nixos-config/config/services/hydra.nix

80 lines
2.6 KiB
Nix
Raw Normal View History

{ lib, config, pkgs, ... }:
let
listenIPs = (import ../../utils/getInternalIP.nix config).listenIPs;
listenStatements = lib.concatStringsSep "\n" (builtins.map (ip: "listen ${ip}:443 http3;") listenIPs) + ''
add_header Alt-Svc 'h3=":443"';
'';
clean-cache = pkgs.callPackage ../../packages/clean-s3-cache.nix { };
in
{
2022-02-18 14:49:19 +00:00
imports = [
./postgres.nix
2022-02-18 15:58:36 +00:00
../../modules/hydra.nix
2022-04-12 07:56:04 +00:00
./nix-serve.nix
2022-02-18 14:49:19 +00:00
];
services.hydra = {
enable = true;
2022-04-15 08:27:53 +00:00
hydraURL = "https://hydra.chir.rs/";
2022-02-18 14:49:19 +00:00
notificationSender = "hydra@chir.rs";
2022-02-18 14:56:22 +00:00
useSubstitutes = true;
2022-02-18 15:58:36 +00:00
extraConfig = ''
<gitea_authorization>
darkkirb = #gitea_token#
</gitea_authorization>
2022-04-10 12:07:53 +00:00
<github_authorization>
DarkKirb = Bearer #github_token#
2022-04-10 12:07:53 +00:00
</github_authorization>
2022-04-15 08:09:53 +00:00
<githubstatus>
jobs = .*
</githubstatus>
2022-04-14 05:29:35 +00:00
store_uri = s3://cache-chir-rs?scheme=https&endpoint=s3.us-west-000.backblazeb2.com&secret-key=/var/lib/hydra/queue-runner/cache-priv-key.pem&multipart-upload=true&compression=zstd&compression-level=15
2022-02-18 15:58:36 +00:00
'';
giteaTokenFile = "/run/secrets/services/hydra/gitea_token";
2022-04-10 12:07:53 +00:00
githubTokenFile = "/run/secrets/services/hydra/github_token";
2022-02-18 14:49:19 +00:00
};
services.postgresql.ensureDatabases = [ "hydra" ];
services.postgresql.ensureUsers = [
{
name = "hydra";
ensurePermissions = {
"DATABASE hydra" = "ALL PRIVILEGES";
};
}
];
2022-04-16 12:23:59 +00:00
nix.settings.allowed-uris = [ "https://github.com/" "https://git.chir.rs/" "https://darkkirb.de/" "https://git.neo-layout.org/" "https://static.darkkirb.de/" ];
2022-02-18 16:04:53 +00:00
sops.secrets."services/hydra/gitea_token" = { };
2022-04-10 12:07:53 +00:00
sops.secrets."services/hydra/github_token" = { };
2022-04-15 08:59:11 +00:00
services.nginx.virtualHosts."hydra.chir.rs" = {
listenAddresses = listenIPs;
2022-04-15 08:59:11 +00:00
sslCertificate = "/var/lib/acme/chir.rs/cert.pem";
sslCertificateKey = "/var/lib/acme/chir.rs/key.pem";
locations."/" = {
proxyPass = "http://127.0.0.1:3000";
proxyWebsockets = true;
};
extraConfig = listenStatements;
};
systemd.services.clean-s3-cache = {
enable = true;
description = "Clean up S3 cache";
serviceConfig = {
ExecStart = "${clean-cache}/bin/clean-s3-cache.py";
};
};
systemd.timers.clean-s3-cache = {
enable = true;
description = "Clean up S3 cache";
requires = [ "clean-s3-cache.service" ];
wantedBy = [ "multi-user.target" ];
timerConfig = {
OnBootSec = 300;
OnUnitActiveSec = 604800;
};
};
2022-04-13 12:35:20 +00:00
sops.secrets."services/hydra/aws_credentials" = {
owner = "hydra-queue-runner";
path = "/var/lib/hydra/queue-runner/.aws/credentials";
restartUnits = [ "hydra-queue-runner.service" ];
};
2022-02-18 14:49:19 +00:00
}