Compare commits
2 commits
0e7a405b61
...
38b0a0daa6
Author | SHA1 | Date | |
---|---|---|---|
38b0a0daa6 | |||
98efe1a2c9 |
42 changed files with 16 additions and 27 deletions
.agenix_config.nixMakefiledefault.nix
hosts
amstel
asus-gl553vd
configs/wireguard
services/forgejo-runners
home
configs/wireguard
services/forgejo-runners
istal
networking.secret.nixtatos
hardware-configuration
services
shared/prometheus
users
Binary file not shown.
2
Makefile
2
Makefile
|
@ -18,7 +18,7 @@ MACHINES := \
|
|||
macbook-pro
|
||||
|
||||
VPS := \
|
||||
istal \
|
||||
amstel \
|
||||
tatos
|
||||
|
||||
.PHONY: help
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
./services
|
||||
];
|
||||
|
||||
networking.hostName = "istal";
|
||||
networking.hostName = "amstel";
|
||||
networking.domain = "local";
|
||||
|
||||
users.users.root.openssh.authorizedKeys.keys = globalData.publicKeys.users.janistal;
|
BIN
hosts/amstel/data.secret.nix
Normal file
BIN
hosts/amstel/data.secret.nix
Normal file
Binary file not shown.
BIN
hosts/amstel/hardware-configuration/networking.secret.nix
Normal file
BIN
hosts/amstel/hardware-configuration/networking.secret.nix
Normal file
Binary file not shown.
|
@ -5,16 +5,18 @@ let
|
|||
in
|
||||
{
|
||||
age.secrets.forgejo-runner-token-istal-docker.file = ./forgejo-runner-token-istal-docker.age;
|
||||
age.secrets.forgejo-runner-token-codeberg-docker.file = ./forgejo-runner-token-codeberg-docker.age;
|
||||
|
||||
virtualisation.docker.enable = true;
|
||||
systemd.services.docker.serviceConfig = {
|
||||
CPUQuota = "50%"; # Ограничение для всего Docker демона?
|
||||
};
|
||||
|
||||
services.gitea-actions-runner = {
|
||||
package = pkgs.unstable.forgejo-runner;
|
||||
instances = {
|
||||
istal-docker = {
|
||||
amstel-docker = {
|
||||
enable = true;
|
||||
name = "istal-docker";
|
||||
name = "amstel-docker";
|
||||
url = "https://git.pleshevski.ru";
|
||||
labels = [
|
||||
"docker:docker://node:20-bullseye"
|
||||
|
@ -25,24 +27,11 @@ in
|
|||
runner = {
|
||||
envs = { inherit NODE_OPTIONS; };
|
||||
|
||||
timeout = "1h";
|
||||
};
|
||||
};
|
||||
};
|
||||
codeberg-docker = {
|
||||
enable = true;
|
||||
name = "codeberg-docker";
|
||||
url = "https://codeberg.org";
|
||||
labels = [ ];
|
||||
tokenFile = config.age.secrets.forgejo-runner-token-codeberg-docker.path;
|
||||
settings = {
|
||||
runner = {
|
||||
envs = { inherit NODE_OPTIONS; };
|
||||
|
||||
timeout = "1h";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
}
|
Binary file not shown.
BIN
hosts/amstel/services/renovate-gitea-token.age
Normal file
BIN
hosts/amstel/services/renovate-gitea-token.age
Normal file
Binary file not shown.
BIN
hosts/amstel/services/renovate-github-token.age
Normal file
BIN
hosts/amstel/services/renovate-github-token.age
Normal file
Binary file not shown.
|
@ -2,8 +2,8 @@
|
|||
|
||||
let
|
||||
tatosData = import (hostsPath + "/tatos/data.secret.nix");
|
||||
istalData = import (hostsPath + "/istal/data.secret.nix");
|
||||
inherit (istalData.wireguard) port;
|
||||
amstelData = import (hostsPath + "/amstel/data.secret.nix");
|
||||
inherit (amstelData.wireguard) port;
|
||||
in
|
||||
{
|
||||
boot.kernel.sysctl."net.ipv4.ip_forward" = 1;
|
BIN
hosts/amstel/services/wireguard/wireguard-istal-private.age
Normal file
BIN
hosts/amstel/services/wireguard/wireguard-istal-private.age
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -33,14 +33,14 @@ in
|
|||
];
|
||||
};
|
||||
|
||||
istal = {
|
||||
amstel = {
|
||||
system = x86_64-linux;
|
||||
|
||||
extraModules = [
|
||||
../modules/vps.nix
|
||||
];
|
||||
|
||||
targetHost = (import ./istal/data.secret.nix).addr;
|
||||
targetHost = (import ./amstel/data.secret.nix).addr;
|
||||
};
|
||||
|
||||
tatos = {
|
||||
|
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -34,7 +34,7 @@ in
|
|||
{
|
||||
targets = [
|
||||
"tatos:${toString nodeExporterPort}"
|
||||
"istal:${toString nodeExporterPort}"
|
||||
"amstel:${toString nodeExporterPort}"
|
||||
];
|
||||
}
|
||||
];
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
# Source: https://habr.com/ru/companies/xakep/articles/699000/
|
||||
|
||||
let
|
||||
istalData = import (hostsPath + "/istal/data.secret.nix");
|
||||
amstelData = import (hostsPath + "/amstel/data.secret.nix");
|
||||
tatosData = import (hostsPath + "/tatos/data.secret.nix");
|
||||
port = tatosData.wireguard.port;
|
||||
|
||||
|
@ -67,9 +67,9 @@ in
|
|||
privateKeyFile = config.age.secrets.wireguard-tatos-private.path;
|
||||
|
||||
peers = [
|
||||
# Istal
|
||||
# Amstel
|
||||
{
|
||||
publicKey = istalData.wireguard.publicKey;
|
||||
publicKey = amstelData.wireguard.publicKey;
|
||||
allowedIPs = [ "10.20.30.2/32" "0.0.0.0/0" ];
|
||||
}
|
||||
# Home
|
||||
|
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Loading…
Add table
Reference in a new issue