2014-04-14 15:26:48 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
2009-03-06 12:25:51 +00:00
|
|
|
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2009-05-25 18:41:03 +01:00
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
let
|
|
|
|
|
2012-06-19 04:31:07 +01:00
|
|
|
cfg = config.nix;
|
|
|
|
|
2016-04-24 12:06:04 +01:00
|
|
|
nix = cfg.package.out;
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2017-03-21 17:41:41 +00:00
|
|
|
isNix112 = versionAtLeast (getVersion nix) "1.12pre";
|
2017-03-03 14:55:27 +00:00
|
|
|
|
2010-03-11 16:50:08 +00:00
|
|
|
makeNixBuildUser = nr:
|
|
|
|
{ name = "nixbld${toString nr}";
|
|
|
|
description = "Nix build user ${toString nr}";
|
|
|
|
|
|
|
|
/* For consistency with the setgid(2), setuid(2), and setgroups(2)
|
|
|
|
calls in `libstore/build.cc', don't add any supplementary group
|
2010-06-02 22:10:48 +01:00
|
|
|
here except "nixbld". */
|
2010-03-11 16:50:08 +00:00
|
|
|
uid = builtins.add config.ids.uids.nixbld nr;
|
|
|
|
group = "nixbld";
|
2010-06-02 22:10:48 +01:00
|
|
|
extraGroups = [ "nixbld" ];
|
2010-03-11 16:50:08 +00:00
|
|
|
};
|
2009-03-06 12:25:51 +00:00
|
|
|
|
2015-03-10 01:04:40 +00:00
|
|
|
nixbldUsers = map makeNixBuildUser (range 1 cfg.nrBuildUsers);
|
|
|
|
|
2013-02-26 02:15:29 +00:00
|
|
|
nixConf =
|
|
|
|
let
|
2016-04-25 10:00:26 +01:00
|
|
|
# If we're using sandbox for builds, then provide /bin/sh in
|
|
|
|
# the sandbox as a bind-mount to bash. This means we also need to
|
2014-08-04 15:45:05 +01:00
|
|
|
# include the entire closure of bash.
|
|
|
|
sh = pkgs.stdenv.shell;
|
|
|
|
binshDeps = pkgs.writeReferencesToFile sh;
|
2013-02-26 02:15:29 +00:00
|
|
|
in
|
|
|
|
pkgs.runCommand "nix.conf" {extraOptions = cfg.extraOptions; } ''
|
2013-07-23 09:00:43 +01:00
|
|
|
extraPaths=$(for i in $(cat ${binshDeps}); do if test -d $i; then echo $i; fi; done)
