Add nix-fast-build
Signed-off-by: Nikolaos Karaolidis <nick@karaolidis.com>
This commit is contained in:
24
flake.lock
generated
24
flake.lock
generated
@@ -235,11 +235,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1755506074,
|
"lastModified": 1757531256,
|
||||||
"narHash": "sha256-SztuKbAPppW5grMJLSGO5rBCXEWCOfhb39cPDONEUfo=",
|
"narHash": "sha256-aOqrRvKmHoPKVhEYgV/RbsMXYXy6W9Tt1uhGK3dWMlE=",
|
||||||
"ref": "refs/heads/main",
|
"ref": "refs/heads/main",
|
||||||
"rev": "ac85b6f608ed88d424621ec30f3848d621383487",
|
"rev": "be7b39f41a1137a68944fc73db5a24544e015eb6",
|
||||||
"revCount": 6,
|
"revCount": 7,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://git.karaolidis.com/karaolidis/nix-lib.git"
|
"url": "https://git.karaolidis.com/karaolidis/nix-lib.git"
|
||||||
},
|
},
|
||||||
@@ -495,11 +495,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1755532656,
|
"lastModified": 1757531894,
|
||||||
"narHash": "sha256-xYb5dJej3emyr4oWWAhkMP8rPc3kdVOXGZcIbAx1Y/I=",
|
"narHash": "sha256-GwV3ES7n/2mwPeu8FGfViI6QfzbTrvNob3OZOsPQId0=",
|
||||||
"ref": "refs/heads/main",
|
"ref": "refs/heads/main",
|
||||||
"rev": "b01f3f8456903cb1bde9637cc23b456b47354138",
|
"rev": "3d069983345ea83549c641dd3f8875e54aaf1c2b",
|
||||||
"revCount": 11,
|
"revCount": 12,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "ssh://git@karaolidis.com/karaolidis/nix-sas.git"
|
"url": "ssh://git@karaolidis.com/karaolidis/nix-sas.git"
|
||||||
},
|
},
|
||||||
@@ -511,11 +511,11 @@
|
|||||||
"secrets": {
|
"secrets": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1756900832,
|
"lastModified": 1757519344,
|
||||||
"narHash": "sha256-sMne4dvYzcdbDVcMPY6NLVHiZbgjtDrxttKG0Vig8WQ=",
|
"narHash": "sha256-wLwVbKDPkFCPh9UYLDqCPb62hp6mHBAgjn3Dech54YU=",
|
||||||
"ref": "refs/heads/main",
|
"ref": "refs/heads/main",
|
||||||
"rev": "adac63f6daffb4e14ce0fb94e93eb987e2460064",
|
"rev": "8ae051ad0936cb8fbf10b3ab2130f09a07ca1ce6",
|
||||||
"revCount": 38,
|
"revCount": 39,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "ssh://git@karaolidis.com/karaolidis/nix-secrets.git"
|
"url": "ssh://git@karaolidis.com/karaolidis/nix-secrets.git"
|
||||||
},
|
},
|
||||||
|
23
flake.nix
23
flake.nix
@@ -189,7 +189,28 @@
|
|||||||
devShells.${system} = import ./hosts/common/shells { inherit pkgs; };
|
devShells.${system} = import ./hosts/common/shells { inherit pkgs; };
|
||||||
packages.${system} = import ./packages { inherit pkgs; };
|
packages.${system} = import ./packages { inherit pkgs; };
|
||||||
formatter.${system} = treefmt.config.build.wrapper;
|
formatter.${system} = treefmt.config.build.wrapper;
|
||||||
checks.${system}.formatting = treefmt.config.build.check inputs.self;
|
|
||||||
|
checks.${system} =
|
||||||
|
let
|
||||||
|
nixosConfigurations =
|
||||||
|
pkgs.lib.mapAttrs'
|
||||||
|
(
|
||||||
|
name: config:
|
||||||
|
pkgs.lib.nameValuePair "nixosConfiguration-${name}" config.config.system.build.toplevel
|
||||||
|
)
|
||||||
|
((pkgs.lib.filterAttrs (_: config: config.pkgs.system == system)) inputs.self.nixosConfigurations);
|
||||||
|
|
||||||
|
packages = pkgs.lib.mapAttrs' (n: pkgs.lib.nameValuePair "package-${n}") inputs.self.packages;
|
||||||
|
|
||||||
|
overlayPackages = pkgs.lib.mapAttrs' (n: pkgs.lib.nameValuePair "overlayPackage-${n}") (
|
||||||
