58 lines
1.8 KiB
Nix
58 lines
1.8 KiB
Nix
|
{
|
||
|
description = "Forgejo CI Runners";
|
||
|
|
||
|
inputs = {
|
||
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
|
||
|
srvos.url = "github:numtide/srvos";
|
||
|
disko.url = "github:nix-community/disko";
|
||
|
# sops-nix - secrets with mozilla sops
|
||
|
# https://github.com/Mic92/sops-nix
|
||
|
sops-nix = {
|
||
|
url = "github:Mic92/sops-nix";
|
||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
nixConfig = {
|
||
|
extra-substituters = [
|
||
|
"https://nix-community.cachix.org"
|
||
|
"https://hsndev.cachix.org"
|
||
|
];
|
||
|
extra-trusted-public-keys = [
|
||
|
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
|
||
|
"hsndev.cachix.org-1:vN1/XGBZtMLnTFYDmTLDrullgZHSUYY3Kqt+Yg/C+tE="
|
||
|
];
|
||
|
};
|
||
|
|
||
|
outputs = { self, sops-nix, nixpkgs, srvos, disko, ... }@inputs:
|
||
|
let
|
||
|
linuxMachineName = "linux";
|
||
|
sshPubKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBsUe5YF5z8vGcEYtQX7AAiw2rJygGf2l7xxr8nZZa7w";
|
||
|
lib = nixpkgs.lib;
|
||
|
inherit (self) outputs;
|
||
|
in {
|
||
|
nixosConfigurations =
|
||
|
{
|
||
|
"aarch64-linux" = lib.nixosSystem {
|
||
|
system = "aarch64-linux";
|
||
|
specialArgs = {inherit inputs outputs;};
|
||
|
modules = [
|
||
|
inputs.sops-nix.nixosModules.sops
|
||
|
srvos.nixosModules.hardware-hetzner-cloud
|
||
|
srvos.nixosModules.server
|
||
|
srvos.nixosModules.mixins-systemd-boot
|
||
|
disko.nixosModules.disko
|
||
|
./agents/linux.nix
|
||
|
(import ./disko-hetzner-cloud.nix { disks = [ "/dev/sda" ]; })
|
||
|
{
|
||
|
boot.loader.efi.canTouchEfiVariables = true;
|
||
|
networking.hostName = "aarch64-linux";
|
||
|
users.users.root.openssh.authorizedKeys.keys = [ sshPubKey ];
|
||
|
services.openssh.enable = true;
|
||
|
services.openssh.settings.PermitRootLogin = "without-password";
|
||
|
}];
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
}
|