|
2013-02-26 02:15:29 +00:00
|
|
|
cat > $out <<END
|
2013-08-26 11:11:17 +01:00
|
|
|
# WARNING: this file is generated from the nix.* options in
|
|
|
|
# your NixOS configuration, typically
|
|
|
|
# /etc/nixos/configuration.nix. Do not edit it!
|
2013-02-26 02:15:29 +00:00
|
|
|
build-users-group = nixbld
|
|
|
|
build-max-jobs = ${toString (cfg.maxJobs)}
|
2014-10-31 12:49:18 +00:00
|
|
|
build-cores = ${toString (cfg.buildCores)}
|
2017-04-11 17:08:51 +01:00
|
|
|
build-use-sandbox = ${if (builtins.isBool cfg.useSandbox) then boolToString cfg.useSandbox else cfg.useSandbox}
|
2016-04-25 10:00:26 +01:00
|
|
|
build-sandbox-paths = ${toString cfg.sandboxPaths} /bin/sh=${sh} $(echo $extraPaths)
|
2013-02-26 02:15:29 +00:00
|
|
|
binary-caches = ${toString cfg.binaryCaches}
|
|
|
|
trusted-binary-caches = ${toString cfg.trustedBinaryCaches}
|
2015-02-19 13:15:02 +00:00
|
|
|
binary-cache-public-keys = ${toString cfg.binaryCachePublicKeys}
|
2017-04-11 17:08:51 +01:00
|
|
|
auto-optimise-store = ${boolToString cfg.autoOptimiseStore}
|
2015-02-19 13:15:02 +00:00
|
|
|
${optionalString cfg.requireSignedBinaryCaches ''
|
|
|
|
signed-binary-caches = *
|
|
|
|
''}
|
2015-06-26 17:33:01 +01:00
|
|
|
trusted-users = ${toString cfg.trustedUsers}
|
|
|
|
allowed-users = ${toString cfg.allowedUsers}
|
2013-02-26 02:15:29 +00:00
|
|
|
$extraOptions
|
|
|
|
END
|
|
|
|
'';
|
|
|
|
|
2009-09-17 17:22:26 +01:00
|
|
|
in
|
2009-05-25 18:41:03 +01:00
|
|
|
|
2009-09-17 17:22:26 +01:00
|
|
|
{
|
2009-05-25 18:41:03 +01:00
|
|
|
|
2009-09-17 17:22:26 +01:00
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
nix = {
|
|
|
|
|
2013-10-28 15:28:04 +00:00
|
|
|
package = mkOption {
|
2014-02-27 12:22:04 +00:00
|
|
|
type = types.package;
|
2016-04-24 12:01:40 +01:00
|
|
|
default = pkgs.nix;
|
|
|
|
defaultText = "pkgs.nix";
|
2013-10-28 15:28:04 +00:00
|
|
|
description = ''
|
|
|
|
This option specifies the Nix package instance to use throughout the system.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
maxJobs = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.int;
|
2009-03-06 12:25:51 +00:00
|
|
|
default = 1;
|
2013-10-30 16:37:45 +00:00
|
|
|
example = 64;
|
2015-02-16 10:57:36 +00:00
|
|
|
description = ''
|
2009-03-06 12:25:51 +00:00
|
|
|
This option defines the maximum number of jobs that Nix will try
|
|
|
|
to build in parallel. The default is 1. You should generally
|
2015-07-30 17:57:52 +01:00
|
|
|
set it to the total number of logical cores in your system (e.g., 16
|
|
|
|
for two CPUs with 4 cores each and hyper-threading).
|
2015-02-16 10:57:36 +00:00
|
|
|
'';
|
2009-03-06 12:25:51 +00:00
|
|
|
};
|
|
|
|
|
2017-03-20 18:06:16 +00:00
|
|
|
autoOptimiseStore = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
example = true;
|
|
|
|
description = ''
|
|
|
|
If set to true, Nix automatically detects files in the store that have
|
|
|
|
identical contents, and replaces them with hard links to a single copy.
|
|
|
|
This saves disk space. If set to false (the default), you can still run
|
|
|
|
nix-store --optimise to get rid of duplicate files.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2014-10-31 12:49:18 +00:00
|
|
|
buildCores = mkOption {
|
|
|
|
type = types.int;
|
|
|
|
default = 1;
|
|
|
|
example = 64;
|
|
|
|
description = ''
|
|
|
|
This option defines the maximum number of concurrent tasks during
|
|
|
|
one build. It affects, e.g., -j option for make. The default is 1.
|
2015-01-05 14:38:08 +00:00
|
|
|
The special value 0 means that the builder should use all
|
|
|
|
available CPU cores in the system. Some builds may become
|
|
|
|
non-deterministic with this option; use with care! Packages will
|
|
|
|
only be affected if enableParallelBuilding is set for them.
|
2014-10-31 12:49:18 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2016-04-25 10:00:26 +01:00
|
|
|
useSandbox = mkOption {
|
2016-03-25 12:47:09 +00:00
|
|
|
type = types.either types.bool (types.enum ["relaxed"]);
|
2017-02-14 19:13:39 +00:00
|
|
|
default = false;
|
2009-03-06 12:25:51 +00:00
|
|
|
description = "
|
2016-04-25 10:00:26 +01:00
|
|
|
If set, Nix will perform builds in a sandboxed environment that it
|
2009-03-06 12:25:51 +00:00
|
|
|
will set up automatically for each build. This prevents
|
|
|
|
impurities in builds by disallowing access to dependencies
|
2017-02-14 19:13:39 +00:00
|
|
|
outside of the Nix store. This isn't enabled by default for
|
|
|
|
performance. It doesn't affect derivation hashes, so changing
|
|
|
|
this option will not trigger a rebuild of packages.
