woodpecker-switch #22
3 changed files with 82 additions and 1 deletions
|
@ -1,5 +1,5 @@
|
|||
_: {
|
||||
imports = [
|
||||
./forgejo-runners.nix
|
||||
./woodpecker.nix
|
||||
];
|
||||
}
|
||||
|
|
43
hosts/tsuru/services/tailscale.nix
Normal file
43
hosts/tsuru/services/tailscale.nix
Normal file
|
@ -0,0 +1,43 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
sops.secrets.tsauth-tsuru = {
|
||||
sopsFile = ../../../secrets/tailscale/secrets.yaml;
|
||||
};
|
||||
environment.systemPackages = [pkgs.jq pkgs.tailscale];
|
||||
services.tailscale = {
|
||||
useRoutingFeatures = lib.mkDefault "client";
|
||||
};
|
||||
networking.firewall.allowedUDPPorts = [config.services.tailscale.port];
|
||||
networking.firewall.trustedInterfaces = [config.services.tailscale.interfaceName];
|
||||
|
||||
systemd.services.tailscale-autoconnect = {
|
||||
description = "Automatic connection to Tailscale";
|
||||
|
||||
# make sure tailscale is running before trying to connect to tailscale
|
||||
after = ["network-pre.target" "tailscale.service"];
|
||||
wants = ["network-pre.target" "tailscale.service"];
|
||||
wantedBy = ["multi-user.target"];
|
||||
|
||||
# set this service as a oneshot job
|
||||
serviceConfig.Type = "oneshot";
|
||||
|
||||
# have the job run this shell script
|
||||
script = with pkgs; ''
|
||||
# wait for tailscaled to settle
|
||||
sleep 2
|
||||
|
||||
# check if we are already authenticated to tailscale
|
||||
status="$(${tailscale}/bin/tailscale status -json | ${jq}/bin/jq -r .BackendState)"
|
||||
if [ $status = "Running" ]; then # if so, then do nothing
|
||||
exit 0
|
||||
fi
|
||||
|
||||
# otherwise authenticate with tailscale
|
||||
${tailscale}/bin/tailscale up -authkey file:${config.sops.secrets.tsauth-tsuru.path} --exit-node=100.104.42.96 --exit-node-allow-lan-access=true --accept-dns=false
|
||||
'';
|
||||
};
|
||||
}
|
38
hosts/tsuru/services/woodpecker.nix
Normal file
38
hosts/tsuru/services/woodpecker.nix
Normal file
|
@ -0,0 +1,38 @@
|
|||
{config, ...}: {
|
||||
sops.secrets.woodpecker-server = {};
|
||||
sops.secrets.woodpecker-agent-secret = {};
|
||||
services.woodpecker-server = {
|
||||
enable = true;
|
||||
environment = {
|
||||
WOODPECKER_SERVER_ADDR = ":8200";
|
||||
WOODPECKER_GRPC_ADDR = ":8300";
|
||||
WOODPECKER_HOST = "https://ci.flake.sh";
|
||||
WOODPECKER_OPEN = "false";
|
||||
WOODPECKER_GITEA = "true";
|
||||
WOODPECKER_GITEA_URL = "https://git.flake.sh";
|
||||
WOODPECKER_ADMIN = "notohh";
|
||||
WOODPECKER_AGENT_SECRET = config.sops.secrets.woodpecker-agent-secret.path;
|
||||
WOODPECKER_LOG_LEVEL = "debug";
|
||||
WOODPECKER_DEBUG_PRETTY = "true";
|
||||
WOODPECKER_KEEPALIVE_MIN_TIME = "10s";
|
||||
};
|
||||
environmentFile = config.sops.secrets.woodpecker-server.path;
|
||||
};
|
||||
|
||||
services.woodpecker-agents.agents.nix = {
|
||||
enable = true;
|
||||
environment = {
|
||||
DOCKER_HOST = "unix:///var/run/docker.sock";
|
||||
WOODPECKER_BACKEND = "docker";
|
||||
WOODPECKER_SERVER = "localhost:8300";
|
||||
WOODPECKER_AGENT_SECRET = config.sops.secrets.woodpecker-agent-secret.path;
|
||||
WOODPECKER_LOG_LEVEL = "debug";
|
||||
WOODPECKER_DEBUG_PRETTY = "true";
|
||||
WOODPECKER_KEEPALIVE_MIN_TIME = "10s";
|
||||
WOODPECKER_HEALTHCHECK = "true";
|
||||
};
|
||||
extraGroups = [
|
||||
"docker"
|
||||
];
|
||||
};
|
||||
}
|
Loading…
Reference in a new issue