forked from Fediversity/Fediversity
Compare commits
18 commits
note-scope
...
main
Author | SHA1 | Date | |
---|---|---|---|
e5710979ba | |||
6cf1d87f0b | |||
8253288f8a | |||
67f50f08de | |||
5402178e7b | |||
e627815399 | |||
354dba260a | |||
b791bd515d | |||
f2017aaeb4 | |||
980a994f83 | |||
b9b13df04e | |||
159e4107b8 | |||
86305a6a2e | |||
e62f14d9be | |||
82f83eea0d | |||
aef414ffe8 | |||
6d74112518 | |||
2b2fb059fd |
17 changed files with 111 additions and 53 deletions
|
@ -4,7 +4,7 @@ on:
|
||||||
workflow_dispatch: # allows manual triggering
|
workflow_dispatch: # allows manual triggering
|
||||||
push:
|
push:
|
||||||
branches:
|
branches:
|
||||||
# - main
|
- main
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
deploy:
|
deploy:
|
||||||
|
@ -13,7 +13,7 @@ jobs:
|
||||||
- name: Checkout repository
|
- name: Checkout repository
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
- name: Set up SSH key to access age secrets
|
- name: Set up SSH key for age secrets and SSH
|
||||||
run: |
|
run: |
|
||||||
env
|
env
|
||||||
mkdir -p ~/.ssh
|
mkdir -p ~/.ssh
|
||||||
|
@ -21,4 +21,4 @@ jobs:
|
||||||
chmod 600 ~/.ssh/id_ed25519
|
chmod 600 ~/.ssh/id_ed25519
|
||||||
|
|
||||||
- name: Deploy
|
- name: Deploy
|
||||||
run: nix-shell --run 'nixops4 deploy'
|
run: nix-shell --run 'eval "$(ssh-agent -s)" && ssh-add ~/.ssh/id_ed25519 && SHELL=$(which bash) nixops4 apply -v default'
|
||||||
|
|
|
@ -21,17 +21,23 @@ jobs:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
- run: nix-shell --run 'nix-unit ./deployment/data-model-test.nix'
|
- run: nix-shell --run 'nix-unit ./deployment/data-model-test.nix'
|
||||||
|
|
||||||
|
check-mastodon:
|
||||||
|
runs-on: native
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
- run: nix build .#checks.x86_64-linux.test-mastodon-service -L
|
||||||
|
|
||||||
check-peertube:
|
check-peertube:
|
||||||
runs-on: native
|
runs-on: native
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
- run: nix-build services -A tests.peertube
|
- run: nix build .#checks.x86_64-linux.test-peertube-service -L
|
||||||
|
|
||||||
check-panel:
|
check-panel:
|
||||||
runs-on: native
|
runs-on: native
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
- run: nix-build panel -A tests
|
- run: nix-build -A tests.panel
|
||||||
|
|
||||||
check-deployment-basic:
|
check-deployment-basic:
|
||||||
runs-on: native
|
runs-on: native
|
||||||
|
|
|
@ -12,6 +12,7 @@ let
|
||||||
inherit (pkgs) lib;
|
inherit (pkgs) lib;
|
||||||
inherit (import sources.flake-inputs) import-flake;
|
inherit (import sources.flake-inputs) import-flake;
|
||||||
inherit ((import-flake { src = ./.; }).inputs) nixops4;
|
inherit ((import-flake { src = ./.; }).inputs) nixops4;
|
||||||
|
panel = import ./panel { inherit sources system; };
|
||||||
pre-commit-check =
|
pre-commit-check =
|
||||||
(import "${git-hooks}/nix" {
|
(import "${git-hooks}/nix" {
|
||||||
inherit nixpkgs system;
|
inherit nixpkgs system;
|
||||||
|
@ -71,6 +72,7 @@ in
|
||||||
|
|
||||||
tests = {
|
tests = {
|
||||||
inherit pre-commit-check;
|
inherit pre-commit-check;
|
||||||
|
panel = panel.tests;
|
||||||
};
|
};
|
||||||
|
|
||||||
# re-export inputs so they can be overridden granularly
|
# re-export inputs so they can be overridden granularly
|
||||||
|
|
|
@ -17,15 +17,20 @@
|
||||||
./infra/flake-part.nix
|
./infra/flake-part.nix
|
||||||
./keys/flake-part.nix
|
./keys/flake-part.nix
|
||||||
./secrets/flake-part.nix
|
./secrets/flake-part.nix
|
||||||
|
./services/tests/flake-part.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
perSystem =
|
perSystem =
|
||||||
{
|
{
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
|
system,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
|
checks = {
|
||||||
|
panel = (import ./. { inherit sources system; }).tests.panel.basic;
|
||||||
|
};
|
||||||
formatter = pkgs.nixfmt-rfc-style;
|
formatter = pkgs.nixfmt-rfc-style;
|
||||||
|
|
||||||
pre-commit.settings.hooks =
|
pre-commit.settings.hooks =
|
||||||
|
|
|
@ -1,14 +1,13 @@
|
||||||
# Infra
|
# Infra
|
||||||
|
|
||||||
This directory contains the definition of [the VMs](machines.md) that host our
|
This directory contains the definition of [the VMs](../machines/machines.md) that host our
|
||||||
infrastructure.