|
2009-03-06 12:25:51 +00:00
|
|
|
";
|
|
|
|
};
|
|
|
|
|
2016-04-25 10:00:26 +01:00
|
|
|
sandboxPaths = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.listOf types.str;
|
2011-03-07 08:20:24 +00:00
|
|
|
default = [];
|
2011-03-07 08:21:39 +00:00
|
|
|
example = [ "/dev" "/proc" ];
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
Directories from the host filesystem to be included
|
2016-04-25 10:00:26 +01:00
|
|
|
in the sandbox.
|
2011-03-07 08:21:39 +00:00
|
|
|
'';
|
2011-03-07 08:20:24 +00:00
|
|
|
};
|
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
extraOptions = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.lines;
|
2009-03-06 12:25:51 +00:00
|
|
|
default = "";
|
2013-10-29 16:29:37 +00:00
|
|
|
example = ''
|
2009-03-06 12:25:51 +00:00
|
|
|
gc-keep-outputs = true
|
|
|
|
gc-keep-derivations = true
|
2013-10-29 16:29:37 +00:00
|
|
|
'';
|
2012-07-20 19:58:15 +01:00
|
|
|
description = "Additional text appended to <filename>nix.conf</filename>.";
|
2009-03-06 12:25:51 +00:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
distributedBuilds = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.bool;
|
2009-03-06 12:25:51 +00:00
|
|
|
default = false;
|
2013-10-16 09:53:23 +01:00
|
|
|
description = ''
|
2009-03-06 12:25:51 +00:00
|
|
|
Whether to distribute builds to the machines listed in
|
|
|
|
<option>nix.buildMachines</option>.
|
2013-10-16 09:53:23 +01:00
|
|
|
'';
|
2010-02-19 09:48:24 +00:00
|
|
|
};
|
|
|
|
|
2009-07-18 17:14:03 +01:00
|
|
|
daemonNiceLevel = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.int;
|
2013-08-06 17:32:31 +01:00
|
|
|
default = 0;
|
2013-10-30 16:37:45 +00:00
|
|
|
description = ''
|
2009-07-24 00:25:50 +01:00
|
|
|
Nix daemon process priority. This priority propagates to build processes.
|
2015-07-07 08:48:29 +01:00
|
|
|
0 is the default Unix process priority, 19 is the lowest.
|
2013-10-30 16:37:45 +00:00
|
|
|
'';
|
2009-07-18 17:14:03 +01:00
|
|
|
};
|
|
|
|
|
2009-10-15 12:25:15 +01:00
|
|
|
daemonIONiceLevel = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.int;
|
2013-08-06 17:32:31 +01:00
|
|
|
default = 0;
|
2013-10-30 16:37:45 +00:00
|
|
|
description = ''
|
2011-09-14 19:20:50 +01:00
|
|
|
Nix daemon process I/O priority. This priority propagates to build processes.
|
2009-10-15 12:25:15 +01:00
|
|
|
0 is the default Unix process I/O priority, 7 is the lowest.
