diff options
-rw-r--r-- | ci/scripts/build-briefcase.sh | 6 | ||||
-rw-r--r-- | default.nix | 1 | ||||
-rw-r--r-- | nixos/socrates/default.nix | 2 |
3 files changed, 7 insertions, 2 deletions
diff --git a/ci/scripts/build-briefcase.sh b/ci/scripts/build-briefcase.sh new file mode 100644 index 000000000000..dfe8286502d5 --- /dev/null +++ b/ci/scripts/build-briefcase.sh @@ -0,0 +1,6 @@ +set -euo pipefail + +nix-build . \ + -I briefcase="$(pwd)" \ + -I nixpkgs=/home/wpcarro/nixpkgs-channel \ + --show-trace diff --git a/default.nix b/default.nix index 25a54f3ca675..319ecc866061 100644 --- a/default.nix +++ b/default.nix @@ -29,7 +29,6 @@ in { website = readTree ./website; lisp = readTree ./lisp; gopkgs = readTree ./gopkgs; - monzo_ynab = readTree ./monzo_ynab; third_party = readTree ./third_party; tools = readTree ./tools; buildHaskell = readTree ./buildHaskell; diff --git a/nixos/socrates/default.nix b/nixos/socrates/default.nix index ebb62036bd8f..3891123850d5 100644 --- a/nixos/socrates/default.nix +++ b/nixos/socrates/default.nix @@ -118,7 +118,7 @@ in { # systemd.services.monzo-token-server = { # enable = true; # description = "Ensure my Monzo access token is valid"; - # script = "${briefcase.monzo_ynab.tokens}/bin/token-server"; + # script = "${briefcase.tools.monzo_ynab.tokens}/bin/token-server"; # # TODO(wpcarro): I'm unsure of the size of this security risk, but if a # # non-root user runs `systemctl cat monzo-token-server`, they could read the # # following, sensitive environment variables. |