CI: Nix-dev-env-{main,macOS}: pin Nixpkgs rev

To avoid contribution loop problems, since we pin Nixpkgs in default.nix - it is
logical by default CI to follow the supported way of building.

The downside is - the maintainer would need to solve Nix issus when one tries to
update the Nixpkgs revision.
This commit is contained in:
Anton-Latukha 2020-09-29 23:16:17 +03:00
parent 2cd2db93d0
commit 245594db87
No known key found for this signature in database
GPG Key ID: 3D84C07E91802E41
2 changed files with 2 additions and 5 deletions

View File

@ -13,7 +13,7 @@ on:
env:
rev: "nixos-unstable"
# rev: "nixos-unstable" # 2020-09-29: NOTE: HNix default.nix currently pins the rev
cachixAccount: "hnix"
CACHIX_SIGNING_KEY: ${{ secrets.CACHIX_SIGNING_KEY }}

View File

@ -22,7 +22,7 @@ env:
### and the other part of keys explained in `build.sh`, since those address external procedures aound the builds.
### Additional documentation is in Nixpkgs Haskell.lib: https://github.com/NixOS/nixpkgs/blob/master/pkgs/development/haskell-modules/lib.nix
###
rev: "nixos-unstable"
# rev: "nixos-unstable" # 2020-09-29: NOTE: HNix default.nix currently pins the rev
cachixAccount: "hnix"
CACHIX_SIGNING_KEY: ${{ secrets.CACHIX_SIGNING_KEY }}
allowInconsistentDependencies: "false"
@ -56,7 +56,6 @@ env:
jobs:
# NOTE: Basic example
build10:
name: "NixOS-unstable channel, strict build, default GHC (8.8)"
runs-on: ubuntu-latest
@ -76,7 +75,6 @@ jobs:
signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}'
- name: Determined Nix-build
env:
rev: "nixos-unstable"
buildStrictly: "true"
run: ./build.sh
@ -99,7 +97,6 @@ jobs:
signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}'
- name: Determined Nix-build
env:
rev: "nixos-unstable"
compiler: "ghc8101"
buildFromSdist: "true"
linkWithGold: "true"