2024-05-28 23:23:10 +00:00
|
|
|
# SPDX-FileCopyrightText: 2024 Auxolotl Infrastructure Contributors
|
|
|
|
#
|
|
|
|
# SPDX-License-Identifier: GPL-3.0-only
|
|
|
|
|
2024-05-21 20:38:54 +00:00
|
|
|
# baxter
|
|
|
|
# 209.38.149.197
|
|
|
|
{
|
|
|
|
pkgs,
|
|
|
|
modulesPath,
|
2024-07-02 22:46:30 +00:00
|
|
|
config,
|
2024-05-21 20:38:54 +00:00
|
|
|
...
|
|
|
|
}: {
|
|
|
|
imports = [
|
|
|
|
(modulesPath + "/virtualisation/digital-ocean-config.nix")
|
|
|
|
];
|
|
|
|
|
2024-07-02 22:46:30 +00:00
|
|
|
age.rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM4rfWCoqby2qIcq/KVEWCKZVvIxr6h4GxJcsCQYffj+";
|
|
|
|
|
2024-05-21 20:38:54 +00:00
|
|
|
boot.loader.grub.enable = true;
|
|
|
|
|
|
|
|
virtualisation.digitalOcean.rebuildFromUserData = false;
|
|
|
|
|
|
|
|
networking.firewall.allowedTCPPorts = [
|
|
|
|
80
|
|
|
|
443
|
|
|
|
];
|
|
|
|
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
|
|
neovim
|
|
|
|
];
|
|
|
|
|
|
|
|
auxolotl = {
|
|
|
|
nix.enable = true;
|
|
|
|
|
|
|
|
users.infra.enable = true;
|
|
|
|
|
|
|
|
security = {
|
|
|
|
doas.enable = true;
|
|
|
|
|
|
|
|
acme = {
|
|
|
|
enable = true;
|
|
|
|
email = "jake.hamilton@hey.com";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services = {
|
|
|
|
ssh.enable = true;
|
|
|
|
forge.enable = true;
|
2024-07-02 22:46:30 +00:00
|
|
|
|
|
|
|
ci = {
|
|
|
|
master = {
|
|
|
|
enable = true;
|
|
|
|
|
|
|
|
tokenFile = config.age.secrets."services.ci.master.tokenFile".path;
|
|
|
|
webhookSecretFile = config.age.secrets."services.ci.master.webhookSecretFile".path;
|
|
|
|
oauth = {
|
|
|
|
clientId = "76e70591-79a6-4a2f-8319-317f46800519";
|
|
|
|
clientSecretFile = config.age.secrets."services.ci.master.oauth.clientSecretFile".path;
|
|
|
|
};
|
|
|
|
|
|
|
|
workersFile = config.age.secrets."services.ci.master.workersFile.json".path;
|
|
|
|
};
|
|
|
|
worker = {
|
|
|
|
enable = true;
|
|
|
|
workerPasswordFile = config.age.secrets."services.ci.worker.workerPasswordFile".path;
|
|
|
|
};
|
|
|
|
};
|
2024-05-21 20:38:54 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-07-28 08:54:30 +00:00
|
|
|
clicks.networking.tailscale = {
|
|
|
|
enable = true;
|
|
|
|
server = "vpn.auxolotl.org";
|
|
|
|
authKeyFile = config.age.secrets."clicks.networking.tailscale.authKeyFile".path;
|
|
|
|
};
|
|
|
|
|
|
|
|
age.secrets."clicks.networking.tailscale.authKeyFile" = {
|
|
|
|
rekeyFile = ./clicks.networking.tailscale.authKeyFile.age;
|
|
|
|
unstableName = true;
|
|
|
|
};
|
|
|
|
|
2024-07-02 22:46:30 +00:00
|
|
|
age.secrets."services.ci.master.tokenFile" = {
|
|
|
|
rekeyFile = ./services.ci.master.tokenFile.age;
|
|
|
|
group = "buildbot";
|
|
|
|
};
|
|
|
|
age.secrets."services.ci.master.webhookSecretFile" = {
|
|
|
|
generator.script = "alnum";
|
|
|
|
group = "buildbot";
|
|
|
|
};
|
|
|
|
age.secrets."services.ci.master.oauth.clientSecretFile" = {
|
|
|
|
rekeyFile = ./services.ci.master.oauth.clientSecretFile.age;
|
|
|
|
group = "buildbot";
|
|
|
|
};
|
|
|
|
age.secrets."services.ci.master.workersFile.json" = {
|
|
|
|
rekeyFile = ./services.ci.master.workersFile.json.age;
|
|
|
|
group = "buildbot";
|
|
|
|
};
|
|
|
|
|
|
|
|
age.secrets."services.ci.worker.workerPasswordFile" = {
|
|
|
|
generator.script = "alnum";
|
|
|
|
group = "buildbot";
|
|
|
|
};
|
|
|
|
|
2024-05-21 20:38:54 +00:00
|
|
|
system.stateVersion = "23.11";
|
|
|
|
}
|