Add nix-build host to flake and hosts registry

This commit is contained in:
polygon - 2022-01-08 01:27:39 +01:00
parent 6fb58846d9
commit 02886d74a2
4 changed files with 66 additions and 31 deletions

View File

@ -23,10 +23,7 @@
}, },
"fenix_2": { "fenix_2": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": "nixpkgs",
"heliwatch",
"nixpkgs"
],
"rust-analyzer-src": "rust-analyzer-src_2" "rust-analyzer-src": "rust-analyzer-src_2"
}, },
"locked": { "locked": {
@ -68,10 +65,7 @@
}, },
"naersk": { "naersk": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": "nixpkgs_2"
"heliwatch",
"nixpkgs"
]
}, },
"locked": { "locked": {
"lastModified": 1635444951, "lastModified": 1635444951,
@ -124,16 +118,16 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1641578038, "lastModified": 1641528457,
"narHash": "sha256-fE5tYnyxiAmgg4qJp7jcHxGcQIazhLY2AI89SInxOck=", "narHash": "sha256-FyU9E63n1W7Ql4pMnhW2/rO9OftWZ37pLppn/c1aisY=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d89eab1e42717622cfdd5f43f3b99e8680bdb637", "rev": "ff377a78794d412a35245e05428c8f95fef3951f",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "nixos",
"ref": "release-21.11", "ref": "nixos-unstable",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
@ -186,6 +180,36 @@
} }
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": {
"lastModified": 1641550923,
"narHash": "sha256-vKd+7BWjZO6/p8kdP+szOfecJBw/zbWUWhNNoOx2PUU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9bc01c54624b128a9533f912849cd7f2d2bab9f2",
"type": "github"
},
"original": {
"id": "nixpkgs",
"type": "indirect"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1641578038,
"narHash": "sha256-fE5tYnyxiAmgg4qJp7jcHxGcQIazhLY2AI89SInxOck=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "d89eab1e42717622cfdd5f43f3b99e8680bdb637",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "release-21.11",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_4": {
"locked": { "locked": {
"lastModified": 1637209424, "lastModified": 1637209424,
"narHash": "sha256-oXw75hkCOVtoB+CEElWiTmkC1gNdL3jf0tG2GInytHA=", "narHash": "sha256-oXw75hkCOVtoB+CEElWiTmkC1gNdL3jf0tG2GInytHA=",
@ -201,7 +225,7 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs_3": { "nixpkgs_5": {
"locked": { "locked": {
"lastModified": 1638097282, "lastModified": 1638097282,
"narHash": "sha256-EXCzj9b8X/lqDPJapxZThIOKL5ASbpsJZ+8L1LnY1ig=", "narHash": "sha256-EXCzj9b8X/lqDPJapxZThIOKL5ASbpsJZ+8L1LnY1ig=",
@ -217,7 +241,7 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs_4": { "nixpkgs_6": {
"locked": { "locked": {
"lastModified": 1639061333, "lastModified": 1639061333,
"narHash": "sha256-rG04piqc/mCGM+6IU0o1JRlH+iqwOXbuuqA1Wtszexw=", "narHash": "sha256-rG04piqc/mCGM+6IU0o1JRlH+iqwOXbuuqA1Wtszexw=",
@ -256,7 +280,7 @@
"heliwatch": "heliwatch", "heliwatch": "heliwatch",
"naersk": "naersk_2", "naersk": "naersk_2",
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs_3",
"nixpkgs-mobilizon": "nixpkgs-mobilizon", "nixpkgs-mobilizon": "nixpkgs-mobilizon",
"nixpkgs-unstable": "nixpkgs-unstable", "nixpkgs-unstable": "nixpkgs-unstable",
"scrapers": "scrapers", "scrapers": "scrapers",
@ -321,7 +345,7 @@
}, },
"secrets": { "secrets": {
"inputs": { "inputs": {
"nixpkgs": "nixpkgs_2", "nixpkgs": "nixpkgs_4",
"sops-nix": [ "sops-nix": [
"sops-nix" "sops-nix"
] ]
@ -342,7 +366,7 @@
}, },
"sops-nix": { "sops-nix": {
"inputs": { "inputs": {
"nixpkgs": "nixpkgs_3" "nixpkgs": "nixpkgs_5"
}, },
"locked": { "locked": {
"lastModified": 1641374494, "lastModified": 1641374494,
@ -444,7 +468,7 @@
}, },
"zentralwerk": { "zentralwerk": {
"inputs": { "inputs": {
"nixpkgs": "nixpkgs_4", "nixpkgs": "nixpkgs_6",
"nixpkgs-master": "nixpkgs-master", "nixpkgs-master": "nixpkgs-master",
"openwrt": "openwrt" "openwrt": "openwrt"
}, },