|
infrastructure.
|
||||||
|
|
||||||
## Provisioning VMs with an initial configuration
|
## Provisioning VMs with an initial configuration
|
||||||
|
|
||||||
NOTE[Niols]: This is very manual and clunky. Two things will happen. In the near
|
> NOTE[Niols]: This is still very manual and clunky. Two things will happen:
|
||||||
future, I will improve the provisioning script to make this a bit less clunky.
|
> 1. In the near future, I will improve the provisioning script to make this a bit less clunky.
|
||||||
In the far future, NixOps4 will be able to communicate with Proxmox directly and
|
> 2. In the far future, NixOps4 will be able to communicate with Proxmox directly and everything will become much cleaner.
|
||||||
everything will become much cleaner.
|
|
||||||
|
|
||||||
1. Choose names for your VMs. It is recommended to choose `fediXXX`, with `XXX`
|
1. Choose names for your VMs. It is recommended to choose `fediXXX`, with `XXX`
|
||||||
above 100. For instance, `fedi117`.
|
above 100. For instance, `fedi117`.
|
||||||
|
@ -25,8 +24,7 @@ everything will become much cleaner.
|
||||||
Those files need to exist during provisioning, but their content matters only
|
Those files need to exist during provisioning, but their content matters only
|
||||||
when updating the machines' configuration.
|
when updating the machines' configuration.
|
||||||
|
|
||||||
FIXME: Remove this step by making the provisioning script not fail with the
|
> FIXME: Remove this step by making the provisioning script not fail with the public key does not exist yet.
|
||||||
public key does not exist yet.
|
|
||||||
|
|
||||||
3. Run the provisioning script:
|
3. Run the provisioning script:
|
||||||
```
|
```
|
||||||
|
@ -44,7 +42,7 @@ everything will become much cleaner.
|
||||||
ssh fedi117.abundos.eu 'sudo cat /etc/ssh/ssh_host_ed25519_key.pub' > keys/systems/fedi117.pub
|
ssh fedi117.abundos.eu 'sudo cat /etc/ssh/ssh_host_ed25519_key.pub' > keys/systems/fedi117.pub
|
||||||
```
|
```
|
||||||
|
|
||||||
FIXME: Make the provisioning script do that for us.
|
> FIXME: Make the provisioning script do that for us.
|
||||||
|
|
||||||
7. Regenerate the list of machines:
|
7. Regenerate the list of machines:
|
||||||
```
|
```
|
||||||
|
@ -56,7 +54,7 @@ everything will become much cleaner.
|
||||||
just enough for it to boot and be reachable. Go on to the next section to
|
just enough for it to boot and be reachable. Go on to the next section to
|
||||||
update the machine and put an actual configuration.
|
update the machine and put an actual configuration.
|
||||||
|
|
||||||
FIXME: Figure out why the full configuration isn't on the machine at this
|
> FIXME: Figure out why the full configuration isn't on the machine at this
|
||||||
point and fix it.
