diff options
| author | Fuwn <[email protected]> | 2024-09-20 05:36:20 -0700 |
|---|---|---|
| committer | Fuwn <[email protected]> | 2024-09-20 05:36:20 -0700 |
| commit | d9747c64b038943253eaafdc59a49d5face46dab (patch) | |
| tree | b452d15a7f20e9f4bb70ec9f9040137bec1072f8 /modules/core/nix | |
| parent | himeji: move containers over from seti (diff) | |
| download | nixos-config-d9747c64b038943253eaafdc59a49d5face46dab.tar.xz nixos-config-d9747c64b038943253eaafdc59a49d5face46dab.zip | |
modules: server and core modules
Diffstat (limited to 'modules/core/nix')
| -rw-r--r-- | modules/core/nix/default.nix | 87 | ||||
| -rw-r--r-- | modules/core/nix/extended.nix | 48 | ||||
| -rw-r--r-- | modules/core/nix/nh.nix | 9 |
3 files changed, 144 insertions, 0 deletions
diff --git a/modules/core/nix/default.nix b/modules/core/nix/default.nix new file mode 100644 index 0000000..6b605ee --- /dev/null +++ b/modules/core/nix/default.nix @@ -0,0 +1,87 @@ +{ + inputs, + pkgs, + lib, + config, + ... +}: +{ + imports = [ ./extended.nix ]; + nixpkgs.config.allowUnfree = true; + + nix = { + gc.automatic = true; + optimise.automatic = true; + registry.nixpkgs.flake = inputs.nixpkgs; + package = pkgs.nixVersions.git; + nixPath = [ "nixpkgs=${inputs.nixpkgs}" ]; + channel.enable = false; + + settings = { + auto-optimise-store = true; + http-connections = 0; + warn-dirty = false; + log-lines = 30; + sandbox-fallback = false; + keep-going = true; + connect-timeout = 5; + stalled-download-timeout = 20; + auto-allocate-uids = true; + use-cgroups = pkgs.stdenv.isLinux; + builders-use-substitutes = true; + nix-path = lib.mkForce "nixpkgs=flake:nixpkgs"; + flake-registry = "${inputs.flake-registry}/flake-registry.json"; + trusted-users = [ "@wheel" ]; + max-jobs = "auto"; + keep-outputs = true; + + system-features = [ + "nixos-test" + "kvm" + "recursive-nix" + "big-parallel" + ]; + + allowed-users = [ + "root" + "@wheel" + ]; + + substituters = [ + "https://cache.nixos.org/" + "https://nix-community.cachix.org" + "https://hyprland.cachix.org" + "https://nyx.chaotic.cx/" + "https://nixpkgs-wayland.cachix.org" + "https://cuda-maintainers.cachix.org" + "https://nixpkgs-unfree.cachix.org" + # "https://cache.flox.dev" + "https://cache.iog.io" + "https://ezkea.cachix.org" + ]; + + trusted-public-keys = [ + "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=" + "hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc=" + "nyx.cachix.org-1:HfnXSw4pj95iI/n17rIDy40agHj12WfF+Gqk6SonIT8=" + "nixpkgs-wayland.cachix.org-1:3lwxaILxMRkVhehr5StQprHdEo4IrE8sRho9R9HOLYA=" + "cuda-maintainers.cachix.org-1:0dq3bujKpuEPMCX6U4WylrUDZ9JyUG0VpVZa7CNfq5E=" + "nixpkgs-unfree.cachix.org-1:hqvoInulhbV4nJ9yJOEr+4wxhDV4xq2d1DK7S6Nj6rs=" + # "flox-cache-public-1:7F4OyH7ZCnFhcze3fJdfyXYLQw/aV7GEed86nQ7IsOs=" + "hydra.iohk.io:f/Ea+s+dFdN+3Y/G+FDgSq+a5NEWhJGzdjvKNGv0/EQ=" + "ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI=" + ]; + + experimental-features = [ + "nix-command" + "flakes" + "recursive-nix" + "ca-derivations" + "auto-allocate-uids" + "cgroups" + "no-url-literals" + "dynamic-derivations" + ]; + }; + }; +} diff --git a/modules/core/nix/extended.nix b/modules/core/nix/extended.nix new file mode 100644 index 0000000..4e924cd --- /dev/null +++ b/modules/core/nix/extended.nix @@ -0,0 +1,48 @@ +{ + config, + lib, + pkgs, + ... +}: +{ + imports = [ ./nh.nix ]; + + config = lib.mkIf config.modules.nix.extend { + nixpkgs.config.cudaSupport = true; + programs.nix-index-database.comma.enable = true; + + nix = { + # distributedBuilds = true; + + buildMachines = + map + (system: { + inherit system; + + hostName = "eu.nixbuild.net"; + maxJobs = 100; + + supportedFeatures = [ + "benchmark" + "big-parallel" + ]; + }) + [ + "x86_64-linux" + "i686-linux" + "aarch64-linux" + "armv7l-linux" + ]; + + settings = { + extra-platforms = config.boot.binfmt.emulatedSystems; + + extra-sandbox-paths = [ + config.programs.ccache.cacheDir + "/run/binfmt" + "${pkgs.qemu}" + ]; + }; + }; + }; +} diff --git a/modules/core/nix/nh.nix b/modules/core/nix/nh.nix new file mode 100644 index 0000000..5b54192 --- /dev/null +++ b/modules/core/nix/nh.nix @@ -0,0 +1,9 @@ +{ lib, config, ... }: +{ + config = lib.mkIf config.modules.nix.extend { + programs.nh = { + enable = true; + clean.enable = false; + }; + }; +} |