|
2013-10-30 16:37:45 +00:00
|
|
|
'';
|
2009-10-15 12:25:15 +01:00
|
|
|
};
|
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
buildMachines = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.listOf types.attrs;
|
2013-10-16 09:53:23 +01:00
|
|
|
default = [];
|
2017-03-05 13:04:47 +00:00
|
|
|
example = literalExample ''
|
|
|
|
[ { hostName = "voila.labs.cs.uu.nl";
|
|
|
|
sshUser = "nix";
|
|
|
|
sshKey = "/root/.ssh/id_buildfarm";
|
|
|
|
system = "powerpc-darwin";
|
|
|
|
maxJobs = 1;
|
|
|
|
}
|
|
|
|
{ hostName = "linux64.example.org";
|
|
|
|
sshUser = "buildfarm";
|
|
|
|
sshKey = "/root/.ssh/id_buildfarm";
|
|
|
|
system = "x86_64-linux";
|
|
|
|
maxJobs = 2;
|
|
|
|
supportedFeatures = [ "kvm" ];
|
|
|
|
mandatoryFeatures = [ "perf" ];
|
|
|
|
}
|
|
|
|
]
|
|
|
|
'';
|
2013-10-16 09:53:23 +01:00
|
|
|
description = ''
|
2009-03-06 12:25:51 +00:00
|
|
|
This option lists the machines to be used if distributed
|
|
|
|
builds are enabled (see
|
|
|
|
<option>nix.distributedBuilds</option>). Nix will perform
|
2013-08-10 22:07:13 +01:00
|
|
|
derivations on those machines via SSH by copying the inputs
|
2013-07-26 04:39:44 +01:00
|
|
|
to the Nix store on the remote machine, starting the build,
|
|
|
|
then copying the output back to the local Nix store. Each
|
|
|
|
element of the list should be an attribute set containing
|
|
|
|
the machine's host name (<varname>hostname</varname>), the
|
|
|
|
user name to be used for the SSH connection
|
2009-03-06 12:25:51 +00:00
|
|
|
(<varname>sshUser</varname>), the Nix system type
|
|
|
|
(<varname>system</varname>, e.g.,
|
2013-10-28 12:36:45 +00:00
|
|
|
<literal>"i686-linux"</literal>), the maximum number of
|
2013-07-26 04:39:44 +01:00
|
|
|
jobs to be run in parallel on that machine
|
|
|
|
(<varname>maxJobs</varname>), the path to the SSH private
|
|
|
|
key to be used to connect (<varname>sshKey</varname>), a
|
|
|
|
list of supported features of the machine
|
|
|
|
(<varname>supportedFeatures</varname>) and a list of
|
|
|
|
mandatory features of the machine
|
|
|
|
(<varname>mandatoryFeatures</varname>). The SSH private key
|
|
|
|
should not have a passphrase, and the corresponding public
|
|
|
|
key should be added to
|
2009-03-06 12:25:51 +00:00
|
|
|
<filename>~<replaceable>sshUser</replaceable>/authorized_keys</filename>
|
|
|
|
on the remote machine.
|
2013-10-16 09:53:23 +01:00
|
|
|
'';
|
2009-03-06 12:25:51 +00:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2013-09-18 04:18:34 +01:00
|
|
|
# Environment variables for running Nix.
|
2009-03-06 12:25:51 +00:00
|
|
|
envVars = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.attrs;
|
2009-03-06 12:25:51 +00:00
|
|
|
internal = true;
|
2012-06-19 04:31:07 +01:00
|
|
|
default = {};
|
|
|
|
description = "Environment variables used by Nix.";
|
2009-03-06 12:25:51 +00:00
|
|
|
};
|
2010-03-11 16:50:08 +00:00
|
|
|
|
|
|
|
nrBuildUsers = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.int;
|
2010-03-11 16:50:08 +00:00
|
|
|
description = ''
|
|
|
|
Number of <literal>nixbld</literal> user accounts created to
|
|
|
|
perform secure concurrent builds. If you receive an error
|
|
|
|
message saying that “all build users are currently in use”,
|
|
|
|
you should increase this value.
