diff --git a/ci/scripts/build-briefcase.sh b/ci/scripts/build-briefcase.sh new file mode 100644 index 000000000..dfe828650 --- /dev/null +++ b/ci/scripts/build-briefcase.sh @@ -0,0 +1,6 @@ +set -euo pipefail + +nix-build . \ + -I briefcase="$(pwd)" \ + -I nixpkgs=/home/wpcarro/nixpkgs-channel \ + --show-trace diff --git a/default.nix b/default.nix index 25a54f3ca..319ecc866 100644 --- a/default.nix +++ b/default.nix @@ -29,7 +29,6 @@ in { website = readTree ./website; lisp = readTree ./lisp; gopkgs = readTree ./gopkgs; - monzo_ynab = readTree ./monzo_ynab; third_party = readTree ./third_party; tools = readTree ./tools; buildHaskell = readTree ./buildHaskell; diff --git a/nixos/socrates/default.nix b/nixos/socrates/default.nix index ebb62036b..389112385 100644 --- a/nixos/socrates/default.nix +++ b/nixos/socrates/default.nix @@ -118,7 +118,7 @@ in { # systemd.services.monzo-token-server = { # enable = true; # description = "Ensure my Monzo access token is valid"; - # script = "${briefcase.monzo_ynab.tokens}/bin/token-server"; + # script = "${briefcase.tools.monzo_ynab.tokens}/bin/token-server"; # # TODO(wpcarro): I'm unsure of the size of this security risk, but if a # # non-root user runs `systemctl cat monzo-token-server`, they could read the # # following, sensitive environment variables.