nixos-config/modules/hydra/build-server.nix
Charlotte 🦝 Delenk 9440ee12f8
All checks were successful
Hydra nixosConfigurations.container-default-x86_64-linux Hydra build #23616 of nixos-config:pr618:nixosConfigurations.container-default-x86_64-linux
Hydra nixosConfigurations.container-default-aarch64-linux Hydra build #23614 of nixos-config:pr618:nixosConfigurations.container-default-aarch64-linux
Hydra devShells.x86_64-linux.default Hydra build #23613 of nixos-config:pr618:devShells.x86_64-linux.default
Hydra checks.x86_64-linux.containers-default Hydra build #23612 of nixos-config:pr618:checks.x86_64-linux.containers-default
Hydra nixosConfigurations.container-default-riscv64-linux Hydra build #23615 of nixos-config:pr618:nixosConfigurations.container-default-riscv64-linux
Hydra nixosConfigurations.not522 Hydra build #23617 of nixos-config:pr618:nixosConfigurations.not522
Hydra nixosConfigurations.not522-installer Hydra build #23618 of nixos-config:pr618:nixosConfigurations.not522-installer
add remote-build as trusted user
2024-11-04 13:37:51 +01:00

26 lines
710 B
Nix

{
lib,
config,
...
}:
with lib; {
options.hydra.buildServer.enable = mkEnableOption "Make this device a build server";
imports = [
{
config.hydra.buildServer.enable = let
buildServers = import ./build-server-list.nix;
in
mkDefault (any (t: t == config.networking.hostName) buildServers);
}
];
config = mkIf config.hydra.buildServer.enable {
users.users.remote-build = {
description = "Remote builder";
isNormalUser = true;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINN5Q/L2FyB3DIgdJRYnTGHW3naw5VQ9coOdwHYmv0aZ darkkirb@thinkrac"
];
};
nix.settings.trusted-users = ["remote-build"];
};
}