|
point and fix it.
|
||||||
|
|
||||||
## Updating existing VM configurations
|
## Updating existing VM configurations
|
||||||
|
|
|
@ -1,7 +1,13 @@
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}:
|
||||||
{
|
{
|
||||||
_class = "nixos";
|
_class = "nixos";
|
||||||
|
|
||||||
users.users = {
|
users.users = {
|
||||||
|
root.openssh.authorizedKeys.keys = config.users.users.procolix.openssh.authorizedKeys.keys;
|
||||||
|
|
||||||
procolix = {
|
procolix = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
extraGroups = [ "wheel" ];
|
extraGroups = [ "wheel" ];
|
||||||
|
|
|
@ -1,9 +1,10 @@
|
||||||
{ modulesPath, ... }:
|
{ sources, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
_class = "nixos";
|
_class = "nixos";
|
||||||
|
|
||||||
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
|
imports = [
|
||||||
|
"${sources.nixpkgs}/nixos/modules/profiles/qemu-guest.nix"
|
||||||
|
];
|
||||||
|
|
||||||
boot = {
|
boot = {
|
||||||
initrd = {
|
initrd = {
|
||||||
|
|
|
@ -58,6 +58,8 @@ in
|
||||||
users.users.root.openssh.authorizedKeys.keys = attrValues keys.contributors ++ [
|
users.users.root.openssh.authorizedKeys.keys = attrValues keys.contributors ++ [
|
||||||
# allow our panel vm access to the test machines
|
# allow our panel vm access to the test machines
|
||||||
keys.panel
|
keys.panel
|
||||||
|
# allow continuous deployment access
|
||||||
|
keys.cd
|
||||||
];
|
];
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
|
@ -27,12 +27,19 @@ let
|
||||||
_module.args = {
|
_module.args = {
|
||||||
inherit
|
inherit
|
||||||
inputs
|
inputs
|
||||||
sources
|
|
||||||
keys
|
keys
|
||||||
secrets
|
secrets
|
||||||
;
|
;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
nixos.module.imports = [
|
||||||
|
./common/proxmox-qemu-vm.nix
|
||||||
|
];
|
||||||
|
|
||||||
|
nixos.specialArgs = {
|
||||||
|
inherit sources;
|
||||||
|
};
|
||||||
|
|
||||||
imports =
|
imports =
|
||||||
[
|
[
|
||||||
./common/resource.nix
|
./common/resource.nix
|
||||||
|
@ -40,7 +47,6 @@ let
|
||||||
++ (
|
++ (
|
||||||
if isTestVm then
|
if isTestVm then
|
||||||
[
|
[
|
||||||
./common/proxmox-qemu-vm.nix
|
|
||||||
../machines/operator/${vmName}
|
../machines/operator/${vmName}
|
||||||
{
|
{
|
||||||
nixos.module.users.users.root.openssh.authorizedKeys.keys = [
|
nixos.module.users.users.root.openssh.authorizedKeys.keys = [
|
||||||
|
@ -63,17 +69,33 @@ let
|
||||||
vmNames:
|
vmNames:
|
||||||
{ providers, ... }:
|
{ providers, ... }:
|
||||||
{
|
{
|
||||||
providers.local = inputs.nixops4.modules.nixops4Provider.local;
|
# XXX: this type merge is for adding `specialArgs` to resource modules
|
||||||
resources = genAttrs vmNames (vmName: {
|
options.resources = mkOption {
|
||||||
type = providers.local.exec;
|
type =
|
||||||
imports = [
|
with lib.types;
|
||||||
inputs.nixops4-nixos.modules.nixops4Resource.nixos
|
lazyAttrsOf (submoduleWith {
|
||||||
(makeResourceModule {
|
class = "nixops4Resource";
|
||||||
inherit vmName;
|
modules = [ ];
|
||||||
isTestVm = false;
|
# TODO(@fricklerhandwerk): we may want to pass through all of `specialArgs`
|
||||||
})
