woodpecker-switch #22
3 changed files with 82 additions and 1 deletions
|
@ -1,5 +1,5 @@
|
||||||
_: {
|
_: {
|
||||||
imports = [
|
imports = [
|
||||||
./forgejo-runners.nix
|
./woodpecker.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
43
hosts/tsuru/services/tailscale.nix
Normal file
43
hosts/tsuru/services/tailscale.nix
Normal file
|
@ -0,0 +1,43 @@
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
sops.secrets.tsauth-tsuru = {
|
||||||
|
sopsFile = ../../../secrets/tailscale/secrets.yaml;
|
||||||
|
};
|
||||||
|
environment.systemPackages = [pkgs.jq pkgs.tailscale];
|
||||||
|
services.tailscale = {
|
||||||
|
useRoutingFeatures = lib.mkDefault "client";
|
||||||
|
};
|
||||||
|
networking.firewall.allowedUDPPorts = [config.services.tailscale.port];
|
||||||
|
networking.firewall.trustedInterfaces = [config.services.tailscale.interfaceName];
|
||||||
|
|
||||||
|
systemd.services.tailscale-autoconnect = {
|
||||||
|
description = "Automatic connection to Tailscale";
|
||||||
|
|
||||||
|
# make sure tailscale is running before trying to connect to tailscale
|
||||||
|
after = ["network-pre.target" "tailscale.service"];
|
||||||
|
wants = ["network-pre.target" "tailscale.service"];
|
||||||
|
wantedBy = ["multi-user.target"];
|
||||||
|
|
||||||
|
# set this service as a oneshot job
|
||||||
|
serviceConfig.Type = "oneshot";
|
||||||
|
|
||||||
|
# have the job run this shell script
|
||||||
|
script = with pkgs; ''
|
||||||
|
# wait for tailscaled to settle
|
||||||
|
sleep 2
|
||||||
|
|
||||||
|
# check if we are already authenticated to tailscale
|
||||||
|
status="$(${tailscale}/bin/tailscale status -json | ${jq}/bin/jq -r .BackendState)"
|
||||||
|
if [ $status = "Running" ]; then # if so, then do nothing
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
# otherwise authenticate with tailscale
|
||||||
|
${tailscale}/bin/tailscale up -authkey file:${config.sops.secrets.tsauth-tsuru.path} --exit-node=100.104.42.96 --exit-node-allow-lan-access=true --accept-dns=false
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
38
hosts/tsuru/services/woodpecker.nix
Normal file
38
hosts/tsuru/services/woodpecker.nix
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
{config, ...}: {
|
||||||
|
sops.secrets.woodpecker-server = {};
|
||||||
|
sops.secrets.woodpecker-agent-secret = {};
|
||||||
|
services.woodpecker-server = {
|
||||||
|
enable = true;
|
||||||
|
environment = {
|
||||||
|
WOODPECKER_SERVER_ADDR = ":8200";
|
||||||
|
WOODPECKER_GRPC_ADDR = ":8300";
|
||||||
|
WOODPECKER_HOST = "https://ci.flake.sh";
|
||||||
|
WOODPECKER_OPEN = "false";
|
||||||
|
WOODPECKER_GITEA = "true";
|
||||||
|
WOODPECKER_GITEA_URL = "https://git.flake.sh";
|
||||||
|
WOODPECKER_ADMIN = "notohh";
|
||||||
|
WOODPECKER_AGENT_SECRET = config.sops.secrets.woodpecker-agent-secret.path;
|
||||||
|
WOODPECKER_LOG_LEVEL = "debug";
|
||||||
|
WOODPECKER_DEBUG_PRETTY = "true";
|
||||||
|
WOODPECKER_KEEPALIVE_MIN_TIME = "10s";
|
||||||
|
};
|
||||||
|
environmentFile = config.sops.secrets.woodpecker-server.path;
|
||||||
|
};
|
||||||
|
|
||||||
|
services.woodpecker-agents.agents.nix = {
|
||||||
|
enable = true;
|
||||||
|
environment = {
|
||||||
|
DOCKER_HOST = "unix:///var/run/docker.sock";
|
||||||
|
WOODPECKER_BACKEND = "docker";
|
||||||
|
WOODPECKER_SERVER = "localhost:8300";
|
||||||
|
WOODPECKER_AGENT_SECRET = config.sops.secrets.woodpecker-agent-secret.path;
|
||||||
|
WOODPECKER_LOG_LEVEL = "debug";
|
||||||
|
WOODPECKER_DEBUG_PRETTY = "true";
|
||||||
|
WOODPECKER_KEEPALIVE_MIN_TIME = "10s";
|
||||||
|
WOODPECKER_HEALTHCHECK = "true";
|
||||||
|
};
|
||||||
|
extraGroups = [
|
||||||
|
"docker"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
Loading…
Reference in a new issue