Find a file
2021-10-18 15:46:35 +02:00
nix Initial commit 2021-10-17 02:09:38 +02:00
peerix testing the wrong thing gives wrong test result. 2021-10-18 15:46:35 +02:00
.envrc Initial commit 2021-10-17 02:09:38 +02:00
.gitignore Make default.nix work. 2021-10-17 12:14:55 +02:00
COPYING Add GPL to the application 2021-10-17 16:14:07 +02:00
default.nix Make sure nix-serve and nix are in path. 2021-10-17 13:35:23 +02:00
module.nix Autostart peerix. 2021-10-18 15:29:00 +02:00
README.md Better table 2021-10-17 15:57:57 +02:00
requirements.txt some better broadcasting. 2021-10-17 02:57:44 +02:00
setup.py Actually include some packages 2021-10-17 12:57:12 +02:00
shell.nix Initial commit 2021-10-17 02:09:38 +02:00
VERSION Implement modules. 2021-10-17 12:01:40 +02:00

Peerix

Peerix is a peer-to-peer binary cache for nix derivations. Every participating node can pull derivations from each other instances' respective nix-stores.

How does it work?

Peerix implements a nix binary cache. When the nix package manager queries peerix, peerix will ask the network if any other peerix instances hold the package, and if some other instance holds the derivation, it will download the derivation from that instance.

Installation

There is a nix-module located at module.nix that configures your nixos-installation to automatically use peernix.

These Options exist:

Option Description
services.peerix.enable Enables Peerix
services.peerix.openFirewall Open the neccessary firewall ports.
services.peerix.user What user should the peerix service run under.
services.peerix.group What group should the peerix service run under.
services.peerix.privateKeyFile A path to the file that contains the path to the private key to sign your derivations.
services.peerix.publicKeyFile A path to the file that contains the path to the public key so nix can verify the signature.

To sign the peerix cache, you can use nix-store --generate-binary-cache-key to create keys to verify authenticity of the packages in each nix-store.