View File

@ -241,6 +241,13 @@
system = "x86_64-linux"; system = "x86_64-linux";
}; };
nix-build = nixosSystem' {
modules = [
./hosts/containers/nix-build
];
system = "x86_64-linux";
};
pulsebert = nixosSystem' { pulsebert = nixosSystem' {
modules = [ modules = [
"${inputs.nixpkgs}/nixos/modules/installer/sd-card/sd-image-aarch64.nix" "${inputs.nixpkgs}/nixos/modules/installer/sd-card/sd-image-aarch64.nix"

View File

@ -123,6 +123,8 @@ rec {
gitea.publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM8MmjiiRmiyUqRYs5a07m7qKDwxh2NwvS2h7pm2b+zx"; gitea.publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM8MmjiiRmiyUqRYs5a07m7qKDwxh2NwvS2h7pm2b+zx";
dacbert.ip4 = "dacbert.hq.c3d2.de"; dacbert.ip4 = "dacbert.hq.c3d2.de";
nix-build.ip4 = "172.22.99.156";
}; };
hqGlobal = builtins.attrNames hosts; hqGlobal = builtins.attrNames hosts;

View File

@ -1,6 +1,18 @@
{ config, pkgs, ... }: { hostRegistry, zentralwerk, config, pkgs, lib, ... }:
{ {
networking.hostName = "nix-build"; # Define your hostname.
networking.useDHCP = false;
networking.interfaces.enp6s18 = {
ipv4.addresses = [{
address = hostRegistry.hosts.nix-build.ip4;
prefixLength = zentralwerk.lib.config.site.net.c3d2.subnet4Len;
}];
useDHCP = false;
};
networking.defaultGateway = "172.22.99.1";
networking.firewall.allowedTCPPorts = [ 22 ];
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
]; ];
@ -21,23 +33,15 @@
nix = { nix = {
buildCores = 40; buildCores = 40;
maxJobs = 4; maxJobs = 4;
package = pkgs.nixUnstable; package = lib.mkForce pkgs.nixUnstable;
trustedUsers = [ "client" ]; trustedUsers = [ "client" ];
extraOptions = '' extraOptions = ''
builders-use-substitutes = true builders-use-substitutes = true
''; '';
}; };
networking.hostName = "nix-build"; # Define your hostname.
# time.timeZone = "Europe/Amsterdam"; # time.timeZone = "Europe/Amsterdam";
# The global useDHCP flag is deprecated, therefore explicitly set to false here.
# Per-interface useDHCP will be mandatory in the future, so this generated config
# replicates the default behaviour.
networking.useDHCP = false;
networking.interfaces.enp6s18.useDHCP = true;
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
wget wget
vim vim
@ -45,9 +49,7 @@
]; ];
services.openssh.enable = true; services.openssh.enable = true;
services.openssh.permitRootLogin = "yes"; services.openssh.permitRootLogin = lib.mkForce "yes";
networking.firewall.allowedTCPPorts = [ 22 ];
# This value determines the NixOS release from which the default # This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions # settings for stateful data, like file locations and database versions