|
|
|
|
'';
|
|
|
|
};
|
2012-09-25 21:33:21 +01:00
|
|
|
|
|
|
|
readOnlyStore = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.bool;
|
2013-01-24 12:09:31 +00:00
|
|
|
default = true;
|
2012-09-25 21:33:21 +01:00
|
|
|
description = ''
|
|
|
|
If set, NixOS will enforce the immutability of the Nix store
|
|
|
|
by making <filename>/nix/store</filename> a read-only bind
|
|
|
|
mount. Nix will automatically make the store writable when
|
|
|
|
needed.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2012-11-22 10:49:47 +00:00
|
|
|
binaryCaches = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.listOf types.str;
|
2014-12-09 12:27:00 +00:00
|
|
|
default = [ https://cache.nixos.org/ ];
|
2012-11-22 10:49:47 +00:00
|
|
|
description = ''
|
|
|
|
List of binary cache URLs used to obtain pre-built binaries
|
|
|
|
of Nix packages.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
trustedBinaryCaches = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.listOf types.str;
|
2012-11-22 10:49:47 +00:00
|
|
|
default = [ ];
|
|
|
|
example = [ http://hydra.nixos.org/ ];
|
|
|
|
description = ''
|
|
|
|
List of binary cache URLs that non-root users can use (in
|
|
|
|
addition to those specified using
|
2016-08-23 11:59:17 +01:00
|
|
|
<option>nix.binaryCaches</option>) by passing
|
2012-11-22 10:49:47 +00:00
|
|
|
<literal>--option binary-caches</literal> to Nix commands.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2015-02-19 13:15:02 +00:00
|
|
|
requireSignedBinaryCaches = mkOption {
|
|
|
|
type = types.bool;
|
2015-07-27 18:28:41 +01:00
|
|
|
default = true;
|
2015-02-19 13:15:02 +00:00
|
|
|
description = ''
|
2016-03-07 19:48:14 +00:00
|
|
|
If enabled (the default), Nix will only download binaries from binary caches if
|
|
|
|
they are cryptographically signed with any of the keys listed in
|
|
|
|
<option>nix.binaryCachePublicKeys</option>. If disabled, signatures are neither
|
|
|
|
required nor checked, so it's strongly recommended that you use only
|
|
|
|
trustworthy caches and https to prevent man-in-the-middle attacks.
|
2015-02-19 13:15:02 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
binaryCachePublicKeys = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
example = [ "hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=" ];
|
|
|
|
description = ''
|
|
|
|
List of public keys used to sign binary caches. If
|
|
|
|
<option>nix.requireSignedBinaryCaches</option> is enabled,
|
|
|
|
then Nix will use a binary from a binary cache if and only
|
|
|
|
if it is signed by <emphasis>any</emphasis> of the keys
|
|
|
|
listed here. By default, only the key for
|
|
|
|
<uri>cache.nixos.org</uri> is included.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2015-06-26 17:33:01 +01:00
|
|
|
trustedUsers = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [ "root" ];
|
|
|
|
example = [ "root" "alice" "@wheel" ];
|
|
|
|
description = ''
|
|
|
|
A list of names of users that have additional rights when
|
|
|
|
connecting to the Nix daemon, such as the ability to specify
|
|
|
|
additional binary caches, or to import unsigned NARs. You
|
|
|
|
can also specify groups by prefixing them with
|
|
|
|
<literal>@</literal>; for instance,
|
|
|
|
<literal>@wheel</literal> means all users in the wheel
|
|
|
|
group.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
allowedUsers = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [ "*" ];
|
|
|
|
example = [ "@wheel" "@builders" "alice" "bob" ];
|
|
|
|
description = ''
|
|
|
|
A list of names of users (separated by whitespace) that are
|
|
|
|
allowed to connect to the Nix daemon. As with
|
|
|
|
<option>nix.trustedUsers</option>, you can specify groups by
|
|
|
|
prefixing them with <literal>@</literal>. Also, you can
|
|
|
|
allow all users by specifying <literal>*</literal>. The
|
|
|
|
default is <literal>*</literal>. Note that trusted users are
|
|
|
|
always allowed to connect.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2015-08-05 11:03:19 +01:00
|
|
|
nixPath = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default =
|
2016-08-29 16:26:01 +01:00
|
|
|
[ "nixpkgs=/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs"
|
2015-08-05 11:03:19 +01:00
|
|
|
"nixos-config=/etc/nixos/configuration.nix"
|
|
|
|
"/nix/var/nix/profiles/per-user/root/channels"
|
|
|
|
];
|
|
|
|
description = ''
|
|
|
|
The default Nix expression search path, used by the Nix
|
|
|
|
evaluator to look up paths enclosed in angle brackets
|
|
|
|
(e.g. <literal><nixpkgs></literal>).
