ci: run from hswaw forgejo on our own hosts
CI / nixos-ci-x86_64 (push) Has been cancelled Details
CI / nixos-ci-aarch64 (push) Has been cancelled Details

Robert Gerus 2023-10-15 01:29:23 +02:00
parent ba4aff00f2
commit 9005df9909
6 changed files with 104 additions and 30 deletions

21
.ci.sh
View File

@ -2,17 +2,12 @@
set -eou pipefail
export NIX_CONFIG="use-xdg-base-directories = true"
for hostOutput in $(nix eval --raw --impure --expr '
with import <nixpkgs> { };
(lib.mapAttrsToList (n: v: n)
(lib.attrsets.filterAttrs (n: v: v.pkgs.system == pkgs.system)
(builtins.getFlake(builtins.toString ./.)).outputs.nixosConfigurations))
'); do
nixos-rebuild build --flake ".#${hostOutput}"
done
nix profile install nixpkgs#nixos-rebuild
~/.local/state/nix/profile/bin/nixos-rebuild build --flake ".#ciTest"
# for hostOutput in $(nix eval --raw --impure --expr '
# with import <nixpkgs> { };
# (lib.mapAttrsToList (name: value: value)
# (builtins.getFlake(builtins.toString ./.)).outputs.nixosConfigurations)[0]'
# ); do
# ~/.local/state/nix/profile/bin/nixos-rebuild build --flake ".#${hostOutput}"
# done
#

19
.forgejo/workflows/ci.yml Normal file
View File

@ -0,0 +1,19 @@
name: CI
on:
pull_request:
push:
branches: [main]
jobs:
nixos-ci-x86_64:
runs-on: nixos-x86_64-linux:host
steps:
- uses: actions/checkout@v3
- run: ./.ci.sh
nixos-ci-aarch64:
runs-on: nixos-aarch64-linux:host
steps:
- uses: actions/checkout@v3
- run: ./.ci.sh

View File

@ -26,7 +26,8 @@
outputs = { self, nixpkgs, nix-formatter-pack, nix-index-database, deploy-rs
, agenix, lanzaboote, microvm, simple-nixos-mailserver, ... }:
let
forAllSystems = nixpkgs.lib.genAttrs [ "x86_64-linux" "aarch64-linux" ];
systems = [ "x86_64-linux" "aarch64-linux" ];
forAllSystems = nixpkgs.lib.genAttrs systems;
pkgsForDeploy =
forAllSystems (system: import nixpkgs { inherit system; });
deployPkgs = forAllSystems (system:
@ -113,29 +114,61 @@
nibylandia-gaming.imports = [ ./modules/gaming.nix ];
nibylandia-monitoring.imports = [ ./modules/monitoring.nix ];
nibylandia-ci-runners.imports = [
({ config, pkgs, lib, ... }:
let gitea-runner-directory = "/var/lib/gitea-runner";
in {
age.secrets.gitea-runner-token = {
file = ./secrets/gitea-runner-token-${config.networking.hostName}.age;
group = "docker";
};
virtualisation.docker.enable = true;
services.gitea-actions-runner.package =
pkgs.forgejo-actions-runner;
services.gitea-actions-runner.instances.nix = {
enable = true;
name = config.networking.hostName;
tokenFile = config.age.secrets.gitea-runner-token.path;
labels = [ "nixos-${pkgs.system}:host" "nixos:host" "nix:docker://nix-runner" ];
url = "https://code.hackerspace.pl";
settings = {
cache.enabled = true;
host.workdir_parent =
"${gitea-runner-directory}/action-cache-dir";
};
hostPackages = with pkgs; [
bash
coreutils
curl
gawk
git-lfs
nixFlakes
gitFull
gnused
nodejs
wget
];
};
systemd.services.gitea-runner-nix.environment = {
XDG_CONFIG_HOME = gitea-runner-directory;
XDG_CACHE_HOME = "${gitea-runner-directory}/.cache";
};
})
];
};
nixosConfigurations = with self.nixosModules; {
ciTest = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
nibylandia-common
{
nibylandia-boot.uefi.enable = true;
fileSystems."/" = {
device = "none";
fsType = "tmpfs";
options = [ "defaults" "size=8G" "mode=755" ];
};
}
];
};
scylla = nixpkgs.lib.nixosSystem {
system = "aarch64-linux";
modules = [
nibylandia-common
nibylandia-ci-runners
./nixos/scylla
];
@ -191,6 +224,8 @@
nibylandia-common
nibylandia-secureboot
nibylandia-monitoring
nibylandia-ci-runners
simple-nixos-mailserver.nixosModule
./nixos/zorigami

