Improve nix settings for sandboxed workspaces
All checks were successful
Check Flake / check-flake (push) Successful in 1m15s
All checks were successful
Check Flake / check-flake (push) Successful in 1m15s
This commit is contained in:
@@ -114,6 +114,7 @@ in
|
|||||||
|
|
||||||
# Enable flakes
|
# Enable flakes
|
||||||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
||||||
|
nix.settings.trusted-users = [ "googlebot" ];
|
||||||
|
|
||||||
# Make nixpkgs available in NIX_PATH and registry (like the NixOS ISO)
|
# Make nixpkgs available in NIX_PATH and registry (like the NixOS ISO)
|
||||||
# This allows `nix-shell -p`, `nix repl '<nixpkgs>'`, etc. to work
|
# This allows `nix-shell -p`, `nix repl '<nixpkgs>'`, etc. to work
|
||||||
|
|||||||
@@ -32,6 +32,9 @@ let
|
|||||||
networking.useHostResolvConf = false;
|
networking.useHostResolvConf = false;
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
|
||||||
|
# Incus containers don't support the kernel features nix sandbox requires
|
||||||
|
nix.settings.sandbox = false;
|
||||||
|
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
(lib.hiPrio (pkgs.writeShellScriptBin "claude" ''
|
(lib.hiPrio (pkgs.writeShellScriptBin "claude" ''
|
||||||
exec ${pkgs.claude-code}/bin/claude --dangerously-skip-permissions "$@"
|
exec ${pkgs.claude-code}/bin/claude --dangerously-skip-permissions "$@"
|
||||||
|
|||||||
Reference in New Issue
Block a user