Add ca-derivations and per-machine optimization

This commit is contained in:
Charlotte 🦝 Delenk 2022-04-19 07:21:46 +01:00
parent f206b5fe1e
commit 2555179a15
Signed by: darkkirb
GPG key ID: AB2BD8DAF2E37122
7 changed files with 20 additions and 1 deletions

View file

@ -14,6 +14,7 @@ jobs:
- uses: cachix/install-nix-action@v17
with:
extra_nix_config: |
experimental-features = nix-command flakes ca-derivations
substituters = https://f000.backblazeb2.com/file/cache-chir-rs/ https://cache.nixos.org/
trusted-public-keys = nixcache:8KKuGz95Pk4UJ5W/Ni+pN+v+LDTkMMFV4yrGmAYgkDg= hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=
- run: nix build '.#nixosConfigurations.installer.config.system.build.isoImage'

View file

@ -16,6 +16,7 @@ jobs:
- uses: cachix/install-nix-action@v17
with:
extra_nix_config: |
experimental-features = nix-command flakes ca-derivations
substituters = https://f000.backblazeb2.com/file/cache-chir-rs/ https://cache.nixos.org/
trusted-public-keys = nixcache:8KKuGz95Pk4UJ5W/Ni+pN+v+LDTkMMFV4yrGmAYgkDg= hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=
- run: nix build --no-link '.#${{ matrix.target }}'

View file

@ -14,6 +14,7 @@ jobs:
- uses: cachix/install-nix-action@v17
with:
extra_nix_config: |
experimental-features = nix-command flakes ca-derivations
substituters = https://f000.backblazeb2.com/file/cache-chir-rs/ https://cache.nixos.org/
trusted-public-keys = nixcache:8KKuGz95Pk4UJ5W/Ni+pN+v+LDTkMMFV4yrGmAYgkDg= hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=
- run: nix flake update

View file

@ -3,6 +3,7 @@
./workarounds
];
nixpkgs.config.allowUnfree = true;
nixpkgs.config.contentAddressedByDefault = true;
nix = {
settings = {
sandbox = true;
@ -18,7 +19,7 @@
"hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs="
];
};
package = pkgs.nixFlakes;
package = pkgs.nixUnstable;
extraOptions = ''
experimental-features = nix-command flakes ca-derivations
'';

View file

@ -226,4 +226,9 @@
"net.ipv4.conf.all.forwarding" = true;
"net.ipv6.conf.all.forwarding" = true;
};
nixpkgs.localSystem = {
gcc.arch = "skylake";
gcc.tune = "skylake-avx512";
system = "x86_64-linux";
};
}

View file

@ -197,4 +197,9 @@
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDpO0Lh7eOE/EBttb/XWZ6ISiJ0RkmBYfruq3U6linEz root@nixos-8gb-fsn1-1"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKB8oH1XbuGrKn/SeguXz96sw4AjJQQvZyAdpptotzOr root@thinkrac"
];
nixpkgs.localSystem = {
gcc.arch = "znver2";
gcc.tune = "znver2";
system = "x86_64-linux";
};
}

View file

@ -156,4 +156,9 @@
networking.networkmanager.enable = true;
users.users.darkkirb.extraGroups = [ "networkmanager" ];
nix.settings.max-jobs = 0;
nixpkgs.localSystem = {
gcc.arch = "skylake";
gcc.tune = "skylake";
system = "x86_64-linux";
};
}