|
import ./overlays/packages.nix { inherit pkgs; }
|
||||||
|
);
|
||||||
|
|
||||||
|
devShells = pkgs.lib.mapAttrs' (n: pkgs.lib.nameValuePair "devShell-${n}") inputs.self.devShells;
|
||||||
|
|
||||||
|
formatter.formatting = treefmt.config.build.check inputs.self;
|
||||||
|
in
|
||||||
|
nixosConfigurations // packages // overlayPackages // devShells // formatter;
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
@@ -43,7 +43,6 @@
|
|||||||
];
|
];
|
||||||
download-buffer-size = 524288000;
|
download-buffer-size = 524288000;
|
||||||
substituters = lib.mkBefore [ "https://nix.karaolidis.com/main" ];
|
substituters = lib.mkBefore [ "https://nix.karaolidis.com/main" ];
|
||||||
trusted-substituters = config.nix.settings.substituters;
|
|
||||||
trusted-public-keys = lib.mkBefore [ "main:nJVRBnv73MDkwuV5sgm52m4E2ImOhWHvY12qzjPegAk=" ];
|
trusted-public-keys = lib.mkBefore [ "main:nJVRBnv73MDkwuV5sgm52m4E2ImOhWHvY12qzjPegAk=" ];
|
||||||
netrc-file = config.sops.templates.nix-netrc.path;
|
netrc-file = config.sops.templates.nix-netrc.path;
|
||||||
};
|
};
|
||||||
|
@@ -26,7 +26,6 @@
|
|||||||
experimental-features
|
experimental-features
|
||||||
download-buffer-size
|
download-buffer-size
|
||||||
substituters
|
substituters
|
||||||
trusted-substituters
|
|
||||||
trusted-public-keys
|
trusted-public-keys
|
||||||
netrc-file
|
netrc-file
|
||||||
;
|
;
|
||||||
|
@@ -4,7 +4,10 @@
|
|||||||
environment.persistence."/persist/cache"."${home}/.cache/nix" = { };
|
environment.persistence."/persist/cache"."${home}/.cache/nix" = { };
|
||||||
|
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} = {
|
||||||
home.packages = with pkgs; [ nurl ];
|
home.packages = with pkgs; [
|
||||||
|
nix-fast-build
|
||||||
|
nurl
|
||||||
|
];
|
||||||
|
|
||||||
programs.zsh.shellAliases = {
|
programs.zsh.shellAliases = {
|
||||||
nrs = "sudo nixos-rebuild switch --flake .#$(hostname) --show-trace";
|
nrs = "sudo nixos-rebuild switch --flake .#$(hostname) --show-trace";
|
||||||
|
@@ -83,9 +83,18 @@ in
|
|||||||
networks.attic.ref
|
networks.attic.ref
|
||||||
networks.traefik.ref
|
networks.traefik.ref
|
||||||
];
|
];
|
||||||
volumes = [
|
volumes =
|
||||||
|
let
|
||||||
|
postStart = pkgs.writeTextFile {
|
||||||
|
name = "post-start.sh";
|
||||||
|
executable = true;
|
||||||
|
text = builtins.readFile ./post-start.sh;
|
||||||
|
};
|
||||||
|
in
|
||||||
|
[
|
||||||
"/mnt/storage/private/storm/containers/storage/volumes/attic/_data:/var/lib/attic"
|
"/mnt/storage/private/storm/containers/storage/volumes/attic/_data:/var/lib/attic"
|
||||||
"${hmConfig.sops.templates.attic-server.path}:/etc/attic/server.toml"
|
"${hmConfig.sops.templates.attic-server.path}:/etc/attic/server.toml:ro"
|
||||||
|
"${postStart}:/etc/attic/post-start.sh:ro"
|
||||||
];
|
];
|
||||||
environmentFiles = [ hmConfig.sops.templates.attic-env.path ];
|
environmentFiles = [ hmConfig.sops.templates.attic-env.path ];
|
||||||
exec = [
|
exec = [
|
||||||
|
@@ -5,8 +5,10 @@ attic login main https://nix.karaolidis.com/ "$ATTIC_TOKEN"
|
|||||||
CACHE_NAME="main"
|
CACHE_NAME="main"
|
||||||
|
|
||||||
while true; do
|
while true; do
|
||||||
|
set +o errexit
|
||||||
out=$(attic cache info "$CACHE_NAME" 2>&1)
|
out=$(attic cache info "$CACHE_NAME" 2>&1)
|
||||||
status=$?
