add gitea jobs and runner configuration
All checks were successful
/ perform flake analysis (push) Successful in 32s
/ build hive configuration (push) Successful in 8m44s

build and deploy colmena hive using gitea actions
This commit is contained in:
shobu
2025-11-12 00:10:13 +01:00
committed by Awen Lelu
parent 733a125f77
commit 65a47967da
13 changed files with 194 additions and 253 deletions

View File

@@ -2,7 +2,9 @@
# your system. Help is available in the configuration.nix(5) man page, on
# https://search.nixos.org/options and in the NixOS manual (`nixos-help`).
{ config, lib, pkgs, nodes, ... }:
{ config, lib, pkgs, nodes, ... }:let
sin-address = "192.168.1.14";
in
{
imports =
@@ -22,9 +24,11 @@
networking = {
hostName = "thea"; # Define your hostname.
nameservers = [ "10.0.0.4" ];
networkmanager.enable = true;
dhcpcd.extraConfig = "nohook resolv.conf";
# nameservers = [ "10.0.0.4" ];
# dhcpcd.extraConfig = "nohook resolv.conf";
firewall = {
allowedTCPPorts = [ nodes.sin.config.services.gitea.settings.server.SSH_PORT ];
@@ -37,7 +41,7 @@
# TODO refactor this in the gitea/n100 module
sourcePort = nodes.sin.config.services.gitea.settings.server.SSH_PORT;
proto = "tcp";
destination = "10.0.0.4:22";
destination = "${sin-address}:22";
} ];
};
};

View File

@@ -1,6 +1,8 @@
{inputs, ...}:
let
striped-front = inputs.striped-front;
# striped-front = inputs.striped-front;
sin-address = "192.168.1.14";
in {
networking.firewall.allowedTCPPorts = [ 80 443 8448 ];
@@ -18,7 +20,7 @@ in {
forceSSL = true;
locations."/" = {
proxyPass = "http://10.0.0.4:${port}";
proxyPass = "http://${sin-address}:${port}";
proxyWebsockets = true;
extraConfig = ''
proxy_ssl_server_name on;
@@ -57,7 +59,7 @@ in {
forceSSL = true;
locations."/" = {
proxyPass = "http://10.0.0.4:8001";
proxyPass = "http://${sin-address}:8001";
extraConfig = ''
proxy_ssl_server_name on;
'';
@@ -68,25 +70,25 @@ in {
forceSSL = true;
locations."/" = {
proxyPass = "http://10.0.0.4:8000";
proxyPass = "http://${sin-address}:8000";
proxyWebsockets = true;
extraConfig = ''
proxy_ssl_server_name on;
'';
};
};
"striped.shobu.fr" = {
enableACME = true;
forceSSL = true;
# "striped.shobu.fr" = {
# enableACME = true;
# forceSSL = true;
root = "${striped-front.packages.x86_64-linux.default}/dist";
};
# root = "${striped-front.packages.x86_64-linux.default}/dist";
# };
"dashboard.shobu.fr" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://10.0.0.4:8082";
proxyPass = "http://${sin-address}:8082";
};
};
"git.shobu.fr" = {
@@ -94,7 +96,7 @@ in {
forceSSL = true;
locations."/" = {
proxyPass = "http://10.0.0.4:3000";
proxyPass = "http://${sin-address}:3000";
};
};
"files.shobu.fr" = {
@@ -102,7 +104,7 @@ in {
forceSSL = true;
locations."/" = {
proxyPass = "http://10.0.0.4:8086";
proxyPass = "http://${sin-address}:8086";
};
};
# "matrix.shobu.fr" = {
@@ -111,9 +113,9 @@ in {
# locations."/".extraConfig = ''
# return 404;
# '';
# locations."/_matrix".proxyPass = "http://10.0.0.4:8008";
# locations."/_synapse/client".proxyPass = "http://10.0.0.4:8008";
# locations."/.well-known/matrix/server".proxyPass = "http://10.0.0.4:8008/.well-known/matrix/server";
# locations."/_matrix".proxyPass = "http://${sin-address}:8008";
# locations."/_synapse/client".proxyPass = "http://${sin-address}:8008";
# locations."/.well-known/matrix/server".proxyPass = "http://${sin-address}:8008/.well-known/matrix/server";
# };
}
);

View File

@@ -1,10 +1,13 @@
{...}: {
{...}: let
sin-address = "192.168.1.14";
in
{
boot.supportedFilesystems = [ "fuse.sshfs" ];
programs.fuse.userAllowOther = true;
fileSystems = {
"/mnt/shares/data" = {
device = "shobu@10.0.0.4:/mnt/data/";
device = "shobu@${sin-address}:/mnt/data/";
fsType = "fuse.sshfs";
options = [
"debug"