harmonia_http_requests_total - Total number of HTTP requests (labeled by method, path, and status code)
  • harmonia_http_request_duration_seconds - Request latency histogram with buckets ranging from 0.0001s to 1.0s

Grafana Dashboard

A pre-configured Grafana dashboard is available in the repository at harmonia-cache/harmonia-grafana-dashboard.json. This dashboard visualizes:

  • Request rate and latency patterns
  • HTTP status code distribution
  • Error rates and performance trends

You can import this dashboard into your Grafana instance to monitor your Harmonia deployment.

Example Prometheus Configuration

To scrape metrics from Harmonia, add the following to your Prometheus configuration:

scrape_configs:
  - job_name: 'harmonia'
    static_configs:
      - targets: ['your-harmonia-host:5000']

Contributing

See CONTRIBUTING.md for development setup, testing, and code style guidelines. For architecture details, see docs/architecture.

Inspiration