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
};
|
2012-11-22 10:49:47 +00:00
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
};
|
2009-05-28 13:56:56 +01:00
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
|
2009-09-17 17:22:26 +01:00
|
|
|
###### implementation
|
2009-03-06 12:25:51 +00:00
|
|
|
|
2009-09-17 17:22:26 +01:00
|
|
|
config = {
|
2009-03-06 12:25:51 +00:00
|
|
|
|
2015-02-19 13:15:02 +00:00
|
|
|
nix.binaryCachePublicKeys = [ "cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=" ];
|
|
|
|
|
2013-02-26 02:15:29 +00:00
|
|
|
environment.etc."nix/nix.conf".source = nixConf;
|
|
|
|
|
|
|
|
# List of machines for distributed Nix builds in the format
|
|
|
|
# expected by build-remote.pl.
|
2013-10-16 09:57:25 +01:00
|
|
|
environment.etc."nix/machines" =
|
2013-10-16 09:53:23 +01:00
|
|
|
{ enable = cfg.buildMachines != [];
|
2013-02-26 02:15:29 +00:00
|
|
|
text =
|
|
|
|
concatMapStrings (machine:
|
2015-06-26 17:12:47 +01:00
|
|
|
"${if machine ? sshUser then "${machine.sshUser}@" else ""}${machine.hostName} "
|
2015-06-29 23:50:01 +01:00
|
|
|
+ machine.system or (concatStringsSep "," machine.systems)
|
|
|
|
+ " ${machine.sshKey or "-"} ${toString machine.maxJobs or 1} "
|
|
|
|
+ toString (machine.speedFactor or 1)
|
2013-07-26 04:39:44 +01:00
|
|
|
+ " "
|
2015-06-29 23:50:01 +01:00
|
|
|
+ concatStringsSep "," (machine.mandatoryFeatures or [] ++ machine.supportedFeatures or [])
|
2013-07-26 04:39:44 +01:00
|
|
|
+ " "
|
2015-06-29 23:50:01 +01:00
|
|
|
+ concatStringsSep "," machine.mandatoryFeatures or []
|
2013-02-26 02:15:29 +00:00
|
|
|
+ "\n"
|
|
|
|
) cfg.buildMachines;
|
|
|
|
};
|
2009-09-17 17:22:26 +01:00
|
|
|
|
2014-04-17 17:52:31 +01:00
|
|
|
systemd.packages = [ nix ];
|
2009-09-17 17:22:26 +01:00
|
|
|
|
2014-04-18 13:47:02 +01:00
|
|
|
systemd.sockets.nix-daemon.wantedBy = [ "sockets.target" ];
|
|
|
|
|
2014-04-17 17:52:31 +01:00
|
|
|
systemd.services.nix-daemon =
|
2015-08-21 18:39:40 +01:00
|
|
|
{ path = [ nix pkgs.openssl.bin pkgs.utillinux config.programs.ssh.package ]
|
2014-02-20 19:17:30 +00:00
|
|
|
++ optionals cfg.distributedBuilds [ pkgs.gzip ];
|
2011-11-25 16:32:54 +00:00
|
|
|
|
2014-11-29 19:53:13 +00:00
|
|
|
environment = cfg.envVars
|
2016-01-29 01:32:05 +00:00
|
|
|
// { CURL_CA_BUNDLE = "/etc/ssl/certs/ca-certificates.crt"; }
|
2014-11-29 19:53:13 +00:00
|
|
|
// config.networking.proxy.envVars;
|
2009-03-06 12:25:51 +00:00
|
|
|
|
2015-10-22 18:50:12 +01:00
|
|
|
unitConfig.RequiresMountsFor = "/nix/store";
|
|
|
|
|
2012-06-19 04:31:07 +01:00
|
|
|
serviceConfig =
|
2014-04-17 17:52:31 +01:00
|
|
|
{ Nice = cfg.daemonNiceLevel;
|
2012-10-01 21:27:42 +01:00
|
|
|
IOSchedulingPriority = cfg.daemonIONiceLevel;
|
|
|
|
LimitNOFILE = 4096;
|
|
|
|
};
|
2013-02-26 02:15:29 +00:00
|
|
|
|
|
|
|
restartTriggers = [ nixConf ];
|
2009-09-17 17:22:26 +01:00
|
|
|
};
|
2012-10-01 21:27:42 +01:00
|
|
|
|
2012-06-19 04:31:07 +01:00
|
|
|
nix.envVars =
|
|
|
|
{ NIX_CONF_DIR = "/etc/nix";
