feat: nope, no more hydra

This commit is contained in:
Noa Aarts 2024-10-21 20:19:28 +02:00
parent 07081aa3d9
commit 4fef42b0f1
Signed by: noa
GPG key ID: 1850932741EFF672
3 changed files with 0 additions and 62 deletions

View file

@ -118,12 +118,6 @@
nixosModules = { nixosModules = {
automapaper = ./modules/automapaper; automapaper = ./modules/automapaper;
}; };
hydraJobs = {
lambda.x86_64-linux = self.nixosConfigurations.lambdaOS.config.system.build.toplevel;
nu.x86_64-linux = self.nixosConfigurations.nuOS.config.system.build.toplevel;
mu.x86_64-linux = self.nixosConfigurations.muOS.config.system.build.toplevel;
};
}; };
} }

View file

@ -52,12 +52,6 @@
]; ];
write = true; write = true;
}; };
nix = {
settings = {
builders-use-substitutes = true;
trusted-users = [ "root" "remotebuilder" "@wheel" ];
};
};
# Allow unfree packages # Allow unfree packages
@ -94,16 +88,6 @@
hashedPassword = "$6$rounds=512400$Zip3xoK2zcoR4qEL$N13YTHO5tpWfx2nKb1sye.ZPwfoRtMQ5f3YrMZqKzzoFoSSHHJ.l5ulCEa9HygFxZmBtPnwlseFEtl8ERnwF50"; hashedPassword = "$6$rounds=512400$Zip3xoK2zcoR4qEL$N13YTHO5tpWfx2nKb1sye.ZPwfoRtMQ5f3YrMZqKzzoFoSSHHJ.l5ulCEa9HygFxZmBtPnwlseFEtl8ERnwF50";
openssh.authorizedKeys.keys = (import ../../common/ssh-keys.nix); openssh.authorizedKeys.keys = (import ../../common/ssh-keys.nix);
}; };
remotebuilder = {
isNormalUser = true;
hashedPassword = "!";
description = "Remote nix builder";
openssh.authorizedKeys.keys =
[
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILRZXNqs7FgVeTCt2ElOARt5f/bR1gjk5bS+zCJA6C1P root@nuOS"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII7X17VovmxkwhKxIg795yO1Sf7dwO50pybMRlUDLLcA hydra@nuOS"
];
};
}; };
home-manager = { home-manager = {

View file

@ -43,16 +43,6 @@
hashedPassword = "$6$rounds=512400$g/s4dcRttXi4ux6c$Z6pKnhJXcWxv0TBSMtvJu5.piETdUBSgBVN7oDPKiQV.lbTYz1r.0XQLwMYxzcvaaX0DL6Iw/SEUTiC2M50wC/"; hashedPassword = "$6$rounds=512400$g/s4dcRttXi4ux6c$Z6pKnhJXcWxv0TBSMtvJu5.piETdUBSgBVN7oDPKiQV.lbTYz1r.0XQLwMYxzcvaaX0DL6Iw/SEUTiC2M50wC/";
openssh.authorizedKeys.keys = import ../../common/ssh-keys.nix; openssh.authorizedKeys.keys = import ../../common/ssh-keys.nix;
}; };
remotebuilder = {
isNormalUser = true;
hashedPassword = "!";
description = "Remote nix builder";
openssh.authorizedKeys.keys =
[
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILRZXNqs7FgVeTCt2ElOARt5f/bR1gjk5bS+zCJA6C1P root@nuOS"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII7X17VovmxkwhKxIg795yO1Sf7dwO50pybMRlUDLLcA hydra@nuOS"
];
};
}; };
# Allow unfree packages # Allow unfree packages
@ -99,28 +89,8 @@
}; };
nix = { nix = {
buildMachines = [
{
hostName = "localhost";
protocol = null;
system = "x86_64-linux";
supportedFeatures = [ "kvm" "nixos-test" "big-parallel" "benchmark" ];
maxJobs = 4;
sshUser = "remotebuilder";
}
{
hostName = "lambdaos";
protocol = "ssh";
system = "x86_64-linux";
supportedFeatures = [ "kvm" "nixos-test" "big-parallel" "benchmark" ];
maxJobs = 8;
sshUser = "remotebuilder";
}
];
distributedBuilds = false;
settings = { settings = {
builders-use-substitutes = true; builders-use-substitutes = true;
trusted-users = [ "root" "remotebuilder" "@wheel" ];
}; };
}; };
@ -176,16 +146,6 @@
}; };
services = { services = {
hydra = {
enable = true;
hydraURL = "https://hydra.itepastra.nl";
port = 9212;
notificationSender = "hydra@localhost";
useSubstitutes = true;
# listenHost = "localhost";
minimumDiskFree = 100;
minimumDiskFreeEvaluator = 100;
};
nix-serve = { nix-serve = {
enable = true; enable = true;
package = pkgs.nix-serve-ng; package = pkgs.nix-serve-ng;