added distributed build
This commit is contained in:
@@ -23,5 +23,22 @@
|
||||
|
||||
networking.interfaces.enp12s0.wakeOnLan.enable = true;
|
||||
networking.interfaces.enp12s0.wakeOnLan.policy = [ "magic" ];
|
||||
|
||||
# build substituter
|
||||
users.users.nixremote = {
|
||||
isNormalUser = true;
|
||||
createHome = false;
|
||||
group = "nixremote";
|
||||
|
||||
openssh.authorizedKeys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIt6Ts4SNWXv2hObOOKyyxXr/6iZBRZXEwE0mtEpCa8X root@Ratchet"
|
||||
];
|
||||
};
|
||||
|
||||
users.groups.remotebuild = {};
|
||||
|
||||
services.nix-serve.secretKeyFile = "/home/store_secret.pem";
|
||||
|
||||
nix.settings.trusted-users = [ "nixremote" ];
|
||||
|
||||
}
|
||||
|
||||
@@ -68,6 +68,8 @@
|
||||
};
|
||||
};
|
||||
|
||||
chaotic.mesa-git.enable = true;
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
|
||||
@@ -0,0 +1,24 @@
|
||||
{ config, pkgs, ...}:
|
||||
{
|
||||
nix.buildMachines = [ {
|
||||
hostName = "Aphelion";
|
||||
system = "x86_64-linux";
|
||||
protocol = "ssh-ng";
|
||||
# if the builder supports building for multiple architectures,
|
||||
# replace the previous line by, e.g.
|
||||
# systems = ["x86_64-linux" "aarch64-linux"];
|
||||
maxJobs = 16;
|
||||
speedFactor = 2;
|
||||
supportedFeatures = [ "nixos-test" "benchmark" "big-parallel" "kvm" ];
|
||||
mandatoryFeatures = [ ];
|
||||
}] ;
|
||||
nix.distributedBuilds = true;
|
||||
# optional, useful when the builder has a faster internet connection than yours
|
||||
nix.extraOptions = ''
|
||||
builders-use-substitutes = true
|
||||
'';
|
||||
nix.settings.trusted-public-keys = [
|
||||
"Aphelion:8l9lrL3kszDTXkpA/R4ZFhSifiBoogiOIt1srgLb6Vw="
|
||||
];
|
||||
|
||||
}
|
||||
@@ -11,7 +11,7 @@
|
||||
initialHashedPassword = "$6$.r5fJE91KtrOA2T.$JVjtzlFWx.RsTsNmO5WOsi1MhK6TUTKo8K5F2GgG.bAXYuYjGu4sK3SMzhk4oJ9FBoAcnyHmk7sLMsgLbUeoE1";
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEUF1XU/l++LwgpasO5mO141gftk97/viBTRSO9cJD0u yaroslav@Ratchet"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINgYswQa7LdwBpNkiw73du4nocbbET9FXKzWtjivBwHv yaroslav@Aphelion"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIOIbrPzjI1OF+af5Js69ZSbw7EwpIBcndp+LQvWHtOE yaroslav@Aphelion"
|
||||
];
|
||||
};
|
||||
users.users.root = {
|
||||
|
||||
Reference in New Issue
Block a user