Skip to content

Commit 9a44b3e

Browse files
danieldkdrbh
authored andcommitted
Disable Cachix pushes
This is not safe until we have sandboxed builds. For TGI alone this might not be a huge issue, but with Cachix caching disabled in hf-nix, TGI CI would build all the packages and push it to our cache.
1 parent 8801ba1 commit 9a44b3e

File tree

3 files changed

+5
-3
lines changed

3 files changed

+5
-3
lines changed

.github/workflows/nix_build.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ jobs:
2323
with:
2424
name: huggingface
2525
# If you chose signing key for write access
26-
authToken: '${{ secrets.CACHIX_AUTH_TOKEN }}'
26+
# authToken: '${{ secrets.CACHIX_AUTH_TOKEN }}'
2727
env:
2828
USER: github_runner
2929
- name: Build

.github/workflows/nix_cache.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ jobs:
2222
with:
2323
name: huggingface
2424
# If you chose signing key for write access
25-
authToken: "${{ secrets.CACHIX_AUTH_TOKEN }}"
25+
#authToken: "${{ secrets.CACHIX_AUTH_TOKEN }}"
2626
env:
2727
USER: github_runner
2828
- name: Build impure devshell

.github/workflows/nix_tests.yaml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,11 @@ jobs:
2727
with:
2828
name: huggingface
2929
# If you chose signing key for write access
30-
authToken: '${{ secrets.CACHIX_AUTH_TOKEN }}'
30+
#authToken: '${{ secrets.CACHIX_AUTH_TOKEN }}'
3131
env:
3232
USER: github_runner
33+
- name: Nix info
34+
run: nix-shell -p nix-info --run "nix-info -m"
3335
- name: Build
3436
run: nix develop .#test --command echo "Ok"
3537
- name: Pre-commit tests.

0 commit comments

Comments
 (0)