fix(hive): misc fixes regarding the nixpkgs usage

Previously, we were using <nixpkgs> actually, we fixed liminix and this
file to ensure that we are instantiating the right nixpkgs.

This helps to deal with unexpected mass rebuilds.

Signed-off-by: Ryan Lahfa <ryan@dgnum.eu>
This commit is contained in:
Ryan Lahfa 2024-09-08 00:50:29 +02:00
parent 9b3a6c716b
commit 180da3a14a

View file

@ -48,11 +48,8 @@ let
name = "nixos-${v}"; name = "nixos-${v}";
}; };
# Instanciate a specialized version of nixpkgs mkNixpkgsConfigPerSystem =
mkSystemNixpkgs = system: _:
system: version:
let
args =
if system == "nixos" then if system == "nixos" then
{ } { }
else else
@ -66,6 +63,12 @@ let
]; ];
}; };
}; };
# Instanciate a specialized version of nixpkgs
mkSystemNixpkgs =
system: version:
let
args = mkNixpkgsConfigPerSystem system version;
in in
import (mkNixpkgs' version) args; import (mkNixpkgs' version) args;
@ -97,19 +100,31 @@ in
{ {
registry = { registry = {
zyxel-nwa50ax = { zyxel-nwa50ax = {
evalConfig = import "${sources.liminix}/lib/eval-config.nix" { nixpkgs = sources.nixos-unstable; }; evalConfig = import "${sources.liminix}/lib/eval-config.nix" {
nixpkgs = sources.nixos-unstable;
};
defaults = _: { defaults = _: {
nixpkgs.hostPlatform = { nixpkgs = {
source = sources.nixos-unstable;
config = {
allowUnsupportedSystem = true; # mipsel
permittedInsecurePackages = [
"python-2.7.18.8" # Python < 3 is needed for kernel backports.
];
};
hostPlatform = {
config = "mipsel-unknown-linux-musl"; config = "mipsel-unknown-linux-musl";
gcc = { gcc = {
abi = "32"; abi = "32";
arch = "mips32"; # mips32r2? arch = "mips32"; # mips32r2?
}; };
}; };
# It's impure, but who cares? # It's impure, but who cares?
# Can Flakes do that? # Can Flakes do that?
nixpkgs.buildPlatform = builtins.currentSystem; buildPlatform = builtins.currentSystem;
};
}; };
}; };