summaryrefslogtreecommitdiff
path: root/modules/core/nix
diff options
context:
space:
mode:
authorFuwn <[email protected]>2024-09-20 05:36:20 -0700
committerFuwn <[email protected]>2024-09-20 05:36:20 -0700
commitd9747c64b038943253eaafdc59a49d5face46dab (patch)
treeb452d15a7f20e9f4bb70ec9f9040137bec1072f8 /modules/core/nix
parenthimeji: move containers over from seti (diff)
downloadnixos-config-d9747c64b038943253eaafdc59a49d5face46dab.tar.xz
nixos-config-d9747c64b038943253eaafdc59a49d5face46dab.zip
modules: server and core modules
Diffstat (limited to 'modules/core/nix')
-rw-r--r--modules/core/nix/default.nix87
-rw-r--r--modules/core/nix/extended.nix48
-rw-r--r--modules/core/nix/nh.nix9
3 files changed, 144 insertions, 0 deletions
diff --git a/modules/core/nix/default.nix b/modules/core/nix/default.nix
new file mode 100644
index 0000000..6b605ee
--- /dev/null
+++ b/modules/core/nix/default.nix
@@ -0,0 +1,87 @@
+{
+ inputs,
+ pkgs,
+ lib,
+ config,
+ ...
+}:
+{
+ imports = [ ./extended.nix ];
+ nixpkgs.config.allowUnfree = true;
+
+ nix = {
+ gc.automatic = true;
+ optimise.automatic = true;
+ registry.nixpkgs.flake = inputs.nixpkgs;
+ package = pkgs.nixVersions.git;
+ nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
+ channel.enable = false;
+
+ settings = {
+ auto-optimise-store = true;
+ http-connections = 0;
+ warn-dirty = false;
+ log-lines = 30;
+ sandbox-fallback = false;
+ keep-going = true;
+ connect-timeout = 5;
+ stalled-download-timeout = 20;
+ auto-allocate-uids = true;
+ use-cgroups = pkgs.stdenv.isLinux;
+ builders-use-substitutes = true;
+ nix-path = lib.mkForce "nixpkgs=flake:nixpkgs";
+ flake-registry = "${inputs.flake-registry}/flake-registry.json";
+ trusted-users = [ "@wheel" ];
+ max-jobs = "auto";
+ keep-outputs = true;
+
+ system-features = [
+ "nixos-test"
+ "kvm"
+ "recursive-nix"
+ "big-parallel"
+ ];
+
+ allowed-users = [
+ "root"
+ "@wheel"
+ ];
+
+ substituters = [
+ "https://cache.nixos.org/"
+ "https://nix-community.cachix.org"
+ "https://hyprland.cachix.org"
+ "https://nyx.chaotic.cx/"
+ "https://nixpkgs-wayland.cachix.org"
+ "https://cuda-maintainers.cachix.org"
+ "https://nixpkgs-unfree.cachix.org"
+ # "https://cache.flox.dev"
+ "https://cache.iog.io"
+ "https://ezkea.cachix.org"
+ ];
+
+ trusted-public-keys = [
+ "nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
+ "hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
+ "nyx.cachix.org-1:HfnXSw4pj95iI/n17rIDy40agHj12WfF+Gqk6SonIT8="
+ "nixpkgs-wayland.cachix.org-1:3lwxaILxMRkVhehr5StQprHdEo4IrE8sRho9R9HOLYA="
+ "cuda-maintainers.cachix.org-1:0dq3bujKpuEPMCX6U4WylrUDZ9JyUG0VpVZa7CNfq5E="
+ "nixpkgs-unfree.cachix.org-1:hqvoInulhbV4nJ9yJOEr+4wxhDV4xq2d1DK7S6Nj6rs="
+ # "flox-cache-public-1:7F4OyH7ZCnFhcze3fJdfyXYLQw/aV7GEed86nQ7IsOs="
+ "hydra.iohk.io:f/Ea+s+dFdN+3Y/G+FDgSq+a5NEWhJGzdjvKNGv0/EQ="
+ "ezkea.cachix.org-1:ioBmUbJTZIKsHmWWXPe1FSFbeVe+afhfgqgTSNd34eI="
+ ];
+
+ experimental-features = [
+ "nix-command"
+ "flakes"
+ "recursive-nix"
+ "ca-derivations"
+ "auto-allocate-uids"
+ "cgroups"
+ "no-url-literals"
+ "dynamic-derivations"
+ ];
+ };
+ };
+}
diff --git a/modules/core/nix/extended.nix b/modules/core/nix/extended.nix
new file mode 100644
index 0000000..4e924cd
--- /dev/null
+++ b/modules/core/nix/extended.nix
@@ -0,0 +1,48 @@
+{
+ config,
+ lib,
+ pkgs,
+ ...
+}:
+{
+ imports = [ ./nh.nix ];
+
+ config = lib.mkIf config.modules.nix.extend {
+ nixpkgs.config.cudaSupport = true;
+ programs.nix-index-database.comma.enable = true;
+
+ nix = {
+ # distributedBuilds = true;
+
+ buildMachines =
+ map
+ (system: {
+ inherit system;
+
+ hostName = "eu.nixbuild.net";
+ maxJobs = 100;
+
+ supportedFeatures = [
+ "benchmark"
+ "big-parallel"
+ ];
+ })
+ [
+ "x86_64-linux"
+ "i686-linux"
+ "aarch64-linux"
+ "armv7l-linux"
+ ];
+
+ settings = {
+ extra-platforms = config.boot.binfmt.emulatedSystems;
+
+ extra-sandbox-paths = [
+ config.programs.ccache.cacheDir
+ "/run/binfmt"
+ "${pkgs.qemu}"
+ ];
+ };
+ };
+ };
+}
diff --git a/modules/core/nix/nh.nix b/modules/core/nix/nh.nix
new file mode 100644
index 0000000..5b54192
--- /dev/null
+++ b/modules/core/nix/nh.nix
@@ -0,0 +1,9 @@
+{ lib, config, ... }:
+{
+ config = lib.mkIf config.modules.nix.extend {
+ programs.nh = {
+ enable = true;
+ clean.enable = false;
+ };
+ };
+}