|
2017-03-03 14:55:27 +00:00
|
|
|
}
|
2012-06-19 04:31:07 +01:00
|
|
|
|
2017-03-03 14:55:27 +00:00
|
|
|
// optionalAttrs (!isNix112) {
|
2013-10-16 09:57:25 +01:00
|
|
|
# Enable the copy-from-other-stores substituter, which allows
|
|
|
|
# builds to be sped up by copying build results from remote
|
|
|
|
# Nix stores. To do this, mount the remote file system on a
|
|
|
|
# subdirectory of /run/nix/remote-stores.
|
|
|
|
NIX_OTHER_STORES = "/run/nix/remote-stores/*/nix";
|
2012-06-19 04:31:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// optionalAttrs cfg.distributedBuilds {
|
2017-03-03 14:42:53 +00:00
|
|
|
NIX_BUILD_HOOK =
|
2017-03-03 14:55:27 +00:00
|
|
|
if isNix112 then
|
2017-03-03 14:42:53 +00:00
|
|
|
"${nix}/libexec/nix/build-remote"
|
|
|
|
else
|
|
|
|
"${nix}/libexec/nix/build-remote.pl";
|
2012-06-19 04:31:07 +01:00
|
|
|
};
|
2009-07-16 15:51:49 +01:00
|
|
|
|
2013-09-18 04:18:34 +01:00
|
|
|
# Set up the environment variables for running Nix.
|
2015-08-05 11:03:19 +01:00
|
|
|
environment.sessionVariables = cfg.envVars //
|
|
|
|
{ NIX_PATH = concatStringsSep ":" cfg.nixPath;
|
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2013-09-18 04:18:34 +01:00
|
|
|
environment.extraInit =
|
|
|
|
''
|
2009-09-17 17:22:26 +01:00
|
|
|
# Set up secure multi-user builds: non-root users build through the
|
|
|
|
# Nix daemon.
|
2013-11-27 11:41:43 +00:00
|
|
|
if [ "$USER" != root -o ! -w /nix/var/nix/db ]; then
|
2009-09-17 17:22:26 +01:00
|
|
|
export NIX_REMOTE=daemon
|
|
|
|
fi
|
|
|
|
'';
|
|
|
|
|
2015-02-16 10:57:36 +00:00
|
|
|
nix.nrBuildUsers = mkDefault (lib.max 10 cfg.maxJobs);
|
|
|
|
|
2015-03-10 01:04:40 +00:00
|
|
|
users.extraUsers = nixbldUsers;
|
|
|
|
|
|
|
|
services.xserver.displayManager.hiddenUsers = map ({ name, ... }: name) nixbldUsers;
|
2010-03-11 16:50:08 +00:00
|
|
|
|
2010-09-13 16:41:38 +01:00
|
|
|
system.activationScripts.nix = stringAfter [ "etc" "users" ]
|
|
|
|
''
|
|
|
|
# Nix initialisation.
|
|
|
|
mkdir -m 0755 -p \
|
2011-10-30 15:19:58 +00:00
|
|
|
/nix/var/nix/gcroots \
|
2014-04-18 17:37:07 +01:00
|
|
|
/nix/var/nix/temproots \
|
2011-10-30 15:19:58 +00:00
|
|
|
/nix/var/nix/manifests \
|
2014-04-18 17:37:07 +01:00
|
|
|
/nix/var/nix/userpool \
|
2011-10-30 15:19:58 +00:00
|
|
|
/nix/var/nix/profiles \
|
|
|
|
/nix/var/nix/db \
|
|
|
|
/nix/var/log/nix/drvs \
|
2014-04-18 17:37:07 +01:00
|
|
|
/nix/var/nix/channel-cache
|
2012-09-28 15:59:58 +01:00
|
|
|
mkdir -m 1777 -p \
|
|
|
|
/nix/var/nix/gcroots/per-user \
|
|
|
|
/nix/var/nix/profiles/per-user \
|
|
|
|
/nix/var/nix/gcroots/tmp
|
2010-09-13 16:41:38 +01:00
|
|
|
'';
|
|
|
|
|
2009-09-17 17:22:26 +01:00
|
|
|
};
|
2009-05-28 13:56:56 +01:00
|
|
|
|
2009-03-06 12:25:51 +00:00
|
|
|
}
|