|
# once we're sure it's sane. leaving it here for better control during refactoring.
|
||||||
];
|
specialArgs = {
|
||||||
});
|
inherit sources;
|
||||||
|
};
|
||||||
|
});
|
||||||
|
};
|
||||||
|
config = {
|
||||||
|
providers.local = inputs.nixops4.modules.nixops4Provider.local;
|
||||||
|
resources = genAttrs vmNames (vmName: {
|
||||||
|
type = providers.local.exec;
|
||||||
|
imports = [
|
||||||
|
inputs.nixops4-nixos.modules.nixops4Resource.nixos
|
||||||
|
(makeResourceModule {
|
||||||
|
inherit vmName;
|
||||||
|
isTestVm = false;
|
||||||
|
})
|
||||||
|
];
|
||||||
|
});
|
||||||
|
};
|
||||||
};
|
};
|
||||||
makeDeployment' = vmName: makeDeployment [ vmName ];
|
makeDeployment' = vmName: makeDeployment [ vmName ];
|
||||||
|
|
||||||
|
|
|
@ -11,7 +11,7 @@ in
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
(import ../../../panel { }).module
|
(import ../../../panel { }).module
|
||||||
(import "${sources.home-manager}/nixos")
|
"${sources.home-manager}/nixos"
|
||||||
];
|
];
|
||||||
|
|
||||||
security.acme = {
|
security.acme = {
|
||||||
|
|
|
@ -48,7 +48,7 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
## NOTE: This is a physical machine, so is not covered by disko
|
## NOTE: This is a physical machine, so is not covered by disko
|
||||||
fileSystems."/" = {
|
fileSystems."/" = lib.mkForce {
|
||||||
device = "rpool/root";
|
device = "rpool/root";
|
||||||
fsType = "zfs";
|
fsType = "zfs";
|
||||||
};
|
};
|
||||||
|
@ -58,7 +58,7 @@ in
|
||||||
fsType = "zfs";
|
fsType = "zfs";
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/boot" = {
|
fileSystems."/boot" = lib.mkForce {
|
||||||
device = "/dev/disk/by-uuid/50B2-DD3F";
|
device = "/dev/disk/by-uuid/50B2-DD3F";
|
||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
options = [
|
options = [
|
||||||
|
|
|
@ -45,7 +45,7 @@ in
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
module = import ./nix/configuration.nix;
|
module = ./nix/configuration.nix;
|
||||||
tests = pkgs.callPackage ./nix/tests.nix { };
|
tests = pkgs.callPackage ./nix/tests.nix { };
|
||||||
|
|
||||||
# re-export inputs so they can be overridden granularly
|
# re-export inputs so they can be overridden granularly
|
||||||
|
|
|
@ -1,13 +0,0 @@
|
||||||
{
|
|
||||||
system ? builtins.currentSystem,
|
|
||||||
sources ? import ../npins,
|
|
||||||
pkgs ? import sources.nixpkgs { inherit system; },
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
{
|
|
||||||
tests = {
|
|
||||||
mastodon = pkgs.nixosTest ./tests/mastodon.nix;
|
|
||||||
pixelfed-garage = pkgs.nixosTest ./tests/pixelfed-garage.nix;
|
|
||||||
peertube = pkgs.nixosTest ./tests/peertube.nix;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -49,7 +49,7 @@ in
|
||||||
displayName = mkOption {
|
displayName = mkOption {
|
||||||
type = types.str;
|
type = types.str;
|
||||||
description = "Name of the initial user, for humans";
|
description = "Name of the initial user, for humans";
|
||||||
default = config.fediversity.temp.initialUser.name;
|
default = config.fediversity.temp.initialUser.username;
|
||||||
};
|
};
|
||||||
email = mkOption {
|
email = mkOption {
|
||||||
type = types.str;
|
type = types.str;
|
||||||
|
|
14
services/tests/flake-part.nix
Normal file
14
services/tests/flake-part.nix
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
{ ... }:
|
||||||
|
{
|
||||||
|
_class = "flake";
|
||||||
|
|
||||||
|
perSystem =
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
checks = {
|
||||||
|
test-mastodon-service = pkgs.testers.runNixOSTest ./mastodon.nix;
|
||||||
|
test-pixelfed-garage-service = pkgs.testers.runNixOSTest ./pixelfed-garage.nix;
|
||||||
|
test-peertube-service = pkgs.testers.runNixOSTest ./peertube.nix;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -6,7 +6,7 @@
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
lib = pkgs.lib;
|
inherit (pkgs) lib writeText;
