All checks were successful
deploy-infra / deploy (push) Successful in 2m12s
/ check-pre-commit (push) Successful in 14s
/ check-data-model (push) Successful in 32s
/ check-panel (push) Successful in 1m35s
Nix flake checks / _complete (push) Successful in 34s
Nix flake checks / deployment-basic (push) Successful in 34s
Nix flake checks / deployment-cli (push) Successful in 45s
Nix flake checks / deployment-model-nixops4 (push) Successful in 34s
Nix flake checks / deployment-model-ssh (push) Successful in 25s
Nix flake checks / deployment-model-tf (push) Successful in 26s
Nix flake checks / deployment-panel (push) Successful in 1m55s
Nix flake checks / nixops-deployment-providers-default (push) Successful in 13s
Nix flake checks / nixops-deployment-providers-fedi200 (push) Successful in 13s
Nix flake checks / nixops-deployment-providers-fedi201 (push) Successful in 12s
Nix flake checks / nixops-deployment-providers-forgejo-ci (push) Successful in 13s
Nix flake checks / nixops-deployment-providers-test (push) Successful in 13s
Nix flake checks / nixops-deployment-providers-vm02116 (push) Successful in 12s
Nix flake checks / nixops-deployment-providers-vm02187 (push) Successful in 12s
Nix flake checks / nixosConfigurations-fedi200 (push) Successful in 18s
Nix flake checks / nixosConfigurations-fedi201 (push) Successful in 33s
Nix flake checks / nixosConfigurations-forgejo-ci (push) Successful in 18s
Nix flake checks / nixosConfigurations-test01 (push) Successful in 17s
Nix flake checks / nixosConfigurations-test02 (push) Successful in 18s
Nix flake checks / nixosConfigurations-test03 (push) Successful in 18s
Nix flake checks / nixosConfigurations-test04 (push) Successful in 18s
Nix flake checks / nixosConfigurations-test05 (push) Successful in 18s
Nix flake checks / nixosConfigurations-test06 (push) Successful in 19s
Nix flake checks / nixosConfigurations-test11 (push) Successful in 18s
Nix flake checks / nixosConfigurations-test12 (push) Successful in 18s
Nix flake checks / nixosConfigurations-test13 (push) Successful in 18s
Nix flake checks / nixosConfigurations-test14 (push) Successful in 18s
Nix flake checks / nixosConfigurations-vm02116 (push) Successful in 19s
Nix flake checks / nixosConfigurations-vm02187 (push) Successful in 18s
Nix flake checks / panel (push) Successful in 29s
Nix flake checks / pre-commit (push) Successful in 12s
Nix flake checks / proxmox-basic (push) Successful in 35s
Nix flake checks / test-mastodon-service (push) Successful in 22s
Nix flake checks / test-peertube-service (push) Successful in 22s
Nix flake checks / vmOptions-fedi200 (push) Successful in 6s
Nix flake checks / vmOptions-fedi201 (push) Successful in 6s
Nix flake checks / vmOptions-test01 (push) Successful in 5s
Nix flake checks / vmOptions-test02 (push) Successful in 5s
Nix flake checks / vmOptions-test03 (push) Successful in 5s
Nix flake checks / vmOptions-test04 (push) Successful in 10s
Nix flake checks / vmOptions-test05 (push) Successful in 5s
Nix flake checks / vmOptions-test06 (push) Successful in 5s
Nix flake checks / vmOptions-test11 (push) Successful in 6s
Nix flake checks / vmOptions-test12 (push) Successful in 6s
Nix flake checks / vmOptions-test13 (push) Successful in 6s
Nix flake checks / vmOptions-test14 (push) Successful in 5s
Nix flake checks / _checks (push) Successful in 1s
picking up from #492 to fix the CI issue. note that i left the non-flake checks duplicating with flake ones (`pre-commit`, `panel`) in on both sides to get a sense of which way might be preferable. Co-authored-by: Nicolas “Niols” Jeannerod <nicolas.jeannerod@moduscreate.com> Reviewed-on: Fediversity/Fediversity#512 |
||
---|---|---|
.. | ||
fediversity | ||
tests | ||
vm | ||
HACKING.md | ||
README.md |
Services
This directory contains the definition of a NixOS module allowing to easily set up the Fediverse services that our project cares about. Those services are already packaged in nixpkgs, which arguably already provides this. Here is therefore the important distinction:
-
The goal of nixpkgs is to be generic, bring all the building blocks and let you do whatever it is you want with them. You get to choose all the options, if to use a reverse proxy, which one, if to use an S3 backend, which one, which database, etc.
-
This module aims at being straightforward to use by being opinionated. It only supports the use case of the Fediversity project and strives to hide as much of the nitty-gritty details as possible.
For those that know it, we could say that the current module is an analogous of simple-nixos-mailserver for Fediverse services.
Content of this directory
-
fediversity contains the definition of the services. Look in particular at its
default.nix
that contains the definition of the options. -
vm contains options specific to making the service run in local QEMU VMs. These modules will for instance override the defaults to disable SSL, and they will add virtualisation options to forward ports, for instance.
-
tests contain full NixOS tests of the services.