From 94154606cb011a53bfd81b52dbc60cbdf416371e Mon Sep 17 00:00:00 2001 From: tv Date: Sat, 27 Feb 2016 15:13:10 +0100 Subject: tv wu-binary-cache: init --- tv/2configs/wu-binary-cache/client.nix | 7 +++++++ tv/2configs/wu-binary-cache/default.nix | 25 +++++++++++++++++++++++++ 2 files changed, 32 insertions(+) create mode 100644 tv/2configs/wu-binary-cache/client.nix create mode 100644 tv/2configs/wu-binary-cache/default.nix (limited to 'tv/2configs/wu-binary-cache') diff --git a/tv/2configs/wu-binary-cache/client.nix b/tv/2configs/wu-binary-cache/client.nix new file mode 100644 index 00000000..9634c21d --- /dev/null +++ b/tv/2configs/wu-binary-cache/client.nix @@ -0,0 +1,7 @@ +_: +{ + nix = { + binaryCaches = ["http://cache.wu.gg23"]; + binaryCachePublicKeys = ["cache.wu-1:cdhA201O2R2Ect463vhJFmhpMaNyT/tOvzYvtceT9q8="]; + }; +} diff --git a/tv/2configs/wu-binary-cache/default.nix b/tv/2configs/wu-binary-cache/default.nix new file mode 100644 index 00000000..6fcac21a --- /dev/null +++ b/tv/2configs/wu-binary-cache/default.nix @@ -0,0 +1,25 @@ +{ config, lib, pkgs, ... }: with config.krebs.lib; +{ + services.nix-serve = assert config.krebs.build.host.name == "wu"; { + enable = true; + secretKeyFile = config.krebs.secret.files.nix-serve-key.path; + }; + systemd.services.nix-serve = { + requires = ["secret.service"]; + after = ["secret.service"]; + }; + krebs.secret.files.nix-serve-key = { + path = "/run/secret/nix-serve.key"; + owner.name = "nix-serve"; + source-path = toString + "/nix-serve.key"; + }; + krebs.nginx = { + enable = true; + servers.nix-serve = { + server-names = [ "cache.wu.gg23" ]; + locations = singleton (nameValuePair "/" '' + proxy_pass http://localhost:${toString config.services.nix-serve.port}; + ''); + }; + }; +} -- cgit v1.2.3