|
||||||
|
|
||||||
## FIXME: this binding was not used, but maybe we want a side-effect or something?
|
## FIXME: this binding was not used, but maybe we want a side-effect or something?
|
||||||
# rebuildableTest = import ./rebuildableTest.nix pkgs;
|
# rebuildableTest = import ./rebuildableTest.nix pkgs;
|
||||||
|
@ -69,9 +69,17 @@ in
|
||||||
expect
|
expect
|
||||||
];
|
];
|
||||||
environment.variables = {
|
environment.variables = {
|
||||||
AWS_ACCESS_KEY_ID = config.fediversity.garage.ensureKeys.mastodon.id;
|
AWS_ACCESS_KEY_ID = "$(cat ${config.fediversity.mastodon.s3AccessKeyFile})";
|
||||||
AWS_SECRET_ACCESS_KEY = config.fediversity.garage.ensureKeys.mastodon.secret;
|
AWS_SECRET_ACCESS_KEY = "$(cat ${config.fediversity.mastodon.s3SecretKeyFile})";
|
||||||
};
|
};
|
||||||
|
services.mastodon.extraEnvFiles = [
|
||||||
|
# generate as: cd ${pkgs.mastodon}; IGNORE_ALREADY_SET_SECRETS=true RAILS_ENV=development ${pkgs.mastodon}/bin/rails db:encryption:init
|
||||||
|
(writeText "rest" ''
|
||||||
|
ACTIVE_RECORD_ENCRYPTION_DETERMINISTIC_KEY=naGoEzeyjUmwIlmgZZmGQDWJrlWud5eX
|
||||||
|
ACTIVE_RECORD_ENCRYPTION_KEY_DERIVATION_SALT=A0tE1VJ7S3cjaOQ58mNkhrVFY7o5NKDB
|
||||||
|
ACTIVE_RECORD_ENCRYPTION_PRIMARY_KEY=tGHhd5Os7hLxa8QTzWwjyVLrvsj5VsCw
|
||||||
|
'')
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -113,6 +113,7 @@ let
|
||||||
|
|
||||||
${seleniumQuit}'';
|
${seleniumQuit}'';
|
||||||
|
|
||||||
|
dummyFile = pkgs.writeText "dummy" "dummy";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
name = "test-pixelfed-garage";
|
name = "test-pixelfed-garage";
|
||||||
|
@ -161,8 +162,8 @@ in
|
||||||
];
|
];
|
||||||
environment.variables = {
|
environment.variables = {
|
||||||
POST_MEDIA = ./fediversity.png;
|
POST_MEDIA = ./fediversity.png;
|
||||||
AWS_ACCESS_KEY_ID = config.fediversity.garage.ensureKeys.pixelfed.id;
|
AWS_ACCESS_KEY_ID = "$(cat ${config.fediversity.pixelfed.s3AccessKeyFile})";
|
||||||
AWS_SECRET_ACCESS_KEY = config.fediversity.garage.ensureKeys.pixelfed.secret;
|
AWS_SECRET_ACCESS_KEY = "$(cat ${config.fediversity.pixelfed.s3SecretKeyFile})";
|
||||||
## without this we get frivolous errors in the logs
|
## without this we get frivolous errors in the logs
|
||||||
MC_REGION = "garage";
|
MC_REGION = "garage";
|
||||||
};
|
};
|
||||||
|
@ -170,6 +171,12 @@ in
|
||||||
users.users.selenium = {
|
users.users.selenium = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
};
|
};
|
||||||
|
fediversity.temp.initialUser = {
|
||||||
|
username = "dummy";
|
||||||
|
displayName = "dummy";
|
||||||
|
email = "dummy";
|
||||||
|
passwordFile = dummyFile;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue