Compare commits

..

3 commits

Author SHA1 Message Date
7aa11749e9 Run CI on nix
Some checks failed
CI / build (push) Failing after 1m34s
2024-10-03 14:45:34 +03:00
7b7dba5f47 Remove defunct nixos auto upgrade 2024-10-03 14:42:56 +03:00
e83c74ac1d Use specific git forgejo CI 2024-10-03 14:42:56 +03:00
3 changed files with 9 additions and 27 deletions

View file

@ -8,8 +8,7 @@ env:
jobs: jobs:
build: build:
runs-on: docker runs-on: nix
container: nixpkgs/nix-flakes:nixos-24.05
steps: steps:
- name: Initialize CI - name: Initialize CI
uses: https://git.qo.is/qo.is/actions-nix-init@main uses: https://git.qo.is/qo.is/actions-nix-init@main

View file

@ -78,16 +78,6 @@
''; '';
}; };
system.autoUpgrade = {
enable = true;
randomizedDelaySec = "30m";
flags = [
"--update-input"
"nixpkgs-nixos-2211"
"--commit-lock-file"
];
};
# Network services # Network services
networking.firewall = { networking.firewall = {
allowPing = true; allowPing = true;

View file

@ -32,7 +32,8 @@ with lib;
sops.secrets."forgejo/runner-registration-token".restartUnits = [ sops.secrets."forgejo/runner-registration-token".restartUnits = [
"gitea-runner-${defaultInstanceName}.service" "gitea-runner-${defaultInstanceName}.service"
]; ] ++genAttrs (genList (n: "gitea-runner-nix${builtins.toString n}.service") cfg.nixInstances)
;
virtualisation.podman = { virtualisation.podman = {
enable = true; enable = true;
@ -60,7 +61,6 @@ with lib;
capacity = 30; capacity = 30;
}; };
cache.enable = true; # TODO: This should probably be a central cache server? cache.enable = true; # TODO: This should probably be a central cache server?
# the default network that also respects our dns server settings
container.network = "host"; container.network = "host";
}; };
}; };
@ -142,17 +142,10 @@ with lib;
storage.runroot = "/run/containers/storage"; storage.runroot = "/run/containers/storage";
}; };
#virtualisation.containers.containersConf.settings = {
# # podman seems to not work with systemd-resolved
# containers.dns_servers = [
# "8.8.8.8"
# "8.8.4.4"
# ];
#};
} }
{ {
systemd.services = systemd.services =
genAttrs (builtins.genList (n: "gitea-runner-nix${builtins.toString n}") cfg.nixInstances) genAttrs (genList (n: "gitea-runner-nix${builtins.toString n}") cfg.nixInstances)
(name: { (name: {
after = [ after = [
"gitea-runner-nix-image.service" "gitea-runner-nix-image.service"
@ -239,15 +232,16 @@ with lib;
mkdir -p $out/bin mkdir -p $out/bin
for dir in ${ for dir in ${
toString [ toString [
pkgs.bash
pkgs.coreutils pkgs.coreutils
pkgs.findutils pkgs.findutils
pkgs.gnugrep
pkgs.gawk pkgs.gawk
pkgs.git pkgs.git
pkgs.nix pkgs.gnugrep
pkgs.bash
pkgs.jq pkgs.jq
pkgs.nix
pkgs.nodejs pkgs.nodejs
pkgs.openssh
] ]
}; do }; do
for bin in "$dir"/bin/*; do for bin in "$dir"/bin/*; do
@ -260,7 +254,7 @@ with lib;
cp -a "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt" $out/etc/ssl/certs/ca-bundle.crt cp -a "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt" $out/etc/ssl/certs/ca-bundle.crt
''; '';
in in
genAttrs (builtins.genList (n: "nix${builtins.toString n}") cfg.nixInstances) (name: { genAttrs (genList (n: "nix${builtins.toString n}") cfg.nixInstances) (name: {
enable = true; enable = true;
name = "${config.networking.hostName}-${name}"; name = "${config.networking.hostName}-${name}";
url = "https://${cfg.domain}"; url = "https://${cfg.domain}";
@ -268,7 +262,6 @@ with lib;
labels = [ "nix:docker://gitea-runner-nix" ]; labels = [ "nix:docker://gitea-runner-nix" ];
settings = { settings = {
container.options = "-e NIX_BUILD_SHELL=/bin/bash -e PAGER=cat -e PATH=/bin -e SSL_CERT_FILE=/etc/ssl/certs/ca-bundle.crt --device /dev/kvm -v /nix:/nix -v ${storeDeps}/bin:/bin -v ${storeDeps}/etc/ssl:/etc/ssl --user nixuser --device=/dev/kvm"; container.options = "-e NIX_BUILD_SHELL=/bin/bash -e PAGER=cat -e PATH=/bin -e SSL_CERT_FILE=/etc/ssl/certs/ca-bundle.crt --device /dev/kvm -v /nix:/nix -v ${storeDeps}/bin:/bin -v ${storeDeps}/etc/ssl:/etc/ssl --user nixuser --device=/dev/kvm";
# the default network that also respects our dns server settings
container.network = "host"; container.network = "host";
container.valid_volumes = [ container.valid_volumes = [
"/nix" "/nix"