|
status=$?
|
||||||
|
set -o errexit
|
||||||
|
|
||||||
if [ $status -eq 0 ]; then
|
if [ $status -eq 0 ]; then
|
||||||
break
|
break
|
||||||
|
@@ -118,12 +118,6 @@ in
|
|||||||
client_secret = hmConfig.sops.placeholder."jellyseerr/authelia/digest";
|
client_secret = hmConfig.sops.placeholder."jellyseerr/authelia/digest";
|
||||||
redirect_uris = [ "https://request.karaolidis.com/login?provider=authelia&callback=true" ];
|
redirect_uris = [ "https://request.karaolidis.com/login?provider=authelia&callback=true" ];
|
||||||
authorization_policy = "jellyseerr";
|
authorization_policy = "jellyseerr";
|
||||||
scopes = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
"groups"
|
|
||||||
];
|
|
||||||
token_endpoint_auth_method = "client_secret_post";
|
token_endpoint_auth_method = "client_secret_post";
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
@@ -81,6 +81,7 @@ in
|
|||||||
"--entrypoints.https.http.tls.domains[1].sans=*.krlds.com"
|
"--entrypoints.https.http.tls.domains[1].sans=*.krlds.com"
|
||||||
"--entryPoints.https.http3"
|
"--entryPoints.https.http3"
|
||||||
"--entrypoints.https.http.middlewares=compress@docker,security-headers@docker"
|
"--entrypoints.https.http.middlewares=compress@docker,security-headers@docker"
|
||||||
|
"--entrypoints.https.transport.respondingTimeouts.readTimeout=0s"
|
||||||
|
|
||||||
"--certificatesresolvers.letsencrypt.acme.dnschallenge=true"
|
"--certificatesresolvers.letsencrypt.acme.dnschallenge=true"
|
||||||
"--certificatesresolvers.letsencrypt.acme.dnschallenge.provider=cloudflare"
|
"--certificatesresolvers.letsencrypt.acme.dnschallenge.provider=cloudflare"
|
||||||
|
13
overlays/packages.nix
Normal file
13
overlays/packages.nix
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
inherit (pkgs)
|
||||||
|
android-tools
|
||||||
|
attic-client
|
||||||
|
darktable
|
||||||
|
hyprland
|
||||||
|
mpv
|
||||||
|
spicetify-cli
|
||||||
|
tea
|
||||||
|
telepresence
|
||||||
|
;
|
||||||
|
}
|
@@ -15,7 +15,7 @@ let
|
|||||||
owner = "Fallenbagel";
|
owner = "Fallenbagel";
|
||||||
repo = "jellyseerr";
|
repo = "jellyseerr";
|
||||||
tag = "preview-OIDC";
|
tag = "preview-OIDC";
|
||||||
hash = "sha256-iBnO0WjNqvXfuJMoS6z/NmYgtW5FQ9Ptp9uV5rODIf8=";
|
hash = "sha256-EJz1W7ewEczizNRs/X3esjQUwJiTHruo7nkAzyKZbjc=";
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
@@ -24,7 +24,7 @@ let
|
|||||||
inherit src;
|
inherit src;
|
||||||
inherit (oldAttrs) pname version;
|
inherit (oldAttrs) pname version;
|
||||||
fetcherVersion = 2;
|
fetcherVersion = 2;
|
||||||
hash = "sha256-Ek2z1KIel3egwZ9dGU7rJQEyhukmXw5chsfvI2w8v28=";
|
hash = "sha256-0CwHkxG3SOSd+xozONnAi7Mr0y+lXdxwJk8mRZf8Bhs=";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
|
Submodule submodules/lib updated: ac85b6f608...be7b39f41a
Submodule submodules/sas updated: b01f3f8456...3d06998334
Submodule submodules/secrets updated: adac63f6da...8ae051ad09
Reference in New Issue
Block a user