106 lines
4.5 KiB
Nix
106 lines
4.5 KiB
Nix
{
|
|
description = "Forgejo CI Runners";
|
|
|
|
inputs = {
|
|
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.05";
|
|
srvos.url = "github:numtide/srvos";
|
|
disko.url = "github:nix-community/disko";
|
|
cachix-deploy-flake.url = "github:cachix/cachix-deploy-flake";
|
|
flake-utils.url = "github:numtide/flake-utils";
|
|
# sops-nix - secrets with mozilla sops
|
|
# https://github.com/Mic92/sops-nix
|
|
sops-nix = {
|
|
url = "github:Mic92/sops-nix";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
};
|
|
|
|
outputs = { self, sops-nix, nixpkgs, srvos, disko, cachix-deploy-flake, flake-utils, ... }@inputs:
|
|
flake-utils.lib.eachDefaultSystem (
|
|
system: {
|
|
defaultPackage = let
|
|
pkgs = import nixpkgs { inherit system; };
|
|
cachix-deploy-lib = cachix-deploy-flake.lib pkgs;
|
|
in
|
|
cachix-deploy-lib.spec
|
|
{
|
|
agents = {
|
|
"fj-hetzner-aarch64-01" = cachix-deploy-lib.nixos {
|
|
# system = "aarch64-linux";
|
|
imports = [
|
|
sops-nix.nixosModules.sops
|
|
srvos.nixosModules.hardware-hetzner-cloud
|
|
srvos.nixosModules.server
|
|
srvos.nixosModules.mixins-systemd-boot
|
|
disko.nixosModules.disko
|
|
./agents/fj-hetzner-aarch64.nix
|
|
(import ./disko-hetzner-cloud.nix { disks = [ "/dev/sda" ]; })
|
|
{
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
networking.hostName = "fj-hetzner-aarch64-01";
|
|
users.users.root.openssh.authorizedKeys.keys =
|
|
[
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBsUe5YF5z8vGcEYtQX7AAiw2rJygGf2l7xxr8nZZa7w jahanson@legiondary"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJyA/yMPPo+scxBaDFUk7WeEyMAMhXUro5vi4feOKsJT jahanson@durincore"
|
|
];
|
|
services.openssh.enable = true;
|
|
services.openssh.settings.PermitRootLogin = "without-password";
|
|
}];
|
|
};
|
|
"fj-shadowfax-01" = cachix-deploy-lib.nixos {
|
|
# system = "x86_64-linux";
|
|
imports = [
|
|
sops-nix.nixosModules.sops
|
|
./hardware/shadowfax-kubevirt.nix
|
|
srvos.nixosModules.server
|
|
srvos.nixosModules.mixins-systemd-boot
|
|
disko.nixosModules.disko
|
|
./agents/fj-shadowfax-x86_64.nix
|
|
(import ./disko-shadowfax-kubevirt.nix { disks = [ "/dev/sda" ]; })
|
|
{
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
networking.hostName = "fj-shadowfax-01";
|
|
users.users.root.openssh.authorizedKeys.keys =
|
|
[
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBsUe5YF5z8vGcEYtQX7AAiw2rJygGf2l7xxr8nZZa7w jahanson@legiondary"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJyA/yMPPo+scxBaDFUk7WeEyMAMhXUro5vi4feOKsJT jahanson@durincore"
|
|
];
|
|
services.openssh.enable = true;
|
|
services.openssh.settings.PermitRootLogin = "without-password";
|
|
}];
|
|
};
|
|
"fj-shadowfax-02" = cachix-deploy-lib.nixos {
|
|
# system = "x86_64-linux";
|
|
imports = [
|
|
sops-nix.nixosModules.sops
|
|
./hardware/shadowfax-kubevirt.nix
|
|
srvos.nixosModules.server
|
|
srvos.nixosModules.mixins-systemd-boot
|
|
disko.nixosModules.disko
|
|
./agents/fj-shadowfax-x86_64.nix
|
|
(import ./disko-shadowfax-kubevirt.nix { disks = [ "/dev/sda" ]; })
|
|
{
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
networking.hostName = "fj-shadowfax-02";
|
|
users.users.root.openssh.authorizedKeys.keys =
|
|
[
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBsUe5YF5z8vGcEYtQX7AAiw2rJygGf2l7xxr8nZZa7w jahanson@legiondary"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJyA/yMPPo+scxBaDFUk7WeEyMAMhXUro5vi4feOKsJT jahanson@durincore"
|
|
];
|
|
services.openssh.enable = true;
|
|
services.openssh.settings.PermitRootLogin = "without-password";
|
|
}];
|
|
};
|
|
};
|
|
};
|
|
});
|
|
# Convenience output that aggregates the outputs for home, nixos.
|
|
# Also used in ci to build targets generally.
|
|
# top =
|
|
# let
|
|
# nixtop = nixpkgs.lib.genAttrs
|
|
# (builtins.attrNames inputs.self.nixosConfigurations)
|
|
# (attr: inputs.self.nixosConfigurations.${attr}.config.system.build.toplevel);
|
|
# in
|
|
# nixtop;
|
|
}
|