View File

@ -49,6 +49,8 @@ in {
"secrets/mail/keycloakPlain.age".publicKeys = ar ++ [ zorigami ];
"secrets/keycloakDatabase.age".publicKeys = ar ++ [ zorigami ];
"secrets/synapseExtraConfig.age".publicKeys = ar ++ [ zorigami ];
"secrets/gitea-runner-token-zorigami.age".publicKeys = ar ++ [ zorigami ];
"secrets/gitea-runner-token-scylla.age".publicKeys = ar ++ [ scylla ];
inherit ar;
}

View File

@ -0,0 +1,12 @@
age-encryption.org/v1
-> ssh-ed25519 kY4Rgg GlH9wNkjx7qy7J/jbQv4qfacW6iz33its6tH1f9bkAk
MI+wMI59DcBfnKDYEc6EbjeSbOU2XEQdqsYjxzaLxVI
-> ssh-ed25519 grc4Uw +PBc3OBfou+hHNQsYFkGi2/RkQoFQ8Gmwzm12XJuNhM
AeSiCItTdeR7SDYZefR8mzD3HV10hWTMSndtoEoJ3Ok
-> ssh-ed25519 CJl5MQ uQPbCrToxNIUa4z/OD06qKNK7oVDOnBq1iQ1MaIhVWQ
4KmL1OHWm7KHv47/T7WT3DCaWQCKCI/8fnFBN8M69iY
-> cFj-grease mw<;B=c +zP
PSu98aSDwCWyIbLhj5oDMeXDRLDh6Dlbh0a0I8bOf02smiFzbJBFfuTYNA0ioZTu
qACwWD2Rg8PT15NRpQgjn2KFMA
--- XP+tudENbYfalUUPY75weoXDwzFmCGdku4LKMG+UhqI
Cv³.žt±ó\Ïî¯ñƒxËÆÚµÖcÂd¥óÇ€˜œ“?,¨£g<ß'Ï P"@£W%OY/Ýu1ºè>óü`Ò)úñÉÞÆ!s

View File

@ -0,0 +1,11 @@
age-encryption.org/v1
-> ssh-ed25519 kY4Rgg X7oaElfIusBkjH/PgTJVA/FI547kay/a5ZzDGHWceA4
+E1D3QkeCoqcq8Ge5plg9trYitIa1J0aXIw5RytAXqI
-> ssh-ed25519 grc4Uw eztKA2h7s6UbBO3jM/CCrvCeSzBNWnwJ3FamrwbCKHE
vqM4uYhHkdXPLrRQAWjufRSf0Q5d61Bxjwq5QAEsVvY
-> ssh-ed25519 DLT88w zY81M3xNrCMcv55g1eXYYWT0szy6EGnP0IzYBhk6jC8
mg1USKx4xw34ZuiB0mtn5uMpzA3akigRlk5g9/DFyKg
-> i>uTVoNV-grease f*/P#
bUdHR1Q47fYoMHB67fLcRUS4gS+RZZv8C3o4uN2nYw
--- a7oyAcAq3yGbamHG/FfZu3eeannUFn5RiaZv59ZHgYY
·Iqê×=éeÂúZ*}æ ûF*ª3ôõð»í#ý:7êß·y5Î;ÕÙMò‰£5ä¦ iþ0é1™W¤<57>r+÷å` #DÓ%†nŒ—*