about summary refs log tree commit diff
diff options
context:
space:
mode:
-rw-r--r--ci/scripts/build-briefcase.sh6
-rw-r--r--default.nix1
-rw-r--r--nixos/socrates/default.nix2
3 files changed, 7 insertions, 2 deletions
diff --git a/ci/scripts/build-briefcase.sh b/ci/scripts/build-briefcase.sh
new file mode 100644
index 000000000000..dfe8286502d5
--- /dev/null
+++ b/ci/scripts/build-briefcase.sh
@@ -0,0 +1,6 @@
+set -euo pipefail
+
+nix-build . \
+  -I briefcase="$(pwd)" \
+  -I nixpkgs=/home/wpcarro/nixpkgs-channel \
+  --show-trace
diff --git a/default.nix b/default.nix
index 25a54f3ca675..319ecc866061 100644
--- a/default.nix
+++ b/default.nix
@@ -29,7 +29,6 @@ in {
   website      = readTree ./website;
   lisp         = readTree ./lisp;
   gopkgs       = readTree ./gopkgs;
-  monzo_ynab   = readTree ./monzo_ynab;
   third_party  = readTree ./third_party;
   tools        = readTree ./tools;
   buildHaskell = readTree ./buildHaskell;
diff --git a/nixos/socrates/default.nix b/nixos/socrates/default.nix
index ebb62036bd8f..3891123850d5 100644
--- a/nixos/socrates/default.nix
+++ b/nixos/socrates/default.nix
@@ -118,7 +118,7 @@ in {
   # systemd.services.monzo-token-server = {
   #   enable = true;
   #   description = "Ensure my Monzo access token is valid";
-  #   script = "${briefcase.monzo_ynab.tokens}/bin/token-server";
+  #   script = "${briefcase.tools.monzo_ynab.tokens}/bin/token-server";
   #   # TODO(wpcarro): I'm unsure of the size of this security risk, but if a
   #   # non-root user runs `systemctl cat monzo-token-server`, they could read the
   #   